897:
to come up with insightful data they can use for strategic decision-making (Baier et al., 2012). In the modern business environment, data has evolved into a crucial asset for businesses since businesses use data as a strategic asset that is used regularly to create a competitive advantage and improve customer experiences. Among the most significant forms of data is customer information which is a critical asset used to assess customer behavior and trends and use it for developing new strategies for improving customer experience (Ahmed, 2004). However, data has to be of high quality to be used as a business asset for creating a competitive advantage. Therefore, data governance is a critical element of data collection and analysis since it determines the quality of data while integrity constraints guarantee the reliability of information collected from data sources. Various technologies including Big Data are used by businesses and organizations to allow users to search for specific information from raw data by grouping it based on the preferred criteria marketing departments in organizations could apply for developing targeted marketing strategies (Ahmed, 2004). As technology evolves, new forms of data are being introduced for analysis and classification purposes in marketing organizations and businesses. The introduction of new gadgets such as
Smartphones and new-generation PCs has also introduced new data sources from which organizations can collect, analyze and classify data when developing marketing strategies. Retail businesses are the business category that uses customer data from smart devices and websites to understand how their current and targeted customers perceive their services before using the information to make improvements and increase customer satisfaction (Cerchiello and Guidici, 2012). Analyzing customer data is crucial for businesses since it allows marketing teams to understand customer behavior and trends which makes a considerable difference during the development of new marketing campaigns and strategies. Retailers who use customer data from various sources gain an advantage in the market since they can develop data-informed strategies for attracting and retaining customers in the overly competitive business environment. Based on the information on the benefits of data collection and analysis, the following hypotheses are proposed: The sources of data used as the foundation of data collection and analysis have a considerable impact on the data analysis tools used for analyzing and categorizing data.
910:: volume, variety and velocity. Factor velocity emerged in the 1980s as one of the most important procedures in data analysis tools which was widely used by organizations for market research. The tools used to select core variables from the data that was collected from various sources and analyzed it; if the amount of data used to be too huge for humans to understand via manual observation, factor analysis would be introduced to distinguish between qualitative and quantitative data (Stewart, 1981). Organizations collect data from numerous sources including websites, emails and customer devices before conducting data analysis. Collecting data from numerous sources and analyzing it using different data analysis tools has its advantages, including overcoming the risk of method bias; using data from different sources and analyzing it using multiple analysis methods guarantees businesses and organizations robust and reliable findings they can use in decision making. On the other hand, researchers use modern technologies to analyze and group data collected from respondents in the form of images, audio and video files by applying algorithms and other analysis software Berry et al., 1997). Researchers and marketers can then use the information obtained from the new generation analysis tools and methods for forecasting, decision support and making estimations for decision making. For instance, information from different data sources on demand forecasts can help a retail business determine the amount of stock required in an upcoming season depending on data from previous seasons. The analysis can allow organizations to make data-informed decisions to gain competitive advantage in an era where all businesses and organizations are capitalizing on emerging technologies and business intelligence tools to gain competitive edges. While there are numerous analysis tools in the market, Big Data analytics is the most common and advanced technology that has led to the following hypothesis: Data analytic tools used to analyze data collected from numerous data sources determine the quality and reliability of data analysis.
919:
conducted by PWC indicated that more than two-thirds of retail customers prefer purchasing products and services from businesses that have data protection and privacy plans for protecting customer information. Also, the study indicated that customers trust businesses that can prove they cannot use customer data for any other purposes other than marketing. As technology and the
Internet continue improving, the success of businesses using it as a platform for marketing their products will depend on how effectively they can gain and maintain the trust of customers and users. Therefore, businesses will have to introduce and implement effective data protection and privacy strategies to protect business data and customer privacy. Although developing trust between customers and businesses affects the customers’ purchasing intentions, it also has a considerable impact on long-term purchasing behaviors including how frequently customers purchase which could impact the profitability of a business in the long run. Thus, the above information leads to the following hypothesis: Implementing data security and privacy plans has a positive impact on economic and financial outcomes.
928:
collect and analyze data for improved decision-making. Jonsen (2013) explains that organizations using average analytics technologies are 20% more likely to gain higher returns compared to their competitors who have not introduced any analytics capabilities in their operations. Also, IRI reported that the retail industry could experience an increase of more than $ 10 billion each year resulting from the implementation of modern analytics technologies. Therefore, the following hypothesis can be proposed: Economic and financial outcomes can impact how organizations use data analytics tools.
804:
47:
589:
36:
88:
1255:
906:
2004). There are 2 main categories of data analysis tools, data mining tools and data profiling tools. Also, most commercial data analysis tools are used by organizations for extracting, transforming and loading ETL for data warehouses in a manner that ensures no element is left out during the process (Turban et al., 2008). Thus the data analysis tools are used for supporting the 3 Vs in
885:, which refers to the collection and analyses of massive sets of data. While big data is a recent phenomenon, the requirement for data to aid decision-making traces back to the early 1970s with the emergence of decision support systems (DSS). These systems can be considered as the initial iteration of data management for decision support.
896:
Marketers and marketing organizations have been using data collection and analysis to refine their operations for the last few decades. Marketing departments in organizations and marketing companies conduct data collection and analysis by collecting data from different data sources and analyzing them
927:
Studies indicate that customer transactions account for a 40% increase in the data collected annually, which means that financial data has a considerable impact on business decisions. Therefore, modern organizations are using big data analytics to identify 5 to 10 new data sources that can help them
905:
Organizations use various data analysis tools for discovering unknown information and insights from huge databases; this allows organizations to discover new patterns that were not known to them or extract buried information before using it to come up with new patterns and relationships (Ahmed,
918:
While organizations need to use quality data collection and analysis tools to guarantee the quality and reliability of the customer data they collect, they must implement security and privacy strategies to protect the data and customer information from privacy leaks (Van Till, 2013). A study
214:
technology, those suggesting that data management was more important than business process management used arguments such as "a customer's home address is stored in 75 (or some other large number) places in our computer systems." However, during this period, random access processing was not
1198:
Kumar, Sangeeth; Ramesh, Maneesha
Vinodini (2010). "Lightweight Management framework (LMF) for a Heterogeneous Wireless Network for Landslide Detection". In Meghanathan, Natarajan; Boumerdassi, Selma; Chaki, Nabendu; Nagamalai, Dhinaharan (eds.).
1223:
4.4 Data
Management Center (DMC) The Data Management Center is the data center for all of the deployed cluster networks. Through the DMC, the LMF allows the user to list the services in any cluster member belonging to any cluster
226:
usage, it became obvious that both management processes were important. If the data was not well defined, the data would be mis-used in applications. If the process wasn't well defined, it was impossible to meet user needs.
880:
processing and renders interpretation implicit. The distinction between data and derived value is illustrated by the information ladder. However, data has staged a comeback with the popularisation of the term
835:
1202:
Recent Trends in
Networks and Communications: International Conferences, NeCoM 2010, WiMoN 2010, WeST 2010,Chennai, India, July 23-25, 2010. Proceedings
548:
828:
296:
286:
821:
603:
598:
808:
242:
17:
160:
1138:
132:
643:
139:
1210:
1162:
179:
117:
1259:
109:
1029:
796:
580:
366:
146:
1296:
743:
113:
1024:
259:
1155:
Mastering Cloud-Native
Microservices Designing and implementing Cloud-Native Microservices for Next-Gen Apps
215:
competitively fast, so those suggesting "process management" was more important than "data management" used
128:
655:
361:
63:
1265:
988:
192:
The concept of data management arose in the 1980s as technology moved from sequential processing (first
70:
as a valuable resource, it is the practice of managing an organization's data so it can be analyzed for
448:
356:
197:
1054:
1039:
1578:
1380:
1376:
953:
434:
430:
98:
1305:
1100:
958:
351:
102:
1178:
Watson, Hugh J.; Marjanovic, Olivera (2013). "Big Data: The Fourth Data
Management Generation".
1407:
1034:
869:
651:
639:
553:
414:
1004:
973:
727:
715:
468:
210:
Since it was now possible to store a discrete fact and quickly access it using random access
153:
1537:
1205:. Communications in Computer and Information Science. Vol. 90. Springer. p. 466.
1014:
993:
888:
Several organisations have established data management centers (DMC) for their operations.
873:
659:
617:
8:
1477:
1462:
1390:
1059:
1019:
739:
635:
621:
516:
501:
1236:
1289:
1049:
1044:
1009:
968:
963:
663:
511:
458:
453:
1467:
1457:
1321:
1206:
1158:
1134:
693:
521:
324:
1417:
1366:
1351:
1331:
1316:
948:
757:
719:
711:
409:
216:
1547:
1482:
1472:
1385:
1356:
1346:
1200:
785:
773:
769:
735:
340:
291:
281:
71:
1557:
1552:
1517:
1497:
1492:
1447:
1422:
1341:
1124:
1064:
983:
849:
781:
777:
558:
543:
538:
533:
491:
482:
419:
301:
251:
1572:
1522:
1512:
1487:
1361:
1326:
1282:
978:
473:
399:
379:
336:
201:
1532:
1527:
1507:
1502:
1432:
1427:
1402:
1395:
1371:
1079:
1074:
731:
723:
528:
394:
389:
312:
307:
204:
193:
1452:
1412:
858:
765:
685:
477:
384:
317:
223:
1069:
372:
211:
1542:
1437:
998:
943:
938:
864:
697:
588:
486:
329:
46:
87:
1336:
907:
882:
877:
689:
681:
506:
761:
35:
1101:"What Is Data Management? Importance & Challenges | Tableau"
1269:
1254:
868:
in a non-technical context. Thus data management has become
1128:
677:
67:
465:
Data warehousing and business intelligence and
Analytics
1274:
1237:"Data Mesh: Delivering data-driven value at scale"
922:
27:Disciplines related to managing data as a resource
913:
235:Followings are common data management patterns:
1570:
1177:
222:As application software evolved into real-time,
1290:
829:
1197:
116:. Unsourced material may be challenged and
1297:
1283:
836:
822:
587:
180:Learn how and when to remove this message
243:command query responsibility segregation
426:Data integration and inter-operability
14:
1571:
1180:Business Intelligence Journal; Seattle
900:
1278:
1123:
1001:, a domain-oriented data architecture
114:adding citations to reliable sources
81:
276:Topics in data management include:
24:
1130:Communicating Sequential Processes
25:
1590:
1247:
1253:
803:
802:
345:Database and storage management
219:time as their primary argument.
86:
45:
34:
1133:. Prentice Hall International.
1030:Hierarchical storage management
923:Financial and economic outcomes
891:
581:Library and information science
367:Hierarchical storage management
1229:
1190:
1171:
1147:
1117:
1093:
914:Data security and data privacy
744:Science and technology studies
13:
1:
1086:
1025:Enterprise content management
856:is increasingly replaced by
362:Business continuity planning
7:
989:Data Management Association
931:
230:
10:
1595:
876:. This trend obscures the
449:Document management system
406:Reference and master data
357:Database management system
77:
1312:
1055:Customer data integration
1040:Machine-readable document
271:
1304:
954:Information architecture
708:Interdisciplinary fields
567:
18:Research data management
959:Enterprise architecture
352:Database administration
1035:Information repository
870:information management
652:Information management
640:Collections management
554:Data quality assurance
445:Documents and content
415:Master data management
267:Static content hosting
1005:Computer data storage
974:Controlled vocabulary
728:Documentation science
716:Communication studies
469:Business intelligence
440:Data interoperability
1478:Protection (privacy)
1262:at Wikimedia Commons
1015:Digital preservation
994:Data management plan
874:knowledge management
660:Knowledge management
110:improve this section
66:related to handling
1060:Identity management
1020:Document management
901:Data analysis tools
740:Information science
636:Archives management
575:Part of a series on
517:Metadata publishing
502:Metadata management
1050:System integration
1045:Performance report
1010:Data proliferation
969:Information system
964:Information design
664:Library management
512:Metadata discovery
459:Records management
454:Content management
52:The data lifecycle
1566:
1565:
1558:Wrangling/munging
1408:Format management
1258:Media related to
1140:978-0-13-153271-7
846:
845:
522:Metadata registry
325:Data architecture
256:Materialized view
190:
189:
182:
164:
129:"Data management"
16:(Redirected from
1586:
1299:
1292:
1285:
1276:
1275:
1257:
1241:
1240:
1233:
1227:
1226:
1220:
1219:
1194:
1188:
1187:
1175:
1169:
1168:
1151:
1145:
1144:
1121:
1115:
1114:
1112:
1111:
1097:
949:Pseudonymization
850:management usage
838:
831:
824:
811:
806:
805:
720:Computer science
712:Archival science
591:
572:
571:
410:Data integration
348:Data maintenance
217:batch processing
185:
178:
174:
171:
165:
163:
122:
90:
82:
49:
38:
21:
1594:
1593:
1589:
1588:
1587:
1585:
1584:
1583:
1579:Data management
1569:
1568:
1567:
1562:
1538:Synchronization
1308:
1303:
1266:Data management
1260:Data management
1250:
1245:
1244:
1235:
1234:
1230:
1217:
1215:
1213:
1195:
1191:
1176:
1172:
1165:
1153:
1152:
1148:
1141:
1125:Hoare, C. A. R.
1122:
1118:
1109:
1107:
1105:www.tableau.com
1099:
1098:
1094:
1089:
1084:
934:
925:
916:
903:
894:
842:
801:
789:
788:
755:
747:
746:
736:Library science
709:
701:
700:
675:
667:
666:
648:Data management
633:
625:
624:
615:
570:
565:
549:Data enrichment
429:Data movement (
292:Data governance
282:Data governance
274:
233:
186:
175:
169:
166:
123:
121:
107:
91:
80:
72:decision making
60:Data management
57:
56:
55:
54:
53:
50:
41:
40:
39:
28:
23:
22:
15:
12:
11:
5:
1592:
1582:
1581:
1564:
1563:
1561:
1560:
1555:
1550:
1545:
1540:
1535:
1530:
1525:
1520:
1515:
1510:
1505:
1500:
1495:
1490:
1485:
1480:
1475:
1470:
1465:
1463:Pre-processing
1460:
1455:
1450:
1445:
1440:
1435:
1430:
1425:
1420:
1415:
1410:
1405:
1400:
1399:
1398:
1393:
1388:
1374:
1369:
1364:
1359:
1354:
1349:
1344:
1339:
1334:
1329:
1324:
1319:
1313:
1310:
1309:
1302:
1301:
1294:
1287:
1279:
1273:
1272:
1263:
1249:
1248:External links
1246:
1243:
1242:
1228:
1211:
1189:
1170:
1163:
1146:
1139:
1116:
1091:
1090:
1088:
1085:
1083:
1082:
1077:
1072:
1067:
1065:Identity theft
1062:
1057:
1052:
1047:
1042:
1037:
1032:
1027:
1022:
1017:
1012:
1007:
1002:
996:
991:
986:
984:Data retention
981:
976:
971:
966:
961:
956:
951:
946:
941:
935:
933:
930:
924:
921:
915:
912:
902:
899:
893:
890:
844:
843:
841:
840:
833:
826:
818:
815:
814:
813:
812:
799:
791:
790:
756:
753:
752:
749:
748:
710:
707:
706:
703:
702:
676:
673:
672:
669:
668:
634:
631:
630:
627:
626:
616:
613:
612:
609:
608:
607:
606:
601:
593:
592:
584:
583:
577:
576:
569:
566:
564:
563:
562:
561:
559:Secondary data
556:
551:
546:
544:Data integrity
541:
539:Data cleansing
536:
534:Data discovery
526:
525:
524:
519:
514:
509:
504:
496:
495:
494:
492:Data analytics
489:
483:Data warehouse
480:
471:
463:
462:
461:
456:
451:
443:
442:
441:
438:
424:
423:
422:
420:Reference data
417:
412:
404:
403:
402:
397:
392:
387:
377:
376:
375:
369:
364:
359:
354:
349:
343:
334:
333:
332:
322:
321:
320:
315:
310:
305:
302:Data custodian
299:
294:
289:
278:
273:
270:
269:
268:
265:
262:
257:
254:
249:
248:Event sourcing
246:
240:
232:
229:
188:
187:
94:
92:
85:
79:
76:
62:comprises all
51:
44:
43:
42:
33:
32:
31:
30:
29:
26:
9:
6:
4:
3:
2:
1591:
1580:
1577:
1576:
1574:
1559:
1556:
1554:
1551:
1549:
1546:
1544:
1541:
1539:
1536:
1534:
1531:
1529:
1526:
1524:
1521:
1519:
1516:
1514:
1511:
1509:
1506:
1504:
1501:
1499:
1496:
1494:
1491:
1489:
1486:
1484:
1481:
1479:
1476:
1474:
1471:
1469:
1466:
1464:
1461:
1459:
1456:
1454:
1451:
1449:
1446:
1444:
1441:
1439:
1436:
1434:
1431:
1429:
1426:
1424:
1421:
1419:
1416:
1414:
1411:
1409:
1406:
1404:
1401:
1397:
1394:
1392:
1389:
1387:
1384:
1383:
1382:
1378:
1375:
1373:
1370:
1368:
1365:
1363:
1360:
1358:
1355:
1353:
1350:
1348:
1345:
1343:
1340:
1338:
1335:
1333:
1330:
1328:
1325:
1323:
1320:
1318:
1315:
1314:
1311:
1307:
1300:
1295:
1293:
1288:
1286:
1281:
1280:
1277:
1271:
1267:
1264:
1261:
1256:
1252:
1251:
1238:
1232:
1225:
1214:
1212:9783642144936
1208:
1204:
1203:
1196:For example:
1193:
1185:
1181:
1174:
1166:
1164:9789355518699
1160:
1156:
1150:
1142:
1136:
1132:
1131:
1126:
1120:
1106:
1102:
1096:
1092:
1081:
1078:
1076:
1073:
1071:
1068:
1066:
1063:
1061:
1058:
1056:
1053:
1051:
1048:
1046:
1043:
1041:
1038:
1036:
1033:
1031:
1028:
1026:
1023:
1021:
1018:
1016:
1013:
1011:
1008:
1006:
1003:
1000:
997:
995:
992:
990:
987:
985:
982:
980:
979:Data curation
977:
975:
972:
970:
967:
965:
962:
960:
957:
955:
952:
950:
947:
945:
942:
940:
937:
936:
929:
920:
911:
909:
898:
889:
886:
884:
879:
875:
871:
867:
866:
861:
860:
855:
851:
839:
834:
832:
827:
825:
820:
819:
817:
816:
810:
800:
798:
795:
794:
793:
792:
787:
783:
779:
775:
771:
767:
763:
759:
751:
750:
745:
741:
737:
733:
729:
725:
721:
717:
713:
705:
704:
699:
695:
691:
687:
683:
679:
671:
670:
665:
661:
657:
653:
649:
645:
641:
637:
629:
628:
623:
619:
611:
610:
605:
602:
600:
597:
596:
595:
594:
590:
586:
585:
582:
579:
578:
574:
573:
560:
557:
555:
552:
550:
547:
545:
542:
540:
537:
535:
532:
531:
530:
527:
523:
520:
518:
515:
513:
510:
508:
505:
503:
500:
499:
497:
493:
490:
488:
484:
481:
479:
475:
474:Data analysis
472:
470:
467:
466:
464:
460:
457:
455:
452:
450:
447:
446:
444:
439:
436:
432:
428:
427:
425:
421:
418:
416:
413:
411:
408:
407:
405:
401:
400:Data security
398:
396:
393:
391:
388:
386:
383:
382:
381:
380:Data security
378:
374:
370:
368:
365:
363:
360:
358:
355:
353:
350:
347:
346:
344:
342:
338:
337:Data modeling
335:
331:
328:
327:
326:
323:
319:
316:
314:
311:
309:
306:
303:
300:
298:
295:
293:
290:
288:
285:
284:
283:
280:
279:
277:
266:
263:
261:
258:
255:
253:
250:
247:
244:
241:
238:
237:
236:
228:
225:
220:
218:
213:
208:
206:
203:
202:random access
199:
198:magnetic tape
195:
194:punched cards
184:
181:
173:
162:
159:
155:
152:
148:
145:
141:
138:
134:
131: –
130:
126:
125:Find sources:
119:
115:
111:
105:
104:
100:
95:This section
93:
89:
84:
83:
75:
73:
69:
65:
61:
48:
37:
19:
1468:Preservation
1458:Philanthropy
1442:
1322:Augmentation
1231:
1222:
1216:. Retrieved
1201:
1192:
1183:
1179:
1173:
1154:
1149:
1129:
1119:
1108:. Retrieved
1104:
1095:
1080:CRM software
1075:ERP software
926:
917:
904:
895:
892:Data sources
887:
863:
857:
853:
847:
732:Epistemology
724:Data science
647:
644:Preservation
529:Data quality
395:Data privacy
390:Data erasure
313:Data subject
308:Data steward
297:Data trustee
275:
234:
221:
209:
191:
176:
167:
157:
150:
143:
136:
124:
108:Please help
96:
59:
58:
1528:Stewardship
1418:Integration
1367:Degradation
1352:Compression
1332:Archaeology
1317:Acquisition
859:information
852:, the term
797:WikiProject
686:Information
656:cataloguing
622:Information
478:data mining
385:Data access
318:Data ethics
304:or guardian
252:Index table
239:Cache-aside
224:interactive
64:disciplines
1548:Validation
1483:Publishing
1473:Processing
1443:Management
1357:Corruption
1347:Collection
1218:2016-06-16
1110:2023-12-04
1087:References
1070:Data theft
848:In modern
373:subsetting
287:Data asset
170:April 2020
140:newspapers
1553:Warehouse
1518:Scrubbing
1498:Retention
1493:Reduction
1448:Migration
1423:Integrity
1391:Transform
1342:Cleansing
1186:(3): 4–8.
1127:(2004) .
999:Data mesh
944:FAIR data
939:Open data
865:knowledge
698:Knowledge
694:Artefacts
690:Documents
618:Libraries
614:Histories
498:Metadata
487:data mart
330:Dataflows
264:Valet key
97:does not
1573:Category
1523:Security
1513:Scraping
1488:Recovery
1362:Curation
1327:Analysis
1157:. 2023.
932:See also
908:Big Data
883:big data
878:raw data
862:or even
809:Category
762:Archival
758:Academic
682:Metadata
674:Curation
604:Glossary
507:Metadata
260:Sharding
231:Patterns
1533:Storage
1508:Science
1503:Quality
1433:Lineage
1428:Library
1403:Farming
1386:Extract
1372:Editing
786:Special
774:Private
599:Outline
205:storage
196:, then
154:scholar
118:removed
103:sources
78:Concept
1453:Mining
1413:Fusion
1270:Curlie
1209:
1161:
1137:
807:
782:School
778:Public
770:Health
341:design
272:Topics
245:(CQRS)
156:
149:
142:
135:
127:
766:Legal
754:Areas
632:Focus
568:Usage
371:Data
200:) to
161:JSTOR
147:books
1543:Type
1438:Loss
1396:Load
1306:Data
1207:ISBN
1159:ISBN
1135:ISBN
854:data
678:Data
658:) -
646:) -
485:and
476:and
339:and
212:disk
133:news
101:any
99:cite
68:data
1381:ELT
1377:ETL
1337:Big
1268:at
872:or
435:ELT
431:ETL
112:by
1575::
1221:.
1184:18
1182:.
1103:.
784:-
780:-
776:-
772:-
768:-
764:-
760:-
742:-
738:-
734:-
730:-
726:-
722:-
718:-
714:-
696:-
692:-
688:-
684:-
680:-
662:-
650:-
638:-
620:-
433:,
207:.
74:.
1379:/
1298:e
1291:t
1284:v
1239:.
1224:.
1167:.
1143:.
1113:.
837:e
830:t
823:v
654:(
642:(
437:)
183:)
177:(
172:)
168:(
158:·
151:·
144:·
137:·
120:.
106:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.