Friday, 29 May 2015

MIS Chapter 6 Summary

FOUNDATION OF BUSINESS INTELLIGENCE: DATABASE AND INFORMATION SYSTEM


Organizing Data In Traditional File Environment

In a traditional file environment each department store file separately which is available to other department. This system is associated with the following problems
  1. Data Redundancy: Duplicate data in multiple data file are found because each department independently collect same information leading to wastage of storage space.
  2. Data Inconsistency: Various copies of the same data may not agree leading to lack of integrity of data.
  3. Lack of Flexibility: Traditional file system can deliver routine schedule report after extreme programing but can not deliver an ad hoc report or respond to unexpected information in timely fashion.
  4. Poor security: There is little control or management of data which make access to and dissemination of information to be out of control.
  5. Lack of data sharing and availability: Pieces of information store in different file and in different part of the organization can not be related to one another and that makes it impossible for information to be share.
  6. Program data dependence: Data store in file can be maintain and updated by specific program such that a change in program require changes in data


Database Approach To Data Management

Database: Is a collection of data organized to serve many application efficiently by centralizing the data and controlling redundant data

Database Management System (DBMS): DBMS is a software that permit an organization to centralize data, manage them efficiently, and provide access to the store data by application program. DBMS act as an interface between application program and the physical data file.


Relational DBMS: Relational DBMS represent data as two dimensional tables (called relation) or file. Each table contains data on entity and attributes.


Operation Of a Relational DBMS
Three basic operations used to develop useful set of data incudes:
  1. Selection: Is used to create a subset of data of all records that meet stated criteria.
  2. join: Involves combining rational tables that provide user with more information available in individual tables
  3. project: This  operation create subset of columns in tables which permit the user to create new table that contain only the information require.

Object Oriented DBMS (OODBMS): OODM store data and procedure as object that can be automatically retrieved and share. the object can be- graphics, multimedia, java applets. OODBMS can store more complex information than the rational DBMS but relatively slow due to processing large number of transaction.

Hybrid Object-Rational DBMS: This system provide the capabilities of both OODBMS and rational DBMS.

Database In The Cloud: Cloud computing service providers can provide cloud DBMS but such service is less functionality than on-premises database.


Capabilities of DBMS
  • Data Definition: This capability is used to specified the structure of the content of the database. It help in creating tables and defining the characteristics of field in each table.
  • Data Dictionary: is an automated or manual file that store definition of data element and their characteristics.
  • Data Manipulation: It also use to add, change, delete, retrieve data from the database. This capability contains language commands that permit end users and programing specialist to extract data from the database to meet information request and develop applications.

Designing Database
creating a database require two dimensional exercise. Including
  • Conceptual Design: Is an abstract model of database from a business perspective
  • Physical Design: This show how database is arrange on direct-access storage device.

Normalization: Involves streamlining complex group of data to minimize redundant data element and awkward many to many relationship.


Entity Relation Diagram: It illustrate the relationship between entities. Is use by database designers to document data model

Distributing Database: This involves storing data in more than one place.
  • Partitioned: This is where separate locations store different parts of database
  • Replicated: Central database duplicated is entirely at different location.


Using Database To Improve Business Performance And Decision Making

Companies with large database require special capability and tools to analys and for accessing data from multiple system.

Three Key Techniques For Handling Large Database

1. Data Warehousing: Is a database which store current and historical data  of potential interest to decision makers throughout the organization. Such data originate from core operational transactions system.

Data Marts: Is a subset of data warehousing in which summarize focus portion of the organization data is place in a separate database for a specific population of users

Tools for Business Intelligence
These are tools which enable users to analys data to see pattern, relationship, and insight that guide decision making. These tools are:
  1. Software for database query and reporting
  2. Tools for multidimensional data analysis ( online analytical process - OLAP)
  3. Data mining


2. Data mining: Is more discovery driven than the OLAP. Provide insight into corporate data that can not be obtain with OLAP by finding hidden patterns, relationship in large database and infer rules to predict future behavior. The pattern and rules guide decision making and forecast the effect of those decision.

Types Of Information Obtain From Data Mining
a) Association: These are occurrences link to a single  event.
b) Sequence: This are event that are link overtime.
c) classification: Recognize the pattern that describe the group to which an entity belongs by examining existing items that have been classified and infer asset of rules.
d) Cluster: Discover different grouping within data where no group have defined.
e) Forecasting: uses a series of existing values to predict what other values will be.


Predictive Analysis: involves using data mining techniques, historical data, and assumption about future condition to predict outcomes of events.

Text Mining: Is a tool that extract large unstructured data set, discover pattern and relationship and summarize the information. Is useful tool to organization because most organization information are in the form of a text file like e-mails memo's, survey responses.

Web Mining:  Is the discovery and analysis of useful information from the WWW. Web mining help business understand  customer behavior, evaluate the effectiveness of a particular Web site.

Web content: Extract knowledge from the content of Web pages which includes: text, images, audio, video.

Web structure mining: Extract useful information from link embedded I web document.

Web usage mining: Examines data recorded by web server whenever request for a web site resources are received.


Databases and The Web
some organizations use the web to make internal database available to customers . typical configurations include:
  • web server
  • application server
  • database server


Advantages of using web for database access
  1. Ease of use of browser software
  2. Web interface require few or no changes to database
  3. Inexpensive to add web interface to system

 

Managing Data Resources

Establishing Information Policy: This is a set of rule for sharing, dissemination and keeping of information. This policies are require to manage information well in organization.

Data administration: they are responsibility for specific policies and procedures through which data can be manage as an organizational resources. Responsibilities include: information policy, data planning, overseeing logical database design etc.

Data governance: Policies and processes for managing availability, usability, integrity and security of enterprise data especially as it relate to government regulation.


Ensuring Data Quality
To ensure data quality organizations should ensure the following is done:
  • Data Quality Audit: Is a structure survey of accuracy and level of completeness of data in an information system. the survey sample data file and also survey end user perception of quality.
  • Data cleansing: Involves using a software to detect and correct data that are incorrect, incomplete, improperly formatted or redundant. 

















 



chapter 4


UNDERSTANDING ETHICAL AND SOCIAL ISSUES RELATED TO SYSTEMS

The past few years have witnessed ethically challenging periods for global business as some senior and middle managers demonstrate failed ethical judgment leading to the collapsed of many organization.

Ø  Recent cases of failed ethical judgment in business
    -Lehman Brothers, Mineral management service, Pfizer,

Ethics:

Is the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors. The development in which firms are encouraged to cooperate with prosecutors to reduce charges against the entire firm for obstructing investigation require managers to decide for themselves what constitute proper legal and ethical conduct.

 

Information system and ethics

Information system raised new ethical questions for both individuals and society as they create opportunity for:

  1. intense social change, threatening existing distribution of power, money right and obligation.
  2. New kind of crime - Information technology can be used to achieve social progress like other technologies but can also be used to commit crime and threaten cherished social values.
Models for thinking about Ethical, Social and Political Issues
  • Society as a calm pond
  • Information technology as a rock in to the pond, creating ripples of new situation not covered by old rules
  • Social and political institutions can not respond overnight to these ripples as it may take years develop etiquette, expectation, laws.


Five (5) Moral Dimensions of Information Age
  1. Information right and obligation: What information rights do individuals and organizations possess with respect to themselves? What can they protect?
  2. Property rights and obligations. How will traditional intellectual property rights
    be protected in a digital society in which tracing and accounting for ownership
    are difficult and ignoring such property rights is so easy?
  3. Accountability and control. Who can and will be held accountable and liable for
    the harm done to individual and collective information and property rights?
  4. System quality. What standards of data and system quality should we demand to
    protect individual rights and the safety of society?
  5. Quality of life. What values should be preserved in an information- and
    knowledge-based society? Which institutions should we protect from violation?
    Which cultural values and practices are supported by the new information
    technology?

Key Technological Trend That Raise Ethical Issues
- Doubling of computing power
  • More organizations depend on system for critical operations
-Rapidly declining data storage cost
  • Organizations can maintain easily detailed database on individual
-Networking advances and the internet
  • Copying data from one location to another and accessing personal data from a remote location is much easier.
-Advance in data analysis techniques
  • Vast quantities of data gathered on individual for:
          << Profiling: involve combining data from multiple sources to create dossiers of detailed on information on individuals. Such information can be used by organization to target their marketing companies.

          << Nonobvious relationship awareness (NORA) : the technology combine data from multiple sources to find obscure connections that might help find criminals or terrorist.


 

ETHICS IN AN INFORMATION SOCIETY

Basic Concept For Ethical Analysis:


  • Responsibility: Involves accept the potential costs, duties, and obligations for the decisions you make. Ethical choices are made by individuals who are responsible for the consequences of their actions.
  • Accountability: Is a mechanisms put in place to identify responsible parties. In an institution in which it is impossible to find out who took an action will be incapable of ethical analysis
  • Liability: Is a body of law which permits individual and firms to recover damage done to them by actors, organization and systems.
  • Due process: Laws known and understood with an ability to appeal to higher authority to ensure that the laws are applied correctly.

 


Five Steps Process of Ethical Analysis


  1. Identify and clearly describe the fact: Find out who did what to whom and when, where and how
  2. Defind the conflict or dilemma and identify the higher-order values involved: Ethical, social, and political issues always reference higher value in which parties in a dispute claim to pursue. Typical ethical issues involve two opposing course of action that support worthwhile values.
  3. Identify stakeholders: stakeholder groups must be identify and find out what they want as they have interest in the outcome and have also invested in the situation.
  4. Identify reasonable option that you can take: Find out available option that can help arrive at good ethical solution.
  5. Identify the consequence of your option: Some options may be ethically correct but disastrous from other point of view. Others may work in one situation but not in other similar instances.

 

Six Candidate Ethical Principle

This are principles that can be used to make decision after ethical analysis. They include:
  1. Golden rule: Do unto other as you want them do unto you. This require putting one self in the place of others and thinking of one self as the object of the decision ensure fairness in decision making.
  2. Immanuel Kant's Categorical Imperative: State that if an action is not right for everyone to take, then is right for anyone.
  3. Descartes' Rule of Change: this rule also state that an action which can not be taken repeatedly, is not right to take at all as such action may bring a change which is acceptable now but when repeated bring unacceptable change.
  4. Utilitarian Principle: Take action that achieves the higher greater value. The principle assume prioritizing value in rank order and understand the consequences of each course of action.
  5. Risk Aversion Principle: The principle requires action that produce least harm or least potential cost to be taken.
  6. Ethical "No free lunch" rule: State that something created by someone which is useful to you, has value and you should assume the creator want compensation for this work.
 

Professional Code of Ethics

Professional Code of conduct are promulgated by professional bodies to regulate themselves in the general interest of society. For instance, such professional code may be put in place to avoid harm to others, honoring property right and respecting privacy. Examples of such professional bodies are AMA, ABA, AITP, ACM

Some Real-World Ethical Dilemma


Information systems have created new ethical dilemmas in which one set of interests is pitted against another. For example, while many companies are using information technology to reduce the sizes of their workforces, many workers are also loosing their jobs as a result. 

 

Moral Dimension of Information System

Privacy and Freedom:

 Privacy: Privacy is the claim of individual to be left alone, free from surveillance or interference from other individual  or organization including the state. claim of privacy is also involve in the work place as workers are subject to electronic and other form high-tech surveillance. Information technology threaten privacy claim by making invasion of privacy cheap, profitable and effective.

Fair information practices(FIP)
Is a set principles governing the collection and use of information. FIP principles are base on mutuality of interest between record holder and individual. In 1998 the original FIP was restated and extended by FTC to provide guidelines  for protecting online privacy.
The FTC's FIP principles are used to drive changes in the privacy legislation. Example, children online privacy protection Act (COPPA), Health Insurance Portability and Accountability Act (HIPAA).

FTC FIP Principles
Notice / awareness
Choice / consent
Access / Participation
Security
Enforcement

Europe Directive On Data Protection
the European commission directive on data protection require companies to inform people when they collect information them and disclose how it will be store and used. The directive also require that customers must provide their inform consent before any company can legally used data about them, and they have the right to access that information, correct it and request that no further data be collected.
The commission also direct it member nations not to transfer personal data to countries with no similar privacy protection regulation. However, the U.S department of commence worked with the European commission to develop a safe harbor framework for U.S firms which allow U.S firms to use personal data from EU countries if the develop privacy protection policies that meet EU standard.
   

Internet Challenge To Privacy
internet technology has poses new challenge to privacy because as information is sent over the internet many computer system are capable of monitoring, capture or store communication. As a result information about people is collected as they visit website and web pages or request for free service online. This has made it popular for companies to use the tools outline below to monitor their website and find out who is visiting the site.
   1. Cookies: they are small files downloaded by a web site to a computer hard drive when the user visit the website.
   2. Web beacons: is a tiny graphics embedded in e-mail and web pages to monitor who is reading. they are place on the web site by third party firm for a fee.
   3. Spyware: They piggyback on large application to install themselves secretly on internet users computer. They display unwanted advertisement and other unsolicited material to users.


Property Right

Intellectual Property: Is an intangible property of any kind created by individual or organization. Information technology has made it difficult to protect it because computerize information can easily be copied and distributed over the internet.

Three Ways To Protect Intellectual Property
  • Trade Secret: Is an intellectual work or product belonging to a business, which is not in the public domain. Trade secret laws grant monopoly on the idea behind the work or product.
  • Copyright: Is a statutory grant that protect intellectual property of an author from being copied by others during his life time, plus 70 years. Copyright protect against coping of entire program or part.
  • Patent: Involves granting an creator of an invention an exclusive monopoly on idea behind the invention for 20 years. Patent law unsure the inventors of new machines and devices receive full financial rewards on their labor.
Challenges To Intellectual Property Right
  • Ease of replication
  • Ease of transmission
  • Compactness
  • Difficult in establishing uniqueness

Accountability, liability, control

Existing liability laws and social practices for holding individual and organization accountable are been challenge by new information technology because is difficult to associate injury suffered using information system to a particular person.

Computer Related liability Problem
If a software fails, who is responsible
  • If is seen as part of a machine that injures or harms, then the software producer or operator may be liable.
  • If seen as similar to a book, difficult to hold author / publisher responsible


System Quality

an acceptable, technologically feasible system can not be without imperfection though software companies debug their product before releasing it into the market. the companies ship buggy product because the time and cost of fixing all minor errors would prevent these product from ever been released. However, individual and organization that produce such product may be held responsible for avoidable and foreseeable consequence which the owe a duty to perceive and correct.

Three Sources Of Poor System Performance
  • Software bugs / errors
  • Hardware or facility failure cause by natural causes
  • Poor input data quality


Quality Of Life: Equity, Access And Boundaries

the negative social cost of information technology is beginning to mount along with the power of technology. these negative social consequences are not in violation to individual right or property but can be extremely harmful for individual society and political institution .These negative social consequences are:
  1. Rapidity Of change: Businesses which may not have enough time and resources to respond to global competition, may be wipeout in years ahead leading to employees loosing their job
  2. Maintaining boundaries: Computing and internet usage have weakened the traditional boundary that separate work from family and leisure. this is made possible through the use of telecommuting, nomad computing and do anything anywhere computing environment.
  3. Dependence and Vulnerability: Today both public and private organization (businesses, government, schools, churches etc.) depend more on computer system and are vulnerable if these system fails.
  4. Computer Crime and Abuse: computer crime is the commission illegal act through the use of computer. Computer may be an object of crime (destroying a company computer files). However, computer abuse is the commission f act involving a computer that may not be illegal but are considered unethical.
  5. Employment: Work redesigning as a result of information technology may result in job losses by Mid-Level managers and clerical workers
  6. Equity And Access: Certain ethnic and income group are less likely to have internet access due to social, economic and cultural gaps that exist.