SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Chapter – 12 Notes Research Methods (KJAN) Summer Quarter 2014
1
Quantitative Data Analysis: Hypothesis Testing: Based on Data
All analytical tests will be performed in the class when students will bring the data for their projects.
1. Measures of Central Location
 Mean, Median, Mode
2. Measures of Variability
 Range, Standard Deviation, Variance, Coefficient of Variation
3. Measures of Relative Standing
 Percentiles, Quartiles
4. Measures of Linear Relationship
 Covariance, Correlation, Least Squares Line
Notation
When referring to the number of observations in a population, we use uppercase letter N When
referring to the number of observations in a sample, we use lower case letter n The arithmetic mean for
a population is denoted with Greek letter “mu”: The arithmetic mean for a sample is denoted with an
“x-bar”:
Information Needs of Business: To run a business, useful, timely, accurate, reliable, and valid
data are needed. When data in their raw from are evaluated, analyzed, and synthesized, useful
information becomes available to managers that helps them make good business decisions.
Information gathering, communicating, and decision making go hand in hand.
The methods used to gather, analyze, and synthesize information from the external and internal
environments are becoming more and more sophisticated owing to the immense scope of technology,
which makes possible timely and efficient research vital to the survival of companies.
Data Warehousing, Data Mining and Operations Research:
Data Warehousing: A data warehouse that serves as the central repository of all data collected
from different sources including those pertaining to the company’s finance, manufacturing, sales, and
the like. The data warehouse is usually built from data collected through the different departments of
the enterprise and can be accessed through various on-line analytical processing (OLAP) tools to
support decision making. Data warehousing can be described as the process of extracting, transferring,
and integrating data spread across multiple external databases and even operating systems.
Data Mining: Data mining is a strategic tool for reaching new levels of business intelligence. Using
algorithms to analyze data in a meaningful way, data mining more effectively leverages the data
warehouse by identifying hidden relations and patterns in the data stored in it. Such “mined” data
pertaining to the vital areas of the organization can be easily accessed and used for different purposes.
Chapter – 12 Notes Research Methods (KJAN) Summer Quarter 2014
2
Operations Research: Operation research (OR) or management sciences (MS) is another
sophisticated tool used to simplify and thus clarify certain types of complex problems that lend
themselves to quantification. OR uses higher mathematics and statistics to identify, analyze, and
ultimately solve intricate problems of great complexity faced by the manager. Areas of problem
solving that easily lend to OR include those relating to inventory, queuing, sequencing, routing, and
search and replacement.
Management Information Systems (MIS), Decision Support System, the Executive Information
System, and the Expert System, are good decision making aids. A good information system collects,
mines, and provides a wide range of pertinent information relating to aspects of both the external and
internal environments of the organization.
International Dimensions of Cyberspace: Cyberspace is not free of geographical boundaries
or cultural issues. Foreign governments can use the firewall and filtering technology to deter computer
hackers. Unregulated cyberspace is a mythical notion. Local laws do indeed govern what can and
cannot appear in cyberspace. Copyright laws can also be deemed to be broken.
Data Storage and Surveillance:
Storage of Databases: Data is the lifeblood of companies and should be mirrored live in at least
two other locations, or at least backed up on tape and stored in other remote locations.
Data Security: Increasingly, organizations and their information systems are faced with security
threats that include computer hacking, Internet fraud, and sabotage, from a wide range of sources.
Computer viruses, and computer hacking are the incessant threats and ever-present danger. To protect
information from a variety of threats, digital IDs and firewalls are a few of the security measures used
to prevent fraud and unauthorized use. Authentication, authorization, and encryption are some basic
security methodologies employed to prevent unauthorized people from having access.
Managerial Advantage of Technological Advancements: Information technology and the
development of software to gather, store, and analyze information—are registering advances at an
exponential rate. It is important for managers to take full advantage of information technology and
keep current on the latest innovations. Software technology can be put to effective use in the research
process for problem identification, theory building, and collecting data from respondents, analyzing it,
and presenting the results. Technology is not, however, without its drawbacks.
Chapter – 12 Notes Research Methods (KJAN) Summer Quarter 2014
3
Ethics in Handling Information Technology: Although technology offers unbounded
opportunities for organizations and facilitates decision making at various levels, it also imposes certain
obligations on the part of its users.
1. It is important that the privacy of all individuals is protected. Businesses have to
balance their information needs against the individual rights.
2. Companies also need to ensure that confidential information relating to individuals is
protected.
3. Care should be taken to ensure that incorrect information is not distributed across the
many different files of the company.
4. Those that collect data for the company should be honest, trustworthy, and careful in
obtaining and recording the data in a timely fashion.

Contenu connexe

Tendances

IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...IRJET Journal
 
Missing Data and data imputation techniques
Missing Data and data imputation techniquesMissing Data and data imputation techniques
Missing Data and data imputation techniquesOmar F. Althuwaynee
 
Final Report
Final ReportFinal Report
Final Reportimu409
 
Exploratory data analysis
Exploratory data analysisExploratory data analysis
Exploratory data analysisgokulprasath06
 
Experimental designs and data analysis in the field of Agronomy science by ma...
Experimental designs and data analysis in the field of Agronomy science by ma...Experimental designs and data analysis in the field of Agronomy science by ma...
Experimental designs and data analysis in the field of Agronomy science by ma...Manoj Sharma
 
Research Method for Business chapter 11-12-14
Research Method for Business chapter 11-12-14Research Method for Business chapter 11-12-14
Research Method for Business chapter 11-12-14Mazhar Poohlah
 
Classification Scoring for Cleaning Inconsistent Survey Data
Classification Scoring for Cleaning Inconsistent Survey DataClassification Scoring for Cleaning Inconsistent Survey Data
Classification Scoring for Cleaning Inconsistent Survey DataCSCJournals
 
Ppt evaluation of information retrieval system
Ppt evaluation of information retrieval systemPpt evaluation of information retrieval system
Ppt evaluation of information retrieval systemsilambu111
 
Data Science - Part XI - Text Analytics
Data Science - Part XI - Text AnalyticsData Science - Part XI - Text Analytics
Data Science - Part XI - Text AnalyticsDerek Kane
 
Step by Step guide to executing an analytics project
Step by Step guide to executing an analytics projectStep by Step guide to executing an analytics project
Step by Step guide to executing an analytics projectRamkumar Ravichandran
 
Assess data reliability from a set of criteria using the theory of belief fun...
Assess data reliability from a set of criteria using the theory of belief fun...Assess data reliability from a set of criteria using the theory of belief fun...
Assess data reliability from a set of criteria using the theory of belief fun...IAEME Publication
 
Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Benchmarks for Evaluating Anomaly Based Intrusion Detection SolutionsBenchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Benchmarks for Evaluating Anomaly Based Intrusion Detection SolutionsIJNSA Journal
 
PREDICTING BANKRUPTCY USING MACHINE LEARNING ALGORITHMS
PREDICTING BANKRUPTCY USING MACHINE LEARNING ALGORITHMSPREDICTING BANKRUPTCY USING MACHINE LEARNING ALGORITHMS
PREDICTING BANKRUPTCY USING MACHINE LEARNING ALGORITHMSIJCI JOURNAL
 
The role of NLP & ML in Cognitive System by Sunantha Krishnan
The role of NLP & ML in Cognitive System by Sunantha KrishnanThe role of NLP & ML in Cognitive System by Sunantha Krishnan
The role of NLP & ML in Cognitive System by Sunantha Krishnansunanthakrishnan
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learniVenkat Projects
 
Twala2007.doc
Twala2007.docTwala2007.doc
Twala2007.docbutest
 
Data Analytics all units
Data Analytics all unitsData Analytics all units
Data Analytics all unitsjayaramb
 
Big data analytics in financial market
Big data analytics in financial marketBig data analytics in financial market
Big data analytics in financial marketeSAT Journals
 

Tendances (19)

IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
 
Missing Data and data imputation techniques
Missing Data and data imputation techniquesMissing Data and data imputation techniques
Missing Data and data imputation techniques
 
Final Report
Final ReportFinal Report
Final Report
 
Exploratory data analysis
Exploratory data analysisExploratory data analysis
Exploratory data analysis
 
Experimental designs and data analysis in the field of Agronomy science by ma...
Experimental designs and data analysis in the field of Agronomy science by ma...Experimental designs and data analysis in the field of Agronomy science by ma...
Experimental designs and data analysis in the field of Agronomy science by ma...
 
Research Method for Business chapter 11-12-14
Research Method for Business chapter 11-12-14Research Method for Business chapter 11-12-14
Research Method for Business chapter 11-12-14
 
Classification Scoring for Cleaning Inconsistent Survey Data
Classification Scoring for Cleaning Inconsistent Survey DataClassification Scoring for Cleaning Inconsistent Survey Data
Classification Scoring for Cleaning Inconsistent Survey Data
 
Ppt evaluation of information retrieval system
Ppt evaluation of information retrieval systemPpt evaluation of information retrieval system
Ppt evaluation of information retrieval system
 
Data Science - Part XI - Text Analytics
Data Science - Part XI - Text AnalyticsData Science - Part XI - Text Analytics
Data Science - Part XI - Text Analytics
 
Step by Step guide to executing an analytics project
Step by Step guide to executing an analytics projectStep by Step guide to executing an analytics project
Step by Step guide to executing an analytics project
 
Introduction to regression
Introduction to regressionIntroduction to regression
Introduction to regression
 
Assess data reliability from a set of criteria using the theory of belief fun...
Assess data reliability from a set of criteria using the theory of belief fun...Assess data reliability from a set of criteria using the theory of belief fun...
Assess data reliability from a set of criteria using the theory of belief fun...
 
Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Benchmarks for Evaluating Anomaly Based Intrusion Detection SolutionsBenchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
 
PREDICTING BANKRUPTCY USING MACHINE LEARNING ALGORITHMS
PREDICTING BANKRUPTCY USING MACHINE LEARNING ALGORITHMSPREDICTING BANKRUPTCY USING MACHINE LEARNING ALGORITHMS
PREDICTING BANKRUPTCY USING MACHINE LEARNING ALGORITHMS
 
The role of NLP & ML in Cognitive System by Sunantha Krishnan
The role of NLP & ML in Cognitive System by Sunantha KrishnanThe role of NLP & ML in Cognitive System by Sunantha Krishnan
The role of NLP & ML in Cognitive System by Sunantha Krishnan
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni
 
Twala2007.doc
Twala2007.docTwala2007.doc
Twala2007.doc
 
Data Analytics all units
Data Analytics all unitsData Analytics all units
Data Analytics all units
 
Big data analytics in financial market
Big data analytics in financial marketBig data analytics in financial market
Big data analytics in financial market
 

Similaire à Research Method EMBA chapter 12

Software Project Implementation
Software Project Implementation Software Project Implementation
Software Project Implementation Joel Okomoli
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleDr. Radhey Shyam
 
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfKIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfDr. Radhey Shyam
 
Data Science: Unlocking Insights and Transforming Industries
Data Science: Unlocking Insights and Transforming IndustriesData Science: Unlocking Insights and Transforming Industries
Data Science: Unlocking Insights and Transforming IndustriesUncodemy
 
INTRODUCTION TO DATA SCIENCE -CONCEPTS.pptx
INTRODUCTION TO DATA SCIENCE -CONCEPTS.pptxINTRODUCTION TO DATA SCIENCE -CONCEPTS.pptx
INTRODUCTION TO DATA SCIENCE -CONCEPTS.pptxMadhumitha N
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxstilliegeorgiana
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldNeil Raden
 
Impact of business intelligence on
Impact of business intelligence onImpact of business intelligence on
Impact of business intelligence onijejournal
 
Foundation Of Information System
Foundation Of Information SystemFoundation Of Information System
Foundation Of Information SystemNirajan Silwal
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docxharrisonhoward80223
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business IntelligenceSukirti Garg
 
data minig for eng with all topics and history
data minig for eng with all topics and historydata minig for eng with all topics and history
data minig for eng with all topics and historynbaisane16
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Angie Jorgensen
 
Unveiling the Power of Data Analytics Transforming Insights into Action.pdf
Unveiling the Power of Data Analytics Transforming Insights into Action.pdfUnveiling the Power of Data Analytics Transforming Insights into Action.pdf
Unveiling the Power of Data Analytics Transforming Insights into Action.pdfKajal Digital
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practiceswacasr
 
Introduction to Data Science: Unveiling Insights Hidden in Data
Introduction to Data Science: Unveiling Insights Hidden in DataIntroduction to Data Science: Unveiling Insights Hidden in Data
Introduction to Data Science: Unveiling Insights Hidden in Datahemayadav41
 
Data Warehouse: A Primer
Data Warehouse: A PrimerData Warehouse: A Primer
Data Warehouse: A PrimerIJRTEMJOURNAL
 

Similaire à Research Method EMBA chapter 12 (20)

Ch03
Ch03Ch03
Ch03
 
Software Project Implementation
Software Project Implementation Software Project Implementation
Software Project Implementation
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycle
 
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfKIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
 
Data Science: Unlocking Insights and Transforming Industries
Data Science: Unlocking Insights and Transforming IndustriesData Science: Unlocking Insights and Transforming Industries
Data Science: Unlocking Insights and Transforming Industries
 
INTRODUCTION TO DATA SCIENCE -CONCEPTS.pptx
INTRODUCTION TO DATA SCIENCE -CONCEPTS.pptxINTRODUCTION TO DATA SCIENCE -CONCEPTS.pptx
INTRODUCTION TO DATA SCIENCE -CONCEPTS.pptx
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid World
 
Impact of business intelligence on
Impact of business intelligence onImpact of business intelligence on
Impact of business intelligence on
 
Foundation Of Information System
Foundation Of Information SystemFoundation Of Information System
Foundation Of Information System
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docx
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 
data minig for eng with all topics and history
data minig for eng with all topics and historydata minig for eng with all topics and history
data minig for eng with all topics and history
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...
 
Unveiling the Power of Data Analytics Transforming Insights into Action.pdf
Unveiling the Power of Data Analytics Transforming Insights into Action.pdfUnveiling the Power of Data Analytics Transforming Insights into Action.pdf
Unveiling the Power of Data Analytics Transforming Insights into Action.pdf
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Introduction to Data Science: Unveiling Insights Hidden in Data
Introduction to Data Science: Unveiling Insights Hidden in DataIntroduction to Data Science: Unveiling Insights Hidden in Data
Introduction to Data Science: Unveiling Insights Hidden in Data
 
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
 
Data Warehouse: A Primer
Data Warehouse: A PrimerData Warehouse: A Primer
Data Warehouse: A Primer
 
Information systems
Information systemsInformation systems
Information systems
 

Plus de Mazhar Poohlah

Project implimentation
Project implimentationProject implimentation
Project implimentationMazhar Poohlah
 
Orgnaization and controlling
Orgnaization and controllingOrgnaization and controlling
Orgnaization and controllingMazhar Poohlah
 
Project implimentation
Project implimentationProject implimentation
Project implimentationMazhar Poohlah
 
Research Method EMBA chapter 14
Research Method EMBA chapter 14Research Method EMBA chapter 14
Research Method EMBA chapter 14Mazhar Poohlah
 
Research Method EMBA chapter 10
Research Method EMBA chapter 10Research Method EMBA chapter 10
Research Method EMBA chapter 10Mazhar Poohlah
 
Research Method EMBA chapter 6
Research Method EMBA chapter 6Research Method EMBA chapter 6
Research Method EMBA chapter 6Mazhar Poohlah
 
Research Method EMBA chapter 5
Research Method EMBA chapter 5Research Method EMBA chapter 5
Research Method EMBA chapter 5Mazhar Poohlah
 
Research Method EMBA chapter 4
Research Method EMBA chapter 4Research Method EMBA chapter 4
Research Method EMBA chapter 4Mazhar Poohlah
 
Research method EMBA chapter 3
Research method EMBA chapter 3Research method EMBA chapter 3
Research method EMBA chapter 3Mazhar Poohlah
 
Research method EMBA chapter 2
Research method EMBA chapter 2Research method EMBA chapter 2
Research method EMBA chapter 2Mazhar Poohlah
 
Research method EMBA chapter 1
Research method EMBA  chapter 1Research method EMBA  chapter 1
Research method EMBA chapter 1Mazhar Poohlah
 
3. traditional project management - ch3
3. traditional project management - ch33. traditional project management - ch3
3. traditional project management - ch3Mazhar Poohlah
 
2. traditional project management -ch2
2. traditional project management -ch22. traditional project management -ch2
2. traditional project management -ch2Mazhar Poohlah
 
Project Appraisal chapter 3
Project Appraisal chapter 3Project Appraisal chapter 3
Project Appraisal chapter 3Mazhar Poohlah
 
Project Appraisal chapter 2
Project Appraisal chapter 2Project Appraisal chapter 2
Project Appraisal chapter 2Mazhar Poohlah
 

Plus de Mazhar Poohlah (20)

Market analysis
Market analysisMarket analysis
Market analysis
 
Project implimentation
Project implimentationProject implimentation
Project implimentation
 
Orgnaization and controlling
Orgnaization and controllingOrgnaization and controlling
Orgnaization and controlling
 
Marketing concept
Marketing conceptMarketing concept
Marketing concept
 
Business enviornment
Business enviornmentBusiness enviornment
Business enviornment
 
Business enviornment
Business enviornmentBusiness enviornment
Business enviornment
 
Business enviornment
Business enviornmentBusiness enviornment
Business enviornment
 
Project implimentation
Project implimentationProject implimentation
Project implimentation
 
Research Method EMBA chapter 14
Research Method EMBA chapter 14Research Method EMBA chapter 14
Research Method EMBA chapter 14
 
Research Method EMBA chapter 10
Research Method EMBA chapter 10Research Method EMBA chapter 10
Research Method EMBA chapter 10
 
Research Method EMBA chapter 6
Research Method EMBA chapter 6Research Method EMBA chapter 6
Research Method EMBA chapter 6
 
Research Method EMBA chapter 5
Research Method EMBA chapter 5Research Method EMBA chapter 5
Research Method EMBA chapter 5
 
Research Method EMBA chapter 4
Research Method EMBA chapter 4Research Method EMBA chapter 4
Research Method EMBA chapter 4
 
Research method EMBA chapter 3
Research method EMBA chapter 3Research method EMBA chapter 3
Research method EMBA chapter 3
 
Research method EMBA chapter 2
Research method EMBA chapter 2Research method EMBA chapter 2
Research method EMBA chapter 2
 
Research method EMBA chapter 1
Research method EMBA  chapter 1Research method EMBA  chapter 1
Research method EMBA chapter 1
 
3. traditional project management - ch3
3. traditional project management - ch33. traditional project management - ch3
3. traditional project management - ch3
 
2. traditional project management -ch2
2. traditional project management -ch22. traditional project management -ch2
2. traditional project management -ch2
 
Project Appraisal chapter 3
Project Appraisal chapter 3Project Appraisal chapter 3
Project Appraisal chapter 3
 
Project Appraisal chapter 2
Project Appraisal chapter 2Project Appraisal chapter 2
Project Appraisal chapter 2
 

Dernier

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Dernier (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

Research Method EMBA chapter 12

  • 1. Chapter – 12 Notes Research Methods (KJAN) Summer Quarter 2014 1 Quantitative Data Analysis: Hypothesis Testing: Based on Data All analytical tests will be performed in the class when students will bring the data for their projects. 1. Measures of Central Location  Mean, Median, Mode 2. Measures of Variability  Range, Standard Deviation, Variance, Coefficient of Variation 3. Measures of Relative Standing  Percentiles, Quartiles 4. Measures of Linear Relationship  Covariance, Correlation, Least Squares Line Notation When referring to the number of observations in a population, we use uppercase letter N When referring to the number of observations in a sample, we use lower case letter n The arithmetic mean for a population is denoted with Greek letter “mu”: The arithmetic mean for a sample is denoted with an “x-bar”: Information Needs of Business: To run a business, useful, timely, accurate, reliable, and valid data are needed. When data in their raw from are evaluated, analyzed, and synthesized, useful information becomes available to managers that helps them make good business decisions. Information gathering, communicating, and decision making go hand in hand. The methods used to gather, analyze, and synthesize information from the external and internal environments are becoming more and more sophisticated owing to the immense scope of technology, which makes possible timely and efficient research vital to the survival of companies. Data Warehousing, Data Mining and Operations Research: Data Warehousing: A data warehouse that serves as the central repository of all data collected from different sources including those pertaining to the company’s finance, manufacturing, sales, and the like. The data warehouse is usually built from data collected through the different departments of the enterprise and can be accessed through various on-line analytical processing (OLAP) tools to support decision making. Data warehousing can be described as the process of extracting, transferring, and integrating data spread across multiple external databases and even operating systems. Data Mining: Data mining is a strategic tool for reaching new levels of business intelligence. Using algorithms to analyze data in a meaningful way, data mining more effectively leverages the data warehouse by identifying hidden relations and patterns in the data stored in it. Such “mined” data pertaining to the vital areas of the organization can be easily accessed and used for different purposes.
  • 2. Chapter – 12 Notes Research Methods (KJAN) Summer Quarter 2014 2 Operations Research: Operation research (OR) or management sciences (MS) is another sophisticated tool used to simplify and thus clarify certain types of complex problems that lend themselves to quantification. OR uses higher mathematics and statistics to identify, analyze, and ultimately solve intricate problems of great complexity faced by the manager. Areas of problem solving that easily lend to OR include those relating to inventory, queuing, sequencing, routing, and search and replacement. Management Information Systems (MIS), Decision Support System, the Executive Information System, and the Expert System, are good decision making aids. A good information system collects, mines, and provides a wide range of pertinent information relating to aspects of both the external and internal environments of the organization. International Dimensions of Cyberspace: Cyberspace is not free of geographical boundaries or cultural issues. Foreign governments can use the firewall and filtering technology to deter computer hackers. Unregulated cyberspace is a mythical notion. Local laws do indeed govern what can and cannot appear in cyberspace. Copyright laws can also be deemed to be broken. Data Storage and Surveillance: Storage of Databases: Data is the lifeblood of companies and should be mirrored live in at least two other locations, or at least backed up on tape and stored in other remote locations. Data Security: Increasingly, organizations and their information systems are faced with security threats that include computer hacking, Internet fraud, and sabotage, from a wide range of sources. Computer viruses, and computer hacking are the incessant threats and ever-present danger. To protect information from a variety of threats, digital IDs and firewalls are a few of the security measures used to prevent fraud and unauthorized use. Authentication, authorization, and encryption are some basic security methodologies employed to prevent unauthorized people from having access. Managerial Advantage of Technological Advancements: Information technology and the development of software to gather, store, and analyze information—are registering advances at an exponential rate. It is important for managers to take full advantage of information technology and keep current on the latest innovations. Software technology can be put to effective use in the research process for problem identification, theory building, and collecting data from respondents, analyzing it, and presenting the results. Technology is not, however, without its drawbacks.
  • 3. Chapter – 12 Notes Research Methods (KJAN) Summer Quarter 2014 3 Ethics in Handling Information Technology: Although technology offers unbounded opportunities for organizations and facilitates decision making at various levels, it also imposes certain obligations on the part of its users. 1. It is important that the privacy of all individuals is protected. Businesses have to balance their information needs against the individual rights. 2. Companies also need to ensure that confidential information relating to individuals is protected. 3. Care should be taken to ensure that incorrect information is not distributed across the many different files of the company. 4. Those that collect data for the company should be honest, trustworthy, and careful in obtaining and recording the data in a timely fashion.