Employee Database Report - ACCT6001 Module - Semester 1

Verified

Added on  2021/06/17

|5
|590
|431
Report
AI Summary
The report focuses on the design and implementation of an Employee Database, starting with an overview of its importance and the limitations of file systems compared to relational database management systems (RDBMS). It highlights the use of an Entity-Relationship (ER) diagram and its conversion to a relational database, specifically using Microsoft Access. The report covers essential IT controls, including backup/recovery, performance optimization, integrity, security, and user access control, emphasizing their importance for data protection. Furthermore, it addresses ethical, privacy, and security issues, such as administrator rights, data protection measures, and customer data confidentiality. References to relevant resources are provided, offering a comprehensive view of database design, implementation, and security considerations.
Document Page
Student ID –
Date -
ACCT6001 Accounting Information Systems
Database Application
Module Tutor -
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Report
Introduction
Complete report is being showing the database design and implementation of the Employee
database. ER diagram is representing all relations in the database.
The ER diagram will be converted to relational database system and will be implemented in the
Microsoft Access database. Microsoft Access database is very useful relational database system
in which all database queries, database reports etc. can be built.
Use of Database
The Employee database is very important, crucial and very big. To save the complete database
into the file system is very difficult to manage as there is no separate table for specific data, no
queries, no reports etc.
But the relational database management system helps in maintaining the complete database very
easily. It manages the data in the tabular form. The relational database management system
provides the features to use queries, reports etc. It helps in searching the database in a very less
time.
File system has so many limitations as mentioned below. That is why; the relational database
management system is most used and much better technique-
- No option of searching data
- No option to make queries and reports
- Very time consuming
- Difficult to maintain access control
Document Page
ER Diagram
( TechTarget. 2016)
(Guru99. 2016)
Document Page
IT Controls
IT controls are very important part of every database management system. some of them are as
follows-
- Backup/Recovery techniques
- Database performance techniques
- Integrity
- Security
- Database authorization
- User access control
IT controls are very important for the security point of view of the database. Database
authorization database integrity etc. all is very important techniques in maintaining the database
very smartly.
Ethical, Privacy and Security Issues
Ethical Issues
There are lot of ethical, privacy and security concerns in the companies. Ethical issues are very
concerned in every organization but sometimes those ethical issues have to be applied to secure
the database-
- The administrator has right to check the emails of the users to secure the company’s
important data.
- The administrator has right to check the user’s system to secure the company’s important
data.
- The administrator can use the key loggers to ensure the typing text of the users.
Security and Privacy
There are so many security standards that can be applied by the administrator to secure the
company’s information-
- Limit the features at user’s account or machine
- Do not give access on important data to all users
- Secure Copyright information
- Protect customer’s data by encrypting technique
- Do not share the customer’s detail to anyone outside the company
- Do not share the share holder’s detail to anyone outside the company
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
- Apply antivirus system on every machine
All the above secure and privacy techniques should eb applied on the database to secure the
company’s information. These are the basic techniques that can be applied very easily without
spending lot of money.
References
TechTarget. (2016), entity relationship diagram [online]. Available from:
http://searchcrm.techtarget.com/definition/entity-relationship-diagram / [Accessed 1 May
2018].
Guru99. (2016). Learn Database Normalization with the help of a case study [online]. Available
from:
http://www.guru99.com/database-normalization.html / [Accessed 1 May 2018].
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]