Management Information Systems Lecture Notes
Management Information Systems Lecture Notes
Management Information Systems Lecture Notes
COURSE DESCRIPTION
Mode of Assessment
Participation 5 Mks
Attendance 5 Mks
Assignment/Individual Work 10 Mks
Continuous Assessment 10 Mks
End Of Semester Evaluation 70 Mks
1.0 Introduction
Information is defined as the processed form of data that is used for decision-making. There
are various types of information viz; strategic and tactical. The quality of information is
determined on the basis of several factors such as completeness and accuracy. Information
helps create a system which is defined as a collection of elements such as manpower and
production. You need to integrate all the elements of the system to achieve the organizational
goals. There are various types of systems such as physical and abstract and open and closed.
1.1 Fundamental Concept of Information System
An information system (IS) refers to a collection of people, processes, data, and technology
that work together to gather, store, process, retrieve, and distribute information within an
organization. Information systems play a vital role in managing and supporting various
aspects of an organization's operations, decision-making, and strategic planning.
The information system is a type of data processing systems which collects the data from
different sources, processes that data and generates information from the data to use them for
different applications within the organization. For example, in business context, the
information system collects data from various systems such as finance and sales systems at
the supplier side. The information system processes the data and generates information for
the customer. Customers provide feedback to the supplier depending on the information
processed by the information system. Figure 1.1 shows the information system in business
context
• Data: These are the raw material that can be a number, a fact, a sound, a picture or a
statement gathered from different sources. Data represent something that exists in the
real world such as business processes and employee details.
• Information: It is a meaningful data or a processed data. It defines the relation
between different types of data.
• System: It is a collection of components that help in achieving a common objective.
For example, in a human-machine system, the machine element consists of hardware
and software to perform computation and human makes decisions based on this
computation.
1.2 Components of Information System
An information system consists of two types of components—abstract system components
and physical system components. Abstract system components perform the operations such as
collecting input data, processing the data and generating information from that data. Physical
system components consist of various elements such as hardware, and human resources.
There are a few more components of the information system which are as follows:
• Data: These are the input that the system takes to produce information.
• Hardware: A computer and its peripheral equipment such as input, output and
storage devices are called hardware.
• Software: Software are application programmes or set of instructions that process the
input data using computers, generate information and store information for future use.
• People: People are an essential component of an information system. They include
end-users who interact with the system, IT professionals who develop and maintain
the system, and other stakeholders who use the system to accomplish their tasks.
• Procedures: Procedures define the rules, guidelines, and protocols that govern how
the information system is used. They include data entry processes, security protocols,
backup and recovery procedures, and other operational guidelines.
• Graphical User Interface (GUI): This is an interface for the users of information
system to work with information on the computer system. A user can operate, process
and retrieve information from the computer storage using GUI.
The components of information system describe the functioning of the system. An
information system takes the input data from the users of the information system to perform
the business operations. The users interact with the computer to process the data using GUI.
After processing of data, the information is retrieved at the user’s end.
1.3 Functions of an Information System:
Input: Gathering and capturing data or information from various sources, such as users,
sensors, or other systems.
Storage: Storing and organizing data in databases, files, or other data repositories for easy
access and retrieval.
The economic dimension of information determines the cost involved in obtaining the
information and the benefits that are derived from the information. Based on the cost and
benefits analysis of the information, economic dimensions of the information are evaluated.
Following are the factors that are determined during the cost and benefit analysis:
• Cost of information: It determines the total cost involved in obtaining the information.
The cost of information includes:
• Cost of acquiring the data from different data sources
• Cost of maintaining the data in the database
• Cost of generating the accurate information from the data stored in the database
• Cost of communicating the information to the intended receiver
➢ Business Dimension
The business dimension of information helps determine the relevance of information at the
various levels of the management. The business dimension of information at the top-level
management is totally different from the business dimension of information at the lower-level
management. The difference in business dimension arises from the difference in the level and
nature of work performed at the various levels of the management.
➢ Technical Dimension
The technical dimension of information covers the technical aspects of information such as
the volume of information to be stored in the database and type of database. The type of
database helps store the information in the database. The technical dimension covers the
storing capacity of the database and the time required to retrieve information from the
database.
2.0 Introduction
Management Information System or MIS is a well-structured method which combines the
principles, theories and practices of management using an information system. MIS plays an
important role in business organization for planning and decision-making process. It provides
managers with different tools which help organize, evaluate and run their departments
efficiently. MIS also provides information to the employees at various levels of management
for performing their respective jobs. In other words, MIS is an integrated computer-based
user-machine system that provides information to support the operations, management
analysis and decision-making functions in an organization.
2.1 Definition of MIS
After understanding the overview of MIS by studying the concept of management,
information and system, now you need to define and understand the term MIS as a whole.
MIS is an integrated system which collects, maintains, correlates and selectively displays
information to meet the specific needs of the various levels of management. It helps in
making decisions and taking actions for fulfilling the objectives of an organization. The
definition of the term ‘Management Information System’ varies from person to person. There
are various definitions of MIS given by different authors which are as follows:
According to Schwartz, ‘MIS is a system of people, equipment, procedures, documents and
communication that collects, validates, operates on transformers, stores, retrieves, and present
data for use in planning, budgeting, accounting, controlling and other management process.’
According to Coleman and Riley, ‘An MIS (a) applies to all management levels; (b) is
linked to an organizational subsystem; (c) functions to measure performance, monitor
progress, evaluate alternatives or provide knowledge for change or collective action, and (d)
is flexible both internally and externally.’
According to Davis and Olson, ‘[MIS is] an integrated user-machine system designed for
providing information to support operational control, management control and decision-
making functions in an organization. The information systems make use of resources such as
hardware, software, men, procedures as well as supplies.’
2.2 Goals of MIS
MIS is the most common type of management support systems. Various goals of MIS in an
organization are as follows:
• To provide information to managerial end-users to support their day-to-day decision-
making needs
• To produce reports for specific time periods designed for managers responsible for
specific functions in an organization. For example, departmental expense reports and
performance reports
• To provide correct information to the concerned manager at the right time
• To help in carrying out regular and routine operations
• To control, organize and plan better business operations
communications and updating databases of the organization. You can find the following
different types of operating support systems in an organization:
Transaction Processing Systems: A Transaction Processing System (TPS) allows you to
process and record data and helps produce reports from the processed data. It also represents
the automation of the general routine processes which are used to support business operations
in an organization.
Process Control Systems: A Process Control System (PCS) monitors and controls the
physical processes in an organization. While monitoring the physical processes, PCS handles
the architecture and mechanisms involved in the physical process. An example of a PCS is
the electronic sensors linked to computers used in pharmaceutical industries that help in
monitoring the chemical process and the adjustments need to be performed.
Office Automation Systems: Office automation systems refers to those information systems
in which computer and communication technology applications are used to process office
transactions and office activities at all levels of an organization. The office automation
systems provide secretarial assistance and enhanced communication facilities at different
level of management that helps improve the productivity of the managers at different levels.
The office automation system performs various activities such as typing, mailing, scheduling
of meetings, conferences, etc.
2. Management Support Systems
Management support systems include those information systems which emphasize on
providing information and support for effective decision-making by the managers of an
organization. The various management support systems are as follows:
• Management information system
• Decision support system
• Executive support system
i. Management Information System
Management information system is the information system that takes data as input and
processes the data to convert it into information as the output. Figure 2.1 shows the
processing of management information systems:
• Knowledge base: It contains information about the specific area for which the BES
can provide expert information.
• Inference engine: It specifies how you can deduce an inference from the stored data
and rules.
• User interface: It allows a user to communicate with BES.
Knowledge Management Systems: A Knowledge Management System (KMS) is a
knowledge-based information system that helps support in creation and distribution of
business knowledge to the managers and other employees of an organization. KMS also helps
in providing quick feedback to the employees and improving business performance of the
organization.
Strategic Information Systems: A Strategic Information System (SIS) is an information
system that helps an organization in achieving strategic advantage over its competitor by
applying Information Technology (IT) to the products and services of the organization.
Therefore, any information system such as TPS, DSS, ESS, etc., which uses IT for leveraging
an organization in the competition can be referred to as SIS.
Functional Business Systems: A Functional Business System (FBS) helps support the
various function areas such as production, marketing and accounting of an organization.
Examples of FBS include Financial Information System, Production Information System,
Marketing Information System, etc.
2.6 Subsystem and Upgrowth in Organizations
An information system consists of many subsystems. Subsystem refers to a part of
information system that plays a specific role in the working of information system. An
information system becomes effective only when all its component subsystems work
properly. Subsystems have a great importance for the end-users of the information system
since the subsystems are the integral part of any type of information system. These
subsystems are as follows:
• Real-life business subsystem
• Production subsystem
• Marketing subsystem
• Personnel subsystem
• Material subsystem
• Financial subsystem
• What is the relationship between the information and business system of the
organization and the end-users of the information system?
• What are the objectives of the management behind the implementation of the
information system in the organization?
• What is the importance of the information system for the organization?
• Why is understanding the business system important to analyst?
Answers to the above questions help the analyst of the information system to understand the
scope and complexity of the information system.
Production Subsystem; responsible for collecting all the information provided by the
production department of the organization.
Marketing Subsystem; responsible for collecting information about acquisition,
transportation, storage and delivering of the product of the organization.
Personnel Subsystem; responsible for maintaining information such as records of account,
employees and finance of the organization.
Material Subsystem; responsible for collecting information about materials used in different
departments of an organization.
Financial Subsystem; responsible for collecting all the information related to financial
management of the organization
2.7 Decomposition of System
Decomposition of system refers to the division of system into various subsystems. The
decomposition of system into various subsystems allows you to perform complex tasks with
greater ease. Moreover, the division of system into various subsystems leads to the
hierarchical representation of the operations. A system is divided into smaller units until the
smallest unit of the system becomes manageable at the system level. Figure 2.2 shows the
decomposition of a system.
Since most medium and large-sized companies have already installed computer systems, this
stage has already been achieved by most of the organizations.
Stage 2: Contagion
This stage is also known as expansion stage. This is the phase when most of the organizations
wish to have an access to the computer hardware, develop software and have the trained
manpower working. Every organization head wishes to have some computer resources
controlled by them.
Stage 3: Control
This stage is also known as formalism stage. During this stage, management notices that
benefits derived from MIS activity are not in proportion to the actual expenditure spent on it.
So, organizations exercise control over resources by implementing various formal control
processes and standards.
Stage 4: Integration
This stage is also known as maturity stage. By this stage, organizations gain enough
experience and maturity in IS applications. So, this stage mainly focuses on the integration of
applications so as to avoid duplications of efforts and systems. In this stage, controls are
adjusted and planning is performed in well-organized manner hence, this stage is called the
‘stage of perfection’.
Stage 5: Data Administration
This stage puts emphasis on managing corporate data rather than IT. So, management of data
becomes the crucial step at this stage. Database administrator (DBA) plays an important role
in the management of data. Since the data is being stored, used, manipulated and processed
from integrated files in the database, it is the responsibility of DBA to plan, supervise, control
and secure the data.
Stage 6: Maturity
This is the final stage of enhanced Nolan model. It shows that application portfolio (tasks like
orderly entry, material requirements planning, etc.) is completed and hence information flows
within an organization. It is assumed that by this stage, the applications have been
incorporated into the organizational functioning and these are as per the strategic
requirements of the organisation.
Review Questions
Short-Answer Questions
1. Write a short note on the single and the multiple process management information systems.
2. List various types of subsystem.
3. What do you understand by decomposition of subsystem?
Long-Answer Questions
1. Explain the concept of MIS in detail. What is the primary goal of MIS?
2. What is office automation system? Explain with examples.
3. Explain the structure of MIS.
4. Discuss the various characteristics of MIS.
5. Explain the various functions of MIS.
6. Discuss the various approaches that help describe the structure of MIS.
7. What are the bases for classifying MIS? Explain the different categories of
MIS?
3.0 Introduction
Database Management System (DBMS) is a software solution that allows you to create and
maintain databases in which data are stored. There are four types of data models: relational,
hierarchical, network and object-oriented that you can use to store data. Different individuals,
such as a database managers, perform separate roles to manage the database. DBMS supports
multiple-layered architecture that provides physical and logical data independence. Data
stored in the database can be accessed using different languages such as FML and SQL.
Database design is a process in which you create a logical data model for a database which
stores data of a company. You use the normalization technique to create the logical data
model for a database and eliminate data redundancy. Normalization also allows you to
organize data efficiently in a database and reduce anomalies during data operations. Various
normalization forms, such as first, second and third can be applied to create a logical data
model for a database. Second and third normal forms are based on partial dependency and
transitive dependency. Partial dependency occurs when a row of a table is uniquely identified
by one column that is a part of a primary key. A transitive dependency occurs when a non-
key column is uniquely identified by values in another non-key column of a table. In this
unit, you will learn about the concept of DBMS, its functions, types and benefits.
3.1 Unit Objectives
After going through this unit, you will be able to:
• Define the concept of DBMS
• Explain the architecture of DBMS
• Describe the different data models
• Explain the process of designing of database
• Identify the issues of DBMS
3.2 Overview of DBMS
Database Management System (DBMS) is a software solution that allows you to create and
maintain databases in which you can store data. It basically refers to a system which helps
store and retrieve the data systematically from a database. The different users such as
database manager perform separate roles to manage the database in DBMS which supports
multiple-layered architecture that provides physical and logical data independence.
Constructing a database is a process of storing data on some storage medium such as floppy
drive, compact disk (CD) or hard disk drive (HDD). Manipulating a database involves
performing functions such as querying the database to retrieve specific data, updating the
database to reflect changes made by the user and generating reports from the data.
DBA is responsible for making the strategy and policy decisions regarding the organization
of data in the database. DBA also provides technical support in implementing the decisions
which are taken by the data administrator. DBA performs the following functions:
• Defining the conceptual schema for a database
• Defining the internal schema for a database
• Coordinating with users
• Defining security and integrity constraints for the database
• Defining dump and reload policies for a database
• Monitoring performance and responding to changing requirements
2. Database Designers
A database designer identifies the data to be stored in a database. The database designer is
also responsible for choosing the right database structure to represent and store the data in the
database. The tasks of identifying the data and choosing the structure are performed before
the implementation of a database. The database designer communicates with the various
database users to understand their requirements before selecting the database structure.
3. Database Users
The database users are the people who need to interact with DBMS. The database users can
be categorized according to their requirements of data. The people who interact with DBMS
to retrieve data are called the naïve users and the people who interact with DBMS to make
some changes in the database are called the developers.
4. Database Manager
The database manager refers to the software that helps use and management of the data stored
in a database. The database manager handles the requests of database users to access the data
items from database. The database manager also provides facilities such as support for a
query language, to retrieve and update the database. The facilities provided by the database
manager depend on the design of the database manager. For example, if the data manager is
designed to handle one request at a time,
3.2.3 Benefits of DBMS
DBMS provides various advantages that make it useful for storing and maintaining the data.
Following are the advantages of DBMS:
• Preventing data redundancy
• Restricting unauthorized access
• Persistent storage
• Multiple user interfaces
• Integrity constraints
• Backup and recovery of data
3.3 Types of Database
Nowadays, there also exist three new types of databases: parallel database, distributed
database and object-oriented databases.
3.3.1 Parallel Databases
Parallel databases use parallel processors for computing. These databases use high-speed
processors, memory and disks. Parallel databases uses relational data model which uses SQL
query language to manipulate the data.
3.3.2 Distributed Databases (DDBs)
Distributed Databases (DDBs) store data over a computer network. In these databases, data
may be stored in multiple computers located at the same physical location or spread over a
network. It also helps in solving many problems such as data distribution and transaction
processing.
3.3.3 Object-Oriented Databases
These databases use the object-oriented programming languages such as C++ or java. Object-
oriented databases have salient features that are inheritance, encapsulation and
polymorphism.
3.4 Data Models
A data model in DBMS is defined as a collection of concepts which is used to describe the
structure of a database. Data model describes logical structure of a database by considering
following concepts:
• Structure: It represents how the data are organized in a database. The data can be
organized using hierarchical, network, relational or object-oriented data model.
• Integrity: It provides a definition of rules to indicate whether or not the defined
structure can be used to organize data in a database.
• Manipulation: It provides a language in which you can update the data in a database.
• Querying data: It provides a language in which the data in the database are queried.
For DBMS implementation you can use various data models which include all database-
related concepts for describing the structure of a database. The various data models used in
DBMS are as follows:
• Hierarchical
• Network
• Relational
• Object-oriented
3.4.1 Hierarchical Model
Data models can be defined as a collection of various concepts which are used to describe the
structure of a database. Implementing a data model includes specifying data types,
relationship among data types and the constraint on the data. In the Hierarchical model also
called Hierarchical schema, data are organized in the form of a tree structure. Hierarchical
model supports the concept of data independence
Hierarchical model uses two types of data structures, records and parent-child relationship to
define the data and relationship among data. Records can be defined as a set of field values
which are used to provide information about an entity. An entity is a collection of object in a
database which can be described by using a set of attributes. Records of same type can be
easily grouped together to form a record type and assigned a name.
Parent-Child Relationship (PCR) can be defined as a 1: N relationship between two different
record types. The record type on the 1-side is called parent record type and record type on the
N-side is called child record type. The Figure below shows an example of 1: N relationship
between a finance department and the employees of finance department.
Department Employee
can be described by using a set of attributes. Records that have a same type can be easily
grouped together to form a record type and assigned a name. The structure of a record type
can be defined by using a collection of named fields or data items. Each data item or field has
a certain data type such as character, float or integer. The figure below represents a record
type employee that has data items name, sex and birth-date.
Set type is a description of a 1:N relationship between two record types. Each set type
definition has following elements:
• Name for set type
• Owner record type
• Number record type
3.4.3 Relational Data Model
In a relational data model, data is stored in tables which are also called relations. The related
tables or relations in the relational data model form a database. The properties of relational
data model are as follows:
• Each row in a table is unique from every other row in the table.
• Each row contains atomic data which implies that data are not repeated and do not
contain structures such as arrays.
In a relational model, tables are used to organize data. A table consists of columns or fields
that represent attributes of an entity. Each row or tuple in a table represents occurrence of an
entity and must consist of a value that uniquely identifies the row. Such a column that
uniquely identifies the rows or tuples in table is called the primary key. The relational model
also consists of foreign keys that allow joining data of two tables. To understand relational
model consider the following table below that represents the customers database.
Table 1: Customer Database
In the above Table, Cust_name represents the name of the customers, Cust_id is the unique
number for each customer and Cust_city represents the city of the customers.
Relational data model makes use of the set theory and is based on the concept of
mathematical relation which contains several data elements. The basic characteristics of the
relational model are relational algebra and relational calculus. Relational algebra is a set of
operations for manipulating relations and specifying queries. Relational calculus provides a
declarative way to specify database queries. The relational algebra and the relational calculus
are two different means of representing the database queries. Any relational algebraic
expression can also be converted into a corresponding expression in the relational calculus
and vice versa.
Relations
A relation is a two-dimensional table which is used to represent data in the form of rows and
columns. The names of the columns are known as attributes and rows are known as tuples of
the relation. There are various parts of a relation which are as follows:
• Domain: It is a set of atomic values. The values that cannot be divided into
subcomponents are called atomic values. Generally, you specify a domain as a data
type from which the values forming the domain are taken. You should also give a
name to a domain to help interpret its values.
• Tuple: In relational data model, a row is termed as tuple that gives complete
information of an entity.
• Attribute: It is a column header in a relation that represents the attributes of an entity.
Data mapping is the process of creating data element mappings between two distinct data
models. Data mapping is used as a first step for a wide variety of data integration tasks
including: Data transformation or data mediation between a data source and a destination.
It is a process used in data warehousing by which different data models are linked to each
other using a defined set of methods to characterize the data in a specific definition. This
definition can be any atomic unit, such as a unit of metadata or any other semantic. This data
linking follows a set of standards, which depends on the domain value of the data model
used. Data mapping serves as the initial step in data integration.
3.6 Designing of Database
Database design is a process in which you create a logical data model for a database which
stores data of a company. The goal of designing of database schema is to minimize the
storage space which is occupied by the data stored on the hard drive. Database anomalies are
the errors in the data contained in the database that reduces the performance of Database
Management System (DBMS). The database anomalies also affect the performance of the
DBMS by increasing the size of data files. The following type of database anomalies can
increase the size of data files:
• Insertion anomalies: These occur when it becomes difficult to insert a data in the
database. You cannot insert the data having null values in a table which has a primary
key constraint. So, when you have a record that contains values for all the columns
apart from the primary key column, you cannot insert that record into the table. This
restricts the ability of inserting the records into the database.
• Deletion anomalies: These occur when the deletion of a particular record affects the
existence of a particular relation in the database. For example, in a database, a table
contains the records of students. The subject column of the table contains the
information about the subjects which the students have opted. Now, if you delete all
the records for the multimedia subject, then you can lose the information about the
students who are studying only multimedia.
• Modification anomalies: These occur when a database user changes the value of a
data item and the value of that data item does not change in other tables.
3.7 Normalization
Normalization is integral to the database design and it can be defined as the process of
eliminating the redundancy of data in a database. A relational table in a database is said to be
in a normal form if it satisfies certain constraints. The normalization process involves various
levels of normal forms that allow you to separate the data into multiple related tables. The
various normal forms are first normal form (1NF), second normal form (2NF), third normal
form (3NF), fourth normal form (4NF) and fifth normal Form (5NF).
The goals of normalization are as follows:
• Removing the redundant data
A unique Student_id number of a student is a primary key in the STUDENTS table. You
cannot make the first or last name of a student a primary key because more than one student
can have the same first name and can have same stream.
➢ Functional Dependency
A functional dependency is a constraint between two sets of attributes from the database.
Functional dependency is represented by X Y between two attributes, X and Y, in a table.
The functional dependency X Y implies that Y is functionally dependent on X. The Table
below lists the various attributes in the EMPLOYEE table.
Table 3: Employee Table
In the table above, the various attributes of the EMPLOYEE are Employee_id,
Employee_name and Employee_dept. You can state that:
Employee_id “ >Employee_name
The above representation that the Employee_name attribute is functionally dependent on the
Employee_id implies that the name of an employee can be uniquely identified from id of the
employee. However, you cannot uniquely identify the Employee_id from the
Employee_name column because more than one employee can have the same name.
However, each employee has different value in the Employee_id column.
Functional dependencies are a type of constraints based on keys such as primary key or
foreign key. For a relation table R, a column Y is said to be functionally dependent on a
column X of the same table if each value of the column X is associated with only one value
of the column Y at a given time. All the columns in the relational table R should be
functionally dependent on X if the column X is a primary key.
If the columns X and Y are functionally dependent, the functional dependency can be
represented as:
R.x R.y
For example, consider the following functional dependency in a table. Employee_id
Salary, the column Employee_id functionally determines the
Salary column because the salary of each employee is unique and remains the same for an
employee, each time the name of the employee appears in the table.
A functional dependency, represented by X Y, between two sets of attributes, X and
Y, that are subsets of R, is called as trivial functional dependency if Y is a subset of X. For
example, Employee_id Project is a trivial functional dependency.
Data mining refers to extracting or mining knowledge from large amounts of data. The term
is actually a misnomer. Thus, data mining should have been more appropriately named as
knowledge mining which emphasis on mining from large amounts of data.
It is the computational process of discovering patterns in large data sets involving methods at
the intersection of artificial intelligence, machine learning, statistics, and database systems.
The overall goal of the data mining process is to extract information from a data set and
transform it into an understandable structure for further use.
unknown after data are collected, or it is partially and implicitly given in the data-collection
procedure. It is very important, however, to understand how data collection affects its
theoretical distribution, since such a priori knowledge can be very useful for modelling and,
later, for the final interpretation of results. Also, it is important to make sure that the data
used for estimating a model and the data used later for testing and applying a model come
from the same, unknown, sampling distribution. If this is not the case, the estimated model
cannot be successfully used in a final application of the results.
3. Pre-processing the data
In the observational setting, data are usually "collected" from the existing databases, data
warehouses, and data marts. Data pre-processing usually includes at least two common tasks:
1. Outlier detection (and removal) – Outliers are unusual data values that are not consistent
with most observations. Commonly, outliers result from measurement errors, coding and
recording errors, and, sometimes, are natural, abnormal values. Such no representative
samples can seriously affect the model produced later. There are two strategies for dealing
with outliers:
a. Detect and eventually remove outliers as a part of the pre-processing phase, or b. Develop
robust modelling methods that are insensitive to outliers.
2. Scaling, encoding, and selecting features – Data pre-processing includes several steps such
as variable scaling and different types of encoding. For example, one feature with the range
[0, 1] and the other with the range [−100, 1000] will not have the same weights in the applied
technique; they will also influence the final data-mining results differently. Therefore, it is
recommended to scale them and bring both features to the same weight for further analysis.
Also, application-specific encoding methods usually achieve dimensionality reduction by
providing a smaller number of informative features for subsequent data modelling.
These two classes of pre-processing tasks are only illustrative examples of a large
spectrum of pre-processing activities in a data-mining process.
Data-pre-processing steps should not be considered completely independent from other data-
mining phases. In every iteration of the data-mining process, all activities, together, could
define new and improved data sets for subsequent iterations. Generally, a good pre-
processing method provides an optimal representation for a data-mining technique by
incorporating a priori knowledge in the form of application-specific scaling and
encoding.
4. Estimate the model
The selection and implementation of the appropriate data-mining technique is the main task
in this phase. This process is not straightforward; usually, in practice, the implementation is
based on several models, and selecting the best one is an additional task. The basic principles
of learning and discovery from data are given in Chapter 4 of this book. Later, Chapter 5
through 13 explain and analyze specific techniques that are applied to perform a successful
learning process from data and to develop an appropriate model.
5. Interpret the model and draw conclusions
In most cases, data-mining models should help in decision making. Hence, such models need
to be interpretable in order to be useful because humans are not likely to base their decisions
on complex "black-box" models. Note that the goals of accuracy of the model and accuracy
of its interpretation are somewhat contradictory. Usually, simple models are more
interpretable, but they are also less accurate. Modern data-mining methods are expected to
yield highly accurate results using high dimensional models. The problem of interpreting
these models, also very important, is considered a separate task, with specific techniques to
validate the results. A user does not want hundreds of pages of numeric results. He does not
understand them; he cannot summarize, interpret, and use them for successful decision
making.
example, a transaction system may hold the most recent address of a customer, where a data
warehouse can hold all addresses associated with a customer.
Non-volatile: Once data is in the data warehouse, it will not change. So, historical data in a
data warehouse should never be altered.
4.2.1 Data Warehouse Design Process:
A data warehouse can be built using a top-down approach, a bottom-up approach, or a
combination of both.
The top-down approach starts with the overall design and planning. It is useful in cases where
the technology is mature and well known, and where the business problems that must be
solved are clear and well understood.
The bottom-up approach starts with experiments and prototypes. This is useful in the early
stage of business modelling and technology development. It allows an organization to move
forward at considerably less expense and to evaluate the benefits of the technology before
making significant commitments.
In the combined approach, an organization can exploit the planned and strategic nature of the
top-down approach while retaining the rapid implementation and opportunistic application of
the bottom-up approach.
The warehouse design process consists of the following steps:
➢ Choose a business process to model, for example, orders, invoices, shipments,
inventory, account administration, sales, or the general ledger. If the business process
is organizational and involves multiple complex object collections, a data warehouse
model should be followed. However, if the process is departmental and focuses on the
analysis of one kind of business process, a data mart model should be chosen.
➢ Choose the grain of the business process. The grain is the fundamental, atomic level
of data to be represented in the fact table for this process, for example, individual
transactions, individual daily snapshots, and so on.
➢ Choose the dimensions that will apply to each fact table record. Typical dimensions
are time, item, customer, supplier, warehouse, transaction type, and status.
➢ Choose the measures that will populate each fact table record. Typical measures are
numeric additive quantities like dollars sold and units sold.
OLAP model is an extended relational DBMS that maps operations on multidimensional data
to standard relational operations.
A multidimensional OLAP (MOLAP) model, that is, a special-purpose server that directly
implements multidimensional data and operations.
Tier-3:
The top tier is a front-end client layer, which contains query and reporting tools, analysis
tools, and/or data mining tools (e.g., trend analysis, prediction, and so on).
4.2.3 Data Warehouse Models:
There are three data warehouse models.
1. Enterprise warehouse:
An enterprise warehouse collects all of the information about subjects spanning the entire
organization.
It provides corporate-wide data integration, usually from one or more operational systems or
external information providers, and is cross-functional in scope.
It typically contains detailed data as well as summarized data, and can range in size from a
few gigabytes to hundreds of gigabytes, terabytes, or beyond.
An enterprise data warehouse may be implemented on traditional mainframes, computer
super servers, or parallel architecture platforms. It requires extensive business modelling and
may take years to design and build.
2. Data mart:
A data mart contains a subset of corporate-wide data that is of value to a specific group of
users. The scope is confined to specific selected subjects. For example, a marketing data mart
may confine its subjects to customer, item, and sales. The data contained in data marts tend to
be summarized.
Data marts are usually implemented on low-cost departmental servers that are
UNIX/LINUX- or Windows-based. The implementation cycle of a data mart is more likely to
be measured in weeks rather than months or years. However, it may involve complex
integration in the long run if its design and planning were not enterprise-wide.
Depending on the source of data, data marts can be categorized as independent or
dependent. Independent data marts are sourced from data captured from one or more
operational systems or external information providers, or from data generated locally within a
particular department or geographic area. Dependent data marts are sourced directly from
enterprise data warehouses.
3. Virtual warehouse:
A virtual warehouse is a set of views over operational databases. For efficient query
processing, only some of the possible summary views may be materialized.
A virtual warehouse is easy to build but requires excess capacity on operational database
servers.
5.0 Introduction
The retrieval systems are usually in a state of continuous gradual revision; data are added or
withdrawn; new index points inserted; syndetic relationship changed. The development of
effective retrieval technique has been the core of IR research for more than 30 years.
Nowadays multimedia indexing and retrieval techniques are being developed to access
image, video and sound database without text descriptions.
5.1 Information Retrieval
Information Retrieval (IR) is finding material (usually documents) of an unstructured nature
(usually text) that satisfies an information need from within large collections (usually stored
on computers). Information retrieval technology has been central to the success of the Web.
Information Retrieval is the process of obtaining relevant information from a collection of
informational resources. It does not return information that is restricted to a single object
collection but matches several objects which vary in the degree of relevancy to the query. So,
we have to think about what concepts IR systems use to model this data so that they can
return all the documents that are relevant to the query term and ranked based on certain
importance measures. These concepts include dimensionality reduction, data modelling,
ranking measures, clustering etc. These tools that IR systems provide would help you get
your results faster. So, while computing the results and their relevance, programmers use
these concepts to design their system, think of what data structures and procedures are to be
used which would increase speed of the searches and better handling of data.
Generally, Information retrieval, as the name implies, concerns the retrieving of
relevant information from the collection of information. It is basically concerned with
facilitating the user’s access to large amounts of (predominantly textual) information. The
process of information retrieval involves the following stages:
• Representing Collections of Documents - how to represent, identify and process the
collection of documents.
• User-initiated querying - understanding and processing of the queries.
• Retrieval of the appropriate documents - the searching mechanism used to obtain and
retrieve the relevant document
5.2 What is an IR system?
An IR system accepts a query from a user and responds with a set of documents. The system
returns both relevant and non-relevant material and a document organization approach
are applied to assist the user finding the relevant information in the retrieved set.
Let’s illustrate by means of a black box what a typical IR system would look like. The
diagram shows three components: input, processor and output. Such a trichotomy may seem
a
Compiled by Ngwain Ndong Blasius 36
little trite, but the components constitute a convenient set of pegs upon which to hang a
discussion.
The main problem here is to obtain a representation of each document and query suitable for
a computer to use. Let me emphasize that most computer-based retrieval systems store only a
representation of the document (or query) which means that the text of a document is lost
once it has been processed for the purpose of generating its representation. A document
representative could, for example, be a list of extracted words considered to be significant.
Rather than have the computer process the natural language, an alternative approach is to
have an artificial language within which all queries and documents can be formulated.
It is necessary to define the text database before any of the retrieval processes are initiated.
This is usually done by the manager of the database and includes specifying the following
– The documents to be used
– The operations to be performed on the text
– The text model to be used (the text structure and what elements can be retrieved) the text
operations transform the original documents and the information needs and generate a logical
view of them
Once the logical view of the documents is defined, the database module builds an index of
the text
– An index is a critical data structure
– It allows fast searching over large volumes of data
Different index structures might be used, but the most popular one is the inverted file (more
on this later). Given the document database is indexed, the retrieval process can be
initiated. The user first specifies a user need which is then parsed and transformed
by the same text operation applied to the text. Then the query operations might be applied
before the actual query, which provides the system representation for the user need, is
generated. Matching- The query is then processed to obtain the retrieved documents. Before
the retrieved documents are sent to the user, the retrieved documents are ranked according to
the likelihood of relevance.
The user then examines the set of ranked documents in the search for useful information
• Two choices for the user
– Reformulate query, run on entire collection
– Reformulate query, run on result set
At this point, he might pinpoint a subset of the documents seen as definitely of interest and
initiate a user feedback cycle. In such a cycle, the system uses the documents selected by the
user to change the query formulation. Hopefully, this modified query is a better
representation of the real user need.
The black box is the processing part of the information retrieval system; it includes mainly
indexing and searching
➢ Disgruntled employees/contractors
Internal attacks are one of the biggest threats facing our data and systems. Rogue employees,
especially members of the IT team with knowledge of and access to networks, data centres
and admin accounts, can cause serious damage to an organizations network, systems and
data.
➢ Lack of employee security awareness
Security awareness training for employees helps to eradicate risky behaviours that could
potentially lead to cyber breaches. Training programs could address some of the threats faced
by an organization, especially attacks such as phishing emails, ransomware, and social
engineering scams via the telephone, text message, or social media channels.
➢ Social engineering
The term “social engineering” refers to a set of techniques used to manipulate people into
divulging confidential information. Although it is similar to a confidence trick or simple
fraud, the term typically applies to trickery for information gathering or computer system
access. In most cases the attacker never comes face-to-face with the victim.
7.4. Standards for Information Security Activities
Information security activities cannot be effectively performed without the mobilization of a
unified administrative, physical and technical plan.
Many organizations have recommended standards for information security activities.
Examples include the International Organization for Standardization and International
Electrotechnical Commission (ISO/IEC), International Telecommunication Union (ITU-U),
information security requirements and evaluation items of the Certified Information Systems
Auditor (CISA) of the Information Systems Audit and Control Association (ISACA), and
Certified Information Systems Security Professional (CISSP) of the International Information
System Security Certification Consortium (ISC). These standards recommend unified
information security activities, such as the formulation of an information security policy, the
construction and operation of an information security organization, human resources
management, physical security management, technical security management, security audit
and business continuity management.
The table below lists the standards related to information security domains.
Table 5: Information security domains and related standard and certifications
Security domains
ISO/IEC 27001 CISA CISSP
Information Security Governance and Security Architecture and
Policy Management of IT Engineering
Organization of
Information Security
Human Resources
Security
Information Security
Incident Management
Given the trends in security threats and attack technologies, a robust defense requires a
flexible strategy that allows adaptation to the changing environment, well-defined policies
and procedures, the use of appropriate security technologies, and constant vigilance.
It is helpful to begin a security improvement programme by determining the current state of
security. Integral to a security programme are documented policies and procedures, as well as
technology that supports their implementation.
A. Administrative Security
Administrative security consists of an information security strategy, policy and guidelines.
An information security strategy sets the direction for all information security activities.
An information security policy is a documented high-level plan for organization-wide
information security. It provides a framework for making specific decisions, such as an
administrative and physical security plan.
Information security guidelines should be established according to the information security
strategy and policy. The guidelines should specify regulations for each area related to
information security. And because the guidelines must be comprehensive and national in
scope, they must be developed and delivered by the government for observance by
organizations.
A country’s information security strategy, policy and guidelines should be in compliance
with related law. Their scope should be within the boundaries of national and international
laws.
B. Technological security
Various technologies have been developed to help organizations secure their information
systems against intruders. These technologies help to protect systems and information against
attacks, to detect unusual or suspicious activities, and to respond to events that affect security.
Today’s security systems have been designed and developed based on a Defense-In-Depth
(DID) model that leads to unified management of the technologies involved. This model is
different from perimeter defence, which has only one layer of defence against all threats. The
DID model consists of prevention, detection and tolerance, with threats being reduced at each
phase
Prevention Technology
Prevention technologies protect against intruders and threats at the storage or system level.
These technologies include the following:
1. Cryptography – Also referred to as encryption, cryptography is a process of
translating information from its original form (called plaintext) into an encoded,
incomprehensible form (called ciphertext). Decryption refers to the process of taking
ciphertext and translating it back into plaintext.
2. One-time passwords (OTPs) – As the name implies, OTPs can be used only once.
Static passwords can more easily be accessed by password loss, password sniffing,
brute-force password cracks, and the like.
3. Firewalls – Firewalls regulate some of the flow of traffic between computer networks
of different trust levels such as between the Internet, which is a no-trust zone, and an
internal network, which is a zone of higher trust
4. Vulnerability analysis tool –In computer security, a vulnerability is a weakness that
allows an attacker to violate a system. Vulnerabilities may result from weak
passwords, software bugs, a computer virus, a script code injection, an SQL injection
or malware. Vulnerability analysis tools detect these vulnerabilities.
Detection Technology
Detection technology is used to detect and trace abnormal states and intrusion in networks or
important systems. Detection technology includes the following:
1. Antivirus – An antivirus software is a computer program for identifying, neutralizing
or eliminating malicious code, including worms, phishing attacks, rootkits, Trojan
horses and other malware.
2. Intrusion detection system (IDS) – An IDS gathers and analyses information from
various areas within a computer or a network to identify possible security breaches.
Intrusion detection functions include analysis of abnormal activity patterns and ability
to recognize attack patterns.
3. Intrusion prevention system (IPS) – Intrusion prevention attempts to identify potential
threats and respond to them before they are used in attacks. An IPS monitors network
traffic and takes immediate action against potential threats according to a set of rules
established by the network administrator. For example, an IPS might block traffic
from a suspicious IP address.
4. Malware sand box system – A "malware sandbox" is a security system that separates
execution of programs, usually in an effort to mitigate malware from spreading. It is
often used to execute untested or untrusted programs or code, possibly from
unverified or untrusted third parties, suppliers, users or websites, in a “sandbox”
without risking harm to the host machine or operating system. The sandbox typically
tightly controls the programs, and restricts the program’s access to disk, memory and
network.
5. Network Traffic Analysis (NTA) – Network traffic analysis is an active cyber defence
activity. It is "the process of proactively and iteratively searching through networks to
detect and isolate advanced threats that evade existing security solutions”
6.6. Protection of Privacy
This section aims to:
• Trace changes in the concept of privacy;
• Describe international trends in privacy protection; and
• Give an overview and examples of Privacy Impact Assessment
6.6.1. The Concept of Privacy
Personal information is any information relating to an identifiable individual or an identified
or identifiable natural person. It includes information such as an individual’s name, phone
number, address, e-mail address, licence number of an automobile, physical characteristics
(facial dimensions, fingerprints, handwriting, etc.), credit card number and family
relationship.
Inappropriate access to and collection, analysis and use of an individual’s personal
information have an effect on the behaviour of others towards that individual, and ultimately
have a negative impact on his/her social standing, property and safety. Therefore, personal
information should be protected from improper access, collection, storage, analysis and use.
In this sense, personal information is the subject of protection.
When the subject of protection is the right to personal information rather than the personal
information itself, this is the concept of privacy. There are five ways to explain the right to
privacy:
• The right to be free from unwanted access (e.g., physical access and access via short
messaging service)
• The right not to allow personal information to be used in an unwanted way (e.g., sale
of information, exposure of information and matching)
• The right not to allow personal information to be collected by others without
one’s knowledge and consent (e.g., through the use of CCTV and cookies)
• The right to have personal information expressed accurately and correctly (i.e.
integrity)
• The right to get rewarded for the value of one’s own information
United Nations guidelines related to protection of privacy
Since the late 1960s, the world has paid attention to the effect on privacy of automated
information processing. UNESCO in particular has shown interest in privacy and privacy
protection since the “UN Guidelines for the Regulation of Computerized Personal Data File”
was adopted by the General Assembly in 1990.
The United Nations Guidelines are applied to documents (papers) as well as computerized
data files in the public or private sectors. The Guidelines establish a series of principles
concerning minimum guarantees to be provided for national legislation or in the internal laws
of international organizations, as follows:
Departures from principles 1 to 4 may be authorized only if they are necessary to protect
national security, public order, public health or morality, as well as, inter alia, the rights and
freedoms of others, especially persons being persecuted (humanitarian clause), provided that
such departures are expressly specified in a law or equivalent regulation promulgated in
accordance with the internal legal system that expressly states their limits and sets forth
appropriate safeguards.
7. Principle of security
Appropriate measures should be taken to protect the files against both natural dangers, such
as accidental loss or destruction, and human dangers, such as unauthorized access, fraudulent
misuse of data or contamination by computer viruses.
Because a PIA is conducted to analyse the privacy invasion factor when a new system is
built, it should be performed at the early phase of development, when adjustments to
development specifications are still possible. However, when a serious invasion risk occurs in
collecting, using and managing personal information while operating the existing service, it
would be desirable to perform a PIA and then modify the system accordingly.
7.0 Introduction
Information systems analysis and design is a method used by companies ranging from IBM
to PepsiCo to Sony to create and maintain information systems that perform basic business
functions such as keeping track of customer names and addresses, processing orders, and
paying employees. The main goal of systems analysis and design is to improve organizational
systems, typically through applying software that can help employees accomplish key
business tasks more easily and efficiently. As a systems analyst, you will be at the center of
developing this software.
The analysis and design of information systems are based on: Your understanding of the
organization’s objectives, structure, and processes Your knowledge of how to exploit
information technology for advantage To be successful in this endeavour, you should follow
a structured approach.
7.1 The Systems Development Life Cycle (SDLC)
The SDLC is a structured approach used in the field of software engineering to guide the
development of information systems and software applications. It encompasses a series of
phases or stages that help ensure the successful planning, design, development,
implementation, and maintenance of a system. Here are the typical phases of the SDLC:
The phase involves the actual development of the system. Programmers write code based on
the design specifications, and databases are created and populated with data. This phase may
also involve integrating third-party components or customizing existing software. Testing is
an integral part of implementation to identify and fix any defects or issues.
Stage 4: Testing– Let’s Create the System
In this phase, the system is thoroughly tested to ensure it meets the specified requirements
and functions correctly. Different testing techniques, such as unit testing, integration testing,
system testing, and user acceptance testing, are employed to validate the system's
functionality, performance, and reliability. Defects and issues are identified and resolved
during this phase.
The Waterfall model is a linear and sequential approach to software development. It follows a
strict top-down flow, where each phase (requirements, design, implementation, testing,
deployment) is completed before moving to the next. It is a plan-driven methodology and
works well for projects with well-defined and stable requirements.
b. Agile Model:
Agile methodologies, such as Scrum, Kanban, and Extreme Programming (XP), promote an
iterative and incremental approach. They emphasize flexibility, collaboration, and
adaptability to change. Agile methodologies prioritize delivering working software in short
iterations called sprints, gathering feedback from stakeholders, and continuously improving
the product.
c. Spiral Model:
The Spiral model is an iterative and risk-driven approach that combines elements of the
Waterfall model and prototyping. It involves multiple iterations where each iteration includes
requirements gathering, risk analysis, prototyping, development, and testing. The Spiral
model is suitable for projects with high-risk factors that require a flexible and iterative
approach.
The Iterative model incorporates a series of smaller “waterfalls,” where manageable portions
of code are carefully analyzed, tested, and delivered through repeating development cycles.
Getting early feedback from an end user enables the elimination of issues and bugs in the
early stages of software creation.
The Iterative model is often favored because it is adaptable, and changes are comparatively
easier to accommodate.
e. V-Model
8.0 Introduction
It probably goes without saying that the security and ethical issues raised by the Information
Age, and specifically the Internet, are the most explosive to face our society in decades. It
will be many years and many court battles before socially acceptable policies and practices
are in place. You say to yourself, “Hey I don’t really care about my online privacy. Nobody
will ever care about what I do or where I go on the Internet.” Well, you might want to think
twice about that.
Organizations nowadays are having strict policies and measures in terms of ethical concerns
pertaining to information management, training is provided which helps them to engage in
learning about the conduct as well as learning to resolve issues when they arise. Workplace
policies are based on the company’s mission statement and the philosophy they follow and
help employees follow that code of conduct.
8.1 Intellectual Property Rights and Copyright Laws
Intellectual property (IP) refers to the creations of the human mind like inventions, literary
and artistic works, and symbols, names, images and designs used in commerce. Intellectual
property is divided into two categories: Industrial property, which includes inventions
(patents), trademarks, industrial designs, and geographic indications of source; and
Copyright, which includes literary and artistic works such as novels, poems and plays, films,
musical works, artistic works such as drawings, paintings, photographs and sculptures, and
architectural designs. Rights related to copyright include those of performing artists in their
performances, producers of phonograms in their recordings, and those of broadcasters in their
radio and television programs. Intellectual property rights protect the interests of creators by
giving them property rights over their creations.
The most noticeable difference between intellectual property and other forms of property,
however, is that intellectual property is intangible, that is, it cannot be defined or identified
by its own physical parameters. It must be expressed in some discernible way to be
protectable.
8.1.1 Types of Intellectual Property
The term intellectual property is usually thought of as comprising four separate legal fields:
1. Trademarks
2. Copyrights
3. Patents
4. Trade secrets
1. Trademarks and Service Marks: A trademark or service mark is a word, name, symbol,
or device used to indicate the source, quality and ownership of a product or service. A
trademark is used in the marketing is recognizable sign, design or expression which identifies
products or service of a particular source from those of others. The trademark owner can be
an individual, business organization, or any legal entity. A trademark may be located on a
package, a label, a voucher or on the product itself. For the sake of corporate identity
trademarks are also being.
2. Copyrights:
Copyright is a form of protection provided by U.S. law (17 U.S.C 101 et seq) to the authors
of "original works of authorship" fixed in any tangible medium of expression. The manner
and medium of fixation are virtually unlimited. Creative expression may be captured in
words, numbers, notes, sounds, pictures, or any other graphic or symbolic media. The subject
matter of copyright is extremely broad, including literary, dramatic, musical, artistic,
audiovisual, and architectural works. Copyright protection is available to both published and
unpublished works.
3. Patents:
A patent for an invention is the grant of a property right to the inventor, issued by the United
States Patent and Trademark Office. Generally, the term of a new patent is 20 years from the
date on which the application for the patent was filed in the United States or, in special cases,
from the date an earlier related application was filed, subject to the payment of maintenance
fees. U.S. patent grants are effective only within the United States, U.S. territories, and U.S.
possessions. Under certain circumstances, patent term extensions or adjustments may be
available.
There are three types of patents:
Utility patents may be granted to anyone who invents or discovers any new and useful
process, machine, article of manufacture, or composition of matter, or any new and useful
improvement thereof.
Design patents may be granted to anyone who invents a new, original, and ornamental
design for an article of manufacture; and
Plant patents may be granted to anyone who invents or discovers and asexually reproduces
any distinct and new variety of plant.
4. Trade Secrets: A trade secret consists of any valuable business information. The
business secrets are not to be known by the competitor. There is no limit to the type of
information that can be protected as trade secrets; For Example: Recipes, Marketing plans,
financial projections, and methods of conducting business can all constitute trade secrets.
There is no requirement that a trade secret be unique or complex; thus, even something as
simple and nontechnical as a list of customers can qualify as a trade secret as long as it
affords its owner a competitive advantage and is not common knowledge.
8.2 Ethical Considerations in Information Management
Ethical considerations in information management are crucial to ensure the responsible and
proper handling of data and information. Some key ethical considerations in information
management include:
1. Privacy: Respecting individual privacy is of utmost importance. Organizations should
collect, store, and use personal information only with the informed consent of
individuals, and they should take appropriate measures to protect the confidentiality
of that information.
2. Data Security: Safeguarding data from unauthorized access, breaches, or misuse is
essential. Organizations should implement robust security measures, including
encryption, access controls, and regular monitoring, to protect sensitive information.
3. Data Accuracy and Quality: Organizations should strive to maintain accurate and
reliable data. They should ensure that data is collected and recorded correctly, and
take steps to validate and verify its accuracy. Inaccurate or misleading information
can have serious consequences and should be avoided.
4. Transparency: Organizations should be transparent about how they collect, use, and
share data. They should provide clear and easily understandable information about
their data management practices, including the purposes for which data is collected
and any third parties with whom it is shared.
5. Consent and Control: Individuals should have control over their personal data.
Organizations should obtain informed consent from individuals before collecting their
data, and individuals should have the right to access, modify, or delete their data if
desired.
6. Avoidance of Discrimination: Information management practices should not lead to
discrimination or unfair treatment of individuals or groups. Organizations should
ensure that data is used in a fair and unbiased manner, and take steps to prevent
algorithmic biases or discriminatory profiling.
7. Compliance with Laws and Regulations: Organizations should comply with
applicable laws, regulations, and industry standards related to information
management. This includes data protection laws, intellectual property rights, and
industry-specific requirements.
Privacy and data protection regulations are laws and regulations designed to safeguard the
privacy and personal data of individuals. These regulations vary across countries and regions,
but they generally share common objectives in protecting the rights and freedoms of
individuals and establishing rules for the collection, use, storage, and disclosure of personal
information. They include;
California Consumer Privacy Act (CCPA): The CCPA is a privacy law in California,
United States, that became effective in January 2020. It aims to enhance privacy rights and
consumer protection for California residents. The CCPA grants consumers the right to know
what personal information is collected about them, the right to opt out of the sale of their
personal information, and the right to request deletion of their data.
Health Insurance Portability and Accountability Act (HIPAA): HIPAA is a United States
federal law that sets privacy and security standards for protected health information (PHI). It
applies to health care providers, health plans, and other entities that handle PHI. HIPAA aims
to protect the privacy and confidentiality of individuals' medical information and establishes
guidelines for its use and disclosure.
Personal Data Protection Act (PDPA): The PDPA is a data protection law in Singapore that
governs the collection, use, and disclosure of personal data. It provides individuals with the
right to access and correct their data, imposes obligations on organizations to protect personal
data, and establishes rules for the transfer of data outside Singapore.
Privacy Act of 1974: The Privacy Act is a U.S. federal law that governs the collection, use,
and disclosure of personal information by federal agencies. It grants individuals certain
rights, such as the right to access and amend their records, and imposes obligations on
agencies to protect personal information.
REVIEW QUESTIONS
QUESTION ONE
a) Define the concept of a management information system (MIS) and explain its role in
supporting decision-making within organizations.
b) Discuss the different types of information systems commonly found in organizations, such
as transaction processing systems, decision support systems, and enterprise resource planning
systems. Explain their respective functions and purposes.
QUESTION TWO
b) Describe the process of database design, including the steps involved in conceptual,
logical, and physical database design. Discuss the importance of data integrity and security in
database management.
c) Discuss the advantages and challenges associated with implementing a relational database
management system (RDBMS) in an organization. Provide examples to illustrate your points.
FURTHER READING