[AISSOC] - Q2 Management Information System.pdf

Full Transcript

AIS 5133 - MANAGEMENT INFORMATION SYSTEM Module 3: Data and Business Intelligence Random access file structure Records can be accessed in any order, Databases...

AIS 5133 - MANAGEMENT INFORMATION SYSTEM Module 3: Data and Business Intelligence Random access file structure Records can be accessed in any order, Databases regardless of their physical location in Database storage media - Collection of related data that is stored in a Fast and very effective when a small number central location or in multiple locations of records need to be processes daily or Data hierarchy weekly - Structure and organization of data which Records are stored on magnetic disks to involve fields (in the cells), records (the achieve speed line-item data), and files - Relative file organization - Helps in online transaction processing Database Management Systems (DBMS) systems - Software for creating, storing, maintaining, - Useful for accessing large amount/large and accessing database files database - Makes using database more efficient - Disadvantage: no backup, expensive, and less storage space Types of Data in a Database a) Internal Data Indexed Sequential Access Method (ISAM) - Collected from within an organization Records accessed sequentially or randomly, - Stored in the organization’s internal depending on the number of accessed databases and can be used by functional ➔ Random access: used for a small number information systems ➔ Sequential access: used for a large b) External Data number - Comes from a variety of sources ➔ Uses an index structure and has two - Stored in a data warehouse parts: 1. Indexed value 2. Pointer to the disk location of the METHODS FOR ACCESSING FILES record matching the indexed value Sequential access file structure Records in files are organized and LOGICAL DATABASE DESIGN processed in numerical or sequential order - Cannot add data in the middle; you will Information is viewed in a database in two ways: be needing to reset or rewrite the whole 1. Physical views: how data is stored on and file retrieved from storage media 2. Logical views: how information appears to users Records are organized based on a primary and how it can be organizes and retrieved key (e.g., Social Security Number or - Depending on the user, there can be more account numbers) than one logical view of data - The primary key is the unique number to distinguish from the records Data models determines how data is created, Used for backup and archive files because represented, organized, and maintained they rarely need updating Includes: - Time consuming, high data redundancy, - Data structure you cannot make random searches - Operations - Integrity Rules Hierarchical Model COMPONENTS OF DBMS - Relationships between records form a treelike structure DBMS software components: - Records are called nodes, and relationships Database Engine between records are called branches - Responsible for data storage, manipulation and retrieval Network Model - Interacts with other components of the - Similar to the hierarchical model but records are DBMS to convert logical request from users organized differently into their physical equivalents - Each record can have multiple parent and child Database Definition records - Used to make and maintain the data dictionary and define database file structure Relational Model - Makes changes to a database’s structure Uses a two - dimensional table of rows and columns of data Database Manipulation - Rows are Records (i.e., tuples) - Used to add, delete, modify, and retrieve - Columns are Fields (i.e., attributes) records from a database - Uses a query language, such as Structured Data Dictionary Query Language (SQL) - Stores definitions, such as data types for fields, default values, and validation rules for Application Generation data in each fields - Used for tasks such as backup and recovery, security, and change Primary Key management - Uniquely identifies every record in a - Used to determine who has permission to relational database perform certain functions, summarized as Create, Read, Update, and Delete (CRUD) Foreign Key - Field in a relational table that matches the Data Administration primary key column of another table - Handles database design and - Used to cross - reference tables management - Establish security measures Normalization - Develop recovery procedures Used to Improve database efficiency - Evaluate database performance - Eliminates redundant data - Add and fine - tune database functions - Ensures only related data is stored in a table Goes through different stages, from First Recent Trends In Database Design And Use Normal Form (1NF) to Fifth Normal Form 1.Data - Driven Web Sites (5NF) Acts as an interface to a database - For write-intensive processing ➔ Retrieve data and allow users to enter data - Disadvantages: not as advantageous for in the database read-intensive, table joints are required, making queries hard Improve access to information ➔ Reduce support and overhead needed to Operations maintain static Web sites - Help retrieve data from tables - Hotmail, web banking, - Common operations: select, project, join, ➔ Give users more current information from a intersect, union, and difference variety of data sources 2.Natural language processing Data Warehouse Collection of data from a variety of sources 3.Distributed Database Management System Support decision - making applications (DDBMS) Generate business intelligence Stores data on multiple servers throughout an Called hypercubes because they store organization multidimensional data Several advantages Characteristics of data in a data warehouse: - Design better reflects the firm’s structure - Subject oriented; focused on a specific - Local data storage reduces response time area - Minimizes effects of computer failure - Comes from a variety of sources - Cost advantage - Categorized based on time - Not limited by physical location of the data - Captures aggregated data Three approaches to setting up a DDBMS: - Used for analytical purposes 1) Fragmentation: Addresses how tables are divided among multiple locations INPUT - Easy usage of data, allows the recently A variety of data sources provide the input for a accessed data in front data warehouse to perform analyses and - Provides security to data; only valid and generate reports. will only contain information necessary These sources can include: 2) Replication: Each site stores a copy of the ➔ External data sources, database, and data in the organization’s database transaction files ➔ Enterprise Resource Planning (ERP) 3) Allocation: Combines Fragmentation and systems Replication ➔ Customer Relationship Management (CRM) systems 4.Object - oriented databases Data and their relationships are contained in a ETL (Extraction, Transformation, and Loading) single object Processes used in a data warehouse An object consists of attributes and methods Extracting (collecting) data from a variety of that can be performed on the object’s data sources ➔ Encapsulation: Grouping objects along with Transformation processing to make sure their attributes and methods into a class data fits operational needs (i.e., Grouping related items into a single Loading into the end target (database or unit) data warehouse)En ➔ Inheritance: New objects can be created faster and more easily by entering new data STORAGE in attributes Collected information is organized in a data Advantages of object - oriented database warehouse as: - Supports more complex data management Raw data: information in its original form - Handles storing and manipulating all types Summary data: gives users subtotals of various of multimedia as well as numbers and categories characters Metadata: Information about data’s content, quality, condition, origin, and other 5.Advances in artificial intelligence characteristics OUTPUT - Provides decision makers with information to Data warehouses use the following to generate act on reports: Methods: Online Analytical Processing (OLAP) Descriptive - Uses multiple sources of information and ➔ Reactive strategy provides multidimensional analysis ➔ Reviews past events, analyzes the data, - Generates business intelligence and provides a report indicating: Data Mining Analysis - What happened in a given period of - Used to discover patterns and relationships time - How to prepare for the future Benefits of Data Warehouses: Predictive ➔ Cross - reference segments of an organization’s ➔ Proactive strategy operations for comparison ➔ Prepares decision makers for future ➔ Generate complex queries and reports faster events than when using databases ➔ Generate reports efficiently using data from a Prescriptive variety of sources ➔ Recommends a course of action that ➔ Find patterns and trends that cannot be found decision makers should follow with databases ➔ Shows the likely outcome of each ➔ Analyze large amounts of historical data quickly decision ➔ Assist management in making well - informed business decisions The Big Data Era ➔ Manage a high demand for information from Voluminous Data many users with different needs and decision - - Conventional computing methods are making styles unable to efficiently process and manage it Involves five dimensions (The 5 Vs) Data Marts 1. Volume Smaller version of a data warehouse, used by a 2. Variety single department or function 3. Velocity Advantages over data warehouses: 4. Veracity ➔ Faster access to data owing to their smaller 5. Value size Provides competitive advantage in many areas ➔ Improved response time for users - Retail, financial services, advertising and public ➔ Easier to create because of their size and relations, government, manufacturing, media simplicity and telecommunication, energy, and ➔ Less expensive healthcare ➔ Effective targeting of users Many technologies and applications have Disadvantages contributed to to growth and popularity ❖ Limited scope - Mobile and wireless technology, the popularity ❖ Difficulty in consolidating information from of social network, improvements in storage and different departments or functional areas affordability Executives should guard against privacy risks Business Analytics - Discrimination, privacy breaches and Uses data and statistical methods embarrassments, unethical actions based on - Gains insight into the data interpretations, loss of anonymity, etc. Module 4: Personal, Legal, Ethical, and Database Marketing Organizational Issues Uses an organization’s database of customers and potential customers to promote product or PRIVACY ISSUES services Employers search social networking sites for ★ Main goal: use information within the database background information on applicants to implement marketing strategies Monitoring systems are adopted by employers ➔ Increase profits to check employee performance ➔ Enhance competitiveness Healthcare organizations, financial institutions, ➔ Establish and maintain long term customer legal firms, and online-ordering firms gather relationships personal data and enter it in databases Transforms marketing from a reactive to a Information about every aspect of people’s lives proactive process is stored on various databases - Multivariate analysis Many practices of government agencies, - Data segmentation credit agencies, and marketing companies - Automated tools using databases would represent an invasion of privacy Tasks performed by successful database Several federal laws regulate the collection and marketing campaigns use of information on people and corporations Calculating customer lifetime value (CLTV) Narrow in scope and contain loopholes Conducting recency, frequency, and monetary analysis (RFM) Important concepts regarding the Web and network Using different techniques to communicate privacy: effectively with customers ★ Acceptable use policy Using analytical software and different - Set of rules specifying legal and ethical use techniques to monitor customer behavior of a system and consequences of across a number of retail channels noncompliance - Restricts the use of a certain application TABLEAU AND POWER BI: TWO POPULAR BI and sets the guidelines AND VISUALIZATION PLATFORMS ★ Accountability Tableau - Issues involving both the user’s and the Data visualization tool organization’s responsibilities and liabilities Used for generating business intelligence (BI) - It also relates to the acceptable use policy Analyzes data for generating trends using ★ Nonrepudiation graphs and charts - Method for binding all the parties to a “What - if” analysis contract Power BI Microsoft platform Guidelines to Minimize Invasion of Privacy Allows users to analyze and visualize data Conduct business only with Web sites with - Different sources privacy policies that are easy to find, read, and - Different formats understand Integrates with existing data and applications Limit access to personal information to those who have authorization Ensure data’s reliability and take precautions to prevent misuse of the data Make sure data collection has a stated purpose ➔ Discard personal data when no longer needed Safe transfer of data across borders for stated purpose At certain companies, appointment of a GDPR Prevent personal information from being disclosed compliance officer without consent or used for undisclosed purposes Use verification procedures to ensure data Business benefits: accuracy ➔ Consumer confidence Ensure records kept on an individual are accurate ➔ Better data security and up to date ➔ Reduced maintenance by retiring Users should be able to review and correct their noncompliant software records ➔ Better alignment with evolving technology ➔ Also known as the “Write access” ➔ Better decision making from effective use of customer information Record-keeping systems that store personal data should not be kept a secret E-MAIL Take all necessary measures to prevent Spam: unsolicited “junk” e-mail sent for unauthorized access to data and misuse of data advertising purposes - Sent in bulk using automated mailing Federal Data Protection Laws software Health Insurance Portability and Accountability - Spammers sell their address lists Act (HIPAA) Ease of access Fair and Accurate Credit Transaction Act (FACTA) ➔ Individuals should assume that others have - FCRA: To protect consumers from identity access to their messages theft ➔ Any e-mails sent on company-owned Children’s Online Privacy Protection Act (COPPA) computers are the property of an - By giving parents control what information organization can be collected from their children - Company has right to access to ensure their protection & security General Data Protection Regulation (GDPR) Covers a series of laws in order to protect Data Collection on the Web European Union (EU) citizens’ personal data Number of online shoppers is increasing rapidly (even some non-European countries who have because of convenience, array of choices, and transactions with EU citizens) lower prices ➔ Genetic data - But some avoid online purchases because of ➔ Racial or ethnic origin concerns about hackers ➔ Religious beliefs Concern that personal information will be sold to ★ Goal is more consistent protection of consumer telemarketing firms and personal data across EU nations Information users provide on the Web can be - Applies to each member state of the combined with other information and European Union technologies to produce new information Key components: Cookies: small text files with unique ID tags that User consent are embedded in a Web browser and saved on Data must be anonymized the user’s hard drive - Outlined to a specific set of rules; remove ➔ Help Web sites customize pages for users the identifiers of the collected data - Considered an invasion of privacy when Notification of data breaches to the users’ information is used without prior supervisory authority consent - Installing a cookie manager helps users and patents developed by people or disable cookies businesses Log files record a user’s actions on a Web site Categories Of Intellectual Property ➔ Generated by Web server software Industrial property: inventions, trademarks, ➔ Can help determine cases of identity logos, and industrial designs misrepresentation on Web sites Copyrighted material: literary and artistic Data collected on the Web must be used and works interpreted with caution ➔ Online materials such as Web pages, HTML code, and computer graphics Ethical Issues of Information Technologies ➔ Fair Use Doctrine: exception to the Information technology offers opportunities for copyright law that allows the use of unethical behavior because of the ease of copyrighted material for certain purposes collecting and disseminating information Increase in cybercrime, cyber fraud, identity Intellectual Property Protections theft, and intellectual property theft Trademark: protects product names and Organizations can reduce unethical behavior of identifying marks (e.g., logos) employees by developing and enforcing codes of Patent: protects new processes ethics Advantages of patents to organizations: ➔ Generates revenue by licensing the patent Censorship ➔ Attracts funding for research and Two types of information available on the Web: development 1. Public information is posted by an ➔ Keeps competitors from entering certain organization or public agency market segments Censored for public policy reasons Censored if the content is deemed 1980 revisions to the Copyright Act of 1976 include offensive to a political, religious, or cultural computer programs group Both people and organizations can be held liable for unauthorized duplication and use of 2. Private information is posted by a person copyrighted programs Uncensored because of constitutional freedom of expression Laws covering legal issues related to information technologies in the U.S. Restricting access to the Web ➔ Telecommunications Act of 1996 Countries such as China, Myanmar (Burma), and ➔ Communications Decency Act (CDA) Singapore restrict or forbid their citizens’ access ➔ Laws against spamming to the Web ➔ Internet neutrality: Internet service Cybersquatting providers (ISPs) and government agencies Registering, selling, or using a domain name to should treat all data on the Internet equally profit from someone else’s trademark Parents use programs such as CyberPatrol, Typosquatting CYBERSitter, Net Nanny, and SafeSurf to Relies on typographical errors made by Web prevent children’s access to Web sites users when typing a Web site address into a Web browser Intellectual Property - Variation of cybersquatting ➔ Legal umbrella covering protections that - Also called URL hijacking involve copyrights, trademarks, trade secrets, Social Divisions and the Digital Divide Health/emotional well-being of children Digital divide: created between the information Parents may spend too much time on rich and the information poor by information smartphones technology and the Internet Children do not receive time or attention from Computers still are not affordable for many parents people Increase in accidents by young children when - Increasing funding for computers at parents use gadgets schools and public places helps offset Five types of Internet addiction: the divide 1. Cybersexual The speed of the Internet connection also 2. Web compulsions (gambling, shopping, stock plays a role trading) 3. Cyber-relationships (social media, dating, virtual The Impact of Information Technology in the communication) Workplace 4. Gaming Increased consumers’ purchasing power 5. Information seeking - Results in a stronger economy by reducing production costs Distracted walking while using a smartphone Information technologies have a direct effect on Injuring others the nature of jobs Tripping, sprains, fractures, bruises, ➔ Telecommuting enables people to perform concussions, death their jobs from home Selfie deaths while taking pictures in ➔ Organizations can use the best human dangerous situations resources in a large geographical region Recommendations for overcoming Internet and Job deskilling: occurs when skilled labor is smartphone addiction: eliminated by high technology Admit that you have a problem Virtual organizations: networks of independent Limit your usage; schedule usage companies, suppliers, customers, and Change patterns by not using mobile devices manufacturers connected via information Socialize more technologies Find interests that do not involve mobile ➔ Share skills and cost devices ➔ Have access to each other’s markets Turn off devices at certain times; keep them inaccessible Information Technology and Health Issues Ask for professional help Increasing popularity of touchscreens - May result in stress-related injuries of the Green Computing users’ hands, arms, back, and eyes ★ Promotes a sustainable environment and Text neck: describes neck pain and damage consumes the least amount of energy caused from looking down at handheld devices. Involves design, manufacture, use, and disposal of computers, servers, and computing devices Health problems related to computer equipment with minimal impact on the environment Vision problems Requires cooperation of both private and public Musculoskeletal problems sectors Skin problems Reproductive problems Implementation approaches: Stress-related problems Green design (creating energy-efficient devices) Green manufacturing (minimizing waste and energy use) Green use (minimizing electricity consumption of devices) Green disposal (repurposing, recycling) Ways to achieve green computing: Design products that last longer and are modular in design - Parts can be upgraded without replacing the entire system Design search engines and computing routines that are faster and consume less energy Replace underutilized small servers with one large server using a virtualization technique Use computing devices that consume less energy and are biodegradable Allow certain employees to work from their homes Conduct meetings over computer networks to reduce business travel Use cloud computing services Turn off idle PCs Recycle computer-related materials Encourage carpooling or non motorized and public transportation SHORT ASSESSMENT 1. Which type of data can be found in a database? a) Internal data b) External data c) Both A and B d) None of the above 2. This method for accessing files is known to be fast and very effective when a small number of records need to be processed daily or weekly. a) Sequential access file structure b) Random access file structure c) Indexed sequential access method d) Simple indexed access method 3. A model which is similar to the hierarchical model but records are organized differently and each record may have multiple parent and child records a) Network Model b) Relational Model c) Hierarchical Model d) Physical Model 4. Which of the following statements about Data Administration is incorrect? a) Handles database design and management b) Establish security measures c) Develop recovery procedures d) Evaluate data and information performance 5. These are the three approaches to setting up a Distributed Database Management System (DDBMS). a) Fragmentation, Replication, Migration b) Fragmentation, Replication, Allocation c) Integration, Redundancy, Allocation d) Integration, Redundancy, Migration 6. A collection of data from a variety of sources that supports decision-making applications and help generate business intelligence a) Data Warehouse b) Database c) Data Diagram d) Data Mart 7. The following are the benefits of data marts over data warehouses: a) Faster access to data owing to their smaller size b) Improved response time for users c) Easier to create because of their size and simplicity d) All of the above 8. With regard to the dimensions of the Big Data Era, the 5Vs stand for: a) Volume, Vivid, Velocity, Valid, Value b) Viable, Variety, Versed, Veracity, Vigor c) Volume. Variety, Velocity, Veracity, Value d) Viable, Vivid, Versed, Valid, Vigor 9. Set of rules specifying legal and ethical use of a system and consequences of noncompliance. a) Intellectual Property b) Federal Data Protection Laws c) Acceptable use policy d) General Data Protection Regulation 10. This refers to equal treatment of all data on the internet as observed by internet service providers (ISPs) and government agencies a) Internet partiality b) Internet neutrality c) Information objectivity d) Information partiality 11. It is created between the information rich and the information poor by information technology and the Internet. a) Data Divide b) Entity Divide c) Information Divide d) Digital Divide 12. Which of the following is an impact of information technology in the workplace? a) Telecommuting enables people to perform their jobs from home b) Organizations can use the best human resources in a small geographical region c) Decrease in consumers’ purchasing power d) Results in a stronger economy by increasing production costs 13. Involves design, manufacture, use, and disposal of computers, servers, and computing devices with minimal impact on the environment. a) Green Computing b) Green Typing c) Green Accounting d) None of the above 14. The legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents developed by people or businesses a) Copyrighted materials b) Intellectual property c) Trademark d) Patent 15. Which of the following statements about the General Data Protection Regulation (GDPR) is most correct? a) Covers a series of laws in order to exclusively protect only the European Union (EU) citizens’ personal data (even some non-European countries who have transactions with EU citizens) b) Focuses more on the racial or ethnic origin data c) May apply to some non-European countries who have transactions with EU citizens d) Goal is more inconsistent protection of consumer and personal data across EU nations 16. Uses an organization’s database of customers and potential customers to promote product or services a) Database Selling b) Database Marketing c) Database Analytics d) Database Financing 17. A method of business analytics which referred to as a proactive strategy and prepares decision makers for future events a) Predictive b) Descriptive c) Prescriptive d) None of the above 18. ETL stands for a) Entity, Transformation, Leaping b) Extraction, Transaction, Loading c) Extraction, Transformation, Loading d) Entity, Transaction, Leaping 19. In relation to object-oriented databases, which of the following refers to the grouping of objects along with their attributes and methods into a class ? a) Encapsulation b) Inheritance c) Fragmentation d) Replication 20. These are the networks of independent companies, suppliers, customers, and manufacturers connected via information technologies a) Virtual jobs b) Virtual workplaces c) Virtual markets d) None of the above ANSWER KEY: 1. C 6. A 11. D 16. B 2. B 7. D 12. A 17. A 3. A 8. C 13. A 18. C 4. D 9. C 14. B 19. A 5. B 10. B 15. C 20. D REFERENCES: Bidgoli, H. (2021). Management Information Systems Tenth Edition. Cengage Learning

Use Quizgecko on...
Browser
Browser