Data Warehouses and Data Marts, writing homework help

User Generated

NyyvrPng07

Writing

Description

Write a one- to two-page 250 work paper that discusses the differences between data warehouses and data marts. Also, discuss how organizations can use data warehouses and data marts to acquire data. 


Unformatted Attachment Preview

Data Warehouses and Data Marts Write a one- to two-page 250 work paper that discusses the differences between data warehouses and data marts. Also, discuss how organizations can use data warehouses and data marts to acquire data. You must use the CSU Online Library to locate at least two sources for your paper. APA rules for formatting, quoting, paraphrasing, citing, and listing of sources are to be followed. UNIT V STUDY GUIDE Social Media Information and Social Business Intelligence Systems Reading Assignment Chapter 8: Social Media Information Systems Chapter 9: Business Intelligence Systems Course Learning Outcomes for Unit V Upon completion of this unit, students should be able to: 2. Distinguish the similarities and differences between the personal knowledge management tools. 5. Evaluate the approaches to developing organizational knowledge management strategies. Unit Lesson Suggested Reading See information below. Learning Activities (Non-Graded) See information below. In Unit IV, we discussed the cloud and how the cloud works as well as the types of business processes and ERP systems. In this unit, we will discuss uses of social media for developing a personal brand, the use of reporting on mobile devices, some innovative application for mobile and the cloud, and the unique application of social networking for healthcare. You will also learn about some practical applications for business intelligence systems, specifically reporting, the use of animation for reporting on a mobile device, and the advantages of storing data in the cloud. The display shown in the mobile device at the start of Chapter 8 is a report with data from a cloud database (Figure 1). Figure 1. Report Display (Kroenke, 2015, p. 284) Because it is being served from the cloud, it is accessible by doctors, patients, health clubs, employers, insurance companies, and others who are not yet known to be involved (such as Lindsey). In this case, Lindsey learns that her mother has engaged in 11 treadmill exercises but has done almost nothing during those sessions. BBA 3551, Information Systems Management 1 It is common for those recovering from heart surgery to take exercise classes. Such classes provide control to ensure neither too much nor too little exercise is done; they also offer emergency assistance and the society of a group for encouragement. However, patients need to arrange transportation to the class. In the last unit, we discussed the PRIDE system (The Performance Recording, Integration, Delivery, and Evaluation). This system was developed as an embryonic, entrepreneurial opportunity that uses mobile devices, data-gathering exercise equipment, and the cloud to share integrated data among healthcare providers, heart surgery patients, health clubs, health insurance companies, and employers. PRIDE provides a way for patients to exercise at home and still have a group experience. They do not have emergency support, however, so this capability would need to be limited to patients who are unlikely to need emergency care. Once the class begins, class members’ performance will be displayed on the member’s mobile phones. The user interface for the class is shown on page 323 in Chapter 9. Dr. Flores can use this prototype not only to demonstrate that the technology will support the application, but also to find out if his mostly elderly parents will use it. One of the purposes of the prototype is to find out if it will provide the needed motivation so that elderly patients will use it. An example (Figure 2) of one such application can be found at: https://www.endomondo.com/ Figure 2. Mobile Exercise Tracking Application Another example of this type of innovative technology is in the use of exercise equipment over the cloud. In order to maintain exercise regimen during extreme weather conditions such as high temperatures during the summer and extreme cold during the winter months, one can purchase a treadmill to help maintain exercise goals (minimum of 30 minutes, five days per week). Some types of exercise equipment have the ability to download and store exercise programs. For example, some treadmills by ProForm are equipped with a slot for an iFit Live wireless module training program (Figure 3). BBA 3551, Information Systems Management 2 Figure 3. iFit Live Module This enables the treadmill to communicate with the user’s wireless network and download personalized workouts, create their own workouts, track their workout results, race against other runners, and access many other features (Figure 4). Figure 4. Downloadable Exercise Program BBA 3551, Information Systems Management 3 The user can then monitor their progress via a mobile app on a compatible phone (i.e., iPhone, Android) and on the web from a laptop or tablet. In addition to the training programs, there is also an online community to help promote exercise and to provide motivation (Figure 5). Figure 5. iFit Community Social Web Mobile technology and the cloud open doors for many new, innovative reporting applications. BBA 3551, Information Systems Management 4 The active nature of user experiences on mobile devices sets different expectations with regard to what a report is. In the opening figure in Chapter 9, page 323 (Figure 6), Maggie is competing against her prior workouts, in real time, on her bike. In the past, we would not have considered this a report, but it is. Figure 6. PRIDE Tracker Interface (Kroenke, 2015, p. 323) BBA 3551, Information Systems Management 5 This example provides a great use for exception reporting. Dr. Flores wants his patients to exercise neither too much nor too little. If they are exercising too much, he wants to be notified in real time. This also demonstrates how Dr. Flores is catching on to the ways that applications are developed. He wants to be able to enter profile workouts and assign patient prescriptions on the basis of profiles. Ultimately, this feature was added to the PRIDE prototype, and supporting data is stored in the Profile, Profile Workout, and Equipment tables. Each workout, optionally, is then based on a Profile as shown page 280 (Figure 7). Figure 7. PRIDE Tables (Kroenke, 2015, p. 280) The risks to Dr. Flores and Maggie in using exception-based PRIDE reporting for guiding at-home patient exercise is that PRIDE data eliminates data silos; patient data can be used for reports to all of the PRIDE participants, including doctors, patients, and health clubs. By eliminating silos, this enables all the parties to the PRIDE system to gain more information from that data. For example, doctors can use PRIDE data to compare patient exercise prescriptions to exercises performed. This opens the door to the use of data mining on the practice data (such as cluster and regression analyses). Other than competing against past performances, patients can use PRIDE data for their own benefit by keeping track of their exercise history over time, noting improvements or lack thereof, combining exercise data at home with that at health clubs, and possibly share their data with friends as is done at Endomondo: https://www.endomondo.com/. For health clubs and personal trainers, PRIDE could provide better reporting about what members are doing in the club than the club currently provides. In addition, the club and personal trainers can provide better services to individuals by combining club records with records of exercise at home. The club could also set up events in which some members are working out in the club and others are working out at home such as animating a competition on cell phones and on a group display in the club. Animation is a new type of reporting that can be used to create innovative and motivating reports. BBA 3551, Information Systems Management 6 In this litigious world, Dr. Flores probably should check with his attorney and the provider of his professional insurance to determine how to limit his liability in case patients misuse the system or in case it fails, either of which can happen. Maggie and other developers need to do the same. It is possible that this aspect of the application will become infeasible for legal reasons. Exception-based reporting for health care of at-risk patients may have liabilities that make it infeasible. Privacy and Security The availability of cheap cloud processing makes processing consumer data easier and less expensive every day. The result is more and more data, and that data is processed by more and more sophisticated algorithms. No one knows where this is going, and the U.S. government is so tied in knots that it is unlikely any effective governmental regulation will be created. Orwell’s book, 1984, which was science fiction when published, has become a reality. Should we care about the price of getting a good price on whatever we are looking for? How much personal privacy are we willing to sacrifice? It would be easier to relax about data aggregators if we knew what they are storing about us and also how they are processing it. If they use algorithms that are 95% reliable, what happens to the five percent for whom the results are wrong? All of this processing is happening in secret, behind closed doors. Since 9/11, in the name of increased security, the U.S. government gathers and processes data about, well, who or what? We do not really know. The 1974 privacy act seems naïve today, and nothing in that act keeps the government from buying business intelligence from data aggregators. In the security guide on page 362, Megan was able to combine data in reports that she receives for her job with data in a combination of public documents to infer at least one employee’s salary and possibly several others. She is not supposed to have this data. The fact that both the new-employee report and the employee newsletter were delivered electronically greatly simplified her task. This fact enabled her to readily search those documents. In truth, this problem has existed for as long as records have been kept. It is becoming a larger factor today because more reports are being produced, and those reports are being produced in readily searchable form. Thus, more data can be searched faster. The critical question is: What can be done about it? Who has the time to consider every possible inference from combinations of every available document? Who has the ability to make every possible inference? No one. Reference Kroenke, D. (2015). Using MIS 2014 (7th ed.). Upper Saddle River, NJ: Prentice Hall. BBA 3551, Information Systems Management 7 Suggested Reading Chapter 8 Presentation Chapter 9 Presentation Olsen, D. H., & Bryant, P.-D. (2012). Business intelligence and information systems: Enhancing student knowledge in database courses. Review of Business Information Systems. Retrieved from http://www.cluteinstitute.com/ojs/index.php/RBIS/article/view/6759/6834 In order to access the resource below, you must first log into the myCSU Student Portal and access the Academic OneFile database within the CSU Online Library. Inmon, W. H. (1996, November). The data warehouse and data mining. Communications of the ACM, 39(11), 49. Learning Activities (Non-Graded) Course Flashcards: http://media.pearsoncmg.com/ph/bp/bp_kroenke_umis_7/flashcards/index.html From the Textbook: Using MIS InClass 8, Any Kayakers Here at the Grand Canyon? p. 296 Using MIS InClass 9, pp. 350-351 Ethics Guide, Social Marketing? Or Lying? pp. 304-305 Ethics Guide, Unseen Cyberazzi, pp. 336-337 Security Guide, Social Recruiting, pp. 314-315 Security Guide, Semantic Security, pp. 362-363 Guide, Developing Your Personal Brand, pp. 316-317 Guide, Data Mining in the Real World, pp. 364-365 Using Your Knowledge, p. 319 Using Your Knowledge, p. 368 Case Study 8, Sedona Social, pp. 320-322 Case Study 9, Hadoop the Cookie Cutter, pp. 369-371 Non-graded Learning Activities are provided to aid students in their course of study. You do not have to submit them. If you have questions, contact your instructor for further guidance and information. BBA 3551, Information Systems Management 8
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: DATA WAREHOUSES AND DATA MARTS

Data Warehouses and Data Marts
Name
Institution

1

DATA WAREHOUSES AND DATA MARTS

2

Data Warehouses and Data Marts
Data warehouses tend to differ from data marts in a number of ways. To begin with, a
warehouse often includes a significant amount of information collected from numerous
sources and subject areas (Griffin, 1998; Inmon, 1996). The data stored in a warehouse
includes all of an organization’s relevant information. It will include a compilation of data
collected from varying operation systems (Creative Commons, 2012...


Anonymous
Really helped me to better understand my coursework. Super recommended.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags