Week 4 Lecture 1 - Databases and Data Warehouses
Management of Information Systems
Databases and Data Warehouses
The impact of database technology on how business is conducted today cannot be overemphasized. This technology has enabled an information industry with comprehensive influences on businesses and individuals. Databases store data that populate web pages and other interactive networked technologies. Search engines, e-commerce, and social media would not exist without databases. With database support, larger tasks can be accomplished by fewer people.
Effective data management is the principal benefit of IT. Database management systems (DBMSs) enable the fast creation of databases and manipulation of data on an aggregate basis or down to the smallest detail for business purposes. Databases support most web pages and other interactive networked technology. DBMSs support target marketing, financial management, decision-making, distribution of goods and services, customer service, and other activities. It is imperative, in the age of data mining, and “big data,” for knowledge workers to understand how databases work and how data are used operationally and strategically in business management.
Database analysis and management skills are mandatory in the marketplace. IT professionals develop and implement databases. However, data is essential to the non-technical professional who uses the data for decision making regarding accounting, marketing, logistics, senior management, and other functional areas.
The relational database model is common. However, data can be organized in other ways. “Big Data” prompted the use of other database models. “NoSQL” database models are non-relational and do not require SQL to retrieve data. NoSQL databases can be structured by object, document, key-value, graph, column, and other possibilities
In relational databases, a primary key is a field in a table that contains a unique value used to differentiate between rows of data. The primary key is usually a number, or a computer generated globally unique identifier (GUID). Sometimes a composite key is used differentiate between table rows. A composite key is a combination of the values in two or more fields in a table that when combined are unique in the table and serve as a primary key. A foreign key is used to link data between two tables. A foreign key in a table is the primary key of a related table.
Databases contain different types of fields. Some types are, number, text, image, video, audio, geographical coordinates, and others. If a number is not used for mathematical calculations, it is best to assign a text type to it in a database to avoid the need to convert it from a number to a string after retrieval.
SQL is a popular query language used to retrieve data from relational databases. SQL can be used to retrieve data from more than one table by use of a “join.” A join query retrieves data from rows in two or more tables, where the value of the foreign ...
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
1. Week 4 Lecture 1 - Databases and Data Warehouses
Management of Information Systems
Databases and Data Warehouses
The impact of database technology on how business is
conducted today cannot be overemphasized. This technology has
enabled an information industry with comprehensive influences
on businesses and individuals. Databases store data that
populate web pages and other interactive networked
technologies. Search engines, e-commerce, and social media
would not exist without databases. With database support,
larger tasks can be accomplished by fewer people.
Effective data management is the principal benefit of IT.
Database management systems (DBMSs) enable the fast creation
of databases and manipulation of data on an aggregate basis or
down to the smallest detail for business purposes. Databases
support most web pages and other interactive networked
technology. DBMSs support target marketing, financial
management, decision-making, distribution of goods and
services, customer service, and other activities. It is imperative,
in the age of data mining, and “big data,” for knowledge
workers to understand how databases work and how data are
used operationally and strategically in business management.
Database analysis and management skills are mandatory in the
marketplace. IT professionals develop and implement databases.
However, data is essential to the non-technical professional who
uses the data for decision making regarding accounting,
marketing, logistics, senior management, and other functional
areas.
The relational database model is common. However, data can be
organized in other ways. “Big Data” prompted the use of other
database models. “NoSQL” database models are non-relational
and do not require SQL to retrieve data. NoSQL databases can
be structured by object, document, key-value, graph, column,
2. and other possibilities
In relational databases, a primary key is a field in a table that
contains a unique value used to differentiate between rows of
data. The primary key is usually a number, or a computer
generated globally unique identifier (GUID). Sometimes a
composite key is used differentiate between table rows. A
composite key is a combination of the values in two or more
fields in a table that when combined are unique in the table and
serve as a primary key. A foreign key is used to link data
between two tables. A foreign key in a table is the primary key
of a related table.
Databases contain different types of fields. Some types are,
number, text, image, video, audio, geographical coordinates,
and others. If a number is not used for mathematical
calculations, it is best to assign a text type to it in a database to
avoid the need to convert it from a number to a string after
retrieval.
SQL is a popular query language used to retrieve data from
relational databases. SQL can be used to retrieve data from
more than one table by use of a “join.” A join query retrieves
data from rows in two or more tables, where the value of the
foreign key in one table is equal to the value of the primary key
in another table.
Storage of large quantities of data can be achieved through data
warehousing. Large organization use data warehouses for
management decision making and data mining. Data marts are
smaller segments of data warehouses set-up to support different
functional business areas.
Week 4 Lecture 2 - The Web-enabled Enterprise
Management of Information Systems
The Web-enabled Enterprise
Today, the Internet has developed into an ordinary resource.
However, novel Web technologies are appearing every day. New
business technologies, services, models, designs, and
functionality are visible on the Web as competition and business
3. needs change. A company’s public view is displayed on the
Web. A website’s design, functionality, and contents represent a
company’s personality and style of doing business. In dollar
terms, a substantially larger amount of business-to-business
transactions takes place over the Internet than business-to-
consumer transactions.
The Web provides a richness of information, entertainment, and
the ability to chat and network. However, the Web as an asset to
business entities is one of its greatest potentials. As disruptive
as the Web has been, the sweeping adoption of mobile services
and devices has made the fast pace of web growth look like a
crawl in comparison.
View the video clip about the history of the Internet. The
foremost reason any one organization can not totally control the
Internet is that the U.S. Department of Defense, which funded
the network’s development, required that the destruction of any
individual computer could not take down the entire network.
The internet consists of over 500 million servers in different
countries. Far-reaching influence would be required by an entity
to control the Internet. Many telecommunications companies in
different countries would have to be swayed for a single entity
to control the Internet.
permits running applications on the Web in the same manner as
if the applications were installed on local computers. Software
defines intranets and extranets, not hardware. LANs can become
intranets. HTML can be used as an authoring tool for presenting
a presentation on a local Web browser. None technical people
can now use Web authoring tools to create websites using
hosting services. Businesses are now moving their websites to
host services. Web 2.0
WAL_SOCW6051_09_A_EN-CC.mp4
6. collect data, such as:
People,
Events,
or Products
A character is the smallest piece of data
A single letter or a digit
A field is a single piece of information about entity
A record is a collection of related fields
A file or table is a collection of related records
Database fields can hold images, sounds, video clips, etc.
A field name allows easy access to the data
Database management system (DBMS) is a program used to:
Build databases,
Populate a database with data,
And manipulate data in a database
Some data sources are:
Transaction processing systems (TPSs),
Source data input devices, such as scanners and RFID,
Web and mobile activities,
Purchased external data,
And Nonoperational transaction data from social media
A query is a message to the database requesting data from
specific records and/or fields
A database must be properly secured
Not everyone should have access to all data
Users should have different views of the database, based on the
data they are allowed to see
A database administrator (DBA) is the person responsible for
managing the database and setting user limits for access to data
in the database
Businesses strive to maintain continuous and uninterrupted
operations to serve their stakeholders, and preserve their
financial well-being
9. A relational database operation creates a temporary subset of a
data from a table or tables
Operations are used to select and retrieve data from data tables
Three of the most important relational database operations are
Select, which selects records based on conditions
Project, which selects certain columns from a table
And, join, which combines data from multiple tables into a
temporary dataset
A Schema describes the structure of the database, including:
The names of tables and fields,
Identification of primary keys,
And Relationships between tables
A Data dictionary is a repository of that stores the meanings of
fields in the tables of databases. Members of organization can
view a data dictionary to understand the purpose of a field.
Metadata is additional details about the data
Metadata can include the source of the data,
Tables related to the data,
Field and index information,
Programs and processes that use the data,
And data population rules, such as what is inserted, or updated,
and how often
An entity relationship diagram (ERD) is a graphical
representation of all entity relationships
Databases must be carefully planned and designed to meet
business goals
Data modeling is analyzing an organization business entities,
processes, and relationships and modeling them into tables and
fields of a database.
Data modeling is proactive process that develops a conceptual
blueprint of the database
13. Web page. It determines look and location of content on a
webpage.
Extensible Markup Language (XML) enables creation of various
data types. It conveys the meaning or content of data
XHTML is a combination of XML and HTML. It uses opening
and closing tags to control the format
HTML5 is the newest version of HTML/XML
File Transfer Protocol (FTP) transmits whole digital files
FTP facilitates downloads from websites
Can transfer most types of files,
And can be used to place files on a server for shared use,
Blog is the contraction of “web log”
Blogs invite visitors to post opinions and art
Blogs focus on a topic or set of topics
Trackback is a tool that notifies bloggers when their posts have
been mentioned elsewhere on the web
Blogs are often used by businesses
The importance of blogs to commercial organizations is to find
out what blog participants think and say about the organization
Wiki is derived from Hawaiian, meaning “quick.” It is a web
application that enables users to add to and edit the contents of
web pages
All the software required to edit the web pages is embedded in
the pages themselves
Wikipedia is a popular online encyclopedia
Wiki technology is a popular ingredient in groupware , software
used for collaboration
A Podcast is a published audio or video recording on the web
for download
Podcast are usually on a subscription basis
Some uses of podcast are:
“Time-shifted” broadcast of radio station programs for later
listening,
14. Audio tours in museums,
Lectures in distance learning courses,
Apple’s iTunes products and services,
Variety of content,
And many podcast media files are free
A Massively open online course, a (MOOC), is a new education
delivery approach that combines traditional course materials
with Web-enabled interactive forums for educators and students.
Instant messaging (IM) is “real-time” messaging that enables
chatting online through mobile and traditional devices. IM
enable chat room communication within a group
Examples of software applications with expanded
communication tools are
Skype,
ooVoo,
, and Wiggio
Some free applications for IM are
AIM: AOL instant Messenger,
Yahoo! Messenger,
MSN Messenger,
And ICQ,
Business uses include sales and support.
A Cookie is a small file that stores information about a web site
visitor on the visitor’s computer
Cookies can records the surfer’s ID,
Store a surfer’s preferences,
provide convenience to consumers,
Can be temporary (single session) or permanent,
And have potential for intrusion into surfer privacy
Clickstream tracking tracks a surfer’s clicking activities
Spyware traces and reports online behavior
Proprietary technology is intellectual property of the
17. Business-to-consumer (B2C) is trading with the general public
E-tailing is online retailing to consumers, it extends brick-and-
mortar businesses’ “storefront”
Pure play is retailers that operate only online
Fulfillment activities are picking, packing, shipping
Consumer profiling is knowing customers better by gathering
information about their online activities. Some consider this a
violation of privacy
Many online businesses offer affiliate programs to website
owners. A Link to the e-tailer is placed on the website
Affiliate compensation can be Pay per sale, pay per click, or
pay per lead
Coopetition is a step beyond affiliates when competitors are
featured at the same site for example, Amazon.com
Coopetition attracts more shoppers to the site
Fees are obtained from affiliated companies
Mobile advertising is growing due to smartphone and network
adoption
Auction sites are a hub for consumers to buy and sell, for
example eBay
Reverse auction is a name-your-own-price auction for example,
Priceline
Content providers offer information such as news, research
results, statistics, etc., or artistic work (music, pictures, and
video clips)
Electronic bill presentment and payment (EBPP) provides
online bills and payment options for customers
Phishing is a type of fraud involving a fake web site
Extra-organizational workforce is labor from a larger pool that
companies utilize.
Crowdsourcing is a process for outsourcing a variety of tasks to
a distributed group of people, both online or offline
Mobile commerce (or m-commerce) is business conducted on
mobile devices
22. Personalize the service. CRM software and web page
customization software can be combined to:
Personalize web pages shown to a customer
Allow the customer to select the type of e-mail content desired
Respect visitor privacy by offering opt-in rather than opt-out
Allow the customer to tailor products to be purchased
Shorten the business cycle. Customers like saving time via web
business
Fulfillment is a major challenge for businesses
Activities after a customer places order are important.
Fast shipping is desired because:
It produces higher customer satisfaction
And, the business will collect payments faster
The entire fulfillment process can be outsourced to fulfillment
organizations such as:
UPS’s e-Logistics
FedEx’s Supply Chain Services
Let customers help themselves. Self-service is a concept that
uses the customer’s ability to determine the timing and services
of their consumer needs through a website
Self-service saves labor, and encourages customer loyalty
E-mail messages sent to customers with information about
orders and how to track them
Online FAQs allow customers to find answers to common
questions
Be proactive and De-commoditize. Prompt e-mail replies
expected
Proactive alerts are expected for changes in orders or services,
or product recalls
Automatic reordering features are desirable
Businesses must take initiatives to de-commoditize products
A commodity is a product sold at roughly the same price by
many vendors (no differentiation)
24. A database management system (DBMS) is a tool used to
construct databases
Relational and object-oriented database models have different
advantages
Keys are used to form links among entities
Primary keys are used to uniquely identify records in a table
Structured Query Language (SQL) is an international standard
for querying databases
Database designer must design a schema to construct a database
Database designers conduct data modeling and create entity
relationship diagrams to plan databases
Many databases are linked to Web
Data warehouses contain huge collections of historical
transaction data
Data stored in warehouses require extraction, transformation,
and loading (ETL)
Invasion of privacy is exacerbated by database technology
Big Data is the collection and storage of ever-more detailed
quantities of data
Some industries have changed drastically due to web
technologies
HTTP is an Internet standard controlling web server addresses
HTTPS is a secure version of HTTP
XML is a standard for description of data
Blogs enable people to create discussion Web pages
Cookies help websites personalize the visitor’s experience
Many web technologies are proprietary
A business can maintain its own web server or use a web
hosting service
Organizations should consider several factors when selecting a
web host
25. Web-enabled commerce is classified into B2B and B2C
B2B trading relies on electronic data interchange (EDI) and
XML
Mobile commerce needs to be considered in any online business
strategy
Online businesses must adhere to several factors to be
successful
Spam and spyware are online annoyances
Phishing is a pervasive fraud crime