Download presentation
Presentation is loading. Please wait.
1
© Prentice Hall 2002 14.1 CHAPTER 14 Managing Technological Resources
2
© Prentice Hall 2002 14.2 THE DATA RESOURCE DATA A MAJOR ORGANIZATIONAL RESOURCE DATA A MAJOR ORGANIZATIONAL RESOURCE MANAGE DATA & KNOWLEDGE AS STRATEGIC RESOURCE MANAGE DATA & KNOWLEDGE AS STRATEGIC RESOURCE DATA ASSET ONLY IF AVAILABLE WHEN NEEDED DATA ASSET ONLY IF AVAILABLE WHEN NEEDED RESPONSIBILITY OF EVERY USER- MANAGER RESPONSIBILITY OF EVERY USER- MANAGER*
3
© Prentice Hall 2002 14.3 KEY PRINCIPLES IN MANAGING DATA 1.NEED TO MANAGE DATA IS PERMANENT 2.DATA MAY EXIST AT SEVERAL LEVELS 3.KEEP APPLICATION SOFTWARE SEPARATE FROM DATABASE *
4
© Prentice Hall 2002 14.4 KEY PRINCIPLES IN MANAGING DATA 4.APPLICATION SOFTWARE CLASSIFIED AS TO HOW THEY TREAT DATA: Data capture, data transfer, data analysis & presentation 5.APPLICATION SOFTWARE CONSIDERED DISPOSABLE 6.DATA SHOULD BE CAPTURED ONCE 7.SET STRICT DATA STANDARDS *
5
© Prentice Hall 2002 14.5 DATA PYRAMID MANAGERIAL CAPTURE SYSTEMS TRANSFER SYSTEMS ANALYSIS & PRESENTATION STRATEGIC DATABASES OPERATIONAL TRANSACTION DATA
6
© Prentice Hall 2002 14.6 CATEGORIES OF INFORMATION PROCESSING RAW DATA CAPTURED/RECEIVED RAW DATA CAPTURED/RECEIVED INSPECTED FOR QUALITY INSPECTED FOR QUALITY DATA USED IN AUTHORIZED INFORMATION PRODUCT DATA USED IN AUTHORIZED INFORMATION PRODUCT DATA RETRIEVED WHEN NEEDED DATA RETRIEVED WHEN NEEDED OBSOLETE DATA REPLACED OBSOLETE DATA REPLACED SECURE & UNCONTAMINATED SECURE & UNCONTAMINATED*
7
© Prentice Hall 2002 14.7 TYPES OF DATA STANDARDS IDENTIFIER: Unique value for each business entity IDENTIFIER: Unique value for each business entity NAMING: Unique name or label for each type of data NAMING: Unique name or label for each type of data DEFINITION: Unambiguous description for each type of data DEFINITION: Unambiguous description for each type of data INTEGRITY RULE: Specify legitimate values for a data type INTEGRITY RULE: Specify legitimate values for a data type USAGE RIGHTS: Security clearances for a data type USAGE RIGHTS: Security clearances for a data type*
8
© Prentice Hall 2002 14.8 ASSET MANAGEMENT FUNCTIONS PLAN PLAN SOURCE SOURCE ACQUIRE & MAINTAIN ACQUIRE & MAINTAIN DEFINE/DESCRIBE & INVENTORY DEFINE/DESCRIBE & INVENTORY ORGANIZE & MAKE ACCESSIBLE ORGANIZE & MAKE ACCESSIBLE CONTROL QUALITY & INTEGRITY CONTROL QUALITY & INTEGRITY*
9
© Prentice Hall 2002 14.9 ASSET MANAGEMENT FUNCTIONS PROTECT & SECURE PROTECT & SECURE ACCOUNT FOR USE ACCOUNT FOR USE RECOVER/RESTORE & UPGRADE RECOVER/RESTORE & UPGRADE DETERMINE RETENTION & DISPOSAL DETERMINE RETENTION & DISPOSAL TRAIN & CONSULT FOR EFFECTIVE USE TRAIN & CONSULT FOR EFFECTIVE USE*
10
© Prentice Hall 2002 14.10 STATISTICAL TOOLS OTHER TOO LS DATA WAREHOUSE NEW APPLICATIONS SYSTEMS LEGACY APPLICATIONS SYSTEMS OPERATIONAL STORE DATA WAREHOUS E DATA CAPTURING & PROCESSING DATA CLEANSING; SECURITY ISSUES SINGLE ENTERPRISE DATA REPOSITORY; ORGANIZED FOR ANALYSIS DATA ANALYSIS & PRESENTATION
11
© Prentice Hall 2002 14.11 DATA OWNERSHIP NEED TO PROTECT PERSONAL PRIVACY NEED TO PROTECT PERSONAL PRIVACY NEED TO PROTECT TRADE SECRETS NEED TO PROTECT TRADE SECRETS REQUIREMENT TO ALLOW ONLY THOSE WITH ‘NEED TO KNOW’ ACCESS TO SENSITIVE MATERIAL REQUIREMENT TO ALLOW ONLY THOSE WITH ‘NEED TO KNOW’ ACCESS TO SENSITIVE MATERIAL*
12
© Prentice Hall 2002 14.12 DATA OWNERSHIP DESIRE TO PROMOTE INTERNAL COMPETITION, JUSTIFY USE OF SCARCE RESOURCES DESIRE TO PROMOTE INTERNAL COMPETITION, JUSTIFY USE OF SCARCE RESOURCES DESIRE TO SHOW COMMITMENT TO DATA OWNERSHIP DESIRE TO SHOW COMMITMENT TO DATA OWNERSHIP DESIRE TO USE INFORMATION AS POWER FOR POLITICAL GAIN DESIRE TO USE INFORMATION AS POWER FOR POLITICAL GAIN*
13
© Prentice Hall 2002 14.13 TRANSBORDER DATA FLOWS ELECTRONIC DATA MOVEMENT ACROSS NATIONAL BOUNDARIES CONTROLLED BY LEGISLATION: ELECTRONIC DATA MOVEMENT ACROSS NATIONAL BOUNDARIES CONTROLLED BY LEGISLATION: PREVENT ECONOMIC/CULTURAL IMPERIALISM PREVENT ECONOMIC/CULTURAL IMPERIALISM PROTECT DOMESTIC INDUSTRY PROTECT DOMESTIC INDUSTRY PROTECT INDIVIDUAL PRIVACY PROTECT INDIVIDUAL PRIVACY FOSTER INTERNATIONAL TRADE FOSTER INTERNATIONAL TRADE*
14
© Prentice Hall 2002 14.14 DATA ADMINISTRATION PROMOTE & CONTROL DATA SHARING PROMOTE & CONTROL DATA SHARING ANALYZE IMPACT ON APPLICATIONS OF CHANGES IN DATA DEFINITIONS ANALYZE IMPACT ON APPLICATIONS OF CHANGES IN DATA DEFINITIONS MAINTAIN DATA DICTIONARY: Consistent encyclopedia of data names, definitions, uses MAINTAIN DATA DICTIONARY: Consistent encyclopedia of data names, definitions, uses*
15
© Prentice Hall 2002 14.15 DATA ADMINISTRATION REDUCE REDUNDANT DATA & PROCESSING REDUCE REDUNDANT DATA & PROCESSING REDUCE SYSTEM MAINTENANCE COSTS, IMPROVE PRODUCTIVITY REDUCE SYSTEM MAINTENANCE COSTS, IMPROVE PRODUCTIVITY IMPROVE QUALITY & SECURITY OF DATA IMPROVE QUALITY & SECURITY OF DATA INSURE DATA INTEGRITY INSURE DATA INTEGRITY*
16
© Prentice Hall 2002 14.16 DATABASE ADMINISTRATION (DBA) TUNE DATABASE MANAGEMENT SYSTEMS TUNE DATABASE MANAGEMENT SYSTEMS SELECT & EVALUATE DATABASE TRAINING SELECT & EVALUATE DATABASE TRAINING CONTROL PHYSICAL DATABASE DESIGN CONTROL PHYSICAL DATABASE DESIGN DESIGN METHODS TO RECOVER FROM DATABASE DAMAGE DESIGN METHODS TO RECOVER FROM DATABASE DAMAGE*
17
© Prentice Hall 2002 14.17 DATABASE ADMINISTRATION (DBA) SUPERVISE PLACEMENT OF DATABASES ON COMPUTERS & STORAGE DEVICES SUPERVISE PLACEMENT OF DATABASES ON COMPUTERS & STORAGE DEVICES MANAGE INTERFACE OF DATABASES WITH TELECOMMUNICATIONS & OTHER TECHNOLOGY MANAGE INTERFACE OF DATABASES WITH TELECOMMUNICATIONS & OTHER TECHNOLOGY*
18
© Prentice Hall 2002 14.18 DATA STEWARD ESTABLISHES PROCEDURES GOVERNING DATA ELEMENTS ESTABLISHES PROCEDURES GOVERNING DATA ELEMENTS ESTABLISHES ACCESS AUTHORIZATION PROCEDURES ESTABLISHES ACCESS AUTHORIZATION PROCEDURES DETERMINES & EVALUATES MOST RELIABLE SOURCES OF DATA DETERMINES & EVALUATES MOST RELIABLE SOURCES OF DATA MAKES DATA DICTIONARY UNDERSTANDABLE TO USERS MAKES DATA DICTIONARY UNDERSTANDABLE TO USERS ENSURES THAT ONLY NEEDED VERSIONS OF EACH DATA ELEMENT EXIST ENSURES THAT ONLY NEEDED VERSIONS OF EACH DATA ELEMENT EXIST*
19
© Prentice Hall 2002 14.19 DATA STEWARD ENSURES DATA USED IS MOST APPROPRIATE VERSION ENSURES DATA USED IS MOST APPROPRIATE VERSION ASSIGNS RESPONSIBILITIES FOR DATA INTEGRITY ASSIGNS RESPONSIBILITIES FOR DATA INTEGRITY RESOLVES CONFLICTS CONCERNING SHARABLE DATA RESOLVES CONFLICTS CONCERNING SHARABLE DATA CONSULTS WITH USERS ON USE OF ELECTRONIC DATA CONSULTS WITH USERS ON USE OF ELECTRONIC DATA*
20
© Prentice Hall 2002 14.20 TOOLS FOR MANAGING DATA 1.DATA MODELING: –ENTERPRISE MODELING –VIEW INTEGRATION 2.DATABASE MANAGEMENT SYSTEMS: –RELATIONAL DBMS: Allows user to filter data with specific properties –STRUCTURED QUERY LANGUAGE 3.DATA DICTIONARY/DIRECTORY: A database about data, provides standard names, characteristics, uses *
21
© Prentice Hall 2002 14.21 INFRASTRUCTURE MANAGEMENT ISSUES 1.LOCATION 2.THE WORKSTATION 3.SUPPORTING OPERATING SYSTEMS 4.REDUNDANCY 5.SUPPORTING COMMUNICATIONS PROTOCOLS *
22
© Prentice Hall 2002 14.22 INFRASTRUCTURE MANAGEMENT ISSUES 6.BANDWIDTH 7.RESPONSE TIME ON NETWORK 8.SECURITY vs EASE OF ACCESS 9.BREADTH OF NETWORK ACCESS 10. ACCESS TO EXTERNAL DATA SERVICES *
23
© Prentice Hall 2002 14.23 APPLICATIONS PORTFOLIO MANAGEMENT ISSUES 1. ASSUMED USER: Skills? Interfaces? Needed software? 2.APPLICATION LOCATION: Centralized shareable resource, or stand-alone? 3.PROCESS-DRIVEN OR DATA-DRIVEN DESIGN 4.EVALUATION CRITERIA FOR NEW APPLICATIONS SYSTEMS *
24
© Prentice Hall 2002 14.24 ROLE OF USER-MANAGER 1. MAKE POSITION CLEAR ON CRITICAL INFRASTRUCTURAL MANAGEMENT ISSUES 2. TAKE ACTIVE ROLE IN DATA STEWARDSHIP 3. TAKE RESPONSIBILITY FOR FOLLOWING POLICIES 4. DEMAND QUALITY IS ASSET MANAGEMENT *
25
© Prentice Hall 2002 14.25 CHAPTER 14 Managing Technological Resources
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.