SlideShare a Scribd company logo
1 of 20
Databases & 
Challenges of a Digital Age 
WEEK 7 PRESENTATION 
WENDY LI LE 
ITCC121 
OCTOBER 19, 2014 
PROFESSOR FELIX AGALABA
A database is a collection of interrelated data, logically 
organized to be easily accessed and managed. 
Databases are used for many purposes of storing 
information, such as student’s names in a university 
database or purchasing habits of customers in a retail 
database. 
Databases are used by advertising and marketing 
companies, retailers, and even our government. All 
types of agencies collectively gathering information to 
use for their specific purpose. 
8.1-8.8
MANAGING FILES 
BASIC CONCEPTS 
Data Storage Hierarchy 
File (Table) a collection of records [Top of the hierarchy] 
Record (Row) a collection of fields 
Field (Column) each field has a field name and the type of field 
Byte A character, such as a letter, number, or symbol 
Bit Unit of data represented by either a 0 (off) or a 1 (on) 
• Key field – the primary identifier of a record. A key 
field makes the record searchable, therefore must 
be unique
DATABASE MANAGEMENT SYSTEMS (DBMS) 
A DBMS is software that enables users 
to interact with the database to create, 
modify, or delete data. 
• Three components of a DBMS: 
• Data dictionary (repository) 
• DBMS utilities – programs that enable 
maintenance of the database 
• Report generator
DATABASE MODELS 
• Hierarchical 
• Network 
• Relational 
• Object-oriented 
• Multidimensional 
Example of a multidimensional database
DATA MINING 
• The process of analyzing 
large amounts of data to 
discover patterns that 
could describe past 
trends or predict future 
situations
DATABASES AND THE DIGITAL ECONOMY 
E-BUSINESS & E-COMMERCE 
B2B 
4 main 
types of 
ecommerce 
B2C 
C2C 
Mobile 
commerce
INFORMATION SYSTEMS IN ORGANIZATIONS 
USING DATABASES TO HELP MAKE DECISIONS
ARTIFICIAL INTELLIGENCE (AI) 
• Some fields of AI: 
• Expert systems 
• Natural language processing 
• Intelligent agents 
• Pattern recognition 
• Fuzzy logic 
• Virtual reality & simulation 
• Robotics 
Darpa – AlphaDog LS3 Robotic military dog 
Shopping Bot: 
PriceGrabber.com
THE ETHICS OF USING DATABASES 
CONCERNS ABOUT PRIVACY & IDENTITY THEFT 
Big Data is a term most people know. It is the gathering of massive amounts of 
information on internet consumers by corporations or companies. The information 
collected is stored in databases, which are then analyzed to, for example, predict the 
purchasing habits of a specific customer. 
The general concern is privacy so they do not worry about identity theft and the idea 
that consumers want from companies is complete transparency. Let them know when 
data will be collected, what will be collected, who will have it, and how it will be used, 
then give them a chance to opt out. 
Companies and data warehouses have the ethical implications of storing the data 
without selling or losing it to hackers. The main data collecting company is Axiom. 
Click AboutTheData.com to see what Big Data has stored on you.
9.1-9.5 
There are a few challenges with living in today’s society. 
Technology brings with it a certain uncertainty. 
Uncertainties such as truth and security issues, securing 
devices and communications, issues with the quality of 
life surrounding technology, and economic and political 
implications.
TRUTH ISSUES 
EXAMPLES OF MANIPULATING DIGITAL DATA 
Sound manipulation 
• Electronic music or making a singers voice sound 
perfect by its pitch 
Image manipulation 
• Good – restoring an old photograph or creating 
graphic art 
• Bad – image doctoring 
Video & Television manipulation 
• Special effects in video games or movies
SECURITY ISSUES 
THREATS TO COMPUTERS & COMMUNICATION SYSTEMS 
• Errors and accidents – these include all 
human operating errors, faulty hardware, 
and the software bug 
• Natural hazards – no matter the natural 
hazard, always keep your computer backed 
up and plugged into a surge protector. 
• Computer criminals – hackers, phishers, 
hactivists, scammers, employees 
• Computer crimes – theft of hardware or 
software, music, movies, information, 
identity 
(University of Calgary, n.d.)
SECURITY SAFEGUARDS 
PROTECTING COMPUTERS & COMMUNICATIONS 
• Must have safeguards: 
• “Deterrents to computer crime” would include law enforcement agencies 
with cybercrime divisions or large purchase warnings to prevent fraudulent 
charges. 
• Identification includes items such as debit cards with your picture on them, 
the pin number used to access the ATM. 
• Encryption types: ciphertext, hashing, symmetric (most secure), asymmetric 
• “Protection of software and data” include user access control and 
authentication of files, folders, and hard drives. 
• A disaster recovery plan should be had not only by businesses but also by 
individuals, especially if they work at home or go to school. Hard drives 
should be backed up on multiple kinds of media and put in multiple 
locations.
QUALITY-OF-LIFE ISSUES 
THE ENVIRONMENT & MENTAL HEALTH 
• Green Computing 
• Disposal of “technotrash” or “e-waste” 
is an issue and instead of 
shipping our waste to other 
countries, we should be doing more 
to recycle it. 
• Non-renewable resources are being 
used for the energy to manufacture 
devices and for the material the 
devices are made of. Recycling 
would help here as well. 
• Chemicals leaked into landfills from 
electronics, e.g. chromium and lead, 
are dangerous to humans 
• Mental health 
• The overuse of technology is 
actually considered an addiction in 
the psychology field because 
addiction is any uncontrolled activity 
that induces stress, anxiety, 
depression, and insomnia. 
• There are even mental health 
programs that deal with technology 
addiction. The Center for Internet 
and Technology Addiction offers 
cognitive behavioral therapy as one 
of their services.
QUALITY-OF-LIFE ISSUES 
CHI LD PROTECTION & THE WORKPLACE 
• Child protection 
• Unfortunately, according to Williams 
and Sawyer, the Internet is also a 
place full of online predators, 
pornography, and bullying (2012). 
• To help with these issues, the FCC 
established the Child’s Internet 
Protection Act of 2000 that rewards 
schools and libraries with 
communications discounts for 
having a policy on Internet safety 
which includes content filters, online 
monitoring and the like. 
• Workplace 
• Productivity may be hindered in 
many ways. “Hyper-connectedness” 
certainly may either hinder or boost 
productivity depending on the levels 
of device maintenance and the 
experience of the employees. 
According to Cornerstone On 
Demand, the overwhelming of 
technology depends on the age of 
the employee. The younger they 
are, the more inept they are to use 
their own devices for productivity 
and not feel overwhelmed (2014).
ECONOMIC & POLITICAL ISSUES 
EMPLOYMENT & THE HAVES/HAVE -NOTS 
We are currently in the middle of a 
transformation to a more technology service-oriented 
nation. Education is becoming more 
readily available thanks to the Internet and we 
should capitalize on this fact so as to lead the way 
for the rest of the world. Connecting children as 
early as possible and actually teaching web and 
programming classes in the public schools should 
be our future. 
Industrialization Digital Age
IN CONCLUSION… 
Databases are crucial to nearly every aspect of everyday 
computing. They range from individual and 
organizational cloud storage to customer information 
databases in e-commerce. We must all make ethically 
sound decisions when working with databases. 
We are in the age of information and must not only use 
this to our advantage, but use this to make the world a 
better place and a “better place” includes protecting our 
environment at the same time. We must always 
remember to “unplug” quite often to value our quality of 
life.
REFERENCES 
Arronlee33. (2012). DARPA - Alphadog legged squad support system (LS3) Field testing [720p] 
[Video]. Retrieved from https://www.youtube.com/watch?v=gOkXRXZIFxs 
Batke, K. (2011). 7 types of cyber criminals. Retrieved from http://www.faronics.com/news/blog/7- 
types-of-cyber-criminals/ 
Carnegie Cyber Academy. (n.d.). Environmental issues. Retrieved from 
http://www.carnegiecyberacademy.com/facultyPages/environment/issues.html 
Concept Draw. (n.d.). Pyramid diagram examples [Online image]. Retrieved from 
http://www.conceptdraw.com/examples/chart-of-management-information-system-with-diagram 
Cornerstone On Demand. (2014). The state of workplace productivity report. Retrieved from 
http://www.cornerstoneondemand.com/resources/research/state-of-workplace-productivity- 
2013 
FCC. (n.d.). Child’s Internet Protection Act (CIPA). Retrieved from 
http://www.fcc.gov/guides/childrens-internet-protection-act 
Greenfield, D. (n.d.). The center for internet and technology addiction. Retrieved from 
http://virtual-addiction.com/
King, J. & Richards, N. (2014). What’s up with big data ethics? Retrieved from 
http://radar.oreilly.com/2014/03/whats-up-with-big-data-ethics.html 
Linn, M. (2014). What are the different types of encryption methods? Retrieved from 
http://www.wisegeek.org/what-are-the-different-types-of-encryption-methods.htm 
Sassoon, Y. (2012). Transforming snowplow data so that it can be interrogated in BI / OLAP tools 
like Tableau, Qlikview and Pentaho [Online image]. Retrieved from 
http://snowplowanalytics.com/blog/2012/12/17/transforming-snowplow-data-so-it-can-be-interrogated- 
by-olap-tools-like-tableau/ 
Singh, S. (2014). Companies devise new strategies to keep pace with rapid rise of mobile 
commerce. Retrieved from 
http://economictimes.indiatimes.com/industry/services/retail/companies-devise-new-strategies- 
to-keep-pace-with-rapid-rise-of-mobile-commerce/articleshow/44892422.cms 
Telemetry Labs. (n.d.). M2 cloud solutions [Online image]. Retrieved from 
http://www.telemetrylabs.com/ 
University of Calgary. (n.d.). Identity theft on Ebay [Online image]. Retrieved from 
http://wiki.ucalgary.ca/page/Courses/Computer_Science/CPSC_203/CPSC_203_2008Winter 
_L03/CPSC_203_2008WinterL03_TermProjects/T19_Group_3-_Identity_Theft_on_Ebay 
Williams, B. & Sawyer, S. (2012). Using Information Technology, 10th ed. McGraw-Hill.

More Related Content

What's hot

Nanoindentation
NanoindentationNanoindentation
NanoindentationSum K
 
Cementing Materials
Cementing MaterialsCementing Materials
Cementing MaterialsGokul Saud
 
Use of Nylon Fiber and Ceramic waste in Concrete
Use of Nylon Fiber and Ceramic waste in ConcreteUse of Nylon Fiber and Ceramic waste in Concrete
Use of Nylon Fiber and Ceramic waste in ConcreteMasnun Rahman
 
Concrete exposed to seawater
Concrete exposed to seawaterConcrete exposed to seawater
Concrete exposed to seawaterKhattar Aoun
 

What's hot (6)

BACTERIAL CONCRETE
BACTERIAL CONCRETEBACTERIAL CONCRETE
BACTERIAL CONCRETE
 
Nanoindentation
NanoindentationNanoindentation
Nanoindentation
 
Cement.pptx
Cement.pptxCement.pptx
Cement.pptx
 
Cementing Materials
Cementing MaterialsCementing Materials
Cementing Materials
 
Use of Nylon Fiber and Ceramic waste in Concrete
Use of Nylon Fiber and Ceramic waste in ConcreteUse of Nylon Fiber and Ceramic waste in Concrete
Use of Nylon Fiber and Ceramic waste in Concrete
 
Concrete exposed to seawater
Concrete exposed to seawaterConcrete exposed to seawater
Concrete exposed to seawater
 

Viewers also liked

Use of open, curated variant databases: ethics? Liability? - Bartha Knoppers
Use of open, curated variant databases: ethics? Liability? - Bartha KnoppersUse of open, curated variant databases: ethics? Liability? - Bartha Knoppers
Use of open, curated variant databases: ethics? Liability? - Bartha KnoppersHuman Variome Project
 
Ethics and Values in the Digital Age
Ethics and Values in the Digital AgeEthics and Values in the Digital Age
Ethics and Values in the Digital AgeMark Briggs
 
6 animated gifs_sizing
6 animated gifs_sizing6 animated gifs_sizing
6 animated gifs_sizingguest2edb405
 
Alaska
AlaskaAlaska
Alaskanandav
 
Working With Power Point3 30
Working With Power Point3 30Working With Power Point3 30
Working With Power Point3 30nandav
 
Adobe Photoshop
Adobe PhotoshopAdobe Photoshop
Adobe Photoshopjoelk
 
Step By Step 2
Step By Step 2Step By Step 2
Step By Step 2lallen92
 
Photoshop Basics
Photoshop BasicsPhotoshop Basics
Photoshop BasicsAllieW
 
Management case study
Management case studyManagement case study
Management case studyWendy Lile
 
Computer Science
Computer ScienceComputer Science
Computer ScienceWendy Lile
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the WebMike Crabb
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethicssmartinson
 
Hopeful Images from 2015
Hopeful Images from 2015Hopeful Images from 2015
Hopeful Images from 2015maditabalnco
 

Viewers also liked (19)

Use of open, curated variant databases: ethics? Liability? - Bartha Knoppers
Use of open, curated variant databases: ethics? Liability? - Bartha KnoppersUse of open, curated variant databases: ethics? Liability? - Bartha Knoppers
Use of open, curated variant databases: ethics? Liability? - Bartha Knoppers
 
Ethics and Values in the Digital Age
Ethics and Values in the Digital AgeEthics and Values in the Digital Age
Ethics and Values in the Digital Age
 
6 animated gifs_sizing
6 animated gifs_sizing6 animated gifs_sizing
6 animated gifs_sizing
 
Alaska
AlaskaAlaska
Alaska
 
Working With Power Point3 30
Working With Power Point3 30Working With Power Point3 30
Working With Power Point3 30
 
Adobe Photoshop
Adobe PhotoshopAdobe Photoshop
Adobe Photoshop
 
Step By Step 2
Step By Step 2Step By Step 2
Step By Step 2
 
Photoshop Basics
Photoshop BasicsPhotoshop Basics
Photoshop Basics
 
Management case study
Management case studyManagement case study
Management case study
 
Suza dds 05 ethics and development show
Suza dds 05 ethics and development   showSuza dds 05 ethics and development   show
Suza dds 05 ethics and development show
 
Computer Science
Computer ScienceComputer Science
Computer Science
 
Yoga
Yoga Yoga
Yoga
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Yoga for glowing skin
Yoga for glowing skinYoga for glowing skin
Yoga for glowing skin
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the Web
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 
Hopeful Images from 2015
Hopeful Images from 2015Hopeful Images from 2015
Hopeful Images from 2015
 

Similar to Databases & Challenges of a Digital Age

Communication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesCommunication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesFaindra Jabbar
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Mba ewis ii u ii planning and design
Mba ewis ii u ii  planning and designMba ewis ii u ii  planning and design
Mba ewis ii u ii planning and designRai University
 
ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012
ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012
ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012Lee Dirks
 
Business Intelligence & Predictive Analytic by Prof. Lili Saghafi
Business Intelligence & Predictive Analytic by Prof. Lili SaghafiBusiness Intelligence & Predictive Analytic by Prof. Lili Saghafi
Business Intelligence & Predictive Analytic by Prof. Lili SaghafiProfessor Lili Saghafi
 
Impacts of Technology
Impacts of TechnologyImpacts of Technology
Impacts of TechnologyHaseebUsmani3
 
06. 9534 14985-1-ed b edit dhyan
06. 9534 14985-1-ed b edit dhyan06. 9534 14985-1-ed b edit dhyan
06. 9534 14985-1-ed b edit dhyanIAESIJEECS
 
Data Science - An emerging Stream of Science with its Spreading Reach & Impact
Data Science - An emerging Stream of Science with its Spreading Reach & ImpactData Science - An emerging Stream of Science with its Spreading Reach & Impact
Data Science - An emerging Stream of Science with its Spreading Reach & ImpactDr. Sunil Kr. Pandey
 
Impact of data science in financial reporting
Impact of data science in financial reporting Impact of data science in financial reporting
Impact of data science in financial reporting James Deiotte
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
An Overview of BigData
An Overview of BigDataAn Overview of BigData
An Overview of BigDataValarmathi V
 
Big data and the data quality imperative
Big data and the data quality imperativeBig data and the data quality imperative
Big data and the data quality imperativeTrillium Software
 
GCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptxGCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptxsangeetha865539
 

Similar to Databases & Challenges of a Digital Age (20)

Communication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesCommunication Technology- Information System and Technologies
Communication Technology- Information System and Technologies
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 
Mba ewis ii u ii planning and design
Mba ewis ii u ii  planning and designMba ewis ii u ii  planning and design
Mba ewis ii u ii planning and design
 
ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012
ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012
ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012
 
Business Intelligence & Predictive Analytic by Prof. Lili Saghafi
Business Intelligence & Predictive Analytic by Prof. Lili SaghafiBusiness Intelligence & Predictive Analytic by Prof. Lili Saghafi
Business Intelligence & Predictive Analytic by Prof. Lili Saghafi
 
3. technological change
3. technological change3. technological change
3. technological change
 
Impacts of Technology
Impacts of TechnologyImpacts of Technology
Impacts of Technology
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
06. 9534 14985-1-ed b edit dhyan
06. 9534 14985-1-ed b edit dhyan06. 9534 14985-1-ed b edit dhyan
06. 9534 14985-1-ed b edit dhyan
 
Data Science - An emerging Stream of Science with its Spreading Reach & Impact
Data Science - An emerging Stream of Science with its Spreading Reach & ImpactData Science - An emerging Stream of Science with its Spreading Reach & Impact
Data Science - An emerging Stream of Science with its Spreading Reach & Impact
 
Impact of data science in financial reporting
Impact of data science in financial reporting Impact of data science in financial reporting
Impact of data science in financial reporting
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
An Overview of BigData
An Overview of BigDataAn Overview of BigData
An Overview of BigData
 
Big data and the data quality imperative
Big data and the data quality imperativeBig data and the data quality imperative
Big data and the data quality imperative
 
UCISA 2013 Presentation
UCISA 2013 PresentationUCISA 2013 Presentation
UCISA 2013 Presentation
 
GCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptxGCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptx
 

More from Wendy Lile

Cleaning up Texas air
Cleaning up Texas airCleaning up Texas air
Cleaning up Texas airWendy Lile
 
Web 2.0 Revisited - Final project
Web 2.0 Revisited - Final projectWeb 2.0 Revisited - Final project
Web 2.0 Revisited - Final projectWendy Lile
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual propertiesWendy Lile
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual propertiesWendy Lile
 
Unix linux vmacvwindowspptx2
Unix linux vmacvwindowspptx2Unix linux vmacvwindowspptx2
Unix linux vmacvwindowspptx2Wendy Lile
 
Gas pump program final Pptx
Gas pump program final PptxGas pump program final Pptx
Gas pump program final PptxWendy Lile
 
Gas pump program final
Gas pump program finalGas pump program final
Gas pump program finalWendy Lile
 
Website design and development part 1
Website design and development part 1Website design and development part 1
Website design and development part 1Wendy Lile
 
Interactive features
Interactive featuresInteractive features
Interactive featuresWendy Lile
 
Elias sitereview
Elias sitereviewElias sitereview
Elias sitereviewWendy Lile
 
Website evaluationpaperfinal
Website evaluationpaperfinalWebsite evaluationpaperfinal
Website evaluationpaperfinalWendy Lile
 
Succession and natural selection
Succession and natural selectionSuccession and natural selection
Succession and natural selectionWendy Lile
 
Population size
Population sizePopulation size
Population sizeWendy Lile
 
Mitigation strategies and solutions for energy conservation
Mitigation strategies and solutions for energy conservationMitigation strategies and solutions for energy conservation
Mitigation strategies and solutions for energy conservationWendy Lile
 
Energy resource plan
Energy resource planEnergy resource plan
Energy resource planWendy Lile
 
Energy resource challanges
Energy resource challangesEnergy resource challanges
Energy resource challangesWendy Lile
 
Business communication trends
Business communication trendsBusiness communication trends
Business communication trendsWendy Lile
 
Oral presentation
Oral presentationOral presentation
Oral presentationWendy Lile
 
Ethics awareness inventory
Ethics awareness inventoryEthics awareness inventory
Ethics awareness inventoryWendy Lile
 
Ethical issues and management paper
Ethical issues and management paperEthical issues and management paper
Ethical issues and management paperWendy Lile
 

More from Wendy Lile (20)

Cleaning up Texas air
Cleaning up Texas airCleaning up Texas air
Cleaning up Texas air
 
Web 2.0 Revisited - Final project
Web 2.0 Revisited - Final projectWeb 2.0 Revisited - Final project
Web 2.0 Revisited - Final project
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
 
Unix linux vmacvwindowspptx2
Unix linux vmacvwindowspptx2Unix linux vmacvwindowspptx2
Unix linux vmacvwindowspptx2
 
Gas pump program final Pptx
Gas pump program final PptxGas pump program final Pptx
Gas pump program final Pptx
 
Gas pump program final
Gas pump program finalGas pump program final
Gas pump program final
 
Website design and development part 1
Website design and development part 1Website design and development part 1
Website design and development part 1
 
Interactive features
Interactive featuresInteractive features
Interactive features
 
Elias sitereview
Elias sitereviewElias sitereview
Elias sitereview
 
Website evaluationpaperfinal
Website evaluationpaperfinalWebsite evaluationpaperfinal
Website evaluationpaperfinal
 
Succession and natural selection
Succession and natural selectionSuccession and natural selection
Succession and natural selection
 
Population size
Population sizePopulation size
Population size
 
Mitigation strategies and solutions for energy conservation
Mitigation strategies and solutions for energy conservationMitigation strategies and solutions for energy conservation
Mitigation strategies and solutions for energy conservation
 
Energy resource plan
Energy resource planEnergy resource plan
Energy resource plan
 
Energy resource challanges
Energy resource challangesEnergy resource challanges
Energy resource challanges
 
Business communication trends
Business communication trendsBusiness communication trends
Business communication trends
 
Oral presentation
Oral presentationOral presentation
Oral presentation
 
Ethics awareness inventory
Ethics awareness inventoryEthics awareness inventory
Ethics awareness inventory
 
Ethical issues and management paper
Ethical issues and management paperEthical issues and management paper
Ethical issues and management paper
 

Recently uploaded

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Databases & Challenges of a Digital Age

  • 1. Databases & Challenges of a Digital Age WEEK 7 PRESENTATION WENDY LI LE ITCC121 OCTOBER 19, 2014 PROFESSOR FELIX AGALABA
  • 2. A database is a collection of interrelated data, logically organized to be easily accessed and managed. Databases are used for many purposes of storing information, such as student’s names in a university database or purchasing habits of customers in a retail database. Databases are used by advertising and marketing companies, retailers, and even our government. All types of agencies collectively gathering information to use for their specific purpose. 8.1-8.8
  • 3. MANAGING FILES BASIC CONCEPTS Data Storage Hierarchy File (Table) a collection of records [Top of the hierarchy] Record (Row) a collection of fields Field (Column) each field has a field name and the type of field Byte A character, such as a letter, number, or symbol Bit Unit of data represented by either a 0 (off) or a 1 (on) • Key field – the primary identifier of a record. A key field makes the record searchable, therefore must be unique
  • 4. DATABASE MANAGEMENT SYSTEMS (DBMS) A DBMS is software that enables users to interact with the database to create, modify, or delete data. • Three components of a DBMS: • Data dictionary (repository) • DBMS utilities – programs that enable maintenance of the database • Report generator
  • 5. DATABASE MODELS • Hierarchical • Network • Relational • Object-oriented • Multidimensional Example of a multidimensional database
  • 6. DATA MINING • The process of analyzing large amounts of data to discover patterns that could describe past trends or predict future situations
  • 7. DATABASES AND THE DIGITAL ECONOMY E-BUSINESS & E-COMMERCE B2B 4 main types of ecommerce B2C C2C Mobile commerce
  • 8. INFORMATION SYSTEMS IN ORGANIZATIONS USING DATABASES TO HELP MAKE DECISIONS
  • 9. ARTIFICIAL INTELLIGENCE (AI) • Some fields of AI: • Expert systems • Natural language processing • Intelligent agents • Pattern recognition • Fuzzy logic • Virtual reality & simulation • Robotics Darpa – AlphaDog LS3 Robotic military dog Shopping Bot: PriceGrabber.com
  • 10. THE ETHICS OF USING DATABASES CONCERNS ABOUT PRIVACY & IDENTITY THEFT Big Data is a term most people know. It is the gathering of massive amounts of information on internet consumers by corporations or companies. The information collected is stored in databases, which are then analyzed to, for example, predict the purchasing habits of a specific customer. The general concern is privacy so they do not worry about identity theft and the idea that consumers want from companies is complete transparency. Let them know when data will be collected, what will be collected, who will have it, and how it will be used, then give them a chance to opt out. Companies and data warehouses have the ethical implications of storing the data without selling or losing it to hackers. The main data collecting company is Axiom. Click AboutTheData.com to see what Big Data has stored on you.
  • 11. 9.1-9.5 There are a few challenges with living in today’s society. Technology brings with it a certain uncertainty. Uncertainties such as truth and security issues, securing devices and communications, issues with the quality of life surrounding technology, and economic and political implications.
  • 12. TRUTH ISSUES EXAMPLES OF MANIPULATING DIGITAL DATA Sound manipulation • Electronic music or making a singers voice sound perfect by its pitch Image manipulation • Good – restoring an old photograph or creating graphic art • Bad – image doctoring Video & Television manipulation • Special effects in video games or movies
  • 13. SECURITY ISSUES THREATS TO COMPUTERS & COMMUNICATION SYSTEMS • Errors and accidents – these include all human operating errors, faulty hardware, and the software bug • Natural hazards – no matter the natural hazard, always keep your computer backed up and plugged into a surge protector. • Computer criminals – hackers, phishers, hactivists, scammers, employees • Computer crimes – theft of hardware or software, music, movies, information, identity (University of Calgary, n.d.)
  • 14. SECURITY SAFEGUARDS PROTECTING COMPUTERS & COMMUNICATIONS • Must have safeguards: • “Deterrents to computer crime” would include law enforcement agencies with cybercrime divisions or large purchase warnings to prevent fraudulent charges. • Identification includes items such as debit cards with your picture on them, the pin number used to access the ATM. • Encryption types: ciphertext, hashing, symmetric (most secure), asymmetric • “Protection of software and data” include user access control and authentication of files, folders, and hard drives. • A disaster recovery plan should be had not only by businesses but also by individuals, especially if they work at home or go to school. Hard drives should be backed up on multiple kinds of media and put in multiple locations.
  • 15. QUALITY-OF-LIFE ISSUES THE ENVIRONMENT & MENTAL HEALTH • Green Computing • Disposal of “technotrash” or “e-waste” is an issue and instead of shipping our waste to other countries, we should be doing more to recycle it. • Non-renewable resources are being used for the energy to manufacture devices and for the material the devices are made of. Recycling would help here as well. • Chemicals leaked into landfills from electronics, e.g. chromium and lead, are dangerous to humans • Mental health • The overuse of technology is actually considered an addiction in the psychology field because addiction is any uncontrolled activity that induces stress, anxiety, depression, and insomnia. • There are even mental health programs that deal with technology addiction. The Center for Internet and Technology Addiction offers cognitive behavioral therapy as one of their services.
  • 16. QUALITY-OF-LIFE ISSUES CHI LD PROTECTION & THE WORKPLACE • Child protection • Unfortunately, according to Williams and Sawyer, the Internet is also a place full of online predators, pornography, and bullying (2012). • To help with these issues, the FCC established the Child’s Internet Protection Act of 2000 that rewards schools and libraries with communications discounts for having a policy on Internet safety which includes content filters, online monitoring and the like. • Workplace • Productivity may be hindered in many ways. “Hyper-connectedness” certainly may either hinder or boost productivity depending on the levels of device maintenance and the experience of the employees. According to Cornerstone On Demand, the overwhelming of technology depends on the age of the employee. The younger they are, the more inept they are to use their own devices for productivity and not feel overwhelmed (2014).
  • 17. ECONOMIC & POLITICAL ISSUES EMPLOYMENT & THE HAVES/HAVE -NOTS We are currently in the middle of a transformation to a more technology service-oriented nation. Education is becoming more readily available thanks to the Internet and we should capitalize on this fact so as to lead the way for the rest of the world. Connecting children as early as possible and actually teaching web and programming classes in the public schools should be our future. Industrialization Digital Age
  • 18. IN CONCLUSION… Databases are crucial to nearly every aspect of everyday computing. They range from individual and organizational cloud storage to customer information databases in e-commerce. We must all make ethically sound decisions when working with databases. We are in the age of information and must not only use this to our advantage, but use this to make the world a better place and a “better place” includes protecting our environment at the same time. We must always remember to “unplug” quite often to value our quality of life.
  • 19. REFERENCES Arronlee33. (2012). DARPA - Alphadog legged squad support system (LS3) Field testing [720p] [Video]. Retrieved from https://www.youtube.com/watch?v=gOkXRXZIFxs Batke, K. (2011). 7 types of cyber criminals. Retrieved from http://www.faronics.com/news/blog/7- types-of-cyber-criminals/ Carnegie Cyber Academy. (n.d.). Environmental issues. Retrieved from http://www.carnegiecyberacademy.com/facultyPages/environment/issues.html Concept Draw. (n.d.). Pyramid diagram examples [Online image]. Retrieved from http://www.conceptdraw.com/examples/chart-of-management-information-system-with-diagram Cornerstone On Demand. (2014). The state of workplace productivity report. Retrieved from http://www.cornerstoneondemand.com/resources/research/state-of-workplace-productivity- 2013 FCC. (n.d.). Child’s Internet Protection Act (CIPA). Retrieved from http://www.fcc.gov/guides/childrens-internet-protection-act Greenfield, D. (n.d.). The center for internet and technology addiction. Retrieved from http://virtual-addiction.com/
  • 20. King, J. & Richards, N. (2014). What’s up with big data ethics? Retrieved from http://radar.oreilly.com/2014/03/whats-up-with-big-data-ethics.html Linn, M. (2014). What are the different types of encryption methods? Retrieved from http://www.wisegeek.org/what-are-the-different-types-of-encryption-methods.htm Sassoon, Y. (2012). Transforming snowplow data so that it can be interrogated in BI / OLAP tools like Tableau, Qlikview and Pentaho [Online image]. Retrieved from http://snowplowanalytics.com/blog/2012/12/17/transforming-snowplow-data-so-it-can-be-interrogated- by-olap-tools-like-tableau/ Singh, S. (2014). Companies devise new strategies to keep pace with rapid rise of mobile commerce. Retrieved from http://economictimes.indiatimes.com/industry/services/retail/companies-devise-new-strategies- to-keep-pace-with-rapid-rise-of-mobile-commerce/articleshow/44892422.cms Telemetry Labs. (n.d.). M2 cloud solutions [Online image]. Retrieved from http://www.telemetrylabs.com/ University of Calgary. (n.d.). Identity theft on Ebay [Online image]. Retrieved from http://wiki.ucalgary.ca/page/Courses/Computer_Science/CPSC_203/CPSC_203_2008Winter _L03/CPSC_203_2008WinterL03_TermProjects/T19_Group_3-_Identity_Theft_on_Ebay Williams, B. & Sawyer, S. (2012). Using Information Technology, 10th ed. McGraw-Hill.

Editor's Notes

  1. Introduction (Williams & Sawyer, 2012)
  2. (Williams & Sawyer, 2012)
  3. A hierarchical database model has a tree-like structure with the root record at the top. There is one parent per child and no relationships among children. Network database models have the more complex data relationships that are needed for better performance than a hierarchical database. Relational databases connect data from different files with common elements. Instead of data being organized by location, it is organized by its content. An object-oriented database contains multimedia objects. There are two types of object-oriented databases: hypertext, which contains text links…and a hypermedia database, which may contain links, graphics, sound, and video. According to Williams and Sawyer, multidimensional databases are designed for use with large amounts of data, such as facts, dimensions, or numerical measures, for interactive analysis (2012). (Williams & Sawyer, 2012) (Sassoon, 2012)
  4. Mobile commerce is any business transaction made from a mobile device either through an app or a mobile website (Singh, 2014). (Williams & Sawyer, 2012)
  5. An executive information system (also known as executive support system) is a decision support system for executive level management. Reporting gathers data from internal and external resources. A decision support system is a software tool to aid in the decision making process. A DSS generates business intelligence. A management information system is a set of tools department management uses to transform raw data from TPS reports into useful information that may be used in a decision support system. A transaction processing system records business transactions and provides detailed reports. Image: (Concept Draw, n.d.)
  6. Artificial intelligence is an aggregation of machine technologies that imitate human actions. The fields discussed in Williams & Sawyer are expert systems, natural language processing, intelligent agents, pattern recognition, fuzzy logic, virtual reality, and robotics (2012). An expert system has three parts, the knowledge base that holds rules and facts, the inference engine applies the rules to the facts to generate reasoning and make decisions that are presented by the user interface (Williams & Sawyer, 2012) Natural language processing or NLP is the process of having computers interpret human language, both text and spoken (Williams & Sawyer, 2012). For example, on any Android phone you will find Google Voice Search where the mobile device will recognize the natural language spoken to perform the actions requested. Intelligent agents are autonomous bots that have a specific purpose, such as the online shopping assistant bot or spam bots (Williams & Sawyer, 2012). Pattern recognition is the process of identifying patterns and comparing them to patterns stored in a database (Williams & Sawyer, 2012). Fuzzy logic is a tool to control and model uncertainties (Williams & Sawyer, 2012). Simulation devices are use often in training exercises, such as with crane and forklift operators. (personal experience) The robot in the video to the right is Darpa’s AlphaDog (Arronlee33, 2012).
  7. (King & Richards, 2014)
  8. Introduction (Williams & Sawyer, 2012)
  9. (Williams & Sawyer, 2012)
  10. Williams and Sawyer note that there are four threat categories: errors and accidents, natural hazards, computer crimes, computer criminals (2012). There are many threats, some natural and some of the human error type, but the most concerning issues are cyber (computer) crimes especially identity theft. There are many types of cyber criminals, such as hackers, phishers, hacktivists, and scammers (Batke, 2011). (Williams & Sawyer, 2012)
  11. (Williams & Sawyer, 2012) The four types of encryption are ciphertext, hashing, symmetric (most secure), and asymmetric (Linn, 2014).
  12. Environment: (Carnegie Cyber Academy, n.d.) Mental health: (Greenfield, n.d.) All: (Williams & Sawyer, 2012)
  13. Child protection: (FCC, n.d.) Workplace: (Cornerstone On Demand, 2014)) All: (Williams & Sawyer, 2012)
  14. (Williams & Sawyer, 2012) Image: (Telemetry Labs, n.d.)