Home Random Page


CATEGORIES:

BiologyChemistryConstructionCultureEcologyEconomyElectronicsFinanceGeographyHistoryInformaticsLawMathematicsMechanicsMedicineOtherPedagogyPhilosophyPhysicsPolicyPsychologySociologySportTourism






Privacy

 

You might be astonished by the amount of information stored about you in computer database. You bank has information on your financial status, credit history, and the people, organizations, and businesses to which you write checks. School records indicate something about your ability to learn and the subjects that interest you. Medical records indicate the state of your health. Credit card companies track the places you shop and what you purchase in person, by main, or on the Web. Your phone company stored your phone number, your address, and a list of the phone numbers you dial. The driver’s license bureau has your physical description. Your internet cookies track many of the Web sites you frequent. By compiling this data-a process sometimes referred to as “profiling’-an interested person or company could guess some very privet things about you, such as your political views or even your sexual orientation.

When records were stored on index cards and in file folders, locating and distributing data constituted a laborious process that required hand transcriptions or photocopies of piles of papers. Today, this data exists in electronic format and easy to access, copy, sell, shop, consolidate, and alter.

Privacy advocates point out the potential for misusing data that has been collected and stored in computer database. In response to terrorist threats, the Pentagon is working on several controversial projects designed to mine data from database that store information about passports, visas, work permits, car rentals, air-line reservations, arrests, bank accounts, school grades, medical history, and fingerprints. Government data miners believe that data mining could uncover terrorists. Privacy advocates note, however, that every data set contains patterns. The big question is whether any set of seemingly innocent activities, such as credit card purchases, can be correlated with impending terrorist acts. The potential for error and privacy violation in generalized data mining projects is sobering. Privacy advocates are encouraging lawmakers to closely monitor government snooping and restrict privet-sector sale and distribution of information about individuals. Some legislation is in place for certain private-sector institutions. For example, the 1999 Financial Services Modernization Act requires financial institutions to supply clients with an annual notice expanding how personal information is collected and share. This legislation also required financial institution to provide a way for clients to opt out of such information exchanges.

The issue of privacy is not simple. Information about you is not necessarily “yours”. Although you might “reveal” information about yourself on an application form, other information about you is collected without your direct input. For example, suppose you default on you credit card payment. The credit card company has accumulated information about your delinquent status. Shouldn’t it have freedom to distribute this information, foe example, to another credit company?



People aren’t always unwilling victims of privacy violations. Many individuals knowingly let companies gather profiling information to get free products. For example, thousands of people signed up for Google’s Gmail service even though they knew their e-mail massages could be scanned to develop marketing profile.

Unfortunately, private information can be garnered from your computer without your permission. Spyware is a type of software containing code that tracks personal information from your computer and passes it on to third parties, without your authorization or knowledge. Spyware might be embedded in an application that you download, or it can download itself from unscrupulous Web-sites-a process called a “driveby download”Database containing personal information do offer positive benefits. For example, many web surfers appreciate the shortcuts offered by software agents that assemble a customer profile in order to recommend books, CDs, videos, new articles, and other targeted goods and services. These users might willingly give up some measure of privacy for the convenience afforded by these agents.

The electronic privacy issue appears to be heading toward some type of compromise between strict privacy and wholesale collection/distribution of personal data.

 

What do you think?

 

1. Do you think data about you should be distributed only after your permission is obtained?

2. Can you identify an actual incident when you discovered that data about you was distributed without your approval?

3. Do you think the information you provide on paper forms is more private than the information you enter into Web-based format?

4. Have you thought about ways to protect your privacy?

 

Final test. Do the tasks in the following test.

1. A(n) … file is a structured file containing only one record type … .

2. All of the following are considered advantages of using static Web publishing to display data on a Web page, EXEPT … .

a) you data remains secure

b) most entry-level DBMSs provide the capability to produce an HTML page

c) users can change your data d) it provides a “snapshot” of your data

3. Modern database software supports data …, which means keeping data separated from the program modules that manipulate the data.

4. The first step to organize relational database is to organize data into field. (True/ False)

5. In a relational database, an attribute is equivalent to a record. (True/False)

6. A(n) … is a collection of data fields that pertain to an entity, such as a person, place, or thing.

7. One of the goal of normalization process is to minimize data … .

8. SQL … include SELECT, FROM and INSERT.

9. ASP, CGI, and PHP are used to create XML documents that are processed on a server before being sent to your browser. (True/False)

10. In SQL, the JOIN command allows you to add fields to a database. (True/False)

11. Spreadsheet software typically includes some data management features suitable for working with relational database. (True/False)

12. A database index has no bearing on the physical sequence of records stored on disk. (True/False)

13. Data … refers to the use of statistical tools for automated extraction of predictive information from database.

14. An SQL query is a sequence of words, much like a sentence. (True/False)

15. One a table’s sort key has been added, it cannot be changed. (True/False)

16. In an ERD, relationships and … are shown by connecting lines.

17. A primary … contains data unique to a record.

18. The term “parameter” refers to detailed specifications for a command. (True/False)

19. Real, integer, text, logical, BLOB and date are examples of data … .

20. A database consists of one or more records … that contain data.

 

Projects. Choose and perform one of the projects given.

1. A friend wants to create a table to store information about a collection of old books. List the fields you might include in the table to store information about the book. For each field, specify the field name, data type (text, numeric, date, etc) and field length. Indicate primary key(s) and describe in writing how you would sort and/or index the data.

2. Computer databases often store personal information about the citizens of more than one country, yet privacy expectations and laws differ. For this project, explore the differences in privacy laws around the globe. Which countries have the strongest privacy laws and which have the weakest? Which laws would govern the data stored by multinational companies? As a global consumer, which databases would concern you most for potential privacy violations? Consolidate your thoughts into a one- to two-page paper and submit to your instructor.

 


Date: 2015-01-12; view: 1019


<== previous page | next page ==>
DATABASE DESIGN | Unit 8. computer programming
doclecture.net - lectures - 2014-2024 year. Copyright infringement or personal data (0.006 sec.)