-
- QUESTION
Instructions
Project Overview
For this assignment, you will tackle the comprehensive task of conducting the data modeling and database design for the information systems of an organization operating in a domain of your choice. In parallel, you will also create a data governance plan for your organization. You will apply the data management notions in this course to a selected case study for your organization.You will first define the scope of your organization, describe its data management needs, and explain how the data support your organization’s critical mission. Next, you will create a detailed data model for a critical information system in your organization. You will start with requirements, then generate logical data modeling decisions which will culminate in an entity-relationship diagram for your organization’s data.
As a next step, you will use your data model to create a logical database architecture for your organization’s IS. You will then discuss a plan for transforming your logical database architecture to a physical architecture.
As a last step in your data modeling experience in this course, you will think in terms of creating a temporal database for a data warehouse or a data mart, which are data architecture notions that you will learn about in Week 4. Starting from your logical database, you will create what is referred to as a dimensional logical database well suited for use in a data warehouse or data mart.
In parallel with your data modeling tasks, you will examine and assess the data management practices in your organization, focusing on key management functions.
You will be completing this project in five weeks. In each week, you will work on a component of your report.
Background of Enterprise Data: Selecting Your Case Study
This week, your task for the project is to research in the the Internet to identify a case study of your choice with a pertinent IT/IS capability with significant data needs, either as an essential asset in support of your case study’s business mission or as an integral part of your case study’s critical mission.Some examples could be:
Healthcare organizations, such as
Healthcare insurance company
Major hospital
Medical laboratory
Academic institutions, such as
University or professional institute
Commerce and transportation center or services, such as
Major airport or maritime port
Transportation carriers, such as
an airline company
a railroad company
Network service providers, such as
Telecommunications service carrier/provider
Internet and voice digital service provider or Cloud service provider
Media organizations, such as
Television network
Multimedia service operator
Manufacturing firms, such as
Computer products manufacturer
Car manufacturer
Hardware manufacturer
Major retailers, such as
Food retailer
Home maintenance retailer
Clothing outlet
Entertainment complexes, such as
Hotel
Vacation resort
Large recreation and entertainment complex
Financial institutions, such as
Banking system
Credit card service
Investment trading service
The above are examples to guide you with your research, but you are not limited to these areas. It is important that you arrive at your own case study, based on your personal interests, and one that is well suited to explore from a data management perspective for this course. Some criteria that you should consider in arriving at your case study are listed below:Your case study may be based on an actual company, or organization, using facts from research, or it may be fictional. In either case, you will have to make a number of assumptions about your case study’s organizational system (principles, policies and frameworks, processes, organizational structures, culture, ethics and behavior, information, services, infrastructure and applications, people, skills, and competencies) to complement the facts from your research.
Your case study must require a nontrivial underlying data management capability as an essential part of its operation. The data management must be reasonably complex. One way to determine whether a data management capability is reasonably complex is to think in terms of entities and relationships for your case study’s model. A reasonable data complexity is at least ten entities and ten relationships. You may have to make assumptions to complement your facts.
In your research, you may want to think in terms of use cases to define your data needs. Think of use cases as transactions that different end users will invoke when interacting with your case study’s database(s).
Finally, you must submit your area of study to the professor via e-mail and have your professor’s approval that you may go ahead with your selection.Week 1 Tasks
ACTUAL TASK TO HAVE DONE BY NOVEMBER 7TH 2018.Once you have selected your study area and case and have received approval from your professor, you may proceed to the next steps described below. Create a report that focuses on the data used to support the operation of your organization in your case study and answer the following questions.
Conduct a brief, preliminary review of your case study’s organization. This review should include business mission and general purpose of data in support of mission-critical information systems.
Produce detailed data requirements to address the data needs of your organization. The following are criteria that you can use to organize your requirements: adaptability, business and organizational policies, change control demands, compatibility, completeness, consistency, currency, ease of use, evolution, extensibility, functional features, maintainability/manageability, performance, reliability, scalability, security, standards, support, testability, and ubiquity. You will produce requirements in at least five of the above criteria.
Develop a detailed data model as an EER diagram for your case study. Your model will include entity types with attributes, primary keys, and foreign keys as needed, and pertinent relationships with cardinality and integrity constraints as needed. Your data model will also come with a brief description for each entity type, attribute and relationship. Make sure to satisfy yourself that your data model is reasonably complex as explained in the guidelines under Background of Enterprise Data: Selecting your Case Study above.
Submission Details:
Create your report in approximately 5 pages in a Microsoft Word document and name your document SU_MIS6211_W1_A3_LastName_FirstInitial.doc.
Submit the report to the Submissions Area by the due date assigned.
Cite any sources you use using correct APA format on a separate page.
Subject | Computer Technology | Pages | 5 | Style | APA |
---|
Answer
Challenges of Data Security Implementation
Data security implementation is the process that makes sure that every security measure according to the proposed plan is put in place effectively and completely. The process of implementing data security starts with conceptualizing and understanding the business requirements of an enterprise.
Both short and long-term goals of the enterprise have to be keenly evaluated in order to achieve effective data security implementation that is balanced. If not keenly handled, a failure in the implementation of data security can result in catastrophic security breaches. For instance, recently, Google+ (a social media platform owned by Google) was shut down due to a security breach. This was because of a failure in implementing the security standards that made third parties access private user’s information. (Lee, 2018).
According ‘Cybersecurity Frameworks and Foundational Security Controls: A Survey conducted by IT Security Professionals’, it was discovered that most organizations face substantial challenges when it comes to implementing data security frameworks (Watson, 2017). Based on a survey done by 319 IT security decision makers, the challenge was to 95% of the existing organizations (Watson, 2017).
Failure to effectively implement security standards as defined in the plan can leaded to catastrophic results. Some of these results are irreversible and can completely bring down a well established enterprise. Security implementation should be consider a a top priority and an awareness should be increased to every individual in the enterprise.
References
Lee, D. (2018, October 8). Google+ shutting down after users’ data is exposed. Retrieved from BBC NEWS: https://www.bbc.com/news/technology-45792349 Watson, M. (2017, January 10). 95% of organizations face significant challenges when implementing cyber security frameworks. Retrieved from IT Governance: https://www.itgovernance.co.uk/blog/95-of-organisations-face-significant-challenges-when-implementing-cyber-security-frameworks Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing. Procedia Computer Science, 48, 204-209. Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press. |
Related Samples
The Role of Essay Writing Services in Online Education: A Comprehensive Analysis
Introduction The...
Write Like a Pro: Effective Strategies for Top-Notch Explication Essays
Introduction "A poem...
How to Conquer Your Exams: Effective Study Strategies for All Learners
Introduction Imagine...
Overcoming Writer’s Block: Strategies to Get Your Essays Flowing
Introduction The...
Optimizing Your Online Learning Experience: Tips and Tricks for Success
The world of education...