{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:03:16Z","timestamp":1760299396080},"reference-count":0,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,1,1]]},"abstract":"<p>In certain situations, syntactically valid, but incorrect, data entered into a database can result in near-immediate, catastrophic financial losses for an organization. Examples include: omitting zeros in prices of goods on e-commerce sites; and financial fraud where data is directly entered into databases, bypassing application-level financial checks. Such \u201cdangerous data\u201d can, and should, be detected, because it deviates substantially from the statistical properties of existing data. Detection of this kind of problem requires comparing individual data items to a large amount of existing data in the database at run-time. Furthermore, the identification of errors is probabilistic, rather than deterministic, in nature. This research proposes part-whole validation as an approach to addressing the dangerous data situation. Part-whole validation addresses fundamental issues in database management, for example, integrity maintenance. Illustrative and representative examples are first defined, and analyzed. Then, an architecture for part-whole validation is presented and implemented in a prototype to illustrate the feasibility of the research.<\/p>","DOI":"10.4018\/jdm.2016010102","type":"journal-article","created":{"date-parts":[[2016,7,21]],"date-time":"2016-07-21T12:26:48Z","timestamp":1469104008000},"page":"29-57","source":"Crossref","is-referenced-by-count":7,"title":["Dealing with Dangerous Data: Part-Whole Validation for Low Incident, High Risk Data"],"prefix":"10.4018","volume":"27","author":[{"given":"Cecil Eng Huang","family":"Chua","sequence":"first","affiliation":[{"name":"Information Systems and Operations Management Department, University of Auckland, Auckland, New Zealand"}]},{"given":"Veda C.","family":"Storey","sequence":"additional","affiliation":[{"name":"Department of Computer Information Systems, J. Msck Robinson College of Business, Georgia State University, Atlanta, GA, USA"}]}],"member":"2432","container-title":["Journal of Database Management"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=160350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T23:27:23Z","timestamp":1654126043000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/JDM.2016010102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2016,1,1]]},"references-count":0,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,1]]}},"URL":"https:\/\/doi.org\/10.4018\/jdm.2016010102","relation":{},"ISSN":["1063-8016","1533-8010"],"issn-type":[{"value":"1063-8016","type":"print"},{"value":"1533-8010","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,1]]}}}