Preview

Accenture-Data-Monetization-in-the-Age-of-Big-Data.pdf

Good Essays
Open Document
Open Document
364 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Accenture-Data-Monetization-in-the-Age-of-Big-Data.pdf
Analyzing and employing customer data is nothing new. Traditional sources of data have been used to improve sales and marketing performance since the first mail-order catalog was produced and distributed more than two centuries ago.
From monthly sales reports to predictive business intelligence, tapping into customer data is a well-known way to enhance efficiency, build customer relationships and generate new revenues.
In recent years, however, the nature of the data environment has changed.
Digital technologies now enable massive data collection, as the cost of data storage has fallen. Other technology advances facilitate real-time data analysis and personalized communication.
Simultaneously, there has been a realization that an enormous amount of the data being produced could offer additional value if enhanced and analyzed to tap its potential (see Figure 1).
Mobile operator advantages
Mobile operators have many advantages as they approach this changing data market.
They have the advantage of customer micro-segmentation data and other valuable customer information about application and mobile website usage.
And in particular, they have the advantage of data sets that are very specific to the mobile industry, as technologies allow them to pinpoint the real-world geographic location of millions of active mobile users— whether through GPS, Wi-Fi hot-spot usage or network caller-data records (CDRs).
This location-specific data is unique to the mobile world and invaluable to both operators and their customers. It allows operators to enhance their internal systems, drive loyalty programs and stem attrition.
Their mobile customers, in turn, can receive location-specific data such as restaurants and events in their area, enhanced with behavioral- and location-targeted advertising and information services.
And there is no more popular smartphone application than maps.
Internal opportunities
Mobile operators have a number

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The business that I am choosing to write about is a small convenience store located across the street from my children’s school. It is owned and operated by a very pleasant Indian couple. It is located in a remote area where there are very few businesses in close proximity. This store offers a variety of products and prepared foods.…

    • 258 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In David Smith's brilliant work, “ Free lunch-Easily Digestible Economics-2008”,he arrives in chapter nine at the issue of paying the bill, which for people is a very unpleasant feeling, but in order for a society to reap the benefits of a prosperous welfare state and the advantages,it presents people have to pay their dues in order for it to work in the long run. And it is here the government plays its most pivotal role. The role of Government is to assure a reasonable and responsible fiscal policy e.g, the means by which government adjust it`s tax rates and its spending levels to monitor and influence an economy, with regard to demand and economic activity.…

    • 340 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    There are cases when payments are received prior to events that trigger revenue recognition. In that case, cash is debited and the unearned revenue is credited. On the other hand, when revenue recognition is triggered before actual payment is received, accounts receivable is debited while revenue is credited (“Revenue Recognition Principle,” 2013).…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Business Data Model

    • 3130 Words
    • 13 Pages

    What is the probability that a randomly selected order will require between two and three minutes?…

    • 3130 Words
    • 13 Pages
    Good Essays
  • Powerful Essays

    Sabates, M. (2014, June 19). FASB Revenue Recognition Exposure Draft Becomes ASC 2014-09. Retrieved from Eisneramper Accountants & Advisors: http://www.eisneramper.com/fasb-revenue-recognition-asc-2014-09.aspx…

    • 1598 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    In a database model, each object that we want to track in the database is known as entitiy. For example, in a college database there might be several entities which is known as set of similar objects. Some of the entities in college database are:…

    • 688 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Venture Concepts Paper

    • 832 Words
    • 4 Pages

    Wyatt’s Liquor and Tobacco Store will be a tobacco importer, which is anyone who wishes to import tobacco products (cigarettes, cigars, chewing tobacco, snuff, pipe tobacco, roll your own tobacco) into the United…

    • 832 Words
    • 4 Pages
    Good Essays
  • Good Essays

    There are numerous amounts on Acts out there that protect web users; the Children’s Internet Protection Act, also known as CIPA and The Children’s Online Privacy Protection Act also known as COPPA are two Acts that protect what children’s see in the internet or their personal information on the web.…

    • 559 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    104 Syllabus

    • 1947 Words
    • 13 Pages

    data is transforming every aspect of business from finance to marketing to manufacturing. In this course, we will…

    • 1947 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    The two Acts discussed in this paper are the Video Privacy Protection Act (1988), and the Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, (2003). These two acts were both enacted because along with the development of technology new issues arose in which no legal precedence had yet been established. These Acts were also both created nearly immediately after it was realized that there was a need for them.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Good Essays

    “In 1991, Congress passed the Telephone Consumer Protection Act (TCPA), the first federal law regulating the actions of legitimate telemarketers. Its purpose is to strike a balance between protecting the rights of consumers and allowing businesses to use telemarketing effectively.…

    • 673 Words
    • 3 Pages
    Good Essays
  • Good Essays

    With the internet changing constantly every day the United States Congress are implementing many legislative acts to address concerns with the usage of different kinds of technology. There are many advances in information technology that resulted in ethical issues such as the creation of the Children’s Internet Protection Act (CIPA) which was put into law in the year of 2000 by Congress. This law addresses any concerns about access to offensive content on the internet in the schools and libraries. Children and teenagers are exposed to the internet daily in schools, public, and at home. The internet can expose children to inappropriate material and predators online. The schools and libraries must enforce an Internet safety policy that contains protection measures, which block or filter the internet access to images that are obscene, child pornography, and what is harmful to minors. The main purpose of the act is to protect children from the dangers that the internet has ("Federal Communications Commission", n.d.).…

    • 277 Words
    • 2 Pages
    Good Essays
  • Good Essays

    For many years the Congress or Federal Government had to step into help and protect consumers by creating lawful Acts. Some of these acts are: the Family Educational Rights and Privacy Act (1974), Fair Credit Reporting Act (1970), Computer Fraud and Abuse Act, (1986), The Telephone Consumer Protection Act (1991), and Do not Call Implementation Act (2003). Presently the Federal Government has numerous acts that authorize the government to implement consumer protection; however, this paper will address only two of them. We will discuss the Telephone Consumer Protection Act (TCPA) of 1991 and the Do not Call Implementation Act of 2003.…

    • 661 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This paper will explore two information technology acts; along with what ethical issues and information technology advances that caused the acts to be in place. The two acts that will be covered will be the electronic funds transfer act of 1978, and the children’s internet protection act of 2000. According to Rainer and Cegielski (2011) “Ethics refers to the principles of right and wrong that individuals use to make choices to guide their behaviors. Deciding what is right or wrong is not always easy or clear-cut. For this reason, many companies and professional organizations develop their own codes of ethics. A code of ethics is a collection of principles that is intended to guide decision making by members of the organization”.(Chapter 3, Ethics, Privacy, and information security).…

    • 640 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The internet has made is easy for people to access an unlimited amount of information at anytime. Advances in information technology have resulted in new ethical issues that needed to be addressed. Children need to be protected from being taken advantage of in this new digital age. Parents also want to ensure that their children aren’t subjected to material that is considered inappropriate. The federal government has passed laws to prevent the abuse of children on the internet.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays