Page 15 - Using MIS
P. 15
Contents xix
Q3 How Do Organizations Use Data Warehouses and Data Marts
to Acquire Data? 349
Problems with Operational Data 350
• Ethics Guide: Unseen Cyberazzi 352
Data Warehouses Versus Data Marts 354
Q4 How Do Organizations Use Reporting Applications? 355
Basic Reporting Operations 355
RFM Analysis 355
Online Analytical Processing (OLAP) 356
Q5 How Do Organizations Use Data Mining Applications? 359
Unsupervised Data Mining 359
Supervised Data Mining 360
Market-Basket Analysis 360
Decision Trees 362
Q6 How Do Organizations Use BigData Applications? 363
MapReduce 365
Hadoop 365
Q7 What Is the Role of Knowledge Management Systems? 366
What Are Expert Systems? 367
What Are Content Management Systems? 368
What Are the Challenges of Content Management? 368
What Are Content Management Application Alternatives? 369
How Do Hyper-Social Organizations Manage Knowledge? 369
Hyper-Social KM Alternative Media 370
Resistance to Hyper-Social Knowledge Sharing 371
Q8 What Are the Alternatives for Publishing BI? 371
Characteristics of BI Publishing Alternatives 371
What Are the Two Functions of a BI Server? 372
Q9 2025? 372
• Security Guide: Semantic Security 374
• Guide: Data Mining in the Real World 376
Case Study 9: Hadoop the Cookie Cutter 381
Part 4: Information Systems
Management
10: InforMaTIon SySTeMS SeCUrITy 387
Q1 What Is the Goal of Information Systems Security? 390
The IS Security Threat/Loss Scenario 390
What Are the Sources of Threats? 391
What Types of Security Loss Exist? 392
Goal of Information Systems Security 394