CH 1 Information Model
CH 1 Information Model
1
BACS3183
Assessment Criteria
• Examination Component 30%
2
Chapters
Chapter 1: Information Models
3
Introduction
4
Introduction
The goal of information systems is to transform data into
information in order to generate knowledge that can be
used for decision making.
ie the system must be able to take data, put the data into
context, and provide tools for aggregation and analysis.
5
How much of this
data is useful
information??
https://www.domo.com/learn/data-never-sleeps-8 6
Data- Raw, non- Information- Data that have
summarized , and been converted into a
unanalyzed facts meaningful and useful
and figures context for the receiver
Knowledge: Provide
answers to “how”
questions
Information :
Provide answers to
“who”, “what”,
“where” and
“when” questions
8
Data or Information?
https://www.worldometers.info/coronavirus/#countries
9
Data or Information?
https://www.worldometers.info/coronavirus/#countries
10
By 2025, it’s
estimated humanity
will have produced a
total of 175
zettabytes of data.
For context, that’s
175,000,000,000
terabytes.(1 TB = 210
GB)
https://chartio.com/learn/b
usiness-intelligence/how-
to-use-data-warehouses-
in-business-intelligence/
11
https://www.domo.com/learn/data-never-sleeps-8
Information Systems & DBMS
Unstructured
Data
Data Extract,
Transform,
and Load
14
Categorization of information
• Source
– Primary information
• original source document
– Secondary information
• processed primary sources, second-hand versions
– Internal information
• Internal information could come from variety of source
within the company such as different departments.
– External information
• External information can be gathered outside the
company, either by interviewing customers or examining
published data.
15
Categorization of information
• Nature - Qualitative or Quantitative
16
17
Categorization of information
– Level
• Strategic information: for long-term decisions (eg
Lower
Individual operational
(operational)
databases
– Time
• Historic information : gathered and stored over a period
of time; allows decision makers to draw comparisons
between previous and present activities; can be used to
identify trends over a period of time.
22
Big Data Analytics
• Politics (the prediction of election results)
• Business (targeted social media advertising etc)
• Health care (the identification of epidemics and market
efficiencies in delivery)
• etc
https://healthitanalytics.com/news/intersection-of-big-data-analytics-
covid-19-top-focus-of-2020 23
Big data - data that exist in very large volumes and many different
varieties (data types) and that need to be processed at a very high
velocity (speed).
A common example is a
library catalog, which
contains data about the
contents and location of a
book.
ie they are data about
the data in the book
25
Metadata/schema association with data
Data dictionary
26
Metadata/schema association with data
• How a database sees data so that it can be found
• by storing metadata/schema associated with data
• DBMS schema are stored in data dictionary
• In Oracle, the views such as ALL_USERS, ALL_TABLES,
ALL_COLS_PRIVS, ALL_CONS_COLUMNS
enable one to retrieve the data dictionary
27
Indexing for fast access
• Types of indexing
– Hashed files, B+-trees, bit-map etc
– Database efficiency and tuning
Select * from employee where empId = ‘E03033’;
28
Access through queries
– Procedural queries is cumbersome and prone to error
• programmer must provide the right sequence of
instructions
• Requires some technical knowledge
– Declarative queries
• Only need to state WHAT you need not HOW to get it
• E.g SQL
– Navigational queries
• where the searcher knows where he wants to go to find
something.
• Navigational queries come in two types:
– a word, name or brand strongly or uniquely associated
with one particular web site: HP, ebay, hotmail, new
york times, yahoo.
– a partial or complete web address: ebay.com,
www.hotmail, yahoo.com 29
• Information security is designed to protect the
– confidentiality
– integrity
– availability of information
30
Information Security
Confidentiality – preserving authorized restrictions on
information access and disclosure
Integrity – guarding against improper information modification
or destruction, including ensuring information authenticity
and non-repudiation
Availability – ensuring timely and reliable access to and use of
information.
31
According to Risk Based Security research
newly published in the 2019 MidYear
QuickView Data Breach Report, the first six
months of 2019 have seen more than 3,800
publicly disclosed breaches exposing an
incredible 4.1 billion compromised
records.
Perhaps even more remarkable is the fact
that 3.2 billion of those records were
exposed by just 8 breaches. As for the
exposed data itself, the report has email
(contained in 70% of breaches) and
passwords (65%) at the top of the pile.
https://www.forbes.com/sites/daveywinder/2019/08/20/data-breaches-expose-
41-billion-records-in-first-six-months-of-2019/#69d7595ebd54 32
Threats to Information Security
• Accidental losses attributable to:
– Human error
– Software failure
– Hardware failure
• Theft and fraud
• Loss of privacy or confidentiality
– Loss of privacy (personal data)
– Loss of confidentiality (corporate data)
• Loss of data integrity
• Loss of availability
- disruption of access to information or
use of information
e.g., through sabotage
33
• Backup & recovery (ch 8) Disk
Failure
• Physical security - Timeline
34
Database Audit Trace
(1) Enable database
auditing.
DBA Parameter User
file executes
command.
Database
(2) Specify audit options. Server
process
Audit Generate
options audit trail.
(3)Review audit
information.
(4) Maintain audit trail. Audit
OS or XML
trail audit
trail
35
Information Assurance
• Information Assurance (IA) is defined as "measures that
protect and defend information and information systems
by ensuring their availability, integrity, authentication,
confidentiality, and non-repudiation."
36
7
References
37