Index

Abstraction category, 165

Abuse

Intentional, 239

Unintentional, 239

Access, 249

Access controls, 200

Access to data, 238

ACID, 179

Administrative and Audit Duties Risk, 254

Adware, 243

Affiliation management, 365

Aiken, Peter, 39

Aiken’s pyramid, 40

American National Standards Institute, 144

Amsterdam Information Model, The, 34–35, 35

Analytical model, 521–22

ANSI Standard 859, 326

Anti-virus software, 256

Apache Mahout, 521

Application coupling, 281

Application DBA, 174

Application security requirements, 261

Architects, 101

Architectural design diagrams, 115

Architecture, 97

Architecture designs, 116

Architecture framework, 102

Architecture initiation projects, 118

Archiving process, 189, 279

ARMA GARP® principles, 340, 343

ARMA International, 306

Assessments, 79–80

Asset, 20

Asset management software, 115

Asset tracking, 213

Asynchronous data flow, 277

Authoritarian decree, 590

Authority list, 312

Backup and recovery activities, 327

Backup files, 198

Backup software, 198

BASE, 179

Basel II Accord, 247

Batch change data capture, 393

Batch data integration, 276, 291

Batch interaction, 275–76

Belmont Principles, 52

Bias

Data processing and, 58–59

Types of, 58–59

Bi-Directional metadata architecture, 433

Big data, 497–99, 502–4

Cloud storage and, 520

Principles of, 500

Sources of, 504

Tools for, 517–18

Big data modeling, 522

Big data strategy, 511–12

Black Hat hackers, 242

Blockchain databases, 177

Bot, 229

Brandeis, Louis, 53

Brewer’s Theorem, 180

Bridges, William, 575–76

Bridges’s Transition Phases, 575

Bring-your-own-devices (BYOD), 325

Business alignment, 80

Business bias, 59

Business continuity group, 198

Business Continuity Plan, 197, 281, 327

Business data steward, 77, 342

Business glossary, 90, 92, 427, 580

Business growth, 220

Business intelligence, 57, 63, 384

Portfolio for, 398

Self-service, 408

Tools for, 403

Business intelligence and analytic functions, 40

Business metadata, 422–23

Business performance management, 405

Business rules, 289

Critical data and, 474–75

Data integration and, 295

Business vocabulary, 154

BYOA. See Bring Your Own Apps

BYOD. See Bring-your-own-devices (BYOD)

C, 71

CAD / CAM. See Computer assisted design and manufacturing

Canada Bill 198, 49, 316

Canadian Privacy law (PIPEDA), 54–55, 236

Candidate Identification, 363

Canonical data model, 279–80

CAP Theorem, 180

Capacity and growth projections, 190

CDMP, 65

CDO Organizational touch points, 81

Centralized databases, 175

Change

Capacity to, 80

Checklist for managing, 576–77

Laws of, 574

Sustaining, 603

Change management, 573

Change agent, 574, 577, 590, 597

Change data, 190

Change data capture, 276

Change management

Communication and, 590

Complacency and, 577

Errors of, 577–78, 582

Transition and, 575–77

Vision for, 578

Change Management Institute, 85

Change managers, 575, 577

Change vision, 604

Charts and graphs, 57

Chief data officer, 81

Chief information officer, 32

Chisholm, Malcolm, 350, 351

Class words, 161

Classification schemes, 313

Cloud computing, 177, 265

Cloud storage, 520

Cloud-based integration, 285

CobiT. See Control objectives for information and related technology.

Collaborative readiness, 80

Collection, 319

Columnar Appliance Architecture, 519

Columnar-based databases, 181

Column-oriented databases, 186–87

Commercial of the Shelf (COTS), 479

Communication interrogatives, 103

Communication plan, 605–6, 608

Competitive advantage, 18, 237

Complacency, 578, 584

Completeness category, 165

Complex event processing solutions (CEP), 284, 292

Compliance activities, 255–56

Computer assisted design and manufacturing, 189

Computer worm, 244

Confidentiality classification, 248

Confidentiality data restrictions, 235

Configuration management, 409

Configuration management tools, 427

Consistency category, 166

Content

Capturing, 326

Definition of, 307

Lifecycle of, 307

Content delivery channels, 330

Content delivery methods, 308

Content handling polices, 324

Content information architecture, 325

Content lifecycle, 307

Content management, 307, 324

Content management software, 311

Content Management System (CMS), 323, 330, 332

Content metadata, 307–8

Content modeling, 308

Context diagram, 36

Big data and data science, 499

Components of, 37–39

Data architecture, 100

Data governance and stewardship, 69

Data modeling, 124

Data quality, 451

Data security, 219

Data warehouse/business intelligence, 382

Defined, 37

Documents and content, 304

Knowledge area, 37

Metadata, 419

Reference and master data, 348

Contractual restrictions, 237

Control activity, 38

Control objectives for information and related technology, 71

Controlled vocabulary, 309, 311, 313, 333

Coordinating data steward, 77

Corporate Information Factory (CIF), 386–88, 388

Correctness category, 165

Covey, Stephen, 598

Critical data, 474–75

Critical Risk Data (CRD), 224

Cross-reference data sets, 354

CRUD, 258

Cultural change, 119

Customer relationship management (CRM), 84, 366, 368

DAMA Data Management Function Framework, 35–39, 42

DAMA Functional Area Dependencies, 41

DAMA International, 64

DAMA International’s Certified Data Management Professional (CDMP) certification, 65

DAMA Knowledge Areas, 40

DAMA Wheel, The, 35, 40, 43, 44

DAMA’s mission, 44

DAMA-DMBOK, 35–39, 43–46

Data

Analysis, 514

As an asset, 17, 20, 23, 52

Business acceptance of, 411–12

Critical, 454

Ethical approach to, 20

Ethical principles of, 52–53

Monetary value of, 24

Ownership of, 56

Risks and, 28, 30

Sensitive, 217–20

Storage containers for, 201

Types of, 29

Understanding of, 18–20

Value of, 24–25

Data access, 197

Data access control, 249

Data acquisition, 361–62

Data administration, 170

Data aggregation, 60

Data analysis tools, 485

Data and enterprise architecture, 109

Data and information relationship, 20, 33

Data architects, 101, 567

Data architecture, 45, 98, 110

Goals of, 99

Implementation guidelines and, 117–18

Data architecture artifacts, 90

Data architecture governance, 119

Data as a service (DaaS), 285

Data asset, 91

Data asset valuation, 77–79

Data attribute, 155

Data audits, 213

Data availability, 227

Data capture

Change, 276

Data category, 166

Data cleansing, 471

Data consistency, 249

Data consumers, 399

Data dictionary, 402, 429

Data discovery, 287

Data enhancement, 471–72

Data exchange specification design, 290

Data Exchange Standards, 286

Data Federation, 285

Data flows, 107–9

Diagram, 108

Integration, 291

Data governance, 45, 53, 64, 67, 73

Goals of, 71–72

Guiding principles for, 71, 73, 305, 421

Implementation of, 88

Issue management, 86

Issue management for, 85

Organizational culture and, 93

Orgnizations and, 79

Procedures for, 87

Readiness assessments and, 79–80

Regulatory compliance and, 70–71

Tools and techniques for, 92

Data governance and data management, 72

Data Governance Community of Interest, 91

Data governance council, 32, 83, 84, 86, 90, 91, 93, 248

Data governance operating framework, 83

Data governance organization parts, 74

Data governance organizations, 73, 91

Data governance program, 43

Implementation guidelines for, 93

Measurement and, 94

Data governance scorecard, 93

Data governance standards, 88–90

Data Governance Steering Committees, 93

Data governance strategy, 31, 82

Data governance team, 445

Data handling

Current state and, 61

Improvement strategies and, 62

Risk reduction and, 61–62

Data handling ethics, 49, 51

Data insights, 500, 517

Data integration, 59–60, 299

Near-real time, 277

Profiling and, 288

Synchronous, 277–78

Data integration & interoperability (DII), 45, 269–71, 272, 286

Data integration activities, 286–89

Data integration processes, 372, 376, 392–94

Data integration solutions

Business rules and, 295

Design of, 289

Mapping sources and, 290

Data integration tools, 402–3, 403, 428

Data integrity, 226

Data issue escalation path, 86

Data lake, 505

Data lifecycle, 28–29, 41, 287

Data lifecycle key activities, 29

Data lineage, 264, 287, 298

Data loading requirements, 201

Data loss, 211

Data management, 17, 30–31, 67

Challenges of, 20

Consumers for, 38

Data quality and, 25

Enterprise perspective and, 27

Goals of, 18

Initiatives and, 84

Inputs and, 38

Metadata and, 417–19

Participants in, 38

Specialized hardware for, 182

Data management activities

Control, 38

Development, 38

Operational, 38

Planning, 38

Data management framework, 33

Data management implementation roadmap, 32

Data management maturity, 80

Data management plan, 605

Data management practices, 89, 573

Assessment of, 80

Data management procedures

Components, 89

Data management professionals, 17, 573

Data management program, 609

Human resources and, 607

Data management program charter, 32

Data management scope statement, 32

Data management strategy, 31–33, 94

Components of, 32

Deliverables from, 32

Data map, 318, 337

Data marking, 60

Data marts, 392

Data mashups, 511

Data masking methods, 60, 227, 228, 253

Data migration, 208–9, 292

Data mining, 507–8

Data mining snooping, 58

Data model

Integration in, 164

Versioning of, 164

Data model management, 360

Data model repositories, 115

Data modeler, 160

Data modeling, 45, 123–26

Goals of, 125

Standards for, 161, 162

Data modeling tools, 115, 209, 295, 430, 485

Data models

Evaluation of, 515

Data movement, 272

Data naming standards, 161

Data operations and storage activities, 193–96

Data orchestration, 291

Data parsing process, 472

Data patches, 469

Data policy, 77, 83

Data privacy laws, 53–56

Data processing errors, 193

Data producer, 162

Data producing applications, 292

Data product development lifecycle, 400–401

Data professionals, 63, 162

Data profiling processes, 288, 470, 476

Data profiling tools, 295, 485

Data quality, 25–26, 46, 449–52, 453–54

Goals of, 452–53

ISO standards for, 461–62

Measurement of, 479–81

Reporting processes on, 484

Statistics about, 25

System design and, 468

Data quality analysis, 80

Data quality assessment, 475

Data quality business rules, 25–26

Data quality dimension, 454–60

Data quality goals, 477

Data quality improvement

Cultural change and, 492–93

Implementation guidelines for, 490–91

Risk assessment and, 491

Data quality improvement lifecycle, 462–64

Data quality issues

Causes of, 465–70

Corrective actions and, 486–87

Data entry and, 466

Data processing and, 468

Leadership and, 465–67

Manual data patches and, 469

Operating procedures for, 481–83

Preventive actions and, 486

Data quality metrics, 494

Data quality policy, 493–94

Data quality program governance, 493

Data quality strategy, 474

Data recovery plan, 197

Data recovery software, 198

Data regulations, 220, 248

Data remediation, 60, 397

Data replication process, 191, 202

Data retention plan, 193, 286

Data risks, 70

Data rule templates, 485

Data scaling, 191

Data science, 497–502, 514

Data science tools, 517–18

Data security, 45, 193, 217–20

Bill of Rights, 252

Business requirements, 217–20, 245

Goals of, 222

Monitoring of, 226, 253–55

Outsourcing, 264

Password for, 234

Regulatory requirements for, 246

Requirements for, 225

Risk assessment and, 262–63

Data Security Bill of Rights, 252

Data security governance, 265

Data security management

Four A’s of, 225

Guiding principles for, 222

Data security policy, 247–48, 251

Data security practices, 262

Data security requirements, 218

Data security restrictions, 234–37

Data security risks, 220

Data security standards, 245, 248

Data security vocabulary, 229–32

Data services, 291

Data sharing agreements, 298, 377

Data source governance, 413

Data sources, 512–13

Evaluation of, 370–72

Ingesting, 512–13

Data standardization, 473

Data Standards Steering Committee, 89

Data stewards, 76–77, 90, 247, 252, 255, 263, 356, 371

Coordinating, 77

Executive, 76

Data stewardship, 75

Committee for, 86

Team for, 86, 91

Data storage and operations, 45

Data storage areas, 391–92

Data storage environment, 201

Data storage goals, 171, 181

Data storage governance, 213

Data storage metrics, 212

Data storage systems, 184–89

Data strategy, 32

Components of, 32

Ownership of, 32

Data structures, 290

Data technology requirements, 194

Data transformation, 397, 473

Data transformation engine, 294

Data validation, 213, 362

Data valuation, 24–25

Data vault, 393

Data virtualization, 285

Data virtualization servers, 294

Data visualization, 510–11, 516, 520

Data warehouse, 381–83, 384

Approaches to, 385

Batch change data capture for, 393

Critical success factors for, 523

Development tracks for, 396

Goals of, 383

Governance in, 411

Historical data and, 392–93

Population of, 397

Requirements of, 394

Data warehousing, 46, 385

Critical success factors, 410

Database, 172

Hierarchical, 184

Multidimensional, 185

Temporal, 185

Types of, 175

Database abstraction, 172

Database access control, 200

Database administrator (DBA), 170, 173, 194, 195, 196, 201, 211–12

Database as a service (DaaS), 178

Database availability

Factors affecting, 204

Loss factors of, 204

Online criteria for, 204

Database backup, 198

Database catalogs, 428

Database execution, 205

Database log techniques, 393

Database management

Organizational change and, 211–12

Database management system (DBMS), 185

Database management technology

Naming conventions and, 210

Script files and, 210

Software for, 194

Tools, 209

Database management tools, 209

Database monitoring tools, 209

Database Organization Spectrum, 184

Database performance

Monitoring to improve, 205

Tuning to improve, 173

Database processes

Archiving, 189

Capacity and growth projections of, 190

Change data within, 190

Purging, 191

Replication of, 191

Resiliency of, 192

Retention of, 193

Sharding of, 193

Database processing, 179

Database storage systems, 196

Database support, 169, 196

Database systems administration tasks, 199

Database technology

Managing, 194–96

Monitoring of, 195

Support of, 170

Databases

Alternative environments for, 207

Centralized, 175

Columnar-based, 181

Column-oriented, 186–87

Data loading and, 201

Development environment and, 182

Distributed, 175

Flat file, 187

Key-value pair, 188

Multimedia, 187

Non-relational, 186

Object/Multimedia, 187

Processes of, 189–93

Relational, 185

Spatial, 187

Specialized, 188

Triplestore, 188

Types of, 184–89

Usage patterns of, 196

Databases process, 189–93

Data-centric organization, 73

DBA. See Database administrator

Decision support systems (DSS), 381

Default passwords, 241

Definitions category, 166

Deming, W. Edward, 51

Denormalization, 150

Design review, 163

Destination (VISION), 575

Detection and recovery risk, 254

Developer support tools, 209

Developers, 183

Development activity, 38

Development DBAs, 174

Development environment, 182, 183

Device access policies, 325

Dewey Decimal System, 313

Dice, 406

Diffie-Hellman Key Agreement, 227

Diffusion of Innovations theory, 599

Digital asset management (DAM), 318, 331

DII governance, 297–98

DII solutions, 293

Dimensional data warehouse, 388–90

Directory, 428, 429, 430

Disaster Recovery Plan, 327

Disasters, 192

Discovery, 80, 287, 318–20

Disk storage, 181

Distributed databases, 175

Distributed file-based solutions technologies, 519–20

DMBOK Pyramid, 39–40

Document / record, 315

Audit of, 329

Management of, 328

Retention of, 328

Document and content knowledge, 305–6

Document and content management, 45, 303

Regulatory compliance and, 304–5

Document library system, 330

Document management, 305, 315–17, 323, 331

Document management system, 330

Document management tool, 93

Document repository, 331

Document sanitization, 262

Drill down, 407

Dublin Core, 309

DW usage metrics, 413

DW/BI architecture, 395

Dynamic data masking method, 228

ECM. See Enterprise Content Management Systems

ECM readiness assessment, 338

E-discovery, 305, 336

Key Performance Indicators (KPIs) and, 343–44

E-discovery assessment, 339

EDM. See Enterprise Data Model

EDRM. See Electronic Discovery Reference Model (EDRM)

Electronic data interchange (EDI), 266

Electronic Discovery Reference Model (EDRM), 318

Electronic documents, 318

Electronic point of sale (EPOS) apps, 309

Electronic records, 305, 323

Electronic technology and business growth, 221

ELT. See Extract-Load-Transform

ELT Process Flow, 275

Encryption, 226, 227, 241, 258, 262

English, Larry, 457

Enrichment, 362

Enterprise application integration model (EAI), 283

Enterprise architectural framework, 102–4

Enterprise architecture, 98, 109, 110, 265

Enterprise asset, 17

Enterprise Content Management (ECM), 307

Cultural change and, 339

Guidelines for, 337

Key Performance Indicators (KPIs) and, 344

Enterprise data architecture, 119–23

Enterprise data architecture steering committee, 90

Enterprise data governance council, 74

Enterprise data model, 90, 105–7, 106

Enterprise data warehouse, 385

Enterprise integration tool, 296–97

Enterprise message format, 279

Enterprise perspective and data management, 27

Enterprise resource planning (ERP), 84, 201, 271, 368

Enterprise service bus (ESB), 281, 283, 294

Enterprise standards, 289

Entity resolution, 362

Environmental factors hexagon, 35, 36

Equivalent term relationship, 311

ERP. See Enterprise resource planning

Ethical data handling, 49, 51, 60–61, 61–62, 62, 64

Ethical data management, 49, 57

Ethical Risk Model, 64

Ethical risks, 59

Ethics, 49

ETL data flows, 291

ETL process flow, 274

ETL processes, 485

EU Basel II Accord, 247

EU Privacy Directives, 236

European Convention of Human Rights, 53

European Data Protection Supervisor, 52

Event processing method, 284, 292

Event-driven data integration, 277

Everett Rogers Diffusion of Innovations, 600

Excessive privileges, 238

Executive data stewards, 76

Extensible markup interface, 334

Extensible markup language, 334

External data, 202

Extract- Load-Transform (ELT), 274

Extract process, the, 273

Extract-Transform-Load (ETL), 205, 273, 275

Faceted taxonomies, 311, 313

Family Educational Rights and Privacy Act, 237

FASB. See Financial Accounting Standards Board

Fast data integration, 278

Federal Rules of Civil Procedure, 316

Federal Trade Commission, 55

Federated architectures, 176

Federation provisions data, 176

FERPA. See Family Educational Rights and Privacy Act

Financial Accounting Standards Board, 87

Financial assets, 23

Financial master data, 367

Financially sensitive data, 237

Firewalls, 230, 257

Flash memory, 182

Flat file databases, 187

Folksonomies, 309, 313

Frameworks. See Data management frameworks

Freedom of speech, 56

GASB. See Government Accounting Standards Board (U.S.)

General Data Protection Regulation, 54

Generally Accepted Recordkeeping Principles, 338

Geographic classification, 356

Geographic information systems (GIS), 325

Geo-statistical reference data, 356

Geuens, Sue, 40

Gleicher formula, 577

Glossary, 90

Godin, Seth, 599

Golden record, 358–59

Goodwill, 20

Governance. See also Data Governance

Government Accounting Standards Board (U.S.), 87

Graphical design applications, 115

Group Think, 589

Guiding principles

Data governance, 71, 73, 305, 421

Data security management, 222

Hacking/Hacker, 241

Hadoop, 519

Hash algorithms, 177

Hash encryption, 227

Health Information Protection and Portability Act (U.S.), 49

Healthcare Information Portability and Accountability Act (HIPAA), 254

Hierarchical database organization, 184

Hierarchical relationship, 312

Hierarchical Storage Management System, 187

Hierarchical taxonomy, 312

High Risk Data (HRD), 224

Historical data, 392–93

HOLAP. See Hybrid online analytical processing

Hot backups, 198

Hub-and-spoke data pattern, 279

Hub-and-spoke interaction model, 280–81

Hybrid online analytical processing, 407

Identity, 56

Identity management technology, 257

Identity resolution, 364

IM. See Instant messaging (IM)

Image processing technology, 331–32

Imhoff, Claudia, 386

Inconsistencies

Explaining, 597–98

In-database algorithm, 520

Indexing, 157

Industry reference data, 356

Industry-based regulations, 237

Information and Communication Technology Research, 52

Information and data relationship, 20

Information architecture, 320

Information asset, 30

Information asset tracking, 213

Information consumer, 162

Information content architecture, 329

Information Council, 342

Information economy, 17

Information gaps, 30, 91

Information governance, 340–42

Information Governance Maturity Model (IGMM), 338

Information Governance Reference Model (IGRM), 341

Information management change initiative, 588

Information management context, 596

Information management disciplines, 52

Information quality change, 599

Information security

Data classification and, 220

Techniques for managing, 258–59

Tools used in, 256–58

Vocabulary for, 223–24

Information Security and Corporate Counsel, 255

Information security team, 224–25

Information Systems Planning (ISP) method, 109

Information technology and data management, 30–31

Information technology infrastructure library (ITIL), 194, 199

In-Memory databases (IMDB), 181

Inmon, Bill, 385

Innovation, 601

Instant messaging (IM), 244

Integration cloud-based system, 285

Integration testing, 183

Intentional abuse, 239

Interaction, 280–81, 290

Hub-and-spoke, 280–81

point-to-point, 280

Publish and subscribe, 281

Internal integration requirements, 285

Intrusion detection system (IDS), 240, 257

Intrusion prevention system (IPS), 239, 240, 257

Islands of data, 249

ISO 15489, 316

ISO 8000, 461

ISO State Code, 354

Issues management, 86–87

IT governance, 71

ITIL. See Information technology infrastructure library (ITIL)

JSON. See JavaScript Object Notation (JSON)

Justice/Fairness ethical principle, 58

Key exchange, 227

Key performance indicators (KPIs), 343

Key-value, 144

Key-value pair database, 188

Kimball, Ralph, 388

K-Means clustering, 514

knowledge, 18

Kohonen M, 508

Kotter, John P., 578, 581, 582, 584, 586, 593

Lambda architecture design, 181

Latency, 275

Laws of change, 574

Leader’s Data Manifesto, The, 31, 450

Leadership, 588

Leadership alignment, 560

Legal master data, 367

Legitimate database privileges abuse, 238–39

Licensing agreements compliance, 213

Lifecycle management, 41, 323

List, 353–54

Litigation playbook, 336

Load processes, 274, 401

Location master data, 368

Log shipping vs. mirroring, 192

Logical data names, 161

Lone CEO scenario, 587

Loosely-coupled systems, 177

Loshin, David, 351

Low Credibility Committee, 587

Machine learning, 506–7, 507

Machine readable catalog, 331

Malicious hacker, 242

Malware, 242

Managed database hosting, 178

Management lifecycle, 316

Managers, 586

Mapping management tools, 429

Mapping process, 275

MapQuest, 189

MapReduce, 176

MARC. See Machine Readable Catalog

Market timing, 57

Martin, James, 109

Mashups, 511

Massively parallel processing (MPP), 517, 518–19

Master data, 347–48, 357

Business drivers and, 349

Governance policy and, 373

Master data ID management, 365

Master data integration, 369

Master data management (MDM), 70, 359–61, 370–71, 372

Goals of, 349–50

Tools and techniques of, 375

Master data sharing architecture, 370, 376

Matching. See Candidate identification

Matching workflows, 364

Media monitoring, 507

Medically sensitive data, 237

Menlo Report, 52

Messaging interaction, 394

Metadata, 19, 27, 46, 221, 417

Categorization and, 324

Content, 307–8

Data quality and, 461

Data risks and, 418

Definition of, 417

Delivery mechanisms for, 439

Directory of, 429

Impact analysis of, 441–43

Importance of, 417–19

Integration of, 439

Managed environment for, 436

Management of, 308

Repository for, 426, 440

Repository model for, 437

Scope of, 434

Sources of, 425–26

Types of, 422–24

Unreliable, 60

Unstructured data and, 307, 424–25

Uses of, 440

Metadata architecture, 431, 433

Centralized, 431

Distributed, 432

Metadata environment, 444

Metadata governance, 445

Metadata initiatives, 445

Metadata leveraging, 420

Metadata management system, 436

Metadata management tools, 440

Metadata registries (MDR), 210

Metadata registry standard, 424

Metadata repository, 402

Metadata repository metamodel, 437

Metadata repository model, 258, 296, 436–37

Metadata requirements, 435–36

Metadata standards, 437, 446

Metadata stores, 430

Metadata strategy, 434

Phases, 435

Risk assessment and, 444

Metadata tags, 443

Metadata, 447

Metrics, 94, 259

Data protection, 261

Security, 259–60

Security awareness, 260

Micro-controlled vocabulary, 311

Micromanagement, 590

Misleading visualizations, 57

Mission accomplished syndrome, 581

Models and diagrams

Clarity of, 116–17

Moderate risk data (MRD), 224

MOLAP. See Multi-dimensional online analytical processing

Monitoring authentication, 253

Morris, Henry, 405

Multidimensional database technologies, 185

Multidimensional eXpression, 185

Multi-dimensional online analytical processing, 407

Multi-master replication, 191

Multimedia database, 187

Multi-temporal database, 185

National Information Exchange Model (NIEM), 286

Near real-time model, 295

Near-real-time data, 394

Network storage administrators (NSAs), 196

Network taxonomy, 313

Network-based audit appliance, 254

Neutral zone, 575

NIST risk management framework, 225

Node, 172

Non-relational database, 186

NoSQL, 124, 129, 130, 136, 137, 143, 144, 152, 154, 165, 188, 196, 334

Nullability, 165

Obfuscation data, 60, 227, 228

Object to processing of personal data, 54

Observability, 603

OCM. See Organizational change management (OMC)

OCR software, 330

ODBC. See Open Database Connectivity

OLAP. See Online analytical processing

OLTP. See Online transaction processing (OLTP)

Online analytical processing, 405

Online data

Ethical uses of, 56

Online freedom of speech, 56

Online transaction processing (OLTP), 189

Ontology, 102, 314, 355

Open Database Connectivity, 172

Open Geospatial Consortium standard, 187

Operating framework, 71

Operational activity, 38

Operational analytics, 510

Operational data store (ODS), 392

Operational metadata, 423

Operational reports, 387, 395, 404

Orchestration data, 291

Orchestration process, 282

Organization

Cultural change and, 119

Data-centric, 73

Organization for Economic Co-operation and Development (OECD), 53

Organizational behavior, 92

Organizational change management (OCM), 85–86

Organizations and cultural change, 263, 297

Outsourcing and data security, 264

OWL. See W3C Web Ontology Language

Ownership of data, 56

Party master data, 366–67

Password, 234, 257

Payment Card Industry Data Security Standard (PCI-DSS), 87, 237, 247

PCI contractual obligations, 236

PCI-DSS. See Payment Card Industry Data Security Standard (PCI-DSS)

Performance metrics, 119–23

Performance testing, 183

Perimeter, 230

Persistent data masking method, 227

Personal data, 54

Personal health information (PHI), 237

Personal Information Protection and Electronic Documentation Act, 49

Personally private information (PPI), 236

PGP (Pretty Good Privacy), 227

Phishing, 242

Physical assets, 23

Physical data names, 161

Pick lists, 311

PIPEDA. See Personal Information Protection and Electronic Documentation Act

Pivot, 407

Planning activity, 38

PMO. See Project management office

POC. See Proof of concept

Point-to-point interaction model, 280

Policies and content handling, 324

Policy

Data security, 247

Political governance, 73

Polyhierarchy, 313

Portability, 54

Predictive algorithms, 59

Predictive analytics, 508–9, 515

Predictive Model Markup Language (PMML), 521

Predictive models, 514

Pre-production environments, 182

Prescriptive analytics, 509

Preservation, 319

PRISM, 161

Privacy law

Canadian, 54–55

Private-key encryption, 227

Privileges

Legitimate database, 238–39

Unauthorized, 239

Procedural DBAs, 174

Process controls, 282

Product data in manufacturing execution systems (MES), 368

Product data management (PDM), 368

Product lifecycle management (PLM), 367

Production DBA, 173, 174

Production environment, 182

Project management office, 84

Proof of concept, 195

Proprietary reference data, 356

Public policy and law, 53

Public-key encryption, 227

Publish and subscribe model, 281

Purging, 191

Quality assurance certification, 173

Quality assurance testing (QA), 183

Quality data

High, 473–74

Metrics for, 487–88

Queryable audit data, 408

Query-level access control, 238

RACI. See Responsible, Accountable, Consulted, and Informed

RDBMS. See Relational database management system (RDBMS)

RDF. See Resource description framework (RDF)

Readability category, 166

Readiness assessment, 210

Really Simple Syndication (RSS), 309

Real-time data, 394

Real-time data integration flows, 292

Real-time data processing solution, 293

Realtime data synchronization, 277–78

Record quality, 342

Record system of, 358

Records, 315

Records management, 305, 317–18, 323, 332

Electronic documents and, 318

Key Performance Indicators (KPIs) and, 343

Maturity model for, 338–39

Principles of, 306

Recovery types, 192

Redacting data, 60

Reference and master data, 46

Reference data, 351, 350–57

Change and, 376–77

Geo-statistical, 356

Industry, 356

Ontologies and, 355

Proprietary, 356

Standard, 357

Structure, 353

Taxonomies in, 355

Reference data management, 430

Reference data sets

Assessment of, 373

Governance and, 375

Reference directories, 368

Regulated data, 236

Regulated information, 248

Regulatory classification, 252

Regulatory compliance, 87

Data governance and, 70

Questions on, 87

Regulatory requirements and data security, 246

Regulatory risk, 254

Reification transformations, 103

Related term relationship, 312

Relational database, 185

Relational database management system (RDBMS), 185

Relational OLAP, 407

Relative advantage, 602

Release management, 399

Remediation, 397

Replication, 191

Replication patterns

Log shipping, 192

Mirroring, 192

Replication process, 202

Replication scheme, 193

Replication solutions, 278–79

Reporting strategies, 412–13

Repository scanning, 439

Requirements analysis, 155

Resiliency, 192

Resource description framework (RDF), 335

Resource description framework schema (RDFS), 314

Responsible, Accountable, Consulted, and Informed, 264

Retrieve response or performance metrics, 414–17

Right to be Forgotten, 56

Risk, 223–24

Risk assessment, 210

Risk classifications, 224

Risk model, 63

Risk of Reliance on Inadequate Native Audit Tools, 254

Risk reduction and data security and, 220

Rivest-Shamir-Adelman (RSA), 227

Roadmap, 111–13, 409

Rogers, Everett, 599

ROLAP. See Relational online analytical processing

Role assignment grid, 250

Role assignment hierarchy, 250

Roll up, 407

Root cause analysis, 490

SaaS applications. See also Data as a Service (SaaS)

SAN. See Storage area network

Sandbox, 184

Sarbanes-Oxley Act, 30, 49, 71, 254, 316

Scaling. See Data scaling

Scanning repositories, 439

Schema, 172

Schema.org, 336

Scheme category, 165

Search engine optimization (SEO), 321, 324

Security Breach of Information Acts, 236

Security compliance managers, 253

Security metrics, 259–60

Security patches, 258

Security Policy Compliance, 255–56

Security restrictions data, 234–37

Security risks assessment of, 250

Self-organizing maps, 508

Semantic modeling, 321

Semantic search, 321

Semi-structured data, 322

Sensitive data, 221–22, 325

Sentiment analysis, 507

Server administration teams, 205

Server virtualization, 178

Service accounts, 239–40

Service level agreements (SLAs), 203, 412, 483–84

Service registry, 430

Services-based architecture (SBA), 505–6

Sharding process, 193

Shared accounts, 240

Shared-nothing database technologies, 518

Shewhart/Deming cycle, 462

Simple knowledge organization system (SKOS), 335

Single family regulations, 236–37

SKOS. See Simple knowledge organization system

SLAs. See Service level agreements

Slice-and-dice, 406

SMART, 32

Smartphone, 602

Social engineering, 242

Social media policies, 324

Social networking sites, 244

Social system, 601

Social threats, 242

Software as a Service (SaaS), 285

Software configuration management (SCM), 199

Software testing process, 207

Solid state drives (SSDs), 182

Solvency II, 30, 87

Source-to-target mapping, 396

Sousa, Ryan, 386

Spam, 244–45

Spatial database, 187

Specialized database, 188

Specialized hardware, 182

Spyware, 243

SQL injection attack, 241

Stages of adoption, 601–2

Stakeholder analysis and communication planning, 606

Standard, 88

Standard markup languages, 333–34

Standard reference data, 357

Standardization, 362

Standards category, 165

Standards, data security, 245, 248

Star schema, 388

Statistical ‘smoothing’, 58

Statistical process control, 488–90

Stewardship, 366, 372, 374

Storage area network (SAN), 181, 196

Storage environment management, 199–200

Storage solutions, 279

Strategic alignment model, 33–35

Strategic plan, 31

Strategy, 31

Streaming, 394

Strong-Wang framework, 455

Structure category, 165

Structured query language (SQL), 185

Subject area coverage and data warehouse, 413

Subject area discriminator, 107

Subject area model, 107

Sustainability data governance and, 91, 94

Syndication, 308

Synonym ring, 312

System database, 201

System development lifecycle (SDLC), 126, 298

System of record, 358

System security risks, 238

Taxonomy, 312, 355, 397

Facet, 313

Faceted, 311

Hierarchical, 312

Network, 313

TCO, 213

Team collaboration tools, 333

Team, building a, 589

Technical metadata, 423

Technology readiness, 210

Temporal database, 185

Term management, 311–12

Terms, 311

Test data, 208

Test environment, 183

Text mining, 507–8

The four As of data security management, 225

The General Data Protection Regulation of the EU, (GDPR), 54

Third party data, 202

Threats, 223, 242

Tightly-coupled systems, 177

Timing, 57

Total cost of ownership (TCO), 213

Trade secrets, 237

Transaction log

Backup, 198

Dump, 198

Transform process, the, 273

Transition management. See also Change management

Transition, checklist for managing, 576–77

Trickle feeds, 394

Triplestore database, 188

Trojan horse, 243

Trusted source, 358–59

Unauthorized privilege elevation, 239

Uniform resource locators (URLs), 321

Unintentional abuse, 239

Unstructured data, 322

Governance and, 342

Management of, 342

Metadata for, 307

Unstructured data analytics, 509

Urgency, 583, 584

US Federal Rules of Civil Procedure (FRCP), 318

US FTC requirements, 236

US Library of Congress Classification, 313

US Postal Service State Codes, 354

US Privacy Act, 53

User acceptance testing (UAT), 183

User data entitlement, 263

Utility computing, 178

Validation, 362

Value of data, 17

Virtual machine image, 178

Virtual machines (VMs), 184

Virtualization, 177–78

Virus, 243

Vision

Communicating the, 586–88, 595–96

Effective, 592–93

Framing, 604

Importance of, 591

Visualization, 57, 510–11, 516

Vital record, 317

Vocabulary

Controlled, 309, 311, 313, 333

Micro-controlled, 311

Vocabulary management. See also Controlled vocabulary

Vocabulary view, 310–11

Vulnerability, 223

W3C Web Ontology Language (OWL), 335

Warren, Samuel, 53

Wear-your-own-devices (WYOD), 325

Web address, 256

Websites, 92

White hat hacker, 242

Workflow content development and, 322

Workflow tools, 93, 333

Worm, computer, 244

WYOD. See Wear-your-own-devices (WYOD)

XMI. See Extensible markup interface

XML. See Extensible markup language

XML databases, 189

Zachman Framework, 102, 103, 104

Zachman, John A., 102