Verified Document

Database System Can Be Defined Term Paper

These laws also emphasize that obtaining such personal information and how it will be used should be made with the individual's knowledge and consent. Moreover, individuals also have the additional rights of viewing, correcting, and deleting the information pertaining to them. But do we really have access to all information that is being taken from us? We can never tell and we might end waking up one day being accused by actions we haven't taken or worst waking up with a different identity. II. Security of the Data Gathered

Database Systems are designed and programmed by no less than humans. Securing these databases involves the protection against unauthorized disclosures, alteration and destruction. Security that focuses on stopping people without database access from having any form of access at all and stopping people with access to perform any data manipulation that are not part of their duties or not included in the main reasons of acquiring the data.

The Data Protection Act places restrictions on databases that contain personal and sensitive information. Although a database may be legal, it doesn't necessarily mean that the data will be used ethically. For example, the existence of hospital records is legal in itself. However, inadequate security may lead insurance companies to use this information to reject life insurance applications.

We need to consider several factors of security:

On the actual premises where the data is stored, on who can access the building or the room where the database runs and is accessed.

Just imagine if the actual programmers have a backdoor to all the information of the system they designed, which is not far from reality.
The ease and reliability of database systems cannot be questioned but are they protected enough? It might just be a set of letters and numbers but these letters and numbers could dictate how we run our lives. Movies like The Net, Minority Report and Hackers are fictitious movies based from exaggerated facts, but these represent a major concern that should be addressed immediately.

Bibliography:

ALR (Feb 06, 2006) Regulation of Data Brokerage Retrieved June 03, 2006 at http://courseblog.cs.princeton.edu/spring06/wws528f/?author=15

Computer Underground Digest #6.27 (Mar 27, 1994). Retrieved June 03, 2006 from "Ethical issues in hacking and piracy"

Data Protection Act 1998. Retrieved June 03, 2006 at http://www.opsi.gov.uk/ACTS/acts1998/19980029.htm

Right of self-decision, self-control on one's own personal information" Retrieved June 03, 2006 at http://rights.jinbo.net/english/privacy.html

Robert w. Hahn (2001) "The Benefits and Costs Of Online Privacy Legislation" Retrieved June 03, 2006 from AEI-Brookings Joint Center Working Paper No. 01-14

Sources used in this document:
Bibliography:

ALR (Feb 06, 2006) Regulation of Data Brokerage Retrieved June 03, 2006 at http://courseblog.cs.princeton.edu/spring06/wws528f/?author=15

Computer Underground Digest #6.27 (Mar 27, 1994). Retrieved June 03, 2006 from "Ethical issues in hacking and piracy"

Data Protection Act 1998. Retrieved June 03, 2006 at http://www.opsi.gov.uk/ACTS/acts1998/19980029.htm

Right of self-decision, self-control on one's own personal information" Retrieved June 03, 2006 at http://rights.jinbo.net/english/privacy.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Systems Life Cycle and Database Systems Including
Words: 1209 Length: 4 Document Type: Term Paper

Systems Life Cycle and Database Systems Including > Define systems, including why systems have a beginning and end. > Discuss the importance of integrating a life cycle into the plan for development of a database > Consider your organization or a business with which you are familiar. Provide examples of the database system it uses, its systems life cycle and how they are related. Is this effective? Why or why not? > If

Databases Analysis and Overview of Database Systems
Words: 739 Length: 2 Document Type: Essay

Databases Analysis and Overview of Database Systems in the Enterprise The pervasive adoption of databases for aggregating, analyzing, parsing, reporting and storing data continues to exponentially increase over time, as the information needs of companies continued to increase. The foundation fo nearly every enterprise-wide system and computing platform includes integration to databases of many types, from object-oriented to relational (Lungu, Velicanu, Botha, 2009). Every Enterprise Resource Planning (ERP) system today relies

Database Systems in Describe Theoretically
Words: 2113 Length: 8 Document Type: Discussion Chapter

To implement this algorithm, it is essential to simulate locking of what the books mentions as an item X that has been transcribed by transaction T until T is either committed or aborted. This algorithm is not what would turn into deadlock, for the reason that T. waits for T only if TS (T) > TS (T ) (Elmasri, 2011). According to the book, strict timestamp ordering differs from basic timestamp ordering because basic

Toyota Production System Defining the
Words: 4453 Length: 15 Document Type: Research Paper

Kaizen is so engrained in the Toyota culture and the corresponding House of Quality that internally when planned results are not achieved it is considered more of a failure of process and execution (Gong, Wang, Lai, 2009). This is where the TPS varies significantly from American-based approaches to managing variation in results and failure to attain results as well. The Kaizen approach systematically analyzes why a process did not

Database Design for SPA Hotel Booking System
Words: 3480 Length: 12 Document Type: Term Paper

Database Design for Spa/Hotel Booking System The WR (Woodlands Retreat) is a medium sized organization currently intending to build a database system to integrate modern IT (information systems) in its business operation to enhance its dynamic and innovative business operations. Although, the Woodlands Retreat has an IT system, however, the current systems are not capable of keeping book records as well as not capable of managing all data for the company

Database Differentiation
Words: 1805 Length: 5 Document Type: Term Paper

Database Differentiation Description of the data models A detailed description of all the tables that a database consists of is referred to as a data dictionary. A data dictionary will contain all the attribute characteristics and names for every table found within a database system. A data dictionary can also be referred to as a metadata repository. This is because it contains information like relationships with other data, meaning, usage, format, and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now