Database Management Systems and Security Term Paper by Quality Writers

Database Management Systems and Security
This paper discusses databases as they relate to corporate use and security strategies.
# 102860 | 2,540 words | 7 sources | APA | 2008 | US

$19.95 Buy and instantly download this paper now


This paper states that current technology now removes the risk of the data and information within a database from being used for illegal or fraudulent activities. The author points out that these new advances are related to new database management software, which can customize user accounts and access to the data as well as encrypt all of the data in a given database. The paper explains that data mining is one of the primary activities that is used to illustrate how important data security and management has become across most industries. The author suggest that failure related to security and encryption features is usually associated more with the planning, selection and deployment of the data management solution rather than intrinsic faults within the solution itself.

Table of Contents:
Executive Summary
Research Hypothesis
Explanation of the Technology
Historical Background
How it functions
Application of the Technology
Organizational use
Strengths and Costs
Future Trends
The future
Forces of change
Key Findings

From the Paper:

"Previously, most healthcare organizations were content to rely on internal IT platforms to automate some aspects of their internal functions without engaging the full spectrum of IT solutions such as data mining and data warehousing in a non-secure environment. Most often, these pre-existing IT solutions for healthcare management are independent software applications or separate modules of a healthcare enterprise resource planning (ERP) system that rely on existing databases of some type. While the application and use of these independent applications and ERP modules can certainly introduce cost-savings into the equation, they require an upfront investment in either IT applications, IT infrastructure or both, as well as on-going management of these new systems."

Sample of Sources Used:

  • Charp, S. 2000. Enterprise Solutions. T H E Journal (Technological Horizons In Education), 28(1), 16.
  • Chopoorian, J. A., Witherell, R., Khalil, O. E., & Ahmed, M.(2001). Mind Your Business by Mining Your Data. SAM Advanced Management Journal, 66/2, p.45.
  • Gerritsen, R. (1999). Assessing Loan Risks: A Data Mining Case Study. IT Pro, Nov./Dec., p.16.
  • Jacko, J. A. & Sears, A. (Eds.). (2003). The Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications. Mahwah, NJ: Lawrence Erlbaum Associates.
  • Prencipe, A., Davies, A., & Hobday, M. (Eds.). (2003). The Business of Systems Integration. Oxford: Oxford University Press.

Cite this Term Paper:

APA Format

Database Management Systems and Security (2008, April 03) Retrieved August 13, 2020, from

MLA Format

"Database Management Systems and Security" 03 April 2008. Web. 13 August. 2020. <>