Database Software
Data Integrity
Privacy
Data Matching
Data Mining
It is used in business when doing "personal recommendations' which many business make for their customers. This enables business to make more accurate recommendations and improve customer satisfaction.
health insurance companies perform a similar task when a person applies for medical insurance- medical histories and family histories are checked to determined an individuals risk. they can also use to detect potentially fraudulent claims, much as government do for social security based fraud
Solution
Security
Data Protection Act
Solution
Drawbacks of DB
Requires relatively large cost to set up the initial database and to train workers people to be able to use them properly.
It is easy to check if the data is there by using the queries and the find tool
Requires dedication to insert all the data into the database
database can include criminal, tax, medical, libraries database. often these database are interlinked, raising question about privacy and control data
It is often used to build up a profile of an individual by combining data about them from several database.Commonly used by government..
the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cuts costs, or both
Ensuring data is correct, relevant and up to date.A lack of integrity can cause huge issues including economic loss and legal problems.
Benefits of DB
data can be easily transferred
data can be easily managed
can store a lot of data
The data is easy to access and to sort with the use of queries
Privacy. The data is collected and put into a database which the subjects might be unaware of how it is being used
use anti-virus software if a virus accesses the database all of the data in it may be in jeopardy. databases which have important details such as banks are the most at risk because if a virus ruins the data it could shut down the bank forever.
World wide accessible through internet
use authentication like password or biometrics
Ask for permission. Gain consent from individuals.
accessing data and correcting errors- individuals should have the right to view the data stored about them and have any errors corrected.
The Data protection Act is a UK law that governs the use of data collected and stored on a computer system.
In a flat file database the more times the data is repeated the higher the change that a mistake is made. This means that the same field can have different values in different records.
Stakeholders
purpose- once the data have been collected, data should be used only for this purpose, and not for alternative purpose, known as secondary use
By repeating the data this leads to wasted storage space. Redundant data can consume a lot of disk and memory space.
Using a relational database solves the problem of redundant data. Only one copy of information is stored in a table so if it changes, those changes will automatically be reflected in all other tables.
CSV (Comma separated Value) and TSV (Tab separated value) are common ways of transferring data between database and spreadsheet software. Fields are saved as plain text files which are read by most programms.
CSV is a comma separated value which is a text file. It is a file without any formatting where data in a record is separated by a comma.
Validation is the process of ensuring data is in the correct format for a particular field. Validation does not ensure the data is correct, validation can only be used to check that the data is accepted in that field.
Verification checks that the data is correct. Different ways:
1) Double entry data - entering data twice
2) Visual verification
Contain a firewall
DDOS Protection software because if hackers manage to DDOS the database the data become unaccessible to anyone. The hackers can also keep the attack going for as long as they want which can affect companies.
Database may use a lot of storage to store and may be deleted easily.
positive impact - by reducing fraud, governments can reduce economic loss and spend more money somewhere more productive.
Invasion of privacy!
Data mining is the process of discovering hidden patterns and trends in large databases. It is capable of analyzing millions of records
TSV is a tab separated value which is a simple table format for sorting data in a tabular structure
can be hacked by hackers
Distribution - Be clear on the whether the data will be given or sold to third parties
Data users must take adequate security measures to prevent unauthorized access to the data they hold. These measures should cover a range of possible attacks (hacking, physical theft, interception during transfer)
data maybe lost due to software reliability
Encryption of both communication links via a TLS should be standard practice. Encryption of all data in the database. Data auditing allows data controllers to view both successful and unsuccessful attempts to access, change or delete data. This can help alert data controllers to the possibility of malicious activity.
requires maintenance from technical support
Access control systems should be used to ensure employees only access the data they need to do their job. There is always the possibility of employees copying or using data for criminal purposes.
technical support is provided
Data user - people who collect and use the data
Data subject - the people who the data is held about
Data controller - the person in an organisation who has overal responsibility for ensuring the DPA is followed.
Information commissioner - a position responsible for enforcing the DPA nationwide
unreliable- data can be out of date if not updated frequently
Rules for collecting data
Ensure sensitive data is only collected with the data subjects consent.
Ensuring data is only used for purpose it was collected for
Data must be kept upto date
Security measures are taken to prevent unauthorized access to data
software is consistently updated
Data is securely deleted when it is no longer needed
Data is not transferred to other countries who do not have data protection regulation
Rules for data subjects
data from another database can be easily imported
Have a backup. If the original database becomes corrupt the backup database can replace it easily.
Right to view data stored about you
Right to have data corrected or deleted if it is incorrect
click to edit
Data can be shared
There can be exceptions made to these rights. E.g. data subjects do not have the right to view information held about them as part of criminal or national security investigation, since doing so would likely harm the investigation.