You are on page 1of 4

IT1715

Data Lifecycle

What is Data?
Data is distinct pieces of information, usually formatted in a special way. Data can exist in a variety of forms —
as numbers or text on pieces of paper, as bits and bytes stored in electronic memory, or as facts stored in a
person's mind.

What is Data Management?


Data management refers to an organization's management of information and data for secure and structured
access and storage.
• Data access refers to your ability to get to and retrieve information wherever it is stored. Certain
technologies can make this step as easy and efficient as possible so you can spend more time using the
data – not just trying to find it.
• Data quality is the practice of making sure data is accurate and usable for its intended purpose. This starts
from the moment data is accessed and continues through various integration points with other data –
and even includes the point before it is published or reported.
• Data integration defines the steps for combining different types of data. Data integration tools help you
design and automate the steps that do this work.
• Data federation is a special kind of virtual data integration that allows you to look at combined data from
multiple sources without the need to move and store the combined view in a new location.
• Data governance is an ongoing set of rules and decisions for managing your organization’s data to ensure
that your data strategy is aligned with your business strategy.
• Master data management (MDM) defines, unifies and manages all of the data that is common and
essential to all areas of an organization. This master data is typically managed from a single location or
hub.
• Data streaming involves analyzing data as it moves by applying logic to the data, recognizing patterns in
the data and filtering it for multiple uses as it flows into your organization.

Data Lifecycle Management (DLM) is a process that


helps organizations manage the flow of data
throughout its lifecycle—from creation, to use, to
sharing, archive and deletion.

Data Capture: The act of creating data values that do


not yet exist and have never existed within the
enterprise. There are three (3) main ways that data can
be captured, and these are very important:
• Data Acquisition: the ingestion of already
existing data that has been produced by an
organization outside the enterprise
• Data Entry: the creation of new data values for
the enterprise by human operators or devices
that generate data for the enterprise
• Signal Reception: the capture of data created by devices, typically important in control systems, but
becoming more important for information systems with the Internet of Things
• Data Maintenance: the supplying of data to points at which Data Synthesis and Data Usage occur, ideally
in a form that is best suited for these purposes.
• Data Synthesis: the creation of data values via inductive logic, using other data as input.
• Data Usage: The application of data as information to tasks that the enterprise needs to run and manage
itself.
• Data Publication: The sending of data to a location outside of the enterprise.
• Data Archival: The copying of data to an environment where it is stored in case it is needed again in an
active production environment, and the removal of this data from all active production environments.

02 Handout 1 *Property of STI


Page 1 of 4
IT1715

• Data Purging: The removal of every copy of a data item from the enterprise.

The Elements of Data Management


ELEMENTS DESCRIPTION
Format Formats in which the data will be generated, maintained, and made available, including
a justification for the procedural and archival appropriateness of those formats.
Data description A description of the information to be gathered; the nature and scale of the data that
will be generated or collected
Existing data A survey of existing data relevant to the project and a discussion of whether and how
these data will be integrated.
Metadata A description of the metadata to be provided along with the generated data, and a
discussion of the metadata standards used.

Storage and backup Storage methods and backup procedures for the data, including the physical and cyber
resources and facilities that will be used for the effective preservation and storage of
the research data.
Security A description of technical and procedural protections for information, including
confidential information, and how permissions, restrictions, and embargoes will be
enforced.
Responsibility Names of the individuals responsible for data management in the research project.

Intellectual Entities or persons who will hold the intellectual property rights to the data, and how IP
property rights will be protected if necessary. Any copyright constraints (e.g., copyrighted data
collection instruments) should be noted.

Access and sharing A description of how data will be shared, including access procedures, embargo periods,
technical mechanisms for dissemination and whether access will be open or granted
only to specific user groups. A timeframe for data sharing and publishing should also be
provided.

Audience The potential secondary users of the data.

Selection and A description of how data will be selected for archiving, how long the data will be held,
retention periods and plans for eventual transition or termination of the data collection in the future.

Archiving and The procedures in place or envisioned for long-term archiving and preservation of the
preservation data, including succession plans for the data should the expected archiving entity go out
of existence.

Ethics and Privacy A discussion of how informed consent will be handled and how privacy will be protected,
including any exceptional arrangements that might be needed to protect participant
confidentiality, and other ethical issues that may arise.

Budget The costs of preparing data and documentation for archiving and how these costs will
be paid. Requests for funding may be included.

Data Organization How the data will be managed during the project, with information about version
control, naming conventions, etc.

02 Handout 1 *Property of STI


Page 2 of 4
IT1715

Quality Assurance Procedures for ensuring data quality during the project.

Legal Requirements A listing of all relevant federal or funder requirements for data management and data
sharing.

Benefits of Data Management


• Minimized errors: Effective data management helps in minimizing potential errors and damages caused
by them.
• Efficiency Improvements: If data is properly managed, updated and enhanced, then fast access to all
employees in the organization is made possible, increasing worker efficiency.
• Protection from data related problems and risks: Security of data is very important and proper data
management helps in ensuring that vital data is never lost and is protected inside the organization. Data
security is an essential part of data management companies, one that protects members and companies
from various data loss, thefts and breaches.
• Data Quality Improvement: Better data management helps in improving data quality and access.
Therefore, better search results are obtained in a company with better and faster access to the
organization’s data.
Ethics and Information Systems

What is Ethics?
• Ethics is the branch of philosophy that deals with the determination of what is right or wrong, good or
bad.
• Some philosophers believe that ethical behavior must be grounded in absolute moral principles, such as
"Behave towards others as you want them to behave toward you.“
Others believe that ethical behaviors are required because they lead to the greatest good for the greatest
number of people

What is Business Ethics?


Business ethics refers to inquiry into the nature and grounds of moral judgments, standards and rules of
conduct in situations involving business decisions.

What is the connection of Ethics to Information Systems?


• Technology of some type has always been used to control the content and flow of information, but the
technology itself is ethically neutral.
• The notion of the computer or information system in the back room, unseen and unaffected by other
activities in the firm, is becoming outdated. When information systems personnel engage in unethical
behavior, the entire organization suffers.
• Increasing scrutiny of these operations by both management and outside parties will make it difficult to
hide behind comments such as: "Our job is to ensure the integrity of the data. Use of the data is not our
job".

For firms to operate ethically, there must be a climate conducive to ethical behavior in the society.

"Ethics and competitiveness are inseparable”, Former IBM Chairman John Akers.

Exploring Ethics Issues in Information Systems

Ethics is required in information Systems to overcome the following ethical issues:


• Privacy
• Accuracy
• Property
• Accessibility

02 Handout 1 *Property of STI


Page 3 of 4
IT1715

Information System ethics explores and evaluates:


• the development of moral values in the information field;
• the creation of new power structures in the information field, information myths;
• hidden contradictions and intentionality's in information theories and practices;
• the development of ethical conflicts in the information field.

Information systems confront society with a variety of challenges of an ethical nature, some old and some new:
• Confidentiality
• Social responsibility of programmers and of their managers.
• Social responsibility of systems analysts
• Issues common to all managers
• Dealing with others

REFERENCES:

Lavina, C., Erise, M., Barcenas, C., & Calyua, S. (2012). Ethics for IT professionals with legal aspects in computing.
Intramuros, Manila: Mindshapers Co.,Inc.
RingLead, Inc.(2014). Importance of Data. Retrieved from https://www.ringlead.com/the-importance-of-data-
management-in-companies/#.Wa9Qv8gjEpsv
Reynolds, G. (2014). Principles of ethics in information technology. Pasig City, Philippines: Cengage Learning Asia Pte
Ltd.

02 Handout 1 *Property of STI


Page 4 of 4

You might also like