{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:54:33Z","timestamp":1767084873428,"version":"3.41.0"},"reference-count":34,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2017,6,30]],"date-time":"2017-06-30T00:00:00Z","timestamp":1498780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Data and Information Quality"],"published-print":{"date-parts":[[2017,6,30]]},"abstract":"<jats:p>Data quality has gained momentum among organizations upon the realization that poor data quality might cause failures and\/or inefficiencies, thus compromising business processes and application results. However, enterprises often adopt data quality assessment and improvement methods based on practical and empirical approaches without conducting a rigorous analysis of the data quality issues and outcome of the enacted data quality improvement practices. In particular, data quality management, especially the identification of the data quality dimensions to be monitored and improved, is performed by knowledge workers on the basis of their skills and experience. Control methods are therefore designed on the basis of expected and evident quality problems; thus, these methods may not be effective in dealing with unknown and\/or unexpected problems. This article aims to provide a methodology, based on fault injection, for validating the data quality actions used by organizations. We show how it is possible to check whether the adopted techniques properly monitor the real issues that may damage business processes. At this stage, we focus on scoring processes, i.e., those in which the output represents the evaluation or ranking of a specific object. We show the effectiveness of our proposal by means of a case study in the financial risk management area.<\/jats:p>","DOI":"10.1145\/3141248","type":"journal-article","created":{"date-parts":[[2018,1,16]],"date-time":"2018-01-16T13:20:39Z","timestamp":1516108839000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Validating Data Quality Actions in Scoring Processes"],"prefix":"10.1145","volume":"9","author":[{"given":"C.","family":"Cappiello","sequence":"first","affiliation":[{"name":"Politecnico di Milano, Italy"}]},{"given":"C.","family":"Cerletti","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italy"}]},{"given":"C.","family":"Fratto","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italy"}]},{"given":"B.","family":"Pernici","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Italy"}]}],"member":"320","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Carlo Batini and Monica Scannapieco. 2016. Data and Information Quality: Dimensions Principles and Techniques. Springer.   Carlo Batini and Monica Scannapieco. 2016. Data and Information Quality: Dimensions Principles and Techniques. Springer.","key":"e_1_2_1_1_1","DOI":"10.1007\/978-3-319-24106-7"},{"volume-title":"Proceedings of the American Medical Informatics Association Annual Symposium (AMIA\u201905)","author":"Berner Eta S.","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","first-page":"2015","article-title":"Systems and Software Engineering\u2014Systems and Software Quality Requirements and Evaluation (SQuaRE)\u2014Measurement of Data Quality","volume":"25024","author":"BSI.","year":"2015","journal-title":"ISO\/IEC"},{"key":"e_1_2_1_4_1","first-page":"115","article-title":"A methodology for data quality assessment on financial data","volume":"4","author":"Amicis Fabrizio De","year":"2004","journal-title":"Studies in Communication Sciences"},{"volume-title":"Proceedings of the 2016 IEEE 10th International Conference on Semantic Computing (ICSC\u201916)","author":"Debattista J.","key":"e_1_2_1_5_1"},{"volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"Evron Yotam","series-title":"Lecture Notes in Business Information Processing","key":"e_1_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_7_1","DOI":"10.1109\/HICSS.2012.8"},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1007\/s10796-008-9086-3"},{"doi-asserted-by":"publisher","key":"e_1_2_1_9_1","DOI":"10.1145\/2629568"},{"doi-asserted-by":"publisher","key":"e_1_2_1_10_1","DOI":"10.1214\/aoms\/1177730388"},{"doi-asserted-by":"publisher","key":"e_1_2_1_11_1","DOI":"10.24251\/HICSS.2017.328"},{"doi-asserted-by":"publisher","key":"e_1_2_1_12_1","DOI":"10.1016\/j.ijpe.2014.04.018"},{"volume-title":"Business Process Management Workshops","author":"Heravizadeh Mitra","series-title":"Lecture Notes in Business Information Processing","key":"e_1_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_14_1","DOI":"10.1109\/2.585157"},{"doi-asserted-by":"publisher","key":"e_1_2_1_15_1","DOI":"10.1145\/2522968.2522969"},{"doi-asserted-by":"publisher","key":"e_1_2_1_16_1","DOI":"10.1016\/S0378-7206(02)00043-5"},{"doi-asserted-by":"publisher","key":"e_1_2_1_17_1","DOI":"10.2139\/ssrn.410186"},{"doi-asserted-by":"publisher","key":"e_1_2_1_18_1","DOI":"10.1145\/1805286.1805290"},{"doi-asserted-by":"publisher","key":"e_1_2_1_19_1","DOI":"10.1504\/IJIQ.2012.050036"},{"doi-asserted-by":"publisher","key":"e_1_2_1_20_1","DOI":"10.1108\/14637151211283401"},{"volume-title":"Proceedings of the 2014 4th World Congress on Information and Communication Technologies (WICT\u201914)","author":"Shariat Panahy Payam Hassany","key":"e_1_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_22_1","DOI":"10.1145\/505248.506010"},{"unstructured":"Thomas C. Redman. 1996. Data Quality for the Information Age. Artech House.   Thomas C. Redman. 1996. Data Quality for the Information Age. Artech House.","key":"e_1_2_1_23_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_24_1","DOI":"10.1145\/269012.269025"},{"doi-asserted-by":"crossref","unstructured":"Thomas L. Saaty. 2001. Fundamentals of the Analytic Hierarchy Process. Springer Netherlands 15--35.  Thomas L. Saaty. 2001. Fundamentals of the Analytic Hierarchy Process. Springer Netherlands 15--35.","key":"e_1_2_1_25_1","DOI":"10.1007\/978-94-015-9799-9_2"},{"volume-title":"Proceedings of the 7th International Conference on Information Quality (IQ\u201902)","author":"Scannapieco Monica","key":"e_1_2_1_26_1"},{"unstructured":"Rainer Schmidt Wided Gu\u00e9dria Ilia Bider and S\u00e9rgio Guerreiro (Eds.). 2016. Enterprise Business-Process and Information Systems Modeling: 17th International Conference BPMDS 2016 21st International Conference EMMSAD 2016 Held at CAiSE 2016 Ljubljana Slovenia June 13-14 2016 Proceedings. Lecture Notes in Business Information Processing Vol. 248. Springer.   Rainer Schmidt Wided Gu\u00e9dria Ilia Bider and S\u00e9rgio Guerreiro (Eds.). 2016. Enterprise Business-Process and Information Systems Modeling: 17th International Conference BPMDS 2016 21st International Conference EMMSAD 2016 Held at CAiSE 2016 Ljubljana Slovenia June 13-14 2016 Proceedings. Lecture Notes in Business Information Processing Vol. 248. Springer.","key":"e_1_2_1_27_1"},{"volume-title":"Proceedings of the International Conference on Information Quality (IQ\u201900)","year":"2000","author":"Shankaranarayanan Ganesan","key":"e_1_2_1_28_1"},{"key":"e_1_2_1_29_1","volume-title":"Exploring Data Inaccuracy in Business Processes. Lecture Notes in Business Information Processing","volume":"50","author":"Soffer Pnina","year":"2010"},{"doi-asserted-by":"publisher","key":"e_1_2_1_30_1","DOI":"10.1109\/2.607057"},{"doi-asserted-by":"publisher","key":"e_1_2_1_31_1","DOI":"10.1145\/253769.253804"},{"doi-asserted-by":"publisher","key":"e_1_2_1_32_1","DOI":"10.1080\/07421222.1996.11518099"},{"doi-asserted-by":"crossref","unstructured":"Mathias Weske. 2012. Business Process Management: Concepts Languages Architectures. Springer.   Mathias Weske. 2012. Business Process Management: Concepts Languages Architectures. Springer.","key":"e_1_2_1_33_1","DOI":"10.1007\/978-3-642-28616-2"},{"key":"e_1_2_1_34_1","first-page":"171","article-title":"A survey on fault injection techniques","volume":"1","author":"Ziade Haissam","year":"2004","journal-title":"International Arab Journal of Information Technology"}],"container-title":["Journal of Data and Information Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3141248","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3141248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:13Z","timestamp":1750217833000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3141248"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,30]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6,30]]}},"alternative-id":["10.1145\/3141248"],"URL":"https:\/\/doi.org\/10.1145\/3141248","relation":{},"ISSN":["1936-1955","1936-1963"],"issn-type":[{"type":"print","value":"1936-1955"},{"type":"electronic","value":"1936-1963"}],"subject":[],"published":{"date-parts":[[2017,6,30]]},"assertion":[{"value":"2016-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}