47
© 2008 Prentice-Hall, Inc. Slide 1

© 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Embed Size (px)

Citation preview

Page 1: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

© 2008 Prentice-Hall, Inc.Slide 1

Page 2: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Chapter 7Database Applications and

Privacy Implications

© 2008 Prentice-Hall, Inc.Slide 2

Page 3: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Explain what a database is and describe its basic structure.

Identify the kinds of problems that can be best solved with database software.

Describe different kinds of database software, from simple file managers to complex relational databases.

© 2008 Prentice-Hall, Inc.Slide 3

Page 4: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Describe database operations for storing, sorting, updating, querying, and summarizing information.

Give examples of ways in which large, easily accessible databases make lives safer or more convenient.

Explain the ways databases threaten our privacy.

© 2008 Prentice-Hall, Inc.Slide 4

Page 5: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Google is one of the most successful companies on WWW. Search for Web pages, facts, quotes, etc. 200 million queries a day

Launched by a Sergey Brin and Larry Page (Stanford Ph.D. students)

New approach in search technology Marks a page’s relevance by the number of times other related

web pages link to it, not how often a word or phrase appeared on a page

© 2008 Prentice-Hall, Inc.Slide 5

Page 6: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

© 2008 Prentice-Hall, Inc.Slide 6

Google headquarters viewed using Google Earth, a free application that combines satellite imagery, maps, and Google's search engine.

Page 7: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

What Good Is a Database?

A database: A collection of information

stored on computer disks Database software:

Application software(like word processing andspreadsheet software)

Designed to maintain databases(collections of information)

© 2008 Prentice-Hall, Inc.Slide 7

Page 8: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Advantages offered by computerized databases: Make it easier to store large quantities of information Make it easier to retrieve information quickly and flexibly Make it easy to organize and reorganize information Make it easy to print and distribute information in a variety of ways

© 2008 Prentice-Hall, Inc.Slide 8

Page 9: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Database Anatomy

Database program: a software tool for organizing the storage and retrieval of information

Database: a collection of information stored in an organized form in a computerTypically composed of one or more tables

A collection of related information A collection of records

© 2008 Prentice-Hall, Inc.Slide 9

Page 10: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

A record is the information relating to one person, product, or event.

Each discrete piece of information in a record is a field.

© 2008 Prentice-Hall, Inc.Slide 10

FieldRecord

Table

Page 11: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

The type of information a field can hold is determined by its: Field type or Data type

Database programs provide you with more than one way to view data: Form views

Show one record at a time List views

Display several records in lists similar to the way a spreadsheet displays data

© 2008 Prentice-Hall, Inc.Slide 11

Page 12: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

In any view, fields can be rearranged without changing the underlying data.

© 2008 Prentice-Hall, Inc.Slide 12

List View

Form View

Page 13: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Database Operations

Import: receive data in the form of text files Browse: navigate through information Query: find records that match specific criteria

© 2008 Prentice-Hall, Inc.Slide 13

Page 14: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Sort: rearrange records (alphabetically or numerically) Print reports, labels, and form letters: A report is an

ordered list of selected records and fields in an easy-to-read format.

© 2008 Prentice-Hall, Inc.Slide 14

Page 15: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

© 2008 Prentice-Hall, Inc.Slide 15

Most modern database management programs support a standard language for programming complex queries called SQL (Structured Query Language). SQL is available for many database management systems. Programmers and sophisticated users don’t need to learn new

languages when they work with new systems. The graphical user interfaces allow point-and-click queries that insulate

users from the complexities of the query language.

Page 16: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

© 2008 Prentice-Hall, Inc.Slide 16

Screen Test: Querying a Web Search Database

To search for articles online about a new method for recycling laser printer toner cartridges, you can visit a search engine, such as Google.

Page 17: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

© 2008 Prentice-Hall, Inc.Slide 17

When you hit the “Search” button, the search engine will return a list of links, sorted by relevancy.

Page 18: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

© 2008 Prentice-Hall, Inc.Slide 18

Selecting any of the links will cause the corresponding page to load.

Page 19: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Special-Purpose Database Programs

Specialized database software: preprogrammed for specific data storage and retrieval purposes

Geographical information systems (GIS): include geographic and demographic data in map form

© 2008 Prentice-Hall, Inc.Slide 19

Page 20: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Personal information manager (PIM): an electronic organizer

Automates some or all of the following functions: Address/phone book Appointment calendarTo-do listMiscellaneous notes

Handheld computers can share information with applications such as iCalendar running on PCs and Macintoshes.

© 2008 Prentice-Hall, Inc.Slide 20

Page 21: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

© 2008 Prentice-Hall, Inc.Slide 21

Page 22: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

From File Managers to Database Management Systems File manager: enables users to work with one file at a time Database management system (DBMS): manipulates data in a

large collection of files, cross-referencing between files as needed

© 2008 Prentice-Hall, Inc.Slide 22

Page 23: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

A DBMS can be used interactively, or can be controlled directly by other programs.

© 2008 Prentice-Hall, Inc.Slide 23

Page 24: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

What Makes a Database Relational?To most users, a relational database program is one

that allows tables to be related to each other. Changes in one table are reflected in other tables

automatically.To computer scientists, the term relational database

has a technical definition related to: The underlying structure of the data The rules specifying how that data can be manipulated

© 2008 Prentice-Hall, Inc.Slide 24

Page 25: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

The structure of a relational database is based on the relational model―a mathematical model that combines data in tables.

© 2008 Prentice-Hall, Inc.Slide 25

A database is relational when files are related to each other, such as this Student ID field in the Student file.

Page 26: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

The Many Faces of Databases

Large databases often contain hundreds of interrelated tables. A database management system can shield users from the

complex inner workings of the system, providing them with only the information and commands they need to get their jobs done.

© 2008 Prentice-Hall, Inc.Slide 26

Page 27: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

The Many Faces of Databases

© 2008 Prentice-Hall, Inc.Slide 27

Page 28: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Database Trends

Batch processing: users accumulate transactions and input them into the computer in large batches

Real-Time computing: allows instant access to information Interactive processing: has replaced batch processing for

most applications Users can now interact with data through terminals, viewing and

changing values online in real-time. Batch processing is still used for jobs in which it makes sense to do a lot

of transactions at once.

© 2008 Prentice-Hall, Inc.Slide 28

Page 29: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

© 2008 Prentice-Hall, Inc.Slide 29

Client/server computing involves two-way communications between applications running on the “client” PC and the “server” PC.

Page 30: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Downsizing and Decentralizing Using a client/server approach

Today many businesses use a client/server approach, using database servers. Users can take advantage of the PC’s simple user interface and convenience,

while still having access to data stored on large server systems.

© 2008 Prentice-Hall, Inc.Slide 30

Page 31: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Data Mining: The discovery and extraction of hidden predictive information from large

databases Uses statistical methods and artificial intelligence technology

Locates trends and patterns in data that would have been overlooked by normal database queries

© 2008 Prentice-Hall, Inc.Slide 31

“The goal is information

at your fingertips.”

Bill Gates

Page 32: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Databases and the Web Information is available via a company’s Intranet and the Internet. HTML, the language used to construct most Web pages, wasn’t designed

to build database queries. XML, a newer, more powerful data description language, is designed

with industrial-strength database access in mind. Web database strategies revolve around directories. Directories are at the heart of many customer relationship management

(CRM) systems—software systems for organizing and tracking information on customers.

© 2008 Prentice-Hall, Inc.Slide 32

Page 33: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Rules of Thumb: Dealing with Databases

Choose the right tool for the job. Think about how you’ll get the information out before you put it in. Start with a plan, and be prepared to change your plan. Make your data consistent; inconsistencies can mess up sorting and

make searching difficult. Databases are only as good as their data. Query with care. If at first you don’t succeed, try another approach.

© 2008 Prentice-Hall, Inc.Slide 33

Page 34: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Object-Oriented Databases Make database construction and usage more flexible Store software objects that contain procedures (or

instructions) along with data Are often used in conjunction with object-oriented

programming languages

© 2008 Prentice-Hall, Inc.Slide 34

Page 35: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Object-Oriented Databases: An Example A database of images, containing a class for photos One instance of this class – one object for every photograph

in the database Data associated with this object: photographer’s name,

description of photo, copyright status, and the image itself One operation for the class – producing a thumbnail

© 2008 Prentice-Hall, Inc.Slide 35

Page 36: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Object-Oriented Easy manipulation of

various types of data Saves time by reusing

objects Associates actions with

the data

© 2008 Prentice-Hall, Inc.Slide 36

RelationalNot good with

unstructured data (audio, video clips)

Will still be used in combination with object oriented databases – as hybrids

Page 37: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Multimedia DatabasesServe as indexes for art, photographs, maps, video clips, and

other media filesNatural Language Databases

Allow users to ask for data using the same language used to address humans (natural language queries)

Future databases will undoubtedly incorporate more artificial intelligence technology

© 2008 Prentice-Hall, Inc.Slide 37

Page 38: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

© 2008 Prentice-Hall, Inc.Slide 38

www.ask.com enables users to ask questions about computers by stating their queries in plain English and other natural languages.

Page 39: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Personal Data: All About You

More than 15,000 specialized marketing databases contain 2,000,000,000 names.

These databases contain characteristics like age, income, and religion.

© 2008 Prentice-Hall, Inc.Slide 39

Page 40: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

What Is Privacy? A common theme in privacy is the notion of access:

Physical proximity to the person Knowledge about that person

People need a certain amount of privacy to maintain their dignity and freedom. How much dignity would you have if everyone could read

your mind?

Information about people can be of great value to society. Many parents would like to know the identities of convicted

sex offenders.

© 2008 Prentice-Hall, Inc.Slide 40

Page 41: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

The Privacy Problem Protection against invasion of privacy is not explicitly

guaranteed by the U.S. Constitution. The right to privacy is implied by other constitutional guarantees. Debates rage about what this means.

Federal and state laws provide forms of privacy protection. Most of those laws were written years ago.

Most European countries have had strong privacy protection laws for years.

© 2008 Prentice-Hall, Inc.Slide 41

Page 42: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Big Brother and Big Business Other information technologies amplify the threat to personal

privacy: Networks make it possible for personal data to be transmitted almost

anywhere instantly. Microsoft’s Passport, part of its .NET technologies, can optionally

collect the following information in a central database controlled by Microsoft:

Passwords Credit card numbers Other consumer information

© 2008 Prentice-Hall, Inc.Slide 42

Page 43: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Workplace monitoring technology enables managers to learn more than ever before about the work habits and patterns of workers.

Surveillance cameras are used increasingly for nabbing routine traffic violators and detecting security violators. Their data can be combined with picture databases to locate criminals—and others.

Surveillance satellites can provide permanent peepholes into our lives for anyone willing to pay the price.

Cell phones are now required, by law, to include technology to determine and transmit their locations to emergency personnel responding to 911 calls.

© 2008 Prentice-Hall, Inc.Slide 43

Page 44: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Rules of Thumb: Your Private Rights

Your Social Security number is yours—don’t give it away.

Say “no” to direct mail and phone solicitations, sharing of personal information, and pollsters.

Know your electronic rights. Support organizations that fight for privacy rights.

© 2008 Prentice-Hall, Inc.Slide 44

Page 45: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Database programs enable users to quickly and efficiently store, organize, retrieve, communicate, and manage large amounts of information.

Database programs enable users to view data in a variety of ways, sort records in any order, and print reports, mailing labels, and other custom printouts.

Database management systems (DBMSs) can work with several data sources at once, cross-referencing information among files when appropriate.

© 2008 Prentice-Hall, Inc.Slide 45

Page 46: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

The trend today is clearly away from large, centralized databases accessible only to data-processing staff.

Organizations are moving toward a client/server approach that enables users to have access to data stored in servers throughout the organization’s network.

The accumulation of data by government agencies and businesses is a growing threat to our right to privacy.

While there are many legitimate uses for these procedures, there is also a great potential for abuse.

© 2008 Prentice-Hall, Inc.Slide 46

Page 47: © 2008 Prentice-Hall, Inc. Slide 1 Chapter 7 Database Applications and Privacy Implications © 2008 Prentice-Hall, Inc. Slide 2

Slide 47