2021 12th International Conference on E-business, Management and Economics / / Yongan Zhang |
Autore | Cheung Rickey |
Pubbl/distr/stampa | New York, NY : , : Association for Computing Machinery, , 2021 |
Descrizione fisica | 1 online resource (882 pages) : illustrations |
Disciplina | 658.472 |
Collana | ACM international conference proceedings series |
Soggetto topico |
Business intelligence
Electronic commerce |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910514187503321 |
Cheung Rickey
![]() |
||
New York, NY : , : Association for Computing Machinery, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin |
Autore | Samygin-Cherkaoui Anastasia |
Pubbl/distr/stampa | [Place of publication not identified] : , : 50Minutos.es, , 2016 |
Descrizione fisica | 1 online resource (22 pages) |
Disciplina | 658.472 |
Soggetto topico | Business intelligence |
ISBN | 2-8062-7489-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | spa |
Record Nr. | UNINA-9910796679703321 |
Samygin-Cherkaoui Anastasia
![]() |
||
[Place of publication not identified] : , : 50Minutos.es, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Las 7S de McKinsey / / por Anastasia Samygin-Cherkaoui ; en colaboracion con Anne-Christine Cadiat ; traducido por Laura Bernal Martin |
Autore | Samygin-Cherkaoui Anastasia |
Pubbl/distr/stampa | [Place of publication not identified] : , : 50Minutos.es, , 2016 |
Descrizione fisica | 1 online resource (22 pages) |
Disciplina | 658.472 |
Soggetto topico | Business intelligence |
ISBN | 2-8062-7489-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | spa |
Record Nr. | UNINA-9910822192603321 |
Samygin-Cherkaoui Anastasia
![]() |
||
[Place of publication not identified] : , : 50Minutos.es, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
AI Meets BI : Artificial Intelligence and Business Intelligence / / Lakshman Bulusu, Rosendo Abellera |
Autore | Lakshman Bulusu |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Boca Raton : , : Auerbach Publications, , 2020 |
Descrizione fisica | 1 online resource (241 pages) |
Disciplina | 658.472 |
Soggetto topico | Business intelligence - Data processing |
ISBN |
1-00-312208-6
1-000-28195-7 1-003-12208-6 1-000-28193-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1 Introduction; Chapter 2 AI and AI-Powered Analytics; Chapter 3 Industry Uses Cases of Enterprise BI--A Business Perspective; Chapter 4 Industry Use Cases of Enterprise BI--The AI-Way of Implementation; Chapter 5 What's Next in AI Meets BI? |
Record Nr. | UNINA-9910860853103321 |
Lakshman Bulusu
![]() |
||
Boca Raton : , : Auerbach Publications, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Beginning Power BI with Excel 2013 [[electronic resource] ] : Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map / / by Dan Clark |
Autore | Clark Dan |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014 |
Descrizione fisica | 1 online resource (309 p.) |
Disciplina | 658.472 |
Collana | The expert's voice in business intelligence Beginning power BI with Excel 2013 |
Soggetto topico |
Microsoft software
Microsoft .NET Framework Computers Microsoft and .NET Information Systems and Communication Service |
ISBN | 1-4302-6446-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents at a Glance; Contents; About the Author; About the Technical Reviewers; Acknowledgments; Introduction; Part 1: Building Models in Power Pivot; Chapter 1: Introducing Power Pivot; Why Use Power Pivot?; The xVelocity In-memory Analytics Engine; Enabling Power Pivot for Excel; Exploring the Data Model Manager Interface; Summary; Chapter 2: Importing Data into Power Pivot; Importing Data from Relational Databases; Importing Data from Text Files; Importing Data from a Data Feed; Importing Data from an OLAP Cube; Reusing Existing Connections to Update the Model; Summary
Chapter 3: Creating the Data ModelWhat Is a Data Model?; Creating Table Relations; Creating a Star Schema; Understanding When to Denormalize the Data; Creating Linked Tables; Creating Hierarchies; Making a User-Friendly Model; Summary; Chapter 4: Creating Calculations with DAX; What Is DAX?; Implementing DAX Operators; Working with Text Functions; Using DAX Date and Time Functions; Using Informational and Logical Functions; Getting Data from Related Tables; Using Math, Trig, and Statistical Functions; Tips for Creating Calculations in Power Pivot; Summary Chapter 5: Creating Measures with DAXMeasures versus Attributes; Creating Common Aggregates; Mastering Data Context; Altering the Query Context; Using Filter Functions; Creating KPIs; Summary; Chapter 6: Incorporating Time Intelligence; Date-Based Analysis; Creating a Date Table; Time Period-Based Evaluations; Shifting the Date Context; Using Single Date Functions; Creating Semi-additive Measures; Summary; Chapter 7: Data Analysis with Pivot Tables and Charts; Pivot Table Fundamentals; Slicing the Data; Adding Visualizations to a Pivot Table; Working with Pivot Charts Using Multiple Charts and TablesUsing Cube Functions; Summary; Part 2: Building Interactive Reports and Dashboards with Power View; Chapter 8: Optimizing Power Pivot Models for Power View; Visualizing Data with Power View; Creating a Basic Report; Improving the Power View Experience; Summary; Chapter 9: Creating Standard Visualizations with Power View; Creating Tables and Matrices; Constructing Bar, Column, and Pie Charts; Building Line and Scatter Charts; Creating Map-Based Visualizations; Summary; Chapter 10: Creating Interactive Dashboards with Power View Linking Visualizations in Power ViewUsing Tiles to Organize the Data; Filtering Groups and Views; Exposing the Dashboard; Summary; Part 3: Exploring and Presenting Data with Power Query and Power Map; Chapter 11: Data Discovery with Power Query; Discovering and Importing Data; Transforming, Cleansing, and Filtering Data; Merging and Shaping Data; Grouping and Aggregating Data; Inserting Calculated Columns; Summary; Chapter 12: Geospatial Analysis with Power Map; Preparing Data for Mapping; Creating a Map-Based Graph; Creating Heat and Region Maps; Adding Multiple Layers to a Power Map Analyzing Changes over Time |
Record Nr. | UNINA-9910300460703321 |
Clark Dan
![]() |
||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer |
Autore | Wimmer Bruce |
Edizione | [First edition.] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Elsevier, , [2015] |
Descrizione fisica | 1 online resource (210 p.) |
Disciplina | 658.472 |
Soggetto topico | Business intelligence |
ISBN |
0-12-420059-1
0-12-420054-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. FBI; Summary; Chapter 3: High-Threat Locations for Business Espionage
Asia-PacificLatin America; Europe; Africa; Middle East; More Examples; Business Espionage in/from Greater China; Business Espionage in Singapore; Business Espionage in Vietnam; Korea, Japan, and India; Business Espionage in Latin America; United States; Vulnerabilities Identified in Examples; Summary; Chapter 4: Espionage by Electronic Means; Introduction; Cases of Electronic Eavesdropping; Vulnerabilities Identified; Summary; Chapter 5: Espionage by Force: Physical Theft or Other Appropriation; Introduction; Cases of Business Espionage by Physical Theft or Other Appropriation Vulnerabilities IdentifiedSummary; Chapter 6: Facing Espionage While Traveling; Introduction; Cases of Travelers Becoming Victims of Business Espionage; Vulnerabilities Identified; Conclusion; Chapter 7: Insider Threat; Introduction; Cases of Insider Espionage; Vulnerabilities Identified; Summary; Part 2: Business Espionage Countermeasures; Chapter 8: Protecting Your Most Critical Resources; Focus on protecting the most critical information and resources; Chapter 9: Physical and Personnel Security Countermeasures; Introduction; Business Espionage Security Awareness Training Key Elements of a Good Employee Counterespionage Education and Awareness ProgramBusiness Espionage Reporting Program; Travel Security Program that Includes Business Espionage Threat; Executive Protection; Clear, Demonstrated Senior Leadership Support; Identifying and Properly Classifying Sensitive Information; Include in Business Continuity/Disaster Recovery Plans; Conduct a Holistic Risk Assessment; Well-Constructed, Comprehensive Security Policies and Procedures; Create a Specific and Focused Information Protection Team Do Comprehensive Due Diligence of Partners, Suppliers, Vendors, and ClientsBe Involved in Office/Site Location Selection; Conduct Background Investigations/Personnel Security; Address Resignations and Terminations; Access controls; Secure Storage and Locks; Importance of Information Security Manager(s) as Program Contacts; Document and Material Destruction/Trash Controls; Control of Office Machines; Pro-Active Prevention Monitoring; Use of Tiger and Red Team Testing; Non-Disclosure, Non-Compete, and Other Legal Agreements; Limiting Where/How Company Information Can Be Worked On or Discussed Develop Special Measures for Marketing and Sales Staff |
Record Nr. | UNINA-9910796901903321 |
Wimmer Bruce
![]() |
||
Waltham, Massachusetts : , : Elsevier, , [2015] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Business espionage : risk, threats, and countermeasures / / Bruce Wimmer |
Autore | Wimmer Bruce |
Edizione | [First edition.] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Elsevier, , [2015] |
Descrizione fisica | 1 online resource (210 p.) |
Disciplina | 658.472 |
Soggetto topico | Business intelligence |
ISBN |
0-12-420059-1
0-12-420054-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. FBI; Summary; Chapter 3: High-Threat Locations for Business Espionage
Asia-PacificLatin America; Europe; Africa; Middle East; More Examples; Business Espionage in/from Greater China; Business Espionage in Singapore; Business Espionage in Vietnam; Korea, Japan, and India; Business Espionage in Latin America; United States; Vulnerabilities Identified in Examples; Summary; Chapter 4: Espionage by Electronic Means; Introduction; Cases of Electronic Eavesdropping; Vulnerabilities Identified; Summary; Chapter 5: Espionage by Force: Physical Theft or Other Appropriation; Introduction; Cases of Business Espionage by Physical Theft or Other Appropriation Vulnerabilities IdentifiedSummary; Chapter 6: Facing Espionage While Traveling; Introduction; Cases of Travelers Becoming Victims of Business Espionage; Vulnerabilities Identified; Conclusion; Chapter 7: Insider Threat; Introduction; Cases of Insider Espionage; Vulnerabilities Identified; Summary; Part 2: Business Espionage Countermeasures; Chapter 8: Protecting Your Most Critical Resources; Focus on protecting the most critical information and resources; Chapter 9: Physical and Personnel Security Countermeasures; Introduction; Business Espionage Security Awareness Training Key Elements of a Good Employee Counterespionage Education and Awareness ProgramBusiness Espionage Reporting Program; Travel Security Program that Includes Business Espionage Threat; Executive Protection; Clear, Demonstrated Senior Leadership Support; Identifying and Properly Classifying Sensitive Information; Include in Business Continuity/Disaster Recovery Plans; Conduct a Holistic Risk Assessment; Well-Constructed, Comprehensive Security Policies and Procedures; Create a Specific and Focused Information Protection Team Do Comprehensive Due Diligence of Partners, Suppliers, Vendors, and ClientsBe Involved in Office/Site Location Selection; Conduct Background Investigations/Personnel Security; Address Resignations and Terminations; Access controls; Secure Storage and Locks; Importance of Information Security Manager(s) as Program Contacts; Document and Material Destruction/Trash Controls; Control of Office Machines; Pro-Active Prevention Monitoring; Use of Tiger and Red Team Testing; Non-Disclosure, Non-Compete, and Other Legal Agreements; Limiting Where/How Company Information Can Be Worked On or Discussed Develop Special Measures for Marketing and Sales Staff |
Record Nr. | UNINA-9910827894803321 |
Wimmer Bruce
![]() |
||
Waltham, Massachusetts : , : Elsevier, , [2015] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi |
Autore | Fakir Mohamed |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (301 pages) |
Disciplina | 658.472 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Business intelligence
Business intelligence - Data processing |
ISBN | 3-031-06458-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996475765503316 |
Fakir Mohamed
![]() |
||
Cham, Switzerland : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Business intelligence : 7th International Conference, CBI 2022, Khouribga, Morocco, May 26-28, 2022, Proceedings / / Mohamed Fakir, Mohamed Baslam, and Rachid El Ayachi |
Autore | Fakir Mohamed |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (301 pages) |
Disciplina | 658.472 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Business intelligence
Business intelligence - Data processing |
ISBN | 3-031-06458-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910568289703321 |
Fakir Mohamed
![]() |
||
Cham, Switzerland : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Business intelligence : the savvy manager's guide / / David Loshin |
Autore | Loshin David <1963-> |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Waltham, Mass., : Morgan Kaufmann, c2012 |
Descrizione fisica | 1 online resource (401 p.) |
Disciplina |
658.4/72
658.472 |
Collana | The Savvy Manager's Guides |
Soggetto topico |
Business intelligence
Information technology - Management Management information systems |
ISBN | 0-12-385890-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Business Intelligence; Copyright; Contents; Preface; Introduction; What This Book Is; Why You Should Be Reading This Book; Organization of the Book; Our Approach to Knowledge Transfer; Contact Me; Acknowledgements; Foreword; Chapter 1- Business Intelligence and Information Exploitation; Improving the Decision-Making Process; Why a Business Intelligence Program?; Taking Advantage of the Information Asset; Business Intelligence and Program Success; Business Intelligence Defined; Actionable Intelligence; The Analytics Spectrum; Taming the Information Explosion; Considerations
Continuing Your Business Intelligence Education End notes; Chapter 2 -The Value of Business Intelligence; Value Drivers and Information Use; Performance Metrics and Key Performance Indicators; Using Actionable Knowledge; Horizontal Use Cases for Business Intelligence; Vertical Use Cases for Business Intelligence; Business Intelligence Adds Value; Chapter 3 -Planning for Success; Introduction; Organizational Preparedness for Business Intelligence and Analytics; Initial Steps in Starting a Business Intelligence Program; Bridging the Gaps Between Information Technology and the Business Users Knowing the Different Types of Business Intelligence Users Business Intelligence Success Factors: A Deeper Dive; More on Building Your Team; Strategic Versus Tactical Planning; Summary; End notes; Chapter 4 -Developing Your Business Intelligence Roadmap; A Business Intelligence Strategy: Vision to Blueprint; Review: The Business Intelligence and Analytics Spectrum; The Business Intelligence Roadmap: Example Phasing; Planning the Business Intelligence Plan; Chapter 5 -The Business Intelligence Environment; Aspects of a Business Intelligence and Analytics Platform and Strategy The Organizational Business Intelligence Framework Services and System Evolution; Management Issues; Additional Considerations; Chapter 6 -Business Processes and Information Flow; Analytical Information Needs and Information Flows; Information Processing and Information Flow; The Information Flow Model; Practical Use; Modeling Frameworks; Management Issues; Deeper Dives; Chapter 7 -Data Requirements Analysis; Introduction; Business Uses of Information; Metrics: Facts, Qualifiers, and Models; What is Data Requirements Analysis?; Assessing Suitability; Summary Chapter 8 -Data Warehouses and the Technical Business Intelligence Architecture Introduction; Data Modeling and Analytics; The Data Warehouse; Analytical Platforms; Operational Data Stores; Management; Do You Really Need a Data Warehouse?; Summary; Chapter 9 -Metadata; What is Metadata?; The Origin and Utility of Metadata; Types of Metadata; Semantic Metadata Processes for Business Analytics; Further Considerations; Using Metadata Tools; Establishing Usability of Candidate Data Sources; Data Profiling Activities; Data Model Inference; Attribute Analysis; Relationship Analysis Management Issues |
Record Nr. | UNINA-9910816523503321 |
Loshin David <1963->
![]() |
||
Waltham, Mass., : Morgan Kaufmann, c2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|