The Risk of Big Data
Companies are now able to measure their performance on many levels. Processes that were never able to be measured before are being able to be analyzed and measured. For instance in retailing, companies have instant feedback from the consumer through increased technological capabilities like company websites, blogs and social media outlets. Never before has such information been delivered so quickly. Before these technological advances a customer would have to call and log a complaint through several channels of personnel or write a letter and send through snail mail. Now they can simply post their feedback and it is delivered instantly. This is an advantage to companies. This data can be processed quickly and it can be used a tool for improvement. However, with some data processes it is not so easy to use the information to improve processes. Sometimes there is too much information wade through. Careful choosing of what to focus on is extremely important.
With large amounts of data pouring in, come problems to be aware of and be proactive about. Some issues that will arise are privacy protection, great financial exposure in fast moving markets, risk for losing sight of most important information, and risk of wasting time and money while not defining the real problems.
Databases are growing exponentially. While customers are logging in and providing crucial information for questions and orders, this information is being stored. Protection of this information is crucial. We just saw this past holiday season that Target has taken a big hit because of the breach in security of their online and in-store purchases. Consumers have lost faith that their personal information will be protected when shoppin...
... middle of paper ...
...onger belongs to the people that possess these individual lives. It is a risky an audacious frontier that we are heading into. I believe that “BIG-DATA” brings “BIG RISKS.”
WORKS CITED
Attiksson, S. (2013, Dec. 20). High security risk found after healthcare.gov launch. Retrieved from http://www.cbsnews.com/news/high-security-risks-found-after-healthcaregov-launch/
Bonacorsi, S. (2013). Step-by-step guide to using pareto analysis. Retrieved from http://www.processexcellencenetwork.com/six-sigma-quality/articles/using-pareto-analysis-to-divide-and-conquer-impro/
Fisk, L. (2011, Feb.). Leveraging the power of facebook. Retrieved from http://socialmediatoday.com/lindamfisk/385515/leveraging-power-facebook
Jordan, J. (2013, 10 20). The risks of big data for companies. Retrieved from http://online.wsj.com/news/articles/SB10001424052702304526204579102941708296708
James Stacey Taylor's article, "In Praise of Big Brother: Why We Should Learn to Stop Worrying and Love Government Surveillance" begins reviewing the concept of "Big Brother" as it was originally presented in George Orwell's 1984. The Big Brother started off as a fictional character in 1984-- a dictator of Oceania within a totalitarian state. Set within a society in which everyone is under complete surveillance by the authorities, mainly by telescreens, the people are constantly reminded of this by the phrase “Big Brother is watching you” (Wikipedia) . Taylor goes on to explain some examples of recent surveillance technology and how it is applied in lives today. An interesting note and comparison between today’s technology and that of the telescreens in 1984, is that people could be sure that they could not be watched by Big Brother’s telescreens by going out of the cities into the country, where they only had to take care that their conversations were not monitored by hidden microphones (Taylor 227). He contrasts the two, highlighting the fact that “Such an escape is not impossible, for spy satellites can be used to monitor people wherever they go” (277). From there, Taylor perpetuates the framework for his position on the Big Brother notion. Taylor argues that, "rather than opposing such an expansion of surveillance technology, its use should be encouraged -- and not only in the public realm" (227). Taylor’s argument presented in a more formal construction is as follows:
Data Analytics has significantly grown in less than two years, this quick growth has caused the company to evaluate the IT environment and its ability to support the growth and secure the data of the company. The CEO is expecting the company to grow 60% over the next two years; with the success of the company it has been determined that a change to the current IT environment and infrastructure must occur to better support the employees and the customer base.
Gross, Grant. "HealthCare.gov's Problems: What We Know so Far." PCWorld. PCWorld, 7 Nov. 2013. Web. 24 Nov. 2013.
We now accept the sharing and digital storage of our personal information as a necessary evil. We continue to incorporate, into our lives, technology that uses this data. Microsoft and Google are envisioning and developing ways to commercialize the use of even more of our stored personal information.
Operations are all the processes in transforming inputs into desired outputs. These processes must be efficiently and effectively coordinated by managers and eventually they must accomplish specific organizational goals. All operations, despite how well managed they are, are capable of improvement. In order for the operations to be improved however, weaknesses should be identified first. Therefore operations need some kind of performance measurement as a prerequisite for improvement.
Big Brother: an all-powerful government or organization monitoring and directing people's actions. When a government steps beyond its boundary of privacy and into the lives of the people it governs, the result is a “Big Brother” society. Although Americans live in a democracy, their government takes steps towards more totalitarian ideologies. All of a sudden, rights become privileges, safety becomes surveillance, and Americans lose freedom. Their government misleads them to believe that they aren't being mistreated by their government, and most of the Americans swallow it. The government of the United States manipulates the citizens by instituting socialistic principles; however, by examining and revolting, a more democratic America will arise.
“Using PM System doesn’t improve the performance of an organization. PM system incorporates of not only evaluating performance appraisals but also rewards. As quoted by Sheridan (2009) and Latham (2005), “the cultural maturation of performance based can take decades to implement and requires the organizations to allocate the required resources”. Technology plays a pivotal role in future of PM systems where e-monitoring of performance of employees in Hilton and other entities respectively can change the evolution of performance management thus bringing necessary and important changes to stay competitive in the market as well increasing an individual’s productivity in the company (Sheridan & Latham, 2005)”.
These benefits are best discovered and maximized if used in conjunction with KPIs. A KPI is a key performance indicator and they allow a company to measure and manage ...
Davenport, Thomas H., Paul Barth, and Randy Bean. "How Big Data Is Different." MIT Sloan Management Review. N.p., 30 July 2012. Web. 18 Mar. 2014. .
Effectively, big data provides the companies with the opportunity to know and understand their customers. With Big Data, a company holds a lot of information about their customers, such as their habits, what is the product they prefer, the time they make purchases, how many products they buy and what kind of promotion their prefer. Then they can make a relation with who the person is, age, gender. Thus they can adapt their offer to the customer. If you are a good client, you can have private discount, or more discount. The objective is to know personally your customer to make them feeling unique.
As technology penetrates society through Internet sites, smartphones, social networks, and other modes of technology, questions are raised as the whether lines are being crossed. People spend a vast majority of their time spreading information about themselves and others through these various types of technology. The problem with all these variations is that there is no effective way of knowing what information is being collected and how it is used. The users of this revolutionary technology cannot control the fate of this information, but can only control their choice of releasing information into the cyber world. There is no denying that as technology becomes more and more integrated into one’s life, so does the sacrificing of that person’s privacy into the cyber world. The question being raised is today’s technology depleting the level of privacy that each member of society have? In today’s society technology has reduced our privacy due to the amount of personal information released on social networks, smartphones, and street view mapping by Google. All three of these aspects include societies tendency to provide other technology users with information about daily occurrences. The information that will be provided in this paper deals with assessing how technology impacts our privacy.
Moreover, E-commerce has widely recognized nowadays among people. Therefore such data should be secure in databases and privacy of data should be maintained.
Adopting big data can also help the banking industry by saving them from lots of embarrassment resulting from increase in the number of customer which in turn requires banks to improve on their performance. As stated earlier banks are entrusted with lots of information and this information must be safe will be required to be accessed ready and in a timely fashion. The use a normal small database will not be enough to perform this operation and if banks don’t embrace the use of big data they might start to experience failure in there system.