Demonstrate the data gap analysis

Assignment Help Basic Computer Science
Reference no: EM133360960

Assignment:

Data gap analysis can be referred to as the process of inspecting an existing or planned big data infrastructure with the aim of identifying issues, risks and inefficiencies associated with the use of data in an organisation's operations. Such analysis requires an integrated view of organisational data's technical, managerial and legal aspects. This activity represents a key initial step towards the implementation of data-driven business decision-making. you must demonstrate the data gap analysis for a case study of your choice.

Case study

A significant project the data science team is working on is GrabShare, Grab's commercial service that enables passengers to carpool with another passenger heading in the same direction. "To get passengers quickly to their destinations, GrabShare pairs just two passenger bookings with similar trip routes within a single trip," says Lye. Passengers will experience a maximum of two stops before reaching their destinations. GrabShare focuses on maximizing drivers' potential earnings by reducing the time and distance spent on a single GrabShare ride, allowing drivers to complete more jobs per hour to boost their income and reduce fuel consumption. Two key metrics are involved in doing this:

1. Match rate - This measures how well they match the first passenger with another passenger going in the same direction.

2. Match quality - This measures the trade-off in time a passenger faces by choosing to share a ride with someone else. The key is to strike a balance between match rate and match quality, while aiming for higher efficiency in putting more people in fewer cars. "With this, it's important to understand how passenger behavior differs from one market to another," says Lye. "For example, GrabShare riders in Singapore are less willing to wait for a ride than GrabShare riders in Indonesia."

Task 1

Perform data gap analysis for an organisation or project of your choice. Your response should include

? Brief background to the organisation or project in question.

? Identification of the key data sources and datasets available to the organisation.

? Inspection of data integrity and current or potential gaps in data analytics and data protection.

Task 2

Using the findings of Task 1.1 recommend improvements to the organisational data analytics processes. These should be centred around the following:

• Reorganisation of the current data-driven processes to streamline and enhance the data analytics and decision-making.

• Roadmap to the development or enhancement of the big data infrastructure.

• Compliance aspects of the proposed changes in data analytics.

Task 3

Explain how the proposed big data analytics can be used in organisational decision-making. This includes the following:

• Identification of a range of business decisions that can be supported by the enhancements in data analytics proposed in Task 1.2.

• Formulation of a single decision of your choice out of those identified, in terms of the related business question to be solved, involved stakeholders and data available for its support.

Reference no: EM133360960

Questions Cloud

How costly is damage done by computer viruses : What did you leam? How costly is damage done by computer viruses? Search for reports that summarize the impact both in terms on dollar value and the number
What is the mechanism and what part of the brain is involved : Why did this player lose consciousness and What is the mechanism and what part of the brain is involved
What is the retailer throughput in orders per hour : What is the retailer's throughput (in orders per hour)? What is the capacity of the order fulfillment operation (in orders per hour)? How long on average
What are the 2 key data warehouse building blocks : What are the 2 Key Data warehouse building blocks that you think are most important? Why?
Demonstrate the data gap analysis : Data gap analysis can be referred to as the process of inspecting an existing or planned big data infrastructure with the aim of identifying issues.
Calculate total blood o2 content : BIOL 314 Christopher Newport University Calculate total blood O2 content (mL). Assume 100% saturation and maximum solubility in blood plasma. Be sure to use
List the CPT codes for all procedures and services : HIT 135 Camden County College List the CPT code(s) for all procedures and services per the above documentation and coding guidelines.
Explaining how a repeater can take a weakened signal : Explaining how a repeater can take a weakened signal and re-broadcasts it it at its original strength. I need to define the term or concept. Give examples
How would the commitment management protocol describe : The ESTC(East State Technology College) process looks for complete job application packages before continuing. How would the Commitment Management Protocol

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Sample of observations on the diameter

Consider the following sample of 25 observations on the diameter x (in centimeters) of a disk used in a certain system:

  How to cook your favorite three-dish meal

For this assignment, you will use PowerPoint to generate a brief, 10-slide presentation. Your presentation will be about one of the following topics:

  Define sql injection

Define SQL injection. Identify common SQL injection attacks and explain what each attack does. Identify SQL injection detection techniques.

  What are the activities the architect must execute

What are the tips and tricks that make security architecture risk assessment easier? What are the activities the architect must execute?

  Prove that if there exists a one-way function

Let (Gen, H) be a collision-resistant hash function, where H maps strings of length 2n to strings of length n. Prove that the function family (Gen, Samp, H) is one-way (cf. Definition 7.3), where Samp is the trivial algorithm that samples a unifor..

  Compare two significant international laws

Research and compare two significant international laws that relate to the practice of information security.

  Compute transition time for a two-input nand gate

Compute transition time for a two-input NAND gate with 6/2 pulldown and 6/2 pullup that drives an identically-sized NAND gate

  Design and implement an application that performs flashcard

The user is to input the answer, and the program will tell them if it is right or wrong. Ask user if they want to do another. Keep score of the user's score of correct answers and the number of problems presented.

  Recommend that management invests in

List four network tools that you would use to run your network and that you would recommend that management invests in.

  Concepts of privacy and social media in substantive

Discuss your thoughts on Web 2.0 including concepts of privacy and social media in a substantive, well-researched discussion thread.

  Write a program to simulate the authentication process

Write a program to simulate the authentication process. Store an actual PIN number in your program. The program should use an array to assign random number.

  Comparing various policy options for regulation

Australian lobstermen fear a collapse of the lobster industry from over-harvesting.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd