BT2103 Developing Small Systems for Business Lecture 2 Databases, Data Management, And The Legal Framework.

Slides:



Advertisements
Similar presentations
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Advertisements

WHAT D IS RAW, UNPROCESSED FACTS AND FIGURES COLLECTED, STORED AND PROCESSED BY COMPUTERS.
C6 Databases.
Technology Guide 3 Data and Database T3-1. IT for Management Prof. Efraim Turban T3-2 File Management Hierarchy of data for a computer-based file Record.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Introduction to Databases
Legislation in ICT.
Managing Data Resources
Managing data Resources: An information system provides users with timely, accurate, and relevant information. The information is stored in computer files.
Databases Chapter Distinguish between the physical and logical view of data Describe how data is organized: characters, fields, records, tables,
12 CHAPTER DATABASES Databases are the key to accessing information throughout our lives. Used in hospitals, grocery stores, schools, department stores,
File Systems and Databases
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
1212 CHAPTER DATABASES. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Distinguish between the physical and logical view.
Managing data Resources:
Introduction to Database Management
Databases and Database Management Systems
BT1005 Managing Information Lecture 3 Introduction to Databases and The Database Approach.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
The Legal Framework Can you work out which slide each bullet point should go on?!
Management Information Systems
Database Systems: Design, Implementation, and Management Ninth Edition
General Purpose Packages
COMPUTING FOR BUSINESS AND ECONOMICS-III. Lecture no.6 COURSE INSTRUCTOR- Ms. Tehseen SEMESTER- Summer 2010.
Week 1 Lecture MSCD 600 Database Architecture Samuel ConnSamuel Conn, Asst. Professor Suggestions for using the Lecture Slides.
Database Design - Lecture 1
Managing Data Resources
STORING ORGANIZATIONAL INFORMATION— DATABASES CIS 429—Chapter 7.
CHAPTER 8: MANAGING DATA RESOURCES. File Organization Terms Field: group of characters that represent something Record: group of related fields File:
7.1 Managing Data Resources Chapter 7 Essentials of Management Information Systems, 6e Chapter 7 Managing Data Resources © 2005 by Prentice Hall.
Data Protection Act AS Module Heathcote Ch. 12.
1.file. 2.database. 3.entity. 4.record. 5.attribute. When working with a database, a group of related fields comprises a(n)…
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
DataBase Management System What is DBMS Purpose of DBMS Data Abstraction Data Definition Language Data Manipulation Language Data Models Data Keys Relationships.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
MANAGING DATA RESOURCES ~ pertemuan 7 ~ Oleh: Ir. Abdul Hayat, MTI.
Data resource management
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
Computing and Information Science 1 Databases START.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
DATABASES. -2 Competencies Distinguish between the physical and logical view of data Describe how data is organized Describe databases Describe the five.
3/6: Data Management, pt. 2 Refresh your memory Relational Data Model
CIS 250 Advanced Computer Applications Database Management Systems.
2/20: Ch. 6 Data Management What is data? How is it stored? –Traditional management storage techniques; problems –DBMS.
Introduction to Databases Angela Clark University of South Alabama.
6.1 © 2007 by Prentice Hall Chapter 6 (Laudon & Laudon) Foundations of Business Intelligence: Databases and Information Management.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Data Resource Management Data Concepts Database Management Types of Databases Chapter 5 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
Managing Data Resources File Organization and databases for business information systems.
Legislation in ICT.
Data Protection Legislation
MANAGING DATA RESOURCES
File Systems and Databases
Managing data Resources:
Managing data Resources:
Legal and Ethical Issues
MANAGING DATA RESOURCES
Data Model.
Legislation in ICT.
Data Protection.
Chapter 2 Database Environment Pearson Education © 2014.
Managing data Resources:
Presentation transcript:

BT2103 Developing Small Systems for Business Lecture 2 Databases, Data Management, And The Legal Framework

Contents Databases –Requirements of Information –Information Environments –Data Organisation –Terms –Structure Data Management –Database Management Systems –Data Administration Legal Framework –The Data Protection Act (1998)

Requirements of Information Information Systems need to provide information that is: –Timely –Accurate –Relevant

Traditional File Environment Data Redundancy and Confusion Program-Data Dependence Lack of Flexibility Lack of Data-Sharing Poor Security

Database Environment “A collection of data organised to serve many applications at the same time, by storing and managing data so that they appear to be in one location” Laudon and Laudon (2000)

Data Organisation Bit0 Byte – the letter v FieldBgkalina – a ‘name’ field RecordBgkalina Gr34 Inf & Fin 4668 FileBgkalina Gr34 Inf & Fin 4668 Pclare Gr44 Inf & Fin 4670 Dwalters Gr33 Inf & Fin 4650 DatabaseLancashire Business School Staff Database

Database Terms Entity Attribute Key field

Database Terms (cont’d) Order Number Order Date Item Number QuantityAmount /10/ Attributes Entity - ORDER Key field Adapted from Laudon and Laudon (2000) Fields

Database Structures Hierarchical Network Relational Object Oriented

Hierarchical Records called ‘Nodes’ Top record – Root More specific at lower levels Parent/Child Little flexibility Quick processing of Large-Batch data

Network Records viewed in ‘sets’ Sets have one ‘owner’ and one or more ‘member’ records Record can have more than one owner Allows more complicated relationships AD Hoc reports difficult

Relational Most common structure Data stored as records in files Allows selection of individual records Analysis of records and files with others More flexibility Slower Large-Batch processing

Object Oriented Files such as images, text, sound and video treated as ‘objects’ Objects attached to data –Eg Blackpool Borough Council Allows easy access to hard-to-describe objects

Database Trends Distributed Databases Object-Oriented Databases Data Warehouses Databases on the Web

Data Management Database Management Systems (DBMS) Data Administration

Database Management Systems “Special software to create and maintain a database…” Laudon and Laudon (2000) 3 Components: Data definition language Data manipulation language Data dictionary

DBMS Major advantages: –Allows end user to manipulate data without the need of the IT specialist –Easy to understand queries –Retrieves data from database(s) (rather than the software doing it)

Data Administration “Responsible for the specific policies and procedures through which data can be managed as an organisational resource” Laudon and Laudon (2000) Develop information policy Planning for data Supervise database design and data dictionary development Monitoring data usage

The Legal Framework Background The Data Protection Act (1984) The Computer Misuse Act (1990) The Data Protection Act (1998) Regulation of Investigatory Powers Act (2000) Conflicts

Background (1970’s and 80’s) Organisations becoming more dependent in data Data becoming more complex Data security is an issue Legal loopholes regarding access to, and use of, organisational data

The Data Protection Act (1984) Principles –Legal obligation to keep accurate and secure data –Allows individual to seek recompense for distress due to inaccurate data Data Registrar –Notified with regard to data storage and usage

The Computer Misuse Act (1990) Created 3 new offences: Unauthorised access –‘Hacking’ and those abusing the access powers Ulterior intent –Using data for blackmail or fraud Unauthorised modifications –Includes planting viruses

The Data Protection Act (1998) Supersedes the DPA 1984 “an Act to make new provision for the regulation of the processing of information relating to individuals, including the obtaining, holding, use or disclosure of such information”

The Data Protection Act (1998) Supersedes the DPA 1984 Obligations on computer users: –Data is accurate and secure –Data readily available –No damage or distress caused –Notification to Data Registrar What data kept On whom data kept For what purpose Appropriate security

Principles Information: –Obtained and processed ‘fairly and lawfully’ –Held for ‘specific and lawful’ purposes –Accurate and up-to-date –Not held for longer than necessary Companies: –Not hold excessive or unnecessary data –Protect data Individuals: –Right to see, and have corrections made

Regulation of Investigatory Powers Act (2000) Allows governmental agencies to monitor organisational electronic communication Even if it is confidential Big Brother lives!

Conflicts Human Rights Act (1998) vs. RIP (2000) Despite all the legislation –“in 2000, the UK suffered the highest level of electronic security fraud in Europe” Financial Times: 29/3/01

Summary Data is stored in files which must be defined and organised logically for the databases to function correctly Databases must be managed effectively so as to maintain control over the data A legal framework exists to ensure that this is done Emergent technologies provide new opportunities for the use of databases

Fin Questions?