DSS600 – Foundations for Business Intelligence – Final Paper
Julia M. Clancy
Saint Joseph’s University
Marvin Hagen
June 26, 2015
Through each assignment that was completed during this course, I continuously reflected back on how the topics related to my company and if the topics were relevant to my specific position or to my company as a whole. It was interesting to identify the difference and to see that even though processes are occurring at a high level and may seem to be directed at a different department, every decision leadership makes affects my role within the organization and enhances how I perform my duties. Looking at my company’s value chain was no different. While there are many factors that feed into
…show more content…
The two main pillars behind CyberSource is being a global payment gateway for its merchants while also providing best in class fraud management for their transactions. The combination offering of these services is what attracts CyberSource customers, it is a one stop shop for their ecommerce business with a name that is highly regarded in the industry. I typically like to sum up our value chain to our merchants in one word: communication. When talking about a virtual value chain, all our raw materials come to us in the form of data. We receive the data that is being sent to us from our customers and for us to properly receive this, both systems must be in communication. The data we receive solely depends on what their systems are ‘communicating’ to us – what information is actually being captured and passed, and how can we use this to our advantage. Our raw data comes from our merchants through sales channels, whether they be web, mobile call center or another platform specific to our customers. As the payment gateway, we then reach out for authorization on the form of payment used, waiting for communication back from the acquiring bank that this is a verified purchase. We then take the data that is delivered along with the payment information, which is the merchant’s customer’s information, and course that through our advanced fraud screening that also includes running it through a unique configuration of profiles and rules. These rules and profiles can be built with more specifications depending on what is being sent by the merchant. Additional information ranging from order source to address type for delivery address allows us to build a stronger strategy to help manage the merchant’s fraud. As the data flows through our gateway and our fraud management tool, it is then led to a decision which it transfers over to the
7.5.3- Identification and traceability- Lynxnet LLC. Warehouse Manager or Lynxnet authorized personnel will check and verify the Pickup Receipt for quantity and Inspect for damage and then sign the Pickup Receipt. A Pickup Receipt form consists of Point of Order number, Vendor, Requestor, Project assignment, date received, and packing slip number. Lynxnet Warehouse Manager will now file the Pickup Receipt and add these items to Lynxnet Accountable Database or Non- Accountable Data base, and then stored in the Lynxnet area of the warehouse, where items are stored in locked, dry, and designated locations. Also items are now stored in label locations and inputted into Lynxnet database.
Are controls in place to restrict Auscred Services staff’s ability to transmit customer personal information outside of Auscred Services? 56. Do we have a way of identifying and managing solicited information versus unsolicited information ? 57.
Any information we receive from you online, is collected through our SSL (Secure Socket Layer), which assures you that this information will be kept on our secure servers, and is not available to any outside party not participating in our marketing programs, or using our marketing tools. Non-Liability: We have no control over the privacy policy of our customers once you provide them with private information directly. This includes third party websites that you may connect with while using one of our websites. We are not responsible for data other companies obtain in this manner. CONSENT
This is a crucial role in generating valuable data for the company because it allows the company to see what is being bought the most and maybe even why. They can collect this data by either purchase made
Payment processing is more crucial than ever when people are ordering online, prepaying for their meals on their phones and buying products on eCommerce restaurant websites. Some restaurants are even requiring deposits, prepayments and premium payments for guaranteeing reservations for prime seats and dining times. Payment processing is a critical issue that influences every aspect of the
Digital banks such as N26, Fidor and atom bank are giving more control to the customer over personal account data because of PSD2 and open banking initiative. According to the PwC Strategy& study on PSD2 88 percent of consumers use third-party providers for online payments, which indicates that there is a large, primed base of customers for other digital banking services. Moreover, 85 percent of the respondents are happy with companies like Amazon and PayPal controlling money transfers as reliably and securely as their banks. This shows us third party providers has earned consumer’s trust, giving an opportunity to fintech’s to expand due their simplicity (Strategyand.pwc.com, 2017). This is because app based banks simply running off a simple smartphone are becoming increasing present and contributing in removing the old, slow fashioned way of banking due to PSD2 and open banking, as now with just a few taps, friends and family can exchange money, track spending, freeze a card and set budgets.
The protocol sets out how e-commerce websites structure the customer information on their checkout forms. This allows accurate and easy inputting of customer information into different website's checkout forms without repeated input of the same data. Billing, shipping and payment information are all examples of the types of information that can be transferred between merchant websites. d.) When conducting business dealings with people with special needs it is first important to understand their needs and requirements and be able to adapt your approach to meet these needs.
This includes information provided at the time of registering an account on our Website, subscribing to any service which we provide, searching our Website, placing an order on our Website, participating in discussion boards or other social media functions on our Website, creating wish lists on our Website, or requesting further services. We may also collect and process information when you enter a competition or promotion, and when you report a problem with our Website. The information you give us may include without limitation your name, postal address, e-mail address, password, telephone number, financial and credit card information, age, occupation, personal description, photograph, product interests and style
Q1. What will be the biggest obstacles faced by the business intelligence implementation as it expands throughout SYSCO? A1. SYSCO had a decentralized IT framework. All the operating companies had the same database and data warehouse but there was no Business Intelligence software in place as a whole for SYSCO.
There are many benefits that the BIS can bring to an organization such as boost productivity, sales and market intelligence, the setting of more accurate and realistic goals, positive return on investments, gain insights into consumer behaviors, operational visibility and identification of key trends (Holley, A. 2015). Recommendations for developing and using the BIS described in this case, include the use of an effective BIS that incorporates different factors or circumstances in the internal and external environment of the organization such as sales, costs, weather, items or services offered by the company, and trends. Another reason to implement BIS is to reduce voluminous amounts of irrelevant data, poor data quality, and user resistance that affect the effectiveness of
2. Digital Commerce Goods and services bought and sold electronically on the internet such as, advertising that supports this, including promotions, prices, obtaining and keeping customers, etc. Technology users need to understand that a large share of market economy is being done electronically (Ribble, 2011) (Gartner, n.d.). 3.
Delivery Address: Here we can view the customer's delivery address with a name, street, city, code, country etc. Account Information: Customer's 'email' and 'account type' (guest account or registered account) can be viewed in this section. Delivery Method: The type of delivery method can be viewed in this section (e.g. free shipping).
ITMB Introduction to Data and Information Morgan Harvey By Husnain Ahmed W17015689 Introduction In this report, I will talk about a selected business and the kinds of data and information that it uses to conduct its business effectively. The business I will be talking about is Apple. As well as talking about the data and information the business collects, I will also be talking about the sector that the business is in, as well as the specific needs of Apple with the certain methods of collecting data that I mention. I will also talk about the kinds of data and information that Apple is likely to need to conduct its business efficiently and effectively and how these might be used within the organisation.
Processing: The relevant case data is digitized ensuring rapid processing, accountability, compliance, auditing and governance apart from easy clean up using standard deduplication and data culling (Arway, 2013; O'Hanley and Tiller, 2014). Review: A review by supply chain security and operations, a management review and a legal review provide the essential feedback and improvements – improved processes for gaylords handling i.e. sealing with tamper-evident tapes (TET), examination of gaylord TET tape at subregion transfer locations, use of TET tape wrappers for plastic bins and verification of tape before delivery. (Arway, 2013; O'Hanley and Tiller, 2014). The initial suggestions of end to end tracking of each parcel was rejected due to cost (ROI) considerations, however peripheral security system improvement requirements were accepted and the action plans were documented (Arway, 2013; O'Hanley and Tiller,
Causes According to Amin & Noor (2013), the E-consumers generally refer to the purchaser of goods and services over electronic systems such as Internet and other computer networks. This new group of consumers is increasing in number over the years as on-line shopping become a trend and manifestation of modern life style. Based from the Paynter & Lim (2001), E-commerce would provide consumers with benefits such as interactive communications, fast delivery, and more customization that would only be available for consumers through online shopping. Product information in the Internet is more compact and it ranges from various sites.