Data Base Systems Some Thoughts. Ethics Guide–Nobody Said I Shouldn’t Kelly make a backup copy of his company’s database on CD and took it home and installed.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

Peer Mentoring Works : In the students own words…
Question 7. What is a very important skill a person should learn in order to be successful in the world today?. Choose one skill and use specific reasons.
Chapter 4 Database Processing. Agenda Purpose of Database Terminology Components of Database System Multi-user Processing Database Design Entity-relationship.
Gallup Q12 Definitions Notes to Managers
HIPAA SCENARIOS Unit 7 Seminar ©
© 2014 wheresjenny.com ROLE PLAY STAFF IN CALL CENTERS AND TELEMARKETING FIRMS.
SECAM Systems Product Presentation SECAM Systems © 2010.
Joyfulness Vs. Self-pity
Click Below to Begin the Quiz
Chapter 5 Database Processing.
Office of Operations 2010 Fall Conference Conquer Query & Control the Data Presenter: Sherry Azoulay, CUNY University Payroll Director; NYS Payroll Users.
What children think about having a thyroid disorder: a small scale study By Shannon Davidson Age 10.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Introduction to Management Information Systems Chapter 4 Database Processing HTM 304 Fall 07.
Professional Ethics and Responsibilities
1 Distributed File System, and Disk Quotas (Week 7, Thursday 2/21/2007) © Abdou Illia, Spring 2007.
© 2007 Prentice Hall, Inc.1 Using Management Information Systems David Kroenke Database Processing Chapter 4.
No Thanks, I’ll Use a Spreadsheet
Group E: Brittany Caleb John & Rishi MGS 3040 section 4.
No body said I shouldn’t. Where did Kelly go wrong? Kelly was only hired to the company as field specialist in restoring and backing-up company‘s database.
Group F Reflections Guide (pg 82)
Database Processing Chapter "No, Drew, You Don’t Know Anything About Report Writing.” Copyright © 2014 Pearson Education, Inc. Publishing as Prentice.
MGS 3040 CHAPTER 5 DISCUSSION QUESTIONS GROUP B Kimberly Matt Shawn Ashley.
Network security policy: best practices
Do you know how to keep yourself safe?
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
 To highlight those areas of your skills and experience (on your resume) which make you particularly well-suited to the position for which you are applying.
NETWORKING Networking could be Social, Computer, Professional etc.
Safety On The Internet  Usage time  Locations that may be accessed  Parental controls  What information may be shared with others Online rules should.
Introduction: This VCSS training session has been developed to provide : I.A quick overview of VCSS II.A walk through of the main VCSS features III.Solutions.
David Kroenke Database Processing Chapter 4 © 2007 Prentice Hall, Inc. 1.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
N OBODY SAID I SHOULDN ’ T PAGE 150 & 151- ETHICS C HAPTER FIVE MGS3040-Section 3 Group B Shavone Parris Idalia Fabregas Annette Immella Sergio Martins.
The Islamic University of Gaza
No, Thanks, I’ll Use a Spreadsheet
Lecture 18 Page 1 CS 111 Online Access Control Security could be easy – If we didn’t want anyone to get access to anything The trick is giving access to.
৳ Look, I’ve got a leaflet about it.
Chapter 9 Database Management Discovering Computers Fundamental.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
Take this quiz to determine if you’re the next Bill Gates or whether you should just grin and bear it at your day job.
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, Sixth Edition Chapter 9, Part 9 Satisfying Customer Needs.
KAREN PHELPS Spontaneous Sponsoring. Your Home Presentations “A Valuable Source for Recruits”
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Reported Speech What is it? How do you use it? Yesterday, I saw my friend Pamela! She told me that she got a promotion!
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
By: Leann Continere Iwona Gorska Chris Shimazu Sarah Solivan.
The Prodigal Son Year 5 Here I Am Lesson 4. The Prodigal Son Introduction Jesus told many stories to his friends to help them understand difficult things.
Show the "Famous Failures" video at:
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Unit 8 LANGUAGE FOCUS. Content  Word study  Word used in Computing and Telephoning  Grammar  Pronoun  Indirect speech with conditional sentences.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
UNIT 6: SECURITY MEASURES IN WORD PROCESSORS. Functions of Word Processing Software Preparing written forms of communications for clients, other lawyers,
Level 2 IT Users Qualification – Unit 1 Improving Productivity Carl.
The Real Rich Man.
The problem that needs to be solved is if a computer career is for me.
 Prepare your clothes and logistics   Research the Firm  Research the members of the interview panel.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
© 2015 albert-learning.com How to talk to your boss How to talk to your boss!!
Chapter 27 Project By: J.T. Brown O.D. Quinn B.M. Scapa K.R. Thomas.
Asking and Giving Opinion
Welcome to HRMS SELF SERVICE for EMPLOYEES Warwickshire County Council’s Self-Service Human Resources system Press Enter or Left Mouse click when you are.
Describe the use of technology in the financial-information management function.
Developing a Network Security Policy By: Chris Catalano.
8 – Protecting Data and Security
How To Run A Project Report On Reckon?. If you are having an account on Reckon, then running a project report is not a difficult task at all. But here.
ETHICS: Nobody Said I Shouldn’t
File and Record Locking
Presentation transcript:

Data Base Systems Some Thoughts

Ethics Guide–Nobody Said I Shouldn’t Kelly make a backup copy of his company’s database on CD and took it home and installed it on his home computer. While performing queries on the database, he found customer order information and focused in on his friend Jason’s customer order entries.

Kelly noticed that Jason gave huge discounts to Valley Appliances but not to his other customers. At an after work gathering, Kelly asked Jason about the Valley Appliances discount telling him what he had been doing. When Kelly returned to work, he was fired. Ethics Guide–Nobody Said I Shouldn’t (Continued)

Security Guide–Database Security The firewall, a computing device located between a firm’s internal network and external networks, prevents unauthorized access to the internal network. For the best security, the DBMS computer should be protected by a firewall, and then all other security measures should be designed as if the firewall has been breached.

Security Guide–Database Security (Continued) All operating systems and DBMS patches should be installed as soon as they become available. To prevent unauthorized access, no one other than authorized operations personnel should be able to directly access the computer that runs the DBMS. –Instead, all access should be via authorized applications programs The computer running the DBMS should be secured behind locked doors, and visits to that room should be recorded in a log.

Security Guide–Database Security (Continued) All major DBMS products have extensive, built-in security features. –These features allow for the definition of user accounts and user roles. –Each user account belongs to a specific person. –A role is a generic employee function, such as payroll clerk or field salesperson. –Once an account is defined, it can be assigned specific permissions, and it can also be assigned particular roles. Most DBMS products log failed attempts to sign on and produce other usage reports as well.

Security Guide–Database Security (Continued) The database administrator (DBA) should periodically monitor such logs and reports for suspicious activity. It is important to have a plan of action for security emergencies. The steps to be taken vary from database to database.

Problem Solving Guide–Immanuel Kant, Data Modeler Only the users can say whether a data model accurately reflects their business environment. What happens when the user’s disagree among themselves? –It’s tempting to say, “The correct model is the one that better represents the real world.” The problem with this statement is that data models do not model “the real world.” –A data model is simply a model of what the data modeler perceives.

Problem Solving Guide–Immanuel Kant, Data Modeler (Continued) What happens when the user’s disagree among themselves? (continued) –This very important point can be difficult to understand; but if you understand it, you will save many hours in data modeling validation meetings and be a much better data modeling member. Nothing that humans can do represent the real world. –A data model, therefore, is a model of a human’s model of what appears to be “out there.” –For example, a model of a salesperson is a model of the model that humans make of salespeople.

Problem Solving Guide–Immanuel Kant, Data Modeler (Continued) What do we do when people disagree about what should be in a data model? –First, we realize that anyone attempting to justify her data model as a better representation of the real world is saying, quite arrogantly, “The way I think of the world is the way that counts.” –Second, in times of disagreement we must ask the question, “How well does the data model fit the mental models of the people who are going to use the system?” –The only valid point is whether it reflects how the users view their world. Will it enable the users to do their jobs?

Opposing Forces Guide: No, Thanks, I’ll Use a Spreadsheet I’m not buying all this stuff about databases. –“I’ve tried them and they’re a pain-way too complicated to set up, and most of the time, a spreadsheet works just as well.” –“No, unless you are a General Motors or Toyota, I wouldn’t mess with a database.” –“You have to have professional IS people to create it and keep it running.” –“Besides, I don’t really want to share my data with anyone.” –“I work pretty hard to develop my client list.” –“Why would I want to give it away?”

Opposing Forces Guide: No, Thanks, I’ll Use a Spreadsheet (Continued) I’m not buying all this stuff about databases (continued) –“When I want something, I use Excel’s Data Filter.” –“I can usually get what I need.” –“Of course, I can’t still send form letters, but it really doesn’t matter.” –“I get most of my sales using the phone, anyway.”

Reflection Guide–Requirements Creep Changing requirements is the biggest challenge for creating and managing databases and database applications. –The development team just finishes the order entry database and applications when a user asks, innocently enough, “Where do I enter the second salesperson?” –The development team responds “This is the first time I’ve heard of it. Why didn’t someone tell me this before?” –Of course, the best way to solve this problem is not to have it in the first place; it would be better to learn of the need for multiple salesperson’s names long before the system is created.

Reflection Guide–Requirements Creep (Continued) It is very important for user involvement in both requirements specification and data model validation. Unfortunately, however, not all change requests are preventable. –Some occur only after a period of system use. An information system enables its users to behave in new ways, and as they behave in new ways, they think of new requirements for the system.