Top Banner
Faculty of Arts Atkinson ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel
27

Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Dec 27, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Welcome

Twenty-first Lecture for ITEC 1010 3.0 A

Professor G.E. Denzel

Page 2: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Agenda

Review idea of ‘atomic’ data Discuss ‘subforms’ using MS Access. Go over key ideas from Chapter 15.

(Remember that we are skipping Chapter 13).

Page 3: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Relational Data Model

Relational data model All data elements are placed in two-dimensional

tables, called relations, that are the logical equivalent of files

Schematic

Page 4: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

First Normal Form

Reduce entities to first normal form (1NF) by removing repeating or multivalued attributes to another, child entity.

Page 5: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Second Normal Form

Reduce first normal form entities to second normal form (2NF) by removing attributes that are not dependent on the whole primary key.

Page 6: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

For more examples

http://www.15seconds.com/issue/020522.htm

Page 7: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

When is data ‘atomic’?

Consider a street address: Apartment 17 123 Rubble Crescent Newtown, ON M3J 5P8 Canada

What part (if any) of this should be split off into other fields? Answer depends partly on purpose of data

Page 8: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Atomic data (cont’d)

Will there be a need to query db and/or generate reports on: Apartment number?

• Or fact that it is an apartment?

Street address? Postal code? City? Country?

Page 9: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Atomic Data (cont’d)

How about phone number? 011-416-736-5250 (office)

905-845-1234 (home)

What part (if any) of this should be split off into other fields? Answer again depends partly on purpose of data

Page 10: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Atomic Data (cont’d)

For sure you would want separate fields for home and office number 011-416-736-5250 (office) 905-845-1234 (home)

What part (if any) of this should be split off into other fields? Answer again depends partly on purpose of data

• You might want area code, conceivably exchange code.

Page 11: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

What is a ‘subform’?

Could be thought of as a separate form linked to a parent form. Here is a tutorial (in pdf form ) which takes you step-by-step through creation of one using MS Access ‘wizards’. (take a look at Brydon’s tutorial)

Page 12: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Chapter 15 PreviewIn this chapter, we will study:

Types of ‘ethical’/legal issues that arise in relation to information systems

Impacts that information systems have had on organization, jobs, individuals, and society (review briefly)

Various threats that may damage computer and information systems

Ways to protect computer and information systems from hazards and threats

Page 13: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

IT Ethical Issues Ethics – branch of philosophy that deals

with what is considered to be right and wrong

Code of ethics – principles that guide members of an organization

Types of ethical issues Privacy – what is collected, stored, and shared

about others Accuracy – what is done to assure authentic

and accurate data Property – who owns intellectual property and

how are they compensated for it Accessibility – who can obtain information

Page 14: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Privacy Issues Information privacy – the right to

determine what information about oneself can be shared with others

Electronic surveillance – computer users’ actions can be monitored without knowledge both at work and at home

Storage of personal information in databases: What is stored? How can be we sure it’s

accurate? Who will it be shared with? How will it be used?

Page 15: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Privacy Issues (continued) Many organizations are developing

and enforcing privacy policies Internationally, countries vary

widely regarding their concerns about privacy. Adds complexity to global commerce. OECD laws on privacy and FOI Ontario laws on privacy and FOI

Page 16: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Privacy Issues (continued)• An organization should …

• Only collect data that can be obtained legally and fairly

• Make sure data is accurate, complete, and kept up to date

• Know why we are collecting data and be sure there is a reason to have it

• Make sure data is used just for its intended purpose• Safeguard the data to ensure its quality• Enable those about whom we store data know what

we plan to do with the data and can verify its accuracy

Page 17: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Intellectual Property Issues Intangible property created by people or

organizations, protected by trade secret, patent, and copyright laws Trade secret – intellectual work - not public Patent – exclusive rights to invention granted to

inventor for 20 years Copyright – creators of intellectual property

granted ownership for their lives plus 50 years. Owners have right to collect fees for use. Software is generally copyrighted.

What are the negative consequences of illegally copying software?

Wide variation in the way different countries protect intellectual property – globalization issue

Page 18: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

IT and Organizations IT has the potential to significantly

change organizations. Structures can be flatter, eliminating

middle layers, with broader span of control

More extensive supervision is possible electronically, even for those working remotely

Power shifts are likely as knowledge is captured, stored, and shared.

Page 19: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

IT and Jobs Some jobs will be eliminated, especially

intermediaries (e.g., travel agents) BPR will cause many jobs to be

redesigned; more emphasis on computing capabilities (BPR=Business Process Re-engineering)

Experience and seniority may become less important in job advancement

Managers’ approach to decision making may change

Computer-based communication skills may be more in demand

Page 20: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

IT and Individuals Fears of dehumanization and loss of

social contact Increasing workload and demand

for computer skills can be threatening

Certain aspects of using computers can be physically damaging (back, neck problems, RSI (eg carpal tunnel syndrome), eye strain, etc.)

Page 21: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

IT and Society Some will say that IT has improved our

quality of life Improvements for people with disabilities Improvements in health care system Improved consumer information Robots performing in dangerous situations Improvements in crime fighting

Concern about deepening divide between those with and without IT access

Internet communities provide social contact for people with common interests

Telecommuting adds flexibility for workers and organizations

Page 22: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Security Concerns Information systems are subject to

many threats Unintentional threats

•Human error – in design or use of system

•Environmental hazards – acts of God and other

•Computer system failures – faulty products

Intentional threats•Systems are subject to a wide variety of

hazards from criminal attacks

Page 23: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Computer Crimes Computers may be the target of

criminal activity or the means by which criminal activity is carried out

Methods of attack: Data tampering is most common

attack on computer systems Deliberate programming fraud also

common•Viruses are a highly visible form of

programming attack•Denial of service attacks target e-

commerce web sites

Page 24: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Protecting IT Individuals and organizations must

actively establish protection mechanisms Prevent and deter damage Detect threats before damage is

widespread Limit loss from threat Plan for recovery in event of attack Correct system to prevent recurrence

Page 25: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Protecting IT (continued) General protection strategies:

Physical security of facilities and resources

Control access to system Protect data from unauthorized access

Application control strategies: Ensure quality of inputs Verify quality of processing Ensure quality and accessibility of

outputs

Page 26: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Protecting IT (continued) Network control strategies:

Control access to network resources Protect data on network with

encryption Monitor and detect intruders Protect with firewalls

Verifying quality through audits Regular evaluation of records and

procedures May be performed by internal and

external auditors

Page 27: Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel.

Faculty of ArtsAtkinson College

ITEC 1010 A F 2002

Protecting IT (continued) Disaster Prevention and Recovery Plans

Organizations need to think through how various disasters will be handled

Key people should know exactly what to do in the event of a disaster

Disaster plans should be tested through practice drills

Critical component is back-up procedures (off-site, up-to-date, with a plan to restore)

Discipline is needed to ensure that protection plans are implemented (how often do you back up your hard drive?)