1MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
DATABASE SYSTEMS, DATA WAREHOUSES, AND DATA
MARTS
CHAPTER 3
Hossein BIDGOLI
MIS
2MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
LO1 Define a database and a database management system.
LO2 Explain logical database design and the relational database model.
LO3 Define the components of a database management system.
LO4 Summarize recent trends in database design and use.
LO5 Explain the components and functions of a data warehouse.
l e a r n i n g o u t c o m e s
Chapter 3 Database Systems, Data Warehouses, and Data Marts
3MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
LO6 Describe the functions of a data mart.
LO7 Define business analytics, and describe its role in the decision-making process.
l e a r n i n g o u t c o m e s (cont’d.)
Chapter 3 Database Systems, Data Warehouses, and Data Marts
4MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Databases
• Database – Collection of related data that can be stored in
a central location or in multiple locations – Usually a group of files
• File– Group of related records– All files are integrated
• Record – Group of related fields
• Data hierarchy
5MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Exhibit 3.1 Data Hierarchy
6MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Databases (cont’d.)
• Critical component of information systems – Any type of analysis that’s done is based on
data available in the database
• Database management system (DBMS) – Creating, storing, maintaining, and accessing
database files
• Advantages over a flat file system
7MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Exhibit 3.2 Interaction between the user, DBMC, and Database
8MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Types of Data in a Database
• Internal data– Collected within organization
• External data– Sources
9MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Methods for Accessing Files
• Sequential file structure– Records organized and processed in numerical
or sequential order– Organized based on a “primary key”– Usually used for backup and archive files
• Because they need updating only rarely
• Random access file structure– Records can be accessed in any order– Fast and very effective when a small number of
records needs to be processed daily or weekly
10MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Methods for Accessing Files (cont’d.)
• Indexed sequential access method (ISAM)– Records accessed sequentially or randomly– Depending on the number being accessed
• Indexed access– Uses an index structure with two parts:
• Indexed value • Pointer to the disk location of the record
matching the indexed value
11MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Logical Database Design
• Physical view – How data is stored on and retrieved from
storage media
• Logical view – How information appears to users – How it can be organized and retrieved – Can be more than one logical view
12MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Logical Database Design (cont’d.)
• Data model – Determines how data is created, represented,
organized, and maintained – Includes
• Data structure• Operations• Integrity rules
• Hierarchical model – Relationships between records form a treelike
structure
13MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Exhibit 3.3 A Hierarchical Model
14MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Logical Database Design (cont’d.)
• Network model – Similar to the hierarchical model– Records are organized differently
15MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Exhibit 3.4 A Network Model
16MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
The Relational Model
• Relational model– Uses a two-dimensional table of rows and
columns of data
• Data dictionary – Field name– Field data type– Default value– Validation rule
17MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
The Relational Model (cont’d.)
• Primary key– Unique identifier
• Foreign key– Establishes relationships among tables
• Normalization – Improves database efficiency– Eliminates redundant data – 1NF through 3NF (or 5NF)
18MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
The Relational Model (cont’d.)
• Data retrieval– Select– Project– Join– Intersection– Union– Difference
19MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Components of a DBMS
• Database engine • Data definition • Data manipulation • Application generation • Data administration
20MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Database Engine
• Heart of DBMS software • Responsible for data storage,
manipulation, and retrieval • Converts logical requests from users into
their physical equivalents
21MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Data Definition
• Create and maintain the data dictionary • Define the structure of files in a database• Changes to a database’s structure
– Adding fields– Deleting fields– Changing field size– Changing data type
22MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Data Manipulation
• Add, delete, modify, and retrieve records from a database
• Query language– Structured Query Language (SQL)
• Standard fourth-generation query language used by many DBMS packages
• SELECT statement– Query by example (QBE)
• Construct statement of query forms• Graphical interface
23MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Application Generation
• Design elements of an application using a database– Data entry screens– Interactive menus– Interfaces with other programming languages
24MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Data Administration
• Used for:– Backup and recovery– Security– Change management
• Create, read, update, and delete (CRUD)
• Database administrator (DBA) – Individual or department– Responsibilities
25MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Recent Trends in Database Design and Use
• Data-driven Web sites• Natural language processing• Distributed databases• Object-oriented databases
26MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Data-Driven Web Sites
• Data-driven Web site– Interface to a database– Retrieves data and allows users to enter data
• Improves access to information• Useful for:
– E-commerce sites that need frequent updates – News sites that need regular updating of
content – Forums and discussion groups – Subscription services, such as newsletters
27MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Distributed Databases
• Distributed database– Data is stored on multiple servers placed
throughout an organization
• Reasons for choosing • Approaches for setup
– Fragmentation– Replication– Allocation
• Security issues
28MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Object-Oriented Databases
• Object-oriented database– Object consists of attributes and methods
• Encapsulation– Grouping objects along with their attributes
and methods into a class
• Inheritance– New objects can be created faster and more
easily by entering new data in attributes
• Interaction with an object-oriented database takes places via methods
29MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Data Warehouses
• Data warehouse – Collection of data used to support decision-making
applications and generate business intelligence
• Multidimensional data• Characteristics
– Subject oriented– Integrated– Time variant– Type of data– Purpose
30MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Data Warehouse Applications at InterContinental Hotels Group (IHG) • IHG operates 4,000+ hotels in the world
– Migrated from entry-level data mart to an enterprise data warehouse (EDW)
– Chose Teradata Data Warehouse– Increased the company’s query response time
from hours to minutes
31MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Exhibit 3.6 A Data Warehouse Configuration
32MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Input
• Variety of sources– External– Databases– Transaction files– ERP systems– CRM systems
33MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
ETL
• Extraction, transformation, and loading (ETL)
• Extraction – Collecting data from a variety of sources– Converting data into a format that can be used in
transformation processing
• Transformation processing – Make sure data meets the data warehouse’s needs
• Loading – Process of transferring data to the data warehouse
34MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Storage
• Raw data• Summary data• Metadata
35MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Output
• Data warehouse supports different types of analysis – Generates reports for decision making
• Online analytical processing (OLAP)– Generates business intelligence– Uses multiple sources of information and
provides multidimensional analysis– Hypercube– Drill down and drill up
36MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Exhibit 3.7 Slicing and Dicing Data
37MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Output (cont’d.)
• Data-mining analysis– Discover patterns and relationships
• Reports– Cross-reference segments of an organization’s
operations for comparison purposes – Find patterns and trends that can’t be found
with databases – Analyze large amounts of historical data
quickly– Assist management in making well-informed
business decisions
38MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Data Marts
• Data mart– Smaller version of data warehouse– Used by single department or function
• Advantages over data warehouses• More limited scope than data warehouses
39MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Business Analytics
• Business analytics (BA)– Uses data and statistical methods to gain insight
into the data– Provide decision makers with information to act on
• More forward looking than BI• Several types of BA methods
– Descriptive and predictive analytics
• Major providers of business analytics software– SAS, IBM, SAP, Microsoft, and Oracle
40MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Summary
• Databases – Accessing files– Design principles– Components– Recent trends
• Data warehouses, data marts, and business analytics
41MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS
CHAPTER 4
Hossein BIDGOLI
MIS
42MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
LO1 Discuss information privacy and methods for improving the privacy of information.
LO2 Explain the effects on information privacy of e-mail, data collection, and censorship.
LO3 Discuss the ethical issues related to information technology .
LO4 Discuss the principles of intellectual property and issues related to the infringement of intellectual property.
l e a r n i n g o u t c o m e s
43MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
LO5 Discuss information system issues that affect organizations, including the digital divide,
electronic publishing, and on the connection between the workplace and employees’ health. LO6 Describe green computing and the ways it can
improve the quality of the environment.
l e a r n i n g o u t c o m e s (cont’d.)
Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems
44MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Privacy Issues
• Concerns about privacy in the workplace – Employers search social networking sites– Employee monitoring systems
• Misuse and abuse of information gathered by:– Healthcare organizations– Financial institutions– Legal firms
• Defining privacy is difficult – Information technologies have increased ease of
access to information
45MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Social Networking Sites and Privacy Issues
• Stacy Snyder– Former student at Millersville University of
Pennsylvania– Posted a photo of herself on MySpace, wearing
a pirate’s hat and drinking
• Millersville administrators – Considered the image unprofessional – Refused to grant her an education degree and
teaching certificate
46MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Privacy Issues (cont’d.)
• Number of databases increasing rapidly • Enforcement of federal laws has been lax • Index and link databases using Social
Security numbers – Direct marketing companies major user of this
information
• U.S. government began linking large databases to find information
47MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Privacy Issues (cont’d.)
• Federal laws now regulate collecting and using information on people and corporations – 1970 Fair Credit Reporting Act
• Acceptable use policies– Set of rules specifying the legal and ethical use
of a system and the consequences of noncompliance
• Accountability– Issues involving both the user’s and the
organization’s responsibilities and liabilities
48MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Privacy Issues (cont’d.)
• Nonrepudiation– Method for binding all the parties to a contract
• Hardware or software controls – Determine what personal information is
provided on the Web
49MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
• Presents some serious privacy issues • Spam
– Unsolicited e-mail sent for advertising purposes – Sent in bulk by using automated mailing
software
• Ease of access – People should assume that others have access
to their messages – Any e-mails sent on company-owned
computers are the property of the organization
50MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Data Collection on the Web
• Number of people shopping online is increasing
• Many customers reluctant to make online purchases – Concerns about hackers getting access to their
credit card numbers – Many credit card companies reimburse
fraudulent charges
• Other electronic payment systems are being developed
51MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Data Collection on the Web (cont’d.)
• Concerned about computers’ contents being searched while they’re connected to the Web
• Information users provide on the Web – Combined with other information and
technologies to produce new information
• Cookies – Small text files with a unique ID tag– Embedded in a Web browser – Saved on the user’s hard drive– Many users disable cookies
52MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Data Collection on the Web (cont’d.)
• Log files– Generated by Web server software– Record a user’s actions on a Web site
• Data collected on the Web must be used and interpreted with caution
53MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Ethical Issues of Information Technologies
• Ethics means doing the right thing– What is “right” can vary from one culture to
another and even from one person to another – More difficult to determine than legal versus
illegal
54MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Ethical Issues of Information Technologies (cont’d.)
• Information technology offers many opportunities for unethical behavior – Cybercrime, cyberfraud, identity theft, and
intellectual property theft
• Many experts believe management can reduce employees’ unethical behavior– Codes of ethics
• Many associations promote ethically responsible use of information systems and technologies – Codes of ethics
55MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Ten Commandments of Computer Ethics
• Thou shalt not use a computer to harm other people
• Thou shalt not interfere with other people’s computer work
• Thou shalt not snoop around in other people’s files
• Thou shalt not use a computer to steal• Thou shalt not use a computer to bear
false witness
56MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Ten Commandments of Computer Ethics (cont’d.)
• Thou shalt not use or copy software for which you have not paid
• Thou shalt not use other people’s computer resources without authorization
• Thou shalt not appropriate other people’s intellectual output
• Thou shalt think about the social consequences of the program you write
• Thou shalt use a computer in ways that show consideration and respect
57MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Censorship
• Who decides what should be on the Web?• Types of information
– Public– Private
• Whether or not something can be censored depends in part on who is doing the censoring
• Restricted access to the Web– Burma, China, and Singapore
• U.S. citizens don’t want the government controlling Web access
58MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Censorship (cont’d.)
• Parents are concerned about what their children are exposed to– Pornography, violence, and adult language
• Search keywords• Guidelines to teach their children to use
good judgment while on the Web • Programs such as CyberPatrol, CyberSitter,
Net Nanny, and SafeSurf
59MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Intellectual Property
• Intellectual property – Protections that involve copyrights, trademarks,
trade secrets, and patents for “creations of the mind” developed by people or businesses
• Industrial property– Inventions, trademarks, logos, and industrial
designs
• Copyrighted material– Literary and artistic works– May apply to online materials– Exceptions under Fair Use Doctrine
60MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Intellectual Property (cont’d.)
• Trademark– Protects product names and identifying marks
• Patent – Protects new processes – Organizations can benefit from patents
• Software piracy • Laws
– Telecommunications Act of 1996 – Communications Decency Act (CDA) – Laws against spamming
61MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Intellectual Property (cont’d.)
• Internet use policy – Avoid legal risks
• Cybersquatting– Registering, selling, or using a domain name to
profit from someone else’s trademark
62MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Verizon’s Cybersquatting Suit
• Verizon sued OnlineNic • OnlineNic registered domain names
containing Verizon trademarks – myverizonwireless.com– iphoneverizonplans.com– verizon-cellular. com
• Verizon won this suit
63MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Social Divisions and the Digital Divide
• Digital divide – Computers still aren’t affordable for many
people– Companies installing cables for Internet
connections might subject their communities to a type of economic “red-lining”
– Children are often victims of this divide
• Funding for computers at schools and libraries
• Loaner programs
64MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
The Impact of Information Technology in the Workplace • New jobs for:
– Programmers– Systems analysts– Database and network administrators– Network engineers– Webmasters– Web page developers– e-commerce specialists– Chief information officers (CIOs)– Technicians
65MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
The Impact of Information Technology in the Workplace (cont’d.)• Web designers• Java programmers• Web troubleshooters • Telecommuting and virtual work • Job deskilling
– Skilled labor eliminated by introducing high technology
– Job downgraded from a skilled to a semiskilled or unskilled position
66MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Potential benefits and potential drawbacks of telecommuting Table 4.1
67MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
The Impact of Information Technology in the Workplace (cont’d.)• Job upgrading
– Clerical workers who now use computers
• One skilled worker might be capable doing the job of several workers
• Virtual organizations– Networks of independent companies, suppliers,
customers, and manufacturers– Connected via information technologies – Share skills and costs – Have access to each other’s market
68MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Information Technology and Health Issues
• Reports of health-related issues caused by video display terminals (VDTs)– No conclusive study – Health problems associated with the
environment in which computers are used
69MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Information Technology and Health Issues (cont’d.)
• Other reports of health problems – Vision– Musculoskeletal– Skin– Reproductive– Stress-related
• Amount of time some people spend on the Web
70MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Health and Social Issues of Online Gaming
• Online games World of Warcraft and EverQuest blamed for a host of problems– Poor academic performance, divorce, suicide,
and the death of a child because of parental neglect
• Fantasy worlds in online games believed to be addictive and to affect marriages and careers
71MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Green Computing
• Computing that promotes a sustainable environment and consumes the least amount of energy
• Helps an organization save on energy costs
• Improves the quality of the environment in which we live and work
72MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Green Computing (cont’d.)
• Green computing– Involves the design, manufacture, use, and
disposal of computers, servers, and computing devices
– Monitors, printers, storage devices, and networking and communications equipment
– Minimal impact on the environment
• Implemented without the cooperation of both the private and the public sector
• Goals
73MIS, Chapter 3
©2013 Course Technology, a part of Cengage Learning
Chapter 3 Database Systems, Data Warehouses, and Data Marts
Summary
• Privacy issues related to information technologies – Methods for protecting privacy: Personal
information and organizations’ data resources
• Ethical issues related to information systems– Censorship, intellectual property laws, digital
divide
• Effect of information systems on the workplace and possible heath issues
• Green computing– Impact on the environment