logo

Business Intelligence Assignment 3 - CIS8008

   

Added on  2024-06-03

45 Pages4455 Words414 Views
 | 
 | 
 | 
Business Intelligence
Assignment 3 - CIS8008
Student Name:
Student ID:
Page | 1
Business Intelligence Assignment 3 - CIS8008_1

Table of Contents
Task 1...............................................................................................................................................3
Task 1.1........................................................................................................................................3
Task 1.2........................................................................................................................................4
Task 2...............................................................................................................................................8
Task 2.1........................................................................................................................................8
Task 2.2......................................................................................................................................15
Task 2.3......................................................................................................................................19
Task 2.4......................................................................................................................................24
Task 3:...........................................................................................................................................38
Task 3.1......................................................................................................................................38
Task 3.2......................................................................................................................................40
Task 3.3......................................................................................................................................41
Task 3.4......................................................................................................................................42
Task 3.5......................................................................................................................................43
References......................................................................................................................................45
Page | 2
Business Intelligence Assignment 3 - CIS8008_2

Task 1
Task 1.1
AGL energy limited is centred on supporting form a possible power future for Australia. We
work the state's largest electricity age portfolio, we are its biggest ASX-recorded speculator in
sustainable strength supply, and we've got an extra of three.6 million client debts. Gladly
Australian, with over a hundred and eighty years of experience, we have a duty to offer good
value, relaxed and affordable power for our customers. Our point is to thrive in a carbon-obliged
international and construct consumer advertising as our enterprise changes. That is the cause we
have centred on leaving our coal-let move age by using 2050 and why we can keep on
developing innovative solutions for our customers. The company sources its energy in different
forms that are;
Solar: AGL has solar plants spread over the large area for energy supply in Australia. It is a best
renewable source of energy.
Wind: AGL has wide wind farms where the large windmills are installed for more energy
production. It is a best renewable source of energy.
Thermal: the AGL also produces renewable energy using the heat that is obtained from the coals.
Biogas: AGL also produces the energy from the cow dunk and other landfill gas and destroys the
methane.
Hydroelectric: the AGL also has the hydro plants for energy production in Australia. Hydro
produces less amount of energy but maintains the continuity of energy supply.
I have chosen AGL energy limited because it is the leading utility providing company of
Australia listed in ASX. The AGL is the biggest source of renewable energy. Also, the company
has a large amount of data about the energy.
URL: https://www.agl.com.au/about-agl
Page | 3
Business Intelligence Assignment 3 - CIS8008_3

Task 1.2
The user information is kept safe by the AGL energy group. Their objective is open and clear
about how the information is used by AGL.
AGL understands the importance of security and privacy of the user information and maintains
the user trust on AGL. The AGL Company follows the Privacy Act 1988 while collecting the
user information. The company updates its privacy policy regularly as per the change in the
practices. The company has the credit reporting policy for handling the related information.
Australian Data Governance Draft Code of Practice:
1. No-harm rule
AGL hold credit facts electronically and in shape as a mess around, each at their premises and
with the help of their authority institutions. AGL realizes a number of measures to assure the
security of that data. AGL general in addition figures out how to smash or de-perceive records
whilst by no means once more required for an authorised cause. The AGL Company uses the
policy act 1988 while taking the personal information of the user and this policy helps the
company to keep the data of the user secure. Additionally, the credit reporting policy is also used
by the AGL for attempting No-harm to user information and privacy. For the purpose of the
security, the staffs of AGL gets training for keeping the information of user secure and safe.
2. Honesty & transparency
AGL has clearly mentioned the use of personal information of the user in the privacy policy
column of the company and has provided the transparency to the user by making them aware
where their personal information is used. AGL makes use of user information to skip on
company services and the products, control our enterprise and agree to the law. AGL also use
customer facts for numerous reasons, as an instance, to better fathom of customer desires. AGL
collect and use customer information so AGL can:
certify patron character
outfit patron with the matters and companies that patron has asked
cope with portions and rebates
speak with consumer approximately their account
Page | 4
Business Intelligence Assignment 3 - CIS8008_4

respond to packages, request, income or grumblings that purchaser has made to the AGL
improve consumer enjoy and do actual searching over
if the patron is an economic expert, manage customer shareholding
if customer have related to paintings with AGL, review patron application
look into viable distortion and unlawful interest
consent to legal guidelines, together with supporting authorities places of work and law
prerequisite examinations, and
Control AGL business.
3. Fairness
All the information collected by the AGL is for the actual business use and not for any kind of
personal use; the personal information of the customer is used for delivering the services and the
products the user asked for. Also, the user’s personal information is used for marketing and
different purposes like receiving a feedback for the company services and product. The AGL
Company uses the customer personal data for getting them notified about the products and
services through the telephone, emails, texts and more. AGL Company uses the personal
information of the customer for providing them with the better and improved services and to
improve the customer experience by doing depth learning about the customer.
4. Choice
The AGL provides the choice to customer whether they want to share their information with
company and its service providers and not. The company gives whole right to the user about the
information sharing. The company can refuse access to the information to the customer in certain
cases. Also, some of the information of the organization are confidential and can be shared so the
AGL Company has choice to refuse for such information sharing. The information is not shared
until the law requires this confidential information. Some user information is only collected
under the laws including the laws applicable for energy industry.
5. Accuracy and access’
The data stored by the AGL Company from its customer is verified by using different measures
and authentications. The user is asked to re-check the information that company holds and allows
user to update and correct it. Also, the AGL contacts the customer for verifying whether the
information is accurate. And if the user wants their personal details the company asks for the
Page | 5
Business Intelligence Assignment 3 - CIS8008_5

identification of the customer before giving them access to the user. For the security and
identification purpose, user needs to log into the website using the appropriate and correct
credentials for the user to access their own account and information. To get the access to other
customers one needs to contact the AGL.
6. Accountability
AGL percentage consumer statistics for the motives set out in territory four, with affiliation
expert groups, and to take after the law. Right when AGL try this, they figure out how to make
sure user informational share customer singular statistics with special people and associations in
which AGL want to for the reasons this joins sharing:
with affiliation basis and renovation add-ons, with a purpose to make foundations and
hold up things and organizations that association offer
with other imperativeness institutions and various associations that help AGL bypass on
their things and advantages, or to transport your company if you change essentialness
carriers
with credit score uncovering places of work to manner new applications
with security masters
with humans that consumer have asked for that we deliver their information to, for
instance, clients affirmed operators or real blue advisors
AGL in like way share singular facts with people and affiliations that help affiliation with
their enterprise, as an instance, successful publications, IT strengthen, and company and
administrative businesses consisting of dedication gatherers.
7. Stewardship
For the handling of the data security of the user personal information, AGL has appointed the
Australian privacy commissioner who handles the complaint against the privacy concerns. The
complaints are handled by commissioner they keep the complaint record of the user and responds
to the complaints and let the customer know how long it will take to resolve their issues.
8. Security
AGL set up their staff in how to ensure customer bits of knowledge secure and agreeable. AGL
staff is required to keep purchaser records calm constantly, and are sure by methods for inside
methodology and standards that declare this. Access to singular records is supervised through
Page | 6
Business Intelligence Assignment 3 - CIS8008_6

getting right of the section to an ID control structures. ACL contraption makes progress
according to the Guide to Securing Personal Information conveyed through the Office of the
Information Commissioner, to please the structures and the Personal Information AGL assemble.
AGL moreover degree non-private information about how people use AGL office locales with
security provider bearers to guarantee that the destinations are secured.
9. Enforcement
For the AGL the DGA enforcement is suitable as all the principles are followed and
implemented by the company in their security and privacy of the user personal information. By
enforcing the DGA in the AGL the company has set the standards for the industry and has
maintained the benchmarks that are responsible for collection, disclosure and management of
information
URL: https://www.agl.com.au/privacy-policy
Page | 7
Business Intelligence Assignment 3 - CIS8008_7

Task 2
Task 2.1
This is all about the analysis of the data with the help of the rapid miner, there are a lot of the
tools are present for the analysis of the data but among all of them the rapid miner is one of the
best tools that has provides the result of the analysis, there are a lot of the other tools are present
in terms of the tableau and Watson etc. but all have required the specific training and the skilled
person to performs the analysis. But for this is one of the tools that does not require that much
skills and the normal user can also able to access the functionality of this tool. Refers to the
current scenario then there is a data set is provided by and there is a need to analyse the data set.
This has to do with the use of the rapid miner.
The analysis is performed with the help of the rapid miner, the data is related to diabetes. There
are a lot of the different type of the variables are present, the analysis starts with the filter the all
the variables, among all the variables there is need to `find out the required variables that have
the most required for the analysis, there are total nine variables are present, by the help of the all
the variables there are only select the 6 variables, the selection of the variable with the help of
the select data operator that are present in the system.
Page | 8
Business Intelligence Assignment 3 - CIS8008_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Challenges and Development of Nuclear Energy in Australia
|43
|9835
|154

Calculating Weighted Average Cost of Capital and Gearing Ratios for AGL Energy Ltd
|8
|1866
|59

Accounting Software Packages: A Comprehensive Analysis of Market Trends and Challenges
|19
|3255
|186