Professional Documents
Culture Documents
Summary:
Description of Technology or Terms:
1. Structured data: When we talk about structured data we refer to data that can be
identified with no delay in an electronic structure, for example a database
2. Unstructured Data: On the other hand unstructured data is the one that is more
difficult to identify due to the fact that it is not organized in a pre-defined manner
3. Text Analysis Software: Or a text mining software is used to discover patterns
and relationships from large sets of unstructured data.
149113
Raul Pacheco Rodriguez
negative response it will show the main reasons for this. As a manager you can
then clearly see what you need to improve in your process and make the
necessary adjustments to satisfy the needs of your customers. Or in the other hand
you can observe the positive feedback of the client in order to reinforce your
competitiveness.
Question 3: What kinds of companies are most likely to benefit from text
mining software? Explain your answer.
Answer 3: In a certain degree all companies benefits from text mining software.
But the one who benefits the most are probably the one that have direct contacts
with their clients on a daily basis such hotel chains or any companies in the
touristic sectors. They benefit the most because they get this kind of feedback daily
and their need to make fast improvements is higher than other companies every
day new customers arrive and if you dont improve fast unsatisfied customers will
spread the word quickly and in this competitive environment adapting quickly is the
key of success or failure.
Question 4: In what ways could text mining potentially lead to the erosion of
personal information privacy? Explain.
Answer 4: Unstructured data is found all around the web especially in social
networks such as face book or twitter. Text mining can be used to identify certain
tendencies of people by applying this software on their personal information .This
wont stop here if
on social networks
companies wont stop and they are going to violate users personal information for
example in their text messages to seek tendencies that they can benefit of. That
means every single file, message; tweet or commentary could be exploited and be
potentially analyzed by text mining software.
149113
Raul Pacheco Rodriguez
References:
Laudon, J & Laudon, K. (2012). Management Information Systems. New
York: Pearson.
Grimes,S. (2005). Structure, Models and Meaning. 14 de Octubre del 2015,
de Informationweek Sitio
web:http://www.informationweek.com/software/informationmanagement/structuremodels-and-meaning/d/d-id/1030187?