Lecture 7
Chapter 11: Behind the Scenes: Databases and Information Systems
After reading this chapter, you should be able to answer the following questions:
- What is a database, and why is it beneficial to use databases?
- What components make up a database?
- What types of databases are there?
- What do database management systems do?
- How do relational databases organize and manipulate data?
- What are data warehouses and data marts, and how are they used?
- What is an information system, and what types of information systems are used in business?
- What is data mining, and how does it work?
Chapter 12: Behind the Scenes: Networking and Security
After reading this chapter, you should be able to answer the following questions:
- What are the advantages of a business network?
- How does a client/server network differ from a peer-to-peer network?
- What are the different classifications of client/server networks?
- What components are needed to construct a client/server network?
- What do the various types of servers do?
- What are the various network topologies (layouts), and why is network topology important in planning a network?
- What types of transmission media are used in client/server networks?
- What software needs to be running on computers attached to a client/server network, and how does this software control network communications?
- How do network adapters enable computers to participate in a client/server network?
- What devices assist in moving data around a client/server network?
- What measures are employed to keep large networks secure?
Discussion Questions
Chapter 11
- Internet databases abound with personal information about you. You probably provided some of this information, but it may have been sold to other companies. Other information about you may have been obtained without your knowledge while you surfed Web sites. Consider the following:
- Is it ethical for a company to sell personal information (such as household income) that you voluntarily gave to it?
- Is gathering information about people's surfing and buying habits by tracking their clicks through a Web site an invasion of privacy?
- Should Web sites be legally required to inform users that they are tracking surfing habits? Why or why not?
- The Internal Revenue Service (IRS) maintains large databases about taxpayers that include a wealth of information on personal income that can be easily sorted by geographic location. This information would be of great value to marketing professionals for targeting marketing programs to consumers. Currently, the IRS is prohibited from selling this information to third parties. However, the IRS (and other government agencies) are under increasing pressure to find ways to increase revenue or decrease expenses.
- After the terrorist attacks on September 11, 2001, some U.S. citizens began demanding more scrutiny of foreign nationals and people wishing to emigrate to the United States. In response to these concerns, the Department of Defense launched the Total Information Awareness (TIA) program through the Defense Advanced Research Projects Agency (DARPA). The program was created to develop data-mining techniques to probe massive federal databases as well as commercial and private employment, medical, and financial databases. The objective was to spot trends that would identify people who were threats to national security. TIA gave rise to many protests from the American public and privacy advocates about the potential invasion of provacy that such programs could engender. Although TIA's funding was cut by Congress in 2004, various other programs live on as the government uses other databases to monitor activity. For instance, in May 2006, it was revealed that millions of Americans' phone calls were being monitored, causing further public outcry about invasion of privacy.
- Research government programs that are currently in place. What data-mining efforts is the U.S. government currently using to monitor data?
- Do you think the government should institute programs like TIA? Why or why not?
- Which is more important to you: safeguarding your privacy or protecting the United States from terrorists? Why?
Chapter 12
- Internet access is deemed essential to enable students to research projects and papers adequately. But granting that access potentially invites people to engage in dangerous or unacceptable behaviors.
- Do you think your school should restrict access to certain Internet sites (such as peer-to-peer file-sharing services) to prevent students from violating laws by illegally sharing copyrighted material?
- Plagiarism is thought to be spreading because of the easy exchange of information on the Internet. What should the penalty be for a student who plagiarizes material from a Web site and why? Should a student who plagiarizes have his or her Internet access privileges revoked? Why or why not?
- Should schools prohibit students from writing negative comments about faculty and administrators on their blogs and MySpace pages? Why or why not?
- Some hackers argue that hacking should not be a crime because they are performing a service to the companies that they are hacking by pointing out weaknesses in network security.
- Should hackers be punished for gaining unapproved access to computer systems?
- Are there any instances in which hacking is a "necessary evil" and the law enforcement officials should just look the other way?
- Is it unethical for software companies not to share with users known security risks in their software?
- Many companies are drafting acceptable use policies for computers and Internet access to inform employees of the approved uses for corporate computing assets. Consider these areas of a potential company policy:
- Should employees be allowed to use their computers and Internet access for personal use (such as checking noncompany e-mail, shopping online, or playing games)? If so, how much time per day is reasonable for employees to spend on personal tasks? Should employees be permitted to use their computers for personal tasks only during personal time (such as breaks and lunch hours)?
- Should employee computer and Internet usage be monitored to ensure compliance with the personal use policies? Should employers inform employees that they are being monitored? What should the penalties be for violating these policies? Should your productivity (and pay raises) be determined based on what activities you perform during the day as monitored by the company (via computers, cameras, tracking devices, etc.)?
- Many corporations block access to Internet Web sites that would enable employees to participate in potentially illegal activities (such as downloading music, gambling, or viewing pornography). Should corporations have the right to block users from Web sites when they are at work? Why or why not?
- Assume you are designing the network layout for a local coffee shop. In which areas of the store would you provide wireless network access? Would you charge customers for access or provide it free of charge? Should customers and employees access the same network, or should a separate one be established for business activities? Would you provide all employees with Internet access? If not, whom would you exclude?