Page 20 -
P. 20

RFM Analysis  386                                Contents      19
                                                           Online Analytical Processing (OLAP)  387

                                                 Q9-5  How Do Organizations Use Data Mining Applications?  390
                                                           Unsupervised Data Mining  390
                                                           Supervised Data Mining  391
                                                           Market-Basket Analysis  391
                                                           Decision Trees  393
                                                 Q9-6  How Do Organizations Use BigData Applications?  394

                                                           MapReduce 394
                                                           •  So What? BI for Securities Trading?  395
                                                           Hadoop 396
                                                 Q9-7  What Is the Role of Knowledge Management Systems?  397

                                                           What Are Expert Systems?  398
                                                           What Are Content Management Systems?  399
                                                           What Are the Challenges of Content Management?  399
                                                           What Are Content Management Application Alternatives?  400
                                                           How Do Hyper-Social Organizations Manage Knowledge?  401
                                                           Hyper-Social KM Alternative Media  401
                                                           Resistance to Knowledge Sharing  402

                                                 Q9-8  What Are the Alternatives for Publishing BI?  402
                                                           Characteristics of BI Publishing Alternatives  402
                                                           What Are the Two Functions of a BI Server?  403
                                                 Q9-9 2026?  404
                                                           •  Security Guide: Semantic Security  406
                                                           •  Guide: Data Mining in the Real World  408
                                                           Case Study 9: Hadoop the Cookie Cutter  413


                    Part 4:  Information Systems

                                           Management




                    10: InforMaTIon SySTeMS SeCUrITy  419



                                               Q10-1  What Is the Goal of Information Systems Security?  422

                                                           The IS Security Threat/Loss Scenario  422
                                                           What Are the Sources of Threats?  423
                                                           What Types of Security Loss Exist?  424
                                                           Goal of Information Systems Security  426
                                               Q10-2  How Big Is the Computer Security Problem?  427

                                               Q10-3  How Should You Respond to Security Threats?  428

                                               Q10-4  How Should Organizations Respond to Security Threats?  430
                                                           •  So What? New from Black Hat 2014  431
   15   16   17   18   19   20   21   22   23   24   25