Final Exam Part One 3604 Due June 22, 2017 Take Home

Final Exam Part Onecnt 3604due June 22 2017take Home Part

Final Exam Part Onecnt 3604due June 22, 2017take Home Part

Describe the three capabilities of database management systems: data definition, data dictionary, and data manipulation language. Discuss the importance of creating and using a data dictionary with a large corporate database.

Discuss the importance of business intelligence as it relates to databases.

What do you see as the benefits of using a Web-like browser to access information from a data warehouse?

What advantage do non-relational databases and cloud databases provide to businesses?

Discuss management issues associated with databases like information policies, data administration, data governance, and data quality.

Discuss how cloud computing can provide value to a business.

Discuss the personal and professional implications of so much individual data being gathered, stored, and sold. Should businesses be allowed to gather as much as they want? Should individuals have more control over their data that are gathered?

Briefly describe your Internet Service Provider’s email usage policy. If you are on campus, your school should have a usage policy.

Describe how your quality of life has improved or declined with the technological advances in the last five years.

How do you think our government should handle the political issue of Internet decency and access limitations?

To what extent should Internet Service Providers be held liable and accountable for the use of their equipment?

Discuss the impact new information systems may have on organizational culture and organizational politics.

Describe the difference between the Economic Theory and the Behavioral Theory of how information systems affect organizations.

How can managers’ roles be enhanced with a well-integrated information system? How can their roles be diminished with a poorly-integrated information system?

Ask yourself these questions about your own firm: a. Describe the structure of the industry in which your firm is located? b. Describe the business, firm, and industry value chains for your firm. c. Describe how your firm aligned its IT with its business strategy and goals?

Discuss why wireless networks are more susceptible to security problems and how businesses can protect them.

Discuss the security issues associated with cloud computing and what cloud users should do about them.

Discuss the threat employees pose to information system security. Discuss three laws recently passed by the U.S. government that created electronic records management obligations for businesses.

Discuss the elements of a good security policy that every business should have.

How does enterprise software enable a business to use industry-proven best practices?

Discuss the role of open source software and cloud computing in enterprise applications.

Describe how the Internet changes information asymmetry in favor of consumers versus sellers.

Discuss how businesses can use the “wisdom of crowds” to improve their products or services.

Describe m-commerce services and applications that either you have already used or would like to have available.

Discuss the challenges managers face when building a successful e-commerce Web site.

Paper For Above instruction

The integration of database management systems (DBMS) is fundamental to modern information technology infrastructures in organizations. The three core capabilities of DBMS—data definition, data dictionary, and data manipulation language—serve distinct but interconnected functions essential for effective data management and utilization. Data definition pertains to creating and modifying the database structure, including tables, fields, and relationships, ensuring data is organized logically and efficiently. The data dictionary functions as a centralized repository that stores metadata—information about data elements, their types, constraints, and relationships—which is vital for maintaining consistency, integrity, and ease of management, especially in large-scale corporate databases. Data manipulation language (DML), on the other hand, provides the commands for users and applications to retrieve, insert, update, or delete data within the database, facilitating operational and analytical processes that drive business decisions.

Creating and maintaining a data dictionary is critically important in large corporate databases because it ensures standardized definitions and usage of data across different departments and systems, reducing redundancy and inconsistency. It acts as an authoritative reference that assists in data governance, compliance, and troubleshooting, making system administration more manageable and reliable. In large organizations, where data volume and complexity are substantial, the data dictionary promotes data quality, security, and efficient querying, supporting strategic goals like customer relationship management, supply chain optimization, and compliance reporting.

Business intelligence (BI) plays a crucial role in leveraging the data stored within databases to support decision-making processes. BI involves the use of tools, applications, and practices that analyze data to produce actionable insights, ultimately enabling organizations to respond swiftly to market trends, customer preferences, and operational inefficiencies. For example, BI systems utilize data warehousing, data mining, and digital dashboards to present meaningful visualizations and reports that inform strategic planning and tactical operations. The effectiveness of BI relies heavily on robust databases that organize and store vast amounts of data from various sources, ensuring data quality and accessibility.

Accessing data from a warehouse via web browsers presents significant advantages for organizations. This method enhances accessibility, allowing authorized users to retrieve data conveniently from any location with internet access, thereby promoting collaboration and timely decision-making. Browser-based access also simplifies user interface complexity, making data exploration and analysis more intuitive. Moreover, integrating data warehouses with web technologies enables real-time analytics and supports mobile and remote workforce needs. This accessibility fosters a data-driven culture where decision-makers are empowered with critical insights rapidly, boosting organizational agility.

The evolution of non-relational (NoSQL) databases and cloud databases further enhances business capabilities. Non-relational databases provide flexible schema design, scalability, and performance advantages, especially with unstructured or semi-structured data such as social media feeds, sensor data, or multimedia content. Cloud databases offer cost-effective, scalable storage and computing power, reducing the need for significant on-premises infrastructure. Businesses benefit from rapid deployment, distributed access, and simplified maintenance, which accelerates innovation and reduces operational costs. For instance, cloud-based NoSQL databases enable startups and large enterprises to handle Big Data analytics without substantial capital expenditure, democratizing access to advanced data management.

Effective management of databases encompasses policies and practices concerning data access, security, and quality. Data policies define rules for data usage, ensuring compliance with legal and regulatory standards. Data administration involves assigning roles and responsibilities for database maintenance, backups, and performance tuning. Data governance establishes accountability frameworks to ensure data integrity and appropriate use across the organization, while data quality initiatives aim to eliminate errors, redundancies, and inconsistencies, thereby improving the reliability of analytical outputs.

Cloud computing adds significant value to businesses by offering scalable resources and on-demand services, reducing capital expenditure, and facilitating digital transformation. Cloud platforms enable organizations to access computing power, storage, and applications remotely, fostering flexibility and innovation. For example, cloud services like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud provide tailored solutions for big data analytics, machine learning, and enterprise applications, which can be scaled up or down according to business needs. This agility allows for faster time-to-market, improved collaboration, and cost savings, giving businesses a competitive edge.

The widespread collection and sale of individual data raise serious personal and professional privacy issues. The vast volume of data gathered by companies—including browsing habits, location, health information, and financial details—can be used for targeted advertising, behavioral prediction, or sold to third parties. While data collection can improve user experiences and business efficiencies, excessive or non-transparent data harvesting infringes on privacy rights and can lead to misuse, discrimination, or identity theft. Individuals should exercise greater control over their data, including consent mechanisms and data portability rights, reinforced by regulations such as GDPR and CCPA. Ethical data practices promote trust and social responsibility while ensuring organizations operate transparently.

Internet Service Providers (ISPs) typically have usage policies that govern acceptable use, limits on bandwidth, and data privacy standards. These policies aim to prevent abuse of network resources, protect user privacy, and ensure fair bandwidth distribution. Campus networks often have similar policies, emphasizing responsible computing and data security while accessing college resources or the internet.

Technological advances over the past five years have profoundly influenced daily life. Improvements in smartphone capabilities, ubiquitous high-speed internet, and IoT devices have enhanced communication, entertainment, and home automation. Conversely, concerns about overexposure to technology, cyberbullying, and decreased physical activity depict a decline in some quality-of-life metrics. Balance and digital literacy are crucial to maximizing benefits while mitigating adverse effects.

Government regulation of Internet decency and access challenges involves balancing free expression with protection from harmful content. Policymakers should promote digital literacy, enforce age-appropriate content regulations, and support equitable access initiatives. Regulation should protect vulnerable populations without infringing upon civil liberties or stifling innovation.

ISPs should be held accountable for the misuse of their equipment, such as facilitating cybercrimes or enabling privacy breaches, through regulation, transparency, and accountability frameworks. Active oversight ensures responsible infrastructure management, promoting consumer trust and security.

Organizationally, new information systems influence corporate culture by shaping communication styles, decision-making processes, and power dynamics. Innovative systems may foster collaboration and transparency, but can also threaten established hierarchies, leading to resistance or conflict. Similarly, the Economic Theory posits that information systems improve efficiency and profitability, whereas the Behavioral Theory emphasizes their impact on organizational behavior, motivation, and social relationships.

Managers benefit from well-designed systems through improved information access, strategic insights, and operational efficiency, enhancing their decision-making and leadership capabilities. Conversely, poorly implemented systems can diminish managerial effectiveness, create confusion, or hinder responsiveness, ultimately affecting overall organizational performance.

Regarding industry structure, understanding competitive dynamics, supply chain relationships, and market forces allows firms to align their IT strategies for competitive advantage. Business and industry value chains reveal core activities where technology can streamline processes or differentiate services. Proper IT alignment supports strategic goals such as customer loyalty, operational excellence, and innovation, as exemplified by companies integrating ERP systems with their supply chain management.

Wireless networks are more susceptible to security breaches due to their broadcast nature and less controlled access. Businesses can implement encryption, firewall protections, and intrusion detection systems to safeguard wireless communication. Cloud security issues include data breaches, unauthorized access, and data loss; organizations should adopt robust encryption, access controls, and compliance measures such as ISO/IEC standards.

Employees pose significant threats to information security through insider threats, negligence, or malicious intents. Regular training, strict access controls, and monitoring are essential to mitigate this risk. Additionally, recent US legislation like the Sarbanes-Oxley Act, HIPAA, and the Federal Records Act establish legal obligations for electronic records management, emphasizing transparency and accountability in corporate recordkeeping.

A comprehensive security policy should include asset management, access controls, incident response, physical security measures, and employee training, forming a foundational element of organizational cybersecurity.

Enterprise software supports best practices by integrating functions like customer relationship management (CRM), supply chain management (SCM), and enterprise resource planning (ERP), enabling coordination and efficiency across departments. Open source and cloud-based enterprise applications facilitate cost-effective customization and scalability, empowering organizations to innovate rapidly.

The internet has shifted information asymmetry in favor of consumers by providing instant access to product information, reviews, and price comparisons. This transparency encourages competitive pricing and improved product quality, compelling businesses to innovate and prioritize customer satisfaction.

Crowdsourcing harnesses collective intelligence to improve products or services, such as soliciting consumer feedback, creating open innovation platforms, or leveraging social media insights to design user-centered solutions.

Mobile commerce (m-commerce) applications provide on-the-go access to shopping, banking, and payment services. Usage examples include mobile banking apps, location-based deals, or digital wallets—services that enhance convenience and accessibility.

Building successful e-commerce websites involves addressing user experience, security, mobile compatibility, and marketing strategies. Challenges include maintaining website reliability, protecting customer data, and adapting to rapidly changing technological trends.

References

  • Elmasri, R., & Navathe, S. B. (2015). Fundamentals of Database Systems (7th ed.). Pearson.
  • Turban, E., Sharda, R., Delen, D., & King, D. (2018). Business Intelligence, Analytics, and Data Science: A Managerial Perspective. Pearson.
  • Laudon, K. C., & Traver, C. G. (2021). E-commerce 2021: Business, Technology, Society. Pearson.
  • Armbrust, M., et al. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58.
  • Schoder, D., & Albayrak, T. (2019). Data privacy and security in cloud computing. In Data Privacy Management and Security Assurances in Cloud Computing (pp. 13-29). Springer.
  • Fisher, C., & Jang, H. (2019). Wireless Network Security: Foundations and Practice. IEEE Wireless Communications.
  • Federal Trade Commission. (2020). Protecting Consumer Privacy in an Era of Rapid Change. FTC Report.
  • U.S. Congress. (2002). Sarbanes-Oxley Act. Public Law No. 107-204.
  • European Parliament. (2016). General Data Protection Regulation (GDPR). Regulation (EU) 2016/679.
  • Kim, G., et al. (2016). The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations. IT Revolution Press.