BuyFindarrow_forward

Fundamentals of Information Systems

8th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781305082168
BuyFindarrow_forward

Fundamentals of Information Systems

8th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781305082168
Chapter 3, Problem 1WE
Textbook Problem
1 views

Use a Web search engine to find information on social graph analysis. Identify at least three organizations that are using this technique to analyze big data and discuss their findings.

Program Plan Intro

Mention organizations which are using social graph analysis to analyze their big data.

Explanation of Solution

Social Graph Analysis is a data visualization technique in which data is represented as networks where vertices are the individual data points (social network users) and the edges are the connections among them. There are multiple tools in the market to carry out SNA such as Inflow, Polinode, and Network Workbench.

Inflow: This is one of the oldest tools present for SNA.This tool performs network analysis and visualization. It is still there in the market despite being one of the earliest tools because of its simplicity.

Polinode: This is another tool which is used for social graph analysis. It visualizes and analyzes the data. This is a very well known tool to improve the workplace.

Network Workbench: This is Social Graph Analysis tool for analysis and modeling. This one is majorly used for biomedical research, therefore, is a strong analysis tool for researchers and educators.

Three companies that use SGA are:

1) Google: Google uses the browsing data of the user, analyze it and shows the result as per your past history. So for an instance, a buyer searched for a sedan, next time the same user uses Google for anything, the customized advertisement on the sidebar would show the advertisement from different car seller companies. Therefore it not only stores the data but analyzes it and uses it and actually learns as per the trend in the Google search.

2) Twitter: Twitter is a social networking site again. How the analysis is done and how it is used by the company is little trickier than it seems. Firstly a few of the key Twitter accounts are gathered, the account is key account if they are well connected and have numerous followers...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 3 Solutions

Fundamentals of Information Systems
Show all chapter solutions
add
Ch. 3 - Draw an entity-relationship diagram for the tables...Ch. 3 - How accurate do you think sentiment analysis is?...Ch. 3 - ______________ is a skilled and trained IS...Ch. 3 - A collection of data fields all related to one...Ch. 3 - Multiple records can have the same primary key....Ch. 3 - A(n) _______________ is a field or set of fields...Ch. 3 - A(n) ________ is a diagram of entities and their...Ch. 3 - The __________________ is a simple but highly...Ch. 3 - _______ involves eliminating columns in a a....Ch. 3 - Because the DBMS is responsible for providing...Ch. 3 - _______________ is a special purpose programming...Ch. 3 - SQL databases conform to ACID properties that...Ch. 3 - A(n) _____________ is a collection of instructions...Ch. 3 - The ________________ is a nontechnical, but...Ch. 3 - A trend in database management, known as Database...Ch. 3 - ____________ is a term used to describe data...Ch. 3 - An in-memory database (IMDB) is a database...Ch. 3 - A(n) _____________ is a database that holds...Ch. 3 - An information-analysis process that involves the...Ch. 3 - _______________ allows users to explore data from...Ch. 3 - ____________ is a form of data mining that...Ch. 3 - _______________ is a data visualization technique...Ch. 3 - How would you define the term “database”? How...Ch. 3 - In the hierarchy of data, what is the difference...Ch. 3 - What is meant by the database approach to data...Ch. 3 - What is meant by data archiving? Why is this an...Ch. 3 - What is an entity-relationship diagram, and what...Ch. 3 - Identify four basic data manipulations performed...Ch. 3 - What is data scrubbing?Ch. 3 - What is database as a service (DaaS)? What are the...Ch. 3 - What is Hadoop? What are its primary components,...Ch. 3 - What is Hadoop?Ch. 3 - What is schema, and how is it used?Ch. 3 - What is concurrency control? Why is it important?Ch. 3 - What is in-memory database processing, and what...Ch. 3 - What is the difference between projecting and...Ch. 3 - What is big data? Identify three characteristics...Ch. 3 - What is a data warehouse, and how is it different...Ch. 3 - What is meant by the “front end” and the “back...Ch. 3 - What is the relationship between the Internet and...Ch. 3 - What is data mining? What is OLAP? How are they...Ch. 3 - What is business intelligence? Identify five...Ch. 3 - What is predictive analysis? Give an example where...Ch. 3 - When building a database, an organization must...Ch. 3 - Outline some specific steps an organization might...Ch. 3 - 3. Briefly describe the ACID properties to which...Ch. 3 - Briefly describe how a NoSQL database operates.Ch. 3 - Identify and briefly describe some of the...Ch. 3 - Identify and briefly describe the steps in the ETL...Ch. 3 - You are the vice president of information...Ch. 3 - What counter-intelligence strategy might a large...Ch. 3 - Your luxury car dealership wants to identify...Ch. 3 - Make a list of the databases in which data about...Ch. 3 - If you were the database administrator for the...Ch. 3 - Identity theft, where people steal personal...Ch. 3 - You have been hired to set up a database for a...Ch. 3 - Develop a simple data model for a student database...Ch. 3 - An online video movie rental store is using a...Ch. 3 - To improve service to their customers, the workers...Ch. 3 - Using a graphics program, develop an...Ch. 3 - Use a Web search engine to find information on...Ch. 3 - Do research to find three different estimates of...Ch. 3 - Do research to find what career opportunities are...Ch. 3 - How could you use business intelligence (BI) to do...Ch. 3 - How did Medihelp’s use of a traditional database...Ch. 3 - How does Medihelp’s Salesforce now USC the...Ch. 3 - How did B.I. Practice improve the efficiency of...Ch. 3 - How does the new query system help Medihelp make...Ch. 3 - From the user side, Mr. Kim said that HanaTour...Ch. 3 - How does HanaTour use the data it collects from...Ch. 3 - HanaTour chose Wizbase as its implementation...Ch. 3 - Think of the data that your university’s database...

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions add
How do you translate business rules into data model components?

Database Systems: Design, Implementation, & Management

What is sparse data? Give an example.

Database Systems: Design, Implementation, & Management

What type of fixed gage can be used to check a threaded hole?

Precision Machining Technology (MindTap Course List)

How is the Internet of Everything different from the Internet of Things?

Principles of Information Systems (MindTap Course List)

In many applications, calibrated springs are commonly used to measure the magnitude of a force. Investigate how...

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

What is cardinality, and what symbols do you use in the crow’s foot notation method?

Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)

Determine the resultant of the forces shown.

International Edition---engineering Mechanics: Statics, 4th Edition

Explain ramping.

Electric Motor Control

Under what circumstances is software considered unlicensed? (565)

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)