Advanced Principles for Improving Database Design, Systems Modeling, and Software Development

Advanced Principles for Improving Database Design, Systems Modeling, and Software Development

Keng Siau (Missouri University of Science and Technology, USA) and John Erickson (University of Nebraska, Omaha, USA)
Indexed In: SCOPUS View 1 More Indices
Release Date: November, 2008|Copyright: © 2009 |Pages: 450|DOI: 10.4018/978-1-60566-172-8
ISBN13: 9781605661728|ISBN10: 1605661724|EISBN13: 9781605661735|ISBN13 Softcover: 9781616926038
List Price: $195.00
20% Discount:-$39.00
List Price: $195.00
20% Discount:-$39.00
Hardcover +
List Price: $235.00
20% Discount:-$47.00
(Individual Chapters)
No Current Special Offers


Recent years have witnessed giant leaps in the strength of database technologies, creating a new level of capability to develop advanced applications that add value at unprecedented levels in all areas of information management and utilization. Parallel to this evolution is a need in the academia and industry for authoritative references to the research in this area, to establish a comprehensive knowledge base that will enable the information technology and managerial communities to realize maximum benefits from these innovations.

Advanced Principles for Improving Database Design, Systems Modeling, and Software Development presents cutting-edge research and analysis of the most recent advancements in the fields of database systems and software development. This book provides academicians, researchers, and database practitioners with an exhaustive collection of studies that, together, represent the state of knowledge in the field.

Topics Covered

The many academic areas covered in this publication include, but are not limited to:

  • Actor Network Theory
  • Code Reuse and Refactoring
  • Complex Adaptive Systems
  • Data Warehouses
  • Database Applications
  • Decision trees
  • Domain Applications
  • Integrity Constraint Checking
  • IT Convergence Services
  • Knowledge Discovery
  • Location-Based Mobile Commerce
  • Multi-Dimensional Queries
  • Requirements Elicitation Technique Selection
  • Retrieval Optimization
  • Semantic Integration
  • Semantic Integrity Constraint
  • Semantic Web
  • Server-Based Repositories
  • Software Development
  • XML Databases

Reviews and Testimonials

This book represents the top research in the areas of database theory, systems building, data analysis techniques, web/mobile commerce and middleware, and organization and structures.

– John Erickson, University of Nebraska, Omaha

Siau and Erickson present this text for professionals and advanced students in library-centered computer science on the issues, methods, and theories involved in the provision of electronic resources in libraries.

– Book News Inc. (March 2009)

Table of Contents and List of Contributors

Search this Book:


Databases and database technologies have thoroughly permeated the business and consumer world, and represent the most common and accepted means of data storage and processing in use today. In such an environment development and enhancement of database technologies provide vital support for businesses in their drive to achieve higher performance, efficiency, and customer satisfaction goals. Creating reusable code modules and moving legacy systems to a web environment represent two ongoing trends that are very relevant to database developers and administrators. This volume, Advanced Principles for Improving Database Design, Systems Modeling, and Software Developmentpresents nineteen chapters that represent top research in the areas of database theory, systems building, data analysis techniques, web/mobile commerce and middleware, and organization and structures.

Maintaining the high quality of previous volumes in the Advances in Database Research Series the editors have selected research from acknowledged experts in the area of database and systems development and compiled them into this volume. The following sections present a brief synopsis of each chapter.

Chapter 1, “Semantics of the MibML Conceptual Modeling Grammar: An Ontological Analysis Using the Bunge-Wang-Weber Framework” conducts an ontological analysis of the MibML conceptual modeling grammar. The authors propose that their approach represents a starting point for continuing ontological development.

Chapter 2, “A Measurement Ontology Generalizable for Emerging Domain Applications on the Semantic Web” provides an ontology for measuring Semantic web application programs. The authors provide details on the creation of the ontology, how it can be used in analysis and how the ontology was validated.

Chapter 3, “Semantic Integration and Knowledge Discovery for Environmental Research” provide an approach to obtain semantic information from environmental data. The approach details a metadata semantic integration approach to help users integrate, move around in, and query multiple data sources, and the benefits of the approach are indicated in the experimental results.

Chapter 4, “Towards Code Reuse and Refactoring as a Practice Within Extreme Programming” proposes a framework that incorporates the practice of code reuse into the Extreme Programming methodology. As an Agile development technique Extreme Programming is a methodology that emphasizes an accelerated programming process. The chapter proposes that incorporating code reuse into extreme programming will increase the efficiency of systems development.

Chapter 5, “Requirements Elicitation Technique Selection: A Theory-Based Contingency Model” develops one of the first theory-based models to assist with selecting the appropriate requirements elicitation technique. The authors argue that their biggest contribution lies in providing a theory to help the understanding of why some elicitation techniques work better than others in specific implementation instances.

Chapter 6, “IT Value of Software Development: A Multi-Theoretic Perspective” demonstrate a research model that combines social capital, organizational learning and knowledge based views of organizations. The idea they develop is to use the resultant model to assess the IT value of systems created by systems development teams using different systems development methodologies.

Chapter 7, “UB2SQL: A Tool for Building Database Applications Using UML and B Formal Method” describes creation of a tool that was created to aid in design and development of database applications. The tool defines rules and tactics, along with a means of proofing the correctness of the specification and process, and has been integrated into a plug-in for the Rational Rose software development application.

Chapter 8, “Using Decision Trees to Predict Crime Reporting” develops an approach to identify the variables and predict crime reporting rates using decision trees. The approach contrasts sharply with the traditional practice of using only descriptive statistics to determine the crime reporting rates.

Chapter 9, “A Model for Estimating the Savings from Dimensional Versus Keyword Search,” develops a model that can be used to approximate the cost to a business for using keywords searches as its primary means of searching. The authors go on to illustrate how the model shows that a dimensional search approach can reduce costs for almost all businesses.

Chapter 10, “Integrity Constraint Checking for Multiple XML Databases” develops a new technique that allows semantic integrity constraints to be checked for XML-based databases. The authors’ XConstraint Checker includes an efficient algorithm optimized for semantic integrity constraints and is installed on a prototype system to demonstrate its utility.

Chapter 11, “Accelerating Multi Dimensional Queries in Data Warehouses” details the creation of a data compression method that allows quicker query returns in a data warehouse. In laboratory and real-world conditions, the method outperformed other leading schemes in both decoding time and error rates.

Chapter 12, “View Materialization in a Data Cube: Optimization Models and Heuristics” provides a materialization scheme for determining the correct number of views to create for a data warehousing application. Their design provides a number of heuristics that the authors examine for accuracy and timeliness in a performance guarantee scenario.

Chapter 13, “WEBFINDIT: Providing Data and Service-Centric Access Through a Scalable Middleware” presents a middleware solution that provides a means of designing and structuring a dynamic architecture for web-based database applications. The resulting system called WEBFINDIT represents a scalable infrastructure for heterogeneous data sources, making it especially relevant to web databases and web commerce applications.

Chapter 14, “Retrieval Optimization for Server-Based Repositories in Location-Based Mobile Commerce” provides an evaluation and extension of the author’s location-aware method of resolving location-referent transaction-related queries. The determination methods developed resulted in a “useful linkcell size determination heuristic” for optimizing queries in this environment.

Chapter 15, “Migrating Legacy Information Systems to Web Services Architecture” describes a means to convert a legacy system architecture into a Service-oriented Architecture. The authors propose that their solution differs from similar approaches in that their solution includes specific object-oriented and functional-oriented features.

Chapter 16, “A Socio-technical Interpretation of IT Convergence Services: Applying a Perspective from Actor Network Theory and Complex Adaptive Systems” uses an interpretive case study to explore and provide possible explanations of the effect of convergence of digital services. Complexity Adaptive Systems Theory and Actor Network Theory represent the theoretical basis for the research, and the resulting new framework proposes a means to connect the two theories and finally presenting possible ways to explain the underlying behaviors.

Chapter 17, “Understanding Organizational Transformation From IT Implementations: A Look at Structuration Theory” uses Adaptive Structuration Theory (AST) to examine variables in a data warehouse environment that imply how organizations are changed or transformed by the implementation effort. The authors propose that through use of AST, three key aspects of organizations, technology structure, other sources of technology, and group internal system, can be identified and that likely have an impact on how organizational transformations happen.

Chapter 18, “Social Network Structures in Open Source Software Development Teams” takes the perspective of an open source software (OSS) team in examining how the dynamics of social network structures affect team performance. Results show that at the beginning of an OSS-based project, there is generally a single hub social structure that moves toward a core/periphery model at later stages of such projects.

Chapter 19, “Design of a Data Model for Social Network Applications” proposes that an object-relational graph data model can be used to represent a social network. The authors indicate that this model can be used to represent the node-based properties common to social network theory-based structures.

Author(s)/Editor(s) Biography

Read Keng Siau's bio at:
John Erickson is an assistant professor in the College of Business Administration at the University of Nebraska at Omaha. His research interests include UML, software complexity and Systems Analysis and design issues. He has published in journals such as the CACM, JDM, and in conferences such as AMICIS, ICIS WITS, EMMSAD, and CAiSE. He has also co-authored several book chapters.


Editorial Board

Associate Editors

  • Keng Siau, University of Nebraska-Lincoln

    Special Assistants to the Editor

  • Yee Ling Tan, University of Nebraska-Lincoln
  • Kejia Liew, University of Nebraska-Lincoln

    Editorial Review Board Members

  • Frederic Adam, University College Cork, Ireland
  • Gediminas Adomavicius, University of Minnesota, USA
  • Gail-Joon Ahn, University of North Carolina—Charlotte, USA
  • Gove Allen, Tulane University, USA
  • Haldun Aytug, University of Florida, USA
  • Akhilesh Bajaj, University of Tulsa, USA
  • K. Suzanne Barber, The University of Texas at Austin, USA
  • Indranil Bose, The University of Hong Kong, Hong Kong
  • Paul L. Bowen, Florida State University, USA
  • Sjaak Brinkkemper, Universiteit Utrecht, The Netherlands
  • Glenn J. Browne, Texas Tech University, USA
  • Andrew Burton-Jones, University of British Columbia, Canada
  • Phil Chan, Florida Institute of Technology, USA
  • Minder Chen, George Mason University, USA
  • Robert Chiang, University of Connecticut, USA
  • Cecil Chua Eng Huang, Nanyang Technological University, Singapore
  • Sidney Davis, University of Nebraska at Omaha, USA
  • Jan Dietz, Delft University of Technology, The Netherlands
  • Brian Dobing, University of Lethbridge, Canada
  • Suzanne M. Embury, The University of Manchester, UK
  • John Erickson, University of Nebraska at Omaha, USA
  • Ming Fan, University of Washington Business School, USA
  • Shankar Ganesan, Boston University, USA
  • Andrew Gemino, Simon Fraser University, Canada
  • Ram D. Gopal, University of Connecticut , USA
  • Severin Grabski, Michigan State University , USA
  • Peter F. Green, University of Queensland, Australia
  • Shirley Gregor, Australian National University, Australia
  • Bill Hardgrave, University of Arkansas, USA
  • Alexander Hars, Inventivio GmbH, Germany
  • Stephen C. Hayne, Colorado State University, USA
  • Weiyin Hong, University of Nevada-Las Vegas, USA
  • Wynne Hsu, National University of Singapore, Singapore
  • Wayne W. Huang, Ohio University, USA
  • Wei-Kuang Huang, University of Connecticut, USA
  • Chuck Kacmar, The University of Alabama, USA
  • David Kang, University of Cincinnati, USA
  • Karthik N. Kannan, Purdue University, USA
  • Steven Kelly, MetaCase Consulting, Finland
  • Julie E. Kendall, Rutgers University, USA
  • Vijay Khatri, Indiana University, USA
  • Hee-Woong Kim, National University of Singapore, Singapore
  • Hyoung Joo Kim, Seoul National University, Korea
  • Taeha Kim, George Mason University, USA
  • John Krogstie, Norwegian University of Science and Technology (NTNU), Norway
  • Subodha Kumar, University of Washington Business School, USA
  • Michael Lang, National University of Ireland-Galway, Ireland
  • Thomas Lee, University of Pennsylvania, USA
  • Yang Lee, Northeastern University, USA
  • Zoonky Lee, Yonsei University, Korea
  • Franz Lehner, University of Passau, Germany
  • Gondy Leroy, Claremont Graduate University, USA
  • Yingjiu Li, Singapore Management University, Singapore
  • Stephen W. Liddle, Brigham Young University, USA
  • Divakaran Liginlal, University of Wisconsin-Madison, USA
  • Ee Peng Lim, Nanyang Technological University, Singapore
  • Binshan Lin, Louisiana State University in Shreveport, USA
  • Tok Wang Ling, National University of Singapore, Singapore
  • Vanessa Liu, New Jersey’s Science & Technology University, USA
  • Scott J. Lloyd, University of Rhode Island, USA
  • Yoanna Long, Colorado State University-Pueblo, USA
  • Paul Benjamin Lowry, Brigham Young University, USA
  • Ronald Maier, University of Regensburg, Germany
  • Ji-Ye Mao, Renmin University of China, China
  • Weiyi Meng, Binghamton University, USA
  • Mukesh Mohania, I.B.M. India Research Lab, India
  • Wai Yin Mok, University of Alabama in Huntsville, USA
  • Michael zur Muehlen, Stevens Institute of Technology, USA
  • Fiona Fui-Hoon Nah, University of Nebraska – Lincoln, USA
  • Wee Keong Ng, Nanyang Technological University, USA
  • Peter Axel Nielsen, Aalborg University, Denmark
  • Briony Oates, University of Teesside, UK
  • Antoni Olive, Universitat Politecnica De Catalunya, Spain
  • Andreas Opdahl, University of Bergen, Norway
  • Gultekin Ozsoyoglu, Case Western Reserve University, USA
  • Balaji Padmanabhan, University of South Florida, USA
  • Jin Soo Park, Korea University, Korea
  • Jeff Parsons, Memorial University of Newfoundland, Canada
  • Praveen Pathak, University of Florida, USA
  • Barbara Pernici, Politecnics di Milano, Italy
  • Geert Poels, Ghent University, Belgium
  • Sandeep Purao, Penn State University, USA
  • Mike S. Raisinghani, Texas Woman’s University, USA
  • Balasubramaniam Ramesh, Georgia State University, USA
  • Jacquelyn M. Rees, Purdue University, USA
  • Fiona Rohde, University of Queensland, Australia
  • Colette Rolland, Universite Paris 1 – Pantheon – Sorbonne, France
  • John R. Rose, The University of South Carolina, USA
  • Michael Rosemann, Queensland University of Technology, Australia
  • Matti Rossi, Helsinki School of Economics, Finland
  • Marcus A. Rothenberger, University of Nevada, USA
  • Rathindra Sarathy, Oklahoma State University, USA
  • Christoph Schlueter-Langdon, University of Southern California, USA
  • Ming-Chien Shan, Hewlett-Packard Laboratories, USA
  • Graeme Shanks, Monash University, Australia
  • Hong Sheng, Missouri University of Science and Technology, USA
  • Peretz Shoval, Ben-Gurion University, Israel
  • Choon Ling SIA, City University of Hong Kong, Hong Kong
  • Riyaz Sikora, The University of Texas at Arlington, USA
  • Israel Spiegler, Tel Aviv University, Israel
  • Jan Stage, Aalborg University, Denmark
  • Jan Stallaert, University of Connecticut, USA
  • Diane Strong, Worcester Polytechnic University, USA
  • Kian Lee Tan, National University of Singapore, Singapore
  • Xin Tan, Fairleigh Dickinson University, USA
  • Yong Tan, University of Washington, USA
  • David Tegarden, Virginia Tech, USA
  • Yuhong Tian, Washington University, USA
  • Heikki Topi, Bentley College, USA
  • Arvind K Tripathi, University of Washington Business School, USA
  • Dan Turk, Colorado State University, USA
  • Ramesh Venkataraman, Indiana University-Bloomington, USA
  • Wenli Wang, Touro University International, USA
  • Xiaoyang. Sean Wang, University of Vermont, USA
  • Chih-Ping Wei, National Sun Yat-Sen University, Taiwan
  • John D. Wells, Washington State University, USA
  • Weidong Xia, University of Minnesota, USA
  • Jian Yang, Macquarie University, Australia
  • Alec Yasinsac, Florida State University, USA
  • Benjamin Yen, The University of Hong Kong, Hong Kong
  • Mun Y. Yi, University of South Carolina, USA
  • Wei T Yue, The University of Texas at Dallas, USA
  • Daniel Dajun Zeng, University of Arizona, USA
  • Dongsong Zhang, University of Maryland, Baltimore County, USA
  • Han Zhang, Georgia Institute of Technology, USA
  • Zhongju (John) Zhang, University of Connecticut, USA
  • Ping Zhang, Syracuse University, USA
  • Huimin Zhao, University of Wisconsin - Milwaukee, USA
  • J. Leon Zhao, The University of Arizona, USA
  • Bai Hua Zheng, Singapore Management University, Singapore
  • Lina Zhou, University of Maryland, Baltimore County, USA
  • Richard Baskerville, Georgia State University
  • Dinesh Batra, Florida International University
  • Shirley A. Becker, Florida Institute of Technology
  • Hock Chan, National University of Singapore
  • Roger Chiang, University of Cincinnati
  • Guy Fitzgerald, Brunel University
  • Mark Gillenson, University of Memphis
  • Juhani Iivari, University of Oulu
  • Gary Koehler, University of Florida
  • M.S. Krishnan, University of Michigan
  • Ram L. Kumar, University of North Carolina at Charlotte
  • Kalle Lyytinen, Case Western Reserve University
  • Salvatore T. March, Vanderbilt University
  • Vijay Mookerjee, University of Texas at Dallas
  • Sudha Ram, University of Arizona
  • Il-Yeol Song, Drexel University
  • Veda C. Storey, Georgia State University
  • Iris Vessey, University of Queensland
  • Yair Wand, University of British Columbia