The document discusses handling corporate data and information management. It covers objectives like data resource management, DBMS, data warehousing, and data mining. It describes the sources and types of information an organization uses, both formal sources like internal records and external reports, as well as informal sources like conversations. It also discusses database management systems, data models, data warehousing, and data mining - how organizations use these approaches to collect, process, analyze and extract useful information from their data.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
This presentation will discusses about the following topics: Importance of Data Models
Basic Building Blocks
Business Rules
Translating Business Rules into Data Models
Evolution of Data Models
Hierarchical Data Model
Network Data Model
Relational Data Model
Entity Relational Model
Object Model
Summary
Followed by a Quiz
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
This presentation will discusses about the following topics: Importance of Data Models
Basic Building Blocks
Business Rules
Translating Business Rules into Data Models
Evolution of Data Models
Hierarchical Data Model
Network Data Model
Relational Data Model
Entity Relational Model
Object Model
Summary
Followed by a Quiz
This presentation discusses the following topics:
Object Oriented Databases
Object Oriented Data Model(OODM)
Characteristics of Object oriented database
Object, Attributes and Identity
Object oriented methodologies
Benefit of object orientation in programming language
Object oriented model vs Entity Relationship model
Advantages of OODB over RDBMS
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
This book will helps the students who are pursuing Computer Science either B.Sc or B.Tech or Post Graduation. By following this book students are able to learn DBMS easily.
This presentation discusses the following topics:
What is XML?
Syntax of XML Document
DTD (Document Type Definition)
XML Schema
XML Query Language
XML Databases
Oracle JDBC
Introduction To Database Management Systemcpjcollege
Database Management System (DMBS)
• Collection of interrelated data • Set of programs to access the data • DMBS contains information about a particular enterprise • DBMS provides an environment that it both convenient and efficient to use
Smarter Documentation: Shedding Light on the Black Box of Reporting DataKelly Raposo
Developing reports to make sense of project data can be a difficult task. IBM’s reporting tools enable users to report on the data from Rational Team Concert, Rational Quality Manager, and Rational Requirements Composer, but our clients often have trouble determining how to get the right data into the right reports. Through a collaborative effort between our clients and several Rational teams (incl. Support, Development, User Experience and Documentation), we explored the challenges and developed a plan to get all the necessary information into our users’ hands. Using tools to automate documentation of the data models, collect and expose SME knowledge about the product REST APIs, and filter the information based on goals, the team delivered a full set of guidance and reference material in the Information Centres that sheds some light on the black box of data. Ongoing efforts will connect the pieces using linked data, allowing fast and easy exploration of the data relationships.
A Comparative Study of RDBMs and OODBMs in Relation to Security of Datainscit2006
Mansaf Alam and Siri Krishan Wasan
Department of Computer Sciences, Jamia Millia Islamia, New Delhi, India.
Department of Mathematics, Jamia Millia Islamia, New Delhi, India.
This presentation discusses the following topics:
Object Oriented Databases
Object Oriented Data Model(OODM)
Characteristics of Object oriented database
Object, Attributes and Identity
Object oriented methodologies
Benefit of object orientation in programming language
Object oriented model vs Entity Relationship model
Advantages of OODB over RDBMS
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
This book will helps the students who are pursuing Computer Science either B.Sc or B.Tech or Post Graduation. By following this book students are able to learn DBMS easily.
This presentation discusses the following topics:
What is XML?
Syntax of XML Document
DTD (Document Type Definition)
XML Schema
XML Query Language
XML Databases
Oracle JDBC
Introduction To Database Management Systemcpjcollege
Database Management System (DMBS)
• Collection of interrelated data • Set of programs to access the data • DMBS contains information about a particular enterprise • DBMS provides an environment that it both convenient and efficient to use
Smarter Documentation: Shedding Light on the Black Box of Reporting DataKelly Raposo
Developing reports to make sense of project data can be a difficult task. IBM’s reporting tools enable users to report on the data from Rational Team Concert, Rational Quality Manager, and Rational Requirements Composer, but our clients often have trouble determining how to get the right data into the right reports. Through a collaborative effort between our clients and several Rational teams (incl. Support, Development, User Experience and Documentation), we explored the challenges and developed a plan to get all the necessary information into our users’ hands. Using tools to automate documentation of the data models, collect and expose SME knowledge about the product REST APIs, and filter the information based on goals, the team delivered a full set of guidance and reference material in the Information Centres that sheds some light on the black box of data. Ongoing efforts will connect the pieces using linked data, allowing fast and easy exploration of the data relationships.
A Comparative Study of RDBMs and OODBMs in Relation to Security of Datainscit2006
Mansaf Alam and Siri Krishan Wasan
Department of Computer Sciences, Jamia Millia Islamia, New Delhi, India.
Department of Mathematics, Jamia Millia Islamia, New Delhi, India.
Opendatabay - Open Data Marketplace.pptxOpendatabay
Opendatabay.com unlocks the power of data for everyone. Open Data Marketplace fosters a collaborative hub for data enthusiasts to explore, share, and contribute to a vast collection of datasets.
First ever open hub for data enthusiasts to collaborate and innovate. A platform to explore, share, and contribute to a vast collection of datasets. Through robust quality control and innovative technologies like blockchain verification, opendatabay ensures the authenticity and reliability of datasets, empowering users to make data-driven decisions with confidence. Leverage cutting-edge AI technologies to enhance the data exploration, analysis, and discovery experience.
From intelligent search and recommendations to automated data productisation and quotation, Opendatabay AI-driven features streamline the data workflow. Finding the data you need shouldn't be a complex. Opendatabay simplifies the data acquisition process with an intuitive interface and robust search tools. Effortlessly explore, discover, and access the data you need, allowing you to focus on extracting valuable insights. Opendatabay breaks new ground with a dedicated, AI-generated, synthetic datasets.
Leverage these privacy-preserving datasets for training and testing AI models without compromising sensitive information. Opendatabay prioritizes transparency by providing detailed metadata, provenance information, and usage guidelines for each dataset, ensuring users have a comprehensive understanding of the data they're working with. By leveraging a powerful combination of distributed ledger technology and rigorous third-party audits Opendatabay ensures the authenticity and reliability of every dataset. Security is at the core of Opendatabay. Marketplace implements stringent security measures, including encryption, access controls, and regular vulnerability assessments, to safeguard your data and protect your privacy.
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
As Europe's leading economic powerhouse and the fourth-largest hashtag#economy globally, Germany stands at the forefront of innovation and industrial might. Renowned for its precision engineering and high-tech sectors, Germany's economic structure is heavily supported by a robust service industry, accounting for approximately 68% of its GDP. This economic clout and strategic geopolitical stance position Germany as a focal point in the global cyber threat landscape.
In the face of escalating global tensions, particularly those emanating from geopolitical disputes with nations like hashtag#Russia and hashtag#China, hashtag#Germany has witnessed a significant uptick in targeted cyber operations. Our analysis indicates a marked increase in hashtag#cyberattack sophistication aimed at critical infrastructure and key industrial sectors. These attacks range from ransomware campaigns to hashtag#AdvancedPersistentThreats (hashtag#APTs), threatening national security and business integrity.
🔑 Key findings include:
🔍 Increased frequency and complexity of cyber threats.
🔍 Escalation of state-sponsored and criminally motivated cyber operations.
🔍 Active dark web exchanges of malicious tools and tactics.
Our comprehensive report delves into these challenges, using a blend of open-source and proprietary data collection techniques. By monitoring activity on critical networks and analyzing attack patterns, our team provides a detailed overview of the threats facing German entities.
This report aims to equip stakeholders across public and private sectors with the knowledge to enhance their defensive strategies, reduce exposure to cyber risks, and reinforce Germany's resilience against cyber threats.
1. UNIT III
Handling the Corporate Data
By Dr. Dhobale J V
Associate Professor
School of Engineering & Technology
RNB Global University, Bikaner
RNB Global University, Bikaner. 1Course Code - 11010700
2. Objectives
Data Resource Management.
DBMS.
Types of DBMS.
Data Warehousing.
Data Mining.
Information Quality.
Data/Information security.
IT Audit.
IT Services contact Management.
Risk Analysis.
2RNB Global University, Bikaner.Course Code - 11010700
3. Sources and Types of Information
We receive and gather information from a
huge range of sources.
In business, types of information includes:
Customer and Employee information.
Email, mail & faxes.
Charts and graphs
Monthly financial reports.
Signs directing customers to a particular location.
Procedures.
Pictures & diagrams
Industry specific.
Demographic information 3RNB Global University, Bikaner.Course Code - 11010700
4. Sources and Types of Information
Three basic types of information:
1. Strategic Information
2. Tactical Information
3. Operational Information
4RNB Global University, Bikaner.Course Code - 11010700
5. Sources and Types of Information
Information comes from a variety of sources,
formal and informal:
1. Formal Sources:
1. Internal: – Computer System, Staff Record,
Accounting Records, Annual Reports, Company
Reports, Business documents, Planning
documents.
2. External: - Professional Journals, Books, Surveys,
Industry and Government reports.
5RNB Global University, Bikaner.Course Code - 11010700
6. Sources and Types of Information
2. Informal Sources: Includes conversation with
colleagues at lunch or from friends or other
associates external to your company.
With Customer Contact Centers:
Automatic Call Distribution reports.
Other System reports.
Call monitoring checklists.
Customers.
Emails.
HR Department
Budgets.
Marketing Department 6RNB Global University, Bikaner.Course Code - 11010700
7. Database Management Systems (DBMS)
Information form these sources needs to collect and
process for further processing.
Organizations uses DBMS along with Data
Warehousing and Data Mining philosophies for
these.
7RNB Global University, Bikaner.Course Code - 11010700
8. Database Management Systems (DBMS)
Database is a collection of related data
and data is a collection of facts and
figures that can be processed to
produce information.
A database management
system stores data in such a way that it
becomes easier to retrieve, manipulate,
and produce information.
8RNB Global University, Bikaner.Course Code - 11010700
9. DBMS Characteristics
1. Real World Entity.
2. Relation based Tables.
3. Isolation of Data and Applications.
4. Less Redundancy.
5. Consistency.
6. Query Language.
7. Multiuser and Concurrent Access.
8. Multiple Views.
9. Security. 9RNB Global University, Bikaner.Course Code - 11010700
11. DBMS Users
1. Administrators: Administrators
maintain the DBMS and are responsible
for administrating the database.
2. Designers: Designers are the group of
people who actually work on the
designing part of the database.
3. End Users: End users are those who
actually reap the benefits of having a
DBMS.
11RNB Global University, Bikaner.Course Code - 11010700
12. DBMS Architecture
The design of a DBMS depends on its
architecture. It can be centralized or
decentralized or hierarchical.
The architecture of a DBMS can be
seen as either single tier or multi-tier.
An n-tier architecture divides the whole
system into related but
independent n modules, which can be
independently modified, altered,
changed, or replaced.
12RNB Global University, Bikaner.Course Code - 11010700
14. DBMS Architecture
Database (Data) Tier: At this tier, the
database resides along with its query
processing languages. We also have
the relations that define the data and
their constraints at this level.
Application (Middle) Tier: At this tier
reside the application server and the
programs that access the database.
For a user, this application tier presents
an abstracted view of the database.
14RNB Global University, Bikaner.Course Code - 11010700
15. DBMS Architecture
The application layer sits in the middle
and acts as a mediator between the
end-user and the database.
User (Presentation) Tier: End-users
operate on this tier and they know
nothing about any existence of the
database beyond this layer.
At this layer, multiple views of the
database can be provided by the
application.
15RNB Global University, Bikaner.Course Code - 11010700
16. Data Models
Data models define how the logical
structure of a database is modeled.
Data Models are fundamental entities to
introduce abstraction in a DBMS.
Data models define how data is
connected to each other and how they
are processed and stored inside the
system.
16RNB Global University, Bikaner.Course Code - 11010700
19. Data Models (E-R Model)
1. Entity-Relationship Model: Entity-
Relationship (ER) Model is based on
the notion of real-world entities and
relationships among them.
While formulating real-world scenario
into the database model, the ER Model
creates entity set, relationship set,
general attributes and constraints.
19RNB Global University, Bikaner.Course Code - 11010700
20. Data Models (E-R Model)
ER Model is based on −
Entities and their attributes.
Relationships among entities.
20RNB Global University, Bikaner.Course Code - 11010700
21. Data Models (E-R Model)
Entity − An entity in an ER Model is a
real-world entity having properties
called attributes.
Every attribute is defined by its set of
values called domain.
For example, in a school database, a
student is considered as an entity.
Student has various attributes like
name, age, class, etc.
21RNB Global University, Bikaner.Course Code - 11010700
22. Data Models (E-R Model)
Relationship − The logical association
among entities is called relationship.
Relationships are mapped with entities
in various ways. Mapping cardinalities
define the number of association
between two entities.
Mapping cardinalities − one to one; one
to many; many to one; many to many.
22RNB Global University, Bikaner.Course Code - 11010700
23. Data Models (Relational Model)
2. Relational Model: The most popular
data model in DBMS is the Relational
Model.
It is more scientific a model than others.
This model is based on first-order
predicate logic and defines a table as
an n-arry relation.
23RNB Global University, Bikaner.Course Code - 11010700
25. Data Models (Relational Model)
The main highlights of this model are −
Data is stored in tables called relations.
Relations can be normalized.
In normalized relations, values saved are
atomic values.
Each row in a relation contains a unique
value.
Each column in a relation contains values
from a same domain.
25RNB Global University, Bikaner.Course Code - 11010700
26. Data Schema & Instances
A database schema is the skeleton
structure that represents the logical view
of the entire database. It defines how the
data is organized and how the relations
among them are associated.
A database instance is a state of
operational database with data at any
given time.
26RNB Global University, Bikaner.Course Code - 11010700
27. Traditional File System and DBMS
Characteristics of Traditional File
System:
1. It is a group of files storing data of an
organization.
2. Each file is independent from one another.
3. Each file is called a flat file.
4. Each file contained and processed
information for one specific function, such
as accounting or inventory.
27RNB Global University, Bikaner.Course Code - 11010700
28. Traditional File System and DBMS
Characteristics of Traditional File
System:
5. As systems became more complex, file
processing systems offered little flexibility,
presented many limitations, and were
difficult to maintain.
6. Files are designed by using programs
written in programming languages such as
COBOL, C, C++.
28RNB Global University, Bikaner.Course Code - 11010700
29. Traditional File System and DBMS
Limitations of Traditional File System:
1. Separated and Isolated Data.
2. Duplication of data.
3. Data Dependence.
4. Difficulty in representing data from the
user's view.
5. Data Inflexibility.
6. Incompatible file formats.
7. Data Security.
8. Concurrency problems.
29RNB Global University, Bikaner.Course Code - 11010700
30. Data Warehouse
The term "Data Warehouse" was first
coined by Bill Inmon in 1990.
According to Inmon, a data warehouse
is a subject oriented, integrated, time-
variant, and non-volatile collection of
data.
This data helps analysts to take
informed decisions in an organization.
30RNB Global University, Bikaner.Course Code - 11010700
31. Data Warehouse
A data warehouses provides us
generalized and consolidated data in
multidimensional view.
Along with generalized and
consolidated view of data, a data
warehouses also provides us Online
Analytical Processing (OLAP) tools.
These tools help us in interactive and
effective analysis of data in a
multidimensional space.
31RNB Global University, Bikaner.Course Code - 11010700
32. Data Warehouse
Data mining functions such as
association, clustering, classification,
prediction can be integrated with OLAP
operations to enhance the interactive
mining of knowledge at multiple level of
abstraction.
A data warehouse is a database, which
is kept separate from the organization's
operational databas..
32RNB Global University, Bikaner.Course Code - 11010700
33. Data Warehouse
There is no frequent updating done in a
data warehouse.
It possesses consolidated historical
data, which helps the organization to
analyze its business.
A data warehouse helps executives to
organize, understand, and use their
data to take strategic decisions.
33RNB Global University, Bikaner.Course Code - 11010700
34. Data Warehouse
Data warehouse systems help in the
integration of diversity of application
systems.
A data warehouse system helps in
consolidated historical data analysis.
34RNB Global University, Bikaner.Course Code - 11010700
35. Data Warehouse - Features
1. Subject Oriented.
2. Integrated.
3. Time Variant.
4. Non-volatile
35RNB Global University, Bikaner.Course Code - 11010700
37. Types of Data Warehouse
1. Information Processing: A data
warehouse allows to process the data
stored in it. The data can be processed
by means of querying, basic statistical
analysis, reporting using crosstabs,
tables, charts, or graphs.
37RNB Global University, Bikaner.Course Code - 11010700
38. Types of Data Warehouse
2. Analytical Processing : A data
warehouse supports analytical
processing of the information stored in
it. The data can be analyzed by means
of basic OLAP operations, including
slice-and-dice, drill down, drill up, and
pivoting.
.
38RNB Global University, Bikaner.Course Code - 11010700
39. Types of Data Warehouse
3. Data Mining: Data mining supports
knowledge discovery by finding hidden
patterns and associations, constructing
analytical models, performing
classification and prediction.
These mining results can be presented
using the visualization tools.
. 39RNB Global University, Bikaner.Course Code - 11010700
40. Data Warehousing
Data warehousing is the process of
constructing and using a data
warehouse.
A data warehouse is constructed by
integrating data from multiple
heterogeneous sources that support
analytical reporting, structured and/or ad
hoc queries, and decision making.
Data warehousing involves data
cleaning, data integration, and data
consolidations. 40RNB Global University, Bikaner.
41. Data Warehousing
There are decision support technologies
that help utilize the data available in a
data warehouse.
These technologies help executives to
use the warehouse quickly and
effectively.
They can gather data, analyze it, and
take decisions based on the information
present in the warehouse.
41RNB Global University, Bikaner.Course Code - 11010700
42. Functions of Data Warehouse
1. Data Extraction.
2. Data Cleaning.
3. Data Transformation.
4. Data Loading.
5. Refreshing.
42RNB Global University, Bikaner.Course Code - 11010700
43. Process Flow in Data Warehouse
There are four major processes that
contribute to a data warehouse:
1. Extract and load the data.
2. Cleaning and transforming the data.
3. Backup and archive the data.
4. Managing queries and directing them to
the appropriate data sources.
. 43RNB Global University, Bikaner.Course Code - 11010700
44. Data Mining
Data Mining is defined as extracting
information from huge sets of data.
The information or knowledge extracted
so can be used for any of the following
applications:
Market Analysis
Fraud Detection
Customer Retention
Production Control
Science Exploration
44RNB Global University, Bikaner.Course Code - 11010700
46. Data Mining - Applications
Corporate Analysis and Risk Management:
1. Finance Planning and Asset Evaluation
2. Resource Planning
3. Competition
46RNB Global University, Bikaner.Course Code - 11010700
47. Data Mining - Applications
Fraud Detection:
Data mining is also used in the fields of credit
card services and telecommunication to
detect frauds
47RNB Global University, Bikaner.Course Code - 11010700
48. IT Service Contract Management
Bid Processing: is an offer
(often competitive) to set a price by an
individual or business for a product or
service or a demand that something be
done
RFI, RFQ, RFT and RFP, These
processes have steadily grown in
popularity in procurement and purchasing,
especially amongst larger buying
organisations.
48RNB Global University, Bikaner.Course Code - 11010700
49. IT Service Contract Management
RFI – Request for Information
An open enquiry that spans the market
seeking broad data and understanding.
RFQ – Request for Quotation
An opportunity for potential suppliers
to competitively cost the final chosen
solution(s).
49RNB Global University, Bikaner.Course Code - 11010700
50. IT Service Contract Management
RFT – Request for Tender
An opportunity for potential suppliers to
submit an offer to supply goods or services
against a detailed tender.
RFP – Request for Proposal
Sometimes based on a prior RFI; a
business requirements-based request for
specific solutions to the sourcing
problem.
50RNB Global University, Bikaner.Course Code - 11010700
51. IT Audit
In general an IT audit is the process of
examining information systems to ensure
they are storing, processing, controlling
and reporting organizational data
according to internal and external
procedures and regulations.
51RNB Global University, Bikaner.Course Code - 11010700
52. IT Audit
The results of an IT audit can help an
organization learn about exposure to
different threats, highlight areas of non-
compliance with industry and government
standards and regulations, and can help
organizations improve efficiency and
strategic planning by identifying redundant
or inefficient processes.
In general IT Auditors tend to either work
as “external auditors” or “internal auditors”.
52RNB Global University, Bikaner.Course Code - 11010700
53. Role of IT Auditors
1. Planning the Audit.
2. Interviews/Research.
3. System Interrogation.
4. Reporting.
53RNB Global University, Bikaner.Course Code - 11010700
54. SLA
A service-level agreement (SLA) is
defined as an official commitment that
prevails between a service provider and
the customer.
Particular aspects of the service – quality,
availability, responsibilities – are agreed
between the service provider and the
service user.
54RNB Global University, Bikaner.Course Code - 11010700
55. SLA
The most common component of SLA is
that the services should be provided to
the customer as agreed upon in the
contract.
Service level agreements are also defined
at different levels:
55RNB Global University, Bikaner.Course Code - 11010700
57. SLA - Components
1. Type of service to be provided.
2. The service's desired performance level,
especially its reliability and
responsiveness.
3. The steps for reporting issues with the
service.
4. Response and issue resolution time-
frame.
5. Monitoring process and service level
reporting.
6. Repercussions for service provider not
meeting its commitment.
57RNB Global University, Bikaner.Course Code - 11010700
58. Arbitration clause
An arbitration clause is a clause in
a contract that requires the parties to
resolve their disputes through
an arbitration process.
Although such a clause may or may not
specify that arbitration occur within a
specific jurisdiction, it always binds the
parties to a type of resolution outside of
the courts, and is therefore considered a
kind of forum selection clause.
58RNB Global University, Bikaner.Course Code - 11010700
59. Exit / Escape clause
An escape clause is any clause, term, or
condition in a contract that allows a party
to that contract to avoid having to perform
the contract.
If an agreement was drawn up for the sale
of a house, for example, the purchaser
could include some kind of escape clause
in the contract, which will allow him to
"escape" from the contract without being
liable for breach of contract.
59RNB Global University, Bikaner.Course Code - 11010700
60. Information Quality
Information is a vital resource for the success of any
organization.
Future of an organization lies in using and
disseminating information wisely.
Good quality information placed in right context in right
time tells us about opportunities and problems well in
advance.
According to Wang and Strong, following are the
dimensions or elements of Information Quality.
60RNB Global University, Bikaner.Course Code - 11010700
61. Information Quality
Intrinsic: Accuracy, Objectivity, Believability, Reputation.
Contextual: Relevancy, Value-Added, Timeliness,
Completeness, Amount of information.
Representational: Interpretability, Format, Coherence,
Compatibility.
Accessibility: Accessibility, Access security.
61RNB Global University, Bikaner.Course Code - 11010700
62. Information Quality
Most essential characteristic features for information
quality are:
1. Reliability - It should be verifiable and dependable.
2. Timely - It must be current and it must reach the users
well in time, so that important decisions can be made in
time.
3. Relevant - It should be current and valid information and
it should reduce uncertainties.
4. Accurate - It should be free of errors and mistakes, true,
and not deceptive.
62RNB Global University, Bikaner.Course Code - 11010700
63. Information Quality
5. Sufficient - It should be adequate in quantity, so that
decisions can be made on its basis.
6. Unambiguous - It should be expressed in clear terms.
In other words, it should be comprehensive.
7. Complete - It should meet all the needs in the current
context.
63RNB Global University, Bikaner.Course Code - 11010700
64. Information Quality
6. Unbiased - It should be impartial, free from any bias. In
other words, it should have integrity.
7. Explicit - It should not need any further explanation.
8. Comparable - It should be of uniform collection,
analysis, content, and format.
9. Reproducible - It could be used by documented
methods on the same data set to achieve a consistent
result.
64RNB Global University, Bikaner.Course Code - 11010700
65. Information Security
Three basic security concepts important to
information on the internet are
confidentiality, integrity, and availability.
Concepts relating to the people who use
that information are authentication,
authorization, and nonrepudiation.
65RNB Global University, Bikaner.Course Code - 11010700
66. Review
Data Resource Management.
DBMS.
Types of DBMS.
Data Warehousing.
Data Mining.
Information Quality.
Data/Information security.
IT Audit.
IT Services contact Management.
Risk Analysis.
66RNB Global University, Bikaner.Course Code - 11010700