CoDE Publications CoDE Publications
IRIDIA Publications IRIDIA Publications
SMG Publications
WIT Publications
WIT Publications
SMG Publications
Home People Research Activities Publications Teaching Resources
By Class By Topic By Year
By Class By Topic By Year
login
I. Boydens, A. Pirotte, and E. Zimányi. Managing Constraint Violations in Administrative Information Systems. In Data Mining and Reverse Engineering: Searching for semantics, Proceedings of the 7th IFIP Conference on Data Semantics, DS-7, pages 347-372. Chapman & Hall, October 1997.
© Chapman & Hall 1997

Abstract

This paper presents a broad methodological framework for dealing with some aspects of real-world complexity in information system analysis and design. By complex application problem, we mean a problem that cannot be solved by the current technology in the way that it is analyzed in the application domain. The paper starts with a motivating case study, the analysis of integrity constraint violations in database operations at the Belgian agency for social security. We then re-interpret practices and their problems in terms of current database technology. Recommendations are derived both for extensions of the technology that would allow a better treatment of complex real-world problems and for improvements in data management practices in the application domain that would take better advantage of the current technology.


Updated: 2017-03-27