Knowledge

Data management

Source 📝

897:
to come up with insightful data they can use for strategic decision-making (Baier et al., 2012). In the modern business environment, data has evolved into a crucial asset for businesses since businesses use data as a strategic asset that is used regularly to create a competitive advantage and improve customer experiences. Among the most significant forms of data is customer information which is a critical asset used to assess customer behavior and trends and use it for developing new strategies for improving customer experience (Ahmed, 2004). However, data has to be of high quality to be used as a business asset for creating a competitive advantage. Therefore, data governance is a critical element of data collection and analysis since it determines the quality of data while integrity constraints guarantee the reliability of information collected from data sources. Various technologies including Big Data are used by businesses and organizations to allow users to search for specific information from raw data by grouping it based on the preferred criteria marketing departments in organizations could apply for developing targeted marketing strategies (Ahmed, 2004). As technology evolves, new forms of data are being introduced for analysis and classification purposes in marketing organizations and businesses. The introduction of new gadgets such as Smartphones and new-generation PCs has also introduced new data sources from which organizations can collect, analyze and classify data when developing marketing strategies. Retail businesses are the business category that uses customer data from smart devices and websites to understand how their current and targeted customers perceive their services before using the information to make improvements and increase customer satisfaction (Cerchiello and Guidici, 2012). Analyzing customer data is crucial for businesses since it allows marketing teams to understand customer behavior and trends which makes a considerable difference during the development of new marketing campaigns and strategies. Retailers who use customer data from various sources gain an advantage in the market since they can develop data-informed strategies for attracting and retaining customers in the overly competitive business environment. Based on the information on the benefits of data collection and analysis, the following hypotheses are proposed: The sources of data used as the foundation of data collection and analysis have a considerable impact on the data analysis tools used for analyzing and categorizing data.
910:: volume, variety and velocity. Factor velocity emerged in the 1980s as one of the most important procedures in data analysis tools which was widely used by organizations for market research. The tools used to select core variables from the data that was collected from various sources and analyzed it; if the amount of data used to be too huge for humans to understand via manual observation, factor analysis would be introduced to distinguish between qualitative and quantitative data (Stewart, 1981). Organizations collect data from numerous sources including websites, emails and customer devices before conducting data analysis. Collecting data from numerous sources and analyzing it using different data analysis tools has its advantages, including overcoming the risk of method bias; using data from different sources and analyzing it using multiple analysis methods guarantees businesses and organizations robust and reliable findings they can use in decision making. On the other hand, researchers use modern technologies to analyze and group data collected from respondents in the form of images, audio and video files by applying algorithms and other analysis software Berry et al., 1997). Researchers and marketers can then use the information obtained from the new generation analysis tools and methods for forecasting, decision support and making estimations for decision making. For instance, information from different data sources on demand forecasts can help a retail business determine the amount of stock required in an upcoming season depending on data from previous seasons. The analysis can allow organizations to make data-informed decisions to gain competitive advantage in an era where all businesses and organizations are capitalizing on emerging technologies and business intelligence tools to gain competitive edges. While there are numerous analysis tools in the market, Big Data analytics is the most common and advanced technology that has led to the following hypothesis: Data analytic tools used to analyze data collected from numerous data sources determine the quality and reliability of data analysis. 919:
conducted by PWC indicated that more than two-thirds of retail customers prefer purchasing products and services from businesses that have data protection and privacy plans for protecting customer information. Also, the study indicated that customers trust businesses that can prove they cannot use customer data for any other purposes other than marketing. As technology and the Internet continue improving, the success of businesses using it as a platform for marketing their products will depend on how effectively they can gain and maintain the trust of customers and users. Therefore, businesses will have to introduce and implement effective data protection and privacy strategies to protect business data and customer privacy. Although developing trust between customers and businesses affects the customers’ purchasing intentions, it also has a considerable impact on long-term purchasing behaviors including how frequently customers purchase which could impact the profitability of a business in the long run. Thus, the above information leads to the following hypothesis: Implementing data security and privacy plans has a positive impact on economic and financial outcomes.
928:
collect and analyze data for improved decision-making. Jonsen (2013) explains that organizations using average analytics technologies are 20% more likely to gain higher returns compared to their competitors who have not introduced any analytics capabilities in their operations. Also, IRI reported that the retail industry could experience an increase of more than $ 10 billion each year resulting from the implementation of modern analytics technologies. Therefore, the following hypothesis can be proposed: Economic and financial outcomes can impact how organizations use data analytics tools.
804: 47: 589: 36: 88: 1255: 906:
2004). There are 2 main categories of data analysis tools, data mining tools and data profiling tools. Also, most commercial data analysis tools are used by organizations for extracting, transforming and loading ETL for data warehouses in a manner that ensures no element is left out during the process (Turban et al., 2008). Thus the data analysis tools are used for supporting the 3 Vs in
885:, which refers to the collection and analyses of massive sets of data. While big data is a recent phenomenon, the requirement for data to aid decision-making traces back to the early 1970s with the emergence of decision support systems (DSS). These systems can be considered as the initial iteration of data management for decision support. 896:
Marketers and marketing organizations have been using data collection and analysis to refine their operations for the last few decades. Marketing departments in organizations and marketing companies conduct data collection and analysis by collecting data from different data sources and analyzing them
927:
Studies indicate that customer transactions account for a 40% increase in the data collected annually, which means that financial data has a considerable impact on business decisions. Therefore, modern organizations are using big data analytics to identify 5 to 10 new data sources that can help them
905:
Organizations use various data analysis tools for discovering unknown information and insights from huge databases; this allows organizations to discover new patterns that were not known to them or extract buried information before using it to come up with new patterns and relationships (Ahmed,
918:
While organizations need to use quality data collection and analysis tools to guarantee the quality and reliability of the customer data they collect, they must implement security and privacy strategies to protect the data and customer information from privacy leaks (Van Till, 2013). A study
214:
technology, those suggesting that data management was more important than business process management used arguments such as "a customer's home address is stored in 75 (or some other large number) places in our computer systems." However, during this period, random access processing was not
1198:
Kumar, Sangeeth; Ramesh, Maneesha Vinodini (2010). "Lightweight Management framework (LMF) for a Heterogeneous Wireless Network for Landslide Detection". In Meghanathan, Natarajan; Boumerdassi, Selma; Chaki, Nabendu; Nagamalai, Dhinaharan (eds.).
1223:
4.4 Data Management Center (DMC) The Data Management Center is the data center for all of the deployed cluster networks. Through the DMC, the LMF allows the user to list the services in any cluster member belonging to any cluster
226:
usage, it became obvious that both management processes were important. If the data was not well defined, the data would be mis-used in applications. If the process wasn't well defined, it was impossible to meet user needs.
880:
processing and renders interpretation implicit. The distinction between data and derived value is illustrated by the information ladder. However, data has staged a comeback with the popularisation of the term
835: 1202:
Recent Trends in Networks and Communications: International Conferences, NeCoM 2010, WiMoN 2010, WeST 2010,Chennai, India, July 23-25, 2010. Proceedings
548: 828: 296: 286: 821: 603: 598: 808: 242: 17: 160: 1138: 132: 643: 139: 1210: 1162: 179: 117: 1259: 109: 1029: 796: 580: 366: 146: 1296: 743: 113: 1024: 259: 1155:
Mastering Cloud-Native Microservices Designing and implementing Cloud-Native Microservices for Next-Gen Apps
215:
competitively fast, so those suggesting "process management" was more important than "data management" used
128: 655: 361: 63: 1265: 988: 192:
The concept of data management arose in the 1980s as technology moved from sequential processing (first
70:
as a valuable resource, it is the practice of managing an organization's data so it can be analyzed for
448: 356: 197: 1054: 1039: 1578: 1380: 1376: 953: 434: 430: 98: 1305: 1100: 958: 351: 102: 1178:
Watson, Hugh J.; Marjanovic, Olivera (2013). "Big Data: The Fourth Data Management Generation".
1407: 1034: 869: 651: 639: 553: 414: 1004: 973: 727: 715: 468: 210:
Since it was now possible to store a discrete fact and quickly access it using random access
153: 1537: 1205:. Communications in Computer and Information Science. Vol. 90. Springer. p. 466. 1014: 993: 888:
Several organisations have established data management centers (DMC) for their operations.
873: 659: 617: 8: 1477: 1462: 1390: 1059: 1019: 739: 635: 621: 516: 501: 1236: 1289: 1049: 1044: 1009: 968: 963: 663: 511: 458: 453: 1467: 1457: 1321: 1206: 1158: 1134: 693: 521: 324: 1417: 1366: 1351: 1331: 1316: 948: 757: 719: 711: 409: 216: 1547: 1482: 1472: 1385: 1356: 1346: 1200: 785: 773: 769: 735: 340: 291: 281: 71: 1557: 1552: 1517: 1497: 1492: 1447: 1422: 1341: 1124: 1064: 983: 849: 781: 777: 558: 543: 538: 533: 491: 482: 419: 301: 251: 1572: 1522: 1512: 1487: 1361: 1326: 1282: 978: 473: 399: 379: 336: 201: 1532: 1527: 1507: 1502: 1432: 1427: 1402: 1395: 1371: 1079: 1074: 731: 723: 528: 394: 389: 312: 307: 204: 193: 1452: 1412: 858: 765: 685: 477: 384: 317: 223: 1069: 372: 211: 1542: 1437: 998: 943: 938: 864: 697: 588: 486: 329: 46: 87: 1336: 907: 882: 877: 689: 681: 506: 761: 35: 1101:"What Is Data Management? Importance & Challenges | Tableau" 1269: 1254: 868:
in a non-technical context. Thus data management has become
1128: 677: 67: 465:
Data warehousing and business intelligence and Analytics
1274: 1237:"Data Mesh: Delivering data-driven value at scale" 922: 27:Disciplines related to managing data as a resource 913: 235:Followings are common data management patterns: 1570: 1177: 222:As application software evolved into real-time, 1290: 829: 1197: 116:. Unsourced material may be challenged and 1297: 1283: 836: 822: 587: 180:Learn how and when to remove this message 243:command query responsibility segregation 426:Data integration and inter-operability 14: 1571: 1180:Business Intelligence Journal; Seattle 900: 1278: 1123: 1001:, a domain-oriented data architecture 114:adding citations to reliable sources 81: 276:Topics in data management include: 24: 1130:Communicating Sequential Processes 25: 1590: 1247: 1253: 803: 802: 345:Database and storage management 219:time as their primary argument. 86: 45: 34: 1133:. Prentice Hall International. 1030:Hierarchical storage management 923:Financial and economic outcomes 891: 581:Library and information science 367:Hierarchical storage management 1229: 1190: 1171: 1147: 1117: 1093: 914:Data security and data privacy 744:Science and technology studies 13: 1: 1086: 1025:Enterprise content management 856:is increasingly replaced by 362:Business continuity planning 7: 989:Data Management Association 931: 230: 10: 1595: 876:. This trend obscures the 449:Document management system 406:Reference and master data 357:Database management system 77: 1312: 1055:Customer data integration 1040:Machine-readable document 271: 1304: 954:Information architecture 708:Interdisciplinary fields 567: 18:Research data management 959:Enterprise architecture 352:Database administration 1035:Information repository 870:information management 652:Information management 640:Collections management 554:Data quality assurance 445:Documents and content 415:Master data management 267:Static content hosting 1005:Computer data storage 974:Controlled vocabulary 728:Documentation science 716:Communication studies 469:Business intelligence 440:Data interoperability 1478:Protection (privacy) 1262:at Wikimedia Commons 1015:Digital preservation 994:Data management plan 874:knowledge management 660:Knowledge management 110:improve this section 66:related to handling 1060:Identity management 1020:Document management 901:Data analysis tools 740:Information science 636:Archives management 575:Part of a series on 517:Metadata publishing 502:Metadata management 1050:System integration 1045:Performance report 1010:Data proliferation 969:Information system 964:Information design 664:Library management 512:Metadata discovery 459:Records management 454:Content management 52:The data lifecycle 1566: 1565: 1558:Wrangling/munging 1408:Format management 1258:Media related to 1140:978-0-13-153271-7 846: 845: 522:Metadata registry 325:Data architecture 256:Materialized view 190: 189: 182: 164: 129:"Data management" 16:(Redirected from 1586: 1299: 1292: 1285: 1276: 1275: 1257: 1241: 1240: 1233: 1227: 1226: 1220: 1219: 1194: 1188: 1187: 1175: 1169: 1168: 1151: 1145: 1144: 1121: 1115: 1114: 1112: 1111: 1097: 949:Pseudonymization 850:management usage 838: 831: 824: 811: 806: 805: 720:Computer science 712:Archival science 591: 572: 571: 410:Data integration 348:Data maintenance 217:batch processing 185: 178: 174: 171: 165: 163: 122: 90: 82: 49: 38: 21: 1594: 1593: 1589: 1588: 1587: 1585: 1584: 1583: 1579:Data management 1569: 1568: 1567: 1562: 1538:Synchronization 1308: 1303: 1266:Data management 1260:Data management 1250: 1245: 1244: 1235: 1234: 1230: 1217: 1215: 1213: 1195: 1191: 1176: 1172: 1165: 1153: 1152: 1148: 1141: 1125:Hoare, C. A. R. 1122: 1118: 1109: 1107: 1105:www.tableau.com 1099: 1098: 1094: 1089: 1084: 934: 925: 916: 903: 894: 842: 801: 789: 788: 755: 747: 746: 736:Library science 709: 701: 700: 675: 667: 666: 648:Data management 633: 625: 624: 615: 570: 565: 549:Data enrichment 429:Data movement ( 292:Data governance 282:Data governance 274: 233: 186: 175: 169: 166: 123: 121: 107: 91: 80: 72:decision making 60:Data management 57: 56: 55: 54: 53: 50: 41: 40: 39: 28: 23: 22: 15: 12: 11: 5: 1592: 1582: 1581: 1564: 1563: 1561: 1560: 1555: 1550: 1545: 1540: 1535: 1530: 1525: 1520: 1515: 1510: 1505: 1500: 1495: 1490: 1485: 1480: 1475: 1470: 1465: 1463:Pre-processing 1460: 1455: 1450: 1445: 1440: 1435: 1430: 1425: 1420: 1415: 1410: 1405: 1400: 1399: 1398: 1393: 1388: 1374: 1369: 1364: 1359: 1354: 1349: 1344: 1339: 1334: 1329: 1324: 1319: 1313: 1310: 1309: 1302: 1301: 1294: 1287: 1279: 1273: 1272: 1263: 1249: 1248:External links 1246: 1243: 1242: 1228: 1211: 1189: 1170: 1163: 1146: 1139: 1116: 1091: 1090: 1088: 1085: 1083: 1082: 1077: 1072: 1067: 1065:Identity theft 1062: 1057: 1052: 1047: 1042: 1037: 1032: 1027: 1022: 1017: 1012: 1007: 1002: 996: 991: 986: 984:Data retention 981: 976: 971: 966: 961: 956: 951: 946: 941: 935: 933: 930: 924: 921: 915: 912: 902: 899: 893: 890: 844: 843: 841: 840: 833: 826: 818: 815: 814: 813: 812: 799: 791: 790: 756: 753: 752: 749: 748: 710: 707: 706: 703: 702: 676: 673: 672: 669: 668: 634: 631: 630: 627: 626: 616: 613: 612: 609: 608: 607: 606: 601: 593: 592: 584: 583: 577: 576: 569: 566: 564: 563: 562: 561: 559:Secondary data 556: 551: 546: 544:Data integrity 541: 539:Data cleansing 536: 534:Data discovery 526: 525: 524: 519: 514: 509: 504: 496: 495: 494: 492:Data analytics 489: 483:Data warehouse 480: 471: 463: 462: 461: 456: 451: 443: 442: 441: 438: 424: 423: 422: 420:Reference data 417: 412: 404: 403: 402: 397: 392: 387: 377: 376: 375: 369: 364: 359: 354: 349: 343: 334: 333: 332: 322: 321: 320: 315: 310: 305: 302:Data custodian 299: 294: 289: 278: 273: 270: 269: 268: 265: 262: 257: 254: 249: 248:Event sourcing 246: 240: 232: 229: 188: 187: 94: 92: 85: 79: 76: 62:comprises all 51: 44: 43: 42: 33: 32: 31: 30: 29: 26: 9: 6: 4: 3: 2: 1591: 1580: 1577: 1576: 1574: 1559: 1556: 1554: 1551: 1549: 1546: 1544: 1541: 1539: 1536: 1534: 1531: 1529: 1526: 1524: 1521: 1519: 1516: 1514: 1511: 1509: 1506: 1504: 1501: 1499: 1496: 1494: 1491: 1489: 1486: 1484: 1481: 1479: 1476: 1474: 1471: 1469: 1466: 1464: 1461: 1459: 1456: 1454: 1451: 1449: 1446: 1444: 1441: 1439: 1436: 1434: 1431: 1429: 1426: 1424: 1421: 1419: 1416: 1414: 1411: 1409: 1406: 1404: 1401: 1397: 1394: 1392: 1389: 1387: 1384: 1383: 1382: 1378: 1375: 1373: 1370: 1368: 1365: 1363: 1360: 1358: 1355: 1353: 1350: 1348: 1345: 1343: 1340: 1338: 1335: 1333: 1330: 1328: 1325: 1323: 1320: 1318: 1315: 1314: 1311: 1307: 1300: 1295: 1293: 1288: 1286: 1281: 1280: 1277: 1271: 1267: 1264: 1261: 1256: 1252: 1251: 1238: 1232: 1225: 1214: 1212:9783642144936 1208: 1204: 1203: 1196:For example: 1193: 1185: 1181: 1174: 1166: 1164:9789355518699 1160: 1156: 1150: 1142: 1136: 1132: 1131: 1126: 1120: 1106: 1102: 1096: 1092: 1081: 1078: 1076: 1073: 1071: 1068: 1066: 1063: 1061: 1058: 1056: 1053: 1051: 1048: 1046: 1043: 1041: 1038: 1036: 1033: 1031: 1028: 1026: 1023: 1021: 1018: 1016: 1013: 1011: 1008: 1006: 1003: 1000: 997: 995: 992: 990: 987: 985: 982: 980: 979:Data curation 977: 975: 972: 970: 967: 965: 962: 960: 957: 955: 952: 950: 947: 945: 942: 940: 937: 936: 929: 920: 911: 909: 898: 889: 886: 884: 879: 875: 871: 867: 866: 861: 860: 855: 851: 839: 834: 832: 827: 825: 820: 819: 817: 816: 810: 800: 798: 795: 794: 793: 792: 787: 783: 779: 775: 771: 767: 763: 759: 751: 750: 745: 741: 737: 733: 729: 725: 721: 717: 713: 705: 704: 699: 695: 691: 687: 683: 679: 671: 670: 665: 661: 657: 653: 649: 645: 641: 637: 629: 628: 623: 619: 611: 610: 605: 602: 600: 597: 596: 595: 594: 590: 586: 585: 582: 579: 578: 574: 573: 560: 557: 555: 552: 550: 547: 545: 542: 540: 537: 535: 532: 531: 530: 527: 523: 520: 518: 515: 513: 510: 508: 505: 503: 500: 499: 497: 493: 490: 488: 484: 481: 479: 475: 474:Data analysis 472: 470: 467: 466: 464: 460: 457: 455: 452: 450: 447: 446: 444: 439: 436: 432: 428: 427: 425: 421: 418: 416: 413: 411: 408: 407: 405: 401: 400:Data security 398: 396: 393: 391: 388: 386: 383: 382: 381: 380:Data security 378: 374: 370: 368: 365: 363: 360: 358: 355: 353: 350: 347: 346: 344: 342: 338: 337:Data modeling 335: 331: 328: 327: 326: 323: 319: 316: 314: 311: 309: 306: 303: 300: 298: 295: 293: 290: 288: 285: 284: 283: 280: 279: 277: 266: 263: 261: 258: 255: 253: 250: 247: 244: 241: 238: 237: 236: 228: 225: 220: 218: 213: 208: 206: 203: 202:random access 199: 198:magnetic tape 195: 194:punched cards 184: 181: 173: 162: 159: 155: 152: 148: 145: 141: 138: 134: 131: –  130: 126: 125:Find sources: 119: 115: 111: 105: 104: 100: 95:This section 93: 89: 84: 83: 75: 73: 69: 65: 61: 48: 37: 19: 1468:Preservation 1458:Philanthropy 1442: 1322:Augmentation 1231: 1222: 1216:. Retrieved 1201: 1192: 1183: 1179: 1173: 1154: 1149: 1129: 1119: 1108:. Retrieved 1104: 1095: 1080:CRM software 1075:ERP software 926: 917: 904: 895: 892:Data sources 887: 863: 857: 853: 847: 732:Epistemology 724:Data science 647: 644:Preservation 529:Data quality 395:Data privacy 390:Data erasure 313:Data subject 308:Data steward 297:Data trustee 275: 234: 221: 209: 191: 176: 167: 157: 150: 143: 136: 124: 108:Please help 96: 59: 58: 1528:Stewardship 1418:Integration 1367:Degradation 1352:Compression 1332:Archaeology 1317:Acquisition 859:information 852:, the term 797:WikiProject 686:Information 656:cataloguing 622:Information 478:data mining 385:Data access 318:Data ethics 304:or guardian 252:Index table 239:Cache-aside 224:interactive 64:disciplines 1548:Validation 1483:Publishing 1473:Processing 1443:Management 1357:Corruption 1347:Collection 1218:2016-06-16 1110:2023-12-04 1087:References 1070:Data theft 848:In modern 373:subsetting 287:Data asset 170:April 2020 140:newspapers 1553:Warehouse 1518:Scrubbing 1498:Retention 1493:Reduction 1448:Migration 1423:Integrity 1391:Transform 1342:Cleansing 1186:(3): 4–8. 1127:(2004) . 999:Data mesh 944:FAIR data 939:Open data 865:knowledge 698:Knowledge 694:Artefacts 690:Documents 618:Libraries 614:Histories 498:Metadata 487:data mart 330:Dataflows 264:Valet key 97:does not 1573:Category 1523:Security 1513:Scraping 1488:Recovery 1362:Curation 1327:Analysis 1157:. 2023. 932:See also 908:Big Data 883:big data 878:raw data 862:or even 809:Category 762:Archival 758:Academic 682:Metadata 674:Curation 604:Glossary 507:Metadata 260:Sharding 231:Patterns 1533:Storage 1508:Science 1503:Quality 1433:Lineage 1428:Library 1403:Farming 1386:Extract 1372:Editing 786:Special 774:Private 599:Outline 205:storage 196:, then 154:scholar 118:removed 103:sources 78:Concept 1453:Mining 1413:Fusion 1270:Curlie 1209:  1161:  1137:  807:  782:School 778:Public 770:Health 341:design 272:Topics 245:(CQRS) 156:  149:  142:  135:  127:  766:Legal 754:Areas 632:Focus 568:Usage 371:Data 200:) to 161:JSTOR 147:books 1543:Type 1438:Loss 1396:Load 1306:Data 1207:ISBN 1159:ISBN 1135:ISBN 854:data 678:Data 658:) - 646:) - 485:and 476:and 339:and 212:disk 133:news 101:any 99:cite 68:data 1381:ELT 1377:ETL 1337:Big 1268:at 872:or 435:ELT 431:ETL 112:by 1575:: 1221:. 1184:18 1182:. 1103:. 784:- 780:- 776:- 772:- 768:- 764:- 760:- 742:- 738:- 734:- 730:- 726:- 722:- 718:- 714:- 696:- 692:- 688:- 684:- 680:- 662:- 650:- 638:- 620:- 433:, 207:. 74:. 1379:/ 1298:e 1291:t 1284:v 1239:. 1224:. 1167:. 1143:. 1113:. 837:e 830:t 823:v 654:( 642:( 437:) 183:) 177:( 172:) 168:( 158:· 151:· 144:· 137:· 120:. 106:. 20:)

Index

Research data management


disciplines
data
decision making

cite
sources
improve this section
adding citations to reliable sources
removed
"Data management"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
punched cards
magnetic tape
random access
storage
disk
batch processing
interactive
command query responsibility segregation
Index table
Sharding
Data governance

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.