Information systems in organizations week 4 discussion board
Part A
Please I need good and quality answers. Also please I want good citation and good references. I want it in APA format.
This week we're talking about Databases and Data Security. Database technologies are foundational to practically all modern systems. To understand how the systems work it is helpful to understand about the underlying technologies on which nearly all of them depend.
In IFSM 201 there is also a section on Security, but that is about how to keep yourselfsafe in an increasingly dangerous world. This class differs, since we must consider Security in the broader context of organizations.
Databases Questions:
A. What is data visualization?
B. What effects might poor information have on a data visualization project?
C. How does data visualization use database technology?
D. How could a business use data visualization to identify new trends?
E. Is data visualization a form of business intelligence? Why or why not?
PART B
I need a reply/response to these discussion board answers. Just read the discussion board answers, and respond to the information you read by also adding your own point of information about the topic to each discussion board answers. Just three to five Lines response each. Please I need good and quality response to these discussion board answers
LaminSesay
What might happen to a data visualization project if it failed to cleanse or scrub its data?
Data scrubbing, also called data cleansing, is the process of cleaning Updating and Using data scrubbing tool can save a database administrator a significant amount of time. And this can remove data that are incorrect, improperly formatted, incomplete, or duplicated in a database.The organization might use a data scrubbing tool to systematically examine data for flaws by using rules, a data-intensive field like banking, insurance, retailing, telecommunications, or transportation.Data scrubbing programs include such programs that will correct some any type of mistakes.
Kristy Johnson
What are the five characteristics of high-quality information? Consider the needs of users at different levels of the organization. Which characteristics are of the most importance to users at each level? Do the most important data quality characteristics change or not, as you move "up" or "down" the management chain?
The characteristics of high quality information include accuracy, completeness, timeliness, uniqueness, validity and consistency. The information in a system is more important than the system itself. If information is found to be incorrect or unreliable, the system will not be trusted and people will discontinue using it.
Different people will operate in different roles of maintaining the integrity of the database. Managers of departments are required to work collaboratively with IT specialists and developers to support a good data stewardship program. As data is collected and recorded on a large scale, the lower level employees will refine the data and deliver it to upper management for strategic planning and decision making purposes.
Geiger, J. G. (n.d.). Data Quality Management The Most Critical Initiative You Can Implement. Retrieved September 27, 2016, from https://www2.sas.com/proceedings/sugi29/098-29.pdf
Kendall Lollis
What are the advantages and disadvantages of having a normalized data base design? Are there circumstances where you would NOT want to normalize your database?
According to the course text, the simple way to understand what a normalized data base is that it is designed in a way that "1) reduces duplication of data between tables and 2) gives the table as much flexibility as possible" (Bourgeois, 2014). This creates an efficient organizational structure.
Some of the advantages to having a normalized data base design are data that is grouped logically and have reduced duplication. Some of the disadvantages of having a normalized data base design are that having a normalized data base containing a lot of joins and tables slows it down (Chester, 2016). Normalized databases that are well made and efficient can also be difficult and complex to create (Chappel, 2016).
Classle suggests that a circumstance when you would not want to normalize your database would be on smaller computers.
"Denormalization" could be used on mobile devices and cash registers to improve performance "since these may use the data for look-up only" or for quick look-ups without changes being made (Classle).
Bourgeois, D. T., Ph.D. (Ed.). (2014). Information Systems for Business and Beyond. Retrieved September 30, 2016.
Chappel, M. (2016). Should I Normalize My Database? Retrieved September 30, 2016.
Chester, A. (2016). Advantages & Disadvantages of Normalizing a Database | Techwalla.com. Retrieved September 30, 2016.
Classle. (n.d.). Denormalization. Retrieved September 30, 2016.
Arthur Jackson
Is data loss or data theft the bigger threat?
YES-In an age in which data can move about in the blink of an eye and mobile devices take on many forms, corporations are more at risk of losing sensitive data than ever. Large security breaches from professional hackers aside, an increasingly critical concern for industry is the risk factor associated with employees themselves. The growth in information leaks through employee negligence or malice is becoming a key conversation piece in risk discussions. A recently published global study by Symantec makes it clear that the risk is significant. The study indicates that a large number of employees are now moving and storing corporate information off premises. Half of employees surveyed say they transfer work documents to their home computers using less secure personal accounts such as Gmail. Data theft is a growing problem for individual computer users as well as large corporations and organizations. Data theft occurs both outside and inside companies, and reducing the risk of insider data theft at the corporate level is anything but easy. This is especially true because system administrators and employees have access to technology such as database servers, desktop computers, and external devices including USBs, smart phones, and other removable and mobile devices.