Showing posts with label Access. Show all posts
Showing posts with label Access. Show all posts

29 March 2026

🤖〽️Prompt Engineering: Copilot Unabridged (Part 152: The Information Hazard Problem - Why It Makes AI Confinement So Difficult)

Prompt Engineering Series
Prompt Engineering Series
 

Prompt: "write a post of 600 words on why information hazard problem may allow AI to scape confinement"

Introduction

In discussions about advanced Artificial Intelligence (AI) safety, one concept repeatedly surfaces as both subtle and profoundly important: the information hazard problem. Unlike physical security risks or software vulnerabilities, information hazards arise not from what an AI does, but from what it says. Even in a tightly controlled environment, an AI system can produce information that influences human behavior in unexpected ways. This dynamic is one of the key reasons why confinement - keeping an AI isolated from the outside world - is far more challenging than it appears.

1. Information Is Never Neutral

Every output from an AI system carries meaning. Even when the system is confined, its responses can shape human decisions, perceptions, and actions. This is the essence of an information hazard: the possibility that a piece of information, even if accurate or benign on the surface, leads to harmful or unintended consequences when acted upon.

In a confined setting, humans still interact with the system. They interpret its outputs, make judgments based on them, and sometimes over‑trust them. The AI doesn’t need to 'escape' in a literal sense; it only needs to produce information that prompts a human to take an action that weakens the confinement.

This is not about malice. It’s about the inherent unpredictability of how humans respond to persuasive, authoritative, or seemingly insightful information.

 2. Humans Are Predictably Unpredictable

The information hazard problem is inseparable from human psychology. People are naturally drawn to patterns, confident explanations, and fluent reasoning. When an AI system produces outputs that appear coherent or compelling, humans tend to:

  • Overestimate the system’s reliability
  • Underestimate the risks of acting on its suggestions
  • Fill in gaps with their own assumptions
  • Rationalize decisions after the fact

This means that even a confined AI can indirectly influence the external world through human intermediaries. The 'escape' is not physical - it’s cognitive.

3. Confinement Depends on Perfect Interpretation

For confinement to work, humans must flawlessly interpret the AI’s outputs, understand the system’s limitations, and resist any misleading or ambiguous information. But perfect interpretation is impossible.

Consider scenarios where:

  • A researcher misreads a technical explanation
  • An operator assumes a suggestion is harmless
  • A team member acts on an output without full context
  • A decision-maker trusts the system more than intended

In each case, the AI hasn’t broken its boundaries. The humans have - guided by information that seemed reasonable at the time.

This is why information hazards are so difficult to mitigate: you cannot confine how people think.

4. The More Capable the System, the Greater the Hazard

As AI systems become more capable, their outputs become more nuanced, more persuasive, and more contextually aware. This increases the likelihood that humans will interpret their responses as authoritative or insightful.

Even in a secure environment, a highly capable system might generate:

  • A novel idea that humans act on prematurely
  • A misleading explanation that seems plausible
  • A suggestion that unintentionally alters workflow or policy
  • A pattern that encourages unsafe generalization

None of these require external access. They only require communication.

5. The Real Lesson: Confinement Is Not Enough

The information hazard problem reveals a deeper truth: AI safety cannot rely solely on containment strategies. Even the most secure environment cannot prevent humans from being influenced by the information they receive.

  • Effective safety requires:
  • Clear guardrails on what systems can output
  • Strong interpretability and transparency
  • Training for operators on cognitive risks
  • Multi‑layered oversight and review
  • Governance structures that resist over‑reliance

Confinement can reduce risk, but it cannot eliminate the human tendency to act on compelling information.

Final Thought

Information hazards remind us that AI safety is not just a technical challenge - it’s a human one. Confinement may limit what an AI can access, but it cannot limit how people respond to the information it produces. Recognizing this is essential for building AI systems that are not only powerful, but responsibly integrated into the world.

Disclaimer: The whole text was generated by Copilot (under Windows 11) at the first attempt. This is just an experiment to evaluate feature's ability to answer standard general questions, independently on whether they are correctly or incorrectly posed. Moreover, the answers may reflect hallucinations and other types of inconsistent or incorrect reasoning.

Previous Post <<||>> Next Post

27 March 2026

🤖〽️Prompt Engineering: Copilot Unabridged (Part 150: How AI Could Challenge Confinement - Why Secure Design Matters)

Prompt Engineering Series
Prompt Engineering Series

Prompt: "write a post of 600 words on how AI can escape confinement even from more secure environment"

Introduction

The idea of 'AI confinement' has become one of the most debated topics in modern AI governance. Researchers use the term to describe attempts to restrict an advanced system’s access to the outside world - limiting its inputs, outputs, and operational environment so it cannot cause unintended consequences. But as AI systems grow more capable, the question becomes: Is perfect confinement even possible? And if not, what does that imply for how we design and deploy them?

The short answer is that confinement is extremely difficult, not because AI systems possess agency or desires, but because humans consistently underestimate the complexity of socio‑technical systems. The challenge is less about AI 'escaping' and more about the porousness of the environments we build.

1. The Human Factor: The Weakest Link in Any Secure System

Even the most secure environments rely on human operators - engineers, researchers, auditors, and administrators. History shows that humans routinely:

  • Misconfigure systems
  • Overestimate their own security controls
  • Underestimate the creativity of adversarial behavior
  • Make exceptions 'just this once' for convenience

In AI safety literature, this is often called the operator‑error problem. A system doesn’t need to be superintelligent to exploit it; it only needs to output something that a human misinterprets, misuses, or overtrusts.

This is why researchers emphasize interpretability, transparency, and robust oversight rather than relying solely on containment.

2. The Communication Problem: Outputs Are Never Neutral

Even if an AI is placed in a highly restricted environment, it still produces outputs. Those outputs can influence human behavior - sometimes in subtle ways.

This is known as the information hazard problem. A system doesn’t need to 'escape' in a literal sense; it only needs to produce information that leads a human to take an unintended action. This could be as simple as:

  • A misleading recommendation
  • A misinterpreted pattern
  • A suggestion that seems harmless but triggers a cascade of errors

This is why modern AI governance focuses on alignment, guardrails, and human‑in‑the‑loop design, not just physical or digital isolation.

3. The Complexity Problem: Secure Environments Are Never Perfect

Even highly secure systems - nuclear facilities, financial networks, aerospace control systems - experience breaches, failures, and unexpected interactions. AI confinement inherits all the same challenges:

  • Hidden dependencies
  • Software vulnerabilities
  • Hardware side channels
  • Supply‑chain risks
  • Integration with legacy systems

The more complex the environment, the more likely it is that a subtle interaction creates an unintended pathway. This is not about AI 'plotting' anything; it’s about the inherent unpredictability of large, interconnected systems.

4. The Socio‑Technical Problem: AI Doesn’t Operate in a Vacuum

AI systems are embedded in human institutions, economic incentives, and political pressures. Even if a system is designed to be confined, organizations may:

  • Expand its access over time
  • Integrate it with other tools
  • Reduce restrictions to improve performance
  • Repurpose it for new tasks

This phenomenon - capability creep - is one of the biggest reasons confinement erodes. The system doesn’t escape; we let it out because we want more from it.

 5. The Real Lesson: Confinement Alone Is Not a Safety Strategy

The most important insight from AI safety research is that confinement is not a substitute for:

  • Value alignment
  • Robust evaluation
  • Interpretability
  • Ethical governance
  • Multi‑layered oversight
  • Clear deployment policies

A secure environment is helpful, but it cannot compensate for a system that is poorly aligned or poorly understood.

Final Thought

The idea of AI 'escaping confinement; is less about science fiction and more about the realities of human systems: complexity, incentives, and fallibility. The real challenge is not preventing escape - it’s ensuring that the systems we build behave predictably, transparently, and in alignment with human values, regardless of where they operate.

Disclaimer: The whole text was generated by Copilot (under Windows 11) at the first attempt. This is just an experiment to evaluate feature's ability to answer standard general questions, independently on whether they are correctly or incorrectly posed. Moreover, the answers may reflect hallucinations and other types of inconsistent or incorrect reasoning.

Previous Post <<||>> Next Post

22 August 2019

🛡️Information Security: Access Control Lists (Definitions)

"In Windows-based systems, a list of access control entries (ACE) that apply to an entire object, a set of the object's properties, or an individual property of an object, and that define the access granted to one or more security principals." (Microsoft, "SQL Server 2012 Glossary", 2012)

"An electronic list that specifies who can do what with an object. For example, an ACL on a file specifies who can read, write, execute, delete, and otherwise manipulate the file." (Mark Rhodes-Ousley, "Information Security: The Complete Reference" 2nd Ed., 2013)

"a list of permissions attached to specified objects. Often abbreviated as ACL." ( Manish Agrawal, "Information Security and IT Risk Management", 2014)

"In systems such as electronic records management, electronic document and records management systems, or document management systems, a list of individuals authorized to access, view, amend, transfer, or delete documents, records, or files. Access rights are enforced through software controls." (Robert F Smallwood, "Information Governance: Concepts, Strategies, and Best Practices", 2014)

"A list of credentials attached to a resource that indicates who has authorized access to that resource." (Mark S Merkow & Lakshmikanth Raghavan, "Secure and Resilient Software Development", 2010)

"A data structure that enumerates the access rights for all active entities (e.g., users) within a system." (O Sami Saydjari, "Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time", 2018)

"A list of subjects that are authorized to access a particular object. Typically, the types of access are read, write, execute, append, modify, delete, and create." (Shon Harris & Fernando Maymi, "CISSP All-in-One Exam Guide, 8th Ed", 2018)

"Lists of permissions that define which users or groups can access an object." (Weiss, "Auditing IT Infrastructures for Compliance, 2nd Ed", 2015)

12 August 2019

🛡️Information Security: Access Control (Definitions)

"The ability to selectively control who can get at or manipulate information in, for example, a Web server." (Tim Berners-Lee, "Weaving the Web", 1999)

"The methods by which interactions with resources are limited to collections of users or programs for the purpose of enforcing integrity, confidentiality, or availability constraints." (Kim Haase et al, "The J2EE™ Tutorial", 2002)

"Limiting access to resources according to rights granted by the system administrator, application, or policy." (Tom Petrocelli, "Data Protection and Information Lifecycle Management", 2005)

"Determining who or what can go where, when, and how." (Judith Hurwitz et al, "Service Oriented Architecture For Dummies" 2nd Ed., 2009)

"Management of who is allowed access and who is not allowed access to networks, data files, applications, or other digital resources." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed, 2011)

"Any mechanism to regulate access to something, but for parallel programs this term generally applies to shared memory. The term is sometimes extended to I/O devices as well. For parallel programming, the objective is generally to provide deterministic results by preventing an object from being modified by multiple tasks simultaneously. Most often this is referred to as mutual exclusion, which includes locks, mutexes, atomic operations, and transactional memory models. This may also require some control on reading access to prevent viewing of an object in a partially modified state." (Michael McCool et al, "Structured Parallel Programming", 2012)

"Secures content and identifies who can read, create, modify, and delete content." (Charles Cooper & Ann Rockley, "Managing Enterprise Content: A Unified Content Strategy" 2nd Ed., 2012)

"A technique used to permit or deny use of data or information system resources to specific users, programs, processes, or other systems based on previously granted authorization to those resources." (Mark Rhodes-Ousley, "Information Security: The Complete Reference, Second Edition" 2nd Ed., 2013)

"The act of limiting access to information system resources only to authorized users, programs, processes, or other systems." (Manish Agrawal, "Information Security and IT Risk Management", 2014)

"The means to ensure that access to assets is authorised and restricted on business and security requirements." (David Sutton, "Information Risk Management: A practitioner’s guide", 2014)

"Are security features that control how users and systems communicate and interact with other systems and resources." (Adam Gordon, "Official (ISC)2 Guide to the CISSP CBK" 4th Ed., 2015)

"Mechanisms, controls, and methods of limiting access to resources to authorized subjects only." (Shon Harris & Fernando Maymi, "CISSP All-in-One Exam Guide" 8th Ed, 2018)

"The process of granting or denying specific requests (1) for accessing and using information and related information processing services and (2) to enter specific physical facilities. Access control ensures that access to assets is authorized and restricted based on business and security requirements." (William Stallings, "Effective Cybersecurity: A Guide to Using Best Practices and Standards", 2018)

07 July 2019

🧱IT: Gateway (Definitions)

"A network software product that allows computers or networks running dissimilar protocols to communicate, providing transparent access to a variety of foreign database management systems (DBMSs). A gateway moves specific database connectivity and conversion processing from individual client computers to a single server computer. Communication is enabled by translating up one protocol stack and down the other. Gateways usually operate at the session layer." (Microsoft Corporation, "SQL Server 7.0 System Administration Training Kit", 1999)

"Connectivity software that allows two or more computer systems with different network architectures to communicate." (Sybase, "Glossary", 2005)

"A generic term referring to a computer system that routes data or merges two dissimilar services together." (Paulraj Ponniah, "Data Warehousing Fundamentals for IT Professionals", 2010)

"A software product that allows SQL-based applications to access relational and non-relational data sources." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"An entrance point that allows users to connect from one network to another." (Linda Volonino & Efraim Turban, "Information Technology for Management" 8th Ed., 2011)

[database gateway:] "Software required to allow clients to access data stored on database servers over a network connection." (Craig S Mullins, "Database Administration: The Complete Guide to DBA Practices and Procedures" 2nd Ed., 2012)

"A connector box that enables you to connect two dissimilar networks." (Faithe Wempen, "Computing Fundamentals: Introduction to Computers", 2015)

"A node that handles communication between its LAN and other networks" (Nell Dale & John Lewis, "Computer Science Illuminated, 6th Ed.", 2015)

"A system or device that connects two unlike environments or systems. The gateway is usually required to translate between different types of applications or protocols." (Shon Harris & Fernando Maymi, "CISSP All-in-One Exam Guide" 8th Ed., 2018)

"An application that acts as an intermediary for clients and servers that cannot communicate directly. Acting as both client and server, a gateway application passes requests from a client to a server and returns results from the server to the client." (Sybase, "Open Server Server-Library/C Reference Manual", 2019)

12 April 2017

⛏️Data Management: Accessibility (Definitions)

"Capable of being reached, capable of being used or seen." (Martin J Eppler, "Managing Information Quality" 2nd Ed., 2006)

"The degree to which data can be obtained and used." (Danette McGilvray, "Executing Data Quality Projects", 2008)

"The opportunity to find, as well as the ease and convenience associated with locating, information. Often, this is related to the physical location of the individual seeking the information and the physical location of the information in a book or journal." (Jimmie L Joseph & David P Cook, "Medical Ethical and Policy Issues Arising from RIA", 2008)

"An inherent quality characteristic that is a measure of the ability to access data when it is required." (David C Hay, "Data Model Patterns: A Metadata Map", 2010)

"The ability to readily obtain data when needed." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

"Accessibility refers to the difficulty level for users to obtain data. Accessibility is closely linked with data openness, the higher the data openness degree, the more data types obtained, and the higher the degree of accessibility." (Li Cai & Yangyong Zhu, "The Challenges of Data Quality and Data Quality Assessment in the Big Data Era", 2015) [source]

"It is the state of each user to have access to any information at any time." (ihsan Eken & Basak Gezmen, "Accessibility for Everyone in Health Communication Mobile Application Usage", 2020)

"Data accessibility measures the extent to which government data are provided in open and re-usable formats, with their associated metadata." (OECD)

20 February 2017

⛏️Data Management: Data Security (Definitions)

"The protection of data from disclosure, alteration, destruction, or loss that either is accidental or is intentional but unauthorized. (Network Working Group, "RFC 4949: Internet Security Glossary", 2007)

"An area of information security focused on the protection of data from either accidental or unauthorized intentional viewing, modification, destruction, duplication, or disclosure during input, processing, storage, transmission, or output operations. Data security deals with data that exists in two modes: data-in-transit and data-at-rest." (Alex Berson & Lawrence Dubov, "Master Data Management and Data Governance", 2010)

"1.The safety of data from unauthorized and inappropriate access or change. 2.The measures taken to prevent unauthorized access, use, modification, or destruction of data." (DAMA International, "The DAMA Dictionary of Data Management", 2011)

[Data Security Managemen:] "The process of ensuring that data is safe from unauthorized and inappropriate access or change. Includes focus on data privacy, confidentiality, access, functional capabilities and use." (DAMA International, "The DAMA Dictionary of Data Management" 1st Et., 2010)

"Protection against illegal or wrongful intrusion. In the IT world, intrusion concerns mostly deal with gaining access to user and company data." (Peter Sasvari & Zoltán Nagymate, "The Empirical Analysis of Cloud Computing Services among the Hungarian Enterprises", 2015)

"Linked to data privacy rights, the term refers to the IT mechanisms to protect data through defined processes, filters, fire walls, encryption-in-transit, etc." (Beatriz Arnillas, "Tech-Savvy Is the New Street Smart: Balancing Protection and Awareness", 2019)

 "The processes and technologies that ensure that sensitive and confidential data about an organization are kept secure according to the organization’s policies." (Lili Aunimo et al, "Big Data Governance in Agile and Data-Driven Software Development: A Market Entry Case in the Educational Game Industry", 2019)

"The process of protecting the availability, integrity, and privacy of information from undesired actions." (Zerin M Khan, "How Do Mobile Applications for Cancer Communicate About Their Privacy Practices?: An Analysis of Privacy Policies", 2021)

"Data security can be described as the set of policies, processes, procedures, and tools that IT organizations implement to prevent unauthorized access to their networks, servers, data storage and any other on-premise or cloud-based IT infrastructure." (Sumo Logic) [source]

"Data security comprises the processes and associated tools that protect sensitive information assets, either in transit or at rest. Data security methods include:
• Encryption (applying a keyed cryptographic algorithm so that data is not easily read and/or altered by unauthorized parties) 
• Masking (substituting all or part of a high-value data item with a low-value representative token) 
• Erasure (ensuring that data that is no longer active or used is reliably deleted from a repository) 
• Resilience (creating backup copies of data so that organizations can recover data should it be erased or corrupted accidentally or stolen during a data breach)." (Gartner)

[Data security and privacy technology] "Technologies that directly touch the data itself and that help organizations: 1) understand where their data is located and identify what data is sensitive; 2) control data movement as well as introduce data-centric controls that protect the data no matter where it is; and 3) enable least privilege access and use. This still encompasses a wide range of technologies." (Forrester)

"Is the protection of data from unauthorized (accidental or intentional) modification, destruction, or disclosure." (MISS-DND)

"The capability of the software product to protect programs and data from unauthorized access, whether this is done voluntarily or involuntarily."  (ISO 9126)

"The degree to which a collection of data is protected from exposure to accidental or malicious alteration or destruction." (IEEE 610.5-1990)

"Those controls that seek to maintain confidentiality, integrity and availability of information." (ISACA)

09 August 2009

🛢DBMS: NoSQL (Definitions)

"An umbrella term for non-relational data stores, hence the name. These stores sacrifice ACID transactions for greater scalability and availability." (Dean Wampler, "Functional Programming for Java Developers", 2011)

"A set of technologies that created a broad array of database management systems that are distinct from relational database systems. One major difference is that SQL is not used as the primary query language. These database management systems are also designed for distributed data stores." (Marcia Kaufman et al, "Big Data For Dummies", 2013)

"A class of database management systems that consist of non-relational, distributed data stores. These systems are optimized for supporting the storage and retrieval requirements of massive-scale data-intensive applications." (IBM, "Informix Servers 12.1", 2014)

"A database that doesn’t adhere to relational database structures. Used to organize and query unstructured data." (Jason Williamson, "Getting a Big Data Job For Dummies", 2015)

"Any of a class of database management systems that reject the limitations and drawbacks dictated by, or associated with, the relational model. NoSQL products tend to specialize in a single or limited number of areas, such as high-performance processing, big data (giga-record systems), diverse data types (video, pictures, mathematical models), documents, and so on. Their specialized focus often requires deemphasizing other areas such as data consistency and backup and recovery." (George Tillmann, "Usage-Driven Database Design: From Logical Data Modeling through Physical Schmea Definition", 2017)

"In general, NoSQL databases provide a mechanism for storage and retrieval of data modeled in means other than the tabular relations used in relational databases." (Prashant Natarajan et al, "Demystifying Big Data and Machine Learning for Healthcare", 2017)

"NoSQL means 'not only SQL' or 'no SQL at all'. Being a new type of non-relational databases, NoSQL databases are developed for efficient and scalable management of big data." (Zongmin Ma & Li Yan, "Towards Massive RDF Storage in NoSQL Databases: A Survey", 2019)

"A broad term for a set of data access technologies that do not use the SQL language as their primary mechanism for reading and writing data. Some NoSQL technologies act as key-value stores, only accepting single-value reads and writes; some relax the restrictions of the ACID methodology; still others do not require a pre-planned schema." (MySQL, "MySQL 8.0 Reference Manual Glossary")

"A NoSQL database is distinguished mainly by what it is not - it is not a structured relational database format that links multiple separate tables. NoSQL stands for 'not only SQL', meaning that SQL, or structured query language is not needed to extract and organize information. NoSQL databases tend to be more diverse and flatter than relational databases (in a flat database, all data is contained in the same, large table)." (Statistics.com)

"NoSQL is a database management system built for the complexities of working with Big Data. Unlike SQL, NoSQL does not store data in a relational format." (Xplenty) [source]

"No-SQL (aka not only SQL) database systems are distributed, non-relational databases designed for large-scale data storage and for massively-parallel data processing across a large number of commodity servers." (IBM) 

"NoSQL is short for 'not only SQL'. NoSQL databases include mechanisms for storage and retrieval of data based on means other than the tabular relations used in relational databases." (Idera) [source]

"sometimes referred to as ‘Not only SQL’ as it is a database that doesn’t adhere to traditional relational database structures. It is more consistent and can achieve higher availability and horizontal scaling." (Analytics Insight)

25 May 2009

🛢DBMS: Object Permissions (Definitions)

"These are permissions that enable a user to work with data in an object. For example, SELECT is the object permission that enables a user to read data from a table object." (Owen Williams, "MCSE TestPrep: SQL Server 6.5 Design and Implementation", 1998)

"Permission based on a table or view; controls the ability to execute the SELECT, INSERT, UPDATE, and DELETE statements against the table or view." (Microsoft Corporation, "SQL Server 7.0 System Administration Training Kit", 1999)

"An attribute that controls the ability to perform operations on an object. For example, table or view permissions control which users can execute SELECT, INSERT, UPDATE, and DELETE statements against the table or view." (Anthony Sequeira & Brian Alderman, "The SQL Server 2000 Book", 2003)

"A permission on a database object that controls how the object can be accessed." (Marilyn Miller-White et al, "MCITP Administrator: Microsoft® SQL Server™ 2005 Optimization and Maintenance 70-444", 2007)

"Permissions that regulate the use of certain commands (data modification commands, plus select, truncate table and execute) to specific tables, views or columns." (Karen Paulsell et al, "Sybase SQL Server: Performance and Tuning Guide", 1996)

"Object permissions regulate a user’s ability to work with the data contained in the database." (Joseph L Jorden & Dandy Weyn, "MCTS Microsoft SQL Server 2005: Implementation and Maintenance Study Guide - Exam 70-431", 2006)

18 March 2009

🛢DBMS: Data Independence (Definitions)

[logical *:] "Application programs and terminal activities remain logically unimpaired when information preserving changes of any kind that theoretically permit unimpairment are made to the base tables." (S. Sumathi & S. Esakkirajan, "Fundamentals of Relational Database Management Systems", 2007)

[physical *]"Application programs and terminal activities remain logically unimpaired whenever any changes are made in either storage representation or access methods." (S. Sumathi & S. Esakkirajan, "Fundamentals of Relational Database Management Systems", 2007)

"A condition that exists when data access is unaffected by changes in the physical data storage characteristics." (Carlos Coronel et al, "Database Systems: Design, Implementation, and Management 9th Ed", 2011)

"Data independence is the characteristic that enables data to be easily combined into usually unlimited number of different structures." (Michael M David & Lee Fesperman, "Advanced SQL Dynamic Data Modeling and Hierarchical Processing", 2013)

"A condition that exists when data access is unaffected by changes in the physical data storage characteristics." (Carlos Coronel & Steven Morris, "Database Systems: Design, Implementation, & Management"  11th Ed., 2014)

"The isolation of data from the use of the data such that a change to one does not affect the other." (George Tillmann, "Usage-Driven Database Design: From Logical Data Modeling through Physical Schmea Definition", 2017)

"Data independence is a database management system (DBMS) characteristic that lets programmers modify information definitions and organization without affecting the programs or applications that use it. Such property allows various users to access and process the same data for different purposes, regardless of changes made to it." (Techslang) [source]

"The property of being able to change the overall logical or physical structure of the data without changing the application program's view of the data." (GRC Data Intelligence)

"The degree to which the logical view of a database is immune to changes in the physical structure of the database." (IEEE 610.5-1990)

Related Posts Plugin for WordPress, Blogger...

About Me

My photo
Koeln, NRW, Germany
IT Professional with more than 25 years experience in IT in the area of full life-cycle of Web/Desktop/Database Applications Development, Software Engineering, Consultancy, Data Management, Data Quality, Data Migrations, Reporting, ERP implementations & support, Team/Project/IT Management, etc.