Data-Mining and Record-Matching. Whenever you fill out a form for an organisation, business or government, the information usually ends up being stored.

Slides:



Advertisements
Similar presentations
Testing Relational Database
Advertisements

Configuration management
How Come It Takes Me So Long to Get Answers to Simple Questions About My Business? Technologies for Business Intelligence Introduction to Microsoft Access.
CHAPTER OBJECTIVE: NORMALIZATION THE SNOWFLAKE SCHEMA.
IT Project Management AN INTRODUCTION TO ETHICS
Databases Using Information. What is a Database? A database package allows the user to organise and store information. This information can be sorted,
Mining Association Rules from Microarray Gene Expression Data.
Unit 7: Store and Retrieve it Database Management Systems (DBMS)
Dr Gordon Russell, Napier University Unit Data Dictionary 1 Data Dictionary Unit 5.3.
Data Mining Knowledge Discovery in Databases Data 31.
Database PowerPoint Guy Wade Comm 165 Guy Wade Comm 165.
Business Intelligence Andrew Davis Andria Zippler Jana Krinsky Tiffany Ferris.
Database Design Concepts Info 1408 Lecture 2 An Introduction to Data Storage.
Chapter 14 The Second Component: The Database.
Database Design Concepts Info 1408 Lecture 2 An Introduction to Data Storage.
Business Functional Areas 1. Pre-Sales (special thanks to Geoff Leese)
MGS 3040 CHAPTER 5 DISCUSSION QUESTIONS GROUP B Kimberly Matt Shawn Ashley.
Information Storage and Retrieval CS French Chapter 3.
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Looking good with forms and reports Lesson 4 By the end of this lesson you will be able to complete the following: To identify the main parts of a database.
Module 3: Table Selection
GCSE Computing: A451 Computer Systems & Programming Relational Databases Databases.
BUSINESS B1 Information Security.
Topic 10 – Technology and Hopsital Organisation 1)TechMed scenario covers In the scenario: “Technology is used extensively throughout the hospital to support.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
Ravi Block Application Software Module 1.8.
Artificial, Composite and Secondary UIDs
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Database Design Part of the design process is deciding how data will be stored in the system –Conventional files (sequential, indexed,..) –Databases (database.
Lecturer: Gareth Jones. How does a relational database organise data? What are the principles of a database management system? What are the principal.
BUS1MIS Management Information Systems Semester 1, 2012 Week 6 Lecture 1.
Data & Information Unit 2 Topic 2. A doctor will order various tests on a patient (data). The results from the tests will give the doctor information.
Database What is a database? A database is a collection of information that is typically organized so that it can easily be storing, managing and retrieving.
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
Databases. What is a database?  A database is used to store data. The word DATA is actually Latin for FACTS. A database is, therefore, a place, or thing.
ARTIFICIAL INTELLIGENCE DR. ABRAHAM AI a field of computer science that is concerned with mechanizing things people do that require intelligent.
DATABASE What exactly is a database How do databases work? What's the difference between a spreadsheet database and a "real" database?
Elliott Attributes Edward M. Kwang President. Notes vs. Attributes Notes –Free Form Text –Conversation With Customers –Reminder for Follow Up Attribute.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
3 / 12 Databases MIS105 Lec13 Irfan Ahmed Ilyas CHAPTER Prepared By:
CISB113 Fundamentals of Information Systems Data Management.
Copyright 2004 John Wiley & Sons, Inc Information Technology: Strategic Decision Making For Managers Henry C. Lucas Jr. John Wiley & Sons, Inc Dinesh.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
Database Management Systems (DBMS)
Introduction to Databases. What is a database?  A database program is nothing more than an electronic version of a 3x5 card file  A database is defined.
With Microsoft Excel 2010 © 2011 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Excel 2010.
Use of ICT in Data Management AS Applied ICT. Back to Contents Back to Contents.
Information Systems Unit 3.
OCR CAMBRIDGE NATIONALS UNIT 1 - UNDERSTANDING COMPUTER SYSTEMS DATA CAPTURE METHODS.
Data Mining Status and Risks Dr. Gregory Newby UNC-Chapel Hill
M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
DBS201: Data Modeling. Agenda Data Modeling Types of Models Entity Relationship Model.
Copyright © it’sLearning 365. All rights reserved. DATABASE CONCEPTS Understanding Databases Start …
Information Systems Design and Development Security Precautions Computing Science.
Data Mining Introduction to data mining concepts.
(1) Organize information processing centers environment, the various functions and details Electronic Data Processing (EDP): can refer to the use of automated.
Tables & Relationships
Data Protection GCSE ICT Mrs N Steventon-2005.
Databases.
Creating a Database Microsoft Access.
CIS 430 Data Mining and Knowledge Discovery Dr. Iren Valova
records Database Vocabulary It can be useful to collect information.
Spam Database Tool Use The purpose of this Tool is to Store all SPAM Numbers in Database for matching and excluding from CDRs. Note All files will be stored.
Computers and Data Collection
Privacy and Information
Please use speaker notes for additional information!
HOW DO I KEEP MY COMPUTER SAFE?
Databases.
Spreadsheets, Modelling & Databases
Presentation transcript:

Data-Mining and Record-Matching

Whenever you fill out a form for an organisation, business or government, the information usually ends up being stored in a database on a computer somewhere. Data-Mining involves analysing the information to determine the types of people that have filled out the form. In order to build an electronic profile, records from various databases need to be collated and this is done through matching a particular item of data (or field) that is common in both databases. This is the reason why some governments insist that all citizens have an ID number to make the matching of records easier. This process is called Record- Matching.

The goal of data-mining is to discover hidden facts contained in databases by finding patterns and relationships in data, and inferring rules that allow the prediction of future results. Typical application include customer profiling for the purposes of advertising and the identification or patterns of behaviour for fraud detection. The natural extension of data-mining is sharing or selling of information stored in databases, record-matching and the building of electronic profiles.

Easy way finding records. Getting someone’s detail with ID numbers. Life's is actually all about codes (Lisa's quotes) Hackers – people can hack into the files without authorisation. People can get details which is private and not permitted. Random people could call you and stalk you.