Professional Documents
Culture Documents
Managing Data
Managing Data
Managing Data
Managing Data
Business implications
Mgmt
Organizational use
Major IS (1) (1) Digital EB
Economy (7)
Store
Employees
Store data in different functional areas
Store
Managers
Data exchange between functional areas
HK Regional
Managers Data processing, to generate useful info
Finance/ Human
Operations Marketing
Accounting Resources
Basic concepts in data mgmt
Record
Fields
that are grouped together for a specific purpose
Example: students’ records on the instructor’s computer
Basic concepts in data mgmt
Primary key
A field, or group of fields, that uniquely identifies
an individual record
E.g., student id number for records describing
students
E.g., {who sells which product to whom} describing
transaction, or using an transaction ID
Basic concepts in data mgmt
Table
How to manage data
Insertion anomaly
Data need to be entered more than once when
the data are located in multiple file systems
People may make mistakes in data re-entry
E.g., Tom’s address is put in two files twice
File systems – Anomalies
Modification anomaly
Redundant data in separate file systems
becomes inconsistent
E.g., Tom changed his address in the
registrar’s office, but forgot to change in
account office.
File systems – Anomalies
Deletion anomaly
Failure
to simultaneously delete all copies of
redundant data
E.g.,Tom graduated. He notified the
registrar’s office but not the account office.
A business case study
Provide security
DBMS controls who
can add, view,
change, or delete
data in the database
Allow multi-user access
Controls concurrency
of access to data
DBMS function – manage concurrency
1
DBMS only
allows Mary to
work on the
2 price database.
There is a short
Before Mary is time window for
done, Bob Mary, e.g., 2
cannot access minutes.
the database.
Database Models
ISMT101
6 sections
Many students
Hierarchical model
Unique
feature:
The ability
to relate
tables
Bagel test
“Freakonomics”
Paul, trained as an economist, analyzed weapons
expenditure for the US Navy, in Washington DC.
Enron
100, $40
HKUST
IBM
50
100
$50
$98
IBM
100
$95
Enron
98, $45
Creating a DB
Step One: Develop a clear understanding of
the process of the business
“Alice, I want to
tell u sth…it’s
between us”
“OK…Bob…u
can post it on
the Big-Character-Word-Wall
@ UST”
“Alice, I want to
tell u sth…it’s
between us”
“OK…Bob…u
Write me a letter.
My address is
P.O. Box 1301” Rent a PO
mailbox
Send a letter to Get the letter
this public address using her
private key
Public/private key encryption
Big random Alice’s
number Key-making private key
K4D94KJ
algorithm
JD325K4 Alice’s
public key
“Hello Alice’s
Decrypt private key
Alice!”
Critical factors in private/public key encryption
One-to-one match
A public key is uniquely matched to a private key.
Anyone can encrypt using the public key, but only the
holder of the private key can decrypt.
Guaranteed by the mathematical algorithm
Secrecy depends on the secrecy of the private key.
Take-Away
DB helps reduce data redundancy and
I/M/D anomalies.
ER-diagram relational DB