Reference Hub7
Dealing with Dangerous Data: Part-Whole Validation for Low Incident, High Risk Data

Dealing with Dangerous Data: Part-Whole Validation for Low Incident, High Risk Data

Cecil Eng Huang Chua, Veda C. Storey
Copyright: © 2016 |Volume: 27 |Issue: 1 |Pages: 29
ISSN: 1063-8016|EISSN: 1533-8010|EISBN13: 9781466688827|DOI: 10.4018/JDM.2016010102
Cite Article Cite Article

MLA

Chua, Cecil Eng Huang, and Veda C. Storey. "Dealing with Dangerous Data: Part-Whole Validation for Low Incident, High Risk Data." JDM vol.27, no.1 2016: pp.29-57. http://doi.org/10.4018/JDM.2016010102

APA

Chua, C. E. & Storey, V. C. (2016). Dealing with Dangerous Data: Part-Whole Validation for Low Incident, High Risk Data. Journal of Database Management (JDM), 27(1), 29-57. http://doi.org/10.4018/JDM.2016010102

Chicago

Chua, Cecil Eng Huang, and Veda C. Storey. "Dealing with Dangerous Data: Part-Whole Validation for Low Incident, High Risk Data," Journal of Database Management (JDM) 27, no.1: 29-57. http://doi.org/10.4018/JDM.2016010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In certain situations, syntactically valid, but incorrect, data entered into a database can result in near-immediate, catastrophic financial losses for an organization. Examples include: omitting zeros in prices of goods on e-commerce sites; and financial fraud where data is directly entered into databases, bypassing application-level financial checks. Such “dangerous data” can, and should, be detected, because it deviates substantially from the statistical properties of existing data. Detection of this kind of problem requires comparing individual data items to a large amount of existing data in the database at run-time. Furthermore, the identification of errors is probabilistic, rather than deterministic, in nature. This research proposes part-whole validation as an approach to addressing the dangerous data situation. Part-whole validation addresses fundamental issues in database management, for example, integrity maintenance. Illustrative and representative examples are first defined, and analyzed. Then, an architecture for part-whole validation is presented and implemented in a prototype to illustrate the feasibility of the research.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.