Big data is a new frontier in innovation, characterized by vast data sets that require extensive computer processing to spot trends, and improve productivity. The ability to gather such data sets and effectively translate them in to strategy is seen as a new way of competing and innovating (Manyika et al., 2011). My area of interest is fashion, an area where creativity remains more important than data processing. Yet, big data is having an impact on the mainstream fringes of the fashion business.
For example, mainstream retailers are seeking to acquire more data points from their customers about a variety of different variables, and use those data points to more accurately meet the market's needs. Each season, millions of dollars' worth of merchandise goes unsold, to be sent to discounters at a fraction of the expected cost. This creates waste in the economic system of both the producers and retailers. Hence,…...
mlaReferences
Deamicis, C. (2013). Lingerie and algorithms: Big data comes to fashion. Pando Daily. Retrieved November 9, 2013 from http://pandodaily.com/2013/10/23/lingerie-and-algorithms-big-data-comes-to-fashion/
Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C. & Byers, A. (2011). Big data: the next frontier for innovation, competition, and productivity. McKinsey Global Institute. Retrieved November 9, 2013 from http://www.mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation
Trites, D. (2013). Big data: The next big trend in fashion. SAP Business Innovation. Retrieved November 9, 2013 from http://blogs.sap.com/innovation/industries/big-data-next-big-trend-fashion-0661043
Big Data
Faris (2013) speculates as to whether NSA leaks will compromise big data's future. The article, published on the website Dataversity, notes that there is public concerns about data leaks at NSA. Consumers are becoming more aware about just how much of their information is available to the government. The author calls into question the dichotomy of private data and public data, in particular were corporate entities are gathering data, and then that data finds its way into the hands of government. The author concludes by noting that big data is a growing field, but there are still going to be customers who are wary.
The point Faris makes about customers being willing participants is valid in that most people are perfectly willing to divulge information. Only when they overtly know that this information is being used to market to them may they have a problem with it, but only maybe.…...
mlaReferences
Boyd, D. & Crawford, K. (2012). Critical questions for big data. Information, Communication and Society. Vol. 15 (5) 662-679.
Chen, H., Chiang, R. & Storey, V. (2012). Business intelligence and analytics: From big data to big impact. MIS Quarterly. Vol. 36 (4) 1165-1188.
Cohen, J., Dolan, B., Dunlap, M., Hellerstein, J. & Welton, C. (2009) MAD skills: New analysis practices for big data. VLDB '09. August 24-28, 2009, Lyon, France.
Faris, S. (2013). Have the NSA leaks compromised big data's future? www.dataversity.net Retrieved from http://www.dataversity.net/have-the-nsa-leaks-compromised-big-datas-future/
Big Data
Nowadays, enterprises are employing statisticians when carrying out sophisticated data analysis. This is caused by the increased affordability in data acquisition and data storage among large scale and small-scale enterprises. This article focuses on highlighting the emerging Magnetic, Agile, Deep (MAD) data analysis. This is figured out as a shift from traditional enterprise data intelligence. The article presents its design philosophy as well as experience and techniques that portray MAD as one of the biggest advertising networks for the interactive media. Moreover, data parallel algorithms are presented for sophisticated techniques putting more emphasis on density methods. Another crucial reflection of the article is the database system features, which facilitate agile design and flexible construction of the algorithm (Cohen, Dolan, & Dunlap 2009).
The article has included the knowledge from some prior study. For instance, the standard business practices applied in the large scale data analysis revolves around the notion of…...
mlaReferences
Cohen, J., Dolan, B., & Dunlap, M. (2009). MAD skills: new analysis practices for big data
Big Data ole in Obama e-Election
The volumes, rapid velocity and variation of data otherwise referred to as Big Data has been used in the electioneering process especially in terms of directing the trends of voter psychology and the subsequent voting patterns, a specific example being the Obama reelection process that took more of the internet direction than the traditional door-to-door approach in the campaigns. This paper will hence expound on the way Big Data has been and can be used in the monitoring and manipulation of the internet users especially the voting block, how this data can be mishandled and the possibility of infringements into the privacy of the individuals whose data is online. It will also evaluate the possibility of having checks on the handling, storage and use of personal data that is online.
Literature review
There have been varied uses of the Big data in the contemporary society where information…...
mlaReferences
Hiner J., (2012).How big data is being used today: Three ways. Retrieved June 27, 2014 from http://www.zdnet.com/how-big-data-is-being-used-today-three-ways-7000005714/
Lenard T. & Rubin P., (2013). The Big Data Revolution: Privacy Considerations. Retrieved June 27, 2014 from http://www.techpolicyinstitute.org/files/lenard_rubin_thebigdatarevolutionprivacyconsiderations.pdf
Wakefield J., (2013). Tomorrow's cities: How big data is changing the world. Retrieved June 27, 2014 from http://www.bbc.com/news/technology-23253949
Big Data
Many companies are making use of big data to give themselves competitive advantage. Tesla is a good example of this. Tesla installed its Autopilot self-driving system on its cars in late 2015, even though the system is not activated. But what it has done is allowed the company to collect data on 1.3 billion miles of driving. This in turn "allows Tesla's engineers to fine-tune the algorithms that control its cars' active-safety systems," the basis of fully autonomous driving (Edelstein, 2016). Other car companies are working towards self-driving cars, but are doing it without the benefit of this enormous data set, which means that Tesla should in theory enjoy a technological competitive advantage with its self-driving cars (Edelstein, 2016).
The implementation of this big data is a work in progress. It will take years, and in theory the implementation should remain ongoing even once Tesla's cars are fully autonomous. The…...
mlaReferences
Edelstein, S. (2016) Tesla's autonomous-car efforts use big data no other carmaker has. Green Car Reports. Retrieved February 21, 2017 from http://www.greencarreports.com/news/1108065_teslas-autonomous-car-efforts-use-big-data-no-other-carmaker-has
Versace, C. (2014). Talking big data and analytics with IBM. Forbes. Retrieved February 21, 2017 from http://www.forbes.com/sites/chrisversace/2014/04/01/talking-big-data-and-analytics-with-ibm/#7a0f0f974aa7
875). Often success introduces complacency, rigidity, and over confidence that eventually erode a firm's capability and product relevance. Arie de Geus (1997) identified four main traits for a successful firm; the first is the ability to change with a changing environment (Lovas & Ghoshal, 2000, p.875). A successful firm is capable of creating community vision, purpose, and personality, and it is able to develop and maintain working relationships. Lastly, a successful firm has conservative financing strategies, and is able to learn to perpetuate it. Self-perpetuation is a strategy identified in this study as necessary for current business strategies to survive in today's market.
ole of Technology in Business Strategy
Business strategy is continually evolving as information technology and business process redesign assist in the innovative design of central business processes (Broadbent, Don & Weill, 1999, p.159). New it systems have contributed to the reduction of coordination, production and information costs (Broadbent, Don…...
mlaReferences
Abareshi, a. (2010). The Choice of Business Strategy and New Organizational Forms: Model and Instrument Development. Interdisciplinary Journal of Contemporary Research in Business, 2(5), 9-38.
Allio, R.J. And Randall, R.M. (2010). Kiechel's History of Corporate Strategy. Strategy & Leadership, 38(3), 29-34.
Alpaslan, C.M., Green, S.E. And Mitroff, I.I. (2009). Context of Crises: Towards a Stakeholder Theory of Crisis Management. Journal of Contingencies and Crisis Management, 17(1), 38-49.
Berman, S.J. & Hagan, J. (2006). How Technology-Driven Business Strategy can Spur Innovation and Growth. Strategy & Leadership, 34(2), 28-34.
Authors Note: Rosenbaum is technology and retail analysts. She writes articles for the New York imes and Forbes.
Saikali, A. (2013, December 30). he arget Data Breach Lawsuits: Why every Company Should Care. Data Security Law Journal. Retrieved from: http://www.datasecuritylawjournal.com/2013/12/30/the-target-data-breach-lawsuits-why-every-company-should-care/
he article provides insight on the number of lawsuits filed against different organizations and strengthens the need for the companies to protect their information from data breach. he article shows the significant effects the data breach has to the organizations involved and their consumers. As such, it recommends on the need for the adoption of effective strategies aimed at protecting the organizations from breach of data, hence, the relevance of the big data.
Author Notes: Siakali writes on issues related to data security and data privacy.
hompson, L.L. (2011). Data Breach Encryption Handbook. Chicago, IL: American Bar Association.
hompson takes an in-depth analysis of the escalating data breaches across the world and their associated legal…...
mlaThompson, L.L. (2011). Data Breach Encryption Handbook. Chicago, IL: American Bar Association.
Thompson takes an in-depth analysis of the escalating data breaches across the world and their associated legal implications. She takes a specific focus on the legal implications of data breaches alongside the encryption technology, information security, and methods of preventing data breaches. The fact that the author uses information from different organizations hit by data breaches in the past forms the strength of the author's work. The book is important for the study because it provides insights into different issues related to data breach such as methods the hackers use to access the information and ways of preventing data breach in an organization.
Authors Note: Thomson is a senior engineer and private advocate at the CSC. She has published on topics related to data breach prevention and is the vice chair of the American Bar Association (ABA).
Open Data Source for Election 2014
Open data are the data that can be freely redistributed and used by anyone for personal or research purpose. One of the examples of open data is a government data that contain tremendous resources. Moreover, the open government data can assist in making a better decision. By law, the government data should be opened to anybody. Thus, the political analysts and statisticians have taken the advantages of the open data to generate a big data for the U.S. 2014 senate election in order to predict the outcome of the election results.
The purpose of this research is to investigate the role of big data for the analysis of the 2014 U.S. senate election. Since 2012, the big data has played a major role in the U.S. politics. In 2012, the epublican used the data analytics in winning the 2012 Presidential election by using the big data…...
mlaReference
Scherer,(2012). Inside the Secret World of the Data Crunchers Who Helped Obama Win, Time, Nov. 7, 2012.
Shen, G. (2013). Big Data, Analytics and Elections. Analytics Inform.
The Economist (2014). The Republicans win the Senate. The Economists.
Woodie, A. (2014). How Data Analytics Shaped Election Day 2014. Datanami.
personally understood as well as how/whether the topic could/should be applicable to public sector decisions. The author will also explain whether the data will be useful in a future job. While many of the topics in this course are attributed to and associated with the private sector, the usage of these tools and topics in the public sector is pervasive as well even if the manifestation is a bit different in many cases.
The spreadsheet modeling supplement from the class text is the first thing that will be discussed. The introduction alludes to the somewhat common presumptions about how Excel modeling and data modeling in general is something that is more in line with what private businesses need and that cannot be further from the truth. The supplement starts off with a good bullet point summary of what is involved in spreadsheet modeling. The author of this response does understand…...
mlaReferences
IBM. (2011). The power of analytics for public sector (pp. 1-28). Somers, NY: IBM.
Riley, G. (2006). The Cost-Benefit Principle -- Economics -- tutor2u. Tutor2u.net. Retrieved 18
March 2016, from http://tutor2u.net/economics/revision-notes/a2-micro-cost-benefit-analysis.html
EmphysemaEmphysema is a chronic lung condition that falls under the umbrella of chronic obstructive pulmonary disease (COPD). The disease is characterized by destruction of the air sacs (alveoli) in the lungs. Over time, the inner walls of the air sacs weaken and rupture, creating larger air spaces instead of many small ones. This reduces the surface area of the lungs and, in turn, the amount of oxygen that reaches the bloodstream (Jameson et al., 2021).The most common cause of emphysema is long-term exposure to airborne irritants, which can include everything from tobacco smoke to air pollution, chemical fumes, or simply even dust particles found in the average home. However, emphysema may also be caused by a deficiency in a protein called alpha-1-antitrypsin, which protects the elastic structures in the lungs (Jameson et al., 2021).The primary symptoms include shortness of breath, difficulty catching breath (especially during physical activities), wheezing, chronic mucus…...
mlaReferences
Izquierdo, J. L., Morena, D., González, Y., Paredero, J. M., Pérez, B., Graziani, D., ... &
Rodríguez, J. M. (2021). Clinical management of COPD in a real-world setting. A big data analysis. Archivos de Bronconeumología (English Edition), 57(2), 94-100.
Jameson J, Fauci A, Kasper D, Hauser S, Longo D, Loscalzo J. (2021). Harrison\\\\\\'s Principles of
Big Data
What is "big data" and how does this field relate to decision analysis?
Big data is really an expansion and improvement on what has been done for years and that is the collection and analysis of data. However, the two major differences that have emerged over the years is that the amount of data that can be harnessed at one time is much larger than it used to be and analytics/analysis of modern information systems can analyze the data much quicker, with much better accuracy and in ways that were elusive if not impossible in prior years and generations of technology. As an example, a robust information services/Big Data framework could find trends and outliers much quicker than a person, presuming a person could find them at all. This all relates to decision analysis in that the computers of today can do a lot of the work for the analysts.…...
mlaReferences
IBM. (2011). The power of analytics for public sector (pp. 1-28). Somers, New York: IBM
Institute for Business Value.
Problem Statement
Our company is in the fashion industry specializing in discounted designer clothes and accessories for men and women. We currently have a brick and mortar location and a small online presence. The owner’s goal is to promote growth of the online store and become customer centric. Through the expansion of the online presence, the owner wants to get the process streamlined from brick and mortar to the online platform.
Two Technologies
Through some research and considerations, we believe that Big Data and Knowledge Management along with Business Analytics and Business Intelligence Solutions will be the key to gaining the online presence that our company needs to build and sustain future growth.
Business Requirements
Objectives
As the ultimate goals are to create an online presence and customer focused business. Integrating Customer Knowledge Management, Business Analytics and Intelligence, will both provide us the necessary information about our current customers and allow us to segment the current…...
mlaReferences
Cooney, M. (2012). 10 common mobile security problems to attack. PCWorld. Retrieved from Deirdre M. (2014). Be like Zappos: Three steps to make big data work for your small business.Retrieved from http://www.jacquette.com/be-like-zappos-three-steps-to-make-big-data-work-for-your-small-business/ Gonsalves, A. (2013). Many iOS Apps Found Open to Hijacking on Public Wi-Fi. CSOOnline.Retrieved from http://www.csoonline.com/article/2134135/mobile-security/many-ios-apps-found-open-to-hijacking-on-public-wi-fi.html Oracle. (2014). Kohl’s sets foundation for future growth with Oracle retail. Retrieved from http://www.oracle.com/us/corporate/press/2348065http://www.pcworld.com/article/2010278/10-common-mobile-security-problems-to-attack.html
component graded.
The amassing of data has become an integral process of life in the 21st century (Nunan and Di Domenico, 2013, p. 2). This fact is partially reflected by the fact that in contemporary times, people are generating much more data than they previously did. Every time someone goes shopping and makes a purchase with a credit card, receives a call or sends a text message, or visits a web site on a computer or downloads information to a mobile phone application, they are generating data. This data is stored and, through sophisticated processes of analytics that involve data mining and even predictive capabilities, is analyzed to determine aspects of consumer, individual, and collective behavior. The generation of these massive quantities of data in the myriad forms such data takes at the rapidity of real-time access is known as big data, which government representatives claim they are analyzing to…...
mlaReferences
Byman, D., Wittes, B. (2014). Reforming the NSA. Foreign Affairs. 93(3), 127-138.
This source considers a number of possibilities for reforming the NSA which are viable in the wake of Snowden's security breach. It examines other country's approaches to espionage as well. In provides an in-depth read into the considerations the NSA must make for securing the country
Hackett, K. (2013). Edward Snowden: the new brand of whistle blower. Quill. 101(5), 26-31. This source examines the ramifications of the actions of whistle blowers, and attempts to deconstruct the privacy issues associated with security concerns in the U.S. It details the actions of Snowden.
Nuna, D., Di Domenica, M. (2013). Market research and the ethics of big data. International Journal of Market Research. 55(4), 2-13. This source considers the practice of amassing and analyzing big data largely from a marketing research perspective. It details the wide scope of data that is regularly stored and scrutinized regarding the lives of citizens.
EPR Discussion
The client has been using an ERP system to integrate financial and non-financial information for decision-making. They have been hearing about Big Data. Briefly explain the concept of Big Data, including its advantages and disadvantages.
Generally speaking, the confluence of Enterprise Resource Planning, ERP, and Big Data is seen as a boon and "win" for the companies that use them to help their business. Indeed, businesses that can use Big Data to manage and wield massive amounts of data in ways that are advantageous from a business and strategic standpoint will tend to do much better than those that are unwilling or unable to do so. One upside to the melding of these two concepts and technologies is that the benefits are outstanding. A downside is that not all ERP systems are accustomed and designed to properly harness and use Big Data resources. Indeed, an ERP or Big Data Application…...
Big Data and the GovernmentIntroductionIn recent years, there has been an explosion of data generated by disparate sources, including social media, financial transactions, and sensor networks. This so-called Big Data has the potential to transform the way in which governmental agencies operate. For example, the Department of Homeland Security (DHS) has used Big Data to thwart terrorist attacks, by mining social media for suspicious activity. The Department of Health and Human Services has used Big Data to combat fraud in the Medicare system. And the Department of Education has used Big Data to improve student outcomes. With its ability to identify patterns and trends, Big Data has the potential to make government more efficient and effective. As the volume of data continues to grow, so too will the opportunities for government to harness its power. This paper will look at how Big Data can be used to improve DHS.Background on…...
mlaReferencesAggarwal, A. K. (2019). Opportunities and challenges of big data in public sector. Web services: Concepts, methodologies, tools, and applications, 1749-1761.Coulthart, S., & Riccucci, R. (2022). Putting big data to work in government: the case of the United States border patrol. Public Administration Review, 82(2), 280-289.Joh, E. E. (2014). Policing by numbers: big data and the Fourth Amendment. Wash. L. Rev., 89, 35.Kaisler, S., Armour, F., Espinosa, J. A., & Money, W. (2013, January). Big data: Issues and challenges moving forward. In 2013 46th Hawaii international conference on system sciences (pp. 995-1004). IEEE.Sagiroglu, S., & Sinanc, D. (2013, May). Big data: A review. In 2013 international conference on collaboration technologies and systems (CTS) (pp. 42-47). IEEE.White, J. R. (2016). Terrorism and homeland security. Cengage Learning.
Management accounting combines traditional accounting responsibilities with management responsibilities, which allows a company to align budgetary considerations with the people handling the money. There are a variety of different topics in management accounting that could serve as a good springboard for research, because how it is applied can vary tremendously depending on the size, purpose, and structure of an organization. Regardless of the approach, it is clear that management accounting has become an important component of the decision-making process in business of all sizes and that the continued evolution of this practice should results in....
Firms meet the challenge of technological change by redesigning their innovation ecosystems in several key ways. This approach involves a strategic overhaul of their internal and external operations, relationships, and culture to foster innovation and adaptability. Here's how they do it:
Embracing Open Innovation: Moving away from solely in-house R&D, firms are increasingly embracing open innovation. This involves collaborating with external entities like startups, academic institutions, and other companies to source new ideas, technologies, and methodologies. This collaboration can take various forms, including joint ventures, partnerships, and innovation hubs.
Investing in Digital Transformation: Firms are investing heavily in digital technologies such as....
1. The Evolution and Challenges of Healthcare in 2020
2. Innovative Technologies Shaping Healthcare in 2021
3. The Impact of COVID-19 on Healthcare Systems in 2020
4. Addressing Health Disparities in 2021: A Call for Action
5. Telemedicine: The Future of Healthcare Delivery in 2020 and Beyond
6. Mental Health Awareness in the Era of Healthcare 2021
7. From Crisis to Opportunity: Resilience in Healthcare in 2020
8. The Role of Nurses in 2021: Advancing Healthcare Excellence
9. The Importance of Preventive Care in Healthcare 2020
10. Integrating Artificial Intelligence in Healthcare for Better Patient Outcomes in 2021
11. Telehealth Revolution: Expanding Access to Care in 2020/2021
12. Equity in....
1. The use of genetic engineering in creating designer babies
2. The ethics of animal testing in scientific research
3. The impact of social media on privacy and ethical boundaries
4. The ethical implications of artificial intelligence and automation in the workforce
5. The ethical considerations of data mining and surveillance in the digital age
6. The ethical responsibilities of pharmaceutical companies in pricing and distributing life-saving medications
7. The ethics of factory farming and its impact on animal welfare and the environment
8. The ethical dilemmas surrounding end-of-life care and physician-assisted suicide
9. The ethical implications of technology companies manipulating user data for profit
10. The ethical considerations....
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now