open source cloud

Addressing Security, Quality and Governance of Big Data

Addressing Data Quality

Article sponsored by SAS Software and Big Data Forum

Big Data is quickly being recognized as a valuable influencer of business strategy, able to improve productivity, streamline business processes, and reduce costs. However, not all data holds the same value and organizations need to take care to address the quality of the data they’re exploiting, while carefully managing security and governance concerns.

Data Quality

Blindly trusting business reports to be based on sound and quality information can lead not only to embarrassment but also business decline should the foundational data be found lacking. For this reason ensuring the data your organization employs in its analytics and reporting is of both relevant and high quality is of the utmost importance. While only using high-quality data is a sound principle, it is a case more easily said than done. Understanding where data originated, who has control and accountability for it, and precisely what the quality standards of your organization’s data should be, are significant tasks that must be undertaken. Moreover, while software exists which helps with data correction and error analysis, such tools only address part of the problem. To best meet the challenge of ensuring high-quality data, businesses need to implement a plan that helps identify quality issues, chase down the causes, and create problem resolution strategies.

carol-newcomb

Carol Newcomb, Senior Data Management Consultant at SAS, suggests a sustainable plan for managing data quality, warning that the process is not likely to be simple and including many steps such as the implementation of rules for collecting or creating data, data standardization and summarization rules, data integration rules with other sources of data, and hierarchy management.

Newcomb asserts that an effective, sustainable data quality plan should include the following five elements:

  • Elevate the visibility and importance of data quality.
  • Formalize decision making through a data governance program.
  • Document the data quality issues, business rules, standards and policies for data correction.
  • Clarify accountability for data quality.
  • Applaud your successes.

Considering reports from Gartner analysts that by 2017, one-third of the world’s largest companies will experience information crises due to an inability to adequately value, govern and trust their enterprise information, it’s crucial that businesses put data quality programs in place.

Data Regulations, Security & Privacy

The ITRC’s latest Data Breach Report points to 500 data breaches in the first half this year with more than 12 million records compromised. Such breaches expose Social Security numbers, medical records, financial information and more, putting individuals at risk. It’s no wonder privacy is such a concern as the mountains of data increase exponentially day by day. Though the ability to track customers and predict future behaviors is of great benefit to many companies, it’s a trade-off for most consumers as privacy is eclipsed by the convenience and assistance that data analysis and prediction provides. And although organizations such as Google promise data anonymization, it’s impossible to know how carefully our privacy is guarded, while the increasing popularity of the Internet of Things means our engagement with the internet and data collection is only escalating.

shutterstock_297436073

(Image Source: Shutterstock)

This extensive data does offer many noble assistances, not least of all patient monitoring for superior and prompt medical care, and real-time data utilization in classrooms ensuring education systems are functioning efficiently. And so perhaps data governance and regulation can help mitigate the risks without abandoning the rewards. States Scott Koegler of Big Data Forum, “Pulling actionable but protected data is key to developing advanced business practices while protecting customer identity.” A ‘Zero Trust Data’ policy is a potential solution wherein access to data is denied by default and always requires verification. In this way, data is made available to those legitimately requesting it, but information is correctly de-identified.

By designing efficient data management policies and properly adhering to regulations, companies are able to reap the benefits of Big Data without infringing on the privacy and security of individuals’ data. Furthermore, applying quality control systems to data collection and management enhances the value businesses draw from their data without needlessly breaching confidentiality. Ultimately, the time expended in data security, quality, and governance benefits the businesses who use it as well as the individuals and communities to whom it relates.

By Jennifer Klostermann

Jennifer Klostermann

Jennifer Klostermann is an experienced writer with a Bachelor of Arts degree majoring in writing and performance arts. She has studied further in both the design and mechanical engineering fields, and worked in a variety of areas including market research, business and IT management, and engineering. An avid technophile, Jen is intrigued by all the latest innovations and trending advances, and is happiest immersed in technology.

Google Driverless Car
The Lighter Side Of The Cloud - Snowball Effect
The Lighter Side Of The Cloud - Disaster Recovery
The Lighter Side Of The Cloud - Thunderstorm
The Lighter Side Of The Cloud - The Robo-Revolution
The Lighter Side Of The Cloud: Disaster Recovery Plan
The Cloud Debate - Private, Public, Hybrid or Multi Clouds?

The Cloud Debate – Private, Public, Hybrid or Multi Clouds?

The Cloud Debate Now that we've gotten over the hump of whether we should adopt the cloud or not, "which ...
Everyone Has Data, but the Ones Who Can Optimize It Will Be the Winners

Everyone Has Data, but the Ones Who Can Optimize It Will Be the Winners

Big Data Strategies Data is ubiquitous, but success apparently isn’t. Companies using big data strategies are running headlong into an 85 ...
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
Istio 1.0: Making It Easier To Develop and Deploy Microservices

Istio 1.0: Making It Easier To Develop and Deploy Microservices

With the recent availability of Istio 1.0 it is not surprising that it continues to capture much attention from the ...
GDPR Compliance

A Quick and Dirty Guide to GDPR Compliance

GDPR Compliance Set a reminder: On May 25, 2018, the new General Data Protection Regulation directive from the European Union ...
The Shift from Monolithic to Microservices: What It Means for CTOs.

The Shift from Monolithic to Microservices: What It Means for CTOs.

The Shift to Microservices The shift in application development strategies is moving from monolithic design to isolated and resilient components ...
Chris

How to Avoid Becoming Another Cloud Security Statistic

Cloud Security Statistic Last year, Gartner predicted that, by 2020, 95 percent of all cloud security failures will be caused ...

CLOUDTWEAKS CONTRIBUTOR PROGRAM

Join the CloudTweaks thought leadership contributor program which includes a customized profile, branded identity page, newsletter marketing, social amplification and more... Stand out as an expert in your field.

The program is currently available to consultants, influencers or executive level contributors.