Bookmarks Project

This section represents the contributions of our students to the resources for classes. In each class, students have been asked identify a website or web resource that may be useful to others taking the course or to those interested in a related subject area. The "bookmarks" are then submitted with explanations of the value the contributors believe they represent. Over time, this area offer the collective efforts of students who quite often are the best sources for classroom material.

GMAN 504 Data Analysis for Business


Display #
Bookmark Description Created By Date Created
This article sheds light on the utility of "Big Data."  Workday, Inc; an on-demand financial management and human capital management software verdor has created predictive analytics apps.  One such app, Insight Applications, will be aimed at helping managers predict business trends and make better HR and financial decisions.  This article highlights one such use for the app, which will enable employers to best understand when an employee might be looking to leave and provides suggestions as to how it can best suggest roles that might entice that employee to stay. Amber Knighten Saturday, 24 January 2015
Tarah OrnelasGMAN 504 January 19th, 2015 Statistics in the news – “Deaths by medical mistakes hit records” I found this article very interesting in the fact that it highlights the severity of human error in the medical field. To think that over 400,000 people annually are dying from preventable issues, and that is is costing the nation $1 trillion each year is atrocious. I can’t imagine being the woman who underwent a bilateral mastectomy only to find out post surgery that there was a mix-up with the labs and she didn’t even have cancer. I am going to let that soak in for a minute. The fact that the medical community regularly invests in technology, and there is a constant stream of reporting for every aspect of the medical community, means there should be MORE done with this data. The data algorithms can be written to analyze test results, compare data points for patterns or outliers, and even for simple follow up or routine tasks. If we have this ability out there, then why aren’t we using it to prevent these costly errors? Enough lives are lost due to car accidents and illnesses, we shouldn’t have to worry about a doctor making a mistake that could cost us our lives, when it is preventable. I understand the with the simple fact that there are humans in the medical field, there will be human error, but this number can drastically be reduced with the proper implementation, use, and reporting of statistical analyses.     Presentation: Article Source URL:   Tarah Ornelas Wednesday, 28 January 2015
Yesterday, the Wall Street Journal reported the release of the Federal Trade Commission’s (FTC) report on limiting data collection with increasing amount of “Internet of Things” products being produced. In this report, the FTC has come up with a number of recommendations in a number of topics including: limiting data collection by companies, measures to ensure security of personal information, and making sure consumers are aware that they are opting in for data retrieval with their new purchases. This is not the first time this issue has been addressed; these recommendations were brought up last year in the Whitehouse’s report on big data. A growing concern for many consumers is the security of this data. Today we live in a world where a growing amount of data is being collected about us everyday day. iPhone 6s now calculate the number of steps and miles people are walking each day, baby monitors are becoming web based, and house temperature can be controlled by an app, among many other things. “Researchers are beginning to show that existing smartphone sensors can be used to infer a user’s mood: stress levels; personality type; bipolar disorder; demographics; smoking habits; and overall being.” There is so much data and information being generated about people all over the world, that it’s overwhelming and scary. How much data is too much data? How can we make sure that all of our data is being kept secure from hackers? Who will ensure our safety? There are so many questions with this new, quick-changing era of technology that have yet to be answered. Justine Meza Wednesday, 28 January 2015
Two articles were in the January 24th edition of the Economist, "How to catch the overfisherman"(pg 12) and "Dragnet"(pg70). These articles focus on the worldwide problem with overfishing and the state of the worlds oceans.  Since enforcement is difficult, time consuming and expensive, an alternative is needed in order to provide a solution. A new live satellite based monitoring system was developed by Satellite Applications Catapult with funding from The Pew Charitable Trust. It was recently launched and uses information gathered from AIS and VMS transponders on fishing vessels in addition to satellite information and other available sources. Information such as vessel country of origin, speed and direction of travel, history, ownership and links to other vessels is obtained. The information is then gathered, linked, cross checked and analyzed using algorithms to flag abnormalities to trigger further analysis. The information is then used to create a map that is a virtual real time view of fishing vessels. It allows for ease of enforcement in remote locations and reduces cost and time needed. The system also allows for technology updates with future use of drones or nanosats. The rollout began with Chile (Easter Island), Palau, and certain UK overseas territories. Noelle Ortland Wednesday, 04 February 2015
This WSJ article tells the story of KPMG auditors that identified fraud in refund checks issued out of a nationwide call center.  The KPMG auditors used Benfords Law to identify anomolies in the data to determine where they should focus their efforts.  Benfords law states that more numbers in a population/sample will begin with the number one than any other number, and each successive number decreasing in proportion.  What the KPMG auditors found was that there were more refund checks beginning with the number four than number one.  This would suggest the data had a number of refunds issued in teh $40 range, which is right below the $50 threshhold. The KPMG auditors found hundreds of thousands of dollars in fraudulent refunds issued by the call center.  Benfords law can be applied to many samples/populations of data to identify anomolies.  This website tests Benford's law against various datasets: Victoria Melucci Wednesday, 18 February 2015
I selected to present on big data and its potential effectiveness in the wealth and investment management industry. In an ever-evolving business, the application of big data can propel large brokerage firms with existing market power to increase its wallet share and profitability. Time is one of the most valuable assets to any company. The classic model required financial advisors to proactively engage with existing and prospective clients. Incorporating the benefits of big data, advisors can understand client behaviors, learn of their life events, and maintain a more streamlined and profitable business than ever. Firms can offer more client-centric products and services, better understand the client’s needs and goals, and maintain consistency with compliance and risk. As the American population nears retirement (with many inadequately prepared), firms can increase presence and provide catered solutions for clients. Barclay Kung Sunday, 22 February 2015
Here are some really great ways that big data is used in Healthcare to gain knowledge and know the area of concentration.You can find information about a lot of different fields, not just Healthcare. I hope you enjoy it. Fatme Djudjo Friday, 20 March 2015
This presentation explains the new role of Big Data Analytics and how it applies to Information Technology Security Intellegence (ITSI). Specifically, the presentation discusses the definition of Big Data, why it's an appropriate application for Information Technology Security Intellegence, ITSI data inputs, supported security models, examples of Big Data application in the ITSI world and future challanges. The cited source for this presentation is an RSA brief entitled "Big Data Fuels Intelligence-Driven Security"  Currey, et al, January 2013. Peter Marston Monday, 23 March 2015