Introduction to Databases for Business Analytics
Week 7 Database Development Process
Term 2 2022
Lecturer-in-Charge: Kam-Fung (Henry) : Tutors:
Copyright By PowCoder代写 加微信 powcoder
PASS Leader:
• There are some file-sharing websites that specialise in buying and selling academic work to and from university students.
• If you upload your original work to these websites, and if another student downloads
and presents it as their own either wholly or partially, you might be found guilty of collusion — even years after graduation.
• These file-sharing websites may also accept purchase of course materials, such as copies of lecture slides and tutorial handouts. By law, the copyright on course materials, developed by UNSW staff in the course of their employment, belongs to UNSW. It constitutes copyright infringement, if not academic misconduct, to trade these materials.
Acknowledgement of Country
UNSW Business School acknowledges the Bidjigal (Kensington campus) and Gadigal (City campus) the traditional custodians of the lands where each campus is located.
We acknowledge all Aboriginal and Islander Elders, past and present and their communities who have shared and practiced their teachings over thousands of years including business practices.
We recognise Aboriginal and Islander people’s ongoing leadership and contributions, including to business, education and industry.
UNSW Business School. (2022, May 7). Acknowledgement of Country [online video]. Retrieved from https://vimeo.com/369229957/d995d8087f
W7 Learnings Outcomes
Business Intelligence
Database Development
❑ Information systems development overview ❑ Software development lifecycle (SDLC)
❑ Database development lifecycle (DBLC)
❑ Interaction between SDLC and DBLC
Database Professional Roles
❑ Database Administrator (DBA) vs. Data Administrator (DA) ❑ DBA tasks
❑ DBA ethics
Business Intelligence (BI)
Source: cio.com
Chapter 13
Business Intelligence and
Data Warehouses 13-1 to 13-2
Business Intelligence (BI)
Comprehensive, cohesive, integrated set of tools and processes ❑ Captures, collects, integrates, stores, and analyzes data
❑ Generates and presents information to support business decision making
Allows a business to transform:
Data Knowledge Wisdom
Business Intelligence (BI)
Concepts, practices, tools and techniques to help business ❑ Understand its core capabilities
❑ Provide snapshots of the company situation
❑ Identify key opportunities to create a competitive advantage
Provides a framework for
❑ Collecting and storing operational data and aggregating it into decision support data
❑ Analyzing decision support data and presenting generated information to end users to support business decisions
❑ Making business decision which generates more data
❑ Monitoring results to evaluate outcomes and predicting future outcomes with a high degree of accuracy
Source: https://www.betterbuys.com/bi/business-intelligence-vs-business-analytics/
Business Intelligence (BI) vs.
Business Analytics (BA)
Business Intelligence (BI) vs.
Business Analytics (BA)
Source: https://www.betterbuys.com/bi/business-intelligence-vs-business-analytics/
Business Analytics
Prescriptive Analytics
Predictive Analytics
Business Intelligence
Descriptive Analytics
A dimension is a structure that categorizes facts and measures in order to enable users to answer business questions. Commonly used dimensions are people, products, place and time.
Database Development
Source: datadesignsystems.com
Chapter 3 Database Design 9-1 to 9-3
Information Systems
Information Systems (IS) are systems that use IT to capture, transmit, store, retrieve,
manipulate or display information used in one or more business processes.
Important issues when building IS:
❑ The system must solve the right problem.
❑ The system must be built in the most effective way. ❑ The system must fit into the existing environment. ❑ The system must be easy to use (e.g., smartphone).
The performance of an IS depends on several factors: ❑ Application design and implementation (front-end).
❑ Database design and implementation (back-end).
❑ Administrative and organizational procedures.
Information Systems
❑ System analysis is the process that establishes the need for and the extents/scope of an information system.
❑ The process of creating an information system is known as systems development.
❑ Database design takes place within the context and limits of an information systems development process.
Evolution of Software Development Process Models
Code & Fix Model
Source: tutorialride.com
Stagewise/Waterfall Model
Scrum/Agile Development Model
Scrum/Agile Development Model
The Reality
The Result
Software Development Lifecycle (SDLC)
Waterfall Model Phases
Planning Analysis
Detailed Systems Design
Implementation
Maintenance
❑ General overview of the company and objectives ❑ Initial assessment
❑ Feasibility of a new system (e.g., benefits/cost)
❑ User requirements
❑ Existing system evaluation (How do these requirements fit into overall
❑ Logical system design
Detailed System Design
❑ Completion of design which includes screens, menus, reports, etc.
Implementation
❑ Cycle of coding, testing & debugging ❑ Installation, fine-tuning
Maintenance
❑ Evaluation
❑ Maintenance
❑ (Minor) Enhancement
Distribution of Effort for Product: Initial Development
20 Concept Development and Requirement Analysis
Implementation
Effort in % 5
Typical Errors in a Product
Errors in % 36
Requirements Specification and Design Errors Implementation Errors
Much better to discover the error in its early stage(s)!
Database Lifecycle (DBLC)
❑ Also called Database Development Lifecycle (DDLC)
❑ Part of/subset of/embedded in the systems/software development lifecycle (SDLC)
❑ Six phases (see next slide)
Database Initial Study
Database Design
Implementation and Loading
Database Lifecycle
Testing and Evaluation
Maintenance and Evolution
DBLC Phase 1: Database Initial Study
Analyzing the organization
❑ Objectives, Operations & Structures
Defining problems and constraints
❑ Function of existing systems ❑ Input of existing systems
❑ Output of existing systems
Defining objectives
❑ Initial objectives
❑ Data sharing and interfaces with other systems
Define scope and boundaries
❑ DB design for which part of the organization? ❑ What hardware will be used?
Iterative ER Modelling Process
Database Initial Study
Data analysis, User views, Business rules
DBLC Processes &
DB Transactions
Initial ERM
Verification
Attributes
Normalization
DBLC Phase 2: Database Design
Conceptual Design
❑ Data analysis and data requirements
a. What are the end-user views needed?
b. What are the inputs and outputs needed?
c. What are information is needed and where does it come from?
❑ ER modelling and normalization
a. What are the business rules?
b. What are the entities, attributes and relationships for ER diagram?
c. What are the keys?
d. Do we need to normalize?
❑ Model verification
DBLC Phase 2: Database Design
Logical Design
❑ Translating/mapping the conceptual design into internal model of a selected DBMS (e.g., Oracle, Access, MySQL, etc.)
Physical Design
❑ Defining data access characteristics of the database (e.g., indexes). ❑ Optimizing performance (e.g., choice of storage medium).
Resources for Implementation
❑ Hardware
Note: Logical and physical design can be carried out in parallel activities, but requires high level of understanding of software and hardware.
DBLC Phase 3: Implementation and
Core tasks:
❑ Creating DB
❑ Assigning permission to a Database Administrator (DBA) ❑ Creating tables within DB
❑ Assigning permission to users
Further areas needing attention:
❑ Performance (hardware, software, indexes, buffer size, etc.)
❑ Security (physical security, password security, access rights, audit trails, data encryption,
diskless workstations)
❑ Backup and Recovery
❑ Data Integrity Company Standards
❑ Concurrency Control (allowing simultaneous access to a DB while preserving data integrity)
Database Security and Data Privacy Database security is to ensure that only authorized users can perform authorized
activities at authorized time.
❑ Authentication → user has the basic right to use the system.
❑ Authorization → user has the right to do specific activities on the system.
Data privacy (or information privacy) is the relationship between collection and dissemination of data, technology, the public expectation of privacy and the legal and political issues surrounding them. Privacy concerns exists wherever personally identifiable information (PII) is stored. There are several wide range
of sources where data privacy issues can arise, for example: ❑ Healthcare records
❑ Financial institutions and transactions
❑ Criminal justice investigations
DBLC Phase 4: Testing and Evaluation
❑ Testing performance / performance fine-tuning ❑ Testing security constraints
❑ Testing integrity
❑ Testing concurrent access
DBLC Phase 5: Operation
❑ DB (and application) completed
❑ “Going into production/operation”
❑ Running information system
❑ Users and applications start to insert, receive, update and delete data…
❑ DBA starts to (ongoing) fine-tune performance, allocate storage space, control access, backup data…
DBLC Phase 6: Maintenance and Evaluation
DBA has responsibility for routine
maintenance activities within the DB: ❑ Preventive maintenance (backup)
❑ Corrective maintenance (recovery)
❑ Adaptive maintenance (enhancing
performance, adding entities, adding
attributes, etc.)
❑ Access control, statistics, auditing,
periodic system-usage summaries, etc.
DBMS and Organisational Change
DBMS is a software package with computer programs that control the creation, maintenance and use of databases (e.g., Oracle).
The introduction of a DBMS to an organization may affect the organization in various ways.
When a new DBMS is introduced to an organization, three important aspects have to be addressed.
❑ Technological: DBMS hardware and software ❑ Managerial: Administrative functions
❑ Cultural: Corporate resistance to change
Database Administrator (DBA)
Source: dbadave.co.uk
Chapter 16
Database Administration
and Security 16-1 to 16-5
Database Administrator (DBA)
Database Administrator (DBA): A technical function that is responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, backup and recovery.
Data Administrator (DA): A high-level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards. The DA is responsible for controlling the overall company data resource.
The DA’s job description covers a larger area of operations than the DBA’s.
(DA → Data Governance Lead/Manager)
❑ The DBA is responsible for the control of databases.
❑ The role of DBA varies between companies.
❑ The location of the DBA varies (is up to the company management).
❑ Larger corporations make a distinction between DBA vs. DA.
DBA Tasks/Responsibilities
❑ Installing and upgrading the database server
❑ Allocating system storage and planning future storage
❑ Modifying the database structure
❑ Enrolling users and maintaining system security
❑ Ensuring compliance with database vendor license agreement ❑ Controlling and monitoring user access
❑ Monitoring and optimizing the performance
❑ Planning for backup and recovery
❑ Maintaining archived data
❑ Backing up and restoring databases
❑ Contacting database vendor (e.g., for technical support)
❑ Generating various reports
Source: Oracle
DBA Ethics
Responsibilities to Company:
❑ Follow internal standards and regulations.
❑ Inform openly about issues, provide complete information, do not create knowledge silo.
❑ Ensure up-to-date security, have recovery plan in place. Responsibilities to Externals:
❑ Follow external regulations.
❑ Protect externals from inappropriate data use.
❑ Ensure privacy through authorization and security. Responsibilities to Co-Workers:
❑ Be honest and open with co-workers.
❑ Protect co-workers from inappropriate data use.
❑ Share, teach and help grow the collective knowledge base Responsibilities to One’s Self:
❑ Stay up to date on industry and technology.
❑ Stay up to date on regulations.
❑ Learn new techniques, new tools and best practices.
Source: DBA Code of Ethics
Source: petcare.com.au
程序代写 CS代考 加微信: powcoder QQ: 1823890830 Email: powcoder@163.com