0% found this document useful (0 votes)
8 views37 pages

CH 1 Information Model

The document outlines the assessment criteria and chapters for the Advanced Database Management course, emphasizing the importance of Information Management in transforming data into actionable knowledge. It discusses various aspects of information, including its categorization, capturing methods, and the significance of information security. Additionally, it highlights the role of databases and analytics in managing large volumes of data for informed decision-making.

Uploaded by

ngyx-wp22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views37 pages

CH 1 Information Model

The document outlines the assessment criteria and chapters for the Advanced Database Management course, emphasizing the importance of Information Management in transforming data into actionable knowledge. It discusses various aspects of information, including its categorization, capturing methods, and the significance of information security. Additionally, it highlights the role of databases and analytics in managing large volumes of data for informed decision-making.

Uploaded by

ngyx-wp22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

BACS3183

Advanced Database Management


Chapter 1
Information Models

1
BACS3183
Assessment Criteria
• Examination Component 30%

• Course Work Assessment 70%


• Test 40%
• Assignment 60%

2
Chapters
Chapter 1: Information Models

Chapter 2: Database Systems


Chapter 3: Data Modelling
Chapter 4: Relational algebra

Chapter 5: Relational Database Design


Chapter 6: Indexing
Chapter 7: Physical Database Design
Chapter 8: Database Security and Transaction Management

Chapter 9: Distributed Database

3
Introduction

Information Management plays a critical role in almost


all areas where computers are used. IM includes the
•capture, digitization, representation, organization,
transformation, and presentation of information
•algorithms for efficient and effective access and
updating of stored information [ ch 6 & 7 & practical ]
•data modelling and abstraction [ ch 3 & 4 & 5 ]
•physical file storage techniques [ ch 7 ]
•information security, privacy, integrity, and protection
in a shared environment. [ ch 8 & 9 ]

4
Introduction
The goal of information systems is to transform data into
information in order to generate knowledge that can be
used for decision making.
ie the system must be able to take data, put the data into
context, and provide tools for aggregation and analysis.

5
How much of this
data is useful
information??

https://www.domo.com/learn/data-never-sleeps-8 6
Data- Raw, non- Information- Data that have
summarized , and been converted into a
unanalyzed facts meaningful and useful
and figures context for the receiver

We tend to gain knowledge from


information and we use that
information to make decisions.
7
7
Data, Information & knowledge

Knowledge: Provide
answers to “how”
questions

Information :
Provide answers to
“who”, “what”,
“where” and
“when” questions

8
Data or Information?

https://www.worldometers.info/coronavirus/#countries
9
Data or Information?

https://www.worldometers.info/coronavirus/#countries
10
By 2025, it’s
estimated humanity
will have produced a
total of 175
zettabytes of data.
For context, that’s
175,000,000,000
terabytes.(1 TB = 210
GB)
https://chartio.com/learn/b
usiness-intelligence/how-
to-use-data-warehouses-
in-business-intelligence/

11
https://www.domo.com/learn/data-never-sleeps-8
Information Systems & DBMS
Unstructured
Data

Database OLAP and


Management Analytics
System

Data Extract,
Transform,
and Load

Online transaction processing (OLTP) captures, stores, and processes


data from transactions in real time.
Online analytical processing (OLAP) uses complex queries to analyze
aggregated historical data.
12
Data Warehouse & Business Intelligence

A data warehouse is a database designed to enable business


intelligence activities to help users make faster, more informed
business decisions.
ETL systems take large volumes of raw data from multiple sources,
converts it for analysis, and loads that data into the data warehouse13
Categorization of information
• Source
• Nature
• Level
• Time

14
Categorization of information
• Source
– Primary information
• original source document
– Secondary information
• processed primary sources, second-hand versions
– Internal information
• Internal information could come from variety of source
within the company such as different departments.
– External information
• External information can be gathered outside the
company, either by interviewing customers or examining
published data.

15
Categorization of information
• Nature - Qualitative or Quantitative

16
17
Categorization of information
– Level
• Strategic information: for long-term decisions (eg

• Tactical information: used for tactical planning and decision-


making within the guidelines set by the strategic plan. (eg
choose suppliers; revise staffing levels; forecast sales,
inventory and cash; prepare budgets.)

• Operational information: for operational planning based on


the tactical plans. (eg correct order delays; schedule
employees; find production bottlenecks; monitoring resource
usage.)
18
Level of Information
Management Hierarchy

External data sources and


Top summarized, tactical databases
(strategic)
Summarized, integrated
Middle operational databases
(tactical)

Lower
Individual operational
(operational)
databases

Transaction databases eg human resource


db, inventory db, production db etc Operational databases
19
Categorization of information

– Time
• Historic information : gathered and stored over a period
of time; allows decision makers to draw comparisons
between previous and present activities; can be used to
identify trends over a period of time.

• Present : information created from activities during the


current work window.

• Future : information that is created using present and


historic information to try to predict the future activities,
trends and events relating to the operation of an
organization.
20
Historic, Present or Future Information?
21
Information Capturing and Representation
Information Capturing:
•OCR, Barcode
•RFID
•Document Imaging
•The WWW (unstructured)
•Twitter
•Blogs Big Data is the current
term for the enormous
•Social Networks
data sets generated by
•Web pages Web and mobile
(Requires Big Data Analytics) applications.
Nonrelational databases
(No SQL)are used to
store Big Data

22
Big Data Analytics
• Politics (the prediction of election results)
• Business (targeted social media advertising etc)
• Health care (the identification of epidemics and market
efficiencies in delivery)
• etc

https://healthitanalytics.com/news/intersection-of-big-data-analytics-
covid-19-top-focus-of-2020 23
Big data - data that exist in very large volumes and many different
varieties (data types) and that need to be processed at a very high
velocity (speed).

Analytics - Systematic analysis and interpretation of data—


typically using mathematical, statistical, and computational tools—
to improve our understanding of a real-world domain
24
Metadata/schema association with data
Metadata (Greek: meta- + Latin: data “information”),
literally “data about data,” ie
information about another set of data.

A common example is a
library catalog, which
contains data about the
contents and location of a
book.
ie they are data about
the data in the book
25
Metadata/schema association with data

Data dictionary

Name Type Length Min imum Max imum Description Source


Course Alphanumeric 30 Blan Blank Course I D and name Academic Unit
k
Section Integer 1 1 9 Section number Registrar
Semester Alphanumeric 10 Blan Blank Semester and year Registrar
Name Alphanumeric 30 Blan Blank Student name Student I S
ID Integer 9 Blan Blank Student I D (S S N) Student I S
Major Alphanumeric 4 Blan Blank Student major Student I S

GPA Decimal 3 0.0 4.0 Student grade point Academic Unit


average

26
Metadata/schema association with data
• How a database sees data so that it can be found
• by storing metadata/schema associated with data
• DBMS schema are stored in data dictionary
• In Oracle, the views such as ALL_USERS, ALL_TABLES,
ALL_COLS_PRIVS, ALL_CONS_COLUMNS
enable one to retrieve the data dictionary

27
Indexing for fast access
• Types of indexing
– Hashed files, B+-trees, bit-map etc
– Database efficiency and tuning
Select * from employee where empId = ‘E03033’;

28
Access through queries
– Procedural queries is cumbersome and prone to error
• programmer must provide the right sequence of
instructions
• Requires some technical knowledge
– Declarative queries
• Only need to state WHAT you need not HOW to get it
• E.g SQL
– Navigational queries
• where the searcher knows where he wants to go to find
something.
• Navigational queries come in two types:
– a word, name or brand strongly or uniquely associated
with one particular web site: HP, ebay, hotmail, new
york times, yahoo.
– a partial or complete web address: ebay.com,
www.hotmail, yahoo.com 29
• Information security is designed to protect the
– confidentiality
– integrity
– availability of information

30
Information Security
Confidentiality – preserving authorized restrictions on
information access and disclosure
Integrity – guarding against improper information modification
or destruction, including ensuring information authenticity
and non-repudiation
Availability – ensuring timely and reliable access to and use of
information.

31
According to Risk Based Security research
newly published in the 2019 MidYear
QuickView Data Breach Report, the first six
months of 2019 have seen more than 3,800
publicly disclosed breaches exposing an
incredible 4.1 billion compromised
records.
Perhaps even more remarkable is the fact
that 3.2 billion of those records were
exposed by just 8 breaches. As for the
exposed data itself, the report has email
(contained in 70% of breaches) and
passwords (65%) at the top of the pile.

https://www.forbes.com/sites/daveywinder/2019/08/20/data-breaches-expose-
41-billion-records-in-first-six-months-of-2019/#69d7595ebd54 32
Threats to Information Security
• Accidental losses attributable to:
– Human error
– Software failure
– Hardware failure
• Theft and fraud
• Loss of privacy or confidentiality
– Loss of privacy (personal data)
– Loss of confidentiality (corporate data)
• Loss of data integrity
• Loss of availability
- disruption of access to information or
use of information
e.g., through sabotage

33
• Backup & recovery (ch 8) Disk
Failure
• Physical security - Timeline

computerized & manual


policies and procedures,
fence, lock & key, security Log
Log(s)
Backup
guards, etc
• Technical security –
encryption, authentication,
authorization, audit trace
etc

34
Database Audit Trace
(1) Enable database
auditing.
DBA Parameter User
file executes
command.

Database
(2) Specify audit options. Server
process
Audit Generate
options audit trail.
(3)Review audit
information.
(4) Maintain audit trail. Audit
OS or XML
trail audit
trail

35
Information Assurance
• Information Assurance (IA) is defined as "measures that
protect and defend information and information systems
by ensuring their availability, integrity, authentication,
confidentiality, and non-repudiation."

Nonrepudiation is the assurance that


someone cannot deny something

36
7

References

• Database Systems: A Practical Approach to


Design, Implementation and Management.
Connolly, T. M. and Begg, C. E. .
• Modern Database Management.Hoffer, J.A.,
Prescott, M., and McFadden,F.
• Database System Concepts . Silberschatz, A.,
Korth, H,. and Sudarshan, S.
• Fundamentals of Database Systems.
Elmasri, R. and Navathe, S.B.

37

You might also like