Big Data – Productivity, Innovation And Competitiveness

Big Data – Productivity, Innovation And Competitiveness

Big Data – Productivity, Innovation And Competitiveness

Big Data Analytics

Big data refers to datasets that are so large, diverse, and fast-changing which need advanced and unique storage, management, analysis, and visualization technologies.  According to McKinsey, Big Data is “the next frontier for innovation, competition and productivity”.  The right use of Big Data can increase productivity, innovation, and competitiveness for organizations. Inhi Suh, IBM vice president of big data, stated that businesses should place a greater emphasis on analytics projects. In fact, big data analytic is an important step to extract knowledge from a huge amount of data. It is a competitive advantage for most companies.

big-data-1

According to Gupta and Jyoti (2014), “Big data analytics is the process of analysing big data to find hidden patterns, unknown correlations and other useful information that can be extracted to make better decisions”.Agrawal et al. (2011) described the multiple phases in the big data analysis which are Data Acquisition and Recording; Information Extraction and Cleaning; Data Integration, Aggregation, and Representation; Data Modeling and Analysis; and Interpretation. All these phases are crucial and high accuracy in each of these steps will lead to effective big data analytic. In this way, the promised benefits of big data will be achieved.

A wide variety of analytical techniques and technologies can be used to extract useful information from large collections of data. Such information helps companies to gain valuable insights to predict customer behaviour, effective marketing, increased revenue and so on. Maltby (2011) reviewed several literatures on big data analytics and introduced several techniques, such as Machine learning, Data mining, Text analytics, Crowdsourcing, Cluster analysis, Time series analysis, Network analysis, Predictive modelling, Association rule, and Regression, that can be used to extract information from a data set and transform it into an understandable structure for further use . In fact, using data analytic techniques depends on the research objectives/ questions, nature of the data, and the available technologies.

In addition, there are a wide variety of software products and technologies to facilitate big data analytics. EDWs, Visualization products, NoSQL databases, MapReduce & Hadoop, and cloud computing are examples of the more common technologies used in big data analytics. All these techniques and technologies cannot be used for every project or organization. Needs and potential of each organization should be evaluated in order to choosing the appropriate tools for big data analytic.

Studies indicates that data analysis is considerably more challenging than simply locating, identifying, understanding, and citing data. Many researchers believe that the most of the challenges and concerns with data is related to volume and velocity. However, a recent survey conducted by the creator of open source computational database management system on more than 100 data scientist indicates that variety of data sources (not just data volume & velocity) is the main challenge in analysing data. Furthermore, results of this study indicated that Hadoop cannot be a viable solution for some cases that require complex analytics.  It would seem that data analysis is a clear bottleneck in many applications. In line with this idea, Agrawal and his colleagues (2011) reported common challenges in big data analysis: Heterogeneity and Incompleteness of data, Scale, Timeliness, Privacy, error-handling, lack of structure, and visualization. It is recommended that the highlighted challenges should be addressed for effective data analysis.

By Mojgan Afshari

About Mojgan Afshari

Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia.She currently teaches courses in managing change and creativity and statistics in education at the graduate level. Her research areas include teaching and learning with ICT, school technology leadership, Educational leadership, and creativity. She is a member of several professional associations and editor of the Journal of Education. She has written or co-authored articles in the following journals: Journal of Technology, Pedagogy and Education, The Turkish Online Journal of Educational Technology, International Journal of Education and Information Technologies, International Journal of Instruction, International Journal of Learning, European Journal of Social Sciences, Asia Pacific Journal of Cancer Prevention, Life Science Journal, Australian Journal of Basic and Applied Sciences, Scientific Research and Essays.

View All Articles

One Response to Big Data – Productivity, Innovation And Competitiveness

  1. Given the amount of data churning up every second (and the velocity rapidly transforming to acceleration on this count) its only worthwhile to forcibly set some time aside for understanding the details of big data information analytics, data archiving, discovery, content management, data protection and marketing optimization (more here:goo.gl/wBzcmz). Without proper big data vision, this could soon become a ‘price’ to an enterprise rather than a cost and reward situation.

Comic
The Annual Compliance & Ethics Institute:  Hot Topics – Cyber Security, Big Data, Privacy Breach Response

The Annual Compliance & Ethics Institute: Hot Topics – Cyber Security, Big Data, Privacy Breach Response

Cyber Security, Big Data, Privacy Breach Response MINNEAPOLIS, Aug. 30, 2016 /PRNewswire-USNewswire/ — Cyber security, social media, modern slavery, anti-corruption, export controls and sanctions, and privacy top the list of “Hot Issues” compliance and ethics professionals face each day. These and many other compliance and ethics concerns will be addressed at the 2016 Compliance & Ethics…

Top 5 Digital Health Trends

Top 5 Digital Health Trends

Digital Health Trends It is very important to keep up with the changing technology. However, it is also just as important to advance the consumer experience, care delivery methods and create opportunities for career development for the healthcare workforce. Five trends that are proven to be effective in winning in the digital age have been…

Technological Advances In The Healthcare Industry

Technological Advances In The Healthcare Industry

The Healthcare Industry The use of smart devices in healthcare is expanding, and according to a report by Technavio the global smart wearable healthcare device and services market will show a compounded annual growth rate of over 18%. Thanks to modern medicine, lifespans are increasing, resulting in aging populations and a higher frequency of chronic…

How Secure Is Your School Campus Network?

How Secure Is Your School Campus Network?

School Networks School related networks are one of the most attacked sectors today, coming in third worldwide to healthcare and retail. Because of the ever growing threat of cybercrime, IT professionals everywhere aren’t thinking in terms of “what if our network gets attacked?” Now, they think in terms of “when will our network be attacked?”…

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership More than 500 new clients, including Marriott International are now running VMware software on IBM Cloud since the strategic cloud partnership was announced;Introduction of VMware Cloud Foundation on IBM Cloud helps move existing apps to the cloud within hours; More than 4,000 IBM service professionals trained to help organizations extend…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where they need some work. With big data analytics, every move you make for your company can be backed by data and analytics. While every business venture involves some level of risk, with big data, that risk…

5 Things To Consider About Your Next Enterprise File Sharing Solution

5 Things To Consider About Your Next Enterprise File Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Cloud Infographic: IoT For Automotive Deconstructed

Cloud Infographic: IoT For Automotive Deconstructed

IoT For Automotive Deconstructed The IoT automotive industry is moving rapidly with many exciting growth opportunities available. We’ve written about some of the risks and benefits as well as some of the players involved. One thing for certain as that the auto industry is starting to take notice and we can expect the implementation of a…

Cloud Infographic – Cloud Computing And SMEs

Cloud Infographic – Cloud Computing And SMEs

Cloud Computing And SMEs SMEs (Small/Medium Sized Enterprises) make up the bulk of businesses today. Most cloud based applications created today are geared toward the SME market. Accounting, Storage, Backup services are just a few of them. According to the European Commission, cloud based technology could help 80% of organisations reduce costs by 10-20%. This infographic provided…

The Business of Security: Avoiding Risks

The Business of Security: Avoiding Risks

The Business of Security Security is one of those IT concerns that aren’t problematic until disaster strikes. It might be tomorrow, it could be next week or next year. The fact is that poor security leaves businesses wide open for data loss and theft. News outlets just skim the surface, but hackers cost business up…

The Internet of Things Lifts Off To The Cloud

The Internet of Things Lifts Off To The Cloud

The Staggering Size And Potential Of The Internet of Things Here’s a quick statistic that will blow your mind and give you a glimpse into the future. When you break that down, it translates to 127 new devices online every second. In only a decade from now, every single vehicle on earth will be connected…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…