Required Resources

Readings

  • Coronel, C. & Morris, S. (2015). Database systems: Design, implementation, and management (11th ed.). Stamford, CT: Cengage Learning.
    • Chapter 15, “Database Administration and Security” (pp. 670–713)

      This chapter describes the role of the database manager and highlights responsibilities covered in the database administration process. These responsibilities ensure that data is protected and continually monitored to yield the most accurate information.
  • Murray, M. C. (2010). Database security: What students need to know. Journal of Information Technology Education, 9, IIP61–IIP77.
    Retrieved from the Walden Library databases.

    Security is an important requisite of database design. This article describes the pitfalls of vulnerability in databases and the importance of data security methods.
  • Forrest, M., Maclean, D., Towers, H. K., & Younes, H. (2012). The accuracy of real-time procedure coding by theatre nurses: A comparison with the central national system. Health Informatics Journal18(1), 3–11.
    Retrieved from the Walden Library databases.

    The authors compare the differences in real-time coding performed by clinical coders and non-clinical coders. They observed that complications arose during attempts to embed coding in clinical workflow.
  • Imran, S.,&  Hyder, I. (2009). Security issues in databases. Future Information Technology and Management Engineering, 2009. FITME ’09. Second International Conference, 541–545.
    Retrieved from the Walden Library databases.

    This article explains discretionary and mandatory database security models, their implementation, and their efficiency. It also evaluates how these methods may be inefficient with regard to specific database designs.

Gaff, B. M., Smedinghoff, T. J., & Sor, S. (2012). Privacy and security. Computer, 45(3), 8–10.
Retrieved from the Walden Library databases.

Privacy regulation and the protection of sensitive information are still inconsistently established and enforced. This article addresses the legal issues surrounding database security. It also evaluates protection methods that are the most effective

Don't use plagiarized sources. Get Your Custom Essay on
Required Resources
Just from $13/Page
Order Essay
Order your essay today and save 25% with the discount code: COCONUT

Order a unique copy of this paper

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
Top Academic Writers Ready to Help
with Your Research Proposal
error: Content is protected !!
Live Chat+1(978) 822-0999EmailWhatsApp

Order your essay today and save 25% with the discount code COCONUT