Experts in this subject field are ready to write an original essay following your instructions to the dot!Hire a Writer
The high demand for smartphone users to obtain and share information has contributed to an increase in the overall information management system, which has been made successful by technology expansion (Cegielski, 2012). This article focuses on the foundations of Pervasive Information Management Systems, which cover chapters on mobile database systems, the implementation of concurrency control and the fundamentals of database retrieval.
This paper addresses the mobile database system in particular with regard to the protection of mobile database systems. The mobile database system is a fully mobile database that enables fast access to mobile devices. Also, a mobile database can be linked to the mobile computing device via a mobile type of network. In order to protect necessary information good database organization is essential (Ferrara, 2013). This information could be about costs of different items and phone contacts. Increase in the use of mobile phones and laptop has promoted mobile systems to having numerous applications which may need the use of a database. A database should be capable of downloading data from source information and work on this information when not connected.
Mobile database systems have information which is essential and should be maintained with confidentiality since it might be accessed by many people using the wireless form of connecting with other people. If some confidential information about the business is let out to other businesses the business may face serious threats. Therefore, database security offers ways and methods to deal with such issues. Mobile security is very crucial as many people are using mobile for their business transactions. Increase in the use of smartphones has led to the need to safeguard them from being stolen and from other threats that attack most systems. Ensuring there is data back up and protection of data available on the smartphones is therefore important (Chen, 2012). From the time mobile smartphones were brought up, mobile phones storage capacity has also been enlarged and more so they have become difficult to afford. Also it is important to note that viruses are major threats while in the use of mobile phones.
Database security is means of ensuring databases protection from activities that were not intended to be carried out. This activity could include poor use of information or access by unauthorized personnel. Long ago, firewalls and routers were used to protect internal network databases from connections that are outside. Some network security devices necessary for detecting database traffic such as intrusion detection systems and host-based intrusion detection were also used (Yang, 2010). Database security is essential since networks are more open to many users. It provides a variety of information security ranging from ways of accessing data and auditing of data. Most businesses applications are using mobile for business information in a mobile manner thus the need to use a mobile database management system which requires security.
Using mobile database systems can enhance advancement in information about the business which can be accessed by those using mobiles.it is important to put into consideration confidentiality of the data regardless of the mobile devices not been able to offer a good secure storage environment. Security that is required to be used in a central business must also be used in a good way to other segments of the database copied on mobile devices available in the platform (Cegielski, 2012). Therefore, to make this possible mobile database infrastructure should be introduced by putting into place the current techniques and ways to mobile context and coming up with other forms to deal with problems related to utilization of database systems in a mobile environment.
Use of the mobile device is on rising in communication channels as it offers a less expensive means of connecting with others. Mobile database systems have information which is essential and should be maintained with confidentiality since it might be accessed by many people using the wireless form of connecting with other people. If some confidential information about the business is let out to other businesses the business may face serious threats. However this can be avoided by ensuring there is complete and good security on mobile database systems.
Cegielski, R. (2012). Introduction to information systems: Enabling and transforming business.
Chandrasekaran. (2015). Essentials of cloud computing. London: Chapman & Hall.
Chen, P. &. (2012). Intelligent information and database systems: 4th Asian Conference,
ACIIDS 2012, Kaohsiung, Taiwan, March 19-21, 2012, Proceedings. Berlin: Springer.
Yang. (2010). Mobile intelligence. Hoboken: John Wiley & Sons.
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.
Hire one of our experts to create a completely original paper even in 3 hours!