Faculty of Arts Atkinson ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC 1010 3.0 A Professor G.E. Denzel
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Welcome
Twenty-first Lecture for ITEC 1010 3.0 A
Professor G.E. Denzel
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Agenda
Review idea of ‘atomic’ data Discuss ‘subforms’ using MS Access. Go over key ideas from Chapter 15.
(Remember that we are skipping Chapter 13).
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Relational Data Model
Relational data model All data elements are placed in two-dimensional
tables, called relations, that are the logical equivalent of files
Schematic
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
First Normal Form
Reduce entities to first normal form (1NF) by removing repeating or multivalued attributes to another, child entity.
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Second Normal Form
Reduce first normal form entities to second normal form (2NF) by removing attributes that are not dependent on the whole primary key.
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
For more examples
http://www.15seconds.com/issue/020522.htm
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
When is data ‘atomic’?
Consider a street address: Apartment 17 123 Rubble Crescent Newtown, ON M3J 5P8 Canada
What part (if any) of this should be split off into other fields? Answer depends partly on purpose of data
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Atomic data (cont’d)
Will there be a need to query db and/or generate reports on: Apartment number?
• Or fact that it is an apartment?
Street address? Postal code? City? Country?
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Atomic Data (cont’d)
How about phone number? 011-416-736-5250 (office)
905-845-1234 (home)
What part (if any) of this should be split off into other fields? Answer again depends partly on purpose of data
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Atomic Data (cont’d)
For sure you would want separate fields for home and office number 011-416-736-5250 (office) 905-845-1234 (home)
What part (if any) of this should be split off into other fields? Answer again depends partly on purpose of data
• You might want area code, conceivably exchange code.
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
What is a ‘subform’?
Could be thought of as a separate form linked to a parent form. Here is a tutorial (in pdf form ) which takes you step-by-step through creation of one using MS Access ‘wizards’. (take a look at Brydon’s tutorial)
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Chapter 15 PreviewIn this chapter, we will study:
Types of ‘ethical’/legal issues that arise in relation to information systems
Impacts that information systems have had on organization, jobs, individuals, and society (review briefly)
Various threats that may damage computer and information systems
Ways to protect computer and information systems from hazards and threats
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
IT Ethical Issues Ethics – branch of philosophy that deals
with what is considered to be right and wrong
Code of ethics – principles that guide members of an organization
Types of ethical issues Privacy – what is collected, stored, and shared
about others Accuracy – what is done to assure authentic
and accurate data Property – who owns intellectual property and
how are they compensated for it Accessibility – who can obtain information
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Privacy Issues Information privacy – the right to
determine what information about oneself can be shared with others
Electronic surveillance – computer users’ actions can be monitored without knowledge both at work and at home
Storage of personal information in databases: What is stored? How can be we sure it’s
accurate? Who will it be shared with? How will it be used?
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Privacy Issues (continued) Many organizations are developing
and enforcing privacy policies Internationally, countries vary
widely regarding their concerns about privacy. Adds complexity to global commerce. OECD laws on privacy and FOI Ontario laws on privacy and FOI
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Privacy Issues (continued)• An organization should …
• Only collect data that can be obtained legally and fairly
• Make sure data is accurate, complete, and kept up to date
• Know why we are collecting data and be sure there is a reason to have it
• Make sure data is used just for its intended purpose• Safeguard the data to ensure its quality• Enable those about whom we store data know what
we plan to do with the data and can verify its accuracy
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Intellectual Property Issues Intangible property created by people or
organizations, protected by trade secret, patent, and copyright laws Trade secret – intellectual work - not public Patent – exclusive rights to invention granted to
inventor for 20 years Copyright – creators of intellectual property
granted ownership for their lives plus 50 years. Owners have right to collect fees for use. Software is generally copyrighted.
What are the negative consequences of illegally copying software?
Wide variation in the way different countries protect intellectual property – globalization issue
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
IT and Organizations IT has the potential to significantly
change organizations. Structures can be flatter, eliminating
middle layers, with broader span of control
More extensive supervision is possible electronically, even for those working remotely
Power shifts are likely as knowledge is captured, stored, and shared.
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
IT and Jobs Some jobs will be eliminated, especially
intermediaries (e.g., travel agents) BPR will cause many jobs to be
redesigned; more emphasis on computing capabilities (BPR=Business Process Re-engineering)
Experience and seniority may become less important in job advancement
Managers’ approach to decision making may change
Computer-based communication skills may be more in demand
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
IT and Individuals Fears of dehumanization and loss of
social contact Increasing workload and demand
for computer skills can be threatening
Certain aspects of using computers can be physically damaging (back, neck problems, RSI (eg carpal tunnel syndrome), eye strain, etc.)
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
IT and Society Some will say that IT has improved our
quality of life Improvements for people with disabilities Improvements in health care system Improved consumer information Robots performing in dangerous situations Improvements in crime fighting
Concern about deepening divide between those with and without IT access
Internet communities provide social contact for people with common interests
Telecommuting adds flexibility for workers and organizations
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Security Concerns Information systems are subject to
many threats Unintentional threats
•Human error – in design or use of system
•Environmental hazards – acts of God and other
•Computer system failures – faulty products
Intentional threats•Systems are subject to a wide variety of
hazards from criminal attacks
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Computer Crimes Computers may be the target of
criminal activity or the means by which criminal activity is carried out
Methods of attack: Data tampering is most common
attack on computer systems Deliberate programming fraud also
common•Viruses are a highly visible form of
programming attack•Denial of service attacks target e-
commerce web sites
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Protecting IT Individuals and organizations must
actively establish protection mechanisms Prevent and deter damage Detect threats before damage is
widespread Limit loss from threat Plan for recovery in event of attack Correct system to prevent recurrence
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Protecting IT (continued) General protection strategies:
Physical security of facilities and resources
Control access to system Protect data from unauthorized access
Application control strategies: Ensure quality of inputs Verify quality of processing Ensure quality and accessibility of
outputs
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Protecting IT (continued) Network control strategies:
Control access to network resources Protect data on network with
encryption Monitor and detect intruders Protect with firewalls
Verifying quality through audits Regular evaluation of records and
procedures May be performed by internal and
external auditors
Faculty of ArtsAtkinson College
ITEC 1010 A F 2002
Protecting IT (continued) Disaster Prevention and Recovery Plans
Organizations need to think through how various disasters will be handled
Key people should know exactly what to do in the event of a disaster
Disaster plans should be tested through practice drills
Critical component is back-up procedures (off-site, up-to-date, with a plan to restore)
Discipline is needed to ensure that protection plans are implemented (how often do you back up your hard drive?)