CRUD: Defining Information Ownership Analysis

Improved Essays
CRUD – Defining Information Ownership
When developing and implementing a relational database, defining the information and users of the system enable definition of the business rules defining the components of the database management system. An example can be evaluated through the use of a CRUD – create, retrieve, update and delete – matrix as it relates to student information and the individuals or departments related to the school that may require access. The resulting model will be used to interpret business rules and explain how they relate to the components of a relationship database model.
CRUD – Create, Retrieve, Update and Delete
Purdue (2014) suggests the use of the CRUD two-dimensional table to visually summarize data usages by function. In the student/school relationship model, one possible interpretation of this diagram has been modeled in Table 1. For each unique role within the school environment, access rights to student information may be defined based on whether the individual performing in a given role has a need to know as set forth by the Sarbanes-Oxley Act (Lunsford & Collins, 2008). Access within an online-transaction processing (OLTP) environment may be defined based on the concepts of create, retrieve, update and delete.
…show more content…
These business rules support the definition of the primary components of the relational database storing this student and school information: a data dictionary, primary keys, foreign keys and integrity constraints. From a high-level, the model suggests Finance, Faculty and Student Advising have retrieve visibility to necessary aspects of the student information while Enrollment controls creation of the student record and student Records controls update and delete

Related Documents

  • Decent Essays

    In the case of the State of Washington’s EDIE database, information technology and systems support helped in managing the EDIE data. It organized, stored, assessed, analyzed, and interpreted patient data whenever they visited the Emergency room. The data in the EDIE database became information and then knowledge to physicians which supported them in making fast decisions on patients admitted to the emergency room. Thus, having a well-managed database puts an organization at a competitive advantage. The emergency visits dropped as well as substantial amount of the state’s Medicaid costs.…

    • 284 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Sc300 Unit 3 Assignment

    • 1018 Words
    • 5 Pages

    To be consistent with the existing infrastructure Microsoft technology will be used exclusively R. Klima 08/16/2015 OUT OF SCOPE ID Scope Statement Who Identified Date Identified Comments OSC1 Any database schema that is used to register students, collect tuition or schedule classes Business Analyst 08/16/2015 OSC2 Any web portal to facilitate student registration or tuition payment or class selection or registration Business Analyst 08/16/2015…

    • 1018 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    BA501 Overview of Business Intelligence Week 1 Assignment David Nagus Grantham University Professor Jackson May 6, 2015 I Introduction With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Initially the principal needs to apply ISLLC Standard 2 which “promotes the success of every student by advocating, nurturing, and sustaining a school culture and…

    • 857 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    College to Career: A recent survey commissioned by Bentley University in 2014 found that “compared with business decision-makers and corporate recruiters, high school and college students were far less likely to define preparedness in terms of personal traits or work ethic” (Chase, 2015). This means skills and experience rank high for college students when they evaluate preparedness. Unfortunately, the same survey found “thirty-seven percent of recent college graduates give themselves a grade of “C” or lower on their individual level of preparedness” (Chase, 2015).…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Bcba Ethical Dilemmas

    • 926 Words
    • 4 Pages

    Even though the BCBA was called to access the child in the school setting the BCBA is working for the child/client. Therefore, guideline 2.03 refers…

    • 926 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Zillow Case Study Essay

    • 1460 Words
    • 6 Pages

    The database contains data and information related to the systems, including the details of the users and the transactions, while the DBMS creates, modifies, and delete data in the database, as well as maintaining access control and data security. Zillow’s business is to provide information on real estate and mortgages. It recognizes that it needs to make its data accessible, scalable, reliable, and secure with high level of performance, and a relational database would provide the business advantages of meeting these needs, through increased flexibility, increased scalability and performance, reduced redundant information, increased information quality, and increased information security (Baltzan,…

    • 1460 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Setting the Bar High: An Analysis of William H. Johnson’s Leadership at Rockville Centre School District Commentary Academic tracking of students is one of the most controversial topics in education. Although tracking sometimes allows for individualized instruction based on student needs and proficiency, it can also stifle students from reaching their full scholarly potential. At Rockville Centre school district, superintendent William H. Johnson sought to increase access to rigorous coursework for all students by eliminating the districts five-tiered tracking system. His decision, which was not readily accepted by teachers and parents in the school district, proved successful—by using data as the foundation for change, Johnson has increased…

    • 842 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Students will be aware of the rules and expectations…

    • 352 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    The accountant of the conquest, and the making of what is today Latin America is a debatable subject in the field of humanities, especially in the field history. The most widespread approaches of this history are that of violence, war, oppression, possession of territories, and foundation of new colonies. In Frontier of Possessions, Tamar Herzog, a historian, professor of Latin American presents an account of the conquest from a different perspective, one that proposes that the acquisition of the territory of the New World by Spain and Portugal was a result of “interactions of many actors that caused territorial division in both Iberia and the Americas” (Herzog, 6). Hence, I conquer that one of the reasons of the conquest was the desire to…

    • 1508 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    In all organisations, there are policies and procedures that control access to confidential information. Types of information that is sensitive includes personal information e.g. colleagues age, address, medical history and details of personal relationships. Sensitive data that is also available but must be kept confidential is financial information including how much they earn, also information on customers or contacts that would be highly valuable to other organisations. Businesses receive and produce a lot of information all the time and it is vital that this information is stored safely and can be found quickly. To access this, a suitable system needs to be in place to allow everyone to find the documents they need.…

    • 256 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Rights Based Approach

    • 1859 Words
    • 8 Pages

    The rights based approach to researching children and young people is where they are involved actively in the research, not just as objects but as citizens with rights, (Fraser et al cited in, Open University, 2014), valued as an important source of knowledge about their own life and experiences. (Open University, 2014) However, as with all forms of research there are ethical and practical implications. There are some concerns surrounding the infringement of the child and young person’s rights (Fraser, Flewitt and Hammersley, 2014), as well as concerns over the consequence and the process of the research. As well as questions surrounding any harm, both physical and mental that the research may cause.…

    • 1859 Words
    • 8 Pages
    Superior Essays
  • Great Essays

    I currently work as an Interventionist. I provide small group interventions to at risk elementary students. The teacher leadership program has added purpose to my profession as an educator. I’ve learned to use data and records on students as powerful resources to plan effective lessons. Data lets me learn strengthens and weaknesses of the students.…

    • 1554 Words
    • 7 Pages
    Great Essays