Database & Privacy - Research Paper Example

Comments (0) Cite this document
Fundamentally, database technology is important when it comes the keeping of statistics of certain populations whereby individuals can…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.2% of users find it useful
Database & Privacy
Read TextPreview

Extract of sample "Database & Privacy"

Database technology and Privacy Concerns Database technology has gained a significant level of pervasiveness in recent past despite the numerous privacy concerns that have emerged. Fundamentally, database technology is important when it comes the keeping of statistics of certain populations whereby individuals can access their personal details in privacy. Although database technology was intended to enhance the privacy of data, there has been growing tension concerning the privacy of the same, especially considering frequent privacy leaks among school and government databases in the United States (Custers, 2013). Indeed, the tension between database technology and privacy will play out with the growing number powerful database applications across the globe.
Database privacy leaks usually occur through SQL injections and the victims of such leaks usually feel demoralized because it can risk their life, property, and fortune. Statistical disclosure control has had an enviable reputation because of the protection of the personal details of members of a particular population. Based on Mathematical Optimization, many techniques can be used to solve privacy issues. Frequency tables produce solutions that are biased while algorithms are expensive. Even with the advent of powerful database technology such as modern cryptography, the tension between such technology and privacy concerns will not fade out. Nonetheless, Enhanced Controlled Tabular Adjustment is a modern technique used to overcome most of the privacy challenges (PSD & Domingo-Ferrer, 2014). 
Databases play important roles in the society and the more advanced they are, the better they serve the people. Most people recognize the impending risk to their privacy and a 1996 poll proved that 24% of Americans have at one time or the other experienced privacy invasion. In addition, 80% of Americans did not trust how companies used and circulated their personal data during the previous year. Some of the most important roles of databases include ensuring that the fair allocation and distribution of resources (Garfinkel, 2000). In this regard, database privacy leaks reduced the participation of people in keeping better information in such databases, especially hospital and government database privacy breaches. It is however, worth noting that some of the database leaks are beyond control and they should not spark much tension except in circumstances where sheer negligence has led to such breaches (PSD & Domingo-Ferrer, 2014). 
Privacy and discrimination have become major issues in the information society. For instance, Huber’s case in 1996 when he moved to Germany. He later contested the keeping of his personal information in the database and termed it as discrimination under the AZR Law. Mr. Huber essentially alleged that AZR data was only applicable to population statistics and criminal investigation, thereby compelling the authorities to delete his personal details. The case later proceeded to the European Court of Justice where the judges were concerned with nationality-based discrimination, especially among union citizens. It means that privacy concerns and tension will continue to grow as long as the strength of database security systems is not guaranteed (Custers, 2013).
Custers, B. H. M. (2013). Discrimination and privacy in the information society: Data mining and profiling in large databases. Berlin: Springer.
Garfinkel, S. (2000). Database nation: The death of privacy in the 21st century. Beijing: OReilly.
PSD (Conference: 2004), & Domingo-Ferrer, J. (2014). Privacy in statistical databases: UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings. Read More
Cite this document
  • APA
  • MLA
(“Database & Privacy Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Database & Privacy Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from
(Database & Privacy Research Paper Example | Topics and Well Written Essays - 500 Words)
Database & Privacy Research Paper Example | Topics and Well Written Essays - 500 Words.
“Database & Privacy Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document



...?Task a) and b) The ER-Diagram consists of five main entities, ly VISIT, BOOKING, OWNER, DOG, and INVOICE. The relationships can be explained in detail considering their cardinalities, participations and constraints according to the given scenario. CLASS/VISIT and BOOKING A CLASS/VISIT can have several BOOKINGs and a one BOOKING have a single corresponding CLASS/VISIT. Hence a one to many relationship exits between these entities (Marked with 1 and M near the respective entity). A CLASS/VISIT may or may not have booking at a time and it is considered a BOOKING is optional for a CLASS/VISIT and CLASS/VISIT is mandatory for a booking (marked with a circle on BOOKING as the optional side). A class can either have no bookings... a) and b) The...
4 Pages(1000 words)Assignment


..., organizations need to formulate information security strategies (ISS). In addition, customers have to be capable to recognize an organization’s place in scenario of defending their data and information. Consequently, privacy policy is considered as a tool to express organizational policies to the customers (Pacocha, 2002) and (Curphey & Araujo, 2006). The data warehouse is large size data storage accessed from numerous sources (legacy and operational) databases. Additionally, the data-warehouse is built but combining diverse data sources or changing them into a new structure. However, this process involves a lot of activities such as cleaning, reading, storing and aggregating the data in the warehouse...
8 Pages(2000 words)Essay

Advanced Database Systems maintain its safety and security in order to deal with privacy and security issues. Nevertheless, because of overwhelmingly perceptive type of the major database aspects, numerous other main features of the database's wide-ranging security are likely to be disregarded. These important features of security comprise, applications related to the database, the database structure itself, individual division executive models offered inside the database and databases system information and figures (Lathem, 2008). Distributed Database Initial Level Security System administrator is responsible for dealing with...
8 Pages(2000 words)Essay


...? PRIVACY Privacy Introduction Privacy in information management is an integral element that s should embrace to build confidence among stakeholders. Information management requires the adoption effective policies and guidelines that are ethically, socially and legally relevant. This ensures that data within an institution serves the intended purpose. Institutions that seek to enhance their performance and confidence levels should adopt effective data management systems. The systems should enhance data privacy by ensuring that only authorised persons access definite information. As apparent, effective data management, entails adherence to ethical, social and legal standards that guide individuals or institutions when transmitting... ...
6 Pages(1500 words)Essay


...? Happy Homes Database System Database security The security of a database system should be up to The data held by a database is ofgreat importance and loss or damage to that data could result into great consequences to the organization. Happy Homes Ltd has a database for the storage, access, and management of information required for its normal operations. To enhance the security of the database, several key concepts have to be looked at and properly set. This enhances maximum operation and security of the database. First, the issue of access control should take center stage while discussing the security concepts. This...
5 Pages(1250 words)Coursework


...? Creating an Extended Entity Relationship Model (EERM) Creating an Extended Entity Relationship Model (EERM) We use a classical four-layered approach to inductive specification of database structures. The first layer is the data environment, called the basic data type scheme, which is defined by the system or is the assumed set of available basic data. The second layer is the schema of a given database. The third layer is the database itself representing a state of the application's data often called micro-data. The fourth layer consists of the macro-data that are generated from the micro-data by application of view queries to the micro-data (DIETRICH, 2011). The second layer is diversely treated by database modeling languages... for...
6 Pages(1500 words)Assignment


...are held on record. Products are identified by their name and records of the product type and a description of the product are kept. i.) Design an E-R diagram for the above database ii.) Derive a corresponding relational scheme from your E-R diagram. Table Assets: assetID (primary) productID (primary) location LeaseRenewalDate Table Assets Inspection: inspectionID (primary) inspectorID (primary) assetID (primary) maintenanceDate maintenanceAction Table Inspectors: inspectorID (primary) name position Table Products: productID (primary) name type description Question 2: A garden plant supplier keeps data about their customers, orders and the plants they sell in a relational database with the...
4 Pages(1000 words)Assignment


.... One should also specify the type of activity to be acted upon each and every screen. Workflows in any system determine the order in which tasks should be carried out and therefore in the database system we should also specify the workflows of the system. One should also specify who can enter delete or update data in the database system. The system should also meet applicable regulatory requirements in the organization. Non functional includes the ability to recover and back up data in the database to prevent loss during failure. Others include data security, privacy issues, privacy issues and minimum hardware and software requirements of the system...
1 Pages(250 words)Essay


...The Impact of Privacy on the Society Introduction The concept of privacy is quickly changing in today’s modern world as it is now possible for people’s transactions and actions to be constantly recorded and stored in databases (Morley, 205). Simple everyday activities such as a visit to the doctor or to the bank are recorded on computer systems, and stored in data bases from where it can be wrongfully accessed and used for unintended purposes. This paper will examine the impact of privacy in the society and the ethical arguments that have been raised as a result of the decreasing privacy levels in today’s society. The Impact of Privacy...
2 Pages(500 words)Assignment

Analysis of technology system/application

...). The advantages outweigh the disadvantages of the electronic database system proving its value in the healthcare system. There are challenges that interfere with implementation of EPIC electronic health record system. It is difficult incorporating older paper medical records into an electronic medical system. The scanned images of the hard copies are not clear and illegible handwriting is hard to read. Long term storage of health records could also be complicated and the integrity of the archived data may be compromised. It is unknown how long electronic records should be preserved. Furthermore, it may be difficult to synchronize records from all the elements of the electronic database. Privacy concerns also pose a major barrier... in...
5 Pages(1250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Database & Privacy for FREE!

Contact Us