StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Advanced Database Systems - Research Paper Example

Cite this document
Summary
This paper "Advanced Database Systems" discusses some legal and ethical issues that need to be considered when introducing a distributed database system. In this connection, this paper will analyze the legal and ethical issues that apply to distributed and relational databases…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Advanced Database Systems
Read Text Preview

Extract of sample "Advanced Database Systems"

Advanced Database Systems Advanced Database Systems 1 INTRODUCTION 2 DISTRIBUTED DATABASE 3 ISSUES ANALYSIS 4 LEGAL ISSUES IN DISTRIBUTED DATABASES AND RELATIONAL DATABASES 6 Distributed Database Content Security 6 Distributed Database Initial Level Security 7 Distributed Database Intellectual Property 7 Copyrighting 8 Security Issues Analysis 8 CONCLUSION 12 Bibliography 12 INTRODUCTION A distributed database system facilitates other programs to access data from local and remote databases. Normally, a distributed database is a group of data divided into the different divisions under the management of disconnected database management systems (DBMSs) executing on autonomous computer platforms or systems. Additionally, all of these computers are connected with each other and every system has the capability to process the data individually thus helping local systems. In addition, each of the systems contributes in running a single or many wide-reaching database applications. However, a distributed database is not installed on a single location completely. But, it is divided throughout a network of computers that are physically detached and linked via communications medium. However, these types of system require accessing data from a single place. Thus, the distributed nature of the database is unknown to its clients as well as this simplicity appears itself in a different means. In more simple words, a distributed database (DDB) is a set of numerous, reasonably organized databases, spread over a large size computer network. A distributed DBMS is the computer application software that helps manage the distributed database as well as enables the sharing apparent to the clients. Moreover, the term of distributed database system (DDBS) is normally utilized to state both distributed database systems as well as distributed database management system. Furthermore, the distributed database management systems are similar to the distributed file systems in a sense that they help access distributed data (Oracle Corporation, 2003), (Camarinha-Matos, 2010), (Borysowich, 2007) and (Ozsu, 2010). This report discusses some legal and ethical issues that need to be considered when introducing a distributed database system. In this connection this report will analyze the legal and ethical issues that apply to distributed and relational databases. DISTRIBUTED DATABASE After the emergence of the distributed networks (which later on became more and more popular), the need for the development of distributed database management systems turned out to be more critical. In this regard, a distributed system differs from a centralized structure in one main feature: The information and data is frequently in the command of data are distributed/dispersed over two or additional distantly scattered places. On the other hand, distributed database management systems are exposed to a lot of security challenges more than that exist within a centralized DBMS. Additionally, the improvement of proper distributed database security has been challenging through the comparatively new development of the object-oriented database paradigm. Moreover, this innovative paradigm is not able to be disregarded. Thus, it has been formed to tackle with the rising complication of the data stored in current business or corporate database structures (Coy, 1996) and (Camarinha-Matos, 2010). Distributed systems basically allow users to access files that are placed on different computer systems. Additionally, this data has no obvious organization as well as the relationships between data in diverse files are not handled by the system and are the client’s duty. In this scenario, a distributed database system is developed on the basis of a design (normally called schema) that describes together the arrangement of the distributed data, as well as the relations between the data. In addition, this design can be expressed with a number of data models, such as object-oriented or relational data model. In this regard, a distributed database management system encompasses all the tasks of a database management system. For instance, it offers advanced transaction management, declarative query capability and integrity implementation. However, in fact distributed database management systems differ from transaction processing systems due to the fact that transaction processing systems offer simply few of these tasks. In this scenario, a distributed database management system offers transparent access to the data, on the other hand, in a distributed file structure the user has to recognize the place of the data, from where it has to be accessed. In addition, a distributed database can be divided into the different parts (also known as fragmentation) and distributed to a number of different locations. However, these data locations are not observable to the clients. In this scenario, the distributed database technology expands the idea of data independence that is a fundamental concept of database management, to situations where data are distributed as well as duplicated over several systems connected in a network. Therefore, from a user’s viewpoint, a distributed database is logically a distinct database yet if actually it is disseminated (Ozsu, 2010) and (Coy, 1996). ISSUES ANALYSIS The rapid developments in the networking and information processing businesses have guided to the establishment of distributed database management system models and marketable distributed DBMSs. In this system, the database is generally stored on a number of workstations that are organized through a number of communication links. However, the basic purpose of a DDBMS is to exchange and process the data in a well-organized and gainful way. Moreover, distributed systems are very useful for the well-organized processing of business functions (Thuraisingham, 1991). Security issues have to be tackled when building a distributed database. Additionally, before selecting a model for the database development, a lot of issues should be recognized. The significance of these aspects is single level and multiple level access power, safety beside implication, and continuation of integrity. However, when assessing which distributed database paradigm will be best for a particular system, the choice should not be made simply on the sources of existing security aspects. The development team should also assess the effectiveness and competence of the deliverance of these aspects (Coy, 1996) and (Armoni, 2002). There emerge a lot of issues in a DBMS those have multilevel access to the database system. In a multilevel database system access, clients are controlled by acquiring inclusive data access. However, strategies limiting user access to definite data essentials may be caused by confidentiality needs, or they may be produced from dedication to the standards of slightest privilege (a client simply has right of entry to the specific system). Additionally, the access strategies for multilevel structures are normally denoted like any open or closed. In case of open system, all the business or corporate data is recognized as uncategorized except access to a particular data part is particularly prohibited. On the other hand, in a blocked or closed system access to all data is banned except the user has specified access rights. In this scenario, the categorization of business or organizational data elements is not a straight forward job. This is because of contradictory objectives. The initial objective is to offer the database client with access to all the non-susceptible data. Another objective is to take care of sensitive or confidential data from illegal access or utilization. For instance, the wages of all the corporate workers can be recognized as non-receptive on condition that the staff names are not linked with the wages. In this scenario, lawful use or access can be recognized from this data. In addition, the abstract information could be made same as average management income and average income by gender. However, a conclusion could be derived from this non-sensitive data (Coy, 1996) and (Armoni, 2002). LEGAL ISSUES IN DISTRIBUTED DATABASES AND RELATIONAL DATABASES This section presents a comprehensive analysis of legal issues that apply to distributed databases and relational databases: Distributed Database Content Security The distributed data holds a business's database that requires security from theft. In fact, distributed data is stored within the isolated database that is significant to the business thus it is very important for the businesses to maintain its safety and security in order to deal with privacy and security issues. Nevertheless, because of overwhelmingly perceptive type of the major database aspects, numerous other main features of the database's wide-ranging security are likely to be disregarded. These important features of security comprise, applications related to the database, the database structure itself, individual division executive models offered inside the database and databases system information and figures (Lathem, 2008). Distributed Database Initial Level Security System administrator is responsible for dealing with the security related issues. These security issues can be of different nature varying from an illegal user snooping into the system to an allowed client making inappropriate use of the system or yet the system is being accessed at definite periods. Moreover, the initial level of security covers the integrity and privacy of the business data. In this scenario database security is to "lock" all the systems through login passwords and separated points of access. Furthermore, there are many other choices such as implementing firewalls and anti-virus programs (Lathem, 2008). Distributed Database Intellectual Property Intellectual Property in distributed databases can be described as a product of the human intelligence that is exceptional, latest, and apparent. When a business adopts some methods to protect the labor results of their staff particularly in the IT society as intellectual property, they successfully turn labor’s results by means of no concrete form into original and copyrighted product. This provides a dual function. In the first point, it makes the business owner of some developed systems or data placed out by its employees. Next, it legitimately protects that resulting product as the business's owns it for distribution, marketing and sale (Lathem, 2008). Copyrighting Copyright is a type of security measures offered by the rules and regulations of the US to the writers of "unique works of authorship, comprising theatrical, mythical, imaginative, and melodious along with some type of certain logical works like that distributed business database. As intellectual property is one of the types that are established under the security related copyright law, some data or works categorized inside documents as intellectual assets of the business, comprising few or all database rudiments, is officially protected through the power of the United States Copyright Headquarter. In the same way, to protect a database based intellectual property, a sensible business would as well desire to put suitable copyright on some information that is advertised through computer system from inside their business (Lathem, 2008). Security Issues Analysis There are lots of aspects associated with sharing the confidentiality and protection of a distributed database. In this scenario, the service of a competent and sensible system security official is a first-class initial step. In addition, a common and possibly technical utilization of rights and exposure types should competently be established as an important element of business policy. Moreover, accordance with the strategies needed by the United States Copyright Office is very necessary. Thus, it can be a cautious step to keep informed with the present actions and some latest laws relating to transformations, improvements, or trimmings made to copyright and exclusive rights laws. Furthermore, with these steps security and privacy of intellectual assets, not restricted however comprising all the business's databases, should marvelously be guaranteed (Lathem, 2008). ETHICAL ISSUES IN DISTRIBUTED DATABASES AND RELATIONAL DATABASES Distributed Databases are becoming more and more significant in a lot of areas of life, such as technical progress, scientific study, business, laws enforcement and business administration. As an essential element of this procedure, databases are developing as well as changing in manners that can appear more and more unconventional and even intimidating. In this scenario, it should be obvious that there are ethical issues involved in the ways data and information in distributed databases are collected and utilized, and that the blend of the new technology based trends is a basis for severe ethical issues. As this new technology is considered, these trends are recognized through comprehensive analysis of the data. Furthermore, it is believed that easy idea of "searching a distributed database" is greatly value-laden, concerning collectively placed economic, intellectual property, and technological issues (Goguen, 2001). In the previous few years, business operations with marketing data and information revolution have achieved a significant value that has allowed business management to become well-organized in getting their customer information as well as evaluation of the requirements of particular individual client. In this scenario, new technology based distributed databases are helpful in maintaining business and marketing related information that lifts significant public policy issues as organizations are more and more designing wide-ranging customer databases and implementing elegant data-mining methods. Moreover, with the increasing usage of web as a method for carrying out business activities, ethics and privacy issues are becoming more outstanding and imperative. Thus, to attract various customers to take part in the areas of e-commerce, that is reasonably lenient, it is significant for marketing people to pursue moral activities and protect customer confidentiality (Milne, 2000). In an attempt to match the business with the customer privacy needs, the FTC (Federal Trade Commission) has trusted in realistic information ethics to direct privacy rule and business application in the United States. These ethics comprise choice-consent, observance/consciousness, safety/reliability, access/involvement and rectify/implementation. However, regardless of the business self-regulation endeavors, a lot of database dealers are not pursuing reasonable information applications. Moreover, in a study of 365 companies belonging to the DMA (Direct Marketing Association), discovered that 38 percent of the businesses inform clients regarding collection of private data as well as information, 33 percent pointed out utilization of the client data along with information, whereas 26 percent stated for sanction to utilize the customer private data and information (Milne, 2000). These results demonstrate that fewer than partially the associations reviewed performance in the reasonable information standards of preference and observance. However, the need for commitment to right information standards has as well been initiated between organizations that make use of websites to gather customer’s private information (Milne, 2000). Due to the shortage of effective information applications customized by database marketers, there emerge additional privacy issues. In particular, the internet has created the possibility for businesses to gather information without direct communication with the customers. In this scenario, by making use of cookies and checking software, businesses are capable to collect new kinds of data and information, like that click and performance models that could be utilized to outline and target particular consumers. In addition, the compilation of these data allows businesses to advertise sponsorships on their websites. However, this increases customers’ problems regarding profile and unnecessary e-mail solicitation. Moreover, these technologies involve similar privileges issues as customary database, customer details are currently stored on a distributed database arrangement that is possibly accessible to the whole world of internet (Milne, 2000) and (Turban et al., 2005). CONCLUSION A distributed database system facilitates other programs to access data from local and remote databases. Normally, a distributed database is a group of data divided into the different divisions under the management of disconnected database management systems (DBMSs) executing on autonomous computer platforms or systems. This report has presented a comprehensive analysis of legal and ethical issues that need to be considered when implementing a distributed database system. This report has outlined detailed aspects of legal and ethical issues that apply to the distributed and relational databases. Bibliography Armoni, A., 2002. Data Security Management in Distributed Computer Systems. Informing Science, 5(1), pp.19-27. Borysowich, C., 2007. Observations from a Tech Architect: Enterprise Implementation Issues & Solutions. [Online] Available at: http://it.toolbox.com/blogs/enterprise-solutions/overview-of-distributed-databases-16228 [Accessed 18 March 2011]. Camarinha-Matos, L.M., 2010. Distributed database overview. [Online] Available at: http://www.uninova.pt/~cam/is/ddb.doc [Accessed 18 March 2011]. Coy, S.P., 1996. Security Implications of the Choice of Distributed Database Management System Model: Relational vs. Object-Oriented. [Online] Available at: http://csrc.nist.gov/nissc/1996/papers/NISSC96/paper072_073_074/SCO_.PDF [Accessed 18 March 2011]. Goguen, J.A., 2001. THE ETHICS OF DATABASES. [Online] Available at: http://cseweb.ucsd.edu/~goguen/papers/4s/4s.html [Accessed 17 March 2011]. Lathem, C., 2008. Database Privacy and Legal Issues. [Online] Available at: http://www.associatedcontent.com/article/965652/database_privacy_and_legal_issues_pg2.html?cat=3 [Accessed 18 March 2011]. Milne, G.R., 2000. Privacy and Ethical Issues in Database/Interactive Marketing and Public Policy: A Research Framework and Overview of the Special Issue. Journal of Public Policy & Marketing, 19(1), pp.1-6. Oracle Corporation, 2003. 29 Distributed Database Concepts. [Online] Available at: http://www.stanford.edu/dept/itss/docs/oracle/10g/server.101/b10739/ds_concepts.htm [Accessed 18 March 2011]. Ozsu, M.T., 2010. Distributed Database. [Online] Available at: http://db.uwaterloo.ca/ddbms/publications/ozsu/Distdb/distdb.pdf [Accessed 17 March 2011]. Thuraisingham, B., 1991. Multilevel Security Issues in Distributed Database Management Systems II. Computers & Security, 10(8), pp.727-47. Turban, E., Leidner, D., McLean, E. & Wetherbe, J., 2005. Information Technology for Management: Transforming Organizations in the Digital Economy. New York: Wiley. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Advanced Database Systems Research Paper Example | Topics and Well Written Essays - 2500 words, n.d.)
Advanced Database Systems Research Paper Example | Topics and Well Written Essays - 2500 words. Retrieved from https://studentshare.org/technology/1749990-advanced-database-systems
(Advanced Database Systems Research Paper Example | Topics and Well Written Essays - 2500 Words)
Advanced Database Systems Research Paper Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/technology/1749990-advanced-database-systems.
“Advanced Database Systems Research Paper Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/technology/1749990-advanced-database-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Advanced Database Systems

A Level of Useful Inference upon a Given Idea

In the essay “A Level of Useful Inference upon a Given Idea” the author analyzes the fact of the matter, which is that data miners by their very definition can utilize data sets to draw a level of inference upon otherwise hidden patterns.... A level of useful inference upon a given idea is an issue of primal importance....
4 Pages (1000 words) Essay

Main Functions of Middleware

- Advance applications - New enterprise applications harness Middleware technology for Single System Login, Enhanced Security, Location Transparency, database and Application Oriented Services however they are not very common.... hellip; For example, in an E-Business solution, shop floor, inventory, accounts receivable and advanced planning applications need to communicate so that companies can make accurate promises to customers, and executives can make educated decisions more quickly....
3 Pages (750 words) Essay

Leisure Centre Booking System

This report makes a conclusion that the centre will operate using the latest computerized operational systems and reporting.... 2004) ILCA's initial contract with Pegasus allowed its members to select and book accommodations online by providing direct access to the central reservations systems (CRS) of the leisure centres represented in Pegasus' Online Distribution Database, ranging from luxurious five-star leisure centres to independent family-run properties....
5 Pages (1250 words) Essay

Pay Rolls and Internal Audit

As the system was computerized it is now possible to obtain this information but there is a need of maintaining a database named personnel information system.... No information of existing database was given in the information of the company)The proposal of informing the instructions issued to managers of different departments who approve the payments to pay toll department can be mooted to make two obligations between payroll and internal audit more reasonable....
7 Pages (1750 words) Essay

Central Database Management of Sheep in the UK Farming Industry

The increase of economic activities around the world has led to the need for the implementation of advanced information systems that can process a high volume of data within a short period of time compared to the existing information systems – the latter are often… However, information systems are not independent from the environment on which they are going to be implemented and used.... The effects of both these systems on the British and the European economic environment are also identifying and analysed – at the level that they can offer explanations on the reasons that led to the initial use of information systems for the particular economic activity but also the reasons that led to the need for the replacement of these systems at the specific point of time....
13 Pages (3250 words) Essay

Description of Bioterrorism Response System

The writer of this paper states that To respond to bioterrorism attacks, health officials must play their part in helping detect, communicate and manage such events.... Technological advance enables health officials, including nurses to respond to an attack.... hellip; Information from the system should help officials make accurate decisions....
1 Pages (250 words) Research Paper

The Importance of MySQL Program

To discuss the paper strategic role of the system to a company, business needs driving the need of the system and the information used in the system are analyzed. A database system is a… kind of computer application that is devised to deal with several data, but to keep those data in such a manner that retrieving any snippet of information is proficient than if one just discarded them anyhow all over the location.... IntroductionA database system is a kind of computer application that is devised to deal with several data, but to keep those data in such a manner that retrieving any snippet of information is proficient than if one just discarded them anyhow all over the location....
2 Pages (500 words) Essay

Web Page Classifier System

Most developers of these systems ensure that they come up with as system that will make it easy to manage articles and to easily get around them.... This creates redundancy in the classification systems.... … Webpage classifier systemIntroductionWith classification of documents, there is need to be accurate and keep the integrity of information at par....
12 Pages (3000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us