Process-Embedded Data Integrity

نویسندگان

  • Yang W. Lee
  • Leo Pipino
  • Diane M. Strong
  • Richard Y. Wang
چکیده

Despite the established theory and the history of the practical use of integrity rules, data quality problems, which should be solvable using data integrity rules, persist in organizations. One effective mechanism to solve this problem is to embed data integrity in a continuous data quality improvement process. The result is an iterative data quality improvement process as data integrity rules are defined, violations of these rules are measured and analyzed, and then the rules are redefined to reflect the dynamic and global context of business process changes. Using action research, we study a global manufacturing company that applied these ideas for improving data quality as it built a global data warehouse. This research merges data integrity theory with management theories about quality improvement using a data quality lens, and it demonstrates the usefulness of the combined theory for data quality improvement.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Managing integrity in design information flows

This paper addresses integrity rules that are embedded within engineering design applications and that apply between applications. A representation for integrity rules that are embedded in applications is presented and a set of related methods developed for: (a.) maintaining the integrity condition of application developed data, (b) managing the precedence order between applications, in the con...

متن کامل

A co-commitment based secure data collection scheme for tiered wireless sensor networks

Tiered wireless sensor networks (WSNs) have many advantages over traditional WSNs. However, they are vulnerable to security attacks, especially the attacks to the storage nodes that buffer and process the data readings from sensors. In this paper, we propose a secure data collection protocol SDC to support timebased queries in tiered WSNs. With small overhead introduced to data communication, S...

متن کامل

OEI: Operation Execution Integrity for Embedded Devices

We formulate a new security property, called “Operation Execution Integrity” or OEI, tailored for embedded devices. Inspired by the operation-oriented design of embedded programs and considering the limited hardware capabilities of embedded devices, OEI attestation enables selective and practical verification of both control-flow integrity and critical-variable integrity for an operation being ...

متن کامل

Aggregation-tolerant steganography for data-stream integrity verification

Techset Com Data outsourcing can make data-integrity protection a challenging task, especially when the trustworthiness of a third-party is unproven. A novel auditing process for integrity verification of data stream, whose storage and handling is outsourced to a third-party, is explored. For this purpose, the hidden information within this data that provides support for in-network data aggrega...

متن کامل

Multipersona Hypovisors: Securing Mobile Devices through High-Performance Light-Weight Subsystem Isolation

We propose and detail a system called multipersona Hypovisors for providing light-weight isolation for enhancing security on Multipersona mobile devices, particularly with respect to the current memory constraints of these devices. Multipersona Hypovisors leverage Linux kernel cGroups and namespaces to establish independent process container, allowing isolation of the Multipersona process tree ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Database Manag.

دوره 15  شماره 

صفحات  -

تاریخ انتشار 2004