CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Consequences of Violating Database Integrity Rules in Data Management Systems

by Ametovi Koffi Jacques Olivier
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 2
Year of Publication: 2023
Authors: Ametovi Koffi Jacques Olivier
10.5120/ijca2023922669

Ametovi Koffi Jacques Olivier . Consequences of Violating Database Integrity Rules in Data Management Systems. International Journal of Computer Applications. 185, 2 ( Apr 2023), 1-6. DOI=10.5120/ijca2023922669

@article{ 10.5120/ijca2023922669,
author = { Ametovi Koffi Jacques Olivier },
title = { Consequences of Violating Database Integrity Rules in Data Management Systems },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2023 },
volume = { 185 },
number = { 2 },
month = { Apr },
year = { 2023 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number2/32674-2023922669/ },
doi = { 10.5120/ijca2023922669 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:25:01.888222+05:30
%A Ametovi Koffi Jacques Olivier
%T Consequences of Violating Database Integrity Rules in Data Management Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 2
%P 1-6
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays every action we do produces data like most computer applications. To this point moreover, some of these are reduced to managing and consulting data: our bank accounts, registrations, insurance, etc. This data is stored in what is called a file and is structured into records containing details such as our surnames, first names, date of birth, blood type, etc. More complex applications require data whose structure is also complex. The data is classified in several files according to the objects they describe: customer file, product file, order file, invoice file, etc. There are links between the files that reflect the relationships between the objects described. It also appears that the data necessary for an application could be useful to other applications, or even to other users. This data then constitutes what is called a database. Managing such data is no longer within the reach of elementary software. Guaranteeing the quality of the recorded data (can we find what was recorded?), their consistency (is the customer of each order listed?), protecting them in the event of an incident, allow several users to access them simultaneously, while strictly controlling access to confidential data, offering good access performance to all applications, in particular those that are interactive, are functions that require powerful and complex software like the database management systems, or DBMS such as SQL SERVER, MYSQL, ORACLE SQL. This type of software is one of the fundamental tools for the development of large computer applications thanks to these rules of integrity, namely the integrity of entities and referential integrity which allow the solidity and robustness of data, But these rules which must guarantee the essential security of the database for our various organizations are often violated by inattention or ignorance of these rules by the new developers and even by the old ones thus being able to involve many consequences on the whole of direct or indirect actors Keywords: Data, Integrity rules, DBMS

References
  1. TALENT DEVELOPMENT CENTER, 2017 ,“Responding to Data Manipulation via Triggers,” in MICROSOFT SQL SERVER (MS-SQL-102).
  2. Raja, H. (2012). Referential Integrity in Cloud No-SQL Databases.
  3. Jean-Luc Hainaut, 2000 ,4e Edition, “BASES DE DONN´EES ET MOD`ELES DE CALCUL”.
  4. Michael Mannino, 2nd Edition,” DATABASE MANAGEMENT ESSENTIALS”,EISBN13: 9780983332473.
  5. Michael Mannino, 8e Edition, 2022,” Database Design, Query Formulation, and Administration”, EISBN13: 9781948426947.
  6. San, K. K. Implementation of Integrity Constraint Checker for Healthcare Database System (Doctoral dissertation, MERAL Portal).
  7. Yesin, V., Karpinski, M., Yesina, M., Vilihura, V., & Warwas, K. (2021). Ensuring data integrity in databases with the universal basis of relations. Applied Sciences, 11(18), 8781.
Index Terms

Computer Science
Information Sciences

Keywords

Data Integrity Rule Violations Entity Integrity Referential Integrity DBMS