Author List: Currim, Faiz; Ram, Sudha;
Information Systems Research, 2012, Volume 23, Issue 1, Page 109-128.
From a database perspective, business constraints provide an accurate picture of the real world being modeled and help enforce data integrity. Typically, rules are gathered during requirements analysis and embedded in code during the implementation phase. We propose that the rules be explicitly modeled during conceptual design, and develop a framework for understanding and classifying spatiotemporal set-based (cardinality) constraints and an associated syntax. The constraint semantics are formally specified using first-order logic. Modeling rules in conceptual design ensures they are visible to designers and users and not buried in application code. The rules can then be semiautomatically translated into logical design triggers yielding productivity gains. Following the principles of design science research, we evaluate the framework's expressiveness and utility with a case study.
Keywords: conceptual design; data management spatiotemporal databases; data modeling; design science research; spatiotemporal cardinality constraints
Algorithm:

List of Topics

#184 0.216 modeling models model business research paradigm components using representation extension logical set existing way aspects issues current integrated languages traditional
#270 0.160 design designs science principles research designers supporting forms provide designing improving address case little space criteria methods increasing synthesis designer
#6 0.118 data used develop multiple approaches collection based research classes aspect single literature profiles means crowd collected trend accuracy databases accurate
#205 0.100 cognitive style research rules styles human individual personality indicates stopping users composition analysis linguistic contextual certain differences preferred theoretical activity
#126 0.085 data database administration important dictionary organizations activities record increasingly method collection records considered perturbation requirements special level efforts administrators analyzed
#44 0.083 approach analysis application approaches new used paper methodology simulation traditional techniques systems process based using proposed method present provides various
#138 0.081 use question opportunities particular identify information grammars researchers shown conceptual ontological given facilitate new little constraints dual answer post-adoption theory