Using Publicly Available Data 20 th Meeting Course Name: Business Intelligence Year: 2009.

Slides:



Advertisements
Similar presentations
The Multistate Performance Test Ten Tips for Success January 17, 2005.
Advertisements

Mobile Payments and the FTC Manas Mohapatra Director of Mobile Policy Mobile Technology Unit Federal Trade Commission The views expressed are not necessarily.
Back to Table of Contents
Unit 7: Store and Retrieve it Database Management Systems (DBMS)
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
San Cannon Federal Reserve Board IASSIST 2010
Chapter 14 The Second Component: The Database.
Web-tracking and Adware Hannah Muihrienne Julie Chris.
Software Documentation Written By: Ian Sommerville Presentation By: Stephen Lopez-Couto.
Exploring Marketing Research William G. Zikmund
Databases & Data Warehouses Chapter 3 Database Processing.
15 Banking and Finance © Oxford University Press, All rights reserved.
Subject Name: Introduction to Computing Assignment : Advantages And Disadvantages Of Open Source Software Submitted by: Raja Kamran Maroof Khan (FA10-BBA-135)
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
A Case Study: Enhanced Banking Analytics
The Ethical Fundraising and Financial Accountability Code.
Database Systems – Data Warehousing
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Semantic Web outlook and trends May The Past 24 Odd Years 1984 Lenat’s Cyc vision 1989 TBL’s Web vision 1991 DARPA Knowledge Sharing Effort 1996.
Data Enhancement 18 th Meeting Course Name: Business Intelligence Year: 2009.
Marketing Management Online marketing
CONFIDENTIALITY The promise of NOT to share personal information inappropriately. Grounded in an individual’s right of privacy.  “DO NO HARM” Slide 2.
Introduction: Databases and Database Users
Title Slide – Option 1. Title Slide – Option 2 Insert Text.
ELECTRONIC BUSINESS TRANSACTIONS Issues Covered in Chapter –Jurisdiction –Infringement and Cybersquatting –Internet Privacy and Database Protection –E-Commerce.
ITGS Case Study Theatre Booking System Ayushi Pradhan.
CHAPTER 14 INTERPRETATION OF THE CONTRACT AND THE RIGHTS AND OBLIGATIONS OF THIRD PERSONS DAVIDSON, KNOWLES & FORSYTHE Business Law: Cases and Principles.
Copyrighted material John Tullis 10/17/2015 page 1 04/15/00 XML Part 3 John Tullis DePaul Instructor
© TIAC group, IPA Information System [case study] Vojvodina Investment Promotion Fund.
1 Personalization and Trust Personalization Mass Customization One-to-One Marketing Structure content & navigation to meet the needs of individual users.
Innovations in Data Dissemination Thomas L. Mesenbourg, Jr. Acting Director U.S. Census Bureau United Nations Seminar on Innovations in Official Statistics.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 5 Data Resource Management.
The Value of Parallelism 16 th Meeting Course Name: Business Intelligence Year: 2009.
Planning for Success 7 th - 8 th Meeting Course Name: Business Intelligence Year: 2009.
Building Data and Document-Driven Decision Support Systems How do managers access and use large databases of historical and external facts?
3 rd and 4 th. Learning Outcomes Students should be able to identify, describe and summarize the steps in the research process.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
DATABASE MANAGEMENT SYSTEMS CMAM301. Introduction to database management systems  What is Database?  What is Database Systems?  Types of Database.
Database Principles. Basics A database is a collection of data, along with the relationships between the data The data has to be entered into a structure,
Web Information Retrieval Prof. Alessandro Agostini 1 Context in Web Search Steve Lawrence Speaker: Antonella Delmestri IEEE Data Engineering Bulletin.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage Supplier Returns.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage and Disposition Inventory Returns.
Global Opportunities Glencoe Entrepreneurship: Building a Business Global Entrepreneurship Ways to Enter the Global Market 4.1 Section 4.2 Section 4 4.
Business Rules 12 th Meeting Course Name: Business Intelligence Year: 2009.
Information Integration 15 th Meeting Course Name: Business Intelligence Year: 2009.
Data Profiling 13 th Meeting Course Name: Business Intelligence Year: 2009.
CHAPTER 5 ETHICS & PRIVACY.
Data Warehouses, Online Analytical Processing, and Metadata 11 th Meeting Course Name: Business Intelligence Year: 2009.
Mass Media Law 18 th Edition Don Pember Clay Calvert Chapter 8 Invasion of Privacy: Publication of Private Information and False Light McGraw-Hill/Irwin.
Knowledge Discovery and Data Mining 19 th Meeting Course Name: Business Intelligence Year: 2009.
Business Models and Information Flow 10 th Meeting Course Name: Business Intelligence Year: 2009.
Using the Web as an Investigation Tool Maureen Cahill University of Georgia Law Library
-1- For Oracle employees and authorized partners only. Do not distribute to third parties. © 2009 Oracle Corporation – Proprietary and Confidential Oracle.
Chapter 3 Building Business Intelligence Chapter 3 DATABASES AND DATA WAREHOUSES Building Business Intelligence 6/22/2016 1Management Information Systems.
Attributes and Values Describing Entities. Metadata At the most basic level, metadata is just another term for description, or information about an entity.
-1- For Oracle employees and authorized partners only. Do not distribute to third parties. © 2009 Oracle Corporation – Proprietary and Confidential Oracle.
A Litigator’s View of Software License Agreements
The Legal Context of Business
The Legal Context of Business
Corporations and Trusts Law
THE COMPANY – A SEPARATE LEGAL ENTITY
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
<Insert Picture Here>
WHAT DOES THE FUTURE HOLD? Ann Ellis Dec. 18, 2000
Software Documentation
Attributes and Values Describing Entities.
Ethical questions on the use of big data in official statistics
MANAGING DATA RESOURCES
The ultimate in data organization
Copyright & Fair Use What You Need to Know!.
Presentation transcript:

Using Publicly Available Data 20 th Meeting Course Name: Business Intelligence Year: 2009

Bina Nusantara University 3 Source of this Material (2).Loshin, David (2003). Business Intelligence: The Savvy Manager’s Guide. Chapter 15

The Business Case It is very simple to make the case for using public data. Data that has been collected and made available by government resources is available at a low cost, and the only costs involve storage management and integrating with other BI data. In any company that has set up a BI environment, the processes associated with importing, managing, and integrating data have already been streamlined for internal data set aggregation. And so the only increase is in those variable costs associated with executing those processes. On the other hand, in the right circumstance there can be significant value through data enhancement using publicly available data. Bina Nusantara University 4

There are three major management issues associated with the use of publicly available data: integration, privacy, and its lack of structure. In fact, there are a number of companies whose business is to enhance and improve public data sets and the resell them based on their added value. The second major issues revolves around personal privacy. There is a perception that any organization that collects data about individuals and the tries to exploit that information is invading a person’s privacy. The third major issue is that a lot of publicly available data is not always in a nicely structured form that is easily adaptable. Frequently, this data is semistructured, which means that the data requires some manipulations before it can be successfully and properly integrated. Bina Nusantara University 5 Management Issues

There is a large amount of public data that is easily accessible, and how to explore all of that data could fill an entire book. What is important is to explore the process of locating the data resources that are available and how to determine the usage possibilities for that data. There are many ways that data sets can be categorized, but we will break the realm of public data into these areas: Personal Information Any data that attributes the information about a person could be called personal information. Business Information Aside from personal information, there is a lot of data that can be used to attribute business entities. The public records are frequently related to rules and regulations imposed on business operations by federal or state government jurisdictions. This kind of data includes the following.  Incorporations  Uniform Commercial Code (UCC) Bina Nusantara University 6 Public Data

 Bankruptcy Filings  Professional Licensing  Securities Filings  Regulatory Licensing  Patents and Trademarks Legal Information A large number of legal cases are accessible online, providing the names of the parties involved in the cases as well as free text describing the case. These documents, many of which having been indexed and made available for search, contain embedded psychographic and geographic enhancement potential, along with opportunities for entity extraction and entity linkage. Those linkages may represent either personal or business relationships. Factual Information There is an abundance of factual information embedded in available data sets. Although there may be some restriction on specific uses of some of this data, there is still much business value that can be derived from data sets such as the following. Bina Nusantara University 7 Public Data (cont…)

 Census Summary  Topologically Integrated Geographic Encoding and Referencing database  Federal Election Commission  Bureau of Labor Statistics (BLS)  Pharmaceutical Data Bina Nusantara University 8 Public Data (cont…)

There are basically two approaches: gather data from the original source, and pay a data aggregator for a value-added data set. Original Source As mentioned in the previous sections, the government is a very good source of publicly available data. Another source of publicly available information may be provided by third parties in a form that is not meant for exploitation. A good examples is a Web site, which may have some data but not in a directly usable form. Another interesting source of publicly available data is the subject of that data itself. Data Aggregators The term data aggregator to refer to any organization that collects data form one or more sources, provides some value-added processing, and repackages the result in a useable form. Another method for providing aggregated data is through a query- and-delivery process. Bina Nusantara University 9 Data Resources

On the other hand, when the content is limited to a vocabulary or a format that can be reasonably modeled, it is possible, with some degree of certainty, to extract bits and pieces of information from semistructured data. The point is that although the data has not been broken down into a distinct set of attributes and their assigned values, there is some predictable context that appears frequently enough that allows an application to extract information. Bina Nusantara University 10 Semistructured Data

Fear of Invasion The truth is, as BI professionals, we are somewhat responsible for collecting customer information and manipulating that information for marketing purposes, but are we really guilty of invasion of privacy? The Value and Cost of Privacy This demonstrates an interesting model of information valuation, in that the consumer is being compensated in some way in return for providing information. The “Privacy” Statement The issuing of a privacy statement does not imply that your data is being treated as private data. These statements actually are the opposite-they tell the consumer how the information is not being kept private. The Good News for Business Intelligence There are a lot of benefits in society to the dissemination of personal information, such as the ability to track down criminals, detect fraud, provide channels for improved customer relationship management, and even track down terrorists. As BI professional, we have a twofold opportunity with respect to the privacy issue. Bina Nusantara University 11 The Myth of Privacy

The first is to raise awareness regarding the consumer’s value proposition with respect to data provision, leading to raised awareness about both the legality and the propriety of BI analysis and information use. The second is to build better BI applications. Bina Nusantara University 12 The Myth of Privacy (cont…)

End of Slide Bina Nusantara University 13