Download 2.3 Managing Data Resources

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
2.1 Ethics in an Information Society
Did you ever hear the old warning, "Just because you can, doesn't mean you should?"
Well, a lot of things are possible on the Internet nowadays, but that doesn't mean you
should do them.
Ethics is easily managed in small groups because the group itself tends to control the
individual's behavior. The larger the group, the harder it is to manage the actions of
individuals. Now stretch that to a huge number of people with many frames of reference
and experiences. Responsibility to the group becomes harder to police and accountability
for an individual's actions is harder to enforce.
Basic Concepts: Responsibility, Accountability, and Liability
Every action causes a reaction. When you're using the Internet, computers on campus, or
your employer's computer, you should be aware of:




Responsibility: accepting potential costs, duties, and obligations for your
decisions.
Accountability: determining who should take responsibility for decisions and
actions.
Liability: legally placing responsibility with a person or group.
Due Process: ensuring the laws are applied fairly and correctly.
Responsibility, accountability, and liability are all yours when it comes to your actions in
cyberspace. Every Internet Service Provider has a "usage policy," even the so-called
anonymous emailers that hide your real identity. HotMail is a popular Internet email
service that allows you to mask who you really are. You could send out all the, shall we
say, unethical, threatening, nasty, aberrant email you like. You think: "Hey, no one will
really know who I am. This is cool."
And then here comes the message from HotMail to cease and desist. Your free email
account is cancelled because you violated HotMail's usage policy. Then your local
Internet Service Provider contacts you and tells you you're terminated, baby! You
violated its usage policy by your actions. By now you're really mad, not to mention
embarrassed (at least we hope so). It's true. It happens.
Computer crime is one area that has been extremely hard for our society and our
governments to keep up with. Many laws have to be rewritten and many new laws must
be implemented to accommodate the changes. Computer crime and abuse extends to
any wrongdoing involving equipment and Internet usage, as Table 2.1 shows. We spoke
earlier about anonymity not being a license for socially unacceptable behavior. You
should remember that everything you do on a network or the Internet is recorded and can
be tracked. Many people committing computer crimes and abuse have been caught and
prosecuted.
13
Other issues affecting our society include job losses and career changes caused by
technology. You can argue the positive or negative effects, but one thing is clear: you'll
be a part of the evolution of technology for the rest of your life. You will have to
continually update your skills and knowledge in order to remain competitive in the job
market. As companies continue to embrace new technology and new methods of using it,
you'll be responsible for ensuring your skills and education remains current.
2.2 IT Infrastructures and Platforms
Three major levels of infrastructure exist particularly:
•
Public (kamusal)
•
Enterprise (kurumsal)
•
Business unit (işletme biriminde)
14
Levels of IT Infrastructure
INFRASTRUCTURE COMPONENTS
There are Seven (7) Key Infrastructure Components
•
Computer Hardware Platforms(Hadoop Tool)
•
Operating System Platforms (Windows 2000, Windows Server 2003)
•
Enterprise Software Applications (like Oracle)
•
Data Management and Storage (Microsoft SQL Server)
•
Networking/Telecommunications Platforms (Enterprise Networking almost
entirely Unix / Linux)
•
Internet Platforms (Apache remains Web server software)
•
Consulting and System Integration Services (Most firms today, even large firms,
cannot develop their systems without significant outside help. *Danışmanlık ve
Sistem Entegrasyon Servisleri)
15
IT Infrastructure - A Multitiered Client/Server Network (N-tier)
2.3 Managing Data Resources
File Organization Terms and Concepts
•
Bit: Smallest unit of data; binary digit (0,1)
•
Byte: Group of bits that represents a single character
•
Field: Group of words or a complete number
•
Record: Group of related fields
•
File: Group of records of same type
•
Database: Group of related files
•
Entity: Person, place, thing, event about which information is maintained
•
Attribute: Description of a particular entity
•
Key field: Identifier field used to retrieve, update, sort a record
16
THE DATA HIERARCHY
Entities(Objects) and Attributes (Specializations-Characteristics of the objects)
17
Problems with the Traditional File Environment
Data Redundancy and Inconsistency:
•
Data redundancy: The presence of duplicate data in multiple data files so that the
same data are stored in more than one place or location
•
Data inconsistency: The same attribute may have different values.
Program-data dependence:
•
The coupling of data stored in files and the specific programs required to update
and maintain those files such that changes in programs require changes to the data
Lack of flexibility:
•
A traditional file system can deliver routine scheduled reports after extensive
programming efforts, but it cannot deliver ad-hoc reports or respond to
unanticipated information requirements in a timely fashion.
Poor security:
• Because there is little control or management of data, management will have no
knowledge of who is accessing or even making changes to the organization’s
data.
Lack of data sharing and availability:
•
Information cannot flow freely across different functional areas or different parts
of the organization. Users find different values of the same piece of information in
two different systems, and hence they may not use these systems because they
cannot trust the accuracy of the data.
Traditional File Processing
18
THE DATABASE APPROACH TO DATA MANAGEMENT
Database Management System (DBMS)
• Software for creating and maintaining databases
•
Permits firms to rationally manage data for the entire firm
•
Acts as interface between application programs and physical data files
•
Separates logical and design views of data
•
Solves many problems of the traditional data file approach
The Contemporary Database Environment
Components of DBMS:
•
Data definition language: Specifies content and structure of database and defines
each data element
•
Data manipulation language: Used to process data in a database
•
Data dictionary: Stores definitions of data elements and data characteristics
19
Types of Databases:
•
Relational DBMS
•
Hierarchical and network DBMS
•
Object-oriented databases
The Relational Data Model
20
A Hierarchical Database for a Human Resources System
The Network Data Model
21
CREATING A DATABASE ENVIRONMENT
Designing Databases:
•
Conceptual design: Abstract model of database from a business perspective
•
Physical design: Detailed description of business information needs
•
Entity-relationship diagram: Methodology for documenting databases illustrating
relationships between database entities
•
Normalization: Process of creating small stable data structures from complex
groups of data
An Unnormalized Relation for ORDER
Normalized Tables Created from ORDER
22
An Entity-Relationship Diagram
DATABASE TRENDS
Data Warehousing and Data Mining
Data warehouse:
•
Supports reporting and query tools
•
Stores current and historical data
•
Consolidates data for management analysis and decision making
23
Components of a Data Warehouse
Data mart:
• Subset of data warehouse
•
Contains summarized or highly focused portion of data for a specified function or
group of users
Data mining:
•
Tools for analyzing large pools of data
•
Find hidden patterns and infer rules to predict trends
Databases and the Web
Database server:
•
Computer in a client/server environment runs a DBMS to process SQL statements
and perform database management tasks.
Application server:
•
Software handling all application operations
24
Management Opportunities:
Business firms have exceptional opportunities to exploit modern relational database
technologies to improve decision making, and to increase the efficiency of their business
processes.
The critical elements for creating a database environment are:
• Data administration
•
Data-planning and modeling methodology
•
Database technology and management
•
Users
Key Organizational Elements in the Database Environment
25