SlideShare a Scribd company logo
Databases & 
Challenges of a Digital Age 
WEEK 7 PRESENTATION 
WENDY LI LE 
ITCC121 
OCTOBER 19, 2014 
PROFESSOR FELIX AGALABA
A database is a collection of interrelated data, logically 
organized to be easily accessed and managed. 
Databases are used for many purposes of storing 
information, such as student’s names in a university 
database or purchasing habits of customers in a retail 
database. 
Databases are used by advertising and marketing 
companies, retailers, and even our government. All 
types of agencies collectively gathering information to 
use for their specific purpose. 
8.1-8.8
MANAGING FILES 
BASIC CONCEPTS 
Data Storage Hierarchy 
File (Table) a collection of records [Top of the hierarchy] 
Record (Row) a collection of fields 
Field (Column) each field has a field name and the type of field 
Byte A character, such as a letter, number, or symbol 
Bit Unit of data represented by either a 0 (off) or a 1 (on) 
• Key field – the primary identifier of a record. A key 
field makes the record searchable, therefore must 
be unique
DATABASE MANAGEMENT SYSTEMS (DBMS) 
A DBMS is software that enables users 
to interact with the database to create, 
modify, or delete data. 
• Three components of a DBMS: 
• Data dictionary (repository) 
• DBMS utilities – programs that enable 
maintenance of the database 
• Report generator
DATABASE MODELS 
• Hierarchical 
• Network 
• Relational 
• Object-oriented 
• Multidimensional 
Example of a multidimensional database
DATA MINING 
• The process of analyzing 
large amounts of data to 
discover patterns that 
could describe past 
trends or predict future 
situations
DATABASES AND THE DIGITAL ECONOMY 
E-BUSINESS & E-COMMERCE 
B2B 
4 main 
types of 
ecommerce 
B2C 
C2C 
Mobile 
commerce
INFORMATION SYSTEMS IN ORGANIZATIONS 
USING DATABASES TO HELP MAKE DECISIONS
ARTIFICIAL INTELLIGENCE (AI) 
• Some fields of AI: 
• Expert systems 
• Natural language processing 
• Intelligent agents 
• Pattern recognition 
• Fuzzy logic 
• Virtual reality & simulation 
• Robotics 
Darpa – AlphaDog LS3 Robotic military dog 
Shopping Bot: 
PriceGrabber.com
THE ETHICS OF USING DATABASES 
CONCERNS ABOUT PRIVACY & IDENTITY THEFT 
Big Data is a term most people know. It is the gathering of massive amounts of 
information on internet consumers by corporations or companies. The information 
collected is stored in databases, which are then analyzed to, for example, predict the 
purchasing habits of a specific customer. 
The general concern is privacy so they do not worry about identity theft and the idea 
that consumers want from companies is complete transparency. Let them know when 
data will be collected, what will be collected, who will have it, and how it will be used, 
then give them a chance to opt out. 
Companies and data warehouses have the ethical implications of storing the data 
without selling or losing it to hackers. The main data collecting company is Axiom. 
Click AboutTheData.com to see what Big Data has stored on you.
9.1-9.5 
There are a few challenges with living in today’s society. 
Technology brings with it a certain uncertainty. 
Uncertainties such as truth and security issues, securing 
devices and communications, issues with the quality of 
life surrounding technology, and economic and political 
implications.
TRUTH ISSUES 
EXAMPLES OF MANIPULATING DIGITAL DATA 
Sound manipulation 
• Electronic music or making a singers voice sound 
perfect by its pitch 
Image manipulation 
• Good – restoring an old photograph or creating 
graphic art 
• Bad – image doctoring 
Video & Television manipulation 
• Special effects in video games or movies
SECURITY ISSUES 
THREATS TO COMPUTERS & COMMUNICATION SYSTEMS 
• Errors and accidents – these include all 
human operating errors, faulty hardware, 
and the software bug 
• Natural hazards – no matter the natural 
hazard, always keep your computer backed 
up and plugged into a surge protector. 
• Computer criminals – hackers, phishers, 
hactivists, scammers, employees 
• Computer crimes – theft of hardware or 
software, music, movies, information, 
identity 
(University of Calgary, n.d.)
SECURITY SAFEGUARDS 
PROTECTING COMPUTERS & COMMUNICATIONS 
• Must have safeguards: 
• “Deterrents to computer crime” would include law enforcement agencies 
with cybercrime divisions or large purchase warnings to prevent fraudulent 
charges. 
• Identification includes items such as debit cards with your picture on them, 
the pin number used to access the ATM. 
• Encryption types: ciphertext, hashing, symmetric (most secure), asymmetric 
• “Protection of software and data” include user access control and 
authentication of files, folders, and hard drives. 
• A disaster recovery plan should be had not only by businesses but also by 
individuals, especially if they work at home or go to school. Hard drives 
should be backed up on multiple kinds of media and put in multiple 
locations.
QUALITY-OF-LIFE ISSUES 
THE ENVIRONMENT & MENTAL HEALTH 
• Green Computing 
• Disposal of “technotrash” or “e-waste” 
is an issue and instead of 
shipping our waste to other 
countries, we should be doing more 
to recycle it. 
• Non-renewable resources are being 
used for the energy to manufacture 
devices and for the material the 
devices are made of. Recycling 
would help here as well. 
• Chemicals leaked into landfills from 
electronics, e.g. chromium and lead, 
are dangerous to humans 
• Mental health 
• The overuse of technology is 
actually considered an addiction in 
the psychology field because 
addiction is any uncontrolled activity 
that induces stress, anxiety, 
depression, and insomnia. 
• There are even mental health 
programs that deal with technology 
addiction. The Center for Internet 
and Technology Addiction offers 
cognitive behavioral therapy as one 
of their services.
QUALITY-OF-LIFE ISSUES 
CHI LD PROTECTION & THE WORKPLACE 
• Child protection 
• Unfortunately, according to Williams 
and Sawyer, the Internet is also a 
place full of online predators, 
pornography, and bullying (2012). 
• To help with these issues, the FCC 
established the Child’s Internet 
Protection Act of 2000 that rewards 
schools and libraries with 
communications discounts for 
having a policy on Internet safety 
which includes content filters, online 
monitoring and the like. 
• Workplace 
• Productivity may be hindered in 
many ways. “Hyper-connectedness” 
certainly may either hinder or boost 
productivity depending on the levels 
of device maintenance and the 
experience of the employees. 
According to Cornerstone On 
Demand, the overwhelming of 
technology depends on the age of 
the employee. The younger they 
are, the more inept they are to use 
their own devices for productivity 
and not feel overwhelmed (2014).
ECONOMIC & POLITICAL ISSUES 
EMPLOYMENT & THE HAVES/HAVE -NOTS 
We are currently in the middle of a 
transformation to a more technology service-oriented 
nation. Education is becoming more 
readily available thanks to the Internet and we 
should capitalize on this fact so as to lead the way 
for the rest of the world. Connecting children as 
early as possible and actually teaching web and 
programming classes in the public schools should 
be our future. 
Industrialization Digital Age
IN CONCLUSION… 
Databases are crucial to nearly every aspect of everyday 
computing. They range from individual and 
organizational cloud storage to customer information 
databases in e-commerce. We must all make ethically 
sound decisions when working with databases. 
We are in the age of information and must not only use 
this to our advantage, but use this to make the world a 
better place and a “better place” includes protecting our 
environment at the same time. We must always 
remember to “unplug” quite often to value our quality of 
life.
REFERENCES 
Arronlee33. (2012). DARPA - Alphadog legged squad support system (LS3) Field testing [720p] 
[Video]. Retrieved from https://www.youtube.com/watch?v=gOkXRXZIFxs 
Batke, K. (2011). 7 types of cyber criminals. Retrieved from http://www.faronics.com/news/blog/7- 
types-of-cyber-criminals/ 
Carnegie Cyber Academy. (n.d.). Environmental issues. Retrieved from 
http://www.carnegiecyberacademy.com/facultyPages/environment/issues.html 
Concept Draw. (n.d.). Pyramid diagram examples [Online image]. Retrieved from 
http://www.conceptdraw.com/examples/chart-of-management-information-system-with-diagram 
Cornerstone On Demand. (2014). The state of workplace productivity report. Retrieved from 
http://www.cornerstoneondemand.com/resources/research/state-of-workplace-productivity- 
2013 
FCC. (n.d.). Child’s Internet Protection Act (CIPA). Retrieved from 
http://www.fcc.gov/guides/childrens-internet-protection-act 
Greenfield, D. (n.d.). The center for internet and technology addiction. Retrieved from 
http://virtual-addiction.com/
King, J. & Richards, N. (2014). What’s up with big data ethics? Retrieved from 
http://radar.oreilly.com/2014/03/whats-up-with-big-data-ethics.html 
Linn, M. (2014). What are the different types of encryption methods? Retrieved from 
http://www.wisegeek.org/what-are-the-different-types-of-encryption-methods.htm 
Sassoon, Y. (2012). Transforming snowplow data so that it can be interrogated in BI / OLAP tools 
like Tableau, Qlikview and Pentaho [Online image]. Retrieved from 
http://snowplowanalytics.com/blog/2012/12/17/transforming-snowplow-data-so-it-can-be-interrogated- 
by-olap-tools-like-tableau/ 
Singh, S. (2014). Companies devise new strategies to keep pace with rapid rise of mobile 
commerce. Retrieved from 
http://economictimes.indiatimes.com/industry/services/retail/companies-devise-new-strategies- 
to-keep-pace-with-rapid-rise-of-mobile-commerce/articleshow/44892422.cms 
Telemetry Labs. (n.d.). M2 cloud solutions [Online image]. Retrieved from 
http://www.telemetrylabs.com/ 
University of Calgary. (n.d.). Identity theft on Ebay [Online image]. Retrieved from 
http://wiki.ucalgary.ca/page/Courses/Computer_Science/CPSC_203/CPSC_203_2008Winter 
_L03/CPSC_203_2008WinterL03_TermProjects/T19_Group_3-_Identity_Theft_on_Ebay 
Williams, B. & Sawyer, S. (2012). Using Information Technology, 10th ed. McGraw-Hill.

More Related Content

What's hot

POMAR AGROECOLÓGICO
POMAR AGROECOLÓGICOPOMAR AGROECOLÓGICO
POMAR AGROECOLÓGICO
Julião Medeiros
 
Summer Internship Presentation by Salman
Summer Internship Presentation by SalmanSummer Internship Presentation by Salman
Summer Internship Presentation by Salman
MD SALMAN ANJUM
 
Introdução a agronomia
Introdução a agronomiaIntrodução a agronomia
Introdução a agronomia
Jadson Belem de Moura
 
Caracterização do Mercado Agrícola
Caracterização do Mercado AgrícolaCaracterização do Mercado Agrícola
Caracterização do Mercado Agrícola
Geagra UFG
 
Vikas Tiwari/ELP/VCSGUUHF.pptx
Vikas Tiwari/ELP/VCSGUUHF.pptxVikas Tiwari/ELP/VCSGUUHF.pptx
Vikas Tiwari/ELP/VCSGUUHF.pptx
Vikas Tiwari
 
Adubação Alternativa e Plantas de Cobertura
Adubação Alternativa e Plantas de CoberturaAdubação Alternativa e Plantas de Cobertura
Adubação Alternativa e Plantas de Cobertura
Geagra UFG
 
Seed Industry & Horticulture
Seed Industry & HorticultureSeed Industry & Horticulture
Seed Industry & Horticulture
Nikhil More
 
Engenharia Agronômica
Engenharia AgronômicaEngenharia Agronômica
Engenharia Agronômica
AgriculturaSustentavel
 
Noçoes de jardinagem
Noçoes de jardinagemNoçoes de jardinagem
Noçoes de jardinagem
Sheila E Joe Tome
 
Agriculture and food system transformation for better food and nutrition secu...
Agriculture and food system transformation for better food and nutrition secu...Agriculture and food system transformation for better food and nutrition secu...
Agriculture and food system transformation for better food and nutrition secu...
International Food Policy Research Institute (IFPRI)
 
02 A produção e produtividade de cana-de-açúcar no Brasil e no mundo
02 A produção e produtividade de cana-de-açúcar no Brasil e no mundo02 A produção e produtividade de cana-de-açúcar no Brasil e no mundo
02 A produção e produtividade de cana-de-açúcar no Brasil e no mundo
Clauber Dalmas Rodrigues
 
Precision agriculture
Precision agriculturePrecision agriculture
Precision agriculture
Aboul Ella Hassanien
 
Kalanamak rice paper 2019
Kalanamak rice paper 2019Kalanamak rice paper 2019
Kalanamak rice paper 2019
sujit3773
 
Shaping Sustainable Food Systems for Healthy Diets and Improved Nutrition: Im...
Shaping Sustainable Food Systems for Healthy Diets and Improved Nutrition: Im...Shaping Sustainable Food Systems for Healthy Diets and Improved Nutrition: Im...
Shaping Sustainable Food Systems for Healthy Diets and Improved Nutrition: Im...
ExternalEvents
 
E-business
E-businessE-business
E-business
Laís Berlatto
 

What's hot (15)

POMAR AGROECOLÓGICO
POMAR AGROECOLÓGICOPOMAR AGROECOLÓGICO
POMAR AGROECOLÓGICO
 
Summer Internship Presentation by Salman
Summer Internship Presentation by SalmanSummer Internship Presentation by Salman
Summer Internship Presentation by Salman
 
Introdução a agronomia
Introdução a agronomiaIntrodução a agronomia
Introdução a agronomia
 
Caracterização do Mercado Agrícola
Caracterização do Mercado AgrícolaCaracterização do Mercado Agrícola
Caracterização do Mercado Agrícola
 
Vikas Tiwari/ELP/VCSGUUHF.pptx
Vikas Tiwari/ELP/VCSGUUHF.pptxVikas Tiwari/ELP/VCSGUUHF.pptx
Vikas Tiwari/ELP/VCSGUUHF.pptx
 
Adubação Alternativa e Plantas de Cobertura
Adubação Alternativa e Plantas de CoberturaAdubação Alternativa e Plantas de Cobertura
Adubação Alternativa e Plantas de Cobertura
 
Seed Industry & Horticulture
Seed Industry & HorticultureSeed Industry & Horticulture
Seed Industry & Horticulture
 
Engenharia Agronômica
Engenharia AgronômicaEngenharia Agronômica
Engenharia Agronômica
 
Noçoes de jardinagem
Noçoes de jardinagemNoçoes de jardinagem
Noçoes de jardinagem
 
Agriculture and food system transformation for better food and nutrition secu...
Agriculture and food system transformation for better food and nutrition secu...Agriculture and food system transformation for better food and nutrition secu...
Agriculture and food system transformation for better food and nutrition secu...
 
02 A produção e produtividade de cana-de-açúcar no Brasil e no mundo
02 A produção e produtividade de cana-de-açúcar no Brasil e no mundo02 A produção e produtividade de cana-de-açúcar no Brasil e no mundo
02 A produção e produtividade de cana-de-açúcar no Brasil e no mundo
 
Precision agriculture
Precision agriculturePrecision agriculture
Precision agriculture
 
Kalanamak rice paper 2019
Kalanamak rice paper 2019Kalanamak rice paper 2019
Kalanamak rice paper 2019
 
Shaping Sustainable Food Systems for Healthy Diets and Improved Nutrition: Im...
Shaping Sustainable Food Systems for Healthy Diets and Improved Nutrition: Im...Shaping Sustainable Food Systems for Healthy Diets and Improved Nutrition: Im...
Shaping Sustainable Food Systems for Healthy Diets and Improved Nutrition: Im...
 
E-business
E-businessE-business
E-business
 

Viewers also liked

Use of open, curated variant databases: ethics? Liability? - Bartha Knoppers
Use of open, curated variant databases: ethics? Liability? - Bartha KnoppersUse of open, curated variant databases: ethics? Liability? - Bartha Knoppers
Use of open, curated variant databases: ethics? Liability? - Bartha Knoppers
Human Variome Project
 
Ethics and Values in the Digital Age
Ethics and Values in the Digital AgeEthics and Values in the Digital Age
Ethics and Values in the Digital Age
Mark Briggs
 
6 animated gifs_sizing
6 animated gifs_sizing6 animated gifs_sizing
6 animated gifs_sizing
guest2edb405
 
Alaska
AlaskaAlaska
Alaska
nandav
 
Working With Power Point3 30
Working With Power Point3 30Working With Power Point3 30
Working With Power Point3 30
nandav
 
Adobe Photoshop
Adobe PhotoshopAdobe Photoshop
Adobe Photoshop
joelk
 
Step By Step 2
Step By Step 2Step By Step 2
Step By Step 2
lallen92
 
Photoshop Basics
Photoshop BasicsPhotoshop Basics
Photoshop Basics
AllieW
 
Management case study
Management case studyManagement case study
Management case study
Wendy Lile
 
Suza dds 05 ethics and development show
Suza dds 05 ethics and development   showSuza dds 05 ethics and development   show
Suza dds 05 ethics and development show
Abdulrahman Mustafa Nahoda
 
Computer Science
Computer ScienceComputer Science
Computer Science
Wendy Lile
 
Yoga
Yoga Yoga
Yoga
Anupama K
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
poonam.rwalia
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
Kak Yong
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Yoga for glowing skin
Yoga for glowing skinYoga for glowing skin
Yoga for glowing skin
Build My Fitness
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the Web
Mike Crabb
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
smartinson
 
Hopeful Images from 2015
Hopeful Images from 2015Hopeful Images from 2015
Hopeful Images from 2015
maditabalnco
 

Viewers also liked (19)

Use of open, curated variant databases: ethics? Liability? - Bartha Knoppers
Use of open, curated variant databases: ethics? Liability? - Bartha KnoppersUse of open, curated variant databases: ethics? Liability? - Bartha Knoppers
Use of open, curated variant databases: ethics? Liability? - Bartha Knoppers
 
Ethics and Values in the Digital Age
Ethics and Values in the Digital AgeEthics and Values in the Digital Age
Ethics and Values in the Digital Age
 
6 animated gifs_sizing
6 animated gifs_sizing6 animated gifs_sizing
6 animated gifs_sizing
 
Alaska
AlaskaAlaska
Alaska
 
Working With Power Point3 30
Working With Power Point3 30Working With Power Point3 30
Working With Power Point3 30
 
Adobe Photoshop
Adobe PhotoshopAdobe Photoshop
Adobe Photoshop
 
Step By Step 2
Step By Step 2Step By Step 2
Step By Step 2
 
Photoshop Basics
Photoshop BasicsPhotoshop Basics
Photoshop Basics
 
Management case study
Management case studyManagement case study
Management case study
 
Suza dds 05 ethics and development show
Suza dds 05 ethics and development   showSuza dds 05 ethics and development   show
Suza dds 05 ethics and development show
 
Computer Science
Computer ScienceComputer Science
Computer Science
 
Yoga
Yoga Yoga
Yoga
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Yoga for glowing skin
Yoga for glowing skinYoga for glowing skin
Yoga for glowing skin
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the Web
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 
Hopeful Images from 2015
Hopeful Images from 2015Hopeful Images from 2015
Hopeful Images from 2015
 

Similar to Databases & Challenges of a Digital Age

Communication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesCommunication Technology- Information System and Technologies
Communication Technology- Information System and Technologies
Faindra Jabbar
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
Tommy Riggins
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
AbdurrahmanADandalam1
 
Mba ewis ii u ii planning and design
Mba ewis ii u ii  planning and designMba ewis ii u ii  planning and design
Mba ewis ii u ii planning and design
Rai University
 
ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012
ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012
ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012
Lee Dirks
 
Business Intelligence & Predictive Analytic by Prof. Lili Saghafi
Business Intelligence & Predictive Analytic by Prof. Lili SaghafiBusiness Intelligence & Predictive Analytic by Prof. Lili Saghafi
Business Intelligence & Predictive Analytic by Prof. Lili Saghafi
Professor Lili Saghafi
 
3. technological change
3. technological change3. technological change
3. technological change
pajarejp01229108
 
Impacts of Technology
Impacts of TechnologyImpacts of Technology
Impacts of Technology
HaseebUsmani3
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
Taibah University, College of Computer Science & Engineering
 
Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)
Taibah University, College of Computer Science & Engineering
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
Taibah University, College of Computer Science & Engineering
 
06. 9534 14985-1-ed b edit dhyan
06. 9534 14985-1-ed b edit dhyan06. 9534 14985-1-ed b edit dhyan
06. 9534 14985-1-ed b edit dhyan
IAESIJEECS
 
Data Science - An emerging Stream of Science with its Spreading Reach & Impact
Data Science - An emerging Stream of Science with its Spreading Reach & ImpactData Science - An emerging Stream of Science with its Spreading Reach & Impact
Data Science - An emerging Stream of Science with its Spreading Reach & Impact
Dr. Sunil Kr. Pandey
 
Impact of data science in financial reporting
Impact of data science in financial reporting Impact of data science in financial reporting
Impact of data science in financial reporting
James Deiotte
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
Barry Caplin
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
An Overview of BigData
An Overview of BigDataAn Overview of BigData
An Overview of BigData
Valarmathi V
 
Big data and the data quality imperative
Big data and the data quality imperativeBig data and the data quality imperative
Big data and the data quality imperative
Trillium Software
 
UCISA 2013 Presentation
UCISA 2013 PresentationUCISA 2013 Presentation
UCISA 2013 Presentation
DataIntegration
 
GCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptxGCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptx
sangeetha865539
 

Similar to Databases & Challenges of a Digital Age (20)

Communication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesCommunication Technology- Information System and Technologies
Communication Technology- Information System and Technologies
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 
Mba ewis ii u ii planning and design
Mba ewis ii u ii  planning and designMba ewis ii u ii  planning and design
Mba ewis ii u ii planning and design
 
ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012
ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012
ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012
 
Business Intelligence & Predictive Analytic by Prof. Lili Saghafi
Business Intelligence & Predictive Analytic by Prof. Lili SaghafiBusiness Intelligence & Predictive Analytic by Prof. Lili Saghafi
Business Intelligence & Predictive Analytic by Prof. Lili Saghafi
 
3. technological change
3. technological change3. technological change
3. technological change
 
Impacts of Technology
Impacts of TechnologyImpacts of Technology
Impacts of Technology
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
06. 9534 14985-1-ed b edit dhyan
06. 9534 14985-1-ed b edit dhyan06. 9534 14985-1-ed b edit dhyan
06. 9534 14985-1-ed b edit dhyan
 
Data Science - An emerging Stream of Science with its Spreading Reach & Impact
Data Science - An emerging Stream of Science with its Spreading Reach & ImpactData Science - An emerging Stream of Science with its Spreading Reach & Impact
Data Science - An emerging Stream of Science with its Spreading Reach & Impact
 
Impact of data science in financial reporting
Impact of data science in financial reporting Impact of data science in financial reporting
Impact of data science in financial reporting
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
An Overview of BigData
An Overview of BigDataAn Overview of BigData
An Overview of BigData
 
Big data and the data quality imperative
Big data and the data quality imperativeBig data and the data quality imperative
Big data and the data quality imperative
 
UCISA 2013 Presentation
UCISA 2013 PresentationUCISA 2013 Presentation
UCISA 2013 Presentation
 
GCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptxGCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptx
 

More from Wendy Lile

Cleaning up Texas air
Cleaning up Texas airCleaning up Texas air
Cleaning up Texas air
Wendy Lile
 
Web 2.0 Revisited - Final project
Web 2.0 Revisited - Final projectWeb 2.0 Revisited - Final project
Web 2.0 Revisited - Final project
Wendy Lile
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
Wendy Lile
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
Wendy Lile
 
Unix linux vmacvwindowspptx2
Unix linux vmacvwindowspptx2Unix linux vmacvwindowspptx2
Unix linux vmacvwindowspptx2
Wendy Lile
 
Gas pump program final Pptx
Gas pump program final PptxGas pump program final Pptx
Gas pump program final Pptx
Wendy Lile
 
Gas pump program final
Gas pump program finalGas pump program final
Gas pump program final
Wendy Lile
 
Website design and development part 1
Website design and development part 1Website design and development part 1
Website design and development part 1
Wendy Lile
 
Interactive features
Interactive featuresInteractive features
Interactive features
Wendy Lile
 
Elias sitereview
Elias sitereviewElias sitereview
Elias sitereview
Wendy Lile
 
Website evaluationpaperfinal
Website evaluationpaperfinalWebsite evaluationpaperfinal
Website evaluationpaperfinal
Wendy Lile
 
Succession and natural selection
Succession and natural selectionSuccession and natural selection
Succession and natural selection
Wendy Lile
 
Population size
Population sizePopulation size
Population size
Wendy Lile
 
Mitigation strategies and solutions for energy conservation
Mitigation strategies and solutions for energy conservationMitigation strategies and solutions for energy conservation
Mitigation strategies and solutions for energy conservation
Wendy Lile
 
Energy resource plan
Energy resource planEnergy resource plan
Energy resource plan
Wendy Lile
 
Energy resource challanges
Energy resource challangesEnergy resource challanges
Energy resource challanges
Wendy Lile
 
Business communication trends
Business communication trendsBusiness communication trends
Business communication trends
Wendy Lile
 
Oral presentation
Oral presentationOral presentation
Oral presentation
Wendy Lile
 
Ethics awareness inventory
Ethics awareness inventoryEthics awareness inventory
Ethics awareness inventory
Wendy Lile
 
Ethical issues and management paper
Ethical issues and management paperEthical issues and management paper
Ethical issues and management paper
Wendy Lile
 

More from Wendy Lile (20)

Cleaning up Texas air
Cleaning up Texas airCleaning up Texas air
Cleaning up Texas air
 
Web 2.0 Revisited - Final project
Web 2.0 Revisited - Final projectWeb 2.0 Revisited - Final project
Web 2.0 Revisited - Final project
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
 
Unix linux vmacvwindowspptx2
Unix linux vmacvwindowspptx2Unix linux vmacvwindowspptx2
Unix linux vmacvwindowspptx2
 
Gas pump program final Pptx
Gas pump program final PptxGas pump program final Pptx
Gas pump program final Pptx
 
Gas pump program final
Gas pump program finalGas pump program final
Gas pump program final
 
Website design and development part 1
Website design and development part 1Website design and development part 1
Website design and development part 1
 
Interactive features
Interactive featuresInteractive features
Interactive features
 
Elias sitereview
Elias sitereviewElias sitereview
Elias sitereview
 
Website evaluationpaperfinal
Website evaluationpaperfinalWebsite evaluationpaperfinal
Website evaluationpaperfinal
 
Succession and natural selection
Succession and natural selectionSuccession and natural selection
Succession and natural selection
 
Population size
Population sizePopulation size
Population size
 
Mitigation strategies and solutions for energy conservation
Mitigation strategies and solutions for energy conservationMitigation strategies and solutions for energy conservation
Mitigation strategies and solutions for energy conservation
 
Energy resource plan
Energy resource planEnergy resource plan
Energy resource plan
 
Energy resource challanges
Energy resource challangesEnergy resource challanges
Energy resource challanges
 
Business communication trends
Business communication trendsBusiness communication trends
Business communication trends
 
Oral presentation
Oral presentationOral presentation
Oral presentation
 
Ethics awareness inventory
Ethics awareness inventoryEthics awareness inventory
Ethics awareness inventory
 
Ethical issues and management paper
Ethical issues and management paperEthical issues and management paper
Ethical issues and management paper
 

Recently uploaded

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Databases & Challenges of a Digital Age

  • 1. Databases & Challenges of a Digital Age WEEK 7 PRESENTATION WENDY LI LE ITCC121 OCTOBER 19, 2014 PROFESSOR FELIX AGALABA
  • 2. A database is a collection of interrelated data, logically organized to be easily accessed and managed. Databases are used for many purposes of storing information, such as student’s names in a university database or purchasing habits of customers in a retail database. Databases are used by advertising and marketing companies, retailers, and even our government. All types of agencies collectively gathering information to use for their specific purpose. 8.1-8.8
  • 3. MANAGING FILES BASIC CONCEPTS Data Storage Hierarchy File (Table) a collection of records [Top of the hierarchy] Record (Row) a collection of fields Field (Column) each field has a field name and the type of field Byte A character, such as a letter, number, or symbol Bit Unit of data represented by either a 0 (off) or a 1 (on) • Key field – the primary identifier of a record. A key field makes the record searchable, therefore must be unique
  • 4. DATABASE MANAGEMENT SYSTEMS (DBMS) A DBMS is software that enables users to interact with the database to create, modify, or delete data. • Three components of a DBMS: • Data dictionary (repository) • DBMS utilities – programs that enable maintenance of the database • Report generator
  • 5. DATABASE MODELS • Hierarchical • Network • Relational • Object-oriented • Multidimensional Example of a multidimensional database
  • 6. DATA MINING • The process of analyzing large amounts of data to discover patterns that could describe past trends or predict future situations
  • 7. DATABASES AND THE DIGITAL ECONOMY E-BUSINESS & E-COMMERCE B2B 4 main types of ecommerce B2C C2C Mobile commerce
  • 8. INFORMATION SYSTEMS IN ORGANIZATIONS USING DATABASES TO HELP MAKE DECISIONS
  • 9. ARTIFICIAL INTELLIGENCE (AI) • Some fields of AI: • Expert systems • Natural language processing • Intelligent agents • Pattern recognition • Fuzzy logic • Virtual reality & simulation • Robotics Darpa – AlphaDog LS3 Robotic military dog Shopping Bot: PriceGrabber.com
  • 10. THE ETHICS OF USING DATABASES CONCERNS ABOUT PRIVACY & IDENTITY THEFT Big Data is a term most people know. It is the gathering of massive amounts of information on internet consumers by corporations or companies. The information collected is stored in databases, which are then analyzed to, for example, predict the purchasing habits of a specific customer. The general concern is privacy so they do not worry about identity theft and the idea that consumers want from companies is complete transparency. Let them know when data will be collected, what will be collected, who will have it, and how it will be used, then give them a chance to opt out. Companies and data warehouses have the ethical implications of storing the data without selling or losing it to hackers. The main data collecting company is Axiom. Click AboutTheData.com to see what Big Data has stored on you.
  • 11. 9.1-9.5 There are a few challenges with living in today’s society. Technology brings with it a certain uncertainty. Uncertainties such as truth and security issues, securing devices and communications, issues with the quality of life surrounding technology, and economic and political implications.
  • 12. TRUTH ISSUES EXAMPLES OF MANIPULATING DIGITAL DATA Sound manipulation • Electronic music or making a singers voice sound perfect by its pitch Image manipulation • Good – restoring an old photograph or creating graphic art • Bad – image doctoring Video & Television manipulation • Special effects in video games or movies
  • 13. SECURITY ISSUES THREATS TO COMPUTERS & COMMUNICATION SYSTEMS • Errors and accidents – these include all human operating errors, faulty hardware, and the software bug • Natural hazards – no matter the natural hazard, always keep your computer backed up and plugged into a surge protector. • Computer criminals – hackers, phishers, hactivists, scammers, employees • Computer crimes – theft of hardware or software, music, movies, information, identity (University of Calgary, n.d.)
  • 14. SECURITY SAFEGUARDS PROTECTING COMPUTERS & COMMUNICATIONS • Must have safeguards: • “Deterrents to computer crime” would include law enforcement agencies with cybercrime divisions or large purchase warnings to prevent fraudulent charges. • Identification includes items such as debit cards with your picture on them, the pin number used to access the ATM. • Encryption types: ciphertext, hashing, symmetric (most secure), asymmetric • “Protection of software and data” include user access control and authentication of files, folders, and hard drives. • A disaster recovery plan should be had not only by businesses but also by individuals, especially if they work at home or go to school. Hard drives should be backed up on multiple kinds of media and put in multiple locations.
  • 15. QUALITY-OF-LIFE ISSUES THE ENVIRONMENT & MENTAL HEALTH • Green Computing • Disposal of “technotrash” or “e-waste” is an issue and instead of shipping our waste to other countries, we should be doing more to recycle it. • Non-renewable resources are being used for the energy to manufacture devices and for the material the devices are made of. Recycling would help here as well. • Chemicals leaked into landfills from electronics, e.g. chromium and lead, are dangerous to humans • Mental health • The overuse of technology is actually considered an addiction in the psychology field because addiction is any uncontrolled activity that induces stress, anxiety, depression, and insomnia. • There are even mental health programs that deal with technology addiction. The Center for Internet and Technology Addiction offers cognitive behavioral therapy as one of their services.
  • 16. QUALITY-OF-LIFE ISSUES CHI LD PROTECTION & THE WORKPLACE • Child protection • Unfortunately, according to Williams and Sawyer, the Internet is also a place full of online predators, pornography, and bullying (2012). • To help with these issues, the FCC established the Child’s Internet Protection Act of 2000 that rewards schools and libraries with communications discounts for having a policy on Internet safety which includes content filters, online monitoring and the like. • Workplace • Productivity may be hindered in many ways. “Hyper-connectedness” certainly may either hinder or boost productivity depending on the levels of device maintenance and the experience of the employees. According to Cornerstone On Demand, the overwhelming of technology depends on the age of the employee. The younger they are, the more inept they are to use their own devices for productivity and not feel overwhelmed (2014).
  • 17. ECONOMIC & POLITICAL ISSUES EMPLOYMENT & THE HAVES/HAVE -NOTS We are currently in the middle of a transformation to a more technology service-oriented nation. Education is becoming more readily available thanks to the Internet and we should capitalize on this fact so as to lead the way for the rest of the world. Connecting children as early as possible and actually teaching web and programming classes in the public schools should be our future. Industrialization Digital Age
  • 18. IN CONCLUSION… Databases are crucial to nearly every aspect of everyday computing. They range from individual and organizational cloud storage to customer information databases in e-commerce. We must all make ethically sound decisions when working with databases. We are in the age of information and must not only use this to our advantage, but use this to make the world a better place and a “better place” includes protecting our environment at the same time. We must always remember to “unplug” quite often to value our quality of life.
  • 19. REFERENCES Arronlee33. (2012). DARPA - Alphadog legged squad support system (LS3) Field testing [720p] [Video]. Retrieved from https://www.youtube.com/watch?v=gOkXRXZIFxs Batke, K. (2011). 7 types of cyber criminals. Retrieved from http://www.faronics.com/news/blog/7- types-of-cyber-criminals/ Carnegie Cyber Academy. (n.d.). Environmental issues. Retrieved from http://www.carnegiecyberacademy.com/facultyPages/environment/issues.html Concept Draw. (n.d.). Pyramid diagram examples [Online image]. Retrieved from http://www.conceptdraw.com/examples/chart-of-management-information-system-with-diagram Cornerstone On Demand. (2014). The state of workplace productivity report. Retrieved from http://www.cornerstoneondemand.com/resources/research/state-of-workplace-productivity- 2013 FCC. (n.d.). Child’s Internet Protection Act (CIPA). Retrieved from http://www.fcc.gov/guides/childrens-internet-protection-act Greenfield, D. (n.d.). The center for internet and technology addiction. Retrieved from http://virtual-addiction.com/
  • 20. King, J. & Richards, N. (2014). What’s up with big data ethics? Retrieved from http://radar.oreilly.com/2014/03/whats-up-with-big-data-ethics.html Linn, M. (2014). What are the different types of encryption methods? Retrieved from http://www.wisegeek.org/what-are-the-different-types-of-encryption-methods.htm Sassoon, Y. (2012). Transforming snowplow data so that it can be interrogated in BI / OLAP tools like Tableau, Qlikview and Pentaho [Online image]. Retrieved from http://snowplowanalytics.com/blog/2012/12/17/transforming-snowplow-data-so-it-can-be-interrogated- by-olap-tools-like-tableau/ Singh, S. (2014). Companies devise new strategies to keep pace with rapid rise of mobile commerce. Retrieved from http://economictimes.indiatimes.com/industry/services/retail/companies-devise-new-strategies- to-keep-pace-with-rapid-rise-of-mobile-commerce/articleshow/44892422.cms Telemetry Labs. (n.d.). M2 cloud solutions [Online image]. Retrieved from http://www.telemetrylabs.com/ University of Calgary. (n.d.). Identity theft on Ebay [Online image]. Retrieved from http://wiki.ucalgary.ca/page/Courses/Computer_Science/CPSC_203/CPSC_203_2008Winter _L03/CPSC_203_2008WinterL03_TermProjects/T19_Group_3-_Identity_Theft_on_Ebay Williams, B. & Sawyer, S. (2012). Using Information Technology, 10th ed. McGraw-Hill.

Editor's Notes

  1. Introduction (Williams & Sawyer, 2012)
  2. (Williams & Sawyer, 2012)
  3. A hierarchical database model has a tree-like structure with the root record at the top. There is one parent per child and no relationships among children. Network database models have the more complex data relationships that are needed for better performance than a hierarchical database. Relational databases connect data from different files with common elements. Instead of data being organized by location, it is organized by its content. An object-oriented database contains multimedia objects. There are two types of object-oriented databases: hypertext, which contains text links…and a hypermedia database, which may contain links, graphics, sound, and video. According to Williams and Sawyer, multidimensional databases are designed for use with large amounts of data, such as facts, dimensions, or numerical measures, for interactive analysis (2012). (Williams & Sawyer, 2012) (Sassoon, 2012)
  4. Mobile commerce is any business transaction made from a mobile device either through an app or a mobile website (Singh, 2014). (Williams & Sawyer, 2012)
  5. An executive information system (also known as executive support system) is a decision support system for executive level management. Reporting gathers data from internal and external resources. A decision support system is a software tool to aid in the decision making process. A DSS generates business intelligence. A management information system is a set of tools department management uses to transform raw data from TPS reports into useful information that may be used in a decision support system. A transaction processing system records business transactions and provides detailed reports. Image: (Concept Draw, n.d.)
  6. Artificial intelligence is an aggregation of machine technologies that imitate human actions. The fields discussed in Williams & Sawyer are expert systems, natural language processing, intelligent agents, pattern recognition, fuzzy logic, virtual reality, and robotics (2012). An expert system has three parts, the knowledge base that holds rules and facts, the inference engine applies the rules to the facts to generate reasoning and make decisions that are presented by the user interface (Williams & Sawyer, 2012) Natural language processing or NLP is the process of having computers interpret human language, both text and spoken (Williams & Sawyer, 2012). For example, on any Android phone you will find Google Voice Search where the mobile device will recognize the natural language spoken to perform the actions requested. Intelligent agents are autonomous bots that have a specific purpose, such as the online shopping assistant bot or spam bots (Williams & Sawyer, 2012). Pattern recognition is the process of identifying patterns and comparing them to patterns stored in a database (Williams & Sawyer, 2012). Fuzzy logic is a tool to control and model uncertainties (Williams & Sawyer, 2012). Simulation devices are use often in training exercises, such as with crane and forklift operators. (personal experience) The robot in the video to the right is Darpa’s AlphaDog (Arronlee33, 2012).
  7. (King & Richards, 2014)
  8. Introduction (Williams & Sawyer, 2012)
  9. (Williams & Sawyer, 2012)
  10. Williams and Sawyer note that there are four threat categories: errors and accidents, natural hazards, computer crimes, computer criminals (2012). There are many threats, some natural and some of the human error type, but the most concerning issues are cyber (computer) crimes especially identity theft. There are many types of cyber criminals, such as hackers, phishers, hacktivists, and scammers (Batke, 2011). (Williams & Sawyer, 2012)
  11. (Williams & Sawyer, 2012) The four types of encryption are ciphertext, hashing, symmetric (most secure), and asymmetric (Linn, 2014).
  12. Environment: (Carnegie Cyber Academy, n.d.) Mental health: (Greenfield, n.d.) All: (Williams & Sawyer, 2012)
  13. Child protection: (FCC, n.d.) Workplace: (Cornerstone On Demand, 2014)) All: (Williams & Sawyer, 2012)
  14. (Williams & Sawyer, 2012) Image: (Telemetry Labs, n.d.)