The fourth industrial revolution glossarium: over 1500 of the hottest terms you will use to create the future. Textbook - Chesalov Alexander 10 стр.



Customer Journey Tracking (analysis of user behavior)  the term designates the data-based analysis of buying decision processes. If the customer buys online, it is possible to reconstruct the decision-making path of the client using special tracking tools. For example, when using the tool it is possible to find out how many advertising contacts were necessary to activate the purchase of a specific product302.


Customer relationship management (CRM) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle. The goal is to improve customer service relationships and assist in customer retention and drive sales growth. CRM systems compile customer data across different channels, or points of contact, between the customer and the company, which could include the companys website, telephone, live chat, direct mail, marketing materials and social networks. CRM systems can also give customer-facing staff members detailed information on customers personal information, purchase history, buying preferences and concerns303.


Cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted areas of the system without authorization, potentially with malicious intent. Depending on the context, cyberattacks can be part of cyber warfare or cyberterrorism. A cyberattack can be employed by sovereign states, individuals, groups, society, or organizations, and it may originate from an anonymous source304.


Cybercrime also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government305.


Cyber-Physical Production Systems (CPPS) it is when physical and digital items are connected, monitored and managed with computer programming and algorithms306.


Cyber-physical systems are intelligent networked systems with built-in sensors, processors and drives that are designed to interact with the physical environment and support the operation of computer information systems in real time; cloud computing is an information technology model for providing ubiquitous and convenient access using the information and telecommunications network «Internet» to a common set of configurable computing resources («cloud»), data storage devices, applications and services that can be promptly provided and relieved from the load with minimal operating costs or almost without the participation of the provider.


Cyber-resilience this is a «new» term, and only used in specific contexts of modern business challenges. Check it out the World Economic Forum definition: At its simplest, being cyber-resilient means taking measures to prevent and protect against the criminal or unauthorized use of electronic data. As digital transformation gathers pace, Cyber-resilience will move up the worlds agenda. The number of data breaches is increasing, as is the severity of the attacks. Based on the Gemalto Breach Level Index, the first half of 2018 saw 945 data breaches affecting 4.5 billion records, a 133% increase over the same period last year. More than 90% of events involved unencrypted data and 65% identity theft. A significant number of breaches involved government records. The Forum recently published the 2018 Global Risk report, showing the increasing risks to cybersecurity over the past decade. More pointedly a respondent pool of 12,500 companies covering the three largest regions of North America, Europe and EAPAC named digital Cyber-resilience as the biggest global risk. Business, government and citizens all stand to lose if we cannot create a safe digital environment to capture the potential gains from the Fourth Industrial Revolution307.


Cybersecurity are the processes employed to safeguard and secure assets used to carry information of an organisation from being stolen or attacked. It requires extensive knowledge of the possible threats. Identity management, risk management and incident management form the crux of cyber security strategies of an organization. Also, Cybersecurity is protection against unauthorized entry or use of electronic data or systems using technologies, processes and controls, networks, programs, devices, data, and other IoT solutions. The goal is to reduce the risk of cyberattacks308,309.


Cyberspace refers to the virtual computer world, and more specifically, an electronic medium that is used to facilitate online communication. Cyberspace typically involves a large computer network made up of many worldwide computer subnetworks that employ TCP/IP protocol to aid in communication and data exchange activities. Cyberspaces core feature is an interactive and virtual environment for a broad range of participants. In the common IT lexicon, any system that has a significant user base or even a well-designed interface can be thought to be «cyberspace»310.


Cybersquatting refers to the unauthorized registration and use of Internet domain names that are identical or similar to trademarks, service marks, company names, or personal names. Cybersquatting registrants obtain and use the domain name with the bad faith intent to profit from the goodwill of the actual trademark owner311.


Cyberthreat is the spread of malicious information and spam on the Web that threatens the personal information security of a person, company, state.


Сloud robotics is a field of robotics that attempts to invoke cloud technologies such as cloud computing, cloud storage, and other Internet technologies centred on the benefits of converged infrastructure and shared services for robotics. When connected to the cloud, robots can benefit from the powerful computation, storage, and communication resources of modern data center in the cloud, which can process and share information from various robots or agent (other machines, smart objects, humans, etc.). Humans can also delegate tasks to robots remotely through networks. Cloud computing technologies enable robot systems to be endowed with powerful capability whilst reducing costs through cloud technologies. Thus, it is possible to build lightweight, low cost, smarter robots have intelligent brain in the cloud. The brain consists of data center, knowledge base, task planners, deep learning, information processing, environment models, communication support, etc.312.


Сonstructed language (Also conlang) is a language whose phonology, grammar, and vocabulary are consciously devised, instead of having developed naturally. Constructed languages may also be referred to as artificial, planned, or invented languages.


Сonvolutional neural network  in deep learning, a convolutional neural network (CNN, or ConvNet) is a class of deep neural networks, most commonly applied to analyzing visual imagery. CNNs use a variation of multilayer perceptrons designed to require minimal preprocessing. They are also known as shift invariant or space invariant artificial neural networks (SIANN), based on their shared-weights architecture and translation invariance characteristics. Сonvolutional neural network is a class of artificial neural network most commonly used to analyze visual images. They are also known as Invariant or Spatial Invariant Artificial Neural Networks (SIANN) based on an architecture with a common weight of convolution kernels or filters that slide over input features and provide equivalent translation responses known as feature maps.

«D»

Dashboard is a panel that shows operational and instrument vitals/readings and that helps process experts to monitor the most important production KPIs in one central point of access. It enables manufacturers to track and optimize the production quality and is a valuable analytics tool to manage all related manufacturing costs efficiently313.


Data Access is the authorized, on-demand ability to access, modify or edit selected data, regardless of location. Data Access is one of the main aspects of establishing successful data governance systems314.


Data Altruism  term used in the Data Governance Act. Data that is made available without reward for purely non-commercial usage that benefits communities or society at large, such as the use of mobility data to improve local transport315.


Data analytics is the science of analyzing raw data to make conclusions about that information. Many of the techniques and processes of data analytics have been automated into mechanical processes and algorithms that work over raw data for human consumption316.


Data Architecture is a discipline, process, and program focusing on integrating sets of information. One of the four Enterprise Architectures (with Application Architecture, Business Architecture, and System Architecture)317.


Data at Rest is stored data that is not processed or transferred318.


Data Center is a facility composed of networked computers, storage systems and computing infrastructure that organizations use to assemble, process, store and disseminate large amounts of data. A business typically relies heavily on the applications, services and data contained within a data center, making it a critical asset for everyday operations. Also, Data Center is a facility that contains connected equipment for computing resources319,320.


Data Controller (or Controller)  the natural or legal person, or any other body, which alone or jointly with others determines the purposes and means of the processing of personal data. In a clinical trial, the organisation (s) responsible for the trial is usually considered being the controller321.


Data controller is a person, company, or other body that determines the purpose and means of personal data processing (this can be determined alone, or jointly with another person/company/body)322.


Data Curation is the organization and integration of data collected from various sources and it involves capturing, appraisal, description, preservation, access, use and reuse, and sharing of research data323.


Data Destruction  operation that results in the permanent, unrecoverable removal of information about an object from memory or storage (e.g., by multiple overwrites with a series of random bits)324.


Data Dictionary  database about data and database structures. A catalog of all data elements, containing their names, structures, and information about their usage, for the benefit of programmers and others interested in the data elements and their usage325.


Data Donation is research in which people voluntarily contribute their own personal data that was generated for a different purpose to a collective dataset326.


Data Donator  person donating personal data (may have the option to provide his/her email, signing the data with a private key, and restricting the allowed usage of the provided data)327.


Data Economy is a global digital ecosystem, that enables free movement of data within the EU. Furthermore, data enables optimization and decision-making processes as well as innovations in a wide range of areas. Also, Data Economy refers to the utilization of digital data in commercial transactions328,329.


Data Element  the smallest piece of information considered meaningful and usable. A single logical data fact, the basic building block of a Logical Data Model330.


Data Enrichment is the process of augmenting collected raw data or processed data with existing data or domain knowledge to enhance the analytic process331.


Data entry  the process of converting verbal or written responses to electronic form332.


Data for social science, is generally numeric files originating from social research methodologies or administrative records, from which statistics are produced333.


Data Governance is a system of decision rights and accountabilities for information-related processes, executed according to agreed-upon models which describe who can take what actions with what information, and when, under what circumstances, using what methods334.


Data Governance Methodology is a logical structure providing step-by-step instructions for performing Data Governance processes335.


Data Governance Office is a centralized organizational entity responsible for facilitating and coordinating Data Governance and/or Stewardship efforts for an organization. It supports a decision-making group, such as a Data Stewardship Council336.


Data in Motion is information thats transferred from one location to another337.


Data in Use is information thats being processed338.


Data Integrity proves that data hasnt been tampered with, altered, or destroyed in an unauthorized way339.


Data is a public good. This concept allows open use of non-personal data340.


Data lakes are centralized repositories of structured and unstructured data at any scale. Data is stored without having to first structure the data and then run different types of analytics. Data lakes are typically «cold storage» so not ideal for high performance direct IO applications341.


Data Linkage  technique that involves bringing together and analyzing data from a variety of sources, typically data that relates to the same individual342.


Data literacy  the ability to derive meaningful information from data, just as literacy in general is the ability to derive information from the written word. The complexity of data analysis, especially in the context of big data, means that data literacy requires some knowledge of mathematics and statistics343.


Data Management is all the disciplines related to managing data as a valuable resource, such as data modeling or metadata management344.


Data management plan (DMP) is a formal document that outlines the creation, management, sharing, and preservation of data, both during and after a research project. Many funding agencies require researchers prepare a DMP as part of funding proposals345.


Data Mapping  the process of assigning a source data element to a target data element346.


Data markup is the stage of processing structured and unstructured data, during which data (including text documents, photo and video images) are assigned identifiers that reflect the type of data (data classification), and (or) data is interpreted to solve a specific problem, in including using machine learning methods (National Strategy for the Development of Artificial Intelligence for the period up to 2030).


Data mining is the process of data analysis and information extraction from large amounts of datasets with machine learning, statistical approaches. and many others. Data mining is the process of finding anomalies, patterns and correlations within large data sets to predict outcomes. Using a broad range of techniques, you can use this information to increase revenues, cut costs, improve customer relationships, reduce risks and more. Also, Data mining is the process of turning raw data into useful information by using software to look for meaningful patterns347,348,349.

Назад Дальше