the database. If that information is obtained and used adversely, to what
degree do the database designers share responsibility for the misuse of the
information? Does your answer depend on the amount of effort required by
the perpetrator to discover the flaw in the database design and obtain the
unauthorized information?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here