I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.

Slides:



Advertisements
Similar presentations
Organise Workplace Information
Advertisements

Application Security By Prashant Mali.
Presented to the Tallahassee ISACA Chapter
Software Quality Assurance Plan
Information Technology Control Day IV Afternoon Sessions.
Auditing Computer-Based Information Systems
10/25/2001Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Living in a Digital World Discovering Computers 2010.
Computers: Tools for an Information Age
Concepts of Database Management Seventh Edition
Lecture Nine Database Planning, Design, and Administration
PowerPoint Presentation by Charlie Cook Copyright © 2004 South-Western. All rights reserved. Chapter 9 Controlling Information Systems: Process Controls.
General Ledger and Reporting System
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Chapter 9 Database Management
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Release & Deployment ITIL Version 3
Management Information Systems
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 14 Systems Analysis and Design: The Big Picture.
Today’s Lecture application controls audit methodology.
Input Design Objectives
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
Database System Development Lifecycle © Pearson Education Limited 1995, 2005.
Computers & Employment By Andrew Attard and Stephen Calleja.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
HOLMES 2 System Administration Through HOLMES 2 System Administration, an incident can be configured such that access is restricted to: – specified users.
Concepts of Database Management Sixth Edition
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Concepts of Database Management Eighth Edition
Final Coverage Topic 4: INFORMATION RESOURCES and INFORMATION SYSTEMS By Dr. Faustino Reyes.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
Information Systems Security Operational Control for Information Security.
© 2001 Business & Information Systems 2/e1 Chapter 8 Personal Productivity and Problem Solving.
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
Chapter 10 Database Management. Chapter 10 Objectives Discuss the functions common to most DBMSs Identify the qualities of valuable information Explain.
Information Processing Content covered  Data and information  Information Qualities  Data/Information Processing  Commercial Information Processing.
8 8 Chapter 8 The University Lab: Conceptual Design Verification, Logical Design, and Implementation Database Systems: Design, Implementation, and Management.
 2001 Prentice Hall Business Publishing, Accounting Information Systems, 8/E, Bodnar/Hopwood Chapter 10 Electronic Data Processing Systems.
Databases. What is a database?  A database is used to store data. The word DATA is actually Latin for FACTS. A database is, therefore, a place, or thing.
INFORMATION MANAGEMENT Unit 2 SO 4 Explain the advantages of using a database approach compared to using traditional file processing; Advantages including.
Chapter 9 Controlling Information Systems: Application Controls.
Enterprise Resource Planning System (ERP) Flowchart #7
Today’s Lecture Covers
Database Administration
CHAPTER 2 TYPES OF BUSINESS INFORMATION SYSTEM. INTRODUCTION Information System support business operations by processing data related to business operation.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Systems Analysis and Design 9 th Edition Topic 6 Output and User Interface Design.
Introduction to Databases Dr. Osama AL Rababah. Objectives In this capture you will learn: Some common uses of database systems. The characteristics of.
The concept of Data Processing. INPUT DESIGN Input Data Persistent Data Process Output.
( ) 1 Chapter # 8 How Data is stored DATABASE.
 At the end of the class students should:  distinguish between data and information.  explain the characteristics and forms of Information Processing.
Transaction processing systems
Chapter 11 Designing Inputs, Outputs, and Controls.
DBA 5/20/2018 Like a policeman or teacher
Chapter Ten Managing a Database.
Processing Integrity and Availability Controls
Managing the IT Function
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing group the importance of quality control to manage data

Requirements definition Design Prototyping Validation & Testing Implementation  Feasibility Anaysis ; Problem Definition, Information Requirement  Develop a project implementation plan  Develop data standards  Establish data stewards  Identify data requirements  Develop a data model  Specify data integrity controls  Specify test procedures Use Evolution  Map the data model to the DBMS  Establish and test data integrity controls Access control and security Integrity constraints and data validation rules Backup and recovery procedures  Create and load the test database  Test database operation and integrity controls  Implement data integrity controls  Create and load database  Train users  Monitor database performance  Tune and reorganize database as needed  Enforce data standards and policies  Support users: consulting, informing, and training  Plan and implement growth  Implement change control procedures Project Planning

Database Implementation Roles 1. Data Entry Group 2. Data Administrator 3. User/Client 4. Managers of Users 5. Librarian

Data Entry Group  Two types of Data Entry : Batch Entry, and Online Entry  In case of Batch Data Entry Gathering source documents from various departments Ensuring proper safekeeping of such until processing is complete and source documents and output are returned Preparing batches of source documents with accurate control totals Scheduling and setting up the jobs to process input Verifying, logging and distributing output to the appropriate department with special care for confidential information  In case of Online data entry End users can be more effective since online entry can carry out a wide range of online checks to perform basic verification of the input data; (ex) checking for range, format, limits, and specific values  Entry staff should maintain confidentiality

Data Administrator  To define and maintain the data structures in the database system.  To be Responsible for the security and information classification of the shared data stored on database system  database implementation  To set and implement database controls  To monitor database usage, to collect performance statistics and to tune the database  To define and initiate back up and recovery procedures

User/Client  To establish the goals of a specific database project  To provide the database developers with access to all information needed for project development To review and regularly scrutinize of the developer's work Manager of Users  To ensure that data are authorized, accurate, and complete when entered into the system

Librarian  To record, to issue, to receive and to safeguard all programs and data files that are maintained on computer tapes and/or disks in and IPF(Information Processing Facility)  crucial position; many organizations provide additional support for this function through the use of software, that assists in maintaining the inventory as well as manages the movement of the tape reels and cartridges.  library control software  To maintain version control and configuration management of data and programs

Content Building Activities  To Identify your sources of information,  To code data taken from these sources into a data entry form  To make the index (assigning of keywords, based on controlled list of vocabularies, or Descriptors or Keyword index)  Who ?  users, and the indexer who culls out the data from data sources into data entry forms Data Preparation Encoding Proofreading &Editing Approval: Data Quality checking & Publish information  Inputting data from data entry form into the computer  Who ?  encoders  To check up the inputs if it is correct based on the data entry form, thereafter to do editing  Who?  the editor or the database administrator  Final checking of input records and approval  Without quality control measures on your data, your database falls into a GIGO (garbage in, garbage out) bad practice.  Who?  the database administrator

Security in DDLC process Considerations  To ensure the quality of data, different persons should be involved within the department or organization ex) key verifications c.f) in the context of the size of organization S In case of outsourcing ; lots of data, few staff, and funds to pay contracted jobs 1.Indexing only or encoding only 2.Quality checking should really be done by someone in the organization (or head of resource center). 3. For contractual individuals, normally, they are paid per record or document that they submit 4. Sometimes, outsourcing companies have rates for different tasks like encoding.

Data Quality control Types of authorization –Input authorization –Batch Controls and Balancing –Data Validation and Editing

Input authorization Signature on Batch forms – provide evidence of proper authorization. Online Access Controls –ensure that only authorized individuals may access data or perform sensitive functions. Unique passwords –are necessary to ensure that access authorization cannot be compromised through use of another individual’s authorized data access. Terminal identification – can be used to limit input to specific terminals as well as to individuals. Terminals can be equipped with hardware that transmits a unique identification such as serial number that is authenticated by the system. Source documents –are the forms used to record data. A source document may be a piece of paper, a turnaround document or an image displayed for online data input.

Batch Controls and Balancing Total Monetary Amount –Verification that the total monetary value of items processed equals the total monetary values of the batch documents Total Items –Verification that the number of items included on each document in the batch agrees to the total number of items processed. Total Documents –Verification that the total number of documents in the batch equals the total number of documents processed. Hash Totals –Verification that a predetermined numeric field existing for all documents in a batch agrees with the total of documents processed

Batch Controls No. 121 Item A : 5 * $500 = $2,500 Item B : 3 * $100 = 300 Item C :10* $50 = 500 Total: $3,300 No. 122 Item A : 3 * $500 = $1,500 Item B : 6 * $100 = 600 Total: $2,100 No. 123 Item A : 5 * $500 = $2,500 Item B :10 * $ 50 = 500 Item C :10* $500 = 3,500 Total: $6,500 Batch Control Totals Total Monetary Amount = $ 11,900 Total items = 49 (A:13, B:9, C:20, D:7) Total documents : 3 Hash Total : 366

Data Validation and Editing Data Validation – identifies data errors, incomplete or missing data and inconsistencies among related data items. Edit controls –are preventative controls that are used in a program before data are processed. If the edit control is not in place or does not work effectively, this may cause processing of inaccurate data.

Edit controls

Information Retrieval  How do you retrieve records? (relate to specific applications software used by the organization)  Do you have policies with regards to retrieving information you built? Do you want to make it publicly available? Do you want only members of the network to access the information?  What are the standard methods used to rate the effectiveness of information retrieval? Based on these methods, how effective are the current systems that support information retrieval on the WWW?  What are the methods employed by existing search engines for indexing the WWW? As the WWW grows, do you believe these brute force methods are likely to continue to work, or will the break down?

What is WENDY? Women's Electronic Network Training Directory dB online customized directory application for WENT WENDY provides –a central working station –acquiring, editing, removing, searching, as well as printing information on an individual like the individual's personal profile, organization affiliation, interests, and expertise. –enables the user to be able to organize this information