Abstraction category, 165
Abuse
Intentional, 239
Unintentional, 239
Access, 249
Access controls, 200
Access to data, 238
ACID, 179
Administrative and Audit Duties Risk, 254
Adware, 243
Affiliation management, 365
Aiken, Peter, 39
Aiken’s pyramid, 40
American National Standards Institute, 144
Amsterdam Information Model, The, 34–35, 35
Analytical model, 521–22
ANSI Standard 859, 326
Anti-virus software, 256
Apache Mahout, 521
Application coupling, 281
Application DBA, 174
Application security requirements, 261
Architects, 101
Architectural design diagrams, 115
Architecture, 97
Architecture designs, 116
Architecture framework, 102
Architecture initiation projects, 118
Archiving process, 189, 279
ARMA GARP® principles, 340, 343
ARMA International, 306
Assessments, 79–80
Asset, 20
Asset management software, 115
Asset tracking, 213
Asynchronous data flow, 277
Authoritarian decree, 590
Authority list, 312
Backup and recovery activities, 327
Backup files, 198
Backup software, 198
BASE, 179
Basel II Accord, 247
Batch change data capture, 393
Batch data integration, 276, 291
Batch interaction, 275–76
Belmont Principles, 52
Bias
Data processing and, 58–59
Types of, 58–59
Bi-Directional metadata architecture, 433
Big data, 497–99, 502–4
Cloud storage and, 520
Principles of, 500
Sources of, 504
Tools for, 517–18
Big data modeling, 522
Big data strategy, 511–12
Black Hat hackers, 242
Blockchain databases, 177
Bot, 229
Brandeis, Louis, 53
Brewer’s Theorem, 180
Bridges, William, 575–76
Bridges’s Transition Phases, 575
Bring-your-own-devices (BYOD), 325
Business alignment, 80
Business bias, 59
Business continuity group, 198
Business Continuity Plan, 197, 281, 327
Business data steward, 77, 342
Business glossary, 90, 92, 427, 580
Business growth, 220
Business intelligence, 57, 63, 384
Portfolio for, 398
Self-service, 408
Tools for, 403
Business intelligence and analytic functions, 40
Business metadata, 422–23
Business performance management, 405
Business rules, 289
Critical data and, 474–75
Data integration and, 295
Business vocabulary, 154
BYOA. See Bring Your Own Apps
BYOD. See Bring-your-own-devices (BYOD)
C, 71
CAD / CAM. See Computer assisted design and manufacturing
Canada Bill 198, 49, 316
Canadian Privacy law (PIPEDA), 54–55, 236
Candidate Identification, 363
Canonical data model, 279–80
CAP Theorem, 180
Capacity and growth projections, 190
CDMP, 65
CDO Organizational touch points, 81
Centralized databases, 175
Change
Capacity to, 80
Checklist for managing, 576–77
Laws of, 574
Sustaining, 603
Change management, 573
Change agent, 574, 577, 590, 597
Change data, 190
Change data capture, 276
Change management
Communication and, 590
Complacency and, 577
Errors of, 577–78, 582
Transition and, 575–77
Vision for, 578
Change Management Institute, 85
Change managers, 575, 577
Change vision, 604
Charts and graphs, 57
Chief data officer, 81
Chief information officer, 32
Chisholm, Malcolm, 350, 351
Class words, 161
Classification schemes, 313
Cloud computing, 177, 265
Cloud storage, 520
Cloud-based integration, 285
CobiT. See Control objectives for information and related technology.
Collaborative readiness, 80
Collection, 319
Columnar Appliance Architecture, 519
Columnar-based databases, 181
Column-oriented databases, 186–87
Commercial of the Shelf (COTS), 479
Communication interrogatives, 103
Communication plan, 605–6, 608
Competitive advantage, 18, 237
Complacency, 578, 584
Completeness category, 165
Complex event processing solutions (CEP), 284, 292
Compliance activities, 255–56
Computer assisted design and manufacturing, 189
Computer worm, 244
Confidentiality classification, 248
Confidentiality data restrictions, 235
Configuration management, 409
Configuration management tools, 427
Consistency category, 166
Content
Capturing, 326
Definition of, 307
Lifecycle of, 307
Content delivery channels, 330
Content delivery methods, 308
Content handling polices, 324
Content information architecture, 325
Content lifecycle, 307
Content management, 307, 324
Content management software, 311
Content Management System (CMS), 323, 330, 332
Content metadata, 307–8
Content modeling, 308
Context diagram, 36
Big data and data science, 499
Components of, 37–39
Data architecture, 100
Data governance and stewardship, 69
Data modeling, 124
Data quality, 451
Data security, 219
Data warehouse/business intelligence, 382
Defined, 37
Documents and content, 304
Knowledge area, 37
Metadata, 419
Reference and master data, 348
Contractual restrictions, 237
Control activity, 38
Control objectives for information and related technology, 71
Controlled vocabulary, 309, 311, 313, 333
Coordinating data steward, 77
Corporate Information Factory (CIF), 386–88, 388
Correctness category, 165
Covey, Stephen, 598
Critical data, 474–75
Critical Risk Data (CRD), 224
Cross-reference data sets, 354
CRUD, 258
Cultural change, 119
Customer relationship management (CRM), 84, 366, 368
DAMA Data Management Function Framework, 35–39, 42
DAMA Functional Area Dependencies, 41
DAMA International, 64
DAMA International’s Certified Data Management Professional (CDMP) certification, 65
DAMA Knowledge Areas, 40
DAMA Wheel, The, 35, 40, 43, 44
DAMA’s mission, 44
DAMA-DMBOK, 35–39, 43–46
Data
Analysis, 514
As an asset, 17, 20, 23, 52
Business acceptance of, 411–12
Critical, 454
Ethical approach to, 20
Ethical principles of, 52–53
Monetary value of, 24
Ownership of, 56
Risks and, 28, 30
Sensitive, 217–20
Storage containers for, 201
Types of, 29
Understanding of, 18–20
Value of, 24–25
Data access, 197
Data access control, 249
Data acquisition, 361–62
Data administration, 170
Data aggregation, 60
Data analysis tools, 485
Data and enterprise architecture, 109
Data and information relationship, 20, 33
Data architects, 101, 567
Data architecture, 45, 98, 110
Goals of, 99
Implementation guidelines and, 117–18
Data architecture artifacts, 90
Data architecture governance, 119
Data as a service (DaaS), 285
Data asset, 91
Data asset valuation, 77–79
Data attribute, 155
Data audits, 213
Data availability, 227
Data capture
Change, 276
Data category, 166
Data cleansing, 471
Data consistency, 249
Data consumers, 399
Data dictionary, 402, 429
Data discovery, 287
Data enhancement, 471–72
Data exchange specification design, 290
Data Exchange Standards, 286
Data Federation, 285
Data flows, 107–9
Diagram, 108
Integration, 291
Data governance, 45, 53, 64, 67, 73
Goals of, 71–72
Guiding principles for, 71, 73, 305, 421
Implementation of, 88
Issue management, 86
Issue management for, 85
Organizational culture and, 93
Orgnizations and, 79
Procedures for, 87
Readiness assessments and, 79–80
Regulatory compliance and, 70–71
Tools and techniques for, 92
Data governance and data management, 72
Data Governance Community of Interest, 91
Data governance council, 32, 83, 84, 86, 90, 91, 93, 248
Data governance operating framework, 83
Data governance organization parts, 74
Data governance organizations, 73, 91
Data governance program, 43
Implementation guidelines for, 93
Measurement and, 94
Data governance scorecard, 93
Data governance standards, 88–90
Data Governance Steering Committees, 93
Data governance strategy, 31, 82
Data governance team, 445
Data handling
Current state and, 61
Improvement strategies and, 62
Risk reduction and, 61–62
Data handling ethics, 49, 51
Data insights, 500, 517
Data integration, 59–60, 299
Near-real time, 277
Profiling and, 288
Synchronous, 277–78
Data integration & interoperability (DII), 45, 269–71, 272, 286
Data integration activities, 286–89
Data integration processes, 372, 376, 392–94
Data integration solutions
Business rules and, 295
Design of, 289
Mapping sources and, 290
Data integration tools, 402–3, 403, 428
Data integrity, 226
Data issue escalation path, 86
Data lake, 505
Data lifecycle, 28–29, 41, 287
Data lifecycle key activities, 29
Data lineage, 264, 287, 298
Data loading requirements, 201
Data loss, 211
Data management, 17, 30–31, 67
Challenges of, 20
Consumers for, 38
Data quality and, 25
Enterprise perspective and, 27
Goals of, 18
Initiatives and, 84
Inputs and, 38
Metadata and, 417–19
Participants in, 38
Specialized hardware for, 182
Data management activities
Control, 38
Development, 38
Operational, 38
Planning, 38
Data management framework, 33
Data management implementation roadmap, 32
Data management maturity, 80
Data management plan, 605
Data management practices, 89, 573
Assessment of, 80
Data management procedures
Components, 89
Data management professionals, 17, 573
Data management program, 609
Human resources and, 607
Data management program charter, 32
Data management scope statement, 32
Data management strategy, 31–33, 94
Components of, 32
Deliverables from, 32
Data map, 318, 337
Data marking, 60
Data marts, 392
Data mashups, 511
Data masking methods, 60, 227, 228, 253
Data migration, 208–9, 292
Data mining, 507–8
Data mining snooping, 58
Data model
Integration in, 164
Versioning of, 164
Data model management, 360
Data model repositories, 115
Data modeler, 160
Data modeling, 45, 123–26
Goals of, 125
Standards for, 161, 162
Data modeling tools, 115, 209, 295, 430, 485
Data models
Evaluation of, 515
Data movement, 272
Data naming standards, 161
Data operations and storage activities, 193–96
Data orchestration, 291
Data parsing process, 472
Data patches, 469
Data policy, 77, 83
Data privacy laws, 53–56
Data processing errors, 193
Data producer, 162
Data producing applications, 292
Data product development lifecycle, 400–401
Data professionals, 63, 162
Data profiling processes, 288, 470, 476
Data profiling tools, 295, 485
Data quality, 25–26, 46, 449–52, 453–54
Goals of, 452–53
ISO standards for, 461–62
Measurement of, 479–81
Reporting processes on, 484
Statistics about, 25
System design and, 468
Data quality analysis, 80
Data quality assessment, 475
Data quality business rules, 25–26
Data quality dimension, 454–60
Data quality goals, 477
Data quality improvement
Cultural change and, 492–93
Implementation guidelines for, 490–91
Risk assessment and, 491
Data quality improvement lifecycle, 462–64
Data quality issues
Causes of, 465–70
Corrective actions and, 486–87
Data entry and, 466
Data processing and, 468
Leadership and, 465–67
Manual data patches and, 469
Operating procedures for, 481–83
Preventive actions and, 486
Data quality metrics, 494
Data quality policy, 493–94
Data quality program governance, 493
Data quality strategy, 474
Data recovery plan, 197
Data recovery software, 198
Data regulations, 220, 248
Data remediation, 60, 397
Data replication process, 191, 202
Data retention plan, 193, 286
Data risks, 70
Data rule templates, 485
Data scaling, 191
Data science, 497–502, 514
Data science tools, 517–18
Data security, 45, 193, 217–20
Bill of Rights, 252
Business requirements, 217–20, 245
Goals of, 222
Monitoring of, 226, 253–55
Outsourcing, 264
Password for, 234
Regulatory requirements for, 246
Requirements for, 225
Risk assessment and, 262–63
Data Security Bill of Rights, 252
Data security governance, 265
Data security management
Four A’s of, 225
Guiding principles for, 222
Data security policy, 247–48, 251
Data security practices, 262
Data security requirements, 218
Data security restrictions, 234–37
Data security risks, 220
Data security standards, 245, 248
Data security vocabulary, 229–32
Data services, 291
Data sharing agreements, 298, 377
Data source governance, 413
Data sources, 512–13
Evaluation of, 370–72
Ingesting, 512–13
Data standardization, 473
Data Standards Steering Committee, 89
Data stewards, 76–77, 90, 247, 252, 255, 263, 356, 371
Coordinating, 77
Executive, 76
Data stewardship, 75
Committee for, 86
Team for, 86, 91
Data storage and operations, 45
Data storage areas, 391–92
Data storage environment, 201
Data storage goals, 171, 181
Data storage governance, 213
Data storage metrics, 212
Data storage systems, 184–89
Data strategy, 32
Components of, 32
Ownership of, 32
Data structures, 290
Data technology requirements, 194
Data transformation, 397, 473
Data transformation engine, 294
Data validation, 213, 362
Data valuation, 24–25
Data vault, 393
Data virtualization, 285
Data virtualization servers, 294
Data visualization, 510–11, 516, 520
Data warehouse, 381–83, 384
Approaches to, 385
Batch change data capture for, 393
Critical success factors for, 523
Development tracks for, 396
Goals of, 383
Governance in, 411
Historical data and, 392–93
Population of, 397
Requirements of, 394
Data warehousing, 46, 385
Critical success factors, 410
Database, 172
Hierarchical, 184
Multidimensional, 185
Temporal, 185
Types of, 175
Database abstraction, 172
Database access control, 200
Database administrator (DBA), 170, 173, 194, 195, 196, 201, 211–12
Database as a service (DaaS), 178
Database availability
Factors affecting, 204
Loss factors of, 204
Online criteria for, 204
Database backup, 198
Database catalogs, 428
Database execution, 205
Database log techniques, 393
Database management
Organizational change and, 211–12
Database management system (DBMS), 185
Database management technology
Naming conventions and, 210
Script files and, 210
Software for, 194
Tools, 209
Database management tools, 209
Database monitoring tools, 209
Database Organization Spectrum, 184
Database performance
Monitoring to improve, 205
Tuning to improve, 173
Database processes
Archiving, 189
Capacity and growth projections of, 190
Change data within, 190
Purging, 191
Replication of, 191
Resiliency of, 192
Retention of, 193
Sharding of, 193
Database processing, 179
Database storage systems, 196
Database support, 169, 196
Database systems administration tasks, 199
Database technology
Managing, 194–96
Monitoring of, 195
Support of, 170
Databases
Alternative environments for, 207
Centralized, 175
Columnar-based, 181
Column-oriented, 186–87
Data loading and, 201
Development environment and, 182
Distributed, 175
Flat file, 187
Key-value pair, 188
Multimedia, 187
Non-relational, 186
Object/Multimedia, 187
Processes of, 189–93
Relational, 185
Spatial, 187
Specialized, 188
Triplestore, 188
Types of, 184–89
Usage patterns of, 196
Databases process, 189–93
Data-centric organization, 73
DBA. See Database administrator
Decision support systems (DSS), 381
Default passwords, 241
Definitions category, 166
Deming, W. Edward, 51
Denormalization, 150
Design review, 163
Destination (VISION), 575
Detection and recovery risk, 254
Developer support tools, 209
Developers, 183
Development activity, 38
Development DBAs, 174
Development environment, 182, 183
Device access policies, 325
Dewey Decimal System, 313
Dice, 406
Diffie-Hellman Key Agreement, 227
Diffusion of Innovations theory, 599
Digital asset management (DAM), 318, 331
DII governance, 297–98
DII solutions, 293
Dimensional data warehouse, 388–90
Directory, 428, 429, 430
Disaster Recovery Plan, 327
Disasters, 192
Discovery, 80, 287, 318–20
Disk storage, 181
Distributed databases, 175
Distributed file-based solutions technologies, 519–20
DMBOK Pyramid, 39–40
Document / record, 315
Audit of, 329
Management of, 328
Retention of, 328
Document and content knowledge, 305–6
Document and content management, 45, 303
Regulatory compliance and, 304–5
Document library system, 330
Document management, 305, 315–17, 323, 331
Document management system, 330
Document management tool, 93
Document repository, 331
Document sanitization, 262
Drill down, 407
Dublin Core, 309
DW usage metrics, 413
DW/BI architecture, 395
Dynamic data masking method, 228
ECM. See Enterprise Content Management Systems
ECM readiness assessment, 338
E-discovery, 305, 336
Key Performance Indicators (KPIs) and, 343–44
E-discovery assessment, 339
EDM. See Enterprise Data Model
EDRM. See Electronic Discovery Reference Model (EDRM)
Electronic data interchange (EDI), 266
Electronic Discovery Reference Model (EDRM), 318
Electronic documents, 318
Electronic point of sale (EPOS) apps, 309
Electronic records, 305, 323
Electronic technology and business growth, 221
ELT. See Extract-Load-Transform
ELT Process Flow, 275
Encryption, 226, 227, 241, 258, 262
English, Larry, 457
Enrichment, 362
Enterprise application integration model (EAI), 283
Enterprise architectural framework, 102–4
Enterprise architecture, 98, 109, 110, 265
Enterprise asset, 17
Enterprise Content Management (ECM), 307
Cultural change and, 339
Guidelines for, 337
Key Performance Indicators (KPIs) and, 344
Enterprise data architecture, 119–23
Enterprise data architecture steering committee, 90
Enterprise data governance council, 74
Enterprise data model, 90, 105–7, 106
Enterprise data warehouse, 385
Enterprise integration tool, 296–97
Enterprise message format, 279
Enterprise perspective and data management, 27
Enterprise resource planning (ERP), 84, 201, 271, 368
Enterprise service bus (ESB), 281, 283, 294
Enterprise standards, 289
Entity resolution, 362
Environmental factors hexagon, 35, 36
Equivalent term relationship, 311
ERP. See Enterprise resource planning
Ethical data handling, 49, 51, 60–61, 61–62, 62, 64
Ethical data management, 49, 57
Ethical Risk Model, 64
Ethical risks, 59
Ethics, 49
ETL data flows, 291
ETL process flow, 274
ETL processes, 485
EU Basel II Accord, 247
EU Privacy Directives, 236
European Convention of Human Rights, 53
European Data Protection Supervisor, 52
Event processing method, 284, 292
Event-driven data integration, 277
Everett Rogers Diffusion of Innovations, 600
Excessive privileges, 238
Executive data stewards, 76
Extensible markup interface, 334
Extensible markup language, 334
External data, 202
Extract- Load-Transform (ELT), 274
Extract process, the, 273
Extract-Transform-Load (ETL), 205, 273, 275
Faceted taxonomies, 311, 313
Family Educational Rights and Privacy Act, 237
FASB. See Financial Accounting Standards Board
Fast data integration, 278
Federal Rules of Civil Procedure, 316
Federal Trade Commission, 55
Federated architectures, 176
Federation provisions data, 176
FERPA. See Family Educational Rights and Privacy Act
Financial Accounting Standards Board, 87
Financial assets, 23
Financial master data, 367
Financially sensitive data, 237
Firewalls, 230, 257
Flash memory, 182
Flat file databases, 187
Folksonomies, 309, 313
Frameworks. See Data management frameworks
Freedom of speech, 56
GASB. See Government Accounting Standards Board (U.S.)
General Data Protection Regulation, 54
Generally Accepted Recordkeeping Principles, 338
Geographic classification, 356
Geographic information systems (GIS), 325
Geo-statistical reference data, 356
Geuens, Sue, 40
Gleicher formula, 577
Glossary, 90
Godin, Seth, 599
Golden record, 358–59
Goodwill, 20
Governance. See also Data Governance
Government Accounting Standards Board (U.S.), 87
Graphical design applications, 115
Group Think, 589
Guiding principles
Data governance, 71, 73, 305, 421
Data security management, 222
Hacking/Hacker, 241
Hadoop, 519
Hash algorithms, 177
Hash encryption, 227
Health Information Protection and Portability Act (U.S.), 49
Healthcare Information Portability and Accountability Act (HIPAA), 254
Hierarchical database organization, 184
Hierarchical relationship, 312
Hierarchical Storage Management System, 187
Hierarchical taxonomy, 312
High Risk Data (HRD), 224
Historical data, 392–93
HOLAP. See Hybrid online analytical processing
Hot backups, 198
Hub-and-spoke data pattern, 279
Hub-and-spoke interaction model, 280–81
Hybrid online analytical processing, 407
Identity, 56
Identity management technology, 257
Identity resolution, 364
IM. See Instant messaging (IM)
Image processing technology, 331–32
Imhoff, Claudia, 386
Inconsistencies
Explaining, 597–98
In-database algorithm, 520
Indexing, 157
Industry reference data, 356
Industry-based regulations, 237
Information and Communication Technology Research, 52
Information and data relationship, 20
Information architecture, 320
Information asset, 30
Information asset tracking, 213
Information consumer, 162
Information content architecture, 329
Information Council, 342
Information economy, 17
Information gaps, 30, 91
Information governance, 340–42
Information Governance Maturity Model (IGMM), 338
Information Governance Reference Model (IGRM), 341
Information management change initiative, 588
Information management context, 596
Information management disciplines, 52
Information quality change, 599
Information security
Data classification and, 220
Techniques for managing, 258–59
Tools used in, 256–58
Vocabulary for, 223–24
Information Security and Corporate Counsel, 255
Information security team, 224–25
Information Systems Planning (ISP) method, 109
Information technology and data management, 30–31
Information technology infrastructure library (ITIL), 194, 199
In-Memory databases (IMDB), 181
Inmon, Bill, 385
Innovation, 601
Instant messaging (IM), 244
Integration cloud-based system, 285
Integration testing, 183
Intentional abuse, 239
Interaction, 280–81, 290
Hub-and-spoke, 280–81
point-to-point, 280
Publish and subscribe, 281
Internal integration requirements, 285
Intrusion detection system (IDS), 240, 257
Intrusion prevention system (IPS), 239, 240, 257
Islands of data, 249
ISO 15489, 316
ISO 8000, 461
ISO State Code, 354
Issues management, 86–87
IT governance, 71
ITIL. See Information technology infrastructure library (ITIL)
JSON. See JavaScript Object Notation (JSON)
Justice/Fairness ethical principle, 58
Key exchange, 227
Key performance indicators (KPIs), 343
Key-value, 144
Key-value pair database, 188
Kimball, Ralph, 388
K-Means clustering, 514
knowledge, 18
Kohonen M, 508
Kotter, John P., 578, 581, 582, 584, 586, 593
Lambda architecture design, 181
Latency, 275
Laws of change, 574
Leader’s Data Manifesto, The, 31, 450
Leadership, 588
Leadership alignment, 560
Legal master data, 367
Legitimate database privileges abuse, 238–39
Licensing agreements compliance, 213
Lifecycle management, 41, 323
List, 353–54
Litigation playbook, 336
Load processes, 274, 401
Location master data, 368
Log shipping vs. mirroring, 192
Logical data names, 161
Lone CEO scenario, 587
Loosely-coupled systems, 177
Loshin, David, 351
Low Credibility Committee, 587
Machine learning, 506–7, 507
Machine readable catalog, 331
Malicious hacker, 242
Malware, 242
Managed database hosting, 178
Management lifecycle, 316
Managers, 586
Mapping management tools, 429
Mapping process, 275
MapQuest, 189
MapReduce, 176
MARC. See Machine Readable Catalog
Market timing, 57
Martin, James, 109
Mashups, 511
Massively parallel processing (MPP), 517, 518–19
Master data, 347–48, 357
Business drivers and, 349
Governance policy and, 373
Master data ID management, 365
Master data integration, 369
Master data management (MDM), 70, 359–61, 370–71, 372
Goals of, 349–50
Tools and techniques of, 375
Master data sharing architecture, 370, 376
Matching. See Candidate identification
Matching workflows, 364
Media monitoring, 507
Medically sensitive data, 237
Menlo Report, 52
Messaging interaction, 394
Metadata, 19, 27, 46, 221, 417
Categorization and, 324
Content, 307–8
Data quality and, 461
Data risks and, 418
Definition of, 417
Delivery mechanisms for, 439
Directory of, 429
Impact analysis of, 441–43
Importance of, 417–19
Integration of, 439
Managed environment for, 436
Management of, 308
Repository for, 426, 440
Repository model for, 437
Scope of, 434
Sources of, 425–26
Types of, 422–24
Unreliable, 60
Unstructured data and, 307, 424–25
Uses of, 440
Metadata architecture, 431, 433
Centralized, 431
Distributed, 432
Metadata environment, 444
Metadata governance, 445
Metadata initiatives, 445
Metadata leveraging, 420
Metadata management system, 436
Metadata management tools, 440
Metadata registries (MDR), 210
Metadata registry standard, 424
Metadata repository, 402
Metadata repository metamodel, 437
Metadata repository model, 258, 296, 436–37
Metadata requirements, 435–36
Metadata standards, 437, 446
Metadata stores, 430
Metadata strategy, 434
Phases, 435
Risk assessment and, 444
Metadata tags, 443
Metadata, 447
Metrics, 94, 259
Data protection, 261
Security, 259–60
Security awareness, 260
Micro-controlled vocabulary, 311
Micromanagement, 590
Misleading visualizations, 57
Mission accomplished syndrome, 581
Models and diagrams
Clarity of, 116–17
Moderate risk data (MRD), 224
MOLAP. See Multi-dimensional online analytical processing
Monitoring authentication, 253
Morris, Henry, 405
Multidimensional database technologies, 185
Multidimensional eXpression, 185
Multi-dimensional online analytical processing, 407
Multi-master replication, 191
Multimedia database, 187
Multi-temporal database, 185
National Information Exchange Model (NIEM), 286
Near real-time model, 295
Near-real-time data, 394
Network storage administrators (NSAs), 196
Network taxonomy, 313
Network-based audit appliance, 254
Neutral zone, 575
NIST risk management framework, 225
Node, 172
Non-relational database, 186
NoSQL, 124, 129, 130, 136, 137, 143, 144, 152, 154, 165, 188, 196, 334
Nullability, 165
Obfuscation data, 60, 227, 228
Object to processing of personal data, 54
Observability, 603
OCM. See Organizational change management (OMC)
OCR software, 330
ODBC. See Open Database Connectivity
OLAP. See Online analytical processing
OLTP. See Online transaction processing (OLTP)
Online analytical processing, 405
Online data
Ethical uses of, 56
Online freedom of speech, 56
Online transaction processing (OLTP), 189
Ontology, 102, 314, 355
Open Database Connectivity, 172
Open Geospatial Consortium standard, 187
Operating framework, 71
Operational activity, 38
Operational analytics, 510
Operational data store (ODS), 392
Operational metadata, 423
Operational reports, 387, 395, 404
Orchestration data, 291
Orchestration process, 282
Organization
Cultural change and, 119
Data-centric, 73
Organization for Economic Co-operation and Development (OECD), 53
Organizational behavior, 92
Organizational change management (OCM), 85–86
Organizations and cultural change, 263, 297
Outsourcing and data security, 264
OWL. See W3C Web Ontology Language
Ownership of data, 56
Party master data, 366–67
Password, 234, 257
Payment Card Industry Data Security Standard (PCI-DSS), 87, 237, 247
PCI contractual obligations, 236
PCI-DSS. See Payment Card Industry Data Security Standard (PCI-DSS)
Performance metrics, 119–23
Performance testing, 183
Perimeter, 230
Persistent data masking method, 227
Personal data, 54
Personal health information (PHI), 237
Personal Information Protection and Electronic Documentation Act, 49
Personally private information (PPI), 236
PGP (Pretty Good Privacy), 227
Phishing, 242
Physical assets, 23
Physical data names, 161
Pick lists, 311
PIPEDA. See Personal Information Protection and Electronic Documentation Act
Pivot, 407
Planning activity, 38
PMO. See Project management office
POC. See Proof of concept
Point-to-point interaction model, 280
Policies and content handling, 324
Policy
Data security, 247
Political governance, 73
Polyhierarchy, 313
Portability, 54
Predictive algorithms, 59
Predictive analytics, 508–9, 515
Predictive Model Markup Language (PMML), 521
Predictive models, 514
Pre-production environments, 182
Prescriptive analytics, 509
Preservation, 319
PRISM, 161
Privacy law
Canadian, 54–55
Private-key encryption, 227
Privileges
Legitimate database, 238–39
Unauthorized, 239
Procedural DBAs, 174
Process controls, 282
Product data in manufacturing execution systems (MES), 368
Product data management (PDM), 368
Product lifecycle management (PLM), 367
Production DBA, 173, 174
Production environment, 182
Project management office, 84
Proof of concept, 195
Proprietary reference data, 356
Public policy and law, 53
Public-key encryption, 227
Publish and subscribe model, 281
Purging, 191
Quality assurance certification, 173
Quality assurance testing (QA), 183
Quality data
High, 473–74
Metrics for, 487–88
Queryable audit data, 408
Query-level access control, 238
RACI. See Responsible, Accountable, Consulted, and Informed
RDBMS. See Relational database management system (RDBMS)
RDF. See Resource description framework (RDF)
Readability category, 166
Readiness assessment, 210
Really Simple Syndication (RSS), 309
Real-time data, 394
Real-time data integration flows, 292
Real-time data processing solution, 293
Realtime data synchronization, 277–78
Record quality, 342
Record system of, 358
Records, 315
Records management, 305, 317–18, 323, 332
Electronic documents and, 318
Key Performance Indicators (KPIs) and, 343
Maturity model for, 338–39
Principles of, 306
Recovery types, 192
Redacting data, 60
Reference and master data, 46
Reference data, 351, 350–57
Change and, 376–77
Geo-statistical, 356
Industry, 356
Ontologies and, 355
Proprietary, 356
Standard, 357
Structure, 353
Taxonomies in, 355
Reference data management, 430
Reference data sets
Assessment of, 373
Governance and, 375
Reference directories, 368
Regulated data, 236
Regulated information, 248
Regulatory classification, 252
Regulatory compliance, 87
Data governance and, 70
Questions on, 87
Regulatory requirements and data security, 246
Regulatory risk, 254
Reification transformations, 103
Related term relationship, 312
Relational database, 185
Relational database management system (RDBMS), 185
Relational OLAP, 407
Relative advantage, 602
Release management, 399
Remediation, 397
Replication, 191
Replication patterns
Log shipping, 192
Mirroring, 192
Replication process, 202
Replication scheme, 193
Replication solutions, 278–79
Reporting strategies, 412–13
Repository scanning, 439
Requirements analysis, 155
Resiliency, 192
Resource description framework (RDF), 335
Resource description framework schema (RDFS), 314
Responsible, Accountable, Consulted, and Informed, 264
Retrieve response or performance metrics, 414–17
Right to be Forgotten, 56
Risk, 223–24
Risk assessment, 210
Risk classifications, 224
Risk model, 63
Risk of Reliance on Inadequate Native Audit Tools, 254
Risk reduction and data security and, 220
Rivest-Shamir-Adelman (RSA), 227
Roadmap, 111–13, 409
Rogers, Everett, 599
ROLAP. See Relational online analytical processing
Role assignment grid, 250
Role assignment hierarchy, 250
Roll up, 407
Root cause analysis, 490
SaaS applications. See also Data as a Service (SaaS)
SAN. See Storage area network
Sandbox, 184
Sarbanes-Oxley Act, 30, 49, 71, 254, 316
Scaling. See Data scaling
Scanning repositories, 439
Schema, 172
Schema.org, 336
Scheme category, 165
Search engine optimization (SEO), 321, 324
Security Breach of Information Acts, 236
Security compliance managers, 253
Security metrics, 259–60
Security patches, 258
Security Policy Compliance, 255–56
Security restrictions data, 234–37
Security risks assessment of, 250
Self-organizing maps, 508
Semantic modeling, 321
Semantic search, 321
Semi-structured data, 322
Sensitive data, 221–22, 325
Sentiment analysis, 507
Server administration teams, 205
Server virtualization, 178
Service accounts, 239–40
Service level agreements (SLAs), 203, 412, 483–84
Service registry, 430
Services-based architecture (SBA), 505–6
Sharding process, 193
Shared accounts, 240
Shared-nothing database technologies, 518
Shewhart/Deming cycle, 462
Simple knowledge organization system (SKOS), 335
Single family regulations, 236–37
SKOS. See Simple knowledge organization system
SLAs. See Service level agreements
Slice-and-dice, 406
SMART, 32
Smartphone, 602
Social engineering, 242
Social media policies, 324
Social networking sites, 244
Social system, 601
Social threats, 242
Software as a Service (SaaS), 285
Software configuration management (SCM), 199
Software testing process, 207
Solid state drives (SSDs), 182
Solvency II, 30, 87
Source-to-target mapping, 396
Sousa, Ryan, 386
Spam, 244–45
Spatial database, 187
Specialized database, 188
Specialized hardware, 182
Spyware, 243
SQL injection attack, 241
Stages of adoption, 601–2
Stakeholder analysis and communication planning, 606
Standard, 88
Standard markup languages, 333–34
Standard reference data, 357
Standardization, 362
Standards category, 165
Standards, data security, 245, 248
Star schema, 388
Statistical ‘smoothing’, 58
Statistical process control, 488–90
Stewardship, 366, 372, 374
Storage area network (SAN), 181, 196
Storage environment management, 199–200
Storage solutions, 279
Strategic alignment model, 33–35
Strategic plan, 31
Strategy, 31
Streaming, 394
Strong-Wang framework, 455
Structure category, 165
Structured query language (SQL), 185
Subject area coverage and data warehouse, 413
Subject area discriminator, 107
Subject area model, 107
Sustainability data governance and, 91, 94
Syndication, 308
Synonym ring, 312
System database, 201
System development lifecycle (SDLC), 126, 298
System of record, 358
System security risks, 238
Taxonomy, 312, 355, 397
Facet, 313
Faceted, 311
Hierarchical, 312
Network, 313
TCO, 213
Team collaboration tools, 333
Team, building a, 589
Technical metadata, 423
Technology readiness, 210
Temporal database, 185
Term management, 311–12
Terms, 311
Test data, 208
Test environment, 183
Text mining, 507–8
The four As of data security management, 225
The General Data Protection Regulation of the EU, (GDPR), 54
Third party data, 202
Threats, 223, 242
Tightly-coupled systems, 177
Timing, 57
Total cost of ownership (TCO), 213
Trade secrets, 237
Transaction log
Backup, 198
Dump, 198
Transform process, the, 273
Transition management. See also Change management
Transition, checklist for managing, 576–77
Trickle feeds, 394
Triplestore database, 188
Trojan horse, 243
Trusted source, 358–59
Unauthorized privilege elevation, 239
Uniform resource locators (URLs), 321
Unintentional abuse, 239
Unstructured data, 322
Governance and, 342
Management of, 342
Metadata for, 307
Unstructured data analytics, 509
Urgency, 583, 584
US Federal Rules of Civil Procedure (FRCP), 318
US FTC requirements, 236
US Library of Congress Classification, 313
US Postal Service State Codes, 354
US Privacy Act, 53
User acceptance testing (UAT), 183
User data entitlement, 263
Utility computing, 178
Validation, 362
Value of data, 17
Virtual machine image, 178
Virtual machines (VMs), 184
Virtualization, 177–78
Virus, 243
Vision
Communicating the, 586–88, 595–96
Effective, 592–93
Framing, 604
Importance of, 591
Visualization, 57, 510–11, 516
Vital record, 317
Vocabulary
Controlled, 309, 311, 313, 333
Micro-controlled, 311
Vocabulary management. See also Controlled vocabulary
Vocabulary view, 310–11
Vulnerability, 223
W3C Web Ontology Language (OWL), 335
Warren, Samuel, 53
Wear-your-own-devices (WYOD), 325
Web address, 256
Websites, 92
White hat hacker, 242
Workflow content development and, 322
Workflow tools, 93, 333
Worm, computer, 244
WYOD. See Wear-your-own-devices (WYOD)
XMI. See Extensible markup interface
XML. See Extensible markup language
XML databases, 189
Zachman Framework, 102, 103, 104
Zachman, John A., 102