Browse Definitions :
Definition

Decision Model and Notation (DMN)

Decision Model and Notation (DMN) is a formalized method of making and mapping out decisions through official business processes.

DMN is used across enterprise businesses to ensure consistent, repeatable decision making and modeling. The DMN method has been adopted by A Guide to the Business Analysis Body of Knowledge (BABOK Guide), a highly regarded collection of standard business analysis practices.

In DMN, diagrams are used to notate the decision-making process. The parts played by individuals and departments are documented and the process itself is guided by the formal rules of DMN. Notation is expressed in a simplified language, Friendly Enough Expression Language (FEEL), which maintains clarity and supports automated decision making.

Common formalized rules, language, methods and mapping of a decision process help ensure thorough analysis of requirements and challenges for decisions, while making communication clear across departments and organizations. DMN is used in a complementary way with business modeling and process notation (BPMN). The two methodologies are used in separate stages to keep decisions out of business processes. This separation keeps processes smooth and removes potential complications.

DMN is a creation of the Object Management Group (OMG), a not-for-profit technology standards consortium. The group includes vendors, individuals and academic and government organizations. DMN was founded in 1989 and is headquartered in Needham, Massachusetts.

This was last updated in September 2018

Continue Reading About Decision Model and Notation (DMN)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close