You are on page 1of 8

1st Answer

Introduction: Amazon’s predictive analytics engine refers to the most powerful in


the world when it comes to identification of consumer buying behaviour. In today’s
world, where there is an advancement in technology each day, it is considered a risk
to not evolve. The most complex product recommendations as well as mailing list
services by Amazon are some of the most impressive in the world.
Concept and Application:
Predictive analytics refers to the usage of data, statistical algorithms as well as
machine learning techniques in order to identify the likelihood of a future outcome
that is based on historical data.
In the world of marketing, predictive analytics is used in order to determine the
optimal method of reaching out to individual consumers. This is used at various
stages of the sales funnel.
This enables you increase the probability of conversion as well as retention and to
reduce the churn.
Amazon predictive analytics can also be used in order to reverse-engineer past the
experiences of consumers and the actions that led to a positive outcome. This can
be for both the consumer and also for the company.
Amazon can use predictive analytics at each stage of the process of sales. From the
moment a person would become a leader to the time they become a consumer,
predictive analytics would optimize their experience with the company to make them
a loyal follower of the brand.
Predictive analytics during pre-sale stages: The consumer journey would start
well before an individual would open their wallet. At the “lead” stage, an individual
would show more interest in the product or service.
With Predictive analytics, the brand can take into consideration the different aspects
of the existing consumer base to pinpoint the kind of person who would be more
likely to convert to a loyal consumer. It considers the most important characteristics
such as demographics, geographic and psychographic data to analyse the
consumers.
Predictive analytics and qualifying prospects: At this stage, amazon predictive
analytics would take into consideration the segmentation data mentioned above. It
would also consider the supplemental information that the sales team uncovers
during an interaction with the prospect. This extra information would most likely
relate to the method as well as frequency of communication between the team as
well as the prospect.
Predictive analysis during a sale: A sale refers to the most important part where
predictive analytics is possible to be used in order to facilitate two important stages
in order to improve the consumer experience. Amazon predictive analytics is used in
order to create bundles and provide suggested purchases.
How Does Amazon Use Descriptive Analytics?
Descriptive analytics is where the data gets analysed to answer the question of what
is happening? Or what happened. The visualization reports are shared as pie charts,
tables, line graphs, and so on.
Amazon makes use of descriptive analytics in order to generate a graphical
representation of historical data of consumers such as purchases, searches,
reviews, wish lists, cart information, etc. This data would provide Amazon a clear
picture of the probability of a consumer purchasing a product he or she would search
for. It also enables to adjust the price range to enhance the probability of a purchase.
Why do companies stalk their consumers?
One may wonder why Facebook is so easy to stalk. Since citizens wish to get to
know other people and their preferences. The millennials, the digital natives,
generation Y are the young people of today and they are also raised and live online.
It is important to give their data, exchange concerns and even make their images
available.
Organizations not stalking their clients would be left behind: personal is E-bay,
personal is twitter, personal is Google. Most of the top online retailers are small and
enable the shopping experience exclusive to the consumers.
Offline, how? Yes, we could not have had any kind of predictive analytics that has
been changed by the I-Phone. Smartphones fill the gap between the online as well
as the offline behaviours that have been recorded in the records.
Organizations have now started to measure consumer behaviour through the usage
of smartphones and made use of predictive analytics in order to address the needs
and wants of consumers
Amazon, one of the world’s most valuable firms mastered the art of e-commerce and
by targeting you, they achieved so. So, the company gathers, stores, analyses and
manages the data from you depending on the things one is shopping, what they are
spending their money on and where they send their orders to.
Diagnostic Analytics: It refers to the application of analytics to internal data in order
to determine the why behind what occurred. This kind of analytics is used by
businesses in order to gain an in-depth insight into a given problem, provided that
they have enough data at their disposal. Diagnostic analytics enables to identify
anomalies as well as determine casual relationships in data. For instance, E-
commerce giants, such as Amazon is always in a position to drill the sales and gross
profit down to different product categories, such as Amazon Echo to see why they
missed their overall profit margins.
This enables to find applications in healthcare in order to identify the influence of
medications on a particular patient segment with other filters, such as diagnoses as
well as the prescribed medicine.
Conclusion: So, it can be concluded that Amazon makes use of predictive analytics
to predict the consumer sales, diagnostic sales to see the patterns of particular
consumer and descriptive analytics to see where the data gets analysed.

2nd Answer
Introduction: Information, processes, and data are all interconnected in an intricate
web called an information system. They are used in every aspect of business,
industry, and everyday life. In technology, any tool or information system that makes
it easier to collect and use data is an "information system. "Information systems can
be put to use for the benefit of an organization or a person for their own benefit. To
digitally store, manage, organize, and retrieve information, information systems are
straightforward collections of technology tools and procedures. They come in
laptops, smartphones, tablets, software applications, and other sizes and shapes. In
technology, information systems are primarily used as a platform for information
collection and processing. They can be software or hardware, and they use
computer systems for things like data storage and analysis.
The Idea and Its Application:
First IS: Decision support systems are computer programs that look at huge amounts
of data and learn information that can be used to make decisions and solve
problems. These applications are used by businesses and other organizations to
support their decisions, opinions, and actions. Decision support systems, in contrast
to routine operations applications, which merely collect data, analyse and synthesize
data to produce comprehensive information reports. They might present the data
graphically and employ AI or a professional system. Decision support systems help
us make decisions much more quickly than we would otherwise.
1.DSS Database The data in the database come from a lot of different places. It
could be a small database, a standalone system, or a large data warehouse,
depending on the organization's requirements.
2.DSS Software System is made up of mathematical and analytical models that can
be used to look at complicated data. The models predict outputs based on inputs,
conditions, or even combinations of inputs and conditions. There is a possibility that
the decision support system will make use of multiple models, each of which would
serve a distinct purpose. Forecasting models, statistical models, optimization
analysis models, sensitivity models for backward analysis, and forecasting models
are all possibilities.
1.With the help of decision assistance technologies, users can make educated
decisions in a short amount of time.
2.A smaller error margin The output data will be accurate if the data entered into the
system are relevant and accurate.
3.After the systems provide accurate data, top management can clearly
communicate with one another and make decisions.
4. Automation
Your staff will be able to concentrate on more challenging tasks because simple
managerial decisions will be automated.
5.Economical Ness The conventional method of organizing and processing data
necessitates excessive labour. Using a DSS helps cut costs and even reduces
opportunities lost as a result of the manual's delay.
IS Secondary: What exactly is ESS, or the Executive Support System?
The Executive Support System (ESS) is a piece of software that is used by
businesses. It contains data about businesses and gives top management the ability
to make better decisions for the company's benefit. Information from important
departments like scheduling, billing, accounting, and staffing, among others are
handled primarily by ESS.ESS not only makes it easier to get to the data quickly, but
it also helps with systematic data analysis and even helps businesses forecast and
plan for the future. ESS allows executives to spend more time discussing and
making decisions rather than wasting time going through a lot of information to get
the important information by only delivering the necessary data. Both current and
anticipated future data can be viewed and examined using ESS.
In order to achieve the best results, the software can be altered in accordance with
parameters that are determined by the utility.
Some of the advantages of ESS are as follows:
Personal efficiency, organizational control, and superiority over competitors in the
market are all benefits of process automation in management.
centred on the essential management success factors Keep in mind:
Each business must concentrate on its own distinct important factors in order to
achieve the organizational goals. These aspects may be relevant to an individual, a
division, or the entire organization.
Exception Reporting, Trend Analysis, and Status Access: Executives are able to
obtain the most recent data on any important variable thanks to this. The executive
can study data over a specific time period with the assistance of trend analysis.
Consequently, information's timing and significance are crucial. On account of
special case revealing, it is allowable to feature deviations from the laid out standard
in the association, which should likewise incorporate the justification behind the
deviation.
Individualized Evaluation: Built-in functions in EIS are utilized to investigate
challenging circumstances. Leaders can utilize these capabilities to indicate the
information required for the examination as well as the configuration type (how the
outcomes are shown). Navigation of Information: This makes it possible to access a
lot of data in a short amount of time and get accurate results. Examples include
accessing the system from either the forward or backward path, as well as skipping
screens while accessing a particular component.
Conclusion: As a result, it is possible to draw the conclusion that executive support
system is a secondary IS while decision support system is the primary IS.
3rd Answer
3a.
Introduction: Bring a device of your own. The term "bring your own device" (BYOD)
refers to the practice of employees connecting to their workplace networks via
personal devices in order to access work-related systems and potentially confidential
data. Cell phones, PCs, tablets, and USB drives are instances of individual gadgets.
1.Transparency reigns supreme when it comes to BYOD.
In addition, the company's monitoring-related private information protection policy
should be outlined in the policy. The company does not get a "blank check" to
thoroughly examine every aspect of the device when it creates a BYOD policy. The
stated reasons for monitoring must be proportional to the device's monitoring. For
instance, monitoring on weekends may not be appropriate if the monitoring's
objective is to ensure that employees do not waste company time on personal
matters. The company should make sure that employees are aware of and clearly
agree to the Bring Your Own Device (BYOD) policy before approving the employee's
use of a personal device and access to any information stored on that device.
2.Utilizing BYOD (Bring Your Own Device): review, revise, and remind The Bring
Your Own Device (BYOD) policy ought to be a living document that adapts to new
technologies and company requirements. By adhering to "the three Rs," this can be
accomplished:
Make sure that the policy accurately reflects how personal devices are used in the
workplace by reviewing it frequently.
The policy should be updated to take into account new privacy laws and industry
security measures.
Remind workers that they are limited by the BYOD strategy.
Companies should also think about giving employees time to adjust to big changes.
They should also tell employees that if they don't like the policy, they shouldn't use
the device at work and might have to hand it over to IT to make sure the company's
proprietary information is deleted properly and permanently.
3.Exiting BYOD Businesses should also consider whether it is technically possible to
remotely wipe company data from the device and whether such remote wiping would
capture all data, including company confidential data and other employees' personal
data, in the event that an employee refuses to hand over their device. The
employee's device and the company's compliance with the BYOD policy will have a
significant impact on this.
If the company owns the contract with the mobile network provider, consider whether
the employee will be permitted to keep the phone number and whether the employee
will be required to sign a declaration stating that all company information has been
returned or destroyed.
Conclusion: As a result, it is possible to draw the conclusion that each stage of the
Bring Your Own Device (BYOD) policy must be adhered to, and that each stage
must be monitored for employee behaviour in relation to the BYOD policy.
3b.
Introduction: BYOD solutions are becoming more common as more businesses
allow employees to work from home, keep a flexible schedule, or connect while
traveling or working from homebody may be permitted by some businesses, while
others may view it as "shadow IT," which refers to software or hardware that is not
supported by IT.
Security for BYOD devices ought to be incorporated into IT security policies and
acceptable use guidelines. Organizational security and employee privacy must be
balanced by IT leaders when deciding how much support to provide for personal
devices.
BYOD Security Solutions will help you manage your policy.
With the assistance of BYOD security solutions like Forcepoint's CASB (Cloud
Access Security Broker), a BYOD policy can be best implemented and enforced.
Using Forcepoint CASB, an organization can classify and identify cloud apps to
assess access risk and choose which services to allow and monitor. The solution
can also apply unique access and security policies per device by distinguishing
between managed and unmanaged BYOD devices.
Coming up next are a portion of the advantages of permitting representatives to
carry their own gadgets to work:
An increase in employee productivity of 16 percent over a 40-hour workweek* was
found in a study.
Employee job satisfaction and retention have increased as a result of supporting
flexible work arrangements.
As a result of their increased ease and speed with their own devices, employee
productivity has increased.
Technology upgrades are incorporated into the workplace without incurring
hardware, software licensing, or device upkeep costs for IT.
The following drawbacks may affect employees who use personal devices at work:
Employee departures or lost or stolen personal devices could result in data
breaches.
There is no antivirus or firewall software on personal devices.
If the department decides to support personal devices, there could be an increase in
IT costs.
BYOD solutions have the potential to boost employee productivity if there is no
network. However, they do access sensitive data on personal devices that aren't
supported or aren't secured, which opens up network vulnerabilities.
Conclusion: BYOD has advantages as well as drawbacks, but its increasing
prevalence necessitates awareness and proactiveness on the part of all IT
departments. Organizations are increasingly adopting BYOD management policies,
which are essential for addressing what can be a daunting security challenge.

You might also like