MIS – Chapters 3 – 6 Comprehensive Bullet-Point Notes
Database Systems, Data Warehouses, and Data Marts
- Database & DBMS Fundamentals
- A database is a centralized or distributed collection of related data that supports any subsequent analysis an information system performs.
- A database management system (DBMS) is software for creating, storing, maintaining, and accessing database files, making database use more efficient by acting as the intermediary between users/applications and the data.
- User interaction pattern: request → DBMS engine locates data → returns result; abstracts the underlying file-access method (sequential, random, indexed-sequential).
- Data Hierarchy
- Field → record → file → database; this hierarchy underlies every data model.
- File-Access Methods
- Sequential: records processed in entry order; good for large batch operations.
- Random: any record reachable immediately; ideal when only a few records need frequent access.
- Indexed Sequential (ISAM): hybrid—small batches random, large batches sequential.
- Views of Data
- Physical view: how bits are placed on storage media.
- Logical view: how users logically see/organize data; hides storage details.
- Data Modeling & Integrity
- A data model defines structure, operations, and integrity rules; guides logical design.
- Integrity rules (e.g., entity & referential integrity) ensure accuracy/consistency.
- Major Data Models
- Hierarchical (tree of nodes/branches, single parent), Network (multiple parents), Relational (2-D tables), Object-oriented (encapsulated objects with attributes & methods, supporting inheritance/encapsulation).
- Relational remains dominant in business systems.
- Relational Concepts
- Row = record = tuple; Column = field = attribute.
- Primary key uniquely identifies each record; foreign key cross-references tables and supports 1{:}n or n{:}m relationships.
- Normalization removes redundancy & keeps only related data per table, improving update efficiency.
- Data Dictionary
- Stores metadata (field types, default values, validation rules). DBMS consults it for compilation, enforcement, app generation.
- DBMS Software Components
- Database engine (storage/manipulation/retrieval)
- Data definition (DDL, data dictionary maintenance)
- Data manipulation (DML: add, delete, modify, query)
- Application generation tools (forms, GUIs, menus)
- Data administration (security, backup/recovery, change mgmt, CRUD privileges)
- Query Languages
- SQL: 4GL standard with keywords (SELECT, INSERT…).
- QBE: graphical query construction with AND/OR/NOT—lowers syntactic burden.
- Database Personnel
- DBA installs DBMS, designs DB, sets security & recovery, tunes performance.
Recent Trends in Database Design
- Data-driven Web sites: dynamic pages created by live DB queries; front-end acts as an interface for retrieval & entry.
- Distributed DBMS (DDBMS)
- Stores data on multiple servers; improves locality & fault tolerance.
- Fragmentation (horizontal, vertical, mixed), Replication (full copy at each site), Allocation (hybrid) strategies.
- Object-oriented DB: encapsulates complex data types (images, CAD); methods stored with data for reusability.
- Influence of AI & NLP: conversational query interfaces, automatic semantic extraction, autonomous tuning.
Data Warehousing & Business Intelligence
- Data Warehouse (DW)
- Integrated, subject-oriented, time-variant, non-volatile repository supporting decision making.
- Core processes: ETL (Extract, Transform, Load) → cleanses & harmonizes data before loading.
- Supports OLTP (operational), OLAP (multidimensional analytic), and data mining (pattern discovery).
- Data Marts
- Department-level, smaller, cheaper, faster to build; same analytical power focused on specific business functions.
- Business Analytics (BA)
- Statistical & data-mining techniques over DB/DW/DMs to yield actionable insight; vendors: SAS, IBM, SAP, Microsoft, Oracle.
- Big Data & the 3\,Vs
- Volume, Variety, Velocity require distributed frameworks (Hadoop, Spark) and cloud storage.
- Business apps: sentiment analysis, real-time fraud detection, IoT telemetry.
- Database Marketing
- Uses customer DB for targeted promotions, lifetime value modelling, personalized offers; raises privacy & ethical debates about data usage.
Personal, Legal, Ethical, and Organizational Issues of IS
- Sensitive personal data stored in multiple institutional DBs; cross-matching allows behavioral profiling.
- Workplace monitoring: keystroke, idle time, social media screening; benefits (productivity) vs. privacy rights.
- Acceptable Use Policy (AUP) defines legal/ethical use & sanctions.
- Accountability: identifying responsibility & liability when misuse occurs.
- Nonrepudiation binds parties to digital contracts (e-signatures, PKI).
E-mail, Data Collection, & Censorship
- E-mail risks: spam, phishing, employer monitoring; encryption & spam filters mitigate.
- Cookies & log files silently collect clickstream data; inaccurate self-reported info can cause misrepresentation.
- Censorship: public info may be restricted for policy; private posts protected by free speech.
Ethics in IT
- Ethical ≠ legal; gray areas vary by culture; codes of ethics (ACM, IEEE) guide professionals.
- Management role: enforce ethics training & whistle-blower channels to reduce cyber-fraud.
Intellectual Property
- Two categories: Industrial (patents, trademarks) & Copyrighted materials (literary/artistic).
- Online material (HTML, graphics) covered once storable or printable.
- Threats: software piracy, cybersquatting, patent trolls.
Organizational & Social Issues
- Digital divide: unequal access → educational & economic disparities.
- Virtual organizations: networks of independent firms sharing skills/markets via IT.
- Telecommuting: boosted by data comm; impacts work–life balance, urban congestion.
- Ergonomics: furniture, lighting, keyboards to prevent RSI, vision strain.
Green Computing
- Design, manufacture, use, disposal of IT with minimal environmental impact.
- ICT emits ≈ 2\% of global CO_2 (≈ aviation industry)—initiatives: energy-efficient servers, virtualization, e-waste recycling.
- Malware-related: viruses, worms, Trojans, logic bombs, blended threats, rootkits.
- Spyware/adware, keyloggers, sniffing (packet capture), spoofing (identity masquerade).
- Social engineering: phishing, pharming, baiting, quid pro quo.
- Computer fraud: unauthorized data use for personal gain.
CIA Triad & Fault Tolerance
- Confidentiality: restrict disclosure to authorized users.
- Integrity: assure data accuracy/completeness.
- Availability: systems operational & recover quickly.
- Fault-tolerant systems (RAID, UPS, failover clusters) guarantee availability.
Security Measures
- Biometric: fingerprints, iris scans; cannot be shared/lost.
- Non-biometric: callback modems, smart cards.
- Physical: locks, guards, cable traps.
- Logical/Access controls: passwords, ACLs.
- Firewalls & IDS: packet filtering, signature recognition; IDS often in front of firewall.
- VPNs: secure Internet tunnels.
- Encryption
- Symmetric (secret key): same key encrypt/decrypt—fast but key distribution issue.
- Asymmetric (public key): public/private pair; enabled by PKI; protocols: SSL/TLS.
- E-commerce safeguards: digital signatures, SET.
- Computer Emergency Response Team (CERT): incident coordination.
Planning & Policy
- Security committee, posted policies, software patching, antivirus, fire drills, off-site backups.
- Business continuity planning (BCP) & disaster recovery plans ensure operations during/after disasters.
System Components
- Sender/receiver devices (workstations, laptops, mobile phones, IoT sensors).
- Modems/Routers translate/route signals.
- Communication media: conducted (twisted-pair, coax, fiber) & radiated (RF, microwave, satellite).
Key Concepts
- Data communication = electronic data transfer between locations.
- Bandwidth/Throughput: amount transmitted per second.
- Attenuation: signal loss; amplifiers or repeaters combat.
- Broadband: multiple data pieces simultaneously for higher rates; vs. narrowband \le56\,kbps.
- Protocol: rule set; TCP/IP industry standard; data sent as packets.
Processing Configurations
- Centralized (single host), Decentralized (each unit self-processing), Distributed (central control + remote nodes).
Networks & Topologies
- LAN (office), MAN (city), WAN (countries).
- Topologies: Star (central host), Ring (token passing), Bus (shared backbone), Hierarchical/Tree (organizational), Mesh (fully interconnected) with controllers & multiplexers as needed.
Routing & Devices
- Routing tables (static vs. dynamic) determine best path; routers manage traffic.
- Centralized routing manager vs. distributed routing (each node autonomous).
- Client/Server model
- Two-tier (client ↔ server) most common; n-tier adds middle tier for scalability.
Wireless & Mobile Networks
- Wireless network: substituting RF/IR for cable; mobile/cellular uses cell sites.
- Efficiency schemes: TDMA (time slots), CDMA (code spreading), frequency reuse.
- Importance: supports telecommuting, IoT, just-in-time logistics.
Wireless Security Techniques
- SSID broadcasting can be hidden.
- WEP basic encryption (weak), EAP authentication, WPA/WPA2 (802.11i) stronger key management.
Convergence Phenomenon
- Integration of voice, video, data enables VoIP, unified messaging, telepresence, streaming analytics; foundation for digital transformation initiatives.
Cross-Chapter Connections & Implications
- Reliance on accurate, available data (Ch.3) underscores need for robust security (Ch.5) and reliable networks (Ch.6).
- Ethical/privacy concerns (Ch.4) intensify as BA & big data (Ch.3) mine personal behavior.
- Green computing (Ch.4) intersects with data centers that house warehouses and cloud networks—optimization lowers CO_2.
- Virtual organizations and telecommuting (Ch.4) depend on secure wireless/data-comm infrastructure (Ch.6).
- Database marketing (Ch.3) must balance personalization with compliance to privacy laws & AUP (Ch.4).