• January 22, 2018, 12:28 PM
• Welcome, Guest. Please login or register.
Did you miss your activation email?
Perusing The Shelves

Author Topic: plz help me to solve this case study...  (Read 2185 times)

sun1

  • Guest
plz help me to solve this case study...
« on: February 02, 2011, 07:52 AM »
Case Study :
One of the primary benefits of database is their ability to support ad-hoc reporting. In
other words managers can query the database to obtain customised information to
support decision making. However this can lead to ethical violations. Who monitors
the kind of queries a user poses to the database, particularly if it contains personal
data? “ If a company creates a database precisely so that users can do ad hoc
reporting against a relational database, how would you know what’s been extracted
or what it is being used for”? asks a vice-president of systems and technology at
paramount publishing. The real problem is the lack of standards governing the ways
data can be used in an organisation. While many organisations establish policies and
procedures to ensure that only authorised people access the database, few
organisations have any policies to monitor the way those people use the data.
Though ad hoc reporting has many benefits and many organisations use it with
caution, the ability to query a database is a threat of invasion of privacy.
(a) What measures can an organisation take to ensure that tree access to the
organisation’s database does not result in abuse of this access?
(b) How can schemes and subschemes help to ensure that users can view only
that part of the database to which they have authorised access?


Thanx in advance....

 

Advertisement


rpgarimella

  • Guest
Re: plz help me to solve this case study...
« Reply #1 on: March 29, 2011, 09:21 PM »
You are not allowed to view links. Register or Login
Case Study :
One of the primary benefits of database is their ability to support ad-hoc reporting. In
other words managers can query the database to obtain customised information to
support decision making. However this can lead to ethical violations. Who monitors
the kind of queries a user poses to the database, particularly if it contains personal
data? “ If a company creates a database precisely so that users can do ad hoc
reporting against a relational database, how would you know what’s been extracted
or what it is being used for”? asks a vice-president of systems and technology at
paramount publishing. The real problem is the lack of standards governing the ways
data can be used in an organisation. While many organisations establish policies and
procedures to ensure that only authorised people access the database, few
organisations have any policies to monitor the way those people use the data.
Though ad hoc reporting has many benefits and many organisations use it with
caution, the ability to query a database is a threat of invasion of privacy.
(a) What measures can an organisation take to ensure that tree access to the
organisation’s database does not result in abuse of this access?
(b) How can schemes and subschemes help to ensure that users can view only
that part of the database to which they have authorised access?


Thanx in advance....


 

Tags:
 

Related Topics

  Subject / Started by Replies Last post
1 Replies
4457 Views
Last post July 14, 2010, 10:26 PM
by pallaviinagle
2 Replies
6927 Views
Last post September 06, 2009, 12:14 AM
by BHARATH PAVANJE
1 Replies
6233 Views
Last post July 15, 2009, 05:14 AM
by himanshulove3
0 Replies
2626 Views
Last post July 09, 2008, 03:43 AM
by nupur
0 Replies
5167 Views
Last post August 15, 2009, 04:04 AM
by sajith G S
4 Replies
2542 Views
Last post April 07, 2010, 01:37 AM
by anurag08
2 Replies
3025 Views
Last post April 06, 2010, 08:58 AM
by sun1