StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Advanced Database Systems - Essay Example

Cite this document
Summary
Normally, a distributed database is a group of data divided into the different divisions under the management of disconnected database management systems (DBMSs) executing on autonomous computer platforms or systems…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Advanced Database Systems
Read Text Preview

Extract of sample "Advanced Database Systems"

?Advanced Database Systems INTRODUCTION A distributed database system facilitates other programs to access data from local and remote databases. Normally, a distributed database is a group of data divided into the different divisions under the management of disconnected database management systems (DBMSs) executing on autonomous computer platforms or systems. Additionally, all of these computers are connected with each other and every system has the capability to process the data individually thus helping local systems. In addition, each of the systems contributes in running a single or many wide-reaching database applications. However, a distributed database is not installed on a single location completely. But, it is divided throughout a network of computers that are physically detached and linked via communications medium. However, these types of system require accessing data from a single place. Thus, the distributed nature of the database is unknown to its clients as well as this simplicity appears itself in a different means. In more simple words, a distributed database (DDB) is a set of numerous, reasonably organized databases, spread over a large size computer network. A distributed DBMS is the computer application software that helps manage the distributed database as well as enables the sharing apparent to the clients. Moreover, the term of distributed database system (DDBS) is normally utilized to state both distributed database systems as well as distributed database management system. Furthermore, the distributed database management systems are similar to the distributed file systems in a sense that they help access distributed data (Oracle Corporation, 2003), (Camarinha-Matos, 2010), (Borysowich, 2007) and (Ozsu, 2010). This report discusses some legal and ethical issues that need to be considered when introducing a distributed database system. In this connection this report will analyze the legal and ethical issues that apply to distributed and relational databases. DISTRIBUTED DATABASE After the emergence of the distributed networks (which later on became more and more popular), the need for the development of distributed database management systems turned out to be more critical. In this regard, a distributed system differs from a centralized structure in one main feature: The information and data is frequently in the command of data are distributed/dispersed over two or additional distantly scattered places. On the other hand, distributed database management systems are exposed to a lot of security challenges more than that exist within a centralized DBMS. Additionally, the improvement of proper distributed database security has been challenging through the comparatively new development of the object-oriented database paradigm. Moreover, this innovative paradigm is not able to be disregarded. Thus, it has been formed to tackle with the rising complication of the data stored in current business or corporate database structures (Coy, 1996) and (Camarinha-Matos, 2010). Distributed systems basically allow users to access files that are placed on different computer systems. Additionally, this data has no obvious organization as well as the relationships between data in diverse files are not handled by the system and are the client’s duty. In this scenario, a distributed database system is developed on the basis of a design (normally called schema) that describes together the arrangement of the distributed data, as well as the relations between the data. In addition, this design can be expressed with a number of data models, such as object-oriented or relational data model. In this regard, a distributed database management system encompasses all the tasks of a database management system. For instance, it offers advanced transaction management, declarative query capability and integrity implementation. However, in fact distributed database management systems differ from transaction processing systems due to the fact that transaction processing systems offer simply few of these tasks. In this scenario, a distributed database management system offers transparent access to the data, on the other hand, in a distributed file structure the user has to recognize the place of the data, from where it has to be accessed. In addition, a distributed database can be divided into the different parts (also known as fragmentation) and distributed to a number of different locations. However, these data locations are not observable to the clients. In this scenario, the distributed database technology expands the idea of data independence that is a fundamental concept of database management, to situations where data are distributed as well as duplicated over several systems connected in a network. Therefore, from a user’s viewpoint, a distributed database is logically a distinct database yet if actually it is disseminated (Ozsu, 2010) and (Coy, 1996). ISSUES ANALYSIS The rapid developments in the networking and information processing businesses have guided to the establishment of distributed database management system models and marketable distributed DBMSs. In this system, the database is generally stored on a number of workstations that are organized through a number of communication links. However, the basic purpose of a DDBMS is to exchange and process the data in a well-organized and gainful way. Moreover, distributed systems are very useful for the well-organized processing of business functions (Thuraisingham, 1991). Security issues have to be tackled when building a distributed database. Additionally, before selecting a model for the database development, a lot of issues should be recognized. The significance of these aspects is single level and multiple level access power, safety beside implication, and continuation of integrity. However, when assessing which distributed database paradigm will be best for a particular system, the choice should not be made simply on the sources of existing security aspects. The development team should also assess the effectiveness and competence of the deliverance of these aspects (Coy, 1996) and (Armoni, 2002). There emerge a lot of issues in a DBMS those have multilevel access to the database system. In a multilevel database system access, clients are controlled by acquiring inclusive data access. However, strategies limiting user access to definite data essentials may be caused by confidentiality needs, or they may be produced from dedication to the standards of slightest privilege (a client simply has right of entry to the specific system). Additionally, the access strategies for multilevel structures are normally denoted like any open or closed. In case of open system, all the business or corporate data is recognized as uncategorized except access to a particular data part is particularly prohibited. On the other hand, in a blocked or closed system access to all data is banned except the user has specified access rights. In this scenario, the categorization of business or organizational data elements is not a straight forward job. This is because of contradictory objectives. The initial objective is to offer the database client with access to all the non-susceptible data. Another objective is to take care of sensitive or confidential data from illegal access or utilization. For instance, the wages of all the corporate workers can be recognized as non-receptive on condition that the staff names are not linked with the wages. In this scenario, lawful use or access can be recognized from this data. In addition, the abstract information could be made same as average management income and average income by gender. However, a conclusion could be derived from this non-sensitive data (Coy, 1996) and (Armoni, 2002). LEGAL ISSUES IN DISTRIBUTED DATABASES AND RELATIONAL DATABASES This section presents a comprehensive analysis of legal issues that apply to distributed databases and relational databases: Distributed Database Content Security The distributed data holds a business's database that requires security from theft. In fact, distributed data is stored within the isolated database that is significant to the business thus it is very important for the businesses to maintain its safety and security in order to deal with privacy and security issues. Nevertheless, because of overwhelmingly perceptive type of the major database aspects, numerous other main features of the database's wide-ranging security are likely to be disregarded. These important features of security comprise, applications related to the database, the database structure itself, individual division executive models offered inside the database and databases system information and figures (Lathem, 2008). Distributed Database Initial Level Security System administrator is responsible for dealing with the security related issues. These security issues can be of different nature varying from an illegal user snooping into the system to an allowed client making inappropriate use of the system or yet the system is being accessed at definite periods. Moreover, the initial level of security covers the integrity and privacy of the business data. In this scenario database security is to "lock" all the systems through login passwords and separated points of access. Furthermore, there are many other choices such as implementing firewalls and anti-virus programs (Lathem, 2008). Distributed Database Intellectual Property Intellectual Property in distributed databases can be described as a product of the human intelligence that is exceptional, latest, and apparent. When a business adopts some methods to protect the labor results of their staff particularly in the IT society as intellectual property, they successfully turn labor’s results by means of no concrete form into original and copyrighted product. This provides a dual function. In the first point, it makes the business owner of some developed systems or data placed out by its employees. Next, it legitimately protects that resulting product as the business's owns it for distribution, marketing and sale (Lathem, 2008). Copyrighting Copyright is a type of security measures offered by the rules and regulations of the US to the writers of "unique works of authorship, comprising theatrical, mythical, imaginative, and melodious along with some type of certain logical works like that distributed business database. As intellectual property is one of the types that are established under the security related copyright law, some data or works categorized inside documents as intellectual assets of the business, comprising few or all database rudiments, is officially protected through the power of the United States Copyright Headquarter. In the same way, to protect a database based intellectual property, a sensible business would as well desire to put suitable copyright on some information that is advertised through computer system from inside their business (Lathem, 2008). Security Issues Analysis There are lots of aspects associated with sharing the confidentiality and protection of a distributed database. In this scenario, the service of a competent and sensible system security official is a first-class initial step. In addition, a common and possibly technical utilization of rights and exposure types should competently be established as an important element of business policy. Moreover, accordance with the strategies needed by the United States Copyright Office is very necessary. Thus, it can be a cautious step to keep informed with the present actions and some latest laws relating to transformations, improvements, or trimmings made to copyright and exclusive rights laws. Furthermore, with these steps security and privacy of intellectual assets, not restricted however comprising all the business's databases, should marvelously be guaranteed (Lathem, 2008). ETHICAL ISSUES IN DISTRIBUTED DATABASES AND RELATIONAL DATABASES Distributed Databases are becoming more and more significant in a lot of areas of life, such as technical progress, scientific study, business, laws enforcement and business administration. As an essential element of this procedure, databases are developing as well as changing in manners that can appear more and more unconventional and even intimidating. In this scenario, it should be obvious that there are ethical issues involved in the ways data and information in distributed databases are collected and utilized, and that the blend of the new technology based trends is a basis for severe ethical issues. As this new technology is considered, these trends are recognized through comprehensive analysis of the data. Furthermore, it is believed that easy idea of "searching a distributed database" is greatly value-laden, concerning collectively placed economic, intellectual property, and technological issues (Goguen, 2001). In the previous few years, business operations with marketing data and information revolution have achieved a significant value that has allowed business management to become well-organized in getting their customer information as well as evaluation of the requirements of particular individual client. In this scenario, new technology based distributed databases are helpful in maintaining business and marketing related information that lifts significant public policy issues as organizations are more and more designing wide-ranging customer databases and implementing elegant data-mining methods. Moreover, with the increasing usage of web as a method for carrying out business activities, ethics and privacy issues are becoming more outstanding and imperative. Thus, to attract various customers to take part in the areas of e-commerce, that is reasonably lenient, it is significant for marketing people to pursue moral activities and protect customer confidentiality (Milne, 2000). In an attempt to match the business with the customer privacy needs, the FTC (Federal Trade Commission) has trusted in realistic information ethics to direct privacy rule and business application in the United States. These ethics comprise choice-consent, observance/consciousness, safety/reliability, access/involvement and rectify/implementation. However, regardless of the business self-regulation endeavors, a lot of database dealers are not pursuing reasonable information applications. Moreover, in a study of 365 companies belonging to the DMA (Direct Marketing Association), discovered that 38 percent of the businesses inform clients regarding collection of private data as well as information, 33 percent pointed out utilization of the client data along with information, whereas 26 percent stated for sanction to utilize the customer private data and information (Milne, 2000). These results demonstrate that fewer than partially the associations reviewed performance in the reasonable information standards of preference and observance. However, the need for commitment to right information standards has as well been initiated between organizations that make use of websites to gather customer’s private information (Milne, 2000). Due to the shortage of effective information applications customized by database marketers, there emerge additional privacy issues. In particular, the internet has created the possibility for businesses to gather information without direct communication with the customers. In this scenario, by making use of cookies and checking software, businesses are capable to collect new kinds of data and information, like that click and performance models that could be utilized to outline and target particular consumers. In addition, the compilation of these data allows businesses to advertise sponsorships on their websites. However, this increases customers’ problems regarding profile and unnecessary e-mail solicitation. Moreover, these technologies involve similar privileges issues as customary database, customer details are currently stored on a distributed database arrangement that is possibly accessible to the whole world of internet (Milne, 2000) and (Turban et al., 2005). CONCLUSION A distributed database system facilitates other programs to access data from local and remote databases. Normally, a distributed database is a group of data divided into the different divisions under the management of disconnected database management systems (DBMSs) executing on autonomous computer platforms or systems. This report has presented a comprehensive analysis of legal and ethical issues that need to be considered when implementing a distributed database system. This report has outlined detailed aspects of legal and ethical issues that apply to the distributed and relational databases. Bibliography Armoni, A., 2002. Data Security Management in Distributed Computer Systems. Informing Science, 5(1), pp.19-27. Borysowich, C., 2007. Observations from a Tech Architect: Enterprise Implementation Issues & Solutions. [Online] Available at: http://it.toolbox.com/blogs/enterprise-solutions/overview-of-distributed-databases-16228 [Accessed 18 March 2011]. Camarinha-Matos, L.M., 2010. Distributed database overview. [Online] Available at: http://www.uninova.pt/~cam/is/ddb.doc [Accessed 18 March 2011]. Coy, S.P., 1996. Security Implications of the Choice of Distributed Database Management System Model: Relational vs. Object-Oriented. [Online] Available at: http://csrc.nist.gov/nissc/1996/papers/NISSC96/paper072_073_074/SCO_.PDF [Accessed 18 March 2011]. Goguen, J.A., 2001. THE ETHICS OF DATABASES. [Online] Available at: http://cseweb.ucsd.edu/~goguen/papers/4s/4s.html [Accessed 17 March 2011]. Lathem, C., 2008. Database Privacy and Legal Issues. [Online] Available at: http://www.associatedcontent.com/article/965652/database_privacy_and_legal_issues_pg2.html?cat=3 [Accessed 18 March 2011]. Milne, G.R., 2000. Privacy and Ethical Issues in Database/Interactive Marketing and Public Policy: A Research Framework and Overview of the Special Issue. Journal of Public Policy & Marketing, 19(1), pp.1-6. Oracle Corporation, 2003. 29 Distributed Database Concepts. [Online] Available at: http://www.stanford.edu/dept/itss/docs/oracle/10g/server.101/b10739/ds_concepts.htm [Accessed 18 March 2011]. Ozsu, M.T., 2010. Distributed Database. [Online] Available at: http://db.uwaterloo.ca/ddbms/publications/ozsu/Distdb/distdb.pdf [Accessed 17 March 2011]. Thuraisingham, B., 1991. Multilevel Security Issues in Distributed Database Management Systems II. Computers & Security, 10(8), pp.727-47. Turban, E., Leidner, D., McLean, E. & Wetherbe, J., 2005. Information Technology for Management: Transforming Organizations in the Digital Economy. New York: Wiley. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Advanced Database Systems Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1412017-advanced-database-systems
(Advanced Database Systems Essay Example | Topics and Well Written Essays - 2000 Words)
https://studentshare.org/environmental-studies/1412017-advanced-database-systems.
“Advanced Database Systems Essay Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/environmental-studies/1412017-advanced-database-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Advanced Database Systems

A Level of Useful Inference upon a Given Idea

In the essay “A Level of Useful Inference upon a Given Idea” the author analyzes the fact of the matter, which is that data miners by their very definition can utilize data sets to draw a level of inference upon otherwise hidden patterns.... A level of useful inference upon a given idea is an issue of primal importance....
4 Pages (1000 words) Essay

Automated data reconciliation of the clinical and safety databases

It is accredited that clinical data are critical corporate assets in the biopharmaceutical industry of today, and that converting data into meaningful information is vital for core sponsor firms to make assessments faster and in a more flexible manner. Adoption of clinical… Automated data reconciliation of clinical and pharmacy databases eliminates redundancies in data entry and leads to interoperability of systems.... Serious Adverse Event, SAE, and Adverse Event, AE, reconciliation compares specific data between two databases; a clinical database and a safety database....
30 Pages (7500 words) Thesis

Database Security

The paper "database Security" states that generally, database security needs stem from the requirement to protect data.... The DBMSs provide an interface that enables users to interact with the database itself, other applications for capturing and analyzing data (Oppel, 2004).... database security is concerned with aspects aimed at protecting the contents of the database, users and owners.... The protection ranges from system protection against software and hardware malfunction to intentional and unauthorized use of the database and unintentional access by entities not authorized....
12 Pages (3000 words) Coursework

Distributed Databases/Very Large Databases

Principles of Information systems, (11th Ed.... The management procedure of Walmart in terms of commodities, locations, employees and all other services and benefits they use the database.... Especially distributed database, and it is very large database to handle such a huge type of business.... elational database Management System for data storageWalmart is the largest company of departments and warehouses across different locations in the world, so it must have the largest database for storage....
2 Pages (500 words) Assignment

The History and Contributions of Database Management Systems

The paper “The History and Contributions of Database Management systems” provides the examination of the history of DBMS, which can help to understand the potentials and the weaknesses of these systems.... Database Management systems – DMS – have been related to the development of complex tasks.... hellip; The current paper focuses on the examination of the effects of DBMS on both sides – towards the science and the society as users of DBMS and towards these systems – as valuable parts of projects developed in various scientific, economic and social fields....
6 Pages (1500 words) Research Paper

The Database Management Process

This data can also be used by different departments and systems and unplanned redundancy is avoided.... The following paper under the title 'The database Management Process' gives detailed information about a dramatic change in data processing and management of databases in the past three decades.... In the current research essay, three research articles have been chosen for analyzing the database management process, its evolution as well as the present application and future implications....
12 Pages (3000 words) Term Paper

Comparing between Database Systems

Relational database systems effectively organized data by using tables and define them following the process called normalization.... Since the report involve technical and procedural knowledge of data handling and manipulation, it is best to start presenting the issue by dealing with the nature of databases, the Relational database Management System, SQL, and Multimedia files.... omparable to a data file, a database does not directly present data or information to user but rather uses a certain application that would retrieve the information and submit it in a format understandable to user....
10 Pages (2500 words) Essay

Information Systems and Process of Making Decision

This essay "Information systems and Process of Making Decision" discusses the assimilated vision of Database, Big Data, DSS, and BI within the context of information system and process of making a decision, assisting relevant authorities to be able to create chances of resolving the precise problem.... hellip; Ultimately, Big Data, BI, Database, and DSS can be very valuable if well applied in information systems management.... This study gives a highlight of a subset of the fundamentals joined to define an assimilated model necessary for decision making by means of the database, big data, business intelligence, decision sustenance systems as well as organizational erudition....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us