Business Rules in Databases

Author(s):  
Antonio Badia

Though informal, the concept of business rule is very important to the modeling and definition of information systems. Business rules are used to express many different aspects of the representation, manipulation and processing of data (Paton, 1999). However, perhaps due to its informal nature, business rules have been the subject of a limited body of research in academia. There is little agreement on the exact definition of business rule, on how to capture business rules in requirements specification (the most common conceptual models, entity-relationship and UML, have no proviso for capturing business rules), and, if captured at all, on how to express rules in database systems. Usually, business rules are implemented as triggers in relational databases. However, the concept of business rule is more versatile and may require the use of other tools.


Author(s):  
Jaroslav Zendulka

Modeling techniques play an important role in the development of database applications. Well-known entity-relationship modeling and its extensions have become a widely-accepted approach for relational database conceptual design. An object-oriented approach has brought a new view of conceptual modeling. A class as a fundamental concept of the object-oriented approach encapsulates both data and behavior, whereas traditional relational databases are able to store only data. In the early 1990s, the difference between the relational and object-oriented (OO) technologies, which were, and are still used together to build complex software systems, was labeled the object-relational impedance mismatch (Ambler, 2003). The object-oriented approach and the need of new application areas to store complex data have greatly influenced database technology since that time. Besides appearance of object-oriented database systems, which fully implement objectoriented paradigm in a database environment (Catell et al., 2003), traditional relational database management systems become object-relational (Stonebraker & Brown, 1999). The most recent versions of the SQL standard, SQL: 1999 (Melton & Simon (2001) and SQL: 2003 (Eisenberg et al., 2004), introduced object-relational features to the standard and leading database producers have already released packages which incorporate them.



Author(s):  
Maria Chiara Caschera ◽  
Arianna D’Ulizia ◽  
Leonardo Tininini

An easy, efficient, and effective way to retrieve stored data is obviously one of the key issues of any information system. In the last few years, considerable effort has been devoted to the definition of more intuitive, visual-based querying paradigms, attempting to offer a good trade-off between expressiveness and intuitiveness. In this chapter, we analyze the main characteristics of visual languages specifically designed for querying information systems, concentrating on conventional relational databases, but also considering information systems with a less rigid structure such as Web resources storing XML documents. We consider two fundamental aspects of visual query languages: the adopted visual representation technique and the underlying data model, possibly specialized to specific application contexts.



2021 ◽  
Vol 10 (37) ◽  
pp. 86-92
Author(s):  
Vitalii Makarchuk

The purpose of the article is to examine the role of the National Police of Ukraine in ensuring the information security of Ukraine. The subject of the study: The subject of the study is the competence of the National Police of Ukraine in ensuring the information security of Ukraine. Methodology: Dialectical method, epistemological method, analytical method, formal and legal method, normative and dogmatic method, the methods of legal modeling and forecasting were used in the research. The results of the study: The definition of “information security” and “cyber security” is provided. The main factors that negatively affect the information space in Ukraine, as well as current threats to Ukraine’s national security in the information sphere are identified. Practical implications: It is established that the number of crimes in the information sphere is growing every year. In this regard, the task of the National Police is to combat crimes and other offenses in this area, as well as to protect relevant rights and freedoms of citizens, society and the State. Value/originality: The tasks and powers in the area of information security protection of the National Police in general and the Department of Cyber Security, in particular, are defined.



2020 ◽  
Vol 208 ◽  
pp. 03059
Author(s):  
Hasan Abu Ezza ◽  
Anna.V. Shokhnekh ◽  
Victoria S. Telyatnikova ◽  
Natalia S. Mushketova

The article provides a refined definition of “information system for business” as a coordinated set of material, non-material and human re-sourses components that is used to implement a set of procedures of form¬ing an information resource as a quality product that meets the needs of ex¬ternal and internal users. According to the study, information technologies play a key role in the modern business environment. Many economic enti¬ties carry out their economical activities exclusively bye using communica¬tion-digital networks and functional software which provide the infor-mation necessary for effective business management. Resently, it has been proven that the communication and information technologies have become an integral part of any modern information systems, since they increase the level of business competitiveness during use the operational management information on time.These information technologies ensure the work’s continuity of information systems for a long period of time with the possi¬bility of quick adaptation of the business to the digital transformation’s conditions, which reduce the formation’s cost of information resources.The role of such components of information technology as software, databases and computer networks, which, in turn, are key components of high-quality information systems, is disclosed.



2009 ◽  
pp. 1003-1019
Author(s):  
Maria Chiara Caschera ◽  
Arianna D’Ulizia ◽  
Leonardo Tininini

An easy, efficient, and effective way to retrieve stored data is obviously one of the key issues of any information system. In the last few years, considerable effort has been devoted to the definition of more intuitive, visual-based querying paradigms, attempting to offer a good trade-off between expressiveness and intuitiveness. In this chapter, we analyze the main characteristics of visual languages specifically designed for querying information systems, concentrating on conventional relational databases, but also considering information systems with a less rigid structure such as Web resources storing XML documents. We consider two fundamental aspects of visual query languages: the adopted visual representation technique and the underlying data model, possibly specialized to specific application contexts.



Author(s):  
Maria Chiara Caschera ◽  
Arianna D’Ulizia

An easy; efficient and effective way to retrieve stored data is obviously one of the key issues of any information system. In the last few years considerable effort has been devoted to the definition of more intuitive; visual-based querying paradigms; attempting to offer a good trade-off between expressiveness and intuitiveness. In this chapter we analyze the main characteristics of visual languages specifically designed for querying information systems; concentrating on conventional relational databases but also considering information systems with a less rigid structure; such as Web resources storing XML documents. We consider two fundamental aspects of visual query languages: the adopted visual representation technique and the underlying data model; possibly specialized to specific application contexts.



Author(s):  
Andreas Opdahl ◽  
Brian Henderson-Sellers

The chapter reviews and augments a previously proposed template for defining enterprise and information systems (IS) modelling constructs. The purpose of the template is to provide clear and precise definitions of modelling constructs in a common format and, thereby, to facilitate intra- and inter-language integration. The template is based on the Bunge-Wand-Weber (BWW) model of information systems and has been used on several existing modelling languages and frameworks. It is defined by a meta-model expressed as a UML class diagram. The purpose of this chapter is to clarify the template further by formalising the meta-model through semi-formal constraints expressed in the object constraint language (OCL) and by populating the meta-model with definitions of example constructs from the UML version 1.4. The purpose is to make the template easier to understand, to validate it, to pave the way for stronger tool support for the template and to further our work on providing a complete template-based definition of the UML.



Author(s):  
Ivana Rábová ◽  
Michal Hodinka

Every organisation works according to principles which define business logic that controls all business processes. However, lot of basic rules of business logic are hidden in companies’ guidelines and directives, in informal techniques of experts, processes owners and specialists. The aim of all managers should be a replacement of this incoherent set of information by set of clear and unambiguous terms which describe the way the company is controlled from inside. This notion is a ground of control and administration of business knowledge.Contemporary practises in development of informational systems demand openness and availability to correspond to constant changes. With the complexity of information system grows the amount of work and its level of difficulty. The rules of business logic are transferred to application logic and implemented into a source code. Therefore, change of the business rule needs change of the code. This means compilation or replacement of the code. Adoption of this new approach would mean more effective possibilities in adjustment of the information systems to environment dynamics thanks to the change of the rules. The article deals with mining methods and subsequent structure of business rules for easier implementation into information system. Business rules base is at the same time business knowledge base which can serve for different purposes then development and use of information systems.



Author(s):  
Hagen Höpfner

Redundant data management is a must in client server information systems with mobile clients. Based on the level of autonomy of mobile devices/ users techniques for handling such data can be divided into caching, hoarding, and replication. These three terms are often used incorrectly in the literature. To our knowledge the exact definition of the terms has never been published in an international book or journal. We fill this gap with this article. We furthermore explain the terms cache replacement, cache invalidation, cache maintenance, automated hoarding, and synchronization of replicated data.



Sign in / Sign up

Export Citation Format

Share Document