A Requirement-Based Approach to Data Modeling and Re-Engineering

Total Page:16

File Type:pdf, Size:1020Kb

A Requirement-Based Approach to Data Modeling and Re-Engineering A Requirement-Based Approach to Data Modeling and Re-engineering Alice H. Muntz Christian T. Ramiller Hughes Information Technology Corporation HughesInformation Technology Corporation MS SUS64lC410 MS SClS64lC41O PO Box 929 19 PO Box 929 19 Los Angeles, CA 90009 Los Angeles, CA 90009 ahmuntz8hac2arpa.hac.com 1. Introduction Abstract Re-engineering is the process of analyzing, upgrading, This paper reports on the managerialexperience, and integrating enterpriseinformation systemsto meet the technical approach, and lessonslearned from re- expandedoperating requirementsof the present, as well as engineering eight departmental large-scale to prepare a sound base for effectively meeting future information systems. The driving strategic needs. In this paper, we report our experience, key objective of each project was to migrate these technical approach,and lessonslearned from applying our systems into a set of enterprise-wide systems, framework ([MH94], [AHR94], [AHR93], [HI93a], which incorporate current and future [HI93b]) to eight large scale legacy information systems, requirements, drastically reduce operational and each containing several million lines of code, and maintenance cost, and facilitate common thousandsof data elements. understandings among stakeholders(i.e., policy Our requirement-basedre-engineering approach differs maker, high-level management, IS from ([P&B94], [HDA87], [M&M90], [M&S89], developer/maintainer/end-users). A logical data [NEK94], [MNBBK94],[HCTJ93]) that we couple our model , which contains requirements, rules, extended entity-relationship modeling methodology and physical data representation as well as logical tools with model integration processes to produce a data object, clearly documents the baseline data normalized data model. In a re-engineered data model, requirements implemented by the legacy system the physical data objects, pertaining to the physical and is crucial to achieve this strategic goal. schemas,link to the relevant logical data objects, external Re-engineering products are captured in the data objects,business requirements, and systemrules. dictionaries of a CASE tool (i.e., in the form of a business process decomposition hierarchy, as-is Why Requirement-Based Data Modeling and Re- data model, normalized logical data model, and engineering? linkages among data objects) and are supplemented with traceability matrices in A requirement-basedre-engineering approach should be spreadsheets.The re-engineered data products used when the information infrastructure of an enterprise are used as follows: (1) migration of the legacy is out-of-control and is not meeting its goals. Typical databases to relational database management symptomsare: systems, (2) automatically generation of people can’t share or integrate data across the databasesand applications for migration from enterprise mainframes to client-server, (3) enterprise data data can’t be combined from multiple sources standardization, (4) integration of disparate the information people need is in a system information systems, (5) re-documentation, (6) somewhere else, not accessibleto them data quality assessmentand assurance,and (7) the Information System (IS) staff can’t support the baseline specifications for future systems. existing infrastructure becauseof obsolete platforms or programs designed, built, and supported by one person Pemdssion to copy withoutfee all or part of this material ir grantedprovided that the copies are not made or distributedfor direct commercial advantage, the VLDB the IS department charges are skyrocketing, but copyright notice and the title of the publication and it3 date appear, and notice is people still can’t get the information they need (what) given that copying b by permission of tk Very Large DotaBare Endowment. To copy otherwise, or to republish, requires a fee on&or special permission from the to conduct the business;when they want it, how they EJt&wment. want it, or in the form they want it Proceedings of the 20th VLDB Conference Santiago, the information systems don’t support enterprise Chile, 1994 strategicplanning or tactical decision support information and application requirements have not been mappedto businessfunctions 643 IS Development Life Cycle Information Technology (IT) Task Use of Requirement-Based Re-Engineering Products I BusinessRequirements * Functional Economic Analysis B understanding requirements of as-is business processes l BusinessProcess Improvement /data models and how IS supportsusers and business l Enterprise Data Architecture . inventory of baseline requirements implemented in the * EnterpriseData Model current IS l Cross-functional Model . composition of the logical data dimension and tbe physical Integration data dimension of enterprise data architecture and l EnterpriseModel Integration enterprisedata model l Data Element Standardization m integration of tactical and operational data models among l EnterpriseData Warehouse businessfunctions l EnterpriseData Repository . integration of strategic, tactical, and operational data modelsfor all businessfunctions . uniform name for the samedata object to facilitate reuse * same name, meaning, and usage for the sharable data instancesand objects . Information system l Enterprise IT Consolidation identification of duplicating or similar databasesfor the Requirements Planning samebusiness functions l EnterpriseIS Security l understanding requirements of as-is business processes /data modelsand how IS supportsusers and business Software/Database l Forward Engineering l elimination of obsolete requirements, modification of Requirements changedrequirements, and addition of new requirements Preliminary Design l data objects formulated from data usage,processing rules, Detail Design l Object Engineering attributes, and entities of logical data model l data quality requirementsrepresented in the re-engineered logical data model l Data Quality Engineering Implementation l DatabaseGeneration l databasesand tables automatically generated by CASE tools using re-engineereddata models l ScreenGeneration l screen/reportdesign and implementation via CASE tools l Report Generation using re-engineereddata models Unit Test l Data Migration l linkage between the legacy data elements to the as-is Integration normalized data model used by the data extraction Program l linkage between the to-be data element to the as-is normalized data model used to store the extracted legacy data to the to-be databasetables l Data Quality Assurance l data quality requirements specified in the re-engineered data model l Data Administration l data requirements specified in the re-engineered data model l Training l understandingof requirementsand how tbe IS implements I l Maintenance I the requirements Table 1. Use of Requirement-Based Re-Engineering Products new application architecture and technology l modifying one application causes errors, aborts, and / infrastructure. or erroneous information in a different application As a part of our re-engineering approach, we resolve data A requirement-based data modeling and re-engineering conflicts (e.g., synonyms, homonyms) during data approach should be used to re-document or map business modeling and model integration. In section two, we requirements, functional requirements, and data describe our approach to identify data conflicts and requirements to architecture, design, and implementation. classify data conflicts. Depending on the scope of the re- As depicted in Table 1, re-engineered data models enable engineering effort, various levels of integration will occur. identification of obsolete portions of applications, We developed an integration taxonomy to guide our outstanding unfulfilled requirements, applications that integration process for data modeling and re-engineering require changes or consolidation based on new functional legacy information systems. Sections 3 describes this requirements to meet current and future business needs. integration taxonomy. Section 4 describes our The re-engineered design will provide a basis for requirement-based data modeling approach. Section 5 developing a plan to migrate reusable applications to the uses an example to illustrate our model integration 644 approach. Finally, in the last section, we summarize Synonyms are data element names which are different lessonslearned from these re-engineering experiences. but which are used to describe the same thing in the various systems. The “same thing” refers to (a) the same 2. Five Data Conflicts Types critical attribute of a real-world thing, or (b) the same real-world thing. An example is shown in Figure 1. Here When systems are to be re-engineered or consolidated, the term ACTIVITY within the pay system is used to functional and data conflicts, and data duplication need identify what is called a UNIT or ORGANIZATION special attention, to determine the impact of selecting one within the personnel system.This conflict was uncovered system’simplementation over another. Data conflicts fall by noting the similarity in associations as well as in into one of 5 general types. definition. Personnel Data MODEL I Pay MODEL ORGANIZATION_ UNIT _ POSITION ORGANIZATION- ACTIVITY - POSITION ORGANIZATION-- any groupof individualsthat servea ACTIVITY- an organization identified by ths major daiment code, for which 1 functionwithin the Enterprise. grouping of employees works. UNIT-- an organizationalsub-group identified by the personnelaccounting symbol authorization number to track the ownerof a positionto whichemployees will
Recommended publications
  • Powerdesigner 16.6 Data Modeling
    SAP® PowerDesigner® Document Version: 16.6 – 2016-02-22 Data Modeling Content 1 Building Data Models ...........................................................8 1.1 Getting Started with Data Modeling...................................................8 Conceptual Data Models........................................................8 Logical Data Models...........................................................9 Physical Data Models..........................................................9 Creating a Data Model.........................................................10 Customizing your Modeling Environment........................................... 15 1.2 Conceptual and Logical Diagrams...................................................26 Supported CDM/LDM Notations.................................................27 Conceptual Diagrams.........................................................31 Logical Diagrams............................................................43 Data Items (CDM)............................................................47 Entities (CDM/LDM)..........................................................49 Attributes (CDM/LDM)........................................................55 Identifiers (CDM/LDM)........................................................58 Relationships (CDM/LDM)..................................................... 59 Associations and Association Links (CDM)..........................................70 Inheritances (CDM/LDM)......................................................77 1.3 Physical Diagrams..............................................................82
    [Show full text]
  • Blockchain Database for a Cyber Security Learning System
    Session ETD 475 Blockchain Database for a Cyber Security Learning System Sophia Armstrong Department of Computer Science, College of Engineering and Technology East Carolina University Te-Shun Chou Department of Technology Systems, College of Engineering and Technology East Carolina University John Jones College of Engineering and Technology East Carolina University Abstract Our cyber security learning system involves an interactive environment for students to practice executing different attack and defense techniques relating to cyber security concepts. We intend to use a blockchain database to secure data from this learning system. The data being secured are students’ scores accumulated by successful attacks or defends from the other students’ implementations. As more professionals are departing from traditional relational databases, the enthusiasm around distributed ledger databases is growing, specifically blockchain. With many available platforms applying blockchain structures, it is important to understand how this emerging technology is being used, with the goal of utilizing this technology for our learning system. In order to successfully secure the data and ensure it is tamper resistant, an investigation of blockchain technology use cases must be conducted. In addition, this paper defined the primary characteristics of the emerging distributed ledgers or blockchain technology, to ensure we effectively harness this technology to secure our data. Moreover, we explored using a blockchain database for our data. 1. Introduction New buzz words are constantly surfacing in the ever evolving field of computer science, so it is critical to distinguish the difference between temporary fads and new evolutionary technology. Blockchain is one of the newest and most developmental technologies currently drawing interest.
    [Show full text]
  • Arcgis Marine Data Model Reference
    ArcGIS Marine Data Model Reference ArcGIS Marine Data Model (June 2003) This document provides an Dawn J. Wright, Oregon State U. overview of the ArcGIS Marine Patrick N. Halpin, Duke U. Data Model. This model focuses on Michael Blongewicz, DHI important features of the ocean realm, both natural and manmade, Steve Grisé, ESRI Redlands with a view towards the many Joe Breman, ESRI Redlands applications of marine GIS data. ArcGIS Data Models TABLE OF CONTENTS Acknowledgements ................................................................................................................... 4 Introduction ............................................................................................................................... 5 Why a Marine Data Model?.................................................................................................... 6 Intended Audience and Scope of the Model............................................................................ 8 The Process of Building a Data Model ..................................................................................... 10 Final Data Model Content, Purpose and Use........................................................................ 14 Data Model Description ........................................................................................................... 16 Overview ............................................................................................................................. 16 Conceptual Framework....................................................................................................
    [Show full text]
  • An Introduction to Cloud Databases a Guide for Administrators
    Compliments of An Introduction to Cloud Databases A Guide for Administrators Wendy Neu, Vlad Vlasceanu, Andy Oram & Sam Alapati REPORT Break free from old guard databases AWS provides the broadest selection of purpose-built databases allowing you to save, grow, and innovate faster Enterprise scale at 3-5x the performance 14+ database engines 1/10th the cost of vs popular alternatives - more than any other commercial databases provider Learn more: aws.amazon.com/databases An Introduction to Cloud Databases A Guide for Administrators Wendy Neu, Vlad Vlasceanu, Andy Oram, and Sam Alapati Beijing Boston Farnham Sebastopol Tokyo An Introduction to Cloud Databases by Wendy A. Neu, Vlad Vlasceanu, Andy Oram, and Sam Alapati Copyright © 2019 O’Reilly Media Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://oreilly.com). For more infor‐ mation, contact our corporate/institutional sales department: 800-998-9938 or [email protected]. Development Editor: Jeff Bleiel Interior Designer: David Futato Acquisitions Editor: Jonathan Hassell Cover Designer: Karen Montgomery Production Editor: Katherine Tozer Illustrator: Rebecca Demarest Copyeditor: Octal Publishing, LLC September 2019: First Edition Revision History for the First Edition 2019-08-19: First Release The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. An Introduction to Cloud Databases, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. The views expressed in this work are those of the authors, and do not represent the publisher’s views.
    [Show full text]
  • Data Model Standards and Guidelines, Registration Policies And
    Data Model Standards and Guidelines, Registration Policies and Procedures Version 3.2 ● 6/02/2017 Data Model Standards and Guidelines, Registration Policies and Procedures Document Version Control Document Version Control VERSION D ATE AUTHOR DESCRIPTION DRAFT 03/28/07 Venkatesh Kadadasu Baseline Draft Document 0.1 05/04/2007 Venkatesh Kadadasu Sections 1.1, 1.2, 1.3, 1.4 revised 0.2 05/07/2007 Venkatesh Kadadasu Sections 1.4, 2.0, 2.2, 2.2.1, 3.1, 3.2, 3.2.1, 3.2.2 revised 0.3 05/24/07 Venkatesh Kadadasu Incorporated feedback from Uli 0.4 5/31/2007 Venkatesh Kadadasu Incorporated Steve’s feedback: Section 1.5 Issues -Change Decide to Decision Section 2.2.5 Coordinate with Kumar and Lisa to determine the class words used by XML community, and identify them in the document. (This was discussed previously.) Data Standardization - We have discussed on several occasions the cross-walk table between tabular naming standards and XML. When did it get dropped? Section 2.3.2 Conceptual data model level of detail: changed (S) No foreign key attributes may be entered in the conceptual data model. To (S) No attributes may be entered in the conceptual data model. 0.5 6/4/2007 Steve Horn Move last paragraph of Section 2.0 to section 2.1.4 Data Standardization Added definitions of key terms 0.6 6/5/2007 Ulrike Nasshan Section 2.2.5 Coordinate with Kumar and Lisa to determine the class words used by XML community, and identify them in the document.
    [Show full text]
  • Integration Definition for Function Modeling (IDEF0)
    NIST U.S. DEPARTMENT OF COMMERCE PUBLICATIONS £ Technology Administration National Institute of Standards and Technology FIPS PUB 183 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION INTEGRATION DEFINITION FOR FUNCTION MODELING (IDEFO) » Category: Software Standard SUBCATEGORY: MODELING TECHNIQUES 1993 December 21 183 PUB FIPS JK- 45C .AS A3 //I S3 IS 93 FIPS PUB 183 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION INTEGRATION DEFINITION FOR FUNCTION MODELING (IDEFO) Category: Software Standard Subcategory: Modeling Techniques Computer Systems Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Issued December 21, 1993 U.S. Department of Commerce Ronald H. Brown, Secretary Technology Administration Mary L. Good, Under Secretary for Technology National Institute of Standards and Technology Arati Prabhakar, Director Foreword The Federal Information Processing Standards Publication Series of the National Institute of Standards and Technology (NIST) is the official publication relating to standards and guidelines adopted and promulgated under the provisions of Section 111 (d) of the Federal Property and Administrative Services Act of 1949 as amended by the Computer Security Act of 1987, Public Law 100-235. These mandates have given the Secretary of Commerce and NIST important responsibilities for improving the utilization and management of computer and related telecommunications systems in the Federal Government. The NIST, through its Computer Systems Laboratory, provides leadership, technical guidance,
    [Show full text]
  • Metamodeling and Method Engineering with Conceptbase”
    This is a pre-print of the book chapter M. Jeusfeld: “Metamodeling and method engineering with ConceptBase” . In Jeusfeld, M.A., Jarke, M., Mylopoulos, J. (eds): Metamodeling for Method Engineering, pp. 89-168. The MIT Press., 2009; the original book is available from MIT Press http://mitpress.mit.edu/node/192290 This pre-print may only be used for scholar, non-commercial purposes. Most of the sources for the examples in this chapter are available via http://merkur.informatik.rwth-aachen.de/pub/bscw.cgi/3782591 for download. They require ConceptBase 7.0 or later available from http://conceptbase.cc. Metamodeling and Method Engineering with ConceptBase Manfred Jeusfeld Abstract. This chapter provides a practical guide on how to use the meta data repository ConceptBase to design information modeling methods by using meta- modeling. After motivating the abstraction principles behind meta-modeling, the language Telos as realized in ConceptBase is presented. First, a standard factual representation of statements at any IRDS abstraction level is defined. Then, the foundation of Telos as a logical theory is elaborated yielding simple fixpoint semantics. The principles for object naming, instantiation, attribution, and specialization are reflected by roughly 30 logical axioms. After the language axiomatization, user-defined rules, constraints and queries are introduced. The first part is concluded by a description of active rules that allows the specification of reactions of ConceptBase to external events. The second part applies the language features of the first part to a full-fledged information modeling method: The Yourdan method for Modern Structured Analysis. The notations of the Yourdan method are designed along the IRDS framework.
    [Show full text]
  • A Model-To-Model Transformation of a Generic Relational Database Schema Into a Form Type Data Model
    Proceedings of the Federated Conference on Computer Science DOI: 10.15439/2016F408 and Information Systems pp. 1577–1580 ACSIS, Vol. 8. ISSN 2300-5963 A Model-to-Model Transformation of a Generic Relational Database Schema into a Form Type Data Model Sonja Ristić, Slavica Kordić, Milan Čeliković, Vladimir Dimitrieski, Ivan Luković University of Novi Sad, Faculty of Technical Sciences, Trg D. Obradovića 6, 21000 Novi Sad, Serbia Email: {sdristic, slavica, milancel, dimitrieski, ivan}@uns.ac.rs ฀ engineering and review different database meta-models Abstract—An important phase of a data-oriented software (MM) that are used in the database reengineering process system reengineering is a database reengineering process and, applied in IIS*Studio. In [5] we propose an MD approach to in particular, its subprocess – a database reverse engineering data structure conceptualization phase of database reverse process. In this paper we present one of the model-to-model engineering process that is conducted through a chain of transformations from a chain of transformations aimed at transformation of a generic relational database schema into a M2M transformations. In this paper we present the final step form type data model. The transformation is a step of the data of the conceptualization phasethe M2M transformation of structure conceptualization phase of a model-driven database a generic relational database schema into a form type model. reverse engineering process that is implemented in IIS*Studio The form type concept and the IIS*Studio architecture are development environment. given in Section 2. Classifications of form types and relation schemes are described in Section 3. The transformation of a I.
    [Show full text]
  • Middleware-Based Database Replication: the Gaps Between Theory and Practice
    Appears in Proceedings of the ACM SIGMOD Conference, Vancouver, Canada (June 2008) Middleware-based Database Replication: The Gaps Between Theory and Practice Emmanuel Cecchet George Candea Anastasia Ailamaki EPFL EPFL & Aster Data Systems EPFL & Carnegie Mellon University Lausanne, Switzerland Lausanne, Switzerland Lausanne, Switzerland [email protected] [email protected] [email protected] ABSTRACT There exist replication “solutions” for every major DBMS, from Oracle RAC™, Streams™ and DataGuard™ to Slony-I for The need for high availability and performance in data Postgres, MySQL replication and cluster, and everything in- management systems has been fueling a long running interest in between. The naïve observer may conclude that such variety of database replication from both academia and industry. However, replication systems indicates a solved problem; the reality, academic groups often attack replication problems in isolation, however, is the exact opposite. Replication still falls short of overlooking the need for completeness in their solutions, while customer expectations, which explains the continued interest in developing new approaches, resulting in a dazzling variety of commercial teams take a holistic approach that often misses offerings. opportunities for fundamental innovation. This has created over time a gap between academic research and industrial practice. Even the “simple” cases are challenging at large scale. We deployed a replication system for a large travel ticket brokering This paper aims to characterize the gap along three axes: system at a Fortune-500 company faced with a workload where performance, availability, and administration. We build on our 95% of transactions were read-only. Still, the 5% write workload own experience developing and deploying replication systems in resulted in thousands of update requests per second, which commercial and academic settings, as well as on a large body of implied that a system using 2-phase-commit, or any other form of prior related work.
    [Show full text]
  • Database Technology for Bioinformatics from Information Retrieval to Knowledge Systems
    Database Technology for Bioinformatics From Information Retrieval to Knowledge Systems Luis M. Rocha Complex Systems Modeling CCS3 - Modeling, Algorithms, and Informatics Los Alamos National Laboratory, MS B256 Los Alamos, NM 87545 [email protected] or [email protected] 1 Molecular Biology Databases 3 Bibliographic databases On-line journals and bibliographic citations – MEDLINE (1971, www.nlm.nih.gov) 3 Factual databases Repositories of Experimental data associated with published articles and that can be used for computerized analysis – Nucleic acid sequences: GenBank (1982, www.ncbi.nlm.nih.gov), EMBL (1982, www.ebi.ac.uk), DDBJ (1984, www.ddbj.nig.ac.jp) – Amino acid sequences: PIR (1968, www-nbrf.georgetown.edu), PRF (1979, www.prf.op.jp), SWISS-PROT (1986, www.expasy.ch) – 3D molecular structure: PDB (1971, www.rcsb.org), CSD (1965, www.ccdc.cam.ac.uk) Lack standardization of data contents 3 Knowledge Bases Intended for automatic inference rather than simple retrieval – Motif libraries: PROSITE (1988, www.expasy.ch/sprot/prosite.html) – Molecular Classifications: SCOP (1994, www.mrc-lmb.cam.ac.uk) – Biochemical Pathways: KEGG (1995, www.genome.ad.jp/kegg) Difference between knowledge and data (semiosis and syntax)?? 2 Growth of sequence and 3D Structure databases Number of Entries 3 Database Technology and Bioinformatics 3 Databases Computerized collection of data for Information Retrieval Shared by many users Stored records are organized with a predefined set of data items (attributes) Managed by a computer program: the database
    [Show full text]
  • Using Telelogic DOORS and Microsoft Visio to Model and Visualize Complex Business Processes
    Using Telelogic DOORS and Microsoft Visio to Model and Visualize Complex Business Processes “The Business Driven Application Lifecycle” Bob Sherman Procter & Gamble Pharmaceuticals [email protected] Michael Sutherland Galactic Solutions Group, LLC [email protected] Prepared for the Telelogic 2005 User Group Conference, Americas & Asia/Pacific http://www.telelogic.com/news/usergroup/us2005/index.cfm 24 October 2005 Abstract: The fact that most Information Technology (IT) projects fail as a result of requirements management problems is common knowledge. What is not commonly recognized is that the widely haled “use case” and Object Oriented Analysis and Design (OOAD) phenomenon have resulted in little (if any) abatement of IT project failures. In fact, ten years after the advent of these methods, every major IT industry research group remains aligned on the fact that these projects are still failing at an alarming rate (less than a 30% success rate). Ironically, the popularity of use case and OOAD (e.g. UML) methods may be doing more harm than good by diverting our attention away from addressing the real root cause of IT project failures (when you have a new hammer, everything looks like a nail). This paper asserts that, the real root cause of IT project failures centers around the failure to map requirements to an accurate, precise, comprehensive, optimized business model. This argument will be supported by a using a brief recap of the history of use case and OOAD methods to identify differences between the problems these methods were intended to address and the challenges of today’s IT projects.
    [Show full text]
  • What Is a Database? Differences Between the Internet and Library
    What is a Database? Library databases are mostly full-text material (in their entirety) and summaries or descriptions of articles. They are collections of articles from newspapers, magazines and journals and electronic reference sources. Databases are selected for the quality and variety of resources they offer and are accessed using the Internet. Your library pays for you to have access to a number of relevant databases. You support this with your tuition, so get the most out of your money! You can access them from home or school via the Library Webpage or use the link below. http://www.mxcc.commnet.edu/Content/Find_Articles.asp Two short videos on the benefits of using library databases: http://www.youtube.com/watch?v=VUp1P-ubOIc http://youtu.be/Q2GMtIuaNzU Differences Between the Internet and Library Databases The Internet Library Databases Examples Google, Yahoo, Bing LexisNexis, Literary Reference Center or Health and Wellness Resource Center Review process None – anyone can add Checked for accuracy by content to the Web. publishers. Chosen by your college’s library. Includes “peer-reviewed” scholarly articles. Reliability Unknown Very No quality control mechanisms! Content Anything, from pictures of a Scholarly journal articles, Book person’s pets to personal reviews, Research papers, (usually not researched and Conference papers, and other unsubstantiated) opinions on scholarly information gun control, abortion, etc. How often updated Unknown/varies. Regularly – daily, quarterly monthly Cost “Free” but some of the info Library has paid for you to you may need for your access these databases. assignment requires a fee. Organization Very little or no organization Very organized Availability Websites come and go.
    [Show full text]