Premium Essay

Cis 500 - Asgmt 2 - Harnessing Information Management, the Data, and Infrastructure

In: Computers and Technology

Submitted By Clanchief51
Words 1921
Pages 8
Harnessing Information Management, the Data and Infrastructure
CIS 500: Information Systems for Decision-Making

Amazon’s success can be considered to be based on its’ ability of its’ Information
Systems (IS) and Architecture to capture, analysis and manage information about its’ customers.
Many organizations have the capability to do the same but without the same success, so why the difference? In a 2004 interview with Business Week’s, Robert D. Hof, Jeff Bezos stated, “We see our customers as invited guests to a party, and we are the hosts. It’s our job every day to make every important aspect of the customer experience a little bit better”.
It appears the secret lies within the aforementioned quote, by the words “guests” and
“hosts”. Jeff views the commerce interaction as a relationship. Being a good “host” and making the customer (guest) experience better requires understanding of what the customer wants to obtain from their experience (relationship) with Amazon. The relationship importance is prioritized in Amazon’s mission statement, “Earth's Most Customer-Centric Company".
To build this relationship requires understanding the customer increasingly better, which in turn requires Amazon to make frequent attempts to engage the customer, through maintaining a high exposure on various “touch-points” across the Web, through search engines, vendor/partner websites, and social media all geared to steer new customers to Amazon’s primary website. For established customers, Amazon’s 24/7 customer service and support, email follow-up of transactions and predictive suggestions of potential items of customer interest based on purchase and browsing history are strengths used to build a long-term relationship. All these contacts, likes, dislikes, shares, etc., all help build more than just managed information about the customer, instead, Amazon builds a…...

Similar Documents

Free Essay

Cis 500

...2009 Report Outline Section Executive Summary Chapter 1: Overview / Introduction Chapter 2: Technology and Law Enforcement: An Overview of Applications, Impacts, and Needs Chapter 3: The PERF Technology Needs Assessment Survey Chapter 4: The PERF-Lockheed Martin Law Enforcement Future Technologies Workshop Chapter 5: Conclusions and Next Steps Pages 3-9 10-11 12-32 33-47 48-64 65-73 Appendix A: References Appendix B: The PERF Technology Needs Assessment Survey Appendix C: Survey Technology Term Definitions Appendix D: Responding Agencies (PERF Survey) Appendix E: Supplementary Survey Tables Appendix F: List of Workshop Attendees 74-79 80-91 92-98 99-102 103-124 125-127 2 Technology and Law Enforcement: Future Technologies to Address the Operational Needs of Law Enforcement EXECUTIVE SUMMARY Background The effects of technology can be seen in almost all aspects of modern life, and law enforcement is no exception. The field of law enforcement has been altered by technology in many important ways. One need only consider that the primary police strategy of the latter part of the 20th Century—motorized preventive patrol and rapid response to calls for service—was developed in response to the invention of the automobile and two-way radio communications. More recent technological developments have also had far-reaching effects on police agencies. Information technology, DNA testing, and bullet-resistant vests, for instance, are now common and critical...

Words: 37391 - Pages: 150

Free Essay

Cis 500

...Wireless Networks 4G Wireless Networks Britney Green CIS 500: Information Systems for Decision Making Professor Frank Lazzara November 4, 2012 4G Wireless Networks “Wireless networks use packet switching and wireless networks. Patching switching is when the path of the signal is digital and is neither dedicated nor exclusive. Routers are devices that forward packets from one network to another network. Packets occur when the network breaks a file or e-mail message into smaller blocks of specific size. Wireless routers are actually wired routers with wireless access points (WAP) built in. It provides both wired and wireless at the same time”. (Turban & Volonino, 2011) Third generation also called 3G; of cellular telecommunications technology supports multimedia and broadband services. Broadband means fast transmission speed. It is faster than the 1G and 2G. The third generation networks have far greater ranges because they use large satellite connections that connect to telecommunication towers. The fourth generation is called 4G. 4G mobile network standards enable faster data transfer rates. (Turban & Volonino) Right now 4G is the latest generation of wireless data technologies. It carries average download rates of 3 Mbps or more. “In contrast, today's 3G networks typically deliver average download speeds about one-tenth of that rate. The 2G and 3G started separately with their own purposes; soon both will be converted to the 4G......

Words: 1202 - Pages: 5

Premium Essay

Trends in Information Analysis & Data Management

...Trends in Information Analysis and Data Management Trends in Information Analysis and Data Management Over the last decade, advancements in digital technology have enabled companies to collect huge amounts of new information. This data is so large in scope, it has traditionally been difficult to process and analyze this information using standard database management systems such as SQL. The commoditization of computer technology has created a new paradigm in which data can be analyzed more efficiently and effectively than ever before. This report analyzes the some of the most important changes that are currently taking place within this new paradigm. The first part of this report covers trends in database analysis by analyzing the field of data mining. The report covers the topic of data mining by providing an explanation of it, and then by providing examples of real-world examples of data mining technology. Benefits and challenges of data mining are then provided. The second part of the report outlines an even more recent trend in data science, which is the increasing usage of noSQL databases to analyze “big data,” also referred to web-scale datasets. The most recent and major technological developments in the industry are then provided and described. Data Mining Background & Definition Data mining involves the process of discovering and extracting new knowledge from the analysis of large data sets. This is most often done through the use of data mining......

Words: 2546 - Pages: 11

Free Essay

Cis 207 Week 2 Information Use Paper

...Information Use CIS 207 April 10, 2013 Information Use Company’s safeguard sensitive data like credit cards, social security numbers, or names by storing them in files. Businesses need this information to perform business functions. Identification theft is on the rise and protecting customers and employee’s personal information is paramount for any business to perform. The inability to protect their information could result in the loss of trust from a client or a lawsuit. Successfully protecting personal information is based on five key principles; they are take stock, scale down, lock it, pitch it, and plan ahead (Federal Trade Commission, n.d.). Take stock refers to the inventory of personal information stored and who has access to the information. Ensuring only those people who has a need to know is given access. For example, at the restaurant I own, the cashier handles credit card transactions. This is important because if there were an incident where a customer was over charged or had a complaint; it would be easy to investigate the source of the problem. When taking inventory of the personal information stored, computers, and file cabinets are a great place to start. Flash drives, mobile phones, and website are also places to conduct an inventory. The company must talk to employees who sends personal information and how they send it. Customers, banking institutions, and credit card company’s send sensitive data through a variety of ways. Sensitive......

Words: 913 - Pages: 4

Premium Essay

Cis 500

...Rahkon A. Ross Dr. Edwin Otto Strayer University CIS 500 Assignment #1: Predictive Policing Compare and contrast the application of information technology (IT) to optimize police departments’ performance to reduce crime versus random patrols of the streets. Over the last decade, computer and telecommunications technologies have developed at a surprising rate. Increased computing power, advances in data transmission, smart and user-friendly graphic interfaces present law enforcement agencies with unprecedented capacity to collect, store, analyze and share data with stakeholders inside and outside of government. Ultimately, information technology represents a tool to help local law enforcement achieve its broadened and increasingly complex missions. (Reichert, 2001) There are many advantages associated with using information technology in policing. Comparative analysis shows that using information technology (IT) to combat crime has save lot of resources and time in the police department. There are a number of other advantages that can be associated with the use of information technology in the police department. For instance they use of Automated Field Reporting System by the police department has eradicated the use of hand writing of reports at the field by the Police Officers. Officers completed handwritten incident reports in the field and submitted them at the end of a shift to a field supervisor. After reviewing and approving reports, field supervisors would...

Words: 1431 - Pages: 6

Free Essay

Cis 500

...Assignment 2: 3G wireless networks and 4G networks sweetie Professor: CLIFTON HOWELL CIS 500 February 03, 2014 INTRODUCTION For one to compare and contrast 3g versus a 4g network, we first have to define what a wireless network is. Radios are considered to be the most popular for wireless technologies. Wireless communication is transferred between multiple points which are not connected to an electrical conductor. Wireless is playing a big part in the cellular network communication field. Literally, on all the channels on TV it’s impossible to go 3 minutes without seeing advertisements from Verizon, AT&T, T-Mobile, and Sprint claiming to be the best network provider. Each cell phone provider promote their own version of 3g and 4g networks. Carriers do this to draw the attention to endorse their services and to bring in new customers. As a result, it makes it very difficult for consumes to make a choice between the competitors. Consumers make their choice between providers based upon the price and coverage which are both vital to most consumers. With all the promotions and dramatic advertising it can be hard to know the truths about each wireless company. In this paper 3G and 4G networks will be compared and contrasted, 4G LTE, 4G WiMAX and 4G WiBro networks and competition will be identified. Lastly, this paper will identify why the competition between the 4G LTE carriers has been so fierce. 3G and 4G Networks Technology has allowed advance speed......

Words: 1092 - Pages: 5

Free Essay

Cis 500 - Assignment 2 4g Wireless Networks

...| 4G Wireless Networks | | | | Jason LehmanCIS 500 – Information Systems for Decision Making 7/27/14 | | 4G Wireless Networks | | | | Jason LehmanCIS 500 – Information Systems for Decision Making 7/27/14 | Compare and Contrast 3G and 4G Wireless Networks The comparison of 3G and 4G wireless networks can be broken down into four main areas of concern when deciding on the more future-oriented 4G compared to the more established 3G network. The first areas examined are service and applications. Third-generation (3G) networks consist of CDMA 2000, UMTS, WCDMA, and various others. Fourth-generation (4G) technologies include WiMAX, HSPA+21/42, and LTE, of which many consider LTE to be the only “true” 4G network (Segan, 2013). The introduction of 3G technologies heralded a wide range of possibilities to include the ability for user to wirelessly stream audio, video, visual calling and conferencing, and various mobile multimedia functions to include more streamlined E-mail and general web browsing, online banking, basic video games on demand, mobile TV, and location-based services (4Gon Solutions, 2012). 4G application offerings include four main categories: Localized/Personalized Information, Communications, Organizational, and Entertainment (M-Indya, 2012). Localized/Personalized Information applications will offer users the ability to browse various news outlets, more accurate and improved locational servicers, more enhance mobile commerce (i.e. mobile...

Words: 2244 - Pages: 9

Free Essay

Management Information Systems Ch. 2 Notes

...Management Information Systems Chapter 2 COMPONENTS OF A BUSINESS * A business is a formal organization whose aim is to produce products or provide services for a profit – that is, to sell products at a price greater than the costs of production. * ORGANIZING A BUSINESS: BASIC BUSINESS FUNCTIONS * The decision of what to produce is called a strategic choice because it determines your likely customers, the kind of employees you will need, the production methods and facilities needed, the marketing themes, and many other choices. * The five basic entities in a business with which it must deal are: suppliers, customers, employees, invoices/payments, and, of course, products and services. * BUSINESS PROCESSES * The actual steps and tasks that describe how work is organized in a business are called business processes. * A logically related set of activities that define how specific business tasks are performed. * Also refer to the unique ways in which work, information, and knowledge are coordinated in a specific organization. Manufacturing & Production | * Assembling the product * Checking for quality * Producing bills of materials | Sales & Marketing | * Identifying customers * Making customers aware of the product * Selling the product | Finance & Accounting | * Paying creditors * Creating financial statements *......

Words: 3642 - Pages: 15

Free Essay

Cis 500

...CIS 500 Weeks 6, 7, 8,9,11 Discussion Questions Week 6 * Mobile banking features have added several advantages for customers however; there are security risks that come with them. Determine the security risks with respect to phishing, smishing, vishing, cloning, and a lost or stolen smartphone that have been experienced by the financial services industry as a result of mobile banking. Phishig – Is when malware is downloaded on to a device and it attempts to obtain personal information. It lies in wait and gathers information from apps such as a mobile banking app to gain your login and password. If you bank does not have proper security in place this can lead to your account getting hacked and loss of money. Smishing- This is where fraudulent communication occurs in the form of a text message in order to obtain personal information. Vishing – This is similar to smishing instead of getting information through text it is obtained through phone calls or voicemails. Cloning- The transfer of information from one device to another device including the electronic serial number When a smartphone is lost or stolen this can lead to a compromise to a person’s personal information since it may be on the phone. I bank with Bank of America and use the mobile app to manage my account transfer funds, pay bills, deposit checks and so on. The app does not store the password but it does store the user login. You are unable to just log in to it from a new device or location without......

Words: 2846 - Pages: 12

Free Essay

Cis 500

...Case Study: #1 - The Big Data Challenges Arnechia Washington Professor Durgin CIS500 Info Syst Decision-Making January 26, 2014 Volvo Car Corporation has incorporated the cloud infrastructure into its networks to globalize the company. “With hundreds of sensors and CPUs embedded throughout the car — from the brakes to the central locking system — data is now being captured for use within the vehicle itself, and also, increasingly, for transmission via the cloud back to the manufacturer” (Strader, 2011). Volvo’s data Warehouse has multi-terabytes of data from the hundreds of sensors and CPU’s that are embedded throughout the car as well as data from customer relationship systems. The Cloud platform allows implementing and evaluating real-time information systems to transform data into knowledge. This will give Volvo a competitive advantage over other car companies and allow their offices no matter the location to immediately take advantage of the data that is stored. There are two different cloud infrastructures within their infrastructure: service cloud and vendor hosting. Service cloud is used to support the customers and while their customers are operating the vehicles. This will enhance the car from the information that is gained based on the design and performance level of the car. Vendor hosting is used for the data that is located in separate warehouses. This platform allows the data to be consolidated into one place and reduces the cost to maintain, operate...

Words: 989 - Pages: 4

Free Essay

Harnessing Information Management, the Data, and Infrastructure

...Harnessing Information Management, the Data, and Infrastructure Writing Assignment #2 Antwaun Taylor Strayer University CIS 500 Prof. Richard Brown Friday, May 1, 2015 The importance of information management is to gain the maximum benefits from your company's information system, which you would have to exploit all its capacities. Information systems gain their importance by processing the data from company inputs to generate information that is useful for managing your operations. Other duties of management is gathering and distributing information, and information systems can make this process more efficient by allowing managers to communicate rapidly. (Markgraf, 2015) The use of information technology has been an essential part of Wal-Mart's growth. A decade ago Wal-Mart trailed K-Mart, which could negotiate lower wholesale prices due to its size. They created a computerized system that identifies each item sold, that would finds its price in a computerized database, creates an accurate sales receipt for the customer, and stores this item-by-item sales information for use in analyzing sales and reordering inventory. Aside from handling information efficiently, effective use of this information helps Wal-Mart avoid overstocking by learning what merchandise is selling slowly. Aside from handling information efficiently, effective use of this information helps Wal-Mart avoid overstocking by learning what merchandise is selling slowly. Wal-Mart's inventory and......

Words: 1155 - Pages: 5

Premium Essay

Cis 500 - the New Frontier-Data Analytics

...The New Frontier: Data Analytics CIS 500: Information Systems For Decision-Making Anywhere we travel on the internet we have been bombarded with seemingly codependent requests to, “Like US!”, “Follow US!”, “Watch US!”, “Share US!” from businesses of all types. If you think about it, this is exactly the dynamic. Businesses are in a dependent relationship, relying on the consumers for their survival. If a business wants to engage and remain in a viable relationship, it has to have a product/service the consumer desires and be able to deliver it in a manner that the consumer perceives as valuable. Even if a business has the “next greatest thing”, the consumer will not engage/continue in the relationship if the business does not or cannot provide it in a valuable way to the consumer. Amazon is one company that has been able to successfully develop this dynamic relationship. So then how does a business become and remain successful in the relationship? They need a better understanding of what the consumer wants by improving their Business Intelligence (BI). For decades, businesses have used statistics to analyze data to obtain information and insights for improving BI. With the advent of the computer, data analysis moved from statistical based inferences about the data to a more scientific method based on empirical results. This was the foundational begins of Data Analytics. Data Analytics, as defined in our course text is, specialized software, capabilities, and...

Words: 1961 - Pages: 8

Premium Essay

Cis 500 - Term Paper - Information Technology Strategic Plan

...Term Paper Information Technology Strategic Plan CIS 500: Information Systems for Decision-Making Information Technology Strategic Plan Established in 1984, in Chattanooga, TN, 1st Step Counseling started as a privately owned counseling practice, primarily serving the local courts by providing first time DUI offenders with DUI education service and assessment, as mandated by their court ordered probation. Over the next ten years 1st Step Counseling has expanded its’ services to deliver out-come focused Mental Health and Substance Use Disorder counseling. By 1995, 1st Step Counseling had a patient census of approximately 300 patients, requiring the employ of an Internal Medicine Specialist, a Psychiatrist, a Nurse Practitioner, three Licensed Practical Nurses, two Clinical Psychologist, six Licensed Professional Counselors and two Clinical Social Workers, plus eight Administrative and Support staff. Later the same year, 1st Step Counseling opened a second office in Farragut, south of Knoxville, TN. Since this first expansion, 1st Step Counseling has established itself as a prominent Mental Healthcare Service provider, with 14 locations in or near metropolitan areas, throughout the Southeast. In January 2014, the Board of Directors decided to expand to the national market. To begin steering the company toward the national stage, the Directors and Senior Executives rebrand the company’s identity by changing the name to Access-Link Behavioral Healthcare......

Words: 2977 - Pages: 12

Free Essay

Cis 502 Critical Infrastructure Protection

...CIS 502 Critical Infrastructure Protection Click Link Below To Buy: http://hwaid.com/shop/cis-502-critical-infrastructure-protection/ Due Week 6 and worth 50 points Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure. The following documents titled, “National Infrastructure Protection Plan”, and “Critical Infrastructure Protection”, may be used to complete the assignment. Write a three to five (3-5) page paper in which you: 1. Examine the Department of Homeland Security’s : a. mission b. operations c. responsibilities 2. Explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. 3. Describe the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure. 4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure. 5. Suggest three (3) methods to improve the protection of our critical infrastructure and justify each suggestion. 6. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times...

Words: 1288 - Pages: 6

Free Essay

Harnessing Information Management, the Data and Infrastructure

...devices. Information management: The planning, budgeting, control and exploitation of the information resources in an organization. It comprises of information relating to personal, finance, marketing, organization and technology. It helps in the coordination and integration of a wide range of information about the activities inside the organization. The information include the formulation of corporate information policy, design, evaluation and integration ofeffective information systems and services, the exploitation of IT for competitiveadvantage and the integration of internal and external information and data.  Data management: Data management is an organization's management of information and data for secure and structured access and storage. It includes creating policies for the government, analysis and architecture, database management, integration systems, data security and data source. Is comprises of a variety of different techniques that facilitate and ensure data control and flow from creation to processing, utilization and deletion. It is a main part in an IT industry as data and information builds up the organization. Infrastructure: It is the basic facilities, services and installations needed for the functioning of an organization. It is the underlying base or foundation needed especially by industries or companies to function with ease. Information management consists of computers, instructions, stored facts, consumers and procedures. The......

Words: 1002 - Pages: 5