Coronel, C. & Morris, S. (2015). Database systems: Design, implementation, and management (11th ed.). Stamford, CT: Cengage Learning.
Chapter 15, “Database Administration and Security” (pp. 670–713)
This chapter describes the role of the database manager and highlights responsibilities covered in the database administration process. These responsibilities ensure that data is protected and continually monitored to yield the most accurate information.
Murray, M. C. (2010). Database security: What students need to know. Journal of Information Technology Education, 9, IIP61–IIP77. Retrieved from the Walden Library databases.
Security is an important requisite of database design. This article describes the pitfalls of vulnerability in databases and the importance of data security methods.
Forrest, M., Maclean, D., Towers, H. K., & Younes, H. (2012). The accuracy of real-time procedure coding by theatre nurses: A comparison with the central national system. Health Informatics Journal, 18(1), 3–11. Retrieved from the Walden Library databases.
The authors compare the differences in real-time coding performed by clinical coders and non-clinical coders. They observed that complications arose during attempts to embed coding in clinical workflow.
Imran, S.,& Hyder, I. (2009). Security issues in databases. Future Information Technology and Management Engineering, 2009. FITME ’09. Second International Conference, 541–545. Retrieved from the Walden Library databases.
This article explains discretionary and mandatory database security models, their implementation, and their efficiency. It also evaluates how these methods may be inefficient with regard to specific database designs.
Gaff, B. M., Smedinghoff, T. J., & Sor, S. (2012). Privacy and security. Computer, 45(3), 8–10. Retrieved from the Walden Library databases.
Privacy regulation and the protection of sensitive information are still inconsistently established and enforced. This article addresses the legal issues surrounding database security. It also evaluates protection methods that are the most effective
Don't use plagiarized sources. Get Your Custom Essay on