Sunday, January 26, 2020

Database Management: Law, Ethics and Security

Database Management: Law, Ethics and Security Law, Ethics, and Security Standards: Relevant legal and ethical standards need to be considered in the solution design and in future implementation. (SNHU.) A combination of issues have introduced strong ethical concerns in database design: increase in size of data, increased sophistication in mechanisms and convenience of access systems, increased invisibility (through absorption into the application and/or the user interface), increase in circulation and excessive, globalized sharing of information, increased interaction with other databases and applications, increased amounts of personal information, increased merchandising of information and poor or lacking security for database owners. (Goguen.) Additionally, the risks have been augmented by new technologies: open source database management systems; cloud computing and social software applications. With the combined three, the only defense against the unethical use of information is the ethical standards of the stakeholders themselves. (DeMers.) Ethics is a set of principles of right conduct or a theory or a system of moral values. In a civilized society, morality and ethics guide and precede the law. There are no legal laws to govern how individuals morally behave. Nevertheless, legal and ethical guides/rules must be applied to protect the information collected in databases. Limit access of data or prevent inappropriate access to all or part of a data set. Maximize the skills required in learning/using the existing system data. Implement total data transparency, i.e., include features that convey to the end user the feeling like he/she is the databases only user, or hide all the added complexities of distribution, making users assume that they are working with a single centralized system. Include the concept of voluntary informed consent. Address data protection issues and security concerns. Ensure that copyrights are protected. Observe copyright laws (avoid any usage of materials/information without prior and proper consent). When expanding globally, learn and observe applicable regional and/or international laws. Protect IP (Intellectual Property) and IPR (Intellectual Property Rights). Do not infringe upon the intellectual property or patents of others. Keep detailed records of everything (research materials, database rules, etc.) not only for future references but to protect against possible accusations/allegations of impropriety or misconduct). Legal Compliance: The best practices in design, data use, and storage to ensure legal compliance must be implemented. (SNHU.) Certain principles or practices address the increasing complexity of data usage, processing and storage at all levels and stages of a business as well as the associated consequences and effects. By adopting these principles, companies can help ensure that privacy and information security become an essential component of its technologies and business practices from the outset. Understand the business model and rules, specifically, how the enterprise will interact with its customers at every step of the way. Implement appropriate information security policies or build technical reinforcements as to how client information is maintained, stored, collected, used and shared. This will help identify and avert potential privacy issue concerns and risks. Protect cardholder data (including bank and credit card accounts, social security, etc.). Encrypt transmission of cardholder data (to safeguard the data in the event it falls into the wrong hands). Protect stakeholder information (including email addresses, telephone numbers to protect them against spamming, phishing and/or unwanted robocalling). Keep abreast of legal developments and regulations concerning privacy and information security. Seek legal advice as required. Keep data completely anonymous (within and outside the organization). Acquire the users consent before obtaining any personal and sensitive information. Ethical Practices: The best practices in design, data use, and storage can be implemented to ensure the ethical operation of the company. (SNHU.) Following and applying ethical and moral obligations will ensure the trust and confidence of users and customers. The protection of these stakeholders should be the primary concern of any business enterprise. Respect the privacy of users. Never share or pass on a customers personal information to any other person or party without first informing the customer and obtaining his/her consent. Reduce the efforts of repeated and unnecessary collection of data on the user. Be willing to provide customers access to any stored information that the system has on them. Allow users the right to have this information modified or deleted if inaccurate or illegally collected. Be prepared to inform customers the reasons that the enterprise is collecting, storing and using personal information. Ensure safe/secure storage and disposal of customer information. Be prepared to provide a customer with any request for the return, transfer, or destruction of the data. (Yeung.) Choose the appropriate and suitable database model for the company. Use the data appropriately (i.e., do not misuse or sell it for profit or otherwise). Immediately disclose security breaches to stakeholders, the local State Attorney General, Data Protection Supervisory Authority, and any other government agencies. Ensure stakeholders continued access to their information. Ensure data integrity to discourage against data tampering. Hire trustworthy, reliable and experienced staff. Perform background checks if necessary. Security Needs of Solution: In consideration of the type of organization selected, the data used, and consideration of legal and ethical standards, the security needs of your DBMS solution are required. (SNHU.) The group/department for which the enterprise data model was constructed relates to customer sales. Like most enterprises, the success of Vinces Vinyl relies upon customer satisfaction. Therefore, customer data must be protected and kept secure at all cost. Maintain, guard and protect the privacy of customers/users. Monitor and keep user data current (e.g., ensure that the credit cards on file have not expired). Keep data secure and confidential. Document data (explain how it was created or digitized, what it contains, including its structure and any data manipulations). This will ensure data preservation and continuation. Ensure adequate information security (e.g., personal data, financial data, customer purchases, transactions and references). Devote time and attention to security matters. Be aware of obvious vulnerabilities to the database management system. Fortify perimeter security and defenses such as firewalls and intrusion detection systems/intrusion prevention systems (IDS/IPS). Think primarily of security in every step of the way.ÂÂ   Perform regular and deep database vulnerability scans and assessments. Apply restrictions when granting users access to the database and review the access privileges periodically. Encrypt sensitive data. Be sure to manage the encryption/decryption keys, and change them regularly. Periodically monitor and audit user authentication. (AscentTech.com.) Database Security Plan: A comprehensive but high-level security management plan for the design that will align to organizational needs should be implemented. (SNHU.) In addition to the security required to safeguard the customers, Vinces Vinyl should establish certain security practices. This will not only guard against infringement of privacy issues but also against malicious attacks and security breaches such as identity theft. Such data must be protected from unauthorized access and malicious attacks (e.g., Trojan, virus, worms, malware, adware, spyware, DDoS). Of special concern is SQL injection, which does not infect the end users directly. Instead it infects a website, allowing the attacker to gain unauthorized access to the database and the ability to retrieve all the valuable information stored in the database. Only allow and accept the creation of strong usernames and passwords. When systems/applications come with built-in default usernames and passwords (which have been created for easy set up), the log-on information should be erased and replaced as soon as possible. Periodically review the database configuration and delete any unnecessary or unused components since certain database vulnerabilities exploit add-ons and extensions. Avoid creating complex systems. Simplify or only install components that are necessary. Keep the OS, browser(s), software, and hardware current. Apply the necessary updates and security patches. Apply secure coding practices. Frequently monitor and audit the database to determine vulnerabilities, monitor, and audit again. Use available, inexpensive tools to deploy monitoring and auditing automatically. Some tools include prevention capabilities. Protect not only the data but the servers on which they reside. Keep computers and devices physically inaccessible to unauthorized users. Apply strong passwords and usernames. Maintain strict business procedures, e.g., assign individuals specific roles that they should be accountable for (e.g., backing up data, generating reports, verifying data integrity). Implement proper authorization to allow individuals the ability to see only the data that they are authorized to access. Maintain a secure storage of sensitive data (e.g., use strong passwords, install firewalls, intrusion prevention and intrusion detection systems). Properly authenticate users (i.e., make sure that a person is who he/she claims to be and is not an impostor). Apply granular access control and determine how much data an authorized user should be allowed to see. Isolate portions of the database to prevent unlimited access. For example, while a user might be allowed access to his/her personal data, he/she must not be allowed to view/access other users data. Maintain regular backups or data movement onto disk, tape, or stored at third-party sites which are also secured and tracked. Encrypt backups to prevent unauthorized viewing or access. Keep the backups current to enable recovery should the need arise. Implement a documented disaster recovery plan to minimize time loss which could impact the business. Apply integrity constraints by maintaining valid and current information. Enforce encryption to incoming and outgoing data. Record and verify database log reports, histories, changes, etc. Keep everything well documented. Train the personnel and make sure that everyone understands and has a grasp of both desktop and cloud database security. Implement strict safety procedures for everyone to follow on a regular basis. References 28 Types of Computer Security Threats and Risks. (n.d.). Retrieved on March 16, 2017 from http://www.itscolumn.com/2012/03/28-types-of-computer-security-threats-and-risks/ Business Rules: Informal Predicates. (n.d.). Retrieved on March 3, 2017 from http://www.databasedesign-resource.com/business-rules.html Conger, S. (2014). Hands-On Database, 2nd Edition. [MBS Direct]. Retrieved from https://mbsdirect.vitalsource.com/#/books/9780133927078/ Compliance by Design. (n.d.). Retrieved on March 16, 2017 from https://www.itlawgroup.com/resources/articles/76-compliance-by-design Database Study Guide. (n.d.). Retrieved on March 16, 2017 from https://ethics.csc.ncsu.edu/privacy/database/study.php Data Security Challenges. (n.d.). Retrieved on March 16, 2017 from https://docs.oracle.com/cd/B10501_01/network.920/a96582/overview.htm De Mers, B.A. (November 20, 2014). On Ethical Issues Surrounding the Planning and Designing of Databases. Retrieved on March 16, 2017 from https://www.linkedin.com/pulse/20141120200923-338627392-on-ethical-issues-surrounding-the-planning-and-designing-of-databases Enterprise Data Model. (October 28, 2009). Retrieved on March 3, 2017 from http://www.learn.geekinterview.com/it/data-modeling/enterprise-data-model.html Enterprise Data Model. (n.d.). Retrieved on March 3, 2017 from https://www.techopedia.com/definition/30596/enterprise-data-model Goguen, J.A. (December 6, 1999). The Ethics of Databases. Retrieved on March 16, 2017 from https://cseweb.ucsd.edu/~goguen/papers/4s/4s.html#B-S98 Hernandez, M. J. (2013). Database Design for Mere Mortals: A Hands-On Guide to Relational Database Design, 3rd Edition. [MBS Direct]. Retrieved from https://mbsdirect.vitalsource.com/#/books/9780133122275/SNHU (2016). Modeling Business Rules. (n.d.). Retrieved on March 3, 2017 from http://www.sparxsystems.com/enterprise_architect_user_guide/10/domain_based_models/modeling_business_rules.html IT 650 Milestone Four Rubric.ÂÂ   (n.d.). Retrieved on January 20, 2017 from https://bb.snhu.edu/bbcswebdav/pid-14554096-dt-content-rid-41947794_1/courses/IT-650-17TW3-MASTER/IT-650%20Student%20Documents/IT%20650%20Milestone%20Four%20Rubric.pdf Kandle, N. (July 1, 2005). The Enterprise Data Model. Retrieved on March 3, 2017 from http://tdan.com/the-enterprise-data-model/5205 Regulatory Compliance and Database Management. (March 2006). Retrieved on March 16, 2017 from http://www.sandhillconsultants.com/whitepapers/regulatory_compliance_and_database_management_whitepaper.pdf What Are Business Rules? (n.d.). Retrieved on March 3, 2017 from http://etutorials.org/SQL/Database+design+for+mere+mortals/Part+II+The+Design+Process/Chapter+11.+Business+Rules/What+Are+Business+Rules/ Yeung, C. (September 5, 2012). What privacy issues are involved in building a marketing database? Retrieved on March 16, 2017 from http://www.startupsmart.com.au/mentor/what-privacy-issues-are-involved-in-building-a-marketing-database/

Friday, January 17, 2020

Language Manipulators Essay

UNMIK regulations clearly state that English is the official language, and any translations to Albanian, Serbian or otherwise are done as a â€Å"courtesy. † This means that all official correspondence including contracts, their exhibits and notifications must be accomplished in English, otherwise they are not valid. The following is a typical example drawn from a contract between UNMIK and a local Kosovar company. â€Å"Article VIII: Miscellaneous Provisions, section DD. English Language, states: â€Å"This Contract is written in the English language and executed in 4 counterparts plus 4 drafts in Albanian language and 4 drafts in Serbian language. It shall be construed and interpreted in the English-language version, which shall govern. Any translation into another language is provided as a matter of courtesy. † The ignoring of Kosova’s majority of 90% ethnic Albanians, and the imposition of English as the â€Å"legal† language in Kosova has created extreme difficulties, hardships and has placed Albanian Kosovars at a significant disadvantage and vulnerability, which UNMIK organizations and others have capitalized on, to the detriment of Kosovar businesses and organizations. In the United States, following the end of the civil war, individuals that came to the South and took advantage of the war-torn situation and people came to be known as â€Å"Carpet Baggers† because of the luggage they carried. As we are in a similar position, perhaps we should recognize the effective negative manipulation of Kosovars by UNMIK and Internationals by referring to them as â€Å"Language Manipulators. † The â€Å"Power† given to the English language requirement by UNMIK is being misused daily, and it enters into all forms of community action, business and our government. Just imagine if UNMIK and KFOR had to carry out it duties, and daily living using a language that the great majority of people cannot speak or write, and their actions were legally determined and evaluated by this â€Å"foreign† language. It is clearly understandable to utilize the English language within the operations of the International community, the United Nations (UN), as this has been so for quite some time. However, since UN has set precedence by creating UNMIK as the first government of a region following a war, it is unrealistic to continue to impose a foreign language on the operations of Kosova’s people. UNMIK, according to UN Regulation 1244 (1999) is supposed to be aiding the establishment of â€Å".. provisional democratic self-governing institutions to ensure conditions for a peaceful and normal life for all inhabitants of Kosovo,† and it is ludicrous to state this aim while insisting on the â€Å"legal† use of the English language. In an effort to correct the daily injustice and outright manipulation of the Kosovar people, the following corrective action needs to be implemented immediately. (1) That UNMIK, through regulations and law, recognize the Albanian Language as the Official Language of Kosova, in any and all communications and contractual negotiations and legal actions; and that the Serbian Language be also recognized as a valid language when ethnic Serbs are involved in contractual and other legal ventures with UNMIK and/or others operating fully within the borders and governing process of Kosova. OR (2) That UNMIK establish an independent organization of qualified English & Albanian speaking attorneys, one or more of which would be appointed, at the expense of UNMIK, and not drawn from the Kosova Budget, to each and every Albanian organization or corporation that must enter into contractual arrangements with UNMIK. This is necessary so long as UNMIK insists that the non-native language of English is the Legal Language over the native Albanian language of Kosova. Furthermore, no contract or agreement entered into with UNMIK shall be deemed valid in any manner if this assistance is not provided during negotiations and through the final signing of the contract or agreement. A â€Å"Double Edged Sword† Well, what do you think about the presentation so far? Does the imposition of English being the official language of Kosova make you angry, or sympathetic to the problems of the Albanian businessman, or Government Officials? Do you see â€Å"Unfairness† in it all? Are you upset with the â€Å"Language Manipulators† for taking advantage of ethnic Albanians? And which solution would be preferable to you; (1) where Albanian becomes the official language immediately, or (2) where there is an independent English Speaking support organization? If you feel that number (1) is the best option at this time, then I ask that you carefully reconsider your position as we continue the discussion. There is another side to the ingenuity of the â€Å"Language Manipulators,† and that is their passive support of the ethnic Albanian’s continued use of the Albanian Language in all aspects of their private and public life. The â€Å"Language Manipulators† are very pleased that there is no English news on TV or radio, and not one of the local papers has any English articles and we can only find job announcements for NGOs in English. And they are especially pleased that demonstrations and protests â€Å"boycott† the use of English, and are done in the Albanian Language. We see that, because UNMIK forces the English Language in official matters, many Albanians â€Å"rebel† and fight against using English, keeping it out of their newspapers, TV and radio. Just think for a moment. On the one hand they are imposing English as the â€Å"official† legal language in Kosova, creating problems and taking advantage of Albanian businessmen, but on the other hand they are â€Å"pleased† that no English is being used in Kosovar daily life, and they encourage pride in the Albanian Language. Do you see the beauty in this strategy yet? The simple fact is that those who don’t support the Independence of Kosova want ethnic Albanians to keep speaking and writing in Albanian, and to ignore the use of the English Language! English is the language of world business and western politics, and if Albanians begin using English effectively, the â€Å"truth† about Kosova could be heard by the English Speaking world, such as the United States of America. And we thought the American â€Å"Carpet Baggers† were clever and nasty in their dealing with people in the South following the civil war. â€Å"Language Manipulators† are very clever in their large-scale use of an age-old manipulation. If you don’t want someone to have or do something, then tell him or her they â€Å"must† have it or use it. We all tend to rebel against anything that is forced on us, and if we are not careful, we will be manipulated out of the very thing we want or need. And in this case, the â€Å"forcing† of the English Language on the Albanian people in Kosova is blinding them to the fact that this is the very thing they need if they are to survive and gain their full Independence. In this modern world, and in the current circumstances that Kosova finds itself in, the proficient use of the English language is the only way to get the truth beyond the borders of Kosova, to gain allies and support, and to develop the skills necessary to succeed in business and politics.

Thursday, January 9, 2020

The Challenges Of Surviving The Industrialization Era

Caleb Holbrook Catherine Herdman APP 200 October 27, 2014 The Challenges of Surviving the Industrialization era This is a historical fiction book that takes place in Appalachia, near the border of West Virginia and Kentucky between the late 1800s and early 1900s. This is the same area where the Hatfields and McCoys were feuding just a few years earlier, although none of these characters mention them. We see railroads and coal companies taking the land of the townspeople. With their land gone, they have no choice but to work in the coal mines, living in company towns and at the mercy of the company store. Any efforts to organize to get better working and living conditions were brutally put down by the coal companies and their hired gun†¦show more content†¦Marcum and Rondal. In chapter one the book is outlined giving a setting and it starts with the roaring railroads companies wanting to expand and began to take the mineral rights of coal from the farmers so that they can sell it to coal companies, Which then sell it too big business such as steel industries or it is used to fuel machines with the power discovered in coal. This allowed the booming steel industry to grow which then turned around and produced the railing for railroads. This mineral grows under the top soil which was in the land that the farmers plowed and worked to make their living on. Coal companies convinced farmers that they owned the legal right to mine this coal off of the farmers land and forced and used intimidation to get them to sign their lands away. The main concept to take from the first few chapters is that of the â€Å"company store† the coal miner’s families were required to do all of their buying of groceries, clothing, and other necessary items through coal company’s stores. The prices were set at the liking of the coal company. The company deducted whatever had been spent in the stores the amount from the workers pay. Often workers had purchased more than they earned even though most bought only what they needed to survive until the next week. Until 1919 the businesses ran their companies. There was a laissez faire approach to the economy, which meant government was really hands off,

Wednesday, January 1, 2020

American Manufacturing and the U.S Economy Essay - 702 Words

For over half a century, American manufacturing has dominated the globe. During this period, many great American businesses and corporations began. Companies like General Motors, Levi, and Ford became widely known and promoted. American manufacturing became synonymous with quality, greatness, and reliability. However, manufacturing in the U.S has started to plummet as the economy has begun this recession. It may seem as if the country that used to make everything is really on the edge of making virtually nothing. U.S. jobs in manufacturing have been vanishing at a fast rate and unemployment percent is on the rise, but despite the vanishing jobs Americans’ productivity is on the rise and Americans still lead the†¦show more content†¦Even with the misfortune with unemployment, Americans still lead the world in manufacturing. But there is a counterbalance to the drop in total employment, the dramatic rise in productivity. According to the National Association of Manufacturers, over the past two decades manufacturing productivity has grown by 94%, which is considerably faster than the rest of the U.S. business sector, where productivity grew by 38% over the same time period. Another concept that is brought up by the article is international trade and business. There are a number of gains to be obtained from international trade, such as lower prices, greater choice, and a variety of resources. Many of the millions of laid-off workers in recent years ended up shifting into lower-salaried service jobs, while U.S. manufacturers relocated production facilities to low-cost countries. The U.S has established great economic trade connections with the rest of the world, and that has lead to U.S. based plants shifting work over to foreign competitors, such as China, so that they can have cheap labor. It is much cheaper to have workers overseas however there is the danger of unemployment. The United States needs to protect the economy from imports, so sometimes a tariff is applied. A tariff is a tax that is charged on imported goods. Any taxShow MoreRelatedProblems Faced By Japanese Foreign Investments Relations Between U.s. And Japan1135 Words   |  5 Pagesglobal economy, the foreign investments relations between the U.S. and Japan have been one sided due to the inter-Asian business models of the Japanese markets. Japan has traditionally been cooperative with the United States in allowing its products to be manufactured and sold in the United States, which has provided some manufacturing jobs in the U.S. This causes problems for the U.S. because they are disadvantaged by one-sided trade agreements that decrease job opportunities for American workersRead MoreU.s. Trade And Economy1293 Words   |  6 Pages US TRADE AND ECONOMY Then and Now Oshin Nandal 1001111637 EXECUTIVE SUMMARY As we know US went from being a net exporter to a net importer in a short span of time. Currently US economy is strong but with lots of debt. These changes in trade gap and debt were caused basically due to other developing nations coming up with low cost manufacturing system and thus US ended importing products from other countries. Also many US manufacturers moved their factories abroad due to cheap laborRead MoreThe term outsourcing refers to the act of contracting out business activities and procedures to a1300 Words   |  6 Pagescorporations. Outsourcing mainly involves both the local and foreign contracting. At times, the term is used to describe relocation of business organizations to another country which is a also known as off shoring. This term is very popular in the U.S especially in the 21st century (Davies, pg. 21). The main motivation for the activity of outsourcing is the financial saving due to the reduced international labor market rates. The opposite of outsourci ng is in-sourcing which is the act of bringingRead MoreThe Benefits Of Immigrants During The United States946 Words   |  4 Pagestragedy of September 11th happened, many citizens in the U.S. have a fear of allowing immigrants into the United States. Some citizens judge that immigration is an impending threat to national security, and that the U.S. should close the borders up for good. The U.S. should not consider that because everything negative that occurs in the U.S. is not due to immigrants. The government can stop illegal immigration right now, but would it not affect the U.S. more to do so? Restrictionists claim that large-scaleRead MoreHow Does Economy Affect The Mexican Economy965 Words   |  4 PagesThe Mexican economy is currently the 15th largest economy in the world with a GDP of $2.2 trillion (â€Å"Index of Economic Freedom†, 2017). In comparison, the United States had a GDP of $18.57 trillion in 2016 (â€Å"United States GPD†, 2017). Fears of a Trum p presidency initially caused predictions for a slower GDP growth in 2017, but as fears are eased Mexico’s finance ministry has increased their predictions for the GDP growth to an estimated 1.5% to 2.5% increase for 2017, raised from the previous estimateRead MoreThe American Economy : Service Oriented While The Us Manufacturing1211 Words   |  5 PagesIntroduction When reading the statement More than 70% of the US economy is service-oriented while the US manufacturing has shrunk 60% since just 1970 as a result only 1 in 10 Americans works in a manufacturing job. The US does not make, we take. (Fitz-Gerald) It made me realize how much our economy has evolved. Americans are more dependent on services while manufacturing jobs have become less attractive to job seekers. The demand for manufactured goods and products remains high; however, theRead MoreEssay On Nafta881 Words   |  4 PagesUnited States, and Mexico. The binding ingredient when it comes to imports and exports in these three powerful countries is the North American Free Trade Agreement (NAFTA). NAFTA is one of the most influential international agreement between the US, Canada and Mexico that defined the economic, social and political development of the three countries and North American region. NAFTAs immediate aim was to increase cross-border commerce in North America, and in t hat respect it undoubtedly succeeded. ByRead MoreChina s Economic Power On A Global Scale857 Words   |  4 Pagesof the list as an appealing global trade partner. Chinese Manufacturing has led the way to a boom in exports and recognition for the Chinese workforce as a world leader in cost effective manufacturing. A shift in work force has provided inexpensive labor, paired with a strong economy China has also positioned itself among the top world leaders for global exports. China went from an under-developed country to emerge as a leading world economy among economic powerhouses like the United States and theRead MoreUs Manufacturing Essay918 Words   |  4 PagesThe U.S was the number one in pioneering and fabricating capital of the world for about 90 years but it all ended in 2010. According to the United Nations China became the number one nation with manufacturing value reaching about 3 trillion in comparison to the United States 2.2 trillion. Most of the research and develop ment funds in this country goes to manufacturing (American Manufacturing (2012, March 30)). According to American Manufacturing (2012, March 30) the workforce in manufacturing betweenRead MoreU.s. Manufacturing And Trade Policy1563 Words   |  7 PagesOVERVIEW While most Americans are familiar with the campaign slogan, â€Å"Make America Great Again,† the specific policies behind it, specifically as it relates to the economy, are worth studying in far greater detail. The topics I have chosen for further analysis are as follows: − U.S. manufacturing and trade policy − Infrastructure spending − Tax policy − Repeal and replacement of the Affordable Care Act USA MANUFACTURING AND TRADE POLICY President Trump has adopted an â€Å"America first† approach that