Wednesday 27 May 2015

Assignment 2


CHAPTER 6

 

 

 

ORGANIZING DATA IN A TRADITIONAL FILE ENVIRONMENT

Effective information system provides users with accurate, timely, and relevant information.

Information is timely when it is available to decision makers when it is needed. Information is relevant when it is useful and appropriate for the types of work and decisions that require it.   To understand the problem, let’s look at how information systems arrange data in computer files and traditional methods of file management.

 

FILE ORGANIZATION TERMS AND CONCEPTS

Computer system organizes data in a hierarchy that starts with bits and bytes and progresses to fields, records, files, and databases.  A bit represents the smallest unit of data a computer can handle. A group of bits, called a byte, represents a single character, which can be a letter, a.

 

A computer system organizes data in a hierarchy that starts with the bit, which represents either a 0 or a 1. Bits can be grouped to form a byte to represent one character, number, or symbol. Bytes can be grouped to form a field, and related fields can be grouped to form a record. Related records can be collected to form a file, and related files can be organized into a database. number, or another symbol.

 

A Field is the grouping of characters into a word, a group of words, or a complete number (such as a person’s name or age).

 

Record is a group of related fields, such as the student’s name, the course taken, the date, and the grade. a group of records of the same type is called a file.  A group of related files makes up a database.  An entity is a person, place, thing, or event on which we store and maintain information. Each characteristic or quality describing a particular entity is called an attribute.

Course, Date, and Grade are attributes of the entity COURSE. The specific values that these attributes can have are found in the fields of the record describing the entity COURSE.

 

PROBLEMS WITH THE TRADITIONAL FILE ENVIRONMENT

In most organizations, systems tended to grow independently without accompany-wide plan. Accounting, finance, manufacturing, human resources, and sales and marketing all developed their own systems and data files. program to operate.

 

The following are some of the problems facing the traditional file environment.

 

Data Redundancy and Inconsistency

Data redundancy is the presence of duplicate data in multiple data files so that the same data are stored in more than place or location. Data redundancy occurs when different groups in an organization independently collect the same piece of data and store it independently of each other. Data redundancy wastes storage resources and also leads to data inconsistency, where the same attribute may have different values.

 

 

Program-Data Dependence

Program-data dependence refers to the coupling of data stored in files and the specific programs required to update and maintain those files such that changes programs require changes to the data. Every traditional computer program has to describe the location and nature of the data with which it works. In a traditional file environment, any change in a software program could require a change in the data accessed by that program.

 

Lack of Flexibility

A traditional file system can deliver routine scheduled reports after extensive programming efforts, but it cannot deliver ad hoc reports or respond to unanticipated information requirements in a timely fashion. The information required by ad hoc requests is somewhere in the system but may be too expensive to retrieve.

 

Poor Security

Because there is little control or management of data, access to and dissemination of information may be out of control, Management may have no way of knowing who is accessing or even making changes to the organization’s data.

                                             

Lack of Data Sharing and Availability

Because pieces of information in different files and different parts of the organization cannot be related to one another, it is virtually impossible for information to be shared or accessed in a timely manner. Information cannot flow freely across different functional areas or different parts of the organization.

6.2

THE DATABASE APPROACH TO DATA MANAGEMENT

Database technology cuts through many of the problems of traditional file organization. A more rigorous definition of a database is a collection of data organized to serve many applications efficiently by centralizing the data and controlling redundant data. Rather than storing data in separate files for each application, data are stored so as to appear to users as being stored in only one location. A single database services multiple applications.

 

DATABASE MANAGEMENT SYSTEMS

Database is a collection of data organized to serve many applications efficiently by centralizing the data and controlling redundant data.

 

A database management system (DBMS) is software that permits an organization to centralize data, manage them efficiently, and provide access to the stored data by application programs. The DBMS acts as an interface between application programs and the physical data files. When the application program calls for a data item, such as gross pay, the DBMS finds this item in the database and presents it to the application program. Using traditional data files, the programmer would have to specify the size and format of each data element used in the program and then tell the computer where they were located.

 

How a DBMS Solves the Problems of the Traditional File Environment

A DBMS reduces data redundancy and inconsistency by minimizing isolated files in which the same data are repeated. The DBMS may not enable the organization to eliminate data redundancy entirely, but it can help control redundancy.  The DBMS enables the organization to centrally manage data, their use, and security.

Relational DBMS

Relational databases represent data as two-dimensional tables (called relations). Tables may be referred to as files. Each table contains data on an entity and its attributes. Eg. Microsoft Access is a relational DBMS for desktop.

 

Operations of a Relational DBMS

Relational database tables can be combined easily to deliver data required by users, provided that any two tables share a common data element.

.

Object-Oriented DBMS

DBMS designed for organizing structured data into rows and columns are not well suited to handling graphics based or multimedia applications. Object-oriented databases are better suited for this purpose.

An object-oriented DBMS stores the data and procedures that act on those data as objects that can be automatically retrieved and shared. Object-oriented database management systems (OODBMS) are becoming popular because they can be used to manage the various multimedia components or Java applets used in Web applications, which typically integrate pieces of information from a variety of sources.  Although object-oriented databases can store more complex types of information than relational DBMS, they are relatively slow compared with relational

 

Databases in the Cloud

Cloud computing providers offer database management services, but these services typically have less functionality than their on-premises counterparts.

 

CAPABILITIES OF DATABASE MANAGEMENT SYSTEMS

A DBMS includes capabilities and tools for organizing, managing, and accessing the data in the database. The most important are its data definition language, data dictionary, and data manipulation language.

 

DBMS have a data definition capability to specify the structure of the content of the database. It would be used to create database tables and to define the characteristics of the fields in each table. This information about the database would be documented in a data dictionary. A data dictionary is an automated or manual file that stores definitions of data elements and their characteristics.

 

Querying and Reporting

DBMS includes tools for accessing and manipulating information in databases.  Most DBMS have a specialized language called a data manipulation language that is used to add, change, delete, and retrieve the data in the database.

 

DESIGNING DATABASES

To create a database, you must understand the relationships among the data the type of data that will be maintained in the database, how the data will be used, and how the organization will need to change to manage data from a company-wide perspective. The database requires both a conceptual design and a physical design. The conceptual, or logical, design of a database is an abstract model of the database from a business perspective, whereas the physical design shows how the database is actually arranged on direct-access storage devices.

 

Normalization and Entity-Relationship Diagrams

Is the process of creating small, stable, yet flexible and adaptive data structures from complex groups of data?

 

DATA WAREHOUSES

A data warehouse is a database that stores current and historical data of potential interest to decision makers throughout the company. Data warehouse consolidates and standardizes information from different operational database so that the information can be used across the enterprise for management information.

 

 

Data Marts

A data mart is a subset of a data warehouse in which a summarized or highly focused portion of the organization’s data is placed in a separate database for a specific population of users.

 

TOOLS FOR BUSINESS INTELLIGENCE:

MULTIDIMENSIONAL DATA ANALYSIS AND DATA MINING

Business intelligence tools enable users to analyze data to see new patterns, relationships, and insights that are useful for guiding decision making.  Principal tools for business intelligence include software for database querying and reporting, tools for multidimensional data analysis (online analytical processing), and tools for data mining.

 

Online Analytical Processing (OLAP)

This enable users to view the same data in different ways using multiple dimensions. Each aspect

of information—product, pricing, cost, region, or time period—represents a different dimension.

 

Data Mining.

Data mining provides insights into corporate data that cannot be obtained with OLAP by finding hidden patterns and relationships in large databases and inferring rules from them to predict future behavior. The patterns and rules are used to guide decision making and forecast the effect of those decisions. The types of information obtainable from data mining include associations, sequences, classifications, clusters, and forecasts.

 

 

Text Mining and Web Mining

Text mining tools are now available to help businesses analyze these data. These tools are able to extract key elements from large unstructured data sets, discover patterns and relationships, and summarize the information.

 

Web mining is the discovery and analysis of useful patterns and information from the world.

 

 

MANAGING DATA RESOURCES

 

ESTABLISHING AN INFORMATION POLICY

An information policy specifies the organization’s rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information.  Information policy lays out specific procedures and accountabilities, identifying which users and organizational units can share information, where information can be distributed, and who is responsible for updating and maintaining the information

 

Data administration is responsible for the specific policies and procedures through which data can be managed as an organizational resource. These responsibilities include developing information policy, planning for data, overseeing logical database design and data dictionary development, and monitoring how information systems specialists and end-user groups use data. 

 

Data governance used to describe many of these activities. Promoted by IBM, data governance deals with the policies and processes for managing the availability, usability, integrity, and security of the data employed in an enterprise, with special emphasis on promoting privacy, security, data quality, and compliance with government regulations, the logical relations among elements, and the access rules and security procedures. The functions it performs are called database administration.

 

ENSURING DATA QUALITY

This is to ensure that data in an organizational databases are accurate and reliable.  If a database is properly designed and enterprise-wide data standards established, duplicate or inconsistent data elements should be minimal.  Analysis of data quality often begins with a data quality audit, which is a structured survey of the accuracy and level of completeness of the data in an information system. Data quality audits can be performed by surveying entire data files, surveying samples from data files, or surveying end users for their perceptions of data quality.

 

Data cleansing, also known as data scrubbing, consists of activities for detecting and correcting data in a database that are incorrect, incomplete, improperly formatted, or redundant. Data cleansing not only corrects errors but also enforces consistency among different sets of data that originated in separate information systems.

 

 

 

 

Friday 22 May 2015

Assignment 1


UNIVERSITY OF CAPE COAST

 

COLLEGE OF DISTANCE EDUCATION

 

DEPARTMENT OF BUSINESS

 

MBA

 

BUS 809, MANAGEMENT INFORMATION SYSTEMS

 

SUMMARYOF CHAPTER 4

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

UNDERSTANDING ETHICAL AND SOCIAL ISSUES RELATED TO SYSTEMS

 

Ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors. Information systems raise new ethical questions for both individuals and societies because they create opportunities for intense social change, and thus threaten existing distributions of power, money, rights, and obligations. Information technology can be used to achieve social progress, to commit crimes and threaten cherished social values.

 

Internet and digital firm technologies make it easier than ever to assemble, integrate, and distribute information, improving the use of customer information, the protection of personal privacy, and the protection of intellectual property.

 

Ethical issues raised by information systems help establish accountability, setting standards to safeguard system quality that protects the safety of the individual and society.

 

As a Manager or employee, you will have to decide for yourself what proper legal and ethical conduct when it comes to Information Systems.

 

FIVE MORAL DIMENSIONS OF THE INFORMATION AGE

The major ethical, social, and political issues raised by information systems

include the following moral dimensions:

 

1.         Information rights and obligations. What information rights do individuals and.organizations possess with respect to themselves? What can they protect?

 

2.         Property rights and obligations. How will traditional intellectual property rights be protected in a digital society in which tracing and accounting for ownership are difficult and ignoring such property rights is so easy?

3.         Accountability and control. Who can and will be held accountable and liable for the harm done to individual and collective information and property rights?

4.         System quality. What standards of data and system quality should we demand to protect individual rights and the safety of society?

5.         Quality of life. What values should be preserved in an information- and knowledge-based society? Which institutions should we protect from violation? Which cultural values and practices are supported by the new information technology?

 

KEY TECHNOLOGY TRENDS THAT RAISE ETHICAL ISSUES

There are four key technological trends responsible for these ethical stresses and they are :

 

TREND IMPACT

Computing power doubles every 18 months, the impact is that more organizations depend on computer systems for critical operations.
Data storage costs rapidly, Organizations can easily maintain detailed databases on individuals.
Data analysis advances, Companies can analyze vast quantities of data gathered on individuals to develop detailed profiles of individual behavior
 
Networking advances, Copying data from one location to another and accessing personal data from remote
locations are much easier.

 

 

 

BASIC CONCEPTS: RESPONSIBILITY, ACCOUNTABILITY,

AND LIABILITY

Individuals are responsible for their ethical choices they make. Responsibilty, Accountability, Liability and due process are key elements of Ethical action.

 

Responsibility: Responsibility means that you accept the potential costs, duties, and obligations for the decisions you make.

Accountability: means that mechanisms are in place to determine who took responsible action, and who is responsible. 

Liability is a feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations.

Due process is a process in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly.

 

ETHICAL ANALYSIS

Five-step process that help analyze ethical issues.

 

1. Identify and describe clearly the facts. Find out who did what to whom, and where, when, and how. In many instances, you will be surprised at the errors in the initially reported facts, and often you will find that simply getting the facts straight helps define the solution. It also helps to get the opposing parties involved in an ethical dilemma to agree on the facts.

                                      

2. Define the conflict or dilemma and identify the higher-order values involved. Ethical, social, and political issues always reference higher values. The parties to a dispute all claim to be pursuing higher values.

Typically, an ethical issue involves a dilemma: two diametrically opposed courses of action that support worthwhile values.

 

3. Identify the stakeholders. Every ethical, social, and political issue has stakeholders: players in the game who have an interest in the outcome, who have invested in the situation, and usually who have vocal opinions. Find out the identity of these groups and what they want. This will be useful later when designing a solution.

 

4. Identify the options that you can reasonably take. You may find that none of the options satisfy all the interests involved, but that some options do a better job than others. Sometimes arriving at a good or ethical solution may not always be a balancing of consequences to stakeholders.

 

5. Identify the potential consequences of your options. Some options may be ethically correct but disastrous from other points of view. Other options may work in one instance but not in other similar instances. Always ask yourself, “What if choose this option consistently over time?”

 

 

CANDIDATE ETHICAL PRINCIPLES

 

1.     The Golden Rule:  Do unto others as you would have them do unto you.  This means putting yourself into the place of others, and thinking of yourself as the object of the decision, can help you think about fairness in decision making.

 

2.     Immanuel Kant’s Categorical Imperative If an action is not right for everyone to take, it is not right for anyone. Ask yourself, “If everyone did this, could the organization, or society, survive?”

 

3.    Descartes ’rule of change .If an action cannot be taken repeatedly, it is not right to take at all

This is the slippery-slope rule: An action may bring about a small change now that is acceptable,    but if it is repeated, it would bring unacceptable changes in the long run. In the vernacular, it might be stated as “once started down a slippery path, you may not be able to stop.”

 

4. UtilitarianPrinciple: Take the action that achieves the higher or greater value.  This rule assumes you can prioritize values in a rank order and understand the consequences of various courses of action.

 

5. Risk Aversion Principle Take the action that produces the least harm or the least potential cost. Some actions have extremely high failure costs of or extremely high failure costs of moderate probability(speeding and automobile accidents). Avoid these high-failure-cost actions, very low probability, paying greater attention to high-failure-cost potential of moderate to high probability.

 

6. Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise. (This is the ethical“no free lunch” rule.) If something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

Actions that do not easily pass these rules deserve close attention and a great

deal of caution actual unethical behavior.

                                                                                                     

THE MORAL DIMENSIONS OF INFORMATION SYSTEMS

There are five moral dimension ot information systems they are:

 

INFORMATION RIGHTS: PRIVACY AND FREEDOM IN THE INTERNET AGE

Information technology and systems threaten individual claims to privacy by making the invasion of privacy cheap, profitable, and effective.  Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state. 

 

PROPERTY RIGHTS: INTELLECTUAL PROPERTY

Contemporary information systems have severely challenged existing laws and social practices that protect private intellectual property. Intellectual property is considered to be intangible property created by individuals or Web sites are posting their privacy policies for visitors to review. The TRUST eseal designates Web sites that have agreed to adhere to TRUSTe’s established privacy principles of disclosure, choice, access, and security.

 

SYSTEM QUALITY: DATA QUALITY AND SYSTEM ERRORS

This deals with questions like, What is an acceptable, technologically feasible level of system quality?

QUALITY OF LIFE: EQUITY, ACCESS, AND BOUNDARIES

The negative social costs of introducing information technologies and systems are beginning to mount along with the power of the technology. Many of these negative social consequences are not violations of individual rights or property crimes. Nevertheless, these negative consequences can be extremely harmful to individuals, societies, and political institutions. Computers and information technologies potentially can destroy valuable elements of our culture and society even while they bring us benefits. If there is a balance of good and bad consequences of using information systems, who do we hold responsible for the bad consequences? Next, we briefly examine some of the negative social consequences of systems, considering individual, social, and political responses.