StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Data Governance, Quality, Integration, and Security - Essay Example

Cite this document
Summary
Data Governance, Quality, Integration and Security Name: Institution: Data Governance, Quality, Integration and Security Information that is in raw, unorganized or unprocessed form representing or referring to ideas, objects and conditions is known as data (Resnik & Yarowsky, 2000)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Data Governance, Quality, Integration, and Security
Read Text Preview

Extract of sample "Data Governance, Quality, Integration, and Security"

Download file to see previous pages

Although these aspects are closely interrelated within a system, addressing and improving them independently results in better performance of the system as a whole (Arens, Chee, Hsu & Knoblock, 1993). Data Governance Data governance encompasses a set of procedures ensuring that important assets in data form are properly managed in all divisions of an enterprise (Abiteboul, Benjelloun & Milo, 2002). The processes ensure that data is trustworthy and employees can be held accountable for any harmful occurrences that take place due to low quality of data.

The organization under review was found not to have effective control measures as to who accessed data and in what way. There were many cases of deleted or edited information by users other than the authorized owners. One way to improve data governance is by defining the governance process (Arens, Chee, Hsu & Knoblock, 1993). The organization needs to make data auditable and enable its accountability. This facilitates accurate monitoring and effective reconciliation between the data source and its consumers.

The process needs to cover initial input of data, its standardization and refinement along the whole information flow path (Resnik & Yarowsky, 2000). . Accountability entails the creating and empowering governance roles in the company. The organization should create the roles at appropriate levels and assign them to dedicated owners and stewards (Arens, Chee, Hsu & Knoblock, 1993). With outsourcing of data governance and processing becoming a reality for most organizations, the responsibility hierarchy should be accountable to the owners of data.

For example, an outsourcing agent will be held responsible by an organization for breach of governance committed by the outsourced service provider (Resnik & Yarowsky, 2000). Data Quality Data quality may be termed as the state of timeliness, validity, completeness, accuracy and consistency that render data suitable for the intended use (Abiteboul, Benjelloun & Milo, 2002). A challenge faced by the organization under review is detecting issues caused by the quality of data at the point of entry into the system from the numerous users.

They are mostly typing errors as well as intentional decisions. Recommendations to improve data quality include use of simple queries or profiling tools (Resnik & Yarowsky, 2000). Others are tracking mail deliverability, verification of information prior to database entry and understanding contents of organizational data and the way it got there. Email and other personalized communications form a considerable percentage of the marketing tools. Therefore, given their high traffic, they can be accurate indicators of data quality.

By implementing a process that tracks bounced and returned emails, an organization is able to monitor its data accuracy and make applicable changes (Resnik & Yarowsky, 2000).

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Data Governance, Quality, Integration, and Security Essay”, n.d.)
Data Governance, Quality, Integration, and Security Essay. Retrieved from https://studentshare.org/design-technology/1467461-data-governance-quality-integration-and-security
(Data Governance, Quality, Integration, and Security Essay)
Data Governance, Quality, Integration, and Security Essay. https://studentshare.org/design-technology/1467461-data-governance-quality-integration-and-security.
“Data Governance, Quality, Integration, and Security Essay”, n.d. https://studentshare.org/design-technology/1467461-data-governance-quality-integration-and-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Data Governance, Quality, Integration, and Security

IT Governance and Law

This report ''IT governance and Law'' is aimed such that the relativeness of CRM systems is narrated first as an introductory term and then as a discussion evaluating the significance of the conventional old systems and the new cloud incorporated systems.... omized particularly to each business' needs CRM systems not only manage data but also result in the overall analysis and prosperity of sales figures....
13 Pages (3250 words) Report

E-Government Literature Review

An institution which governs, frames policies, takes care of the people residing within the territory.... In olden days empires used to rule over… In modern days the empires are replaced by states or countries and the rulers are replaced by political parties.... Consequently government is supposed to take care of the welfare of the people residing within the regions controlled by the g political combine, but the government has to take care of the interest of its citizens in other countries or regions, undertake infrastructure developmental activities and frame policies for effective control on the affairs....
68 Pages (17000 words) Essay

Information Technology Governance in Colleges

There is critical importance of establishing a framework of IT governance before a self-assessment program or information security plan is written (Custer, 2010, p.... One of the important most goals for employing IT governance practices or framework is to reduce the number of security incidents which continue to rise among colleges and universities “resulting in significant cost” (Custer, 2010, p.... IT governance systems are important to implement in colleges because they effectively combat security breaches which increase security...
16 Pages (4000 words) Research Paper

MediTech Healthcare Information System

hellip; In order to address the security issues, professionalism is required in terms of design and development, and acquisition and maintenance while operating electronic health records.... The integration of information technology is not up to the mark due to the low returns of revenue on the systems that are installed.... Information Technology has modified the healthcare sector to enhance efficiency, quality, and safety....
7 Pages (1750 words) Case Study

The Use of Biometrics and Bio-Information to Support New Systems Integration

hellip; Different private and government organizations use a wide variety of security techniques to ensure the security of the people.... Additionally, biometrics is one of the most commonly used security devices.... Existing techniques to ensure security and human identification which is based on deriving credentials through PIN and identification credentials are not capable to deal with the increasing requirements for strict security measures in the implementation of border crossings, national ID cards, access control and government profits....
20 Pages (5000 words) Research Paper

Professional Services for Geospatial Transformation Strategy in DEWA

Today, DEWA employs over 9,000 employees who constantly endeavor to see that both the quantity and quality of services provided are of the highest standards in consistency and reliability.... ArcFM based data model adjusted to DEWA requirements was adopted for Water & Electricity network.... Several GIS applications were developed to facilitate query and analysis of GIS data resulting in faster decision making.... GIS data model was adjusted as per ArcFM UT requirements....
19 Pages (4750 words) Essay

Information Governance in Business

Information governance is associated with enhancing business value, decreasing ownership cost of managing a wide base of information, and simultaneously protecting security, facilitating compliance, and managing a high level of risks.... Digitized data can be easily accessed across organizational boundaries and this has led to organizations adopting security measures in order to protect confidential information.... This coursework "Information governance in Business" describes various aspects of information governance....
12 Pages (3000 words) Coursework

Security of Information in Business Organisations

That aside, the concept of information security is interpreted according to the specific purpose(s) for which protecting information by a particular businessman becomes a primary concern (Gupta, 2009).... But loopholes for leaking of business information into unintended audience constitutes complex intertwined counterparts including the technology itself (Dhillon 2003), mismanagement of data and distrust between the management and the workers from a major viewpoint among others (Ardichvili & Page, 2003)....
14 Pages (3500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us