2.1.3 Use of Natural vs Surrogate Keys