Page 20 -
P. 20
RFM Analysis 386 Contents 19
Online Analytical Processing (OLAP) 387
Q9-5 How Do Organizations Use Data Mining Applications? 390
Unsupervised Data Mining 390
Supervised Data Mining 391
Market-Basket Analysis 391
Decision Trees 393
Q9-6 How Do Organizations Use BigData Applications? 394
MapReduce 394
• So What? BI for Securities Trading? 395
Hadoop 396
Q9-7 What Is the Role of Knowledge Management Systems? 397
What Are Expert Systems? 398
What Are Content Management Systems? 399
What Are the Challenges of Content Management? 399
What Are Content Management Application Alternatives? 400
How Do Hyper-Social Organizations Manage Knowledge? 401
Hyper-Social KM Alternative Media 401
Resistance to Knowledge Sharing 402
Q9-8 What Are the Alternatives for Publishing BI? 402
Characteristics of BI Publishing Alternatives 402
What Are the Two Functions of a BI Server? 403
Q9-9 2026? 404
• Security Guide: Semantic Security 406
• Guide: Data Mining in the Real World 408
Case Study 9: Hadoop the Cookie Cutter 413
Part 4: Information Systems
Management
10: InforMaTIon SySTeMS SeCUrITy 419
Q10-1 What Is the Goal of Information Systems Security? 422
The IS Security Threat/Loss Scenario 422
What Are the Sources of Threats? 423
What Types of Security Loss Exist? 424
Goal of Information Systems Security 426
Q10-2 How Big Is the Computer Security Problem? 427
Q10-3 How Should You Respond to Security Threats? 428
Q10-4 How Should Organizations Respond to Security Threats? 430
• So What? New from Black Hat 2014 431