The Intelligence Phase

Intelligence in decision making involves scanning the environment, either intermittently or continuously. It include monitoring the results of the implementation phase of a decision making process.

Problem or opportunity
The intelligence phase begins with the identification of organizational goals and objectives related to an issue of concern and determination of whether they are being met. Problem occurs because of dissatisfaction with the status quo.

Dissatisfaction is the result of a difference between what people desire or expect and what is occurring. In this first phase, a decision maker attempts to determine whether a problem exists, identify its symptoms, determine its magnitude and explicitly define it. Often what is described as a problem may be only a symptom of a problem.

Because real-world problems are usually complicated by many interrelated factors, it is sometimes difficult to distinguish between the symptoms and the real problem. New opportunities and problems certainly may be uncovered while investigating the causes of symptoms.

The existence of a problem can be determined by monitoring and analyzing the organization’s productivity level. The measurement of productivity and the construction of a model are based on real data. The collection of data and the estimation of future data are among the most difficult steps in the analysis.

The following are some issues that may arise during data collection and estimation and thus plague decision makers:
  • Data are not available. As a result, the model is made with and relies on potentially inaccurate estimates.
  • Obtaining data may be expensive.
  • Data may not be accurate or precise enough.
  • Data estimation is often subjective.
  • Data may be insecure.
  • Important data that influence the results may be qualitative.
  • The may be too many data.
  • Outcomes may occur over an extended period. As a result, revenues, expenses and profit will be recorded at different points in time. To overcome this difficulty, a present value approach can be used if the results are quantifiable.
  • It is assumed that future data will be similar to historical data. If this is not the case, the nature of the change has to be predicted and included in the analysis.
When the preliminary investigation is completed, it is possible to determine whether a problem really exists, where it is located and how significant it is. A key issue is whether an information system is reporting a problem or only the symptoms of a problem.

Problem classification
Problem classification is the conceptualization of a problem in an attempt to place it in a definable category, possibly leading to a standard solution approach. An important approach classifies problems according to the degree of structuredness evident in them.

Problem Decomposition
Many complex problems can be divided into subproblems. Solving the simpler subproblems may help in solving a complex problem. Also, seemingly poorly structured problems sometimes have highly structed subproblems.

Just as a semistructured problems results when some phases of decision making are structured while other phases are unstructured, so when some subproblems of a decision making problem are structured with others unstructured, the problem itself is semistructered.

As a DSS is developed and the decision maker and development staff learn more about the problem it gains structured. Decomposition also facilitates communication among decision makers. Decomposition is one of the most important aspects of the analytical hierarchy process, which helps decision makers incorporate both qualitative and quantitative factors into their decision making models.

Problem ownership
In the intelligence phase, it is important to establish problem ownership. A problem exists in an organization only if someone or some group takes on the responsibility of attacking it and if the organization has the ability to solve it.

The assignment of authority to solve the problem is called problem ownership. For example, a manager may feel that he/she has a problem because interest rates are too high. Because internet rate levels are determined at the national and international levels, most managers can do nothing about them, high interest rates are the problem of the government, not a problem for a specific company to solve.

The problem companies actually face is how to operate in a high interest rate environment. For an individual company, the interest rate level should be handled as an uncontrollable (environmental) factor to be predicted.

When problem ownership is not established, either someone is not doing his/her job or the problem at hand has yet to be identified as belonging to anyone. It is then important for someone to either volunteer to own it or assign it to someone.

Decision Making Process Phases

Decision making phases involves 4 major phases: intelligence, design, choice and implementing. The decision making process starts with the intelligence phase. In this phase, the decision maker examines reality, identifies and defines the problem. Problem ownership is established as well. In the design phase, a model that represents the system is constructed.

This is done by making assumptions that simplify reality and writing down the relationships among all the variables. The model is then validated and criteria are determined in a principle of choice for evaluation of the alternative courses of action that are identified. Often the process of model development identifies alternative solutions and vice versa.

The choice phase includes selection of a proposed solution to the model (not necessarily to the problem it represents). This solution is tested to determine its viability. When the proposed solution seems reasonable, we are ready for the last phase, implementation of the decision (not necessarily of a system). Successful implementation results in solving the real problem. Failure leads to a return to an earlier phase of the process. In fact, we can return to an earlier phase during any of the latter three phases.


Business Intelligence Architecture

Business intelligence (BI) has four major components: a data warehouse, business analytics, business performance management and a user interface. Data warehouse and its variants is the cornerstone of any medium-to-large BI system.  Originally the data warehouse included only historical data that were organized and summarized so end users could easily view or manipulate data and information. Notice that the data warehousing environment is mainly the responsibility of technical staff, while the analytic environment also known as business analytic is the realm of business users. Any user can connect to the system via the user interface such as a browser and top managers may use business performance management component and also a dashboard.

Data Warehousing
The data warehousing and its variants are the cornerstone of any medium to large business intelligence (BI) system. Originally the data warehouse included only historical data that were organized and summarized, so end users could easily view or manipulate data and information. Today, some data warehouses include current data as well so they can provide real-time decision support.

Business Analytics
Ends user can work with the data and information in a data warehouse by using a variety of tools and techniques. These tools and techniques fit into three categories:
1.  Reports and queries. Business analytics include both static and dynamic reporting , all types of queries, discovery of information, multidimensional view, drill-down to details and so on.
2.  Advanced analytics. Advanced analytics include many statistical, financial, mathematical and other models that are used in analyzing data and information.
3.  Data, text and web mining and other sophisticated mathematical and statistical tools. Datamining is a process of searching for unknown relationships or information in large databases or data warehouses, using intelligent tools such as neural computing, predictive analytics techniques or advanced statistical methods.

Business Performance Management
Business performance management (BPM) which is also referred to as corporate performance management (CPM) is an emerging portfolio of applications and methodology that contains evolving BI architechture and tools in its core. BPM extends the monitoring, measuring and comparing of sales, profit, cost, profitability and other performance indicators by introducing the concept of management and feedback. It embraces process such as planning and forecasting as core tenets of a business strategy. In contrast with the traditional DSS, EIS and BI which support the bottom-up extraction of information from data, BPM provides a top down enforcement of corporate wide strategy.

User Interface
Dashboards provide a comprehensive visual view of corporate performance measures also known as key performance indicators, trends and exceptions. They integrate information from multiple business areas. Dashboards present graphs that show actual performance compared to desired metrics, a dashboard presents an at a glance view of the health of the organization.

Computerized Decision Support System

When managers want make a decision they need considerable amounts of relevant data, information and knowledge. Processing these, managers must be done quickly, frequently in real-time and usually requires some computerized support system.

1.  Speedy computations
A computer enables the decision maker to perform many computations quickly and at a low cost. Timely decisions are critical in many situations, ranging from a physician in an emergency room to a stock trader on the trading floor. With a computer thousands of alternatives can be evaluated in the seconds.

2.  Improved communication and collaboration
Many decisions made today by groups whose numbers maybe in different locations. Groups can collaborate and communicate readily by using web-based tools. Collaboration is especially important along the supply chain where partners must share information.

3.  Increased productivity of group members
Assembling a group of decision makers especially experts in one place can be costly. Computerized support can improve the collaboration process of a group and enable its members to be at different locations by saving travel costs. Also increase the productivity of staff support such as financial, legal analyst by using software optimization tools that help determine the best way to run a business.

4.  Improved data management
Huge amounts of data can be stored in different databases anywhere in the organization and even possibly at web sites outside the organization. The data may include text, sound, graphics and video and they can be in foreign languages. It may be necessary to transmit data quickly from distant locations. Computers can search, store and transmit needed data quickly, economically, securely, transparently and paperless.

5.  Managing giant data warehouse
Large data warehouse like the one operated by Wal-Mart contain terabytes and even petabytes of data. Computers can provide extremely great storage capabilities for any type of digital information and this information can be accessed and searched very rapidly.

6.  Quality support
The more data can be accessed the more alternatives can be evaluated, forecasts can be improved, risk analysis can be performed quickly and the views of experts can be collected quickly and at a reduced cost. Expertise can even be derived directly from a computer system using artificial intelligence methods.

7.  Agility support
Competition today is based not just on price but also on quality, timeless, customization of products and customer support. In addition, organization must be able to frequently and rapidly change their mode of operation, reengineer processes and structures, empower employees and innovate in order to adapt to their changing environments. Decision support technologies such as intelligent systems can empower people by allowing them to make good decisions quickly even if they lack some knowledge.

8.  Overcoming cognitive limits in processing and storing information
The human mind has only a limited ability to process and store information and people sometimes find it difficult to recall and use information in an error-fashion due to their cognitive limits. The term of cognitive limits indicates that an individual’s problem solving capability is limited when a wide range of diverse information knowledge is required. Computerized systems enable people to overcome their cognitive limits by quickly accessing and processing vast amounts of stored information.

9.  Using the web
Since the development of the Internet and Web servers and tools, there have been dramatic changes in how decision makers are supported. Most important, the Web provides the access to a vast body of data, information and knowledge available around the world, user-friendly graphical user interface that is easy to learn to use and readily available, the ability to effectively collaborate with remote partners and availability of intelligent search tools that enable managers to find the information they need quickly and inexpensively.

10.  Anywhere, anytime support
Using wireless technology managers can access information anytime and from anyplace, analyze and interpret it and communicate with those involved.

Business Intelligence Today and Tomorrow

In today’s highly competitive business the quality and timeliness of business information for an organization is not just a choice between profit and loss, it may be a question of survival or bankruptcy. No business organization can deny the inevitable benefits of BI. Recent industry analyst reports how that in the coming years millions of people will use BI visual tools and analytics everyday. Today’s organizations are deriving more value from BI by extending actionable information to many types of employees, maximizing the use of existing data assets.

Producers, retailers, governments, special agencies and others use visualization tools, including dashboards. More and more industry specific analytic tools will flood the market to do almost any kind of analysis and help to make informed decision making from the top level to the user level.

A potential trend involving BI is its possible merger with artificial intelligence (AI). AI has been used in business applications since the 1980s and it is widely used for complex problem solving and decision support techniques in real-time business applications.

It will not be long before AI applications are merged with BI bringing in a new era in business. To enable this integration, BI vendors are starting to use service oriented architecture and enterprise information integration (EII).

BI is spreading its wings to cover small, medium and large companies. Large BI players are for large enterprises and small, niche players service midsize and small companies. Analytics tools are also penetrating the market for very specialized functions, which will help some companies to go just for BA instead of full data warehouse based BI implementation.

BI takes advantage of already developed and installed components of IT technologies, helping companies leverage their current IT investments and use valuable data stored in legacy and transactional systems.

The Major Characteristics of Business Intelligence

Enterprise software systems are designed as transaction processing tools and today the main job is to optimize an informed decision making process for users at all levels of the organizational hierarchy. Recent trends seem to indicate that access to key operational data is no longer the purview of executives alone. Many executives of manufacturing and service companies today are allowing (and even encouraging) low level managers, supervisors and analysts on the shop floor and in distribution centers access to operational performance data to enable better and more timely decision making by those employees.

You’re familiar with the information systems that support your transactions such as ATM withdrawals, bank deposits and cash register scans at the grocery store. The transaction processing systems involved with these transactions constantly handle updates to what we might call operational databases. For example, an ATM withdrawal transaction needs to reduce the bank balance accordingly a bank deposit adds to an account and a grocery store purchase is likely reflected an appropriate reduction in the store’s inventory for the items we bought.

These online transaction processing (OLTP) systems handle a company’s ongoing business. In contrast a data warehouse is typically a distinct system that provides storage for data that will be made use of in analysis.

The intent of that analysis to give management the ability to scour data for information about the business and it can be used to provide tactical decision support whereby. For example, line personnel can make quicker and or more informed decisions.

Most operational data in enterprise resource planning (ERP) system and in their complementing siblings such as supply chain management (SCM) or customer relationship management (CRM) are stored in what is referred to as OLTP systems, which are computing processing systems in which the computer responds immediately to user requests.

Each request is considered to be a transaction which is a computerized record of a discrete event such as the receipt of inventory or a customer order. In other words a transaction requires a set of two or more database updates that must be completed in an all or nothing fashion.

In the 1980s many business users referred to their mainframes as the black hole because information went into it but none ever come back out. All requests for reports had to be programmed by IT staff and only canned reports could be generated on a scheduled.

The 10 Myths of Entrepreneurship

Myth 1: Entrepreneurs are doers, not thinkers
  • Reality: Although entrepreneurs are action oriented, but they are also a thinkers
  • They make careful plan & strategy.
  • Entrepreneur will try to come out with alternative action towards a solution.
  • In the era of globalization & hyper-competition, entrepreneurs need to be good thinkers.
Myth 2: Entrepreneurs are born, not made
  • The idea that the characteristics of entrepreneurs cannot be taught or learned. Entrepreneurs are born with special traits or characteristics.
  • Traits such as include aggressiveness, initiative, drive, a willingness to take risks, analytical ability, and skill in human relations.
  • Reality: Like all disciplines, entrepreneurship has models, processes, and case studies that allow the traits to be acquired through learning.
  • Reality: Research has proven that entrepreneurs can be produced, and it is not limited to certain race, group or individuals.
Myth 3: Entrepreneurs are always inventors
  • Not all inventors are entrepreneurs.
  • Reality: Many successful entrepreneurs are not inventors, but rather use creative ideas in doing something. They will modify & innovate to suit the market demand.
Myth 4: Entrepreneurs are academic and social misfits
  • This myth results from people who have started successful enterprises after dropping out of school or quitting a job
  • Long time ago, educational and social organisations did not recognise the entrepreneur
  • Reality: The entrepreneur is now viewed as a highly educated professional, who is well versed and sociable with excellent communication skills, and strives in economic development of the community & the country. 
Myth 5: Entrepreneurs must fit the "profile" 
  • Many books & articles have presented checklists of characteristics of the successful entrepreneur
  • Reality: It is not necessary for the individual to have ALL the characteristics, as described previously, to become a success (only some will do).
Myth 6: All Entrepreneurs Need Is Money
  • Every biz. venture needs capital to survive
  • Large number of business failures occur because of lack of financing
  • Failure due to lack of financing indicates other problems
  • Managerial incompetence;Lack of financial understanding; Poor investments; Poor planning; Reality: Money is a resource, not the ultimate objective.  
Myth 7: All Entrepreneurs Need Is Luck
  • Being in the right place at the right time is always an advantage
  • "Luck" happens when preparation meets opportunity
  • What appears to be lucky could really be several other factors
              a. Preparation & hard works
              b. Determination
              c. Desire
              d. Knowledge
              e. Innovativeness

Myth 8: Ignorance is bliss for an entrepreneur
  • The myth that too much planning and evaluating will give rise to problems. In the competitive world of business, which demanded detailed planning & preparation, entrepreneur should be equipped with solid knowledge and strategies, which would be keys to success.
  • Reality: Careful planning- Not ignorance is regarded as beneficial, since Key success factors are;
        a. ability to identify strengths and weaknesses of a venture
        b. Setting up clear timetables with contingencies for handling problems
        c. Minimizing problems through careful strategy formulation
           - Careful planning is the mark of an accomplished entrepreneur

Myth 9: Entrepreneurs seek success but experience high failure rates.
  • Many entrepreneurs suffer a number of failures before they are successful
  • Failure can teach many lessons to those who are willing to learn and failure often leads to future success
Myth 10: Entrepreneurs are extreme risk takers (gamblers)
  • The concept of risk is a major element in the entrepreneurship process
  • While it may appear that an entrepreneur is "gambling" on a  wild chance, the fact is that the entrepreneur is usually working on a moderate or "calculated" risk
  • Reality: Most successful entrepreneurs work hard through planning & preparation to minimize the risk involved.

Rise and Fall



2007 was the year when Apple revolutionized the smartphone market. Mobile phones no longer required buttons and images could easily be magnified or reduced with two fingers. But where was Nokia the, market leader among mobile phone manufacturers, when the revolution begins? Though Nokia is still the largest mobile phone manufacturer in the world the competitors are quickly catching up. In addition to Apple, even Google, Motorola and HTC have surpassed Nokia in the smartphone domain. 


30,020 Nokia employees work in the field of research and development. This is about 30 percent of all employed Finns. But all these endeavours are not sufficient to dispute Apple in the smartphone market. Smartphones from the Finnish company suffer from the reputation of being cumbersome to operate. For example, the N97 that was launched on 2009 confused its users with a messy menu structure. Because of iPhone many users were used to have all items directly on the start screen. The new operating system MeeGo is supposed to solve this problem starting 2011. Nokia can see that the disadvantage is also due to patent infringements. Court proceedings have been on since 2009. 


500,000,000 members have joined Facebook since July 2010 and the number is on the rise. MySpace had underestimated his development. In 2007, MySpace founder Chris DeWolfe had described Facebook as a ‘Network for students. That is the niche.’ Today MySpace focused mainly on musicians. In 2005, Rupert Murdoch’s News Corporation took over MySpace for USD580 million and the company wanted to develop MySpace into a multimedia rival on MTV. But the plan failed, since users did not go along with this. MySpace stagnated, while Facebook consistently increased its membership. Today, the network has about 100 million members. Three years back, the number of members was more than double of this. And only about 18 million members are active and the tendency is sinking.

How important is your Virtual Identity?

Is that person with more than 500 friends, innumerable photos, scores of witty status message, fan pages and likes really you? Who is doing what, who is seeing whom, who attended what concert, who bought a new phone, who hates his/her job, who is eating what food, who hates Mondays, who is going where. Some people tend to chronicle every minute spent. Is this information we really can’t live without?

Nevertheless these days we are not only bombarded with such information but also willingly contribute to it ourselves. There is a need to stand out. One can easily gauge an individual’s personality by simply looking at their profiles by simply looking at their profiles on these social networking sites.

Profiles pictures, status message reflecting the current state of mind, pictures of parties, events of outings, relationship statuses, work information, likes fan pages etc are all a part of our virtual identity and reflect our personas.  This increasing presence online is either competing with or complementing our identity in real life.

Does the old adage that an extrovert in real life will be equally popular and outgoing in the virtual worlds and vice versa, hold true in the digital age? Or will an introvert in real life exhibit a livelier persona and find it easier to express himself freely in the virtual world? It is very difficult to establish the truth, but we can safely say that in the most cases, our profile pages mirror our real life down to the last detail.  

Socializing in the real world often puts pressure on people to live up to their virtual avatars. Also more often than not, through these sites people vent their feelings about issues faced in real life. Maintaining popularity is the key.

The general belief is that the number of friends and followers one has reflects how popular they are. You will find people accepting friend requests from random users some of them may be friends of friends or even strangers who just came across your name somehow.

On the other hand, having a good profile picture or an emotional status message has become a way of attracting attention. Researchers have attributed these behavioural patterns as narcissism while also stating that constant use further fuels such tendencies.

A study conducted by the York University of Canada suggests that Facebook is a magnet for narcissists and people with low self esteem.

The study defined narcissism as a pervasive pattern of grandiosity, need for admiration and an exaggerated sense of self-importance. Undergraduate psychology student Soraya Mehdizadeh who conducted the study states that Facebook is an ideal setting for narcissists and also serves as a social lubricant for those with low self esteem.

According to her people with low self esteem find it easier to connect with people online and this boosts their confidence.


What happens to your Virtual Identity after you’re dead?





Having created a virtual identity and almost living an alternative life in digital space it is natural to wonder what would happen once our physical lives come to an end. We think about what will happen to our material belongings but the fate of our digital existence isn’t well understood or controllable. The legal backdrop of most popular social networking sites like Google, Facebook or Twitter usually maintain the companies rights over digital content even if it is publicly shared by its users leaving the equation between legal heirs or loved ones and the digital property of the demised party in question. 

In the earlier 2010, Facebook faced a tiff with Stephanie Bemister, sister of deceased British journalist Wiliam Bemister who wanted to remove her brother’s profile from Facebook but couldn’t because the website’s policy is to maintain profiles as memorial pages. 

Turning a profile into a memorial requires contacting the company with relevant documentation in order for them to strip out sensitive features like status updates and approving friend requests. Memorialized pages allow only friends already connected to it to post loving comments and share memories. 

Other social networking services haven’t dwelled much on the matter. Twitter’s policy allows it to close the account on request but not pass it on to the loved one. Relatives, children and possibly even future biographers will not have access to a deceased person’s private correspondence on the way that traditional paper letters and records can be unearthed today. 

It’s important to maintain offline physical records as well. The relevance of this concept might seem minuscule to some right now but an increasing amount of time is being spent sharing personal information online. 

Data is permanently archived rather than deleted and storage is moving from personal computers to assorted servers ‘in the cloud’ where our descendents might not be able to access it. The destiny of our digital afterlife is a matter of concern for both individuals as well as the industry in question. 

An initiative called Digital Death Day 2010 held in California and London attempted to address this matter by bringing leaders from businesses of social networking, data management and death care to discuss issues pertaining to digital estate planning.


Crooks Crack mTAN Technique

A customer must confirm every transaction for online banking using a TAN (transaction number). The financial institutions use different procedures for conveying the TAN safely to the customer from the bank. In the case of mTAN (mobile transaction number), the bank sends the TAN via SMS to the stored cell phone number. This procedure, which was apparently the safest propagated procedure, has been cracked by the hackers.

For this the hackers use the banking-based TrojanerZeus. The security service provider S21sec has now invented a new ciariant which goes one step further, a fake version would appear on the browser window when a bank’s page is called.

It’ll ask for a so-called essential update for cell phones, in the form for a firmware. To download this, users need to enter his phone number for the download link to be sent to his phone.

Accessing this link the user inexplicably installs the mobile ZeuS version on the cell phone. Every incoming SMS then will automatically be forwarded to the hacker.

Unauthorised transfers can then be carried out in combination with the PC version. In earlier variations of the crime the crooks could even loot the accounts where they used to send collective bank transfer to the bank server.

Cell phones running Symbian and Blackberry systems are affected. A patch is not available to date. Thus bear in mind that you need to install software for your PC only from reliable sources. Also ensure that you read the bank SMS in detail and compare the number of transfers the account number and with your entries.

Domain Privacy Protection


What is domain privacy protection? Privacy protection is covering your contact information such as full name, mailing address and phone number from publicly available to anyone by replaces with Domain Privacy Protection Service contact details. When buying a domain name the person or organization contact information is necessary to fulfil the registration agreement if not the domain purchasing would be terminate. The domain name registrant information has to be made publicly to everyone via the public WHOIS database as required by ICANN (Internet Corporation for Assigned Names and Numbers) the international governing body for domain names.

Why owner information has to be made publicly? This is because the other user could check and verifying domain ownership. For example, user can checking domain ownership if the domain is transferred or is under investigated for illegal activities on the internet such as banking frauds, used fake identity registration, illegal money transactions or copyright violations.

WHOIS is a public database containing the contact information of all registered and active domains and their owners. By registering a domain name you contact information automatically listed in WHOIS database.

According to ICANN rules and regulations the WHOIS database is public and accessible by anyone that can look up a WHOIS of a domain name including spammers, hackers, identity thieves and all types of scammers.

This became good and free opportunity to spammers, hackers and all types of scammers to use these data for illegal activities. At least you will be exposed to unsolicited commercial emails (SPAM), other junk emails and telemarketing calls.

Domain Privacy Protection is the service that guards domain WHOIS from public view and therefore from unwanted solicitations, scams and worse the identity theft. To avoid this domain owner need protect they contact information before becoming the internet victim.
Privacy Protection ensures that your private information is not published by replacing all your publicly visible contact details with alternate contact information.


Without Protection



With Protection


PRIVACYPROTECT.ORG is providing privacy protection services for domain name to protect the owner from spam and phishing attacks. PrivacyProtect.org is not responsible for any of the activities associated with the domain name. If you wish to report any abuse concerning the usage of the domain name, you may do so at http://privacyprotect.org/contact

History of Business Intelligence

The term of business intelligence (BI) was coined by the Gartner Group in the middle 1990s. However the concept is much older; it has its roots in the Management Information System (MIS) reporting system of the 1970s. During that period reporting system were static, two dimensional and had no analytical capabilities. The concept of executive information system (EIS) emerged in the early 1980s. This concept expanded computerized support to top level managers and executives.

Some of the capabilities introduced were dynamic multidimensional (adhoc or on demand) reporting, forecasting and prediction, trend analysis, drill-down to details, status access and critical success factors. These features appeared in dozens of commercial products until the middle 1990s.
 
Then the same capabilities and some new ones appeared under the name BI. Today a good BI based enterprise information system contains all the information executives need.

The original concept of EIS was transformed into BI. By 2005 BI systems started to include artificial intelligence capabilities as well as powerful analytical capabilities.

Business Intelligence Definitions

Business intelligence (BI) is a technology which is based on data warehouse and it is provides a strategic advantage. BI system has four major components which is that combination of data warehouse, business analytics; a collection of tools for manipulating, mining and analyzing the data in the data warehouse, applications and methodologies.

BI’s major objective is to enable interactive access (sometimes in real-time) to data to enable manipulation of data and give business managers and analysts the ability to conduct appropriate analysis.

By analyzing historical and current data, situations and performances, decisions makers get valuable insight that enable them to make more informed and better decision. The process of BI is based on the transformation of data to information then to decisions and finally to actions.



Decision Makers

In small organizations decisions are often made by individuals especially at lower managerial level. There may be conflicting objectives even for a sole decision maker. A decision maker needs data and detailed analysis and understanding of the data in order to make a good decision. For example, in an investment decision an individual investor may consider the rate of return on the investment, liquidity and safety as objectives. Finally decisions may be fully automated.

Most major decisions in medium sized and large organizations are made by groups. Obviously there are often conflicting objectives in a group decision making setting. Group can be of variable size and may include people from different departments or from different organizations.

Collaborating individuals may have different cognitive styles, personality types and decisions style. Some clash whereas others are mutually enhancing. Therefore the process of decision making by a group can be very complicated. Computerized support system can greatly enhance group decision making.

Decision Making

Decision making is a process of action of selecting the best among alternatives from two or more potential solutions for decision situation which is problem solving or opportunity exploiting and the purposes for attaining a goal or goals. A problem occurs when a system does not meet its established goals, does not yield the predicted results or does not work as planned. Managerial decision making is synonymous with the whole process of management.

Management is a process by which organizational goals are achieved using resources. The resources are considered inputs and attainment of goals is viewed as the output of the process. The success of management depends on the performance of managerial functions such as planning, organizing, directing and controlling.

Let see the managerial function of planning; planning involves a series of decision: what should be done? When? Where? Why? How? Who? Managers are engaged in a continuous of making decisions to perform their roles in organization. Manager is a decision maker.

 
Copyright © 2011. BI Articles and Study Case - All Rights Reserved
Proudly powered by Blogger