Data Governance, Quality, Integration, and Security

Data Governance, Quality, Integration, and Security Essay example
Masters
Essay
Design & Technology
Pages 4 (1004 words)
Download 0
Data Governance, Quality, Integration and Security Name: Institution: Data Governance, Quality, Integration and Security Information that is in raw, unorganized or unprocessed form representing or referring to ideas, objects and conditions is known as data (Resnik & Yarowsky, 2000)…

Introduction

Although these aspects are closely interrelated within a system, addressing and improving them independently results in better performance of the system as a whole (Arens, Chee, Hsu & Knoblock, 1993). Data Governance Data governance encompasses a set of procedures ensuring that important assets in data form are properly managed in all divisions of an enterprise (Abiteboul, Benjelloun & Milo, 2002). The processes ensure that data is trustworthy and employees can be held accountable for any harmful occurrences that take place due to low quality of data. The organization under review was found not to have effective control measures as to who accessed data and in what way. There were many cases of deleted or edited information by users other than the authorized owners. One way to improve data governance is by defining the governance process (Arens, Chee, Hsu & Knoblock, 1993). The organization needs to make data auditable and enable its accountability. This facilitates accurate monitoring and effective reconciliation between the data source and its consumers. The process needs to cover initial input of data, its standardization and refinement along the whole information flow path (Resnik & Yarowsky, 2000). ...
Download paper
Not exactly what you need?

Related papers

Security Technology
Security cameras are one aspect of business security that is commonly used across many different business types. Often a number of video cameras transmit their signals to a specific point, frequently a set of monitors. This system is known as closed-circuit television (CCTV) the name derives from the fact that although a television signal is produced it is not transmitted openly, and as a…
Technology Support System For Homeland Security Program
Former Senator Rudman views the department to be a needed “formulation” in spite of the existing of great Army, Marine Corps and Air Force (2003). However, in assessing the organization and mission of the DHS, this proposal sees the agency to be wanting in resources and capacity along the aspects of independent mobilization and focus of initiatives. Organizationally, the DHS has to correlate…
Business Process Integration
In fact, the Internet offers the businesses a lot of opportunities to grow. It allows the businesses to reach the international markets and the worldwide customers without facing geographical restrictions and cost issues, improve business service and support, access to worldwide communications, reform associations, streamline internal procedures, share private data and information and run…
Is the Quality Old Design Methods Better than Today's?
This is because; the problems experienced today are by far too complex such that they can neither be solved by intuition nor can they be solved using traditional wisdom (Brand, 2005). Since design involves different tasks, it is necessary that different methods be incorporated. In earlier days before technology was incorporated in architectural design field, the industry practitioners used some…
Security Audit
Also, some team members violated integrity and confidentiality assertions by disclosing information to external parties. This paper entails the details and implications of security audit procedures carried out and observations noted. Conducting audit Lafleur has a complicated network of information systems in place, with various remote offices and centralized IT function. Therefore, to evaluate…
Individual Design report -Technology Integration
The artefact itself will be the size of an average human torso, which will be placed on a square platform and will be encased in a glass box of about six feet height and three feet width on all sides. Glass panels on all sides will be electric blue in colour and embedded with LED lightning streaks panelled on the sides and back, which can play different patterns of lightning on predetermined…
NFC Security Issues: A Case Study
Particularly, this form of technology is quite popular in advanced nations such as Japan (Gordon & British Computer Society, 2007). However, according to various studies that have been conducted into the technology, especially in the UK by a team of researchers from Surrey University, an alarm is fast being raised about the security risks involved with the same, particularly with regard to the…