StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Database & Privacy - Research Paper Example

Cite this document
Summary
Fundamentally, database technology is important when it comes the keeping of statistics of certain populations whereby individuals can…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Database & Privacy
Read Text Preview

Extract of sample "Database & Privacy"

Database technology and Privacy Concerns Database technology has gained a significant level of pervasiveness in recent past despite the numerous privacy concerns that have emerged. Fundamentally, database technology is important when it comes the keeping of statistics of certain populations whereby individuals can access their personal details in privacy. Although database technology was intended to enhance the privacy of data, there has been growing tension concerning the privacy of the same, especially considering frequent privacy leaks among school and government databases in the United States (Custers, 2013).

 Indeed, the tension between database technology and privacy will play out with the growing number powerful database applications across the globe.Database privacy leaks usually occur through SQL injections and the victims of such leaks usually feel demoralized because it can risk their life, property, and fortune. Statistical disclosure control has had an enviable reputation because of the protection of the personal details of members of a particular population. Based on Mathematical Optimization, many techniques can be used to solve privacy issues.

Frequency tables produce solutions that are biased while algorithms are expensive. Even with the advent of powerful database technology such as modern cryptography, the tension between such technology and privacy concerns will not fade out. Nonetheless, Enhanced Controlled Tabular Adjustment is a modern technique used to overcome most of the privacy challenges (PSD & Domingo-Ferrer, 2014). Databases play important roles in the society and the more advanced they are, the better they serve the people.

Most people recognize the impending risk to their privacy and a 1996 poll proved that 24% of Americans have at one time or the other experienced privacy invasion. In addition, 80% of Americans did not trust how companies used and circulated their personal data during the previous year. Some of the most important roles of databases include ensuring that the fair allocation and distribution of resources (Garfinkel, 2000). In this regard, database privacy leaks reduced the participation of people in keeping better information in such databases, especially hospital and government database privacy breaches.

It is however, worth noting that some of the database leaks are beyond control and they should not spark much tension except in circumstances where sheer negligence has led to such breaches (PSD & Domingo-Ferrer, 2014). Privacy and discrimination have become major issues in the information society. For instance, Huber’s case in 1996 when he moved to Germany. He later contested the keeping of his personal information in the database and termed it as discrimination under the AZR Law. Mr. Huber essentially alleged that AZR data was only applicable to population statistics and criminal investigation, thereby compelling the authorities to delete his personal details.

The case later proceeded to the European Court of Justice where the judges were concerned with nationality-based discrimination, especially among union citizens. It means that privacy concerns and tension will continue to grow as long as the strength of database security systems is not guaranteed (Custers, 2013).ReferencesCusters, B. H. M. (2013). Discrimination and privacy in the information society: Data mining and profiling in large databases. Berlin: Springer.Garfinkel, S. (2000). Database nation: The death of privacy in the 21st century.

Beijing: OReilly.PSD (Conference: 2004), & Domingo-Ferrer, J. (2014). Privacy in statistical databases: UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Database & Privacy Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Database & Privacy Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1698623-database-privacy
(Database & Privacy Research Paper Example | Topics and Well Written Essays - 500 Words)
Database & Privacy Research Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1698623-database-privacy.
“Database & Privacy Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1698623-database-privacy.
  • Cited: 1 times

CHECK THESE SAMPLES OF Database & Privacy

Database Security for Electronics Ltd

This case study "database Security for Electronics Ltd" discusses a database as the collection of the information which is organized in order to be accessed easily; it can be managed and, being updated.... Databases are stored in database servers that are the most significant servers in every company.... database security is the process of protecting the files stored in the database from any malicious attempts of viewing the data or modifying the data (Ramakrishnan & Gehrke, 2003, p 157)....
8 Pages (2000 words) Case Study

Law Enforcement at the State and Local Levels

Therefore, this database will allow both groups to access information about the various agencies.... Data will be shared between the two agencies, and this includes copies of the database's fingerprint information in order to assist with the comparison of fingerprints.... Users will also be able to access the FBI maintained a criminal history of each individual through the database....
1 Pages (250 words) Essay

Security and Privacy in the Network Context

In the paper “Security and privacy in the Network Context,” the author argues that database security is often disregarded by companies that provide more priority on operating systems and network stability.... ong-Term Network and Data Security, and privacy RightsThere are many ways to secure access to vital information in a Network, Database, and Individual Private files.... hellip; The author states that the key to database security is access control....
2 Pages (500 words) Essay

The Protecting Consumer Privacy

At the same time that individuals are increasing their awareness and vigilance concerning privacy matters, technology is battling to override every… James Nehf in his article entitled, ‘Shopping for privacy on the internet' highlighted ‘rational reasons why Web users do not shop for privacy' (2007, p.... Further, the article explored the impact of the technological He emphasized the fact that consumers would not be handed privacy on a silver platter but rather they must become vigilant in their demand for Web site operators to adhere to their demand for privacy....
12 Pages (3000 words) Coursework

How and When Organisations and the State Can Monitor Your Actions

The paper "privacy Paradox" presents the Internet has changed much of the way that people function in modern society.... It is relatively simple enough for almost anybody to use without understanding the technology behind it, but this leads to people's susceptibility to an invasion of their privacy.... As she sees it, privacy and security are interconnected issues: “It is submitted that privacy and security are necessarily interrelated and interdependent....
5 Pages (1250 words) Essay

Structured Query Language Database

The normalization process will be done in two phases i.... .... First normal form (1NF) and second normal form (2NF). The goal of conforming the… The attributes tours sold repeats itself twice in the initial data model.... The first step will form a new separate table for the tours sold table with the customerId field as the primary key of the customer table and The customerID field is a unique area because each customer will have their unique customerID thus the reason for its use as the primary key....
3 Pages (750 words) Essay

Components of Databases

In designing databases, the initial steps of drawing the entity relationship diagrams play a vital role in ensuring that the database works efficiently.... The hitter statics include homeruns, batting average, Databases In designing databases, the initial steps of drawing the entity relationship diagrams play a vital role in ensuring that the database works efficiently.... It is therefore wise to draw these diagrams before developing the baseball statistics database....
1 Pages (250 words) Assignment

Database Security and Privacy Principles

Some information is deemed to be… Several laws relating to database security and privacy have been promulgated in different countries across the world.... If Database Security and privacy Principles Personal information (PI) could be gathered, held, and used for many different purposes and through different methods.... Several laws relating to database security and privacy have been promulgated in different countries across the world.... privacy protection is both a personal and fundamental right for any individual....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us