Lesson 1, Topic 1
In Progress

1.8. Locate the required information correctly within the IS structure

ryanrori February 1, 2021

[responsivevoice_button rate=”0.9″ voice=”UK English Female” buttontext=”Listen to Post”]

Most companies will design their data warehouse to minimise the risk to the raw data they have in the system. The IS department will be responsible for maintaining the integrity of the data and the only way this would be possible is to not allow users access to the actual data. 

By creating a user interface that runs queries from the data, users will be able to locate the information they need. The IS department will spend time with the business units to help them design the query system.

To locate the required information correctly within the IS structure a user enters a query into the system. Queries are formal statements of information needs, for example search strings in web search engines. In information retrieval a query does not uniquely identify a single object in the collection. Instead, several objects may match the query, perhaps with different degrees of relevance.

An object is an entity that is represented by information in a database. User queries are matched against the database information. 

Seek advice where there are difficulties in obtaining the required information

The role of a network and computer systems administrator is to work on an organisation’s computer system by designing, installing, and supporting it. They are responsible for installing and maintaining network hardware and software while also analysing any problems that can affect the availability to users. Network and computer systems administrators are responsible for WANS, LANs, the internet and network segments. They can work in small businesses, large corporations or government organisations. It is the job of a network and computer systems administrator to evaluate a system’s performance by identifying a user’s needs and determining its specific requirement. 

The job of a systems administrator is to ensure system efficiency by making sure all of its components, such as software and the network are working together. Administrators can also be responsible for troubleshooting any problems as well as sustaining network and system security. 

To seek advice where there are difficulties in obtaining the required information from the system; you need to make contact with the system administrator. They should be able to assist you with any questions. The system administrator will have access to the developers to assist them if the query is outside of the scope of the current system.

Additional authorisation is obtained for sensitive or confidential information

Access controls are security features that control how users and systems communicate and interact with other systems and resources.

Access is the flow of information between a subject and an object.

A subject is an active entity that requests access to an object or the data within an object. E.g.: user, program, process etc.

An object is a passive entity that contains the information. E.g.: Computer, Database, File, Program etc.

Access controls give organisations the ability to control, restrict, monitor, and protect resource availability, integrity and confidentiality.

To obtain additional authorisation to access sensitive or confidential information, you will need to log a request with the database administrators, in accordance with the organisation’s security regulations. Your request should be accompanied by a motivation from your supervisor. Depending on the level of sensitivity of the information, you might need to get approval from your department manager. Access will only be given when the manager in charge of the database approves the request.