Thursday, December 12, 2019
Data Science ICT Knowledge
Question: Discuss about theData Sciencefor ICT Knowledge. Answer: Introduction For the Cookies Limited, the focus has been on how to work on the local transaction management system along with the online transaction system. It is mainly based on owning a company where there have been ideas that the customers are entertained with the different flavor and the designing of the cookie. The system also needs to focus on the cookies which will be necessary for the profiles and the shopping history. (Henrichs et al., 2015). Data Collection Storage Data Collection System There is a need to collect the email address of the people with the contact information so that it is easy to get in touch with them. As per the analysis, the click-to-open rates fell 11.4% approximately in 2012. Hence, the customers are becoming less interested in the marketing emails. The other communication has been set through the sending of all the relevant news and the offers. (Sharpe et al., 2016). For the data collection of the online transactions, there is a need for the payment dates and the amounts which are for RFM (Recency, frequency and the monetary value). Example, the customer has been able to purchase something and is tempted to buy more with the promo code. It includes the purchasing factor where the person and the publication can make the purchase decisions which are important at the checkout time. The customer email address and the referral behavior. The personalized feedback of the user is imperative to create the significant user-oriented experience. It will ultimately help in the proper innovation through the particular geography, income, and style. The historical data and the phone number of the customers are important to build a brand loyalty with the enhancement of the client experience. (Wang et al., 2015). In order to collect the data, there is a need to acquire the data with the proper business model, for instance, the affiliate model which is essential for the crawling of the affiliate sites that have the application logic in place that redirects to the individual source. The sites are necessary to crawl for the different factors for the fresh dataset. Storage System The basic approach is the "Log file" method which will be able to track the files that have been on the web host server. This also includes the points and the cookies which the customer prefers the most. The files are automatically recorded for the easy transactions. The second is the "Javascript Method" which includes the web pages where there is a sending of the of the visitor activity to the computer with the web analytics service provider. The cloud servers can offer the best opportunity to store the data in the effective manner which is also accessible from anywhere. This is not enough, but it is the best process to actives. (Fan et al., 2015). There is a need to focus on the policies and the procedure that explain the handling of professional data with e-commerce development. The Amazon web services with the Dynamic DB is considered to be the best and most secure medium to handle the data. Data in Action Consumer-Centric Product Design The customer-centric data includes the metrics, developing, empowering of the front line along with properly understanding the customer. The data includes the behavior, interest and the engagement where there is a possibility to create the products and the services for the best customers. With the customer centricity, the focus has been on how the customers can work on the expectations of the customers. There have been proper data to capture with the sharing in the organization. The brands include the customer centricity where there is a need to handle the wants and the needs of the development of the products and services. The brands have been for the customer centricity with the wants and the needs to develop the products. The focus has been on building the relationship that is designed for the maximization of the client product and the experience. (Cheraghi et al., 2015). This is through the measuring of the customer-centric where there is a possibility to work on churn rate to acquire the new customers. 2% of the customer retention has been on the profits with the cutting costs by 10%. The company loses 10% approx. Every year. There is a need to understand the customer lifetime value with the most valuable assets that have been generated by the retention phase. Recommendation System The recommendation system is based on product basis with correctly viewing the customer actions with the products that have been added to the cart. There is a need to search and handle the promotions of the newer arrivals and the promotion of the brands, discounts and the offers. The product is based on driving the revenue with the company profit that has been bought viewing the similar customers with the profiling basis, gender and the locations along with the ticket size. (Denning et al., 2015). This includes the proper determination of the customer needs and the value-based requirements. There is a need for the must be made in product development to handle the decreased time to market the 40% with the minimized time to the profit. The unique Market-Driven Product Definition has been the best methodology to understand the needs and then turning it into the product which is a consistent breakthrough of the market place. Business Continuity The disaster recovery plan is the restoring and accessing the data when there is a complete disaster of the same. The key components that have been destroying the parts or the business resources need to work on business operations. It requires to function the information to make sure that DR is for the recovery of the vital data along with the mission critical applications. For the technical level, there is a need to handle the cyber-attacks with the power failure. The DR plan is important for the industry and size that cause the day-to-day operations where the company needs to work on assuring the continuity with providing different services to the clients and the customers. The assurance is based on handling the services to the clients and the customers where the downtime is the biggest IT expense that has been faced. As per the analysis of the 2015 disaster recovery statistics, there is a need to cost the smaller companies and the mid-size organization. The extended loss of productivity can lead to the reduction of other cash flow with the late invoicing and the loss of the order. The increased labor costs with the extra work of the staff are mainly to recovery from the downtime along with the missing delivery dates. The disaster recovery plan is where multiple risks include the out of budget expense, reputation loss, data loss and a major negative impact on the clients and the customers. To create, implement and then maintain the business recovery plan, there is a need for the time-consuming process which is important to make sure for the business survival. The organizations do not have enough time and the resources for the dedication to this process. Hence, there I need to work on providing the involvement of the process that seeks the range from overseeing the plan with providing the inputs and support. With this, the development of contingency planning policy statement is important to conduct the business impact analysis along with properly identifying the preventive controls and the recovery strategies. The development is also based on the IT contingency plans to test, training of the employees and holding the exercise to maintain the plans. The business continuity is through the management of the process with the proper identification of potential impacts that can threaten the organization. (Agwu et al., 2015). It mainly provides the framework to build the resilience along with making sure that there is an adequate response along with safeguarding the interests of the key stakeholders, reputation, brand and value. With this, the BCP can support the management with the accomplishment to prepare the threats and then document the costs for the potential outages. There have been customers, shareholders, stockholders who can build the senior management. The setting of the budget with determining the team leader helps in setting the credibility with the senior management. The aspects are based on defining the scope for maximization of effectiveness. The development of is based on different tools which helps in the gathering of data with proper inputs and the collection process. The BIA can work on realizing and creation with no major easy tasks. Hence, there is a need to determine the data gathering techniques with data completeness verification. Conclusion Recommendation Cookies Limited has been based on a wide range of the products where there is a need to focus on data collection system along with storage. The report is based on the technology that has been the customer driven approach. The setup is based on how to handle the different approach and the business experience which is limited to the ICT knowledge. The informed technologies work on handling and working on the business setup. A proper tracking of the shopping history is for the different registered members who help in the improvement of the information system. (Fan et al., 2015). The focus for Cookies Limited should be based on ICT knowledge with the storage of information along with handling the improved sales and the data growth pattern. The setup is based on focusing for the cloud backup and the recovery solutions. This will help in the easy process of the computer systems. Reference Sharpe, B.A., Shrader, A.G. and Cumberland, W.T., Sharpe and Bruce A., 2016. Method for collecting data using a user interaction event-driven data collection system.. U.S. Patent 20,160,142,541. Henrichs, M. and Kreutz, M., 2015. Do Dynamic Capabilities influence the Growth of Start-Ups?: A Study within the German E-Commerce Sector. Germanakos, P., Belk, M., Constantinides, A. and Samaras, G., 2015. The PersonaWeb system: personalizing E-commerce environments based on human factors. InDemonstration in extended proceedings of the 23rd international conference on user modeling, adaptation, and personalization (UMAP 2015), CEUR workshop proceedings(Vol. 1388). Wang, S., Li, P. and Wang, Y., 2015, June. How do IT Competence, Organizational Agility and Entrepreneurial Actions Coevolve: The Case of Entrepreneurial Etailers on Ecommerce Platforms. InThe Fourteenth Wuhan International Conference on E-business. Fan, S., Lau, R.Y. and Zhao, J.L., 2015. Demystifying big data analytics for business intelligence through the lens of marketing mix.Big Data Research,2(1), pp.28-32. Cheraghi, S., Mahmoodi, A. and Nazari, H., 2015. Examining the relationship between perceived risk of customers in electronic payment method and e-commerce in Agricultural Bank in West Azerbaijan.The AYER,1, pp.386-392. Denning, J., Buehler, M. and Mccoy-markowitz, B., Jamabi, Inc., 2016.Method And System For Distributing Media Content And Processing Payments And/Or Voluntary Data Collection. U.S. Patent 20,160,132,844. Agwu, E.M. and Murray, P.J., 2015. Empirical Study of Barriers to Electronic Commerce Uptake by SMEs in Developing Economies.International Journal of Innovation in the Digital Economy (IJIDE),6(2), pp.1-19.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.