ASSIGNMENT 3 FRONT SHEET
Qualification BTEC Level 5 HND Diploma in Computing
Unit number and title Unit 14: Business Intelligence
Submission date Date Received 1st submission
Re-submission Date Date Received 2nd submission
Student Name Student ID
Class Assessor name
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P5 P6 M4 D4
❒ Summative Feedback: ❒ Resubmission Feedback:
Grade: Assessor Signature: Date:
IV Signature:
A. INTRODUCTION
In this exercise, I will present my views on how business intelligence tools can contribute to effective decision making as well as
the legal issues related to user data mining for intelligent business operations. Next, I'll give specific examples of organizations
using BI tools to enhance or improve their business, and evaluate how they can use BI tools to expand their business. target
audience and make them more competitive in the market.
B. BUSINESS INTELLIGENCE TOOLS THAT CONTRIBUTE TO EFFECTIVE DECISION MAKING (P5)
1. How Business Intelligence helps in Decision Making
2. Ways Business Intelligence helps in Decision Making
3. Some Real-World examples of Business Intelligence in Use
a. Koodos powers their concept
b. Where the started
c. How BI helped
d. CareLinx personalizes care
e. Where they started
f. How BI helped
g. Bugcrowd reduces churn
h. Where the stared
i. How BI helped
4. Collecting information using dashboards and reports
5. Designing and analyzing using interactive analysis and data mining
6. Evaluating using dashboards and reports
7. Benefits of Business Intelligence
8. Business Intelligence tools and technology
a. Tableau
b. MS Power BI
c. QlikView
9. Comparision between Tableau, QlikView, Power BI
C. THE LEGAL ISSUES INVOLVED IN THE SECURE EXPLOITATION OF BUSINESS INTELLIGENCE TOOLS (P6)
1. Cyber security management
2. Discovering BI Security Risk
3. Methods to protect the Risk
4. Legal issues in law
5. Privacy
6. Ownership
7. Data security
8. Solution
9. How to protect data
D. REFERENCES