{"id":203,"date":"2018-06-14T19:04:51","date_gmt":"2018-06-14T19:04:51","guid":{"rendered":"https:\/\/pressbooks.ccconline.org\/bus3060\/chapter\/ch11-6\/"},"modified":"2026-02-03T15:51:42","modified_gmt":"2026-02-03T15:51:42","slug":"ch11-6","status":"publish","type":"chapter","link":"https:\/\/pressbooks.ccconline.org\/bus3060\/chapter\/ch11-6\/","title":{"raw":"11.6 The Business Intelligence Toolkit","rendered":"11.6 The Business Intelligence Toolkit"},"content":{"raw":"<div id=\"slug-11-6-the-business-intelligence-toolkit\" class=\"chapter standard\">\r\n<div class=\"ugc chapter-ugc\">\r\n<div id=\"fwk-38086-ch11_s06_n01\" class=\"bcc-box bcc-highlight\">\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Learning Objectives<\/span><\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<p id=\"fwk-38086-ch11_s06_p01\" class=\"nonindent para\">After studying this section you should be able to do the following:<\/p>\r\n\r\n<ol id=\"fwk-38086-ch11_s06_l01\" class=\"orderedlist\">\r\n \t<li>Know the tools that are available to turn data into information.<\/li>\r\n \t<li>Identify the key areas where businesses leverage data mining.<\/li>\r\n \t<li>Understand some of the conditions under which analytical models can fail.<\/li>\r\n \t<li>Recognize major categories of artificial intelligence and understand how organizations are leveraging this technology.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<p id=\"fwk-38086-ch11_s06_p02\" class=\"nonindent para editable block\">So far we\u2019ve discussed where data can come from, and how we can get data into a form where we can use it. But how, exactly, do firms turn that data into information? That\u2019s where the various software tools of business intelligence (BI) and analytics come in. Potential products in the business intelligence toolkit range from simple spreadsheets to ultrasophisticated data mining packages leveraged by teams employing \u201crocket-science\u201d mathematics.<\/p>\r\n\r\n<div id=\"fwk-38086-ch11_s06_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Query and Reporting Tools<\/h2>\r\n<p id=\"fwk-38086-ch11_s06_s01_p01\" class=\"nonindent para editable block\">The idea behind query and reporting tools is to present users with a subset of requested data, selected, sorted, ordered, calculated, and compared, as needed. Managers use these tools to see and explore what\u2019s happening inside their organizations.<\/p>\r\n<p id=\"fwk-38086-ch11_s06_s01_p02\" class=\"indent para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Canned reports<\/a><\/span> provide regular summaries of information in a predetermined format. They\u2019re often developed by information systems staff and formats can be difficult to alter. By contrast, <span class=\"margin_term\"><a class=\"glossterm\">ad hoc reporting tools<\/a><\/span> allow users to dive in and create their own reports, selecting fields, ranges, and other parameters to build their own reports on the fly. <span class=\"margin_term\"><a class=\"glossterm\">Dashboards<\/a><\/span> provide a sort of heads-up display of critical indicators, letting managers get a graphical glance at key performance metrics. Some tools may allow data to be exported into spreadsheets. Yes, even the lowly spreadsheet can be a powerful tool for modeling \u201cwhat if\u201d scenarios and creating additional reports (of course be careful: if data can be easily exported, then it can potentially leave the firm dangerously exposed, raising privacy, security, legal, and competitive concerns).<\/p>\r\n\r\n<div style=\"text-align: center; font-size: .8em; max-width: 497px;\">\r\n<p class=\"nonindent title\"><span class=\"title-prefix\">Figure 11.3<\/span> The Federal IT Dashboard<\/p>\r\n<p class=\"indent\"><a>\r\n<img style=\"max-width: 497px;\" src=\"https:\/\/pressbooks.ccconline.org\/wp-content\/uploads\/sites\/324\/2018\/06\/05c640d7cac55a99b340752ad8dede47.jpg\" alt=\"The Federal IT Dashboard website screen shot\" \/>\r\n<\/a><\/p>\r\n<p class=\"indent para\">The Federal IT dashboard offers federal agencies, and the general public, information about the government\u2019s IT investments.<\/p>\r\n\r\n<\/div>\r\n<p id=\"fwk-38086-ch11_s06_s01_p03\" class=\"indent para editable block\">A subcategory of reporting tools is referred to as <span class=\"margin_term\"><a class=\"glossterm\">online analytical processing (OLAP)<\/a><\/span> (pronounced \u201coh-lap\u201d). Data used in OLAP reporting is usually sourced from standard relational databases, but it\u2019s calculated and summarized in advance, across multiple dimensions, with the data stored in a special database called a <span class=\"margin_term\"><a class=\"glossterm\">data cube<\/a><\/span>. This extra setup step makes OLAP fast (sometimes one thousand times faster than performing comparable queries against conventional relational databases). Given this kind of speed boost, it\u2019s not surprising that data cubes for OLAP access are often part of a firm\u2019s data mart and data warehouse efforts.<\/p>\r\n<p id=\"fwk-38086-ch11_s06_s01_p04\" class=\"indent para editable block\">A manager using an OLAP tool can quickly explore and compare data across multiple factors such as time, geography, product lines, and so on. In fact, OLAP users often talk about how they can \u201cslice and dice\u201d their data, \u201cdrilling down\u201d inside the data to uncover new insights. And while conventional reports are usually presented as a summarized list of information, OLAP results look more like a spreadsheet, with the various dimensions of analysis in rows and columns, with summary values at the intersection.<\/p>\r\n\r\n<div id=\"fwk-38086-ch11_s06_s01_n01\" class=\"bcc-box bcc-highlight\">\r\n<div class=\"textbox shaded\">\r\n<h4 class=\"title\">Public Sector Reporting Tools in Action: Fighting Crime and Fighting Waste<\/h4>\r\n<p id=\"fwk-38086-ch11_s06_s01_p05\" class=\"nonindent para\">Access to ad hoc query and reporting tools can empower all sorts of workers. Consider what analytics tools have done for the police force in Richmond, Virginia. The city provides department investigators with access to data from internal sources such as 911 logs and police reports, and combines this with outside data including neighborhood demographics, payday schedules, weather reports, traffic patterns, sports events, and more.<\/p>\r\n<p id=\"fwk-38086-ch11_s06_s01_p06\" class=\"indent para\">Experienced officers dive into this data, exploring when and where crimes occur. These insights help the department decide how to allocate its limited policing assets to achieve the biggest impact. While IT staffers put the system together, the tools are actually used by officers with expertise in fighting street crime\u2014the kinds of users with the knowledge to hunt down trends and interpret the causes behind the data. And it seems this data helps make smart cops even smarter\u2014the system is credited with delivering a single-year crime-rate reduction of 20 percent (Lohr, 2007).<\/p>\r\n<p id=\"fwk-38086-ch11_s06_s01_p07\" class=\"indent para\">As it turns out, what works for cops also works for bureaucrats. When administrators for Albuquerque were given access to ad hoc reporting systems, they uncovered all sorts of anomalies, prompting excess spending cuts on everything from cell phone usage to unnecessarily scheduled overtime. And once again, BI performed for the public sector. The Albuquerque system delivered the equivalent of $2 million in savings in just the first three weeks it was used (Mulcahy, 2007).<\/p>\r\n\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<\/div>\r\n<div id=\"fwk-38086-ch11_s06_s02\" class=\"section\">\r\n<h2 class=\"title editable block\">Data Mining<\/h2>\r\n<p id=\"fwk-38086-ch11_s06_s02_p01\" class=\"nonindent para editable block\">While reporting tools can help users explore data, modern data sets can be so large that it might be impossible for humans to spot underlying trends. That\u2019s where data mining can help. <span class=\"margin_term\"><a class=\"glossterm\">Data mining<\/a><\/span> is the process of using computers to identify hidden patterns and to build models from large data sets.<\/p>\r\n<p id=\"fwk-38086-ch11_s06_s02_p02\" class=\"indent para editable block\">Some of the key areas where businesses are leveraging data mining include the following:<\/p>\r\n\r\n<ul id=\"fwk-38086-ch11_s06_s02_l01\" class=\"itemizedlist editable block\">\r\n \t<li><em class=\"emphasis\">Customer segmentation<\/em>\u2014figuring out which customers are likely to be the most valuable to a firm.<\/li>\r\n \t<li><em class=\"emphasis\">Marketing and promotion targeting<\/em>\u2014identifying which customers will respond to which offers at which price at what time.<\/li>\r\n \t<li><em class=\"emphasis\">Market basket analysis<\/em>\u2014determining which products customers buy together, and how an organization can use this information to cross-sell more products or services.<\/li>\r\n \t<li><em class=\"emphasis\">Collaborative filtering<\/em>\u2014personalizing an individual customer\u2019s experience based on the trends and preferences identified across similar customers.<\/li>\r\n \t<li><em class=\"emphasis\">Customer churn<\/em>\u2014determining which customers are likely to leave, and what tactics can help the firm avoid unwanted defections.<\/li>\r\n \t<li><em class=\"emphasis\">Fraud detection<\/em>\u2014uncovering patterns consistent with criminal activity.<\/li>\r\n \t<li><em class=\"emphasis\">Financial modeling<\/em>\u2014building trading systems to capitalize on historical trends.<\/li>\r\n \t<li><em class=\"emphasis\">Hiring and promotion<\/em>\u2014identifying characteristics consistent with employee success in the firm\u2019s various roles.<\/li>\r\n<\/ul>\r\n<p id=\"fwk-38086-ch11_s06_s02_p03\" class=\"indent para editable block\">For data mining to work, two critical conditions need to be present: (1) the organization must have clean, consistent data, and (2) the events in that data should reflect current and future trends. The recent financial crisis provides lessons on what can happen when either of these conditions isn\u2019t met.<\/p>\r\n<p id=\"fwk-38086-ch11_s06_s02_p04\" class=\"indent para editable block\">First lets look at problems with using bad data. A report in the <em class=\"emphasis\">New York Times<\/em> has suggested that in the period leading up to the 2008 financial crisis, some banking executives deliberately deceived risk management systems in order to skew capital-on-hand requirements. This deception let firms load up on risky debt, while carrying less cash for covering losses (Hansell, 2008). Deceive your systems with bad data and your models are worthless. In this case, wrong estimates from bad data left firms grossly overexposed to risk. When debt defaults occurred; several banks failed, and we entered the worst financial crisis since the Great Depression.<\/p>\r\n<p id=\"fwk-38086-ch11_s06_s02_p05\" class=\"indent para editable block\">Now consider the problem of historical consistency: Computer-driven investment models can be very effective when the market behaves as it has in the past. But models are blind when faced with the equivalent of the \u201chundred-year flood\u201d (sometimes called <em class=\"emphasis\">black swans<\/em>); events so extreme and unusual that they never showed up in the data used to build the model.<\/p>\r\n<p id=\"fwk-38086-ch11_s06_s02_p06\" class=\"indent para editable block\">We saw this in the late 1990s with the collapse of the investment firm Long Term Capital Management. LTCM was started by Nobel Prize\u2013winning economists, but when an unexpected Russian debt crisis caused the markets to move in ways not anticipated by its models, the firm lost 90 percent of its value in less than two months. The problem was so bad that the Fed had to step in to supervise the firm\u2019s multibillion-dollar bailout. Fast forward a decade to the banking collapse of 2008, and we again see computer-driven trading funds plummet in the face of another unexpected event\u2014the burst of the housing bubble (Wahba, 2008).<\/p>\r\n<p id=\"fwk-38086-ch11_s06_s02_p07\" class=\"indent para editable block\">Data mining presents a host of other perils, as well. It\u2019s possible to <span class=\"margin_term\"><a class=\"glossterm\">over-engineer<\/a><\/span> a model, building it with so many variables that the solution arrived at might only work on the subset of data you\u2019ve used to create it. You might also be looking at a random but meaningless statistical fluke. In demonstrating how flukes occur, one quantitative investment manager uncovered a correlation that at first glance appeared statistically to be a particularly strong predictor for historical prices in the S&amp;P 500 stock index. That predictor? Butter production in Bangladesh (Coy, 1997). Sometimes durable and useful patterns just aren\u2019t in your data.<\/p>\r\n<p id=\"fwk-38086-ch11_s06_s02_p08\" class=\"indent para editable block\">One way to test to see if you\u2019re looking at a random occurrence in the numbers is to divide your data, building your model with one portion of the data, and using another portion to verify your results. This is the approach Netflix has used to test results achieved by teams in the Netflix Prize, the firm\u2019s million-dollar contest for improving the predictive accuracy of its movie recommendation engine (see <a class=\"xref\" href=\"part-004-chapter-4-netflix-the-making-of-an-e-commerce-giant-and-the-uncertain-future-of-atoms-to-bits.html\">Chapter 4 \u201cNetflix: The Making of an E-commerce Giant and the Uncertain Future of Atoms to Bits\u201d<\/a>).<\/p>\r\n<p id=\"fwk-38086-ch11_s06_s02_p09\" class=\"indent para editable block\">Finally, sometimes a pattern is uncovered but determining the best choice for a response is less clear. As an example, let\u2019s return to the data-mining wizards at Tesco. An analysis of product sales data showed several money-losing products, including a type of bread known as \u201cmilk loaf.\u201d Drop those products, right? Not so fast. Further analysis showed milk loaf was a \u201cdestination product\u201d for a loyal group of high-value customers, and that these customers would shop elsewhere if milk loaf disappeared from Tesco shelves. The firm kept the bread as a loss-leader and retained those valuable milk loaf fans (Helm, 2008). Data miner, beware\u2014first findings don\u2019t always reveal an optimal course of action.<\/p>\r\n<p id=\"fwk-38086-ch11_s06_s02_p10\" class=\"indent para editable block\">This last example underscores the importance of recruiting a data mining and business analytics team that possesses three critical skills: information technology (for understanding how to pull together data, and for selecting analysis tools), statistics (for building models and interpreting the strength and validity of results), and business knowledge (for helping set system goals, requirements, and offering deeper insight into what the data really says about the firm\u2019s operating environment). Miss one of these key functions and your team could make some major mistakes.<\/p>\r\n<p id=\"fwk-38086-ch11_s06_s02_p11\" class=\"indent para editable block\">While we\u2019ve focused on tools in our discussion above, many experts suggest that business intelligence is really an organizational process as much as it is a set of technologies. Having the right team is critical in moving the firm from goal setting through execution and results.<\/p>\r\n\r\n<div id=\"fwk-38086-ch11_s06_s02_n01\" class=\"bcc-box bcc-highlight\">\r\n<div class=\"textbox shaded\">\r\n<h4 class=\"title\">Artificial Intelligence<\/h4>\r\n<p id=\"fwk-38086-ch11_s06_s02_p12\" class=\"nonindent para\">Data mining has its roots in a branch of computer science known as artificial intelligence (or AI). The goal of AI is create computer programs that are able to mimic or improve upon functions of the human brain. Data mining can leverage <span class=\"margin_term\"><a class=\"glossterm\">neural networks<\/a><\/span> or other advanced algorithms and statistical techniques to hunt down and expose patterns, and build models to exploit findings.<\/p>\r\n<p id=\"fwk-38086-ch11_s06_s02_p13\" class=\"indent para\"><span class=\"margin_term\"><a class=\"glossterm\">Expert systems<\/a><\/span> are AI systems that leverage rules or examples to perform a task in a way that mimics applied human expertise. Expert systems are used in tasks ranging from medical diagnoses to product configuration.<\/p>\r\n<p id=\"fwk-38086-ch11_s06_s02_p14\" class=\"indent para\"><span class=\"margin_term\"><a class=\"glossterm\">Genetic algorithms<\/a><\/span> are model building techniques where computers examine many potential solutions to a problem, iteratively modifying (mutating) various mathematical models, and comparing the mutated models to search for a best alternative. Genetic algorithms have been used to build everything from financial trading models to handling complex airport scheduling, to designing parts for the international space station<sup>1<\/sup> (McKay, 2009).<\/p>\r\n<p id=\"fwk-38086-ch11_s06_s02_p15\" class=\"indent para\">While AI is not a single technology, and not directly related to data creation, various forms of AI can show up as part of analytics products, CRM tools, transaction processing systems, and other information systems.<\/p>\r\n\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<div id=\"fwk-38086-ch11_s06_s02_n02\" class=\"bcc-box bcc-success\">\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Key Takeaways<\/span><\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul id=\"fwk-38086-ch11_s06_s02_l02\" class=\"itemizedlist\">\r\n \t<li>Canned and ad hoc reports, digital dashboards, and OLAP are all used to transform data into information.<\/li>\r\n \t<li>OLAP reporting leverage data cubes, which take data from standard relational databases, calculating and summarizing data for superfast reporting access. OLAP tools can present results through multidimensional graphs, or via spreadsheet-style cross-tab reports.<\/li>\r\n \t<li>Modern data sets can be so large that it might be impossible for humans to spot underlying trends without the use of data mining tools.<\/li>\r\n \t<li>Businesses are using data mining to address issues in several key areas including customer segmentation, marketing and promotion targeting, collaborative filtering, and so on.<\/li>\r\n \t<li>Models influenced by bad data, missing or incomplete historical data, and over-engineering are prone to yield bad results.<\/li>\r\n \t<li>One way to test to see if you\u2019re looking at a random occurrence in your data is to divide your data, building your model with one portion of the data, and using another portion to verify your results.<\/li>\r\n \t<li>Analytics may not always provide the total solution for a problem. Sometimes a pattern is uncovered, but determining the best choice for a response is less clear.<\/li>\r\n \t<li>A competent business analytics team should possess three critical skills: information technology, statistics, and business knowledge.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<div id=\"fwk-38086-ch11_s06_s02_n03\" class=\"bcc-box bcc-info\">\r\n<div class=\"textbox textbox--exercises\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Questions and Exercises<\/span><\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ol id=\"fwk-38086-ch11_s06_s02_l03\" class=\"orderedlist\">\r\n \t<li>What are some of the tools used to convert data into information?<\/li>\r\n \t<li>What is the difference between a canned reports and an ad hoc reporting?<\/li>\r\n \t<li>How do reports created by OLAP differ from most conventional reports?<\/li>\r\n \t<li>List the key areas where businesses are leveraging data mining.<\/li>\r\n \t<li>What is market basket analysis?<\/li>\r\n \t<li>What is customer churn?<\/li>\r\n \t<li>For data mining to work, what two critical data-related conditions must be present?<\/li>\r\n \t<li>Discus occurrences of model failure caused by missing or incomplete historical data.<\/li>\r\n \t<li>Discuss Tesco\u2019s response to their discovery that \u201cmilk loaf\u201d was a money-losing product.<\/li>\r\n \t<li>List the three critical skills a competent business analytics team should possess.<\/li>\r\n \t<li>Do any of the products that you use leverage artificial intelligence? What kinds of AI might be used in Netflix\u2019s movie recommendation system, Apple\u2019s iTunes Genius playlist builder, or Amazon\u2019s Web site personalization? What kind of AI might help a physician make a diagnosis or help an engineer configure a complicated product in the field?<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<\/div>\r\n<p class=\"indent\"><sup>1<\/sup>Adapted from J. Kahn, \u201cIt\u2019s Alive,\u201d <em class=\"emphasis\">Wired<\/em>, March 2002; O. Port, \u201cThinking Machines,\u201d <em class=\"emphasis\">BusinessWeek<\/em>, August 7, 2000.<\/p>\r\n\r\n<h2>References<\/h2>\r\n<p class=\"nonindent\">Coy, P., \u201cHe Who Mines Data May Strike Fool\u2019s Gold,\u201d <em class=\"emphasis\">BusinessWeek<\/em>, June 16, 1997.<\/p>\r\n<p class=\"indent\">Hansell, S., \u201cHow Wall Street Lied to Its Computers,\u201d <em class=\"emphasis\">New York Times<\/em>, September 18, 2008.<\/p>\r\n<p class=\"indent\">Helm, B., \u201cGetting Inside the Customer\u2019s Mind,\u201d <em class=\"emphasis\">BusinessWeek<\/em>, September 11, 2008.<\/p>\r\n<p class=\"indent\">Lohr, S., \u201cReaping Results: Data-Mining Goes Mainstream,\u201d <em class=\"emphasis\">New York Times<\/em>, May 20, 2007.<\/p>\r\n<p class=\"indent\">McKay, L., \u201cDecisions, Decisions,\u201d <em class=\"emphasis\">CRM Magazine<\/em>, May 1, 2009.<\/p>\r\n<p class=\"indent\">Mulcahy, R., \u201cABC: An Introduction to Business Intelligence,\u201d <em class=\"emphasis\">CIO<\/em>, March 6, 2007.<\/p>\r\n<p class=\"indent\">Wahba, P., \u201cBuffeted \u2018Quants\u2019 Are Still in Demand,\u201d <em class=\"emphasis\">Reuters<\/em>, December 22, 2008.<\/p>\r\n\r\n<\/div>\r\n<\/div>","rendered":"<div id=\"slug-11-6-the-business-intelligence-toolkit\" class=\"chapter standard\">\n<div class=\"ugc chapter-ugc\">\n<div id=\"fwk-38086-ch11_s06_n01\" class=\"bcc-box bcc-highlight\">\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Learning Objectives<\/span><\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p id=\"fwk-38086-ch11_s06_p01\" class=\"nonindent para\">After studying this section you should be able to do the following:<\/p>\n<ol id=\"fwk-38086-ch11_s06_l01\" class=\"orderedlist\">\n<li>Know the tools that are available to turn data into information.<\/li>\n<li>Identify the key areas where businesses leverage data mining.<\/li>\n<li>Understand some of the conditions under which analytical models can fail.<\/li>\n<li>Recognize major categories of artificial intelligence and understand how organizations are leveraging this technology.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<p id=\"fwk-38086-ch11_s06_p02\" class=\"nonindent para editable block\">So far we\u2019ve discussed where data can come from, and how we can get data into a form where we can use it. But how, exactly, do firms turn that data into information? That\u2019s where the various software tools of business intelligence (BI) and analytics come in. Potential products in the business intelligence toolkit range from simple spreadsheets to ultrasophisticated data mining packages leveraged by teams employing \u201crocket-science\u201d mathematics.<\/p>\n<div id=\"fwk-38086-ch11_s06_s01\" class=\"section\">\n<h2 class=\"title editable block\">Query and Reporting Tools<\/h2>\n<p id=\"fwk-38086-ch11_s06_s01_p01\" class=\"nonindent para editable block\">The idea behind query and reporting tools is to present users with a subset of requested data, selected, sorted, ordered, calculated, and compared, as needed. Managers use these tools to see and explore what\u2019s happening inside their organizations.<\/p>\n<p id=\"fwk-38086-ch11_s06_s01_p02\" class=\"indent para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Canned reports<\/a><\/span> provide regular summaries of information in a predetermined format. They\u2019re often developed by information systems staff and formats can be difficult to alter. By contrast, <span class=\"margin_term\"><a class=\"glossterm\">ad hoc reporting tools<\/a><\/span> allow users to dive in and create their own reports, selecting fields, ranges, and other parameters to build their own reports on the fly. <span class=\"margin_term\"><a class=\"glossterm\">Dashboards<\/a><\/span> provide a sort of heads-up display of critical indicators, letting managers get a graphical glance at key performance metrics. Some tools may allow data to be exported into spreadsheets. Yes, even the lowly spreadsheet can be a powerful tool for modeling \u201cwhat if\u201d scenarios and creating additional reports (of course be careful: if data can be easily exported, then it can potentially leave the firm dangerously exposed, raising privacy, security, legal, and competitive concerns).<\/p>\n<div style=\"text-align: center; font-size: .8em; max-width: 497px;\">\n<p class=\"nonindent title\"><span class=\"title-prefix\">Figure 11.3<\/span> The Federal IT Dashboard<\/p>\n<p class=\"indent\"><a><br \/>\n<img decoding=\"async\" style=\"max-width: 497px;\" src=\"https:\/\/pressbooks.ccconline.org\/wp-content\/uploads\/sites\/324\/2018\/06\/05c640d7cac55a99b340752ad8dede47.jpg\" alt=\"The Federal IT Dashboard website screen shot\" \/><br \/>\n<\/a><\/p>\n<p class=\"indent para\">The Federal IT dashboard offers federal agencies, and the general public, information about the government\u2019s IT investments.<\/p>\n<\/div>\n<p id=\"fwk-38086-ch11_s06_s01_p03\" class=\"indent para editable block\">A subcategory of reporting tools is referred to as <span class=\"margin_term\"><a class=\"glossterm\">online analytical processing (OLAP)<\/a><\/span> (pronounced \u201coh-lap\u201d). Data used in OLAP reporting is usually sourced from standard relational databases, but it\u2019s calculated and summarized in advance, across multiple dimensions, with the data stored in a special database called a <span class=\"margin_term\"><a class=\"glossterm\">data cube<\/a><\/span>. This extra setup step makes OLAP fast (sometimes one thousand times faster than performing comparable queries against conventional relational databases). Given this kind of speed boost, it\u2019s not surprising that data cubes for OLAP access are often part of a firm\u2019s data mart and data warehouse efforts.<\/p>\n<p id=\"fwk-38086-ch11_s06_s01_p04\" class=\"indent para editable block\">A manager using an OLAP tool can quickly explore and compare data across multiple factors such as time, geography, product lines, and so on. In fact, OLAP users often talk about how they can \u201cslice and dice\u201d their data, \u201cdrilling down\u201d inside the data to uncover new insights. And while conventional reports are usually presented as a summarized list of information, OLAP results look more like a spreadsheet, with the various dimensions of analysis in rows and columns, with summary values at the intersection.<\/p>\n<div id=\"fwk-38086-ch11_s06_s01_n01\" class=\"bcc-box bcc-highlight\">\n<div class=\"textbox shaded\">\n<h4 class=\"title\">Public Sector Reporting Tools in Action: Fighting Crime and Fighting Waste<\/h4>\n<p id=\"fwk-38086-ch11_s06_s01_p05\" class=\"nonindent para\">Access to ad hoc query and reporting tools can empower all sorts of workers. Consider what analytics tools have done for the police force in Richmond, Virginia. The city provides department investigators with access to data from internal sources such as 911 logs and police reports, and combines this with outside data including neighborhood demographics, payday schedules, weather reports, traffic patterns, sports events, and more.<\/p>\n<p id=\"fwk-38086-ch11_s06_s01_p06\" class=\"indent para\">Experienced officers dive into this data, exploring when and where crimes occur. These insights help the department decide how to allocate its limited policing assets to achieve the biggest impact. While IT staffers put the system together, the tools are actually used by officers with expertise in fighting street crime\u2014the kinds of users with the knowledge to hunt down trends and interpret the causes behind the data. And it seems this data helps make smart cops even smarter\u2014the system is credited with delivering a single-year crime-rate reduction of 20 percent (Lohr, 2007).<\/p>\n<p id=\"fwk-38086-ch11_s06_s01_p07\" class=\"indent para\">As it turns out, what works for cops also works for bureaucrats. When administrators for Albuquerque were given access to ad hoc reporting systems, they uncovered all sorts of anomalies, prompting excess spending cuts on everything from cell phone usage to unnecessarily scheduled overtime. And once again, BI performed for the public sector. The Albuquerque system delivered the equivalent of $2 million in savings in just the first three weeks it was used (Mulcahy, 2007).<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<div id=\"fwk-38086-ch11_s06_s02\" class=\"section\">\n<h2 class=\"title editable block\">Data Mining<\/h2>\n<p id=\"fwk-38086-ch11_s06_s02_p01\" class=\"nonindent para editable block\">While reporting tools can help users explore data, modern data sets can be so large that it might be impossible for humans to spot underlying trends. That\u2019s where data mining can help. <span class=\"margin_term\"><a class=\"glossterm\">Data mining<\/a><\/span> is the process of using computers to identify hidden patterns and to build models from large data sets.<\/p>\n<p id=\"fwk-38086-ch11_s06_s02_p02\" class=\"indent para editable block\">Some of the key areas where businesses are leveraging data mining include the following:<\/p>\n<ul id=\"fwk-38086-ch11_s06_s02_l01\" class=\"itemizedlist editable block\">\n<li><em class=\"emphasis\">Customer segmentation<\/em>\u2014figuring out which customers are likely to be the most valuable to a firm.<\/li>\n<li><em class=\"emphasis\">Marketing and promotion targeting<\/em>\u2014identifying which customers will respond to which offers at which price at what time.<\/li>\n<li><em class=\"emphasis\">Market basket analysis<\/em>\u2014determining which products customers buy together, and how an organization can use this information to cross-sell more products or services.<\/li>\n<li><em class=\"emphasis\">Collaborative filtering<\/em>\u2014personalizing an individual customer\u2019s experience based on the trends and preferences identified across similar customers.<\/li>\n<li><em class=\"emphasis\">Customer churn<\/em>\u2014determining which customers are likely to leave, and what tactics can help the firm avoid unwanted defections.<\/li>\n<li><em class=\"emphasis\">Fraud detection<\/em>\u2014uncovering patterns consistent with criminal activity.<\/li>\n<li><em class=\"emphasis\">Financial modeling<\/em>\u2014building trading systems to capitalize on historical trends.<\/li>\n<li><em class=\"emphasis\">Hiring and promotion<\/em>\u2014identifying characteristics consistent with employee success in the firm\u2019s various roles.<\/li>\n<\/ul>\n<p id=\"fwk-38086-ch11_s06_s02_p03\" class=\"indent para editable block\">For data mining to work, two critical conditions need to be present: (1) the organization must have clean, consistent data, and (2) the events in that data should reflect current and future trends. The recent financial crisis provides lessons on what can happen when either of these conditions isn\u2019t met.<\/p>\n<p id=\"fwk-38086-ch11_s06_s02_p04\" class=\"indent para editable block\">First lets look at problems with using bad data. A report in the <em class=\"emphasis\">New York Times<\/em> has suggested that in the period leading up to the 2008 financial crisis, some banking executives deliberately deceived risk management systems in order to skew capital-on-hand requirements. This deception let firms load up on risky debt, while carrying less cash for covering losses (Hansell, 2008). Deceive your systems with bad data and your models are worthless. In this case, wrong estimates from bad data left firms grossly overexposed to risk. When debt defaults occurred; several banks failed, and we entered the worst financial crisis since the Great Depression.<\/p>\n<p id=\"fwk-38086-ch11_s06_s02_p05\" class=\"indent para editable block\">Now consider the problem of historical consistency: Computer-driven investment models can be very effective when the market behaves as it has in the past. But models are blind when faced with the equivalent of the \u201chundred-year flood\u201d (sometimes called <em class=\"emphasis\">black swans<\/em>); events so extreme and unusual that they never showed up in the data used to build the model.<\/p>\n<p id=\"fwk-38086-ch11_s06_s02_p06\" class=\"indent para editable block\">We saw this in the late 1990s with the collapse of the investment firm Long Term Capital Management. LTCM was started by Nobel Prize\u2013winning economists, but when an unexpected Russian debt crisis caused the markets to move in ways not anticipated by its models, the firm lost 90 percent of its value in less than two months. The problem was so bad that the Fed had to step in to supervise the firm\u2019s multibillion-dollar bailout. Fast forward a decade to the banking collapse of 2008, and we again see computer-driven trading funds plummet in the face of another unexpected event\u2014the burst of the housing bubble (Wahba, 2008).<\/p>\n<p id=\"fwk-38086-ch11_s06_s02_p07\" class=\"indent para editable block\">Data mining presents a host of other perils, as well. It\u2019s possible to <span class=\"margin_term\"><a class=\"glossterm\">over-engineer<\/a><\/span> a model, building it with so many variables that the solution arrived at might only work on the subset of data you\u2019ve used to create it. You might also be looking at a random but meaningless statistical fluke. In demonstrating how flukes occur, one quantitative investment manager uncovered a correlation that at first glance appeared statistically to be a particularly strong predictor for historical prices in the S&amp;P 500 stock index. That predictor? Butter production in Bangladesh (Coy, 1997). Sometimes durable and useful patterns just aren\u2019t in your data.<\/p>\n<p id=\"fwk-38086-ch11_s06_s02_p08\" class=\"indent para editable block\">One way to test to see if you\u2019re looking at a random occurrence in the numbers is to divide your data, building your model with one portion of the data, and using another portion to verify your results. This is the approach Netflix has used to test results achieved by teams in the Netflix Prize, the firm\u2019s million-dollar contest for improving the predictive accuracy of its movie recommendation engine (see <a class=\"xref\" href=\"part-004-chapter-4-netflix-the-making-of-an-e-commerce-giant-and-the-uncertain-future-of-atoms-to-bits.html\">Chapter 4 \u201cNetflix: The Making of an E-commerce Giant and the Uncertain Future of Atoms to Bits\u201d<\/a>).<\/p>\n<p id=\"fwk-38086-ch11_s06_s02_p09\" class=\"indent para editable block\">Finally, sometimes a pattern is uncovered but determining the best choice for a response is less clear. As an example, let\u2019s return to the data-mining wizards at Tesco. An analysis of product sales data showed several money-losing products, including a type of bread known as \u201cmilk loaf.\u201d Drop those products, right? Not so fast. Further analysis showed milk loaf was a \u201cdestination product\u201d for a loyal group of high-value customers, and that these customers would shop elsewhere if milk loaf disappeared from Tesco shelves. The firm kept the bread as a loss-leader and retained those valuable milk loaf fans (Helm, 2008). Data miner, beware\u2014first findings don\u2019t always reveal an optimal course of action.<\/p>\n<p id=\"fwk-38086-ch11_s06_s02_p10\" class=\"indent para editable block\">This last example underscores the importance of recruiting a data mining and business analytics team that possesses three critical skills: information technology (for understanding how to pull together data, and for selecting analysis tools), statistics (for building models and interpreting the strength and validity of results), and business knowledge (for helping set system goals, requirements, and offering deeper insight into what the data really says about the firm\u2019s operating environment). Miss one of these key functions and your team could make some major mistakes.<\/p>\n<p id=\"fwk-38086-ch11_s06_s02_p11\" class=\"indent para editable block\">While we\u2019ve focused on tools in our discussion above, many experts suggest that business intelligence is really an organizational process as much as it is a set of technologies. Having the right team is critical in moving the firm from goal setting through execution and results.<\/p>\n<div id=\"fwk-38086-ch11_s06_s02_n01\" class=\"bcc-box bcc-highlight\">\n<div class=\"textbox shaded\">\n<h4 class=\"title\">Artificial Intelligence<\/h4>\n<p id=\"fwk-38086-ch11_s06_s02_p12\" class=\"nonindent para\">Data mining has its roots in a branch of computer science known as artificial intelligence (or AI). The goal of AI is create computer programs that are able to mimic or improve upon functions of the human brain. Data mining can leverage <span class=\"margin_term\"><a class=\"glossterm\">neural networks<\/a><\/span> or other advanced algorithms and statistical techniques to hunt down and expose patterns, and build models to exploit findings.<\/p>\n<p id=\"fwk-38086-ch11_s06_s02_p13\" class=\"indent para\"><span class=\"margin_term\"><a class=\"glossterm\">Expert systems<\/a><\/span> are AI systems that leverage rules or examples to perform a task in a way that mimics applied human expertise. Expert systems are used in tasks ranging from medical diagnoses to product configuration.<\/p>\n<p id=\"fwk-38086-ch11_s06_s02_p14\" class=\"indent para\"><span class=\"margin_term\"><a class=\"glossterm\">Genetic algorithms<\/a><\/span> are model building techniques where computers examine many potential solutions to a problem, iteratively modifying (mutating) various mathematical models, and comparing the mutated models to search for a best alternative. Genetic algorithms have been used to build everything from financial trading models to handling complex airport scheduling, to designing parts for the international space station<sup>1<\/sup> (McKay, 2009).<\/p>\n<p id=\"fwk-38086-ch11_s06_s02_p15\" class=\"indent para\">While AI is not a single technology, and not directly related to data creation, various forms of AI can show up as part of analytics products, CRM tools, transaction processing systems, and other information systems.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<div id=\"fwk-38086-ch11_s06_s02_n02\" class=\"bcc-box bcc-success\">\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Key Takeaways<\/span><\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul id=\"fwk-38086-ch11_s06_s02_l02\" class=\"itemizedlist\">\n<li>Canned and ad hoc reports, digital dashboards, and OLAP are all used to transform data into information.<\/li>\n<li>OLAP reporting leverage data cubes, which take data from standard relational databases, calculating and summarizing data for superfast reporting access. OLAP tools can present results through multidimensional graphs, or via spreadsheet-style cross-tab reports.<\/li>\n<li>Modern data sets can be so large that it might be impossible for humans to spot underlying trends without the use of data mining tools.<\/li>\n<li>Businesses are using data mining to address issues in several key areas including customer segmentation, marketing and promotion targeting, collaborative filtering, and so on.<\/li>\n<li>Models influenced by bad data, missing or incomplete historical data, and over-engineering are prone to yield bad results.<\/li>\n<li>One way to test to see if you\u2019re looking at a random occurrence in your data is to divide your data, building your model with one portion of the data, and using another portion to verify your results.<\/li>\n<li>Analytics may not always provide the total solution for a problem. Sometimes a pattern is uncovered, but determining the best choice for a response is less clear.<\/li>\n<li>A competent business analytics team should possess three critical skills: information technology, statistics, and business knowledge.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<div id=\"fwk-38086-ch11_s06_s02_n03\" class=\"bcc-box bcc-info\">\n<div class=\"textbox textbox--exercises\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Questions and Exercises<\/span><\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ol id=\"fwk-38086-ch11_s06_s02_l03\" class=\"orderedlist\">\n<li>What are some of the tools used to convert data into information?<\/li>\n<li>What is the difference between a canned reports and an ad hoc reporting?<\/li>\n<li>How do reports created by OLAP differ from most conventional reports?<\/li>\n<li>List the key areas where businesses are leveraging data mining.<\/li>\n<li>What is market basket analysis?<\/li>\n<li>What is customer churn?<\/li>\n<li>For data mining to work, what two critical data-related conditions must be present?<\/li>\n<li>Discus occurrences of model failure caused by missing or incomplete historical data.<\/li>\n<li>Discuss Tesco\u2019s response to their discovery that \u201cmilk loaf\u201d was a money-losing product.<\/li>\n<li>List the three critical skills a competent business analytics team should possess.<\/li>\n<li>Do any of the products that you use leverage artificial intelligence? What kinds of AI might be used in Netflix\u2019s movie recommendation system, Apple\u2019s iTunes Genius playlist builder, or Amazon\u2019s Web site personalization? What kind of AI might help a physician make a diagnosis or help an engineer configure a complicated product in the field?<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<p class=\"indent\"><sup>1<\/sup>Adapted from J. Kahn, \u201cIt\u2019s Alive,\u201d <em class=\"emphasis\">Wired<\/em>, March 2002; O. Port, \u201cThinking Machines,\u201d <em class=\"emphasis\">BusinessWeek<\/em>, August 7, 2000.<\/p>\n<h2>References<\/h2>\n<p class=\"nonindent\">Coy, P., \u201cHe Who Mines Data May Strike Fool\u2019s Gold,\u201d <em class=\"emphasis\">BusinessWeek<\/em>, June 16, 1997.<\/p>\n<p class=\"indent\">Hansell, S., \u201cHow Wall Street Lied to Its Computers,\u201d <em class=\"emphasis\">New York Times<\/em>, September 18, 2008.<\/p>\n<p class=\"indent\">Helm, B., \u201cGetting Inside the Customer\u2019s Mind,\u201d <em class=\"emphasis\">BusinessWeek<\/em>, September 11, 2008.<\/p>\n<p class=\"indent\">Lohr, S., \u201cReaping Results: Data-Mining Goes Mainstream,\u201d <em class=\"emphasis\">New York Times<\/em>, May 20, 2007.<\/p>\n<p class=\"indent\">McKay, L., \u201cDecisions, Decisions,\u201d <em class=\"emphasis\">CRM Magazine<\/em>, May 1, 2009.<\/p>\n<p class=\"indent\">Mulcahy, R., \u201cABC: An Introduction to Business Intelligence,\u201d <em class=\"emphasis\">CIO<\/em>, March 6, 2007.<\/p>\n<p class=\"indent\">Wahba, P., \u201cBuffeted \u2018Quants\u2019 Are Still in Demand,\u201d <em class=\"emphasis\">Reuters<\/em>, December 22, 2008.<\/p>\n<\/div>\n<\/div>\n","protected":false},"author":217,"menu_order":6,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[49],"contributor":[],"license":[],"class_list":["post-203","chapter","type-chapter","status-publish","hentry","chapter-type-numberless"],"part":189,"_links":{"self":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapters\/203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/users\/217"}],"version-history":[{"count":2,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapters\/203\/revisions"}],"predecessor-version":[{"id":393,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapters\/203\/revisions\/393"}],"part":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/parts\/189"}],"metadata":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapters\/203\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/media?parent=203"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapter-type?post=203"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/contributor?post=203"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/license?post=203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}