

The larger your database, the higher the possibility of data repetition and inaccuracies that compromise the results you pull from the database. Normalization in DBMS exists to counteract those problems by helping you to create more uniform databases in which redundancies are less likely to occur.
Mastering normalization is a key skill in DBMS for the simple fact that an error-strewn database is of no use to an organization. For example, a retailer that has to deal with a database that has multiple entries for phone numbers and email addresses is a retailer that can’t see as effectively as one that has a simple route to the customer. Let’s look at normalization in DBMS and how it helps you to create a more organized database.
The Concept of Normalization
Grab a pack of playing cards and throw them onto the floor. Now, pick up the “Jack of Hearts.” It’s a tough task because the cards are strewn all over the place. Some are facing down and there’s no rhyme, reason, or pattern to how the cards lie, meaning you’re going to have to check every card individually to find the one you want.
That little experiment shows you how critical organization is, even with a small set of “data.” It also highlights the importance of normalization in DBMS. Through normalization, you implement organizational controls using a set of principles designed to achieve the following:
- Eliminate redundancy – Lower (or eliminate) occurrences of data repeating across different tables, or inside individual tables, in your DBMS.
- Minimize data anomalies – Better organization makes it easier to spot datasets that don’t fit the “norm,” meaning fewer anomalies.
- Improve data integrity – More accurate data comes from normalization controls. Database users can feel more confident in their results because they know that the controls ensure integrity.
The Process of Normalization
If normalization in DBMS is all about organization, it stands to reason that they would be a set process to follow when normalizing your tables and database:
- Decompose your tables – Break every table down into its various parts, which may lead to you creating several tables out of one. Through decomposition, you separate different datasets, eliminate inconsistencies, and set the stage for creating relationships and dependencies between tables.
- Identify functional dependencies – An attribute in one table may be dependent on another to exist. For example, a “Customer ID” number in a retailer’s “Customer” table is functionally dependent on the “Customer Name” field because the ID can’t exist without the customer. Identifying these types of dependencies ensures you don’t end up with empty records (such as a record with a “Customer ID” and no customer attached to it).
- Apply normalization rules – Once you’re broken down your table and identified the functional dependencies, you apply relevant normalization rules. You’ll use Normal Forms to do this, with the six highlighted below each having its own rules, structures, and use cases.
Normal Forms in DBMS
There isn’t a “single” way to achieve normalization in DBMS because every database (and the tables it contains) is different. Instead, there are six normal forms you may use, with each having its own rules that you need to understand to figure out which to apply.
First Normal Form (1NF)
If a relation can’t contain multiple values, it’s in 1NF. In other words, each attribute in the table can only contain a single (called “atomic”) value.
Example
If a retailer wants to store the details of its customers, it may have attributes in its table like “Customer Name,” “Phone Number,” and “Email Address.” By applying 1NF to this table, you ensure that the attributes that could contain multiple entries (“Phone Number” and “Email Address”) only contain one, making contacting that customer much simpler.
Second Normal Form (2NF)
A table that’s in 2NF is in 1NF, with the additional condition that none of its non-prime attributes depend on a subset of candidate keys within the table.
Example
Let’s say an employer wants to create a table that contains information about an employee, the skills they have, and their age. An employee may have multiple skills, leading to multiple records for the same employee in the table, with each denoting a skill while the ID number and age of the employee repeat for each record.
In this table, you’ve achieved 1NF because each attribute has an atomic value. However, the employee’s age is dependent on the employee ID number. To achieve 2NF, you’d break this table down into two tables. The first will contain the employee’s ID number and age, with that ID number linking to a second table that lists each of the skills associated with the employee.
Third Normal Form (3NF)
In 3NF, the table you have must already be in 2NF form, with the added rule of removing the transitive functional dependency of the non-prime attribute of any super key. Transitive functional dependency occurs if the dependency is the result of a pair of functional dependencies. For example, the relationship between A and C is a transitive dependency if A depends on B, B depends on C, but B doesn’t depend on A.
Example
Let’s say a school creates a “Students” table with the following attributes:
- Student ID
- Name
- Zip Code
- State
- City
- District
In this case, the “State,” “District,” and “City” attributes all depend on the “Zip Code” attribute. That “Zip” attribute depends on the “Student ID” attribute, making “State,” “District,” and “City” all transitively depending on “Student ID.”
To resolve this problem, you’d create a pair of tables – “Student” and “Student Zip.” The “Student” table contains the “Student ID,” “Name,” and “Zip Code” attributes, with that “Zip Code” attribute being the primary key of a “Student Zip” table that contains the rest of the attributes and links to the “Student” table.
Boyce-Codd Normal Form (BCNF)
Often referred to as 3.5NF, BCNF is a stricter version of 3NF. So, this normalization in DBMS rule occurs if your table is in 3NF, and for every functional dependence between two fields (i.e., A -> B), A is the super key of your table.
Example
Sticking with the school example, every student in a school has multiple classes. The school has a table with the following fields:
- Student ID
- Nationality
- Class
- Class Type
- Number of Students in Class
You have several functional dependencies here:
- Student ID -> Nationality
- Class -> Number of Students in Class, Class Type
As a result, both the “Student ID” and “Class” attributes are candidate keys but can’t serve as keys alone. To achieve BCNF normalization, you’d break the above table into three – “Student Nationality,” “Student Class,” and “Class Mapping,” allowing “Student ID” and “Class” to serve as primary keys in their own tables.
Fourth Normal Form (4NF)
In 4NF, the database must meet the requirements of BCNF, in addition to containing no more than a single multivalued dependency. It’s often used in academic circles, as there’s little use for 4NF elsewhere.
Example
Let’s say a college has a table containing the following fields:
- College Course
- Lecturer
- Recommended Book
Each of these attributes is independent of the others, meaning each can change without affecting the others. For example, the college could change the lecturer of a course without altering the recommended reading or the course’s name. As such, the existence of the course depends on both the “Lecturer” and “Recommended Book” attributes, creating a multivalued dependency. If a DBMS has more than one of these types of dependencies, it’s a candidate for 4NF normalization.
Fifth Normal Form (5NF)
If your table is in 4NF, has no join dependencies, and all joining is lossless, it’s in 5NF. Think of this as the final form when it comes to normalization in DBMS, as you’ve broken your table down so much that you’ve made redundancy impossible.
Example
A college may have a table that tells them which lecturers teach certain subjects during which semesters, creating the following attributes:
- Subject
- Lecturer Name
- Semester
Let’s say one of the lecturers teaches both “Physics” and “Math” for “Semester 1,” but doesn’t teach “Math” for Semester 2. That means you need to combine all of the fields in this table to get an accurate dataset, leading to redundancy. Add a third semester to the mix, especially if that semester has no defined courses or lecturers, and you have to join dependencies.
The 5NF solution is to break this table down into three tables:
- Table 1 – Contains the “Semester” and “Subject” attributes to show which subjects are taught in each semester.
- Table 2 – Contains the “Subject” and “Lecturer Name” attributes to show which lecturers teach a subject.
- Table 3 – Contains the “Semester” and “Lecturer Name” attributes so you can see which lecturers teach during which semesters.
Benefits of Normalization in DBMS
With normalization in DBMS being so much work, you need to know the following benefits to show that it’s worth your effort:
- Improved database efficiency
- Better data consistency
- Easier database maintenance
- Simpler query processing
- Better access controls, resulting in superior security
Limitations and Trade-Offs of Normalization
Normalization in DBMS does have some drawbacks, though these are trade-offs that you accept for the above benefits:
- The larger your database gets, the more demands it places on system performance.
- Breaking tables down leads to complexity.
- You have to find a balance between normalization and denormalization to ensure your tables make sense.
Practical Tips for Mastering Normalization Techniques
Getting normalization in DBMS is hard, especially when you start feeling like you’re dividing tables into so many small tables that you’re losing track of the database. These tips help you apply normalization correctly:
- Understand the database requirements – Your database exists for you to extract data from it, so knowing what you’ll need to extract indicates whether you need to normalize tables or not.
- Document all functional dependencies – Every functional dependence that exists in your database makes the table in which it exists a candidate for normalization. Identify each dependency and document it so you know whether you need to break the table down.
- Use software and tools – You’re not alone when poring through your database. There are plenty of tools available that help you to identify functional dependencies. Many make normalization suggestions, with some even being able to carry out those suggestions for you.
- Review and refine – Every database evolves alongside its users, so continued refining is needed to identify new functional dependencies (and opportunities for normalization).
- Collaborate with other professionals – A different set of eyes on a database may reveal dependencies and normalization opportunities that you don’t see.
Make Normalization Your New Norm
Normalization may seem needlessly complex, but it serves the crucial role of making the data you extract from your database more refined, accurate, and free of repetition. Mastering normalization in DBMS puts you in the perfect position to create the complex databases many organizations need in a Big Data world. Experiment with the different “normal forms” described in this article as each application of the techniques (even for simple tables) helps you get to grips with normalization.
Related posts

The world is rapidly changing. New technologies such as artificial intelligence (AI) are transforming our lives and work, redefining the definition of “essential office skills.”
So what essential skills do today’s workers need to thrive in a business world undergoing a major digital transformation? It’s a question that Alan Lerner, director at Toptal and lecturer at the Open Institute of Technology (OPIT), addressed in his recent online masterclass.
In a broad overview of the new office landscape, Lerner shares the essential skills leaders need to manage – including artificial intelligence – to keep abreast of trends.
Here are eight essential capabilities business leaders in the AI era need, according to Lerner, which he also detailed in OPIT’s recent Master’s in Digital Business and Innovation webinar.
An Adapting Professional Environment
Lerner started his discussion by quoting naturalist Charles Darwin.
“It is not the strongest of the species that survives, nor the most intelligent that survives. It is the one that is the most adaptable to change.”
The quote serves to highlight the level of change that we are currently seeing in the professional world, said Lerner.
According to the World Economic Forum’s The Future of Jobs Report 2025, over the next five years 22% of the labor market will be affected by structural change – including job creation and destruction – and much of that change will be enabled by new technologies such as AI and robotics. They expect the displacement of 92 million existing jobs and the creation of 170 million new jobs by 2030.
While there will be significant growth in frontline jobs – such as delivery drivers, construction workers, and care workers – the fastest-growing jobs will be tech-related roles, including big data specialists, FinTech engineers, and AI and machine learning specialists, while the greatest decline will be in clerical and secretarial roles. The report also predicts that most workers can anticipate that 39% of their existing skill set will be transformed or outdated in five years.
Lerner also highlighted key findings in the Accenture Life Trends 2025 Report, which explores behaviors and attitudes related to business, technology, and social shifts. The report noted five key trends:
- Cost of Hesitation – People are becoming more wary of the information they receive online.
- The Parent Trap – Parents and governments are increasingly concerned with helping the younger generation shape a safe relationship with digital technology.
- Impatience Economy – People are looking for quick solutions over traditional methods to achieve their health and financial goals.
- The Dignity of Work – Employees desire to feel inspired, to be entrusted with agency, and to achieve a work-life balance.
- Social Rewilding – People seek to disconnect and focus on satisfying activities and meaningful interactions.
These are consumer and employee demands representing opportunities for change in the modern business landscape.
Key Capabilities for the AI Era
Businesses are using a variety of strategies to adapt, though not always strategically. According to McClean & Company’s HR Trends Report 2025, 42% of respondents said they are currently implementing AI solutions, but only 7% have a documented AI implementation strategy.
This approach reflects the newness of the technology, with many still unsure of the best way to leverage AI, but also feeling the pressure to adopt and adapt, experiment, and fail forward.
So, what skills do leaders need to lead in an environment with both transformation and uncertainty? Lerner highlighted eight essential capabilities, independent of technology.
Capability 1: Manage Complexity
Leaders need to be able to solve problems and make decisions under fast-changing conditions. This requires:
- Being able to look at and understand organizations as complex social-technical systems
- Keeping a continuous eye on change and adopting an “outside-in” vision of their organization
- Moving fast and fixing things faster
- Embracing digital literacy and technological capabilities
Capability 2: Leverage Networks
Leaders need to develop networks systematically to achieve organizational goals because it is no longer possible to work within silos. Leaders should:
- Use networks to gain insights into complex problems
- Create networks to enhance influence
- Treat networks as mutually rewarding relationships
- Develop a robust profile that can be adapted for different networks
Capability 3: Think and Act “Global”
Leaders should benchmark using global best practices but adapt them to local challenges and the needs of their organization. This requires:
- Identifying what great companies are achieving and seeking data to understand underlying patterns
- Developing perspectives to craft global strategies that incorporate regional and local tactics
- Learning how to navigate culturally complex and nuanced business solutions
Capability 4: Inspire Engagement
Leaders must foster a culture that creates meaningful connections between employees and organizational values. This means:
- Understanding individual values and needs
- Shaping projects and assignments to meet different values and needs
- Fostering an inclusive work environment with plenty of psychological safety
- Developing meaningful conversations and both providing and receiving feedback
- Sharing advice and asking for help when needed
Capability 5: Communicate Strategically
Leaders should develop crisp, clear messaging adaptable to various audiences and focus on active listening. Achieving this involves:
- Creating their communication style and finding their unique voice
- Developing storytelling skills
- Utilizing a data-centric and fact-based approach to communication
- Continual practice and asking for feedback
Capability 6: Foster Innovation
Leaders should collaborate with experts to build a reliable innovation process and a creative environment where new ideas thrive. Essential steps include:
- Developing or enhancing structures that best support innovation
- Documenting and refreshing innovation systems, processes, and practices
- Encouraging people to discover new ways of working
- Aiming to think outside the box and develop a growth mindset
- Trying to be as “tech-savvy” as possible
Capability 7: Cultivate Learning Agility
Leaders should always seek out and learn new things and not be afraid to ask questions. This involves:
- Adopting a lifelong learning mindset
- Seeking opportunities to discover new approaches and skills
- Enhancing problem-solving skills
- Reviewing both successful and unsuccessful case studies
Capability 8: Develop Personal Adaptability
Leaders should be focused on being effective when facing uncertainty and adapting to change with vigor. Therefore, leaders should:
- Be flexible about their approach to facing challenging situations
- Build resilience by effectively managing stress, time, and energy
- Recognize when past approaches do not work in current situations
- Learn from and capitalize on mistakes
Curiosity and Adaptability
With the eight key capabilities in mind, Lerner suggests that curiosity and adaptability are the key skills that everyone needs to thrive in the current environment.
He also advocates for lifelong learning and teaches several key courses at OPIT which can lead to a Bachelor’s Degree in Digital Business.

Many people treat cyber threats and digital fraud as a new phenomenon that only appeared with the development of the internet. But fraud – intentional deceit to manipulate a victim – has always existed; it is just the tools that have changed.
In a recent online course for the Open Institute of Technology (OPIT), AI & Cybersecurity Strategist Tom Vazdar, chair of OPIT’s Master’s Degree in Enterprise Cybersecurity, demonstrated the striking parallels between some of the famous fraud cases of the 18th century and modern cyber fraud.
Why does the history of fraud matter?
Primarily because the psychology and fraud tactics have remained consistent over the centuries. While cybersecurity is a tool that can combat modern digital fraud threats, no defense strategy will be successful without addressing the underlying psychology and tactics.
These historical fraud cases Vazdar addresses offer valuable lessons for current and future cybersecurity approaches.
The South Sea Bubble (1720)
The South Sea Bubble was one of the first stock market crashes in history. While it may not have had the same far-reaching consequences as the Black Thursday crash of 1929 or the 2008 crash, it shows how fraud can lead to stock market bubbles and advantages for insider traders.
The South Sea Company was a British company that emerged to monopolize trade with the Spanish colonies in South America. The company promised investors significant returns but provided no evidence of its activities. This saw the stock prices grow from £100 to £1,000 in a matter of months, then crash when the company’s weakness was revealed.
Many people lost a significant amount of money, including Sir Isaac Newton, prompting the statement, “I can calculate the movement of the stars, but not the madness of men.“
Investors often have no way to verify a company’s claim, making stock markets a fertile ground for manipulation and fraud since their inception. When one party has more information than another, it creates the opportunity for fraud. This can be seen today in Ponzi schemes, tech stock bubbles driven by manipulative media coverage, and initial cryptocurrency offerings.
The Diamond Necklace Affair (1784-1785)
The Diamond Necklace Affair is an infamous incident of fraud linked to the French Revolution. An early example of identity theft, it also demonstrates that the harm caused by such a crime can go far beyond financial.
A French aristocrat named Jeanne de la Mont convinced Cardinal Louis-René-Édouard, Prince de Rohan into thinking that he was buying a valuable diamond necklace on behalf of Queen Marie Antoinette. De la Mont forged letters from the queen and even had someone impersonate her for a meeting, all while convincing the cardinal of the need for secrecy. The cardinal overlooked several questionable issues because he believed he would gain political benefit from the transaction.
When the scheme finally exposed, it damaged Marie Antoinette’s reputation, despite her lack of involvement in the deception. The story reinforced the public perception of her as a frivolous aristocrat living off the labor of the people. This contributed to the overall resentment of the aristocracy that erupted in the French Revolution and likely played a role in Marie Antoinette’s death. Had she not been seen as frivolous, she might have been allowed to live after her husband’s death.
Today, impersonation scams work in similar ways. For example, a fraudster might forge communication from a CEO to convince employees to release funds or take some other action. The risk of this is only increasing with improved technology such as deepfakes.
Spanish Prisoner Scam (Late 1700s)
The Spanish Prisoner Scam will probably sound very familiar to anyone who received a “Nigerian prince” email in the early 2000s.
Victims received letters from a “wealthy Spanish prisoner” who needed their help to access his fortune. If they sent money to facilitate his escape and travel, he would reward them with greater riches when he regained his fortune. This was only one of many similar scams in the 1700s, often involving follow-up requests for additional payments before the scammer disappeared.
While the “Nigerian prince” scam received enough publicity that it became almost unbelievable that people could fall for it, if done well, these can be psychologically sophisticated scams. The stories play on people’s emotions, get them invested in the person, and enamor them with the idea of being someone helpful and important. A compelling narrative can diminish someone’s critical thinking and cause them to ignore red flags.
Today, these scams are more likely to take the form of inheritance fraud or a lottery scam, where, again, a person has to pay an advance fee to unlock a much bigger reward, playing on the common desire for easy money.
Evolution of Fraud
These examples make it clear that fraud is nothing new and that effective tactics have thrived over the centuries. Technology simply opens up new opportunities for fraud.
While 18th-century scammers had to rely on face-to-face contact and fraudulent letters, in the 19th century they could leverage the telegraph for “urgent” communication and newspaper ads to reach broader audiences. In the 20th century, there were telephones and television ads. Today, there are email, social media, and deepfakes, with new technologies emerging daily.
Rather than quack doctors offering miracle cures, we see online health scams selling diet pills and antiaging products. Rather than impersonating real people, we see fake social media accounts and catfishing. Fraudulent sites convince people to enter their bank details rather than asking them to send money. The anonymity of the digital world protects perpetrators.
But despite the technology changing, the underlying psychology that makes scams successful remains the same:
- Greed and the desire for easy money
- Fear of missing out and the belief that a response is urgent
- Social pressure to “keep up with the Joneses” and the “Bandwagon Effect”
- Trust in authority without verification
Therefore, the best protection against scams remains the same: critical thinking and skepticism, not technology.
Responding to Fraud
In conclusion, Vazdar shared a series of steps that people should take to protect themselves against fraud:
- Think before you click.
- Beware of secrecy and urgency.
- Verify identities.
- If it seems too good to be true, be skeptical.
- Use available security tools.
Those security tools have changed over time and will continue to change, but the underlying steps for identifying and preventing fraud remain the same.
For more insights from Vazdar and other experts in the field, consider enrolling in highly specialized and comprehensive programs like OPIT’s Enterprise Security Master’s program.
Have questions?
Visit our FAQ page or get in touch with us!
Write us at +39 335 576 0263
Get in touch at hello@opit.com
Talk to one of our Study Advisors
We are international
We can speak in: