Distributed Database System for Quantum Credit Union: A Project
VerifiedAdded on 2022/09/07
|13
|3131
|14
Project
AI Summary
This project outlines a database solution for Quantum Credit Union following its merger with Corporate Image Credit Union. It includes an improved database design and architecture, starting with a detailed ER diagram, and recommends Oracle as the DBMS package due to its robust security features. The project specifies hardware and software requirements, proposes a homogeneous distributed database for efficient data management, and identifies security tools like Oracle's DBSAT and AVDF. Data integration techniques, such as Extract, Transform, and Load (ETL), are discussed, and a data warehouse with online storage is recommended for remote data backup and secure file sharing. The project also defines five business rules for data access and manipulation, and suggests data partitioning to manage large datasets effectively, ensuring data security and operational efficiency for the credit union.

Running head: DNMS 1
DBMS ll Group Assignment
Name
Institutional Affiliation
Date
DBMS ll Group Assignment
Name
Institutional Affiliation
Date
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

DBMS 2
This assignment is to be done in groups of five (5). There is to be a presentation and a
hard copy. Presentation is to be done during the usual class time, with each group assigned 20
minutes to present. A hard copy of this assignment is required and must be submitted on a
date agreed on by the lecturer. All members of the group are to participate. The value of this
assignment is 25%.
_____________________________________________________________________
________________________
You are a database consultant firm and you have been hired by Quantum Credit
Union to provide them with a database solution which will make their daily operations, data
security, and data management more efficient and secure. They have recently merged with
Corporate Image Credit Union, and are aiming to integrate both their information systems as
one in eight (8) months with your direction and expertise. The company is concerned about
security and data protection, and is looking to prioritize in this area by investing in security
tools.
Both organizations currently use a centralized database management system, but are
now ready to implement a distributed database management system that will satisfy their
organizational growth and operations. Due to the merger, the organization has now grown
from four (4) branches to eight (8) branches island wide, with a total of four hundred (400)
employees.
*Assume the daily operations, activities and services offered by a credit union
Your tasks as a Database designers/engineers are:
§ Assume the current database of both organizations are out-dated; suggest an
improved design and architecture beginning with a well labeled ER Diagram (using the
5 step approach) showing:
o Entities
This assignment is to be done in groups of five (5). There is to be a presentation and a
hard copy. Presentation is to be done during the usual class time, with each group assigned 20
minutes to present. A hard copy of this assignment is required and must be submitted on a
date agreed on by the lecturer. All members of the group are to participate. The value of this
assignment is 25%.
_____________________________________________________________________
________________________
You are a database consultant firm and you have been hired by Quantum Credit
Union to provide them with a database solution which will make their daily operations, data
security, and data management more efficient and secure. They have recently merged with
Corporate Image Credit Union, and are aiming to integrate both their information systems as
one in eight (8) months with your direction and expertise. The company is concerned about
security and data protection, and is looking to prioritize in this area by investing in security
tools.
Both organizations currently use a centralized database management system, but are
now ready to implement a distributed database management system that will satisfy their
organizational growth and operations. Due to the merger, the organization has now grown
from four (4) branches to eight (8) branches island wide, with a total of four hundred (400)
employees.
*Assume the daily operations, activities and services offered by a credit union
Your tasks as a Database designers/engineers are:
§ Assume the current database of both organizations are out-dated; suggest an
improved design and architecture beginning with a well labeled ER Diagram (using the
5 step approach) showing:
o Entities

DBMS 3
o Attributes
• Relationships
(15 Marks)
§ Identify the DBMS package that will be implemented and give reasoning for
your choice:
o Attributes
• Relationships
(15 Marks)
§ Identify the DBMS package that will be implemented and give reasoning for
your choice:
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

DBMS 4
o MySQL
o Oracle
o SQL Server
• dBASE
o FoxPro
o PostgreSQL, etc.
Database Management manager need to ensure that appropriate measures have been
put in place in order to smoothen the process of keeping and accessing users' information.
The database system manager should make sure that the system contains of a collection of
programs which operate to operate and safeguard the system successfully. However some of
the best businesses around the world recognize that good management only does not result in
topnotch performance. Hence organizations always enhance performance through the use of
technology. When it comes to database management the technology which should be used
need to ensure that the customer’s sensitive information are well protected(Panda,2015).
Oracle has been identified as one of the best database management software in that it
offers excellent security and streamlines the data management system. But getting the most
out of oracle software it not an easy task and management team should ensure that the
technology deployment is carried out in combination with various program of improvements
and process assessment. To guarantee optimal outcomes, it is vital that the business
procedures match best practice criteria before concluding the Oracle implementation. Or else,
the business will be presenting inefficient processes which will leave the team well short of
the performance optimization and cost optimization that the company is expecting when
undertaking an Oracle implementation (Reitman and Rainey ,2012).
The oracle program consider suitable program since it extends to product-lifecycle
management, human-resource management, warehouse-management, customer-relationship,
o MySQL
o Oracle
o SQL Server
• dBASE
o FoxPro
o PostgreSQL, etc.
Database Management manager need to ensure that appropriate measures have been
put in place in order to smoothen the process of keeping and accessing users' information.
The database system manager should make sure that the system contains of a collection of
programs which operate to operate and safeguard the system successfully. However some of
the best businesses around the world recognize that good management only does not result in
topnotch performance. Hence organizations always enhance performance through the use of
technology. When it comes to database management the technology which should be used
need to ensure that the customer’s sensitive information are well protected(Panda,2015).
Oracle has been identified as one of the best database management software in that it
offers excellent security and streamlines the data management system. But getting the most
out of oracle software it not an easy task and management team should ensure that the
technology deployment is carried out in combination with various program of improvements
and process assessment. To guarantee optimal outcomes, it is vital that the business
procedures match best practice criteria before concluding the Oracle implementation. Or else,
the business will be presenting inefficient processes which will leave the team well short of
the performance optimization and cost optimization that the company is expecting when
undertaking an Oracle implementation (Reitman and Rainey ,2012).
The oracle program consider suitable program since it extends to product-lifecycle
management, human-resource management, warehouse-management, customer-relationship,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

DBMS 5
management, supply-chain management, and call-center services. In-house development and
the acquirement of other businesses have massively stretched Oracle's software business.
§ Name the hardware and software that you recommend for this new
architecture and the operating system platform (10 Marks)
Hardware of the new system
The computer Hardware, includes hard disks, internet of things, as well as channels
for data, which are considered as physical component involved during the data processing
and storage(Waksman,2011).
When running software such as MySQL and Oracle all the physical component of the
computer are involved hence computer's keyboard, Mouse ,Screen and Hard Disk will all be
involved in the data processing.
Software
management, supply-chain management, and call-center services. In-house development and
the acquirement of other businesses have massively stretched Oracle's software business.
§ Name the hardware and software that you recommend for this new
architecture and the operating system platform (10 Marks)
Hardware of the new system
The computer Hardware, includes hard disks, internet of things, as well as channels
for data, which are considered as physical component involved during the data processing
and storage(Waksman,2011).
When running software such as MySQL and Oracle all the physical component of the
computer are involved hence computer's keyboard, Mouse ,Screen and Hard Disk will all be
involved in the data processing.
Software

DBMS 6
This is considered as key component, software is the main program which handle
every operation in the computer everything. It is used in storing ,keeping and updating the
data. The DBMS software, oracle and Microsoft word will all be used in the current situation.
§ Indicate the type of Distributed Database that will be implemented and give
reason for your choice. (10 Marks)
Distributed database is defined as database in where only some storage devices are
involved with the central processor. The distributed data may be kept in numerous computers,
situated in the same location; or distributed over a setup of interlocked computers. Dissimilar
from parallel network, where the processors are firmly coupled and create a single databank
system, a distributed database system is made up of lightly coupled sites which do not share
physical components.
System managers can allocate collections of information across numerous physical
locations. The distributed databank can exist in a systematized network servers or
regionalized independent computers, on company extranets or intranets, or on different
company networks. Because distributed databases store information across numerous
computers, the distributed databases can expand output at the mangers worksites by letting
transactions to be processed on various machines.
The homogeneous database, will be used in the current case because in the
homogeneous database, different sites stock database identically. Database management
system, operating system as well as the data configurations used are all similar sites.
Therefore, they are easy to handle. The system lower communication cost, since the
information can be positioned next to area of usage. This can by large cut communication
costs, likened to the common system (Hallinan, 2019).
§ Identify security tools that will be used in the daily database management (5
Marks)
This is considered as key component, software is the main program which handle
every operation in the computer everything. It is used in storing ,keeping and updating the
data. The DBMS software, oracle and Microsoft word will all be used in the current situation.
§ Indicate the type of Distributed Database that will be implemented and give
reason for your choice. (10 Marks)
Distributed database is defined as database in where only some storage devices are
involved with the central processor. The distributed data may be kept in numerous computers,
situated in the same location; or distributed over a setup of interlocked computers. Dissimilar
from parallel network, where the processors are firmly coupled and create a single databank
system, a distributed database system is made up of lightly coupled sites which do not share
physical components.
System managers can allocate collections of information across numerous physical
locations. The distributed databank can exist in a systematized network servers or
regionalized independent computers, on company extranets or intranets, or on different
company networks. Because distributed databases store information across numerous
computers, the distributed databases can expand output at the mangers worksites by letting
transactions to be processed on various machines.
The homogeneous database, will be used in the current case because in the
homogeneous database, different sites stock database identically. Database management
system, operating system as well as the data configurations used are all similar sites.
Therefore, they are easy to handle. The system lower communication cost, since the
information can be positioned next to area of usage. This can by large cut communication
costs, likened to the common system (Hallinan, 2019).
§ Identify security tools that will be used in the daily database management (5
Marks)
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

DBMS 7
The Database Management System (DBMS) marketplace is dominated by IBM,
Oracle, and Microsoft, even though different open source databanks are gaining the share of
the market fast. The above mentioned databases are popular in numerous business, vital
usage and customer information .In every organization Security is vital, with growing
information breaches every day alongside developing set of information security and privacy
rules, guarding business delicate and regulated information is mission is important. Though,
identifying whether the database is firmly configured, who is able to access it, as well as
where delicate personal information exist is problematic for most business (GATIGNON,
2016).
The oracle software as come up with a strong defense with depth abilities, Oracle
Database Security Assessment Tool (DBSAT) assist in identifying areas where the
company’s database operation, configuration, or implementation presents hazards and
recommends modifications as well as controls to alleviate the identified
threats(Schofield,2012).
Oracle Audit Vault and Database Firewall (AVDF )
The Oracle Audit Vault and Database Firewall pools a network-based databank
firewall ability with audit gathering, warning and recording in appliance-based form factor.
Oracle Audit Vault and Database Firewall provides a wider range of operation. But Oracle
Audit Vault and Database Firewall plays well in regulated industries and in those business
sector which require extra security for client credit card information to address guidelines
such as the PCI-DSS. It is also a good software for the Oracle database clients, who also
handle different databases (Berlatsky, 2011).
§ Describe the data integration techniques that will be used (10 Marks)
Extract, Transform, and Load
The Database Management System (DBMS) marketplace is dominated by IBM,
Oracle, and Microsoft, even though different open source databanks are gaining the share of
the market fast. The above mentioned databases are popular in numerous business, vital
usage and customer information .In every organization Security is vital, with growing
information breaches every day alongside developing set of information security and privacy
rules, guarding business delicate and regulated information is mission is important. Though,
identifying whether the database is firmly configured, who is able to access it, as well as
where delicate personal information exist is problematic for most business (GATIGNON,
2016).
The oracle software as come up with a strong defense with depth abilities, Oracle
Database Security Assessment Tool (DBSAT) assist in identifying areas where the
company’s database operation, configuration, or implementation presents hazards and
recommends modifications as well as controls to alleviate the identified
threats(Schofield,2012).
Oracle Audit Vault and Database Firewall (AVDF )
The Oracle Audit Vault and Database Firewall pools a network-based databank
firewall ability with audit gathering, warning and recording in appliance-based form factor.
Oracle Audit Vault and Database Firewall provides a wider range of operation. But Oracle
Audit Vault and Database Firewall plays well in regulated industries and in those business
sector which require extra security for client credit card information to address guidelines
such as the PCI-DSS. It is also a good software for the Oracle database clients, who also
handle different databases (Berlatsky, 2011).
§ Describe the data integration techniques that will be used (10 Marks)
Extract, Transform, and Load
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

DBMS 8
The Extract, Transform, and Load technique can be preferred choice in the current
situation since it mines information from source systems, converts it to fulfill business needs,
and loads the outcomes into a required destination. The sources as well as targets are
generally files and databases, however they can also be diverse forms of data stocks such as
the message queue. Extract, Transform, and Load(ETL) techniques backs a consolidation line
in data integration (Yordanov, 2017).
Information can be mined in event-driven push mode or schedule-driven pull mode .
Both methods can take advantage of transformed information seizure. The pull mode
operation backs information consolidation ,however is usually prepared in bunch. The push
mode operation on the other hand is performed online by promulgating information
modifications to target information store. Information alteration may include data record
rearrangement and appeasement, information content cleansing, as well as information
content collection. The loading of Information may lead to a whole refresh of the target
information store or may be carried out by informing the target location. Interfaces applied
here include de facto standards such as , JMS, ODBC, JBDC, or application interfaces and
native database (Abiteboul, 2012).
§ Do you recommend a data warehouse for this organization? If yes, name the tools
and procedures. If no, explain your reasoning and give the type of data storage you
recommend (10 Marks)
Yes. Online storage offers the most convenient services which can allow the
organization to store data remotely and backup over the internet gives the company numerous
benefits (O'Neil, 2014). Though backing up the company’s most significant documentations
to a safe, remote server, the data manager will be able to protect the company’s most vital
data in a secrete platform (Arabnia, De la Fuente, Kozerenko, Olivas & Tinetti, 2018). The
online platforms such as cloud system can easily share bulky files with partners , clients and
different organization by offering them a password-protected entree to the online storage
The Extract, Transform, and Load technique can be preferred choice in the current
situation since it mines information from source systems, converts it to fulfill business needs,
and loads the outcomes into a required destination. The sources as well as targets are
generally files and databases, however they can also be diverse forms of data stocks such as
the message queue. Extract, Transform, and Load(ETL) techniques backs a consolidation line
in data integration (Yordanov, 2017).
Information can be mined in event-driven push mode or schedule-driven pull mode .
Both methods can take advantage of transformed information seizure. The pull mode
operation backs information consolidation ,however is usually prepared in bunch. The push
mode operation on the other hand is performed online by promulgating information
modifications to target information store. Information alteration may include data record
rearrangement and appeasement, information content cleansing, as well as information
content collection. The loading of Information may lead to a whole refresh of the target
information store or may be carried out by informing the target location. Interfaces applied
here include de facto standards such as , JMS, ODBC, JBDC, or application interfaces and
native database (Abiteboul, 2012).
§ Do you recommend a data warehouse for this organization? If yes, name the tools
and procedures. If no, explain your reasoning and give the type of data storage you
recommend (10 Marks)
Yes. Online storage offers the most convenient services which can allow the
organization to store data remotely and backup over the internet gives the company numerous
benefits (O'Neil, 2014). Though backing up the company’s most significant documentations
to a safe, remote server, the data manager will be able to protect the company’s most vital
data in a secrete platform (Arabnia, De la Fuente, Kozerenko, Olivas & Tinetti, 2018). The
online platforms such as cloud system can easily share bulky files with partners , clients and
different organization by offering them a password-protected entree to the online storage

DBMS 9
service, thus reducing the need to store large files in physical devices which may be accessed
easily. And in most circumstances, the data administer can log into their account from any
personal computer using a web browser and will be allowed to retrieve records when they are
away from their personal computer (Aberer, 2011). The remote storage specifically during
the initial backup session phase can be very slow, on the other hand: It is usually depend on
the speed of the network access . For very large files, one may have to capitalize on higher
speed network access (Aberer, 2011).
§ Define at least five (5) business rules that will be implemented by the
organization that will determine data access and data manipulation. (10 Marks)
1. Access to delicate and restricted is permitted by the organization’s chosen Data
Agents, whose roles and duties will be stipulated in the organization data rule
guidelines.
2. Data agents shall allow access to the data in agreement with the organization’s
Data Safety and Protection Rule and all applicable guidelines.
3. Data Agents shall allow access specifically to the affiliates, workers, and systems
which require the access to execute their missions and tasks duties have a genuine
need to know.
4. In situations where Data agent is not chosen, the information in question is held
by the CEO or head of department who creates or own the data.
5. The company’s head Maintain the Right to Allow All Access to vital credit card
number information (O'Neil, 2014).
6. Per the organization’s Data Classification Rule, credit card, bank account and
phone number are categorized as Restricted information. Thus, access to credit
service, thus reducing the need to store large files in physical devices which may be accessed
easily. And in most circumstances, the data administer can log into their account from any
personal computer using a web browser and will be allowed to retrieve records when they are
away from their personal computer (Aberer, 2011). The remote storage specifically during
the initial backup session phase can be very slow, on the other hand: It is usually depend on
the speed of the network access . For very large files, one may have to capitalize on higher
speed network access (Aberer, 2011).
§ Define at least five (5) business rules that will be implemented by the
organization that will determine data access and data manipulation. (10 Marks)
1. Access to delicate and restricted is permitted by the organization’s chosen Data
Agents, whose roles and duties will be stipulated in the organization data rule
guidelines.
2. Data agents shall allow access to the data in agreement with the organization’s
Data Safety and Protection Rule and all applicable guidelines.
3. Data Agents shall allow access specifically to the affiliates, workers, and systems
which require the access to execute their missions and tasks duties have a genuine
need to know.
4. In situations where Data agent is not chosen, the information in question is held
by the CEO or head of department who creates or own the data.
5. The company’s head Maintain the Right to Allow All Access to vital credit card
number information (O'Neil, 2014).
6. Per the organization’s Data Classification Rule, credit card, bank account and
phone number are categorized as Restricted information. Thus, access to credit
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

DBMS 10
card information shall not be granted unless approval has been offered by a the
company’s CEO (O'Neil, 2014).
§ Analyze the functions and services provided by the organization, and
determine if data partitioning would be ideal or not necessary. (5 Marks)
The credit union firms usually handle vital data such information credit car numbers
and bank account numbers which can create several challenges when managing. However the
big data challenges can be solved easily when it is sliced into numerous smaller sub-sections.
That is the work of partitioning . It splits a big databank holding data indexes and metrics
into handy and smaller slices of information known as partitions. The divided tables are
openly used by the SQL queries. Once the database is divided, data definition language can
easily operates on the reduced partitioned portions, instead of managing the big databank as a
whole. This is how data partitioning reduce the challenges in handling large databank tables
(Aberer, 2011).
The data partitioning key contains of a single or additional columns with a purpose of
defining the dividing wall wherever rows should be kept. Spark modifies dividing wall
through application of the partition keys. In various large-scale resolutions, information is
separated into panels which can be handled and accessed disjointedly. Partitioning can
enhance scalability, reduce contention, and optimize performance. It can also offer a
mechanism for apportioning information by the usage patter (O'Neil, 2014).
§ Analyze and determine if eight (8) months will be sufficient time to complete
the integration, if not suggest a more reasonable timetable. (10 Marks)
The project will takes approximately 8 months to be complete. The schedule will need
to approved and the later signed-off by functional managers and shareholders. This was to
card information shall not be granted unless approval has been offered by a the
company’s CEO (O'Neil, 2014).
§ Analyze the functions and services provided by the organization, and
determine if data partitioning would be ideal or not necessary. (5 Marks)
The credit union firms usually handle vital data such information credit car numbers
and bank account numbers which can create several challenges when managing. However the
big data challenges can be solved easily when it is sliced into numerous smaller sub-sections.
That is the work of partitioning . It splits a big databank holding data indexes and metrics
into handy and smaller slices of information known as partitions. The divided tables are
openly used by the SQL queries. Once the database is divided, data definition language can
easily operates on the reduced partitioned portions, instead of managing the big databank as a
whole. This is how data partitioning reduce the challenges in handling large databank tables
(Aberer, 2011).
The data partitioning key contains of a single or additional columns with a purpose of
defining the dividing wall wherever rows should be kept. Spark modifies dividing wall
through application of the partition keys. In various large-scale resolutions, information is
separated into panels which can be handled and accessed disjointedly. Partitioning can
enhance scalability, reduce contention, and optimize performance. It can also offer a
mechanism for apportioning information by the usage patter (O'Neil, 2014).
§ Analyze and determine if eight (8) months will be sufficient time to complete
the integration, if not suggest a more reasonable timetable. (10 Marks)
The project will takes approximately 8 months to be complete. The schedule will need
to approved and the later signed-off by functional managers and shareholders. This was to
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

DBMS 11
make sure they have the aforementioned people have gone through the schedule, apprehend,
identified the resources commitments and dates , in order for them to cooperate in the
whole process. The change team will also need to get confirmation that assets are available as
defined in the plan. The plan cannot be confirmed until the change team receive endorsement
as well as commitment for the assign assignments defined in it. As soon as the timetable is
accepted, this will become the change team baseline for the rest of the plan. Project progress
and assignment achievement will be checked and traced against the plan timetable to see if
the assignment is on course as prearranged.
§ Be creative; give your firm a name, sell your service. (10 Marks)
Databank is very important in every organization since it stored vital information
which defines the organization operations. However with advancement in technology
numerous data problems have gone up this is due to the unending data breaches which occur
daily basis across different organizations across the world. Getting dependable outcomes
from data-driven system needs an in-depth installation, planning, and proper management.
The organization need to ensure that the databank is installed properly, the management team
needs to pick a database company which offers an excellent service.
Homogeneous database team of expert company can be the answer to your
database problems. Our company which is composed of data experts deeply understands
every angle of data services which includes planning, installation, testing, project
management, training as well as implementation. The team of experts start by listening
closely to the company current situation and collecting a comprehensive wants-and-needs
profile.
make sure they have the aforementioned people have gone through the schedule, apprehend,
identified the resources commitments and dates , in order for them to cooperate in the
whole process. The change team will also need to get confirmation that assets are available as
defined in the plan. The plan cannot be confirmed until the change team receive endorsement
as well as commitment for the assign assignments defined in it. As soon as the timetable is
accepted, this will become the change team baseline for the rest of the plan. Project progress
and assignment achievement will be checked and traced against the plan timetable to see if
the assignment is on course as prearranged.
§ Be creative; give your firm a name, sell your service. (10 Marks)
Databank is very important in every organization since it stored vital information
which defines the organization operations. However with advancement in technology
numerous data problems have gone up this is due to the unending data breaches which occur
daily basis across different organizations across the world. Getting dependable outcomes
from data-driven system needs an in-depth installation, planning, and proper management.
The organization need to ensure that the databank is installed properly, the management team
needs to pick a database company which offers an excellent service.
Homogeneous database team of expert company can be the answer to your
database problems. Our company which is composed of data experts deeply understands
every angle of data services which includes planning, installation, testing, project
management, training as well as implementation. The team of experts start by listening
closely to the company current situation and collecting a comprehensive wants-and-needs
profile.

DBMS 12
References
Aberer, K. (2011). Peer-to-peer data management. [San Rafael, Calif.]: Morgan &
Claypool Publishers.
Abiteboul, S. (2012). Web data management. New York: Cambridge University
Press.
Arabnia, H., De la Fuente, D., Kozerenko, E., Olivas, J., & Tinetti, F. (2018).
Artificial Intelligence. Bloomfield: C.S.R.E.A.
Berlatsky, N. (2011). Artificial intelligence. Detroit: Greenhaven Press.
GATIGNON, H. (2016). STATISTICAL ANALYSIS OF MANAGEMENT DATA.
[Place of publication not identified]: SPRINGER-VERLAG NEW YORK.
Halder, Raju; Cortesi, Agostino (2011). "Abstract Interpretation of Database Query
Languages" (PDF). Computer Languages, Systems & Structures. 38 (2): 123–157.
doi:10.1016/j.cl.2011.10.004. ISSN 1477-8424.
Hallinan, D. (2019). Opinions ∙ Data Protection without Data: Could Data Protection
Law Apply without Personal Data Being Processed?. European Data Protection Law Review,
5(3), 293-299. doi: 10.21552/edpl/2019/3/5
MacKinnon, L. (2012). Data security and security data. Berlin: Springer.
O'Neil, P. (2014). Database. Elsevier Science.
Schofield P, Sutton G, Van Auken K, Vasudevan S, Wu C, Young J, Mazumder R
(2012). "Recent advances in biocuration: meeting report from the Fifth International
Biocuration Conference". Database (Oxford). 2012: bas036. doi:10.1093/database/bas036.
PMC 3483532. PMID 23110974.
Reitman, rainey (2012). "Deep Dive: Updating the Electronic Communications
Privacy Act". Electronic Frontier Foundation. Retrieved 2019-12-21.
References
Aberer, K. (2011). Peer-to-peer data management. [San Rafael, Calif.]: Morgan &
Claypool Publishers.
Abiteboul, S. (2012). Web data management. New York: Cambridge University
Press.
Arabnia, H., De la Fuente, D., Kozerenko, E., Olivas, J., & Tinetti, F. (2018).
Artificial Intelligence. Bloomfield: C.S.R.E.A.
Berlatsky, N. (2011). Artificial intelligence. Detroit: Greenhaven Press.
GATIGNON, H. (2016). STATISTICAL ANALYSIS OF MANAGEMENT DATA.
[Place of publication not identified]: SPRINGER-VERLAG NEW YORK.
Halder, Raju; Cortesi, Agostino (2011). "Abstract Interpretation of Database Query
Languages" (PDF). Computer Languages, Systems & Structures. 38 (2): 123–157.
doi:10.1016/j.cl.2011.10.004. ISSN 1477-8424.
Hallinan, D. (2019). Opinions ∙ Data Protection without Data: Could Data Protection
Law Apply without Personal Data Being Processed?. European Data Protection Law Review,
5(3), 293-299. doi: 10.21552/edpl/2019/3/5
MacKinnon, L. (2012). Data security and security data. Berlin: Springer.
O'Neil, P. (2014). Database. Elsevier Science.
Schofield P, Sutton G, Van Auken K, Vasudevan S, Wu C, Young J, Mazumder R
(2012). "Recent advances in biocuration: meeting report from the Fifth International
Biocuration Conference". Database (Oxford). 2012: bas036. doi:10.1093/database/bas036.
PMC 3483532. PMID 23110974.
Reitman, rainey (2012). "Deep Dive: Updating the Electronic Communications
Privacy Act". Electronic Frontier Foundation. Retrieved 2019-12-21.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





