Data Governance, Quality, Integration, and Security - Essay Example

Only on StudentShare

Extract of sample
Data Governance, Quality, Integration, and Security

Although these aspects are closely interrelated within a system, addressing and improving them independently results in better performance of the system as a whole (Arens, Chee, Hsu & Knoblock, 1993). Data Governance Data governance encompasses a set of procedures ensuring that important assets in data form are properly managed in all divisions of an enterprise (Abiteboul, Benjelloun & Milo, 2002). The processes ensure that data is trustworthy and employees can be held accountable for any harmful occurrences that take place due to low quality of data. The organization under review was found not to have effective control measures as to who accessed data and in what way. There were many cases of deleted or edited information by users other than the authorized owners. One way to improve data governance is by defining the governance process (Arens, Chee, Hsu & Knoblock, 1993). The organization needs to make data auditable and enable its accountability. This facilitates accurate monitoring and effective reconciliation between the data source and its consumers. The process needs to cover initial input of data, its standardization and refinement along the whole information flow path (Resnik & Yarowsky, 2000). ...
Download paper

Summary

Data Governance, Quality, Integration and Security Name: Institution: Data Governance, Quality, Integration and Security Information that is in raw, unorganized or unprocessed form representing or referring to ideas, objects and conditions is known as data (Resnik & Yarowsky, 2000)…
Author : areinger

Related Essays

Security Technology
Security cameras are one aspect of business security that is commonly used across many different business types. Often a number of video cameras transmit their signals to a specific point, frequently a set of monitors. This system is known as closed-circuit television (CCTV) the name derives from the fact that although a television signal is produced it is not transmitted openly, and as a consequence cannot be picked up by exterior parties (Levine, 2000). The term CCTV can be technically used to refer to most types of video cameras; however, it is generally used to apply to those that are...
8 pages (2008 words) Essay
Technology Support System For Homeland Security Program
Former Senator Rudman views the department to be a needed “formulation” in spite of the existing of great Army, Marine Corps and Air Force (2003). However, in assessing the organization and mission of the DHS, this proposal sees the agency to be wanting in resources and capacity along the aspects of independent mobilization and focus of initiatives. Organizationally, the DHS has to correlate with federal agencies to be able to mobilize anti-terrorism initiatives; it also lacks the integrated mechanism so that the department can effectively interface with the anti-terrorism network of...
12 pages (3012 words) Assignment
Business Process Integration
In fact, the Internet offers the businesses a lot of opportunities to grow. It allows the businesses to reach the international markets and the worldwide customers without facing geographical restrictions and cost issues, improve business service and support, access to worldwide communications, reform associations, streamline internal procedures, share private data and information and run applications (Simpande & Jakovljevic, 2003; Norton, 2001; Shelly et al., 2005) Basically, the most excellent method to deal with determined business software issues is to remove the old stuff and bring in the...
7 pages (1757 words) Coursework
Is the Quality Old Design Methods Better than Today's?
This is because; the problems experienced today are by far too complex such that they can neither be solved by intuition nor can they be solved using traditional wisdom (Brand, 2005). Since design involves different tasks, it is necessary that different methods be incorporated. In earlier days before technology was incorporated in architectural design field, the industry practitioners used some elementary methods to facilitate the design process. As technology was adopted, these methods slowly faded away and as time went by, every practitioner became conversant with the new methods and from...
9 pages (2259 words) Essay
Security Audit
Also, some team members violated integrity and confidentiality assertions by disclosing information to external parties. This paper entails the details and implications of security audit procedures carried out and observations noted. Conducting audit Lafleur has a complicated network of information systems in place, with various remote offices and centralized IT function. Therefore, to evaluate this complex system, detailed audit procedures were planned including manual as well as automated assessments. Manual assessments mainly comprised interviewing procedures, performing physical checks and...
3 pages (753 words) Essay
Individual Design report -Technology Integration
The artefact itself will be the size of an average human torso, which will be placed on a square platform and will be encased in a glass box of about six feet height and three feet width on all sides. Glass panels on all sides will be electric blue in colour and embedded with LED lightning streaks panelled on the sides and back, which can play different patterns of lightning on predetermined intervals or through sensor detection as people pass by and on-off switch will be controlled both through pre-programmed computer system within the platform of the artefact. The front side will be plain...
8 pages (2008 words) Coursework
NFC Security Issues: A Case Study
Particularly, this form of technology is quite popular in advanced nations such as Japan (Gordon & British Computer Society, 2007). However, according to various studies that have been conducted into the technology, especially in the UK by a team of researchers from Surrey University, an alarm is fast being raised about the security risks involved with the same, particularly with regard to the safety of private information of a client that is stored in it. This is because, the likely threats that arise are when the transmission for payments are made, which can be a few meters away from the...
6 pages (1506 words) Case Study
Got a tricky question? Receive an answer from students like you! Try us!