Information security management

Introduction:

This is an annotated bibliography of reports which briefs the importance of business intelligence (BI) in occurring data`s. The most of the reports are based on practical experience and the report proves the importance of business intelligence in this business world. This essay gives a various research and views of different authors based on their true technical knowledge.

Annotated bibliography:
  1. This paper describes about the designing of data warehouse. The main focus of this research is to explain about the open issues in modelling and design of data warehouse. The author tried to differentiate about data warehouse, the data warehouses are mainly focused on decision support rather than transaction support. Information security is a basic requirement for a wide range of applications, in this paper author describes about modelling security along with mining aware design. The author explains detailed about the requirement analysis which plays a key role in data warehousing to reduce the risk of failure. Finally author concluded with improvement in techniques are needed for solving known problems.
  2. This paper describes about the BI accelerator and its main architectural features. The second part of the report describes about usage of BI accelerator in data mining. The author explained about accelerator, which is based on search engine technology and offers comparable performance for both frequently and infrequently required queries. The report gives a brief explanation about the time consumption to extract data in data mining. The final test results suggest that data mining is possible within 60 seconds on business data.
  3. This paper describes about the benefits of customer relationship management (CRM) from service oriented BI infrastructure. The author stats that service based architectures are universally recognized to solve the integration problem. The author gives a brief explanation about enterprise service architecture (ESA) and service-oriented BI in this paper. The final result shows that BI systems are considered to be flexible for querying data.
  4. This paper describes about the purpose of data warehouse. The author suggests that to cope with real time requirements, the data warehouse must be able to enable continuous data integration. In this paper author present a survey on testing most used loading techniques to analyze the best data loading method. To accomplish these techniques, author used table structure replication with minimum content and query predicate restrictions for selecting data. The final results demonstrate the efficiency of executing query workloads by performing continuous data integration.
  5. This paper stats the importance of BI applications in Information systems (IS). This paper also describes experience of author for introducing practical BI projects in business. The main objective of this is to describe the BI components and activities.
  6. This paper describes about the proposal of algebra as the foundation of a common implementation and execution platform for business planning applications. This paper also outlines the major topics involved in the development of algebra.
  7. This paper describes about the importance of star queries, which is most prevalent kind of queries in data warehousing and business intelligence. In this paper author presents a complete abstract processing plan that captures all the necessary steps in evaluating queries. Data warehousing has evolved into a major trend in database technology. Author has also implemented algorithms in commercial Relational database management systems (RDBMS).
  8. This paper describes about requirement of distribution handling in mining queries. The author had developed an adaptive top -n frequent pattern mining that simplifies the mining process on real distributions. Finally the result shows the algorithm running on SAP net weaver BW with standard and real business data sets.
  9. This paper describes about the goal of business intelligence. The main aim of business intelligence is to help organization to improve the efficiency of their business. The author describes about the characteristics of operation BI. The author also presents some key optimization methods that have been successfully implemented in SAP business objects to deal with mega queries.
  10. This paper describes about the business intelligence application in mining information from public sources. This paper also describes about the problems faced in mining.
  11. This paper describes about the tags to generate business intelligence. The author briefs about business intelligence tools, which can be used for analysing large amount of data's. In this paper the author suggests that tags and tag data can produce business intelligence from large amounts of unstructured information. The author also proposed step by step approaches for existing mining and statistical techniques on tags and tag data.
  12. This paper describes about the improvements on business users, this approach is based on integrating data from information systems in the form of business level ontology (BO). The author illustrated the usage of semantic query designer (SQD) upon the BO. Finally author suggests that to enable the business users for making better decisions by increasing effectiveness and efficiency of business process.
  13. This paper describes about the sizing process of database management systems and analysis for characterizing business intelligence workloads. The author indicates that workload characterization can also be used for other administrative tasks such as workload management. The final result indicates a robust approach for sizing the database tier of a BI application.
  14. This paper describes about the identification and measurement of reuse in the requirements conceptualization phase of SAP R/3component configuration cycle. The author introduced two key concepts: SAP requirements reuse levels and reuse indicators. The overall objective of this research is to bridge the gap between reuse metrics and enterprise modelling.
  15. This paper describes about the linking of maps with data query from SAP business information warehouse (BW). In this paper GIS tool called business explorer map (BEx Map) is used for obtaining any report that contains geographic data. The final result shows that BEx map provides easy way of navigating through BW reports.
  16. This paper describes about the difference between e-services and business services. The author also gives a brief explanation about the approach to be handled in describing business services. The final results shows the properties of business service and problem associated with business services.
  17. This paper describes about the business planning. The author tried to argue that business planning as a means to generate plan data and author proposed business planning with an OLAP engine. The final results shows with an example model and author proved the scalability of approach on the SAP business warehouse accelerator.
  18. This paper describes about extending current DBMS to support OLAP. The final result proves that database vendors are not making the impact on the OLAP market. The reasons behind this failure are that DBMS vendors are overlooking in fundamental deficiencies of SQL and the relational model.
  19. This paper gives an overview of the business process infrastructure. The paper also describes about Auto-ID infrastructure with scalability, flexibility and usability. The author shares his practical experience with different pilot projects.
Conclusion:

In conclusion this annotated bibliography gives an overview of business intelligence (BI) applications and its uses in the current business world. The most of the authors argument deals about difficulties in querying a huge data base, and steps to be involved in data mining. But as far as author`s concerned business intelligence tools is the most important application in the real time world to occur data.

  1. S Rizzi ,A Abello, J Lechtenborger ,J Trujillo (2006), Research in data warehouse and modelling and design : dead or alive?, Virginia, USA
  2. T Legler, W Lehner, A Ross (2006), Data mining with the SAP net weaver BI accelerator, Dresden university of technology, Germany
  3. M Dill, A Kraiss, S Sigg, T Zurek (2004), Service oriented BI: towards tight integration of business intelligence into operational applications, Walldorf Germany
  4. R Santos, J Bernardino, Optimizing data warehouse loading procedures for enabling useful time data warehousing, University of Coimbra, Coimbra, Portugal
  5. M Hart (2009), Business intelligence projects in second year information systems courses, University of Cape Town, South Africa
  6. K Eisenreich (2009), towards an algebraic foundation for business planning, SAP Research, Germany
  7. N Karayannidis, A Tsois, T Selli, R Pieringer, V Markl, F Ramsak, R Fenk, K Eihardt, R Bayer (2002), Processing star queries on hierarchically-clustered, Munchen, Germany
  8. T Legler, W Lwhner, J Schaffner (2009), Robust and distributed top-n frequent-pattern mining with SAP BW accelerator, Walldorf, Germany
  9. N Dieu, A Dragusanu, F Fabret, F Llirbat, E Simon (2009), 1000 tables under the from, Levallis, France
  10. A Funk, Y Li, H Saggion, K Bontcheva, C Leibold (2008), Opinion analysis for business intelligence applications, University of Shiffield, UK
  11. C Damme (2008), Approaches to analyse corporate tags for business intelligence purpose, University of Brussels, Belgium
  12. M Spahn, J Kleb, S Grimm, S Scheidl (2008), Supporting business intelligence by providing ontology based end user information self service, University of Karlsruhe, Denmark
  13. T Wasserman, P Martin, D Skillcorn (2004), Developing a characterization of business intelligence workloads for sizing new database systems, Queen`s university Kingston, Canada
  14. M Daneva (1999), Measuring reuse of SAP requirements: a model based approach, Clearnet Communications Inc, Toronto, Canada
  15. K Mohraz (2000), Geographical analysis in SAP business information warehouse, SAP AG, Walldorf, Germany
  16. M Winkler, J Cardoso, G Scheithauer (2008), Challenges of business service monitoring in the internet of services, SAP research, Dresden, Germany
  17. B Jaecksch, W Lehner, F Faerber (2010), A plan for OLAP, SAP research, Walldorf, Germany
  18. J Dittrich, D Kossmann, A Kreutz (2005), Bridging the gap between OLAP and SQL, VLDB conference, Trondheim, Norway
  19. C Bornhovd, T Lin, S Haller, J Schaper (2004), Integrating automatic data acquisition with business processes experience with SAP`s Auto-ID infrastructure, SAP research center ,Karlsruhe, Germany

Please be aware that the free essay that you were just reading was not written by us. This essay, and all of the others available to view on the website, were provided to us by students in exchange for services that we offer. This relationship helps our students to get an even better deal while also contributing to the biggest free essay resource in the UK!