Keiser University
Dr. Thompson
MBA 562
April 12, 2012
Introduction In today’s society, many individuals and companies use smaller and more powerful computing and communication devices. These devices have better connectivity when in both wired and wireless environments, and accepted standards for data transfer and presentation. These devices play a major role in the lives of individuals and companies worldwide. Company employees use smaller devices to track leads, and new potential customers while out of the office environment. As new technology emerges, it presents the difficult set of challenges that revolve around data management. Data management needs to be reliable, efficiently stored, queried, and delivered efficiently. With those challenges, comes another challenge all in its own: is the way data management used to reach customers ethical? With so much new technology abounding, data management and the ethical uses of it are a big factor in what business tools companies use to ensure that their data is safe and ethical. Companies collect potential customer information in a variety of ways. These include through the telephone, internet, face to face encounters and bought data. Most companies understand that they will face challenged with the data they collect relating to the completeness, accuracy of the information.
Business Intelligence tools can offer a clear view of the progress companies are making to manage their data as well as help them use it ethically and avoid causing any rifts between them and their potential and current customers. These tools can help companies clear out any out of date information, incomplete information, customers who wish to not be contacted in the future, as well as allow them to be able to continue their current business relationships with those potential and current customers who wish to continue being contacted.
References: Flaherty, M., (2012). Building materials giant GMS selects InetSoft’s business intelligence software .PRWEb. Piscataway, NJ. Retrieved on April 12, 2012 http://www.prweb.com/releases/business_intelligence/self-service/prweb9114157.htm Carney, D., Cetintemel, U., Cherniack, M., Convey, C., Lee, S., Seidman, G., Stonebraker, M., Tatbul, N., Zdonik, S. (2002). Monitoring streams: a new class of data management applications. From the Proceeding VLDB ’02 Proceedings of the 28th international conference on Very Large Data Bases. Retrieved on April 6, 2012 http://dl.acm.org/citation.cfm?id=1287389. Trochlil, W. (2012). Five steps to ensure the success of your database. EDM: Effective Database Management. Hamilton, VA. Retrieved April 12, 2012 http://www.effectivedatabase.com/five-steps-to-ensure-the-success-of-your-database McCarthy, D. (1989). The architecture of an active database management system. Proceeding SIGMOD ’89, Proceedings of the 1989 SIGMOD International Conference on Management of Data. Volume 18, Issue 2. http://web.eecs.umich.edu/~jag/eecs584/papers/md89.pdf Engelbert Drullard- Personal Interview, Trax Project Manager, Trax Software, INC. Henry Parra- Personal Interview, Trax VP of Operations, Trax Software, INC.