MIS420
Team 1
Lisa Bella, Brittany Harrison, Marie Ross, Kameron Torres, Christian Whiles
In order for companies to succeed in the business world today it is important to understand their data and how to manage it. Many companies use software to analyze data received from vendors, clients, and departments; however, many do not have the framework of a good data governance program. According to SAS, Data governance is “how you collect, manage and archive data in your enterprise”. (Web, 4/29/16) A good data governance program will enable users to receive accurate data efficiently for business analytics, and for data mining. Although, it is possible to establish the framework for a good data governance program, the main impediments with data governance are that many corporations do not understand the importance of a good data governance program, do not realize that they even have a problem, or do not have the proper structures in place to effectively manage the data.
Mobile BI tools offer users the flexibility to make data-driven decisions anywhere anytime. With the right information users can make decisions faster giving companies that know how to leverage mobile BI an advantage over their competition. Unfortunately implementing successful mobile BI tools is very difficult. Users expect their mobile applications to function similarly to their desktop applications. Many people believe that mobile BI tools are simply shrunk down desktop applications, but designing mobile BI tools in this manner leads to messy slow applications. Mobile devices and therefore mobile BI tools are inherently limited by small screen sizes, touch screen capabilities, and inferior processing capabilities. These limitations make identifying a specific business need and user type crucial to developing a successful design for each mobile BI application. Mobile BI applications should be designed around simplicity and should break down data into bite sized pieces so that it can be easily consumed on a smaller screen. Each mobile BI application should have a highly focused front end and a highly connected backend that connects to the overall data warehouse and other applications. There are many design elements that can help make mobile BI applications successful some of the most important are tabbed pages, limited KPIs and visuals, large buttons, use of blank space, smaller form scale, and elements that adjust to different screen sizes. At this point mobile BI is still limited to consumption of information. Creating on such small screens with the limited functionality of a touch screen makes creating information frustrating. Tablets and syncing capabilities offer limited workarounds to the impediments to creation, but do not solve the problem. Mobile devices are also more easily stolen, lost, and hacked than traditional desktops. These security risks must be met with security measures that are baked into the mobile applications as they are being developed. Key security measures include passcodes, authentication, timeouts, data wipes, and mobile device policies.
With the advancement of business intelligence and technology, the term big data emerged. The concept of big data is relatively new. With the technology age, consumers are always using their devices. With emails, SnapChat, Instagram, Facebook, and other apps we spend a lot of our time on our devices. According to the article Big Data Possibilities, we generate more data in one minute than we did in the years between the beginning of time and the year 20003.2. There are endless possibilities with increase in data. With big data, companies will be able to learn about their consumers and make informed business decisions. The impediments of big data include the mindset of C-level employees, skills and knowledge barrier, cost, regulatory concerns, and high volume. If we utilize big data to its full potential, we will be able to understand our businesses and consumers better.
The size and complexity of data in an organization requires visualization to help users understand the data. Visualization allows all users to understand the patterns and trends through visual representation. The most common tool used in visualization is a dashboard. The dashboard includes graphs, charts, and images to help users understand the data. Understanding the data is vital to the success of a BI system within an organization.
Proper visualization takes real time data and forms relevant visual displays to keep users up-to-date. Being able to process real time data into useful information can benefit any organization. Seamless transformation of data into visuals is the key to a successful visualization strategy. Finding the balance between visual aesthetics and relevant information is a struggle for many. Some visualization strategies include very detailed aesthetics without the real time data. Other systems can’t seem to create the correct visuals to provide the right information in the right way. The perfect visualization uses creativity and BI to its fullest potential, delivering speed and reliability. Investing in visualization requires an understanding of what data needs to be displayed. It also requires being aware of what visualization techniques will best benefit the organization.
It’s 2016 and most, if not all companies are using some form of data warehousing to store valuable company information while transmitting this valuable information through VPN’s, the internet, cloudlets, and other forms of data communication. Modern innovations such as tablet PC’s, mobile phones, and cloud computing have enabled users to access this data from just about any location, at any given time. This means that businesses must take the appropriate steps in order to properly secure this valuable information, and prevent it from falling into the wrong hands.
In order to effectively secure data businesses must ask questions like “do we need to protect data at rest, during transmission, or when accessed?”, “do some privileged users still need the ability to view the original sensitive data or does sensitive data need to be obscured?”, and “what level of access or granularity of controls do we need?”. In any business case a variety of methods such as encryption, static data masking, dynamic data masking, tokenization, retention management, purging, etc., will be used to meet specified security requirements. These methods will vary greatly from business to business depending on a variety of internal and external variables.
Knowing that no system will ever be entirely secure, businesses are expected to take the appropriate steps to develop an effective security model, composed of a variety of security methods used to meet a business's specified security requirements.
Impediments | Causes | Solutions | References |
Lack of senior business sponsorship | -Do not believe it is necessary -No commitment to the program -No Corporate Culture | -Obtain executive level sponsorship -Create corporate culture | 1.1, 1.2, 1.3, 1.4, 1.7, 1.11, 1.13, 1.14, 1.19 |
Implementation is difficult | -Data ownership -Too many people on a committee -No rules, policies, or procedures -Shortage of skill | -Appoint a steward -Limit the size of committee members -Define roles and responsibilities | 1.1, 1.2, 1.3, 1.5, 1.7, 1.11, 1.12, 1.13, 1.14, 1.15, 1.16, 1.17, 1.19, 1.20 |
ETL is inconsistent | -Expanding collection of big data -Data inconsistencies | -Create a data governance program | 1.7, 1.11, 1.13, 1.14, 1.15, 1.16, 1.17, 1.18, 1.19 |
No long-term strategy | -Failing to define data governance -No fully developed strategy -No benchmark targets | -Enforce usage and compliance -Develop strategy -Establish purpose and metrics -Clearly define mission and values | 1.1, 1.2, 1.3, 1.4, 1.5, 1.7, 1.11, 1.13, 1.14, 1.15, 1.17, 1.18, 1.19, 1.20 |
No centralized master inventory | -No enterprise wide data dictionary -No defined managed metamodel -Using “traditional” language (old) | -Data governance should encompass new technology & quality -Convert to Master data-based culture | 1.1, 1.3, 1.5, 1.7, 1.12, 1.13, 1.15, 1.16, 1.17, 1.20 |
Data Governance Strategy:
According to the article Establishing Data Governance Policies: Four Issues to Get Them Right, “Electronic data and records are indispensable assets in any organization”. (Web, 4/28/16) Collection and management is important in a data governance program; however, many companies fail to see the urgency in implementing a data governance program, and fail to define any strategic targets for its data or a data governance program. In order to implement a good data governance program, an enterprise needs to evaluate their current processes, establish a corporate culture, create a data governance program, appoint a steward, obtain executive sponsorship, implement the program, and continually monitor benchmark targets. According to the article Enterprise Information Management: Best Practices in Data Governance states, “Data governance is not meant to solve all business or IT problems in an organization”, but to “define, approve, and communicate data strategies, policies, standards, architecture, procedures, and metrics”. (Sun, p. 5) Companies must develop short term and long term strategies before they begin to create a data governance program to ensure that the company’s strategic initiatives are inline with the data governance program.
Create a data governance program:
According to Jeff Bertolucci author of, Data Governance Plans: Many Companies Don’t Have One, “Forty-four percent of companies don’t have a formal data governance policy, and 22%...have no plans to implement one”. (Web, 4/28/16) Many corporations have databases abundant with customer information, and data that can be used for business analytics, such as “behavior tracking, audience measurement, ecommerce, and other aspects” (Web, 4/28/16); however, corporations do not see the value in the data they contain, specifically as an asset of the company. The amount of information contained within a company’s infrastructure is essential to many businesses to continue to gain market share and increase revenue by servicing or selling to existing or new clients. Corporations do not understand that they could be losing out on gaining market share by not having the correct processes in place to effectively utilize the company's data. As such, many corporations do not see the value in putting forth any effort to evaluate their current processes regarding the data they contain, and do not realize that their data governance in relation to the data they contain is insufficient.
Many corporations current processes use antiquated systems or language making it difficult for ETL to be successful for all end users. According to 5 Data Governance Mistakes, “data governance is a business-driven process”. (Web, 4/28/16) Without evaluating current processes, and developing a long term strategy for growth of big data, many companies will not be successful in implementing a data governance program. Because companies have expanding collection of data, it is important to control the data with a data governance program to “ensure ongoing compliance with corporate standards and requirements”. (Web, 4/28/16) According to Jeff Bertolucci, he claims that “Organizations should develop a formal data governance policy of reevaluate its current plan...can only increase the value your organization derives from its data”. (Web, 4/28/16)
Establish a corporate culture:
In order to use data to its fullest potential, it must be collected and transformed into standardized formats for all departments to be able to make use of the data, also known as ETL: extract, transform, and load. One of the impediments to data governance when collecting the data is there is no “data dictionary” that specifies the formula for which to collect the data, so that all departments are collecting the data in the same language. There are two causes to ETL inconsistencies: expanding collection of big data, and a shortage of knowledgeable work force. Data continues to grow at an extravagant rate, however, it is growing faster than the amount of work force trained. Therefore, many companies continue to have discrepancies between departments because the data is overwhelming and the level of skilled workers is decreasing. Furthermore, in order to develop a good data governance program both IT and business need to work together to encompass the corporate culture.
Appoint a steward:
In order for a data governance program to be fully realized, ownership of the program is essential to ensure the long term goals are met by appointing a data governance steward. The stewards responsibility is to oversee the entire process from creating the program to monitoring the program to the company's long term strategies. The stewards main objective is to “ensure effective control and use of data assets” (Sun, p. 16). The steward must also ensure that they are “showcasing good examples, instilling sustained enthusiasm, and promoting desired cultural changes within an organization”. (Sun, p. 17)
Obtain executive sponsorship:
Executive sponsorship involves C-level executives to enact a data governance program because it takes a great deal of strategy and money that must be integrated with the company’s vision. Without the sponsorship of the C-level executives the data governance program will not be fully realized. According to the article Houston, We Have a Problem” - Why Data Governance Programs Fail, “the key to success is the sustainment of sponsorship”, (Web, 4/28/16) for it is the sponsorship from executives that can ensure the program has the budgeting to continue, and the power to remove any roadblocks to the program. The article Enterprise Information Management: Best Practices in Data Governance, “Without strong backing from the executive level, none of the above will happen.” (Sun, p. 16)
Implement the program, and monitor benchmark progress:
Lastly, implementation impediments restrict the company from incorporating a data governance program, such as policies and procedures. Many governance programs fail because companies do not see the value to incorporate the programs into policies and procedures that must be followed enterprise wide. According to Data Governance and Stewardship, “Data stewards are responsible for monitoring data-related activities for compliance”, and the “data governance committee should track program implementation progress with key metrics, and periodically report...to stakeholder”. (Web, 4/28/16. Any program that is implemented whether it be data governance or any other program needs to be evaluated to ensure that the initiative is achieving benchmark targets, and continues to be in line with corporate strategies, drivers, and standards.
Impediments | Causes | Solutions | References |
User expectations | · Want connections to latest data · Work from anywhere · Want to use any device · Want analytic capabilities · Want to be able to create · Rigid user roles · Laggards · Needs to be fluid and fast ·Want it for free | · Training · Change perception of how people work · Temper expectations · Online/offline capabilities | 2.3, 2.6, 2.7, 2.11, 2.12, 2.13, 2.19, 2.20 |
Design | · Designed for desktops “shrunk” · Inherent limitations of mobile devices · Clutter · Unrelated information · Changing objectives · Functionality on different devices | · Clear business need · Small connected apps · Integrated back end · Less is more · Intuitive actions · Specific dashboards for specific users · Native/browser based · Visual tools · Drill down capabilities | 2.1, 2.2, 2.4, 2.6, 2.7, 2.9, 2.10, 2.11, 2.14, 2.15, 2.18, 2.19 |
Creation | · Limited storage · Limited screen size · Not as flexible as mouse/keyboard · Processing speed | · Active reports · Tablets good middle ground · In sync · Advances in storage capacity | 2.4, 2.5, 2.6, 2.9 |
Security | · Higher risk of being lost, stolen, hacked · BYOD | · Security measures · Buy all employees devices | 2.5, 2.6, 2.8, 2.9, 2.16, 2.17 |
User Expectations:
For firms that have the vision and knowledge to leverage mobile BI, mobile BI can add a lot of value. For those that only use it because everyone else is using it, or because it’s the next “big thing” it can be a waste of time and resources. If not done right it can become a hindrance to productivity and add to employees’ workloads. One natural gas company has found a way to combine locational intelligence and mobile BI to help users make decisions in the field on whether to make rights-purchase offers to owners on the spot. When the company receives a call from an owner looking to sell gas rights the company can look up which agent is closest and send them out to check out the property. On site the agent can use the app to look up the nearest pipelines and refineries to decide if it’s worth making an offer. The app allows users to make offers on the spot before the competition has time to react. Most other companies still have to return to the office to perform their analysis. Agents using the app can make offers on the spot which often results in purchasing the rights for lower prices (2.19). Instead of a mobile app to help employees make decisions Starbucks has implemented an extremely successful app that allows customers to purchase, pay, and receive promotions. In 2015 21% of all US transactions happened through the app. In the future Starbucks plans to offer recommendations and promotions based on customer history, preferences, and location. One interesting facet of Starbuck’s future strategy is to monitor customer’s individual privacy preferences and only send as many promotions as each customer is comfortable with (2.13).
The previous two examples illustrate the value that mobile BI apps can add, where companies run into problems is when they implement mobile BI apps without a clear business need or lose focus of the business need and start making the apps too complicated. Mobile BI tools like other forms of business intelligence need to have a clear business need and be designed for specific types of users. An executive and a field agent are going to have very different needs. One mobile BI application will not be able to meet everyone’s needs, especially considering the size and use complications of mobile devices. Companies also tend to want mobile BI tools to be free or close to free along with their main business intelligence tools. This does not give vendors much incentive to invest in these applications (2.1). More and more companies and employees expect to be able to have access to information anytime anywhere on any device. Mobile BI users want to be able to have access to the latest data, be able to perform analytical procedures, and be able to move easily between devices. To meet these expectations mobile BI tools must work similarly to existing desktop programs and have comparable processing capabilities. The solutions to meeting user expectations includes rethinking how people should and could work in today’s environment, having a clear vision of how the application will meet a specific business need and user type, and training employees on what to expect and how to use new mobile tools. The next section Design is an impediment to mobile BI when done wrong, but is also the most crucial step to meeting user expectations.
Design:
More than any other form of business intelligence the usability and success of mobile BI tools depends on the quality of its design. Mobile BI tools are inherently limited by small screen sizes, touch screen capabilities, and inferior processing capabilities of the mobile devices they run on. The biggest contributor to poor mobile BI design is the expectation that mobile BI tools will be able to do everything that desktop applications do. This leads developers to design mobile BI tools that are “shrunk” down versions of traditional applications. On a mobile devices this results in clutter, slow processing speeds, and applications that are difficult to maneuver. Another contributor to poor mobile BI design is unfocused or changing expectations of what each mobile application should accomplish. Clients and developers often fall into the trap of over providing or designing for many types of users at once. Again this results in clutter, slow processing speeds, groupings of unrelated information, and applications that do not meet the needs of users.
To design a successful mobile BI tool there must first be a specific business need and a specific type of user identified. Executives, middle managers, and employees will all need very different types of data. Clients and developers often fall into the trap of designing catch-all apps that attempt to meet every need and type of user. Mobile BI tools are most successful when they are simple and include only the most important one or two elements. This can be accomplished by designing multiple small highly focused applications that are connected in the back. As users need more information they should be able to tap on specific elements to drill down for more detail (2.2). With this type of design each app can focus on a specific need and user and as user needs change they can easily switch between apps. An example of this is Tinder on the front end users only have to swipe to find what they are looking for all of the details are kept in the back. This results in an application that is uncluttered, easy to use, and effective (2.1). Keeping applications small also improves their processing speeds (2.20). To optimize processing efficiency mobile BI design should have similar back end architectures to other business intelligence systems with elements such as database denormalization, indexing, and summarization. As with all business intelligence initiatives it is important to invest in data quality, aggregation, and governance initiatives (2.9).
While mobile BI tools should not be mini versions of desktop applications they should feel similar to users. Actions such as doubleclick, pinch, and swipe should be consistent with other desktop applications and commercial mobile applications (2.11). Successful mobile BI design revolves around breaking information into bite-sized pieces. Having multiple tabbed pages with previous and next navigation buttons is a good way to breakdown information. To make reports more interactive and to add drill down capabilities design elements such as taping column headers to sort data, and pressing +/- to expand or collapse elements are all important (2.2). Peer collaboration is an important part of any business and something that mobile devices are naturally good at. Adding elements that allow users to leave comments connected to visuals and reports can add a lot of value to mobile applications. Similarly being able to send screen shots of reports along with notes can be extremely useful to users. Other basic design concepts for developing mobile BI applications are logical data groupings, positioning the most important elements in the top left corner and working right and down, filters, contrast, charts and visuals, large buttons, and creating on a small form scale (2.10, 2.11, & 2.18). It is also important to utilize blank space between elements this make reports easy to read and buttons and elements easier to navigate. Another important design concept is to deliver the same HTML code regardless of size and use CSS to rearrange the elements based on the width this allows mobile BI applications to adjust to various screen sizes (2.18). Similarly charts should show more or less detail depending on the resolution and size of the screen with the ability to zoom in and out for more detail (2.19). Systems like AngularJS also provide two-way binding which allows the application to “listen” for screen resizing. The next time the application loads it will use this information to automatically load the element to the right size (2.19). Another important consideration is what platforms employees will be using and how to design for them. Currently there are two main approaches for mobile app development browser based and native based. Browser-based is compatible with all mobile browsers, but has less functionality. Native based has greater functionality, greater storage capacity, and has offline capability, but is not universally compatible with all platforms (2.15). Firms must decide which approach best fits their needs. If they would like a high functioning application they should develop using the native based approach and buy each employee the devices they will be expected to use for work. This way they can use and design for a consistent platform throughout the organization. There are many design elements to consider when designing mobile BI tools. It can be tricky to decide which KPIs and visuals will add the most value to users. The most important thing to remember is the business need and the specific user who will be using the application. Remembering this will guide developers to the data they should include. After that the most important thing is to keep the application simple and easy to use by breaking down information by pages or into different applications.
Creation:
Business intelligence is the process of developing actionable decisions through data analysis. Mobile BI accomplishes this well when the decision only requires consuming information from previous analysis. But if users need to create new information mobile BI tools can be infuriating to use their small screens and touch operated controls make creating reports or visuals nearly impossible. So far the traditional mouse and keyboard far surpass touchscreen in ease of use and speed. Other factors that make creation difficult on mobile devices are the inherent limitations of storage space and processing capabilities. Right now most users use mobile devices to check information while they are in the field or on the move, but have to return to their desktops or laptops to write reports or perform analysis (2.4). The lack of flexibility to create is a huge impediment to mobile BI, as it only accomplishes a small portion of what business intelligence should be. Tablets can be used and are a good middle ground with larger screens and attachable keyboards and mice, but why not just bring a laptop. For mobile BI to become more than just a way to view a few KPIs and visuals creation of at least simple reports will have to become easier. For this there are no simple solutions. To work around the limitations of mobile BI tools it is extremely important for mobile BI tools to stay in sync with desktop applications so that users can work seamlessly between discovery and creation on multiple devices.
Security:
With mobile BI come additional security risks. Mobile devices are easier to steal, lose, hack, and can end up anywhere. An example of the types of risks that mobile BI apps bring is the vulnerability found in Apple’s iOS sandbox applications used by enterprises to automatically share applications, configuration settings, and access rules with company devices. The vulnerability was created in the process of installing the application and setting up the MDM (mobile device management) account for each new device. During this process their configuration settings including URLs, usernames, and passwords are stored in a “world readable” location. This means that the same configuration that allows the company to monitor and control company devices also allows other applications installed on the device to read this sensitive information. After the vulnerability was discovered Apple hardened the sandbox profiles of apps with managed preferences in the iOS 8.4.1 released August 13, 2015 (2.16). This example illustrates how difficult it can be to secure mobile devices. To further complicate matters many employees want to be able to use their own devices for work. Companies have to balance policies that allow employees freedom to use their devices as they wish, while still keeping company data secure.
There are many ways to improve the security of mobile BI tools. One of the best things companies can do to protect themselves is to buy employees the devices they will be expected to use. This gives companies more leverage and enforcement power over employee devices. Buying employees’ devices allows companies to choose the carrier, put different application on different tiers of service quality, and monitor and control the applications on each device. Specific security measures include application passwords, authentication requirements for specific documents, blocking saving options, encryption, blocking screen shots with blank screen masks, low resolution thumbnails, and smudging capabilities. Other options include tethered mode which only lets users that are connected to a server access documents or applications and deletes information when the connection is lost. Application time outs let employers to set a time limit on inactivity after which applications are frozen and users must re-enter passcodes to regain access. Blacklisting allows the company to block certain people and devices from connecting to the server and applications. Along these lines are data wipes which wipe data from the device when it tries to connect to the server. These security measures are not completely foolproof, but do give companies a certain level of security over their devices and applications. It is important to note that to be most effective security measures should be “baked into” the applications themselves as they are being developed. Security measures from third party providers as an afterthought are rarely as effective as measures developed to work within a specific application (2.1).
Impediments | Causes | Solutions | References |
Management | - Fear of risk - There are not many related C-level positions - Time / development delay | - Don’t be stuck between data-driven vs. human-driven - Appoint Chief Data Officer (CDO) | 3.3, 3.5, 3.10, 3.13, 3.15 |
Lack of Skills and Knowledge | - Only bigger companies have the correct skills - Term not universally understood/applied | - Augment skills - Train staff | 3.1, 3.4, 3.6, 3.8, 3.14, 3.15, 3.16, 3.17, 3.20 |
Cost | - Costs a lot - Not enough funding | - Need to properly allocate budget - Avoid thinking everything will happen on its own | 3.1, 3.4, 3.15 |
Regulatory Concerns | - Privacy - Copyright - Database rights - Confidentiality - Trademarks - Contract law - Competition law | - Ensure policies and procedures are compliant with mandates | 3.7, 3.11, 3.12, 3.13, 3.19, 3.20 |
High Volume | - Growth in collection - Increase in multimedia content - Development of the Internet of Things (IoT) | - Advanced information processing | 3.2, 3.9, 3.10, 3.18, 3.20 |
Impediments | Causes | Solutions | References |
Visuals can be poor | The design is not aesthetically pleasing | Invest in better displays | 4.12, 4.16, 4.17 |
| The visuals are not created for the data | Create a more relevant visual | 4.1, 4.11, 4.12, 4.13 |
| Low quality visuals | Invest in higher visual quality and better designers | 4.8, 4.11, 4.12 |
The visuals aren’t useful | The visualization strategy is not relevant to the data | Create a strategy that decides what would be useful. | 4.1, 4.3, 4.5, 4.8, 4.11, 4.12, 4.13, 4.15, 4.16, 4.17 |
The visuals aren’t fast enough | The visuals are not capable of keeping up with the speed and complexity of the data. | Focus on smaller portions of data | 4.3, 4.5, 4.7, 4.11, 4.13, 4.15 |
Visuals can be poor:
Even with the best intentions, visuals can still lack the necessary aesthetics to help make sense of data. Poor visuals create a distraction for the users and eventually waste money and time for everyone involved. Focusing on the key elements of design and researching what visuals make the most sense will help. Investing in better displays can enhance the system's capabilities, but should only be used if it makes financial sense (4.12). If the visuals can’t be designed to what the overall strategy requires, visualization should not be used at all. Visuals can be amazing in design, but sometimes they don’t work with the data. If patterns and judgments can’t be made from the visuals, the visuals aren’t doing their job. Making sense of the data is the whole point of visualization. Either restructuring the data or redesigning the visuals to make more sense with the data will create the benefit. This can be done through programming and data science.
Other times the visuals have the capabilities that are required, but they don’t fulfill the quality standards. Fortunately, the poor visuals can be improved with investment in higher quality and better designers. The hardest aspect of the visuals is making sure they make sense, quality visuals is part of that. No matter how well the data is structured, it still needs to be presented in a pleasing way. Focusing on aesthetics will help improve any visualization strategy.
The visuals aren’t useful:
With the vast size of data and its complexity, every aspect of a visual needs to have a useful purpose. Graphs, charts, and other visuals need to present the information in such a way that makes sense to all users. The visuals can be beautiful in design, but make no sense to the user. When developing a visualization strategy, the goals of the data need to be aligned with how the visuals will present them. If the data is clean and organized, what will be the best way to show patterns? Keeping questions like this in mind will help during the development process. Historically, visuals have been used to display information for hundreds of years. Studying past patterns and uses of graphs and charts can help formulate a strategy for any visualization (4.1).
Aligning the organization's strategy with visualization can focus on a few aspects specifically. The desired patterns of the organization can be displayed via graphs and charts. The progress of the company statistically can be displayed in number format as well as graphs and charts. Focusing on the best ways to visually understand something will make the whole integration easier. If customer satisfaction is important, having a visual that shows the average that day would be useful. Showing a pie chart to represent customer satisfaction data wouldn’t make sense in this situation. Also, being aware of what the current trends in visual technology are can help avoid useless visuals.
The visuals aren’t fast enough:
The speed and processing required to formulate data into a visual pattern can prove overwhelming for many systems. Many visuals aren’t capable of keeping up with the speed and complexity of the data. Organization sometimes jump into making visuals without giving them the proper allocation of resources. After the visuals are completed, they aren’t able to process the real time data and eventually fail in their goal (4.3). Instead of jamming a bunch of data into underperforming visuals and dashboards, organizations need to start smaller. By focusing on smaller portions of data, the visuals can produce more accurate information and process the data much quicker. When ready, an organization can slowly implement larger amounts of data while still maintaining the speed and quality. The resulting focus of integration can benefit the entire system and help decision makers be better informed.
Impediments | Causes | Solutions | References |
Data security(General) | -Data breaches -Hackers -Storage of sensitive data -System vulnerability -etc. | -Encryption of data at rest and in transmission. -Cryptographic Protocol - GPG encryption - BoxCryptor -Mutual authentication | 5.2, 5.8, 5.13 |
Hackers | -System vulnerability -“Want” for sensitive information. -Because they can | -Automated threat detection of credible hacker forum threats -GPG encryption when sending messages. -Use a web application firewall to filter potentially dangerous web requests -Limit database privileges by context -Avoid constructing SQL queries with user input | 5.3, 5.4, 5.5, 5.16 5.19 |
Cloud computing vulnerability | -Unsophisticated mutual authentication -Lack of encryption technology -Use of standard internet protocol -Control issues in virtualization | Out-of-band authentication, secret sharing, mutual authentication, password change options, steganography, etc. - eCryptfs - Linux kernel 2.6.19 | 5.6, 5.7, 5.8, 5.9, 5.10, 5.11, 5.12, 5.14, 5.15, 5.16, 5.20 |
Unauthorized access/authentication by humans in the environment | -Untrustworthy employees -Lack of access restriction -Failure to appropriately hide sensitive information | -Develop a lattice of rights model | 5.1, 5.8, 5.12, 5.17, 5.18 |
Data Security (General)
“The base of modern information systems has been altered. The structure of primitive economic areas has totally changed and new types of economic growth have appeared. Basic Areas such as Education, Banking, National Defense, and Health Care have been fully transformed. Their main structure has been totally digitalized in order to be adapted to the needs of the new century. Traditional Operational Areas, where the human factor was necessary, have been totally reconstructed minimizing or eliminating the participation of humans.” So just how secure are the information systems that bind together the structure of modern America’s economic structure?
A data breach is an intentional or unintentional release of secure information to an untrusted environment. In 2014 the estimated average organizational cost of a data breach was 5.9 million dollars, meaning each individual compromised record costed the company $201.00. These costs that companies accrue during a data breach do not only include the value of the compromised records but also the abnormal turnover of customers, the increased customer acquisition activities, and the reputation losses and diminished goodwill. Most commonly company’s sensitive records are compromised by hackers, cyberattacks, their own employees, and vendors/other third parties. In order to reduce the chances of becoming victims of a data breach, common solutions inquired by companies include increased encryption protection through the use of pendrive password protection software, and strong cryptography methods such as PGP, AES, and other strong algorithmic encryption types.
Hackers
A hacker is someone who has a high level of skill in computer technology or programming and uses their skills to circumvent security and gain unauthorized access to networks, computers, files, etc. Hackers usually operate with malicious intent and are capable of stealing highly sensitive information anonymously; however some hackers claim to ethically hack in order to exploit vulnerability and weaknesses within a business, forcing them to increase their security measures. Hackers use a variety of resources such as hacking tools, malware samples, source code, hacker forums, etc., in order to access and exploit secured data without authorization. The most dangerous hackers to businesses are those operating with the intentions to steal. Cyber theft comprises crimes in which a computer is used to steal money or other things of value. Cyber theft includes embezzlement, fraud, theft of intellectual property, and theft of personal or financial data.
So how vulnerable are businesses when it comes to data breaches? Security experts like to say that there are now only two types of companies left in the United States, those that have been hacked and those that don’t know they’ve been hacked. Recently Verizon released a report stating that the company counted 621 confirmed data breaches last year, and more than 47,000 reported security incidents. The majority of these hacks were due to distributed denial of service attacks, in which hackers flood a site with traffic until it falls offline, but do not necessarily break into a company’s network. This is just one of many common methods hackers use to exploit sensitive information.
In this day and age since nearly all information is transmitted or stored via the internet, it can be said that all businesses and all data are highly vulnerable to being hacked by cyber-criminals. A few simple ways that businesses can reduce their chance of being hacked are by being aware of suspicious emails, checking link locations, by using two-factor authentication, by using advanced passwords, by not sharing sensitive data while connected to public Wi-Fi networks, and by being wary about what’s shared or stored on cloud servers. With that being said, hacking is a phenomenon which is deeply rooted in the world of computing and will probably never die, so businesses must continuously seek out new security measures in order to keep sensitive data out of the hands of the wrong people.
Cloud Computing Vulnerability
A cloud is a network of remote servers hosted on the Internet and used to store, manage, and process data in place of local servers or personal computers. One of the major issues in cloud computing currently is finding a way to achieve mutual authentication so that both of the parties authenticate themselves to the other before the communication begins. “Proper authentication is an essential technology for cloud-computing environments in which connections to external environments are common and risks are high,” One solution to this issue is to implement a protocol that achieves mutual authentication using steganography and secret sharing. This protocol would use out-of-band authentication, secret sharing, steganography, and mutual authentication with password change options in order to build a resistance to DoS attacks, masquerade attacks, replay attacks, and insider attacks.
Mobile cloud computing is another type of cloud computing that is commonly used by employees who are constantly on the go or businesses that cannot afford a private cloud. Mobile cloud computing uses a combination of mobile devices, cloud servers (cloudlets), and wireless networks to store and transmit data. For example, an employee accessing company emails through Gmail on a mobile device. The goal of mobile cloud computing is to enable the execution of rich mobile applications on a variety of mobile devices, with a rich user experience. The reasoning behind the use of mobile cloud computing is that it provides business opportunities for mobile network operators as well as cloud providers. Coinciding with the ease of access that mobile cloud computing provide to its users is the increase in security concerns. The security concerns include insecure data storage, weak server side controls, insufficient transport layer protection, client side injection, poor authentication and authorization, improper session handling, security decisions via untrusted inputs, side channel data leakage, broken cryptography, and sensitive information disclosure. One proposed solution to the lack of inherent security measures in mobile cloud computing is proposed by authors Niroshinie Fernando, Seng W. Loke, and Wenny Rahayu. Their proposal aims to provide a security services architecture by acting as an intermediary for identity, key, and secure data access policy management. This is achieved by protecting information belonging to mobile users through the use of security isolations, and by assessing risks through the monitoring of the mobile clouds centralized data collection and processing. By doing so the risk management service can identify malicious nodes and take preventive measures according to estimated risks.
Cloud computing provides businesses, and employees remote access to data, reduces costs, improves business agility, provides self-service, provides on demand IT, and much more. However, although mobile cloud computing provides many beneficial services to businesses and end-users, it also has many security vulnerabilities that need to be considered in order to properly secure sensitive data.
Unauthorized Access by Human in the Environment
Commonly businesses focus the majority of their security efforts on the security of their servers, and networks and often forget about the threat of unauthorized data access by humans within the environment such as employees, IT persons, etc. Protection of in house information systems that store critical company information is vital in order to keep sensitive data out of the hands of untrustworthy individuals who have physical access to this data. Often, critical company data is shared with company stakeholders, or stored on information systems that are physically accessible. This leads to the issue of data leakages that are often undetectable due to limited traces of unauthorized physical access to databases. One proposed solution to this issue is to decrease data accessibility by implementing a lattice of rights model. A lattice of rights model breaks data into four categories; public, confidential, secret, and top secret. The model then proposes the use of a variety of security mechanisms that will be used in order to allow and restrict the access of data by subjects based upon a need to know basis.
Although there is no foolproof mechanism in place that can entirely secure all data from being leaked or used without authorization, the lattice of rights model provides a basic structure in which a company can modify in order to appropriately secure their data.
1.1 | Sherman, Rick. "A Must to Avoid: Worst Practices in Enterprise Data Governance."SearchDataManagement. N.p., n.d. Web. 27 Apr. 2016. http://searchdatamanagement.techtarget.com/feature/A-must-to-avoid-Worst-practices-in-enterprise-data-governance. Accessed by Lisa Bella |
1.2 | "Building an Effective Data Governance Framework." SearchDataManagement. N.p., n.d. Web. 28 Apr. 2016. http://searchdatamanagement.techtarget.com/essentialguide/Building-an-effective-data-governance-framework |
1.3 | Vandeventer, Reuben. "8 Early Warning Signs of Problems in Your Data Governance Plan." BetaNews. N.p., 14 Sept. 2015. Web. 28 Apr. 2016. http://betanews.com/2015/09/14/8-early-warning-signs-of-problems-in-your-data-governance-plan/ |
1.4 | Smith, Anne Marie, Ph.D. "Enterprise Information Management Institute." "Houston, We Have a Problem" – Why Data Governance Programs Fail —. N.p., n.d. Web. 28 Apr. 2016. http://www.eiminstitute.org/library/eimi-archives/volume-3-issue-7-july-2009/201chouston-we-have-a-problem201d-2013-why-data-governance-programs-fail |
1.5 | Dyche', Jill, and Kimberly Nevala. "5 Data Governance Mistakes to Avoid." Analytics, Business Intelligence and Data Management. N.p., n.d. Web. 28 Apr. 2016. http://www.sas.com/en_us/news/sascom/2014q1/data-governance-mistakes-to-avoid.html |
1.6 | "5 Reasons Why Data Governance Matters." Infinitive. N.p., 13 Oct. 2011. Web. 28 Apr. 2016. http://www.infinitive.com/2011/10/13/5-reasons-why-data-governance-matters-to-your-online-business/ |
1.7 | "Information-Technology Management Best Practices." Corporate Management, Governance, and Ethics Best Practices Vallabhaneni/Corporate (2015): 293-384. Web. 28 Apr. 2016. http://www.oracle.com/technetwork/articles/entarch/oea-best-practices-data-gov-400760.pdf |
1.8 | "Data Doghouse - Performance Management, Business Intelligence, and Data Warehousing." 'Data Doghouse - Performance Management, Business Intelligence, and Data Warehousing' N.p., n.d. Web. 28 Apr. 2016. http://datadoghouse.typepad.com/data_doghouse/data-governance/ |
1.9 | "Knocking Down the Barriers to Data Governance Success: Lessons Learned..." Knocking Down the Barriers to Data Governance Success: Lessons Learned... N.p., 13 Nov. 2013. Web. 28 Apr. 2016. http://www.slideshare.net/Dataversity/knocking-down-the-barriers-to-data-governance-success-lessons-learned-from-the-dgpo |
1.10 | "Governance and Issue Resolution." Ed. Gwen Thomas. N.p., n.d. Web. 28 Apr. 2016. http://www.datagovernance.com/governance-and-issue-resolution/ |
1.11 | Grossman, Chris. "Establishing Data Governance Policies: Four Issues to Get Them Right." Data Informed RSS. N.p., 27 Dec. 2013. Web. 28 Apr. 2016. http://data-informed.com/establishing-data-governance-policies-four-issues-get-right/ |
1.12 | Oconnor, Ken. "Common Enterprise Wide Data Governance Issues – #12. No Enterprise Wide Data Dictionary." Ken OConnor Data Management Consultant. N.p., 09 Feb. 2010. Web. 28 Apr. 2016. https://kenoconnordata.com/2010/02/09/common-enterprise-wide-data-governance-issues-12-no-enterprise-wide-data-dictionary/ |
1.13 | "Who Owns the Data Anyway?: Data Governance, Data Management, and Data Stewardship." Customer Data Integration Reaching a Single Version of the Truth (2015): 145-82. Web. 28 Apr. 2016. http://ptac.ed.gov/sites/default/files/issue-brief-data-governance-and-stewardship.pdf |
1.14 | Teachey, Daniel. "Data Governance Framework: What Is It and Do I Already Have One?" Analytics, Business Intelligence and Data Management. N.p., n.d. Web. 28 Apr. 2016. http://www.sas.com/en_us/insights/articles/data-management/what-is-a-data-governance-framework.html |
1.15 | "Data Governance: The Basic Information - The DGI." The DGI. N.p., n.d. Web. 28 Apr. 2016. http://www.datagovernance.com/adg_data_governance_basics/ |
1.16 | Betolucci, Jeff. "Data Governance Plans: Many Companies Don't Have One - InformationWeek." InformationWeek. N.p., n.d. Web. 28 Apr. 2016. http://www.informationweek.com/big-data/big-data-analytics/data-governance-plans-many-companies-dont-have-one/d/d-id/1113678 |
1.17 | "TDWI | Training & Research | Business Intelligence, Analytics, Big Data, Data Warehousing." LESSON. N.p., n.d. Web. 28 Apr. 2016. https://tdwi.org/Articles/2011/05/18/LESSON-Seven-Steps-to-Effective-Data-Governance.aspx |
1.18 | "3 Steps to Implementing a Data Governance Programme | Information Age." 3 Steps to Implementing a Data Governance Programme | Information Age. N.p., n.d. Web. 28 Apr. 2016. http://www.informationage.com/technology/information-management/123458562/3-steps-implementing-data-governance-programme |
1.19 | Chew, Patrick. "Five Steps to Data Governance | Be Ready for What's Coming." AIM Consulting. N.p., 18 Mar. 2015. Web. 28 Apr. 2016. http://aimconsulting.com/see-coming-five-simple-steps-enact-data-governance/ |
1.20 | "Steps for Effective Metropolitan Governance Reforms." Governing the City (2015): 55-87. Web. 28 Apr. 2016. http://www.enterprisemanagement360.com/wp-content/files_mf/white_paper/wp_iway_7steps.pdf |
2.1 | Baker, P. The Problems with mobile BI - and how to fix it. (2015, September 21). Retrieved March 24, 2016, from http://www.fiercebigdata.com/story/problem-mobile-bi-and-how-fix-it/2015-09-21 |
2.2 | Aspin, A. Mobile BI with SQL Server Reporting Services. (2015, April 21). Retrieved March 24, 2016, from https://www.simple-talk.com/sql/reporting-services/mobile-bi-with-sql-server-reporting-services/ |
2.3 | Southard, J. How to Make Your Business Intelligence More Mobile Intelligent. (2016, January 12). Retrieved March 24, 2016, from https://www.birst.com/blog/how-to-make-your-business-intelligence-more-mobile-intelligent/ |
2.4 | Azaria, A. Is Business Intelligence Set to Go Mobile. (2015, April 30). Retrieved March 24, 2015, from http://solutionsreview.com/business-intelligence/is-business-intelligence-set-to-go-mobile-2/ |
2.5 | Mobile BI: Great for Consumption, Lousy for Creation. (2016, April 19). Retrieved March 24, 2016, from http://solutionsreview.com/business-intelligence/mobile-bi-great-for-consumption-subpar-for-creation/ |
2.6 | Murali, N. How Mobile Changes the BI Experience. (2013). Retrieved March 24, 2016, from https://support.sas.com/resources/papers/proceedings13/053-2013.pdf |
2.7 | Bennett, M. Mobile BI: Having the Right Technology Helps, But Isn’t Enough. (2015, January 28). Retrieved March 24, 2016, from http://blogs.forrester.com/martha_bennett/15-01-28-mobile_bi_success_having_the_right_technology_helps_but_isnt_enough |
2.8 | Kuruvilla, B. Take control of Mobile BI – how to make it YOUR app. (2014, March 17). Retrieved March 24, 2016, from http://scn.sap.com/community/mobile/businessobjects/blog/2014/03/17/take-control-of-mobile-bi-how-to-make-it-your-app |
2.9 | Parizo, C. Mobile business intelligence applications: Not just a pretty interface. (2013, March). Retrieved March 24, 2016, from http://searchbusinessanalytics.techtarget.com/feature/Mobile-business-intelligence-applications-Not-just-a-pretty-interface |
2.10 | Smith. N. Designing and Building Great Dashboards – 6 Golden Rules to Successful Dashboard Design. (2015, October 21). Retrieved March 24, 2016, from https://www.geckoboard.com/blog/building-great-dashboards-6-golden-rules-to-successful-dashboard-design/#.VwNI3PkrLIU |
2.11 | Stedman, C. Making mobile BI applications a reality: Keys steps to take. (2013, May). Retrieved March 24, 2016, from http://searchbusinessanalytics.techtarget.com/podcast/Making-mobile-BI-applications-a-reality-Key-steps-to-take |
2.12 | Frank, B. At Build, Microsoft tried a different way to mobile developers’ hearts. (2016, April 4). Retrieved March 24, 2016, from http://www.computerworld.com/article/3050988/cloud-computing/at-build-microsoft-tried-a-different-way-to-mobile-developers-hearts.html |
2.13 | Meola, A. Starbucks plans to spend even more to improve its mobile app. (2016, April 4). Retrieved 24, 2016 from http://www.businessinsider.com/starbucks-mobile-app-proves-successful-marketing-strategy-2016-4 |
2.14 | Asimakopoulos, S. Forecasting in the pocket: Design tips for mobile forecasting applications. Retrieved 24, 2016, from http://www.sas.com/en_us/insights/articles/analytics/forecasting-in-the-pocket.html |
2.15 | Borg, A. Mobile BI: Native App or Browser. (2013, August 8). Retrieved March 24, 2016, from http://www.informationweek.com/mobile/mobile-bi-native-app-or-browser/d/d-id/1111329? |
2.16 | Constantin, L. Vulnerability in enterprise – managed iOS devices puts business data at risk. (2015, August 20). Retrieved March 24, 2016, from http://www.infoworld.com/article/2974116/security/vulnerability-in-enterprise-managed-ios-devices-puts-business-data-at-risk.html |
2.17 | Rstogi, A. Security Aspects of Mobile BI App. (2015, May 6). Retrieved March 24, 2016, from http://scn.sap.com/community/mobile/businessobjects/blog/2015/05/06/security-aspects-of-mobile-bi-app |
2.18 | Gallagher, M. Best Practices for Designing for Mobile BI. (2015, May 4). Retrieved March 24, 2016, from http://www.logianalytics.com/tips-tricks/best-practices-for-designing-for-mobile-bi/ |
2.19 | Burns, E. Location data finds a home in mobile business intelligence apps. (2013, August). Retrieved March 24, 2016, from http://searchbusinessanalytics.techtarget.com/feature/Location-data-finds-a-home-in-mobile-business-intelligence-apps |
2.20 | Farmer, D. Getting your hands on data with mobile analytics. (2014, July 16). Retrieved March 24, 2016, from http://www.infoworld.com/article/2608464/business-intelligence/getting-your-hands-on-data-with-mobile-analytics.html |
3.1 | Are there significant barriers to implementing big data analytics? - TeraMedica | FUJIFILM Medical Systems, U.S.A., Inc. (2013, August 30). Retrieved March 29, 2016, from http://www.teramedica.com/news/industry-news/big-data-news/are-there-significant-barriers-to-implementing-big-data-analytics |
3.2 | Big Data Possibilities. (2016). Retrieved April 1, 2016, from http://www.ap-institute.com/big-data-possibilities.aspx |
3.3 | Burgelman, L. (2016, June 12). Three Barriers to Big Data Adoption. Retrieved February 29, 2016, from http://insights.wired.com/profiles/blogs/three-barriers-to-big-data-adoption |
3.4 | Common Barriers to Big Data Adoption Infographic - Knowledgent. (2015). Retrieved April 1, 2016, from http://knowledgent.com/common-barriers-to-big-data-adoption-infographic/ |
3.5 | Court, D. (2015, January). Getting big impact from big data. Retrieved April 1, 2016, from http://www.mckinsey.com/business-functions/business-technology/our-insights/getting-big-impact-from-big-data |
3.6 | Dutton, G. (2014). What's the Big Deal About Big Data? Retrieved April 1, 2016, from https://trainingmag.com/trgmag-article/what’s-big-deal-about-big-data |
3.7 | Ewbank, A. (2016, March). Student Privacy in the Age of Big Data. Retrieved March 29, 2016, from http://www.systems.wsu.edu/scripts/wsuall.pl?url=http://search.ebscohost.com/login.aspx?direct=true&db=1xh&AN=113437743&site=ehost-live |
3.8 | Four Steps to Reducing Big Data Barriers | The TIBCO Blog. (2015, February 5). Retrieved March 29, 2016, from http://www.tibco.com/blog/2015/02/05/four-steps-to-reducing-big-data-barriers/ |
3.9 | IG for Making Good Big Data Decisions. (2016, January). Retrieved March 29, 2016, from http://www.systems.wsu.edu/scripts/wsuall.pl?url=http://search.ebscohost.com/login.aspx?direct=true&db=1xh&AN=112218104&site=ehost-live |
3.10 | Kho, N. (2016, January). The State of Big Data. Retrieved March 29, 2016, from http://www.systems.wsu.edu/scripts/wsuall.pl?url=http://search.ebscohost.com/login.aspx?direct=true&db=1xh&AN=112665296&site=ehost-live |
3.11 | Korostoff, K. (2015, October 6). Big Data: Artificial Barriers with Marketing Research? | Marketing Research Association. Retrieved March 29, 2016, from http://www.marketingresearch.org/article/big-data-artificial-barriers-marketing-research |
3.12 | Legal Impediments to Big Data & Retail. (2016). Retrieved March 29, 2016, from www.journalofshoppersresearch.com/407-2/ |
3.13 | Marr, B. (2016, March 15). 17 Predictions About the Future of Big Data Everyone Should Read. Retrieved April 1, 2016, from http://www.forbes.com/sites/bernardmarr/2016/03/15/17-predictions-about-the-future-of-big-data-everyone-should-read/#3414d8ff157c |
3.14 | Marr, B. (2016). How is Big Data Used in Practice? 10 Use Cases Everyone Must Read. Retrieved April 1, 2016, from http://www.ap-institute.com/big-data-articles/how-is-big-data-used-in-practice-10-use-cases-everyone-should-read.aspx |
3.15 | McCafferty, D. (2015, March 18). How to Overcome Big Data Barriers. Retrieved March 29, 2016, from http://www.cioinsight.com/it-strategy/big-data/slideshows/how-to-overcome-big-data-barriers.html |
3.16 | Potential impediments to the rise of big data - Panorama. (2016). Retrieved April 1, 2016, from http://www.panorama.com/bi-industry-news/potential-impediments-to-the-rise-of-big-data/ |
3.17 | Preslar, E. (2013, September 25). Rogers: Lack of big data skills poses biggest impediment to adoption. Retrieved February 29, 2016, from http://searchbusinessanalytics.techtarget.com/video/Rogers-Lack-of-big-data-skills-poses-biggest-impediment-to-adoption |
3.18 | Schutt, P. (2016, January 14). Big Data For All? Oracle's 2016 Top 10 Predictions (Oracle Big Data). Retrieved April 1, 2016, from https://blogs.oracle.com/bigdata/entry/big_data_for_all_oracle |
3.19 | Shetty, H. (2014, January 12). Regulatory Impediments to Data Collection And Analysis. Retrieved April 1, 2016, from http://www.wipro.com/blogs/regulatory-impediments-to-data-collection-and-analysis/ |
3.20 | Wielki, J. (2013). Implementation of the Big Data concept in ... - FedCSIS 2016. Retrieved March 29, 2016, from https://fedcsis.org/proceedings/2013/pliks/161.pdf |
4.1 Levy, E. (2016, March 16). Building an ironclad business case for business intelligence. Retrieved March 28, 2016 from http://www.smartdatacollective.com/ eran-levy/396095/building-ironclad-business-case-business-intelligence
4.2 Seel, G. (2016, March 21). Banks spend billions on digital initiatives.
Why aren’t they winning? Retrieved from
https://www.finextra.com/blogposting/12391/banks- spend-billions-on-digital-initiatives-why-arent-they-winning
4.3 Computing, S. (2016, March 22). Snowflake computing and Tableau software partner
to put the scale and flexibility of cloud data warehousing in the hands of data professionals. Retrieved from http://www.marketwired.com/press-release/ snowflake-computing-tableau-software-partner-put-scale-flexibility-cloud-data- warehousing-nyse-data-2108079.html
4.4 Hall, S. (2016, February 29). How do you know IT costs too much? Retrieved from http://ww2.cfo.com/it-value/2016/02/know-costs-much/
4.5 Woodie, A. (2016, January 26). Data quality trending down? C’est la vie.
Retrieved from
http://www.datanami.com/2016/01/26/data-quality-trending-down-cest-la- vie/
4.6 Ring, D. (2015, June 30). Cultural readiness vital for HR data analytics. Retrieved
from http://searchfinancialapplications.techtarget.com/news/4500249076/Cultural-
readiness-vital-for-HR-data-analytics
4.7 Gatte, T. (2016, February 26). Are you struggling with your data? Retrieved from
http:// www.cio.com/article/3037942/leadership-management/are-you-still-struggling-
With-your-data.html
4.8 Pohlmann, T. (2016, February 16). What design thinking means for data and
analytics. Retrieved from http://www.datanami.com/2016/02/16/what-design-thinking-
means-for-data-analytics/
4.9 Kernochan, W. (2013, May 13). 4 barriers to big data success — and ways to overcome them. Retrieved from http://www.enterpriseappstoday.com/business- intelligence/4-barriers-to-big-data-success-and-ways-to-overcome-them.html
4.10 Wood, C. (2014, December 11). Open data visualization tool challenges traditional
http://www.govtech.com/data/Open-Data-Visualization-Tool-Challenges-Traditional-GIS.html
4.11 Castle, S. (2015, November 12). Why overhyping data visualization will cause your
BI project to fail. Retrieved from http://venturebeat.com/2015/11/12/why- overhyping-data-visualization-will-cause-your-bi-project-to-fail/
4.12 McKenna, B. (2016, March 17). Data matters. Retrieved from http:// www.computerweekly.com/blogs/Data-Matters/2016/03/beauty-is-not-truth.html
4.13 Burns, E. (2015, September 1). Effective big data visualization starts with simplicity. Retrieved from http://searchbusinessanalytics.techtarget.com/feature/Effective- big-data-visualization-starts-with-simplicity
4.14 Krause, W. (2016, April 4). Advance analytics in healthcare: The challenges and benefits. Retrieved from https://icrunchdatanews.com/advanced-analytics-
healthcare-challenges-benefits/
4.15 Vickery, B. (2015, November 5). Data quality comes before data visualization. Retrieved from http://www.business2community.com/business-intelligence/data- quality-comes-before-data-visualization-01367873#ddq42ucvFr3gR7DR.97
4.16 Loshin, D. (2014, March 1). BI dashboards need measured approach on data visualizations. Retrieved from http://searchbusinessanalytics.techtarget.com/tip/ BI-dashboards-need-measured-approach-on-data-visualizations
4.17 Cotgreave, A. (2016, February 16). To move forward with data visualization, look backwards. Retrieved from http://www.computerworld.com/article/3032653/data- analytics/to-move-forward-with-data-visualization-look-backwards.html
4.18 Myers, J. (2016, February 19). Be careful when implementing data warehouse automation. Retrieved from http://www.infoworld.com/article/3035476/data- warehousing/be-careful-when-implementing-data-warehouse-automation.html
4.19 Miseta, E. (2015, July 16). How one bio company tackled its data visualization challenge. Retrieved from http://www.clinicalleader.com/doc/how-one-bio- company-tackled-its-data-visualization-challenge-0001
4.20 Cotgreave, A. (2015, November 19). Living with data. Retrieved from http:// www.computerworld.com/article/3005740/data-analytics/why-do-we-visualize- data.html
5.1 | Al-Aqrabi, H., Liu, L., Hill, R., & Ding, Z. (2013). Http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6525515. Retrieved March 29, 2016, from http://www.information-management.com/issues/20031001/7398-1.html
|
5.2 | Ausick, P. (2016, March 17). 2016 Data Breaches Up 4.7% Year over Year. Retrieved April 06, 2016, from http://247wallst.com/technology-3/2016/03/17/2016-data-breaches-up-4-7-year-over-year/
|
5.3 | Benjamin, V., Li, W., & Holt, T. (2015, May 27-29). Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops. Retrieved March 29, 2016, from http://ieeexplore.ieee.org/xpls/icp.jsp?arnumber=7165944
|
5.4 | Bruemmer, M. (2016, January 31). 2016 Data Breach Predictions: Hackers More Active than Ever. Retrieved April 06, 2016, from http://www.natlawreview.com/article/2016-data-breach-predictions-hackers-more-active-ever
|
5.5 | Eggerton, J. (2016, March 30). Phishing/Hacking/Malware No. 1 Cause of Data Breaches. Retrieved April 06, 2016, from http://www.multichannel.com/news/finance/phishinghackingmalware-no-1-cause-data-breaches-report/403696
|
5.6 | Fernando, N. (2013, January). Mobile cloud computing: A survey. Retrieved April 06, 2016, from http://www.sciencedirect.com/science/article/pii/S0167739X12001318
|
5.7 | Glenister, D. (2016, April 04). Even Companies With A “Cloud First” Strategy Have Lingering Security Concerns. Retrieved April 06, 2016, from http://cloudtweaks.com/2016/04/companies-cloud-strategy-security-concerns/
|
5.8 | Heath, S. (2015, December 08). Healthcare Data Breaches Top Concern in 2016, Says Experian. Retrieved April 06, 2016, from http://healthitsecurity.com/news/healthcare-data-breaches-top-concern-in-2016-says-experian
|
5.9 | Jia, Z., & Tian, X. (2013, November 24). A novel security private cloud solution based on eCryptfs. Retrieved April 5, 2016, from http://ntserver1.wsulibs.wsu.edu:2310/xpls/icp.jsp?arnumber=6703598
|
5.10 | Kumar, N., & Katta, V. (2014, November 14). Detection of Data Leakage in Cloud Computing Environment. Retrieved from http://ntserver1.wsulibs.wsu.edu:2310/xpls/icp.jsp?arnumber=7065592
|
5.11 | Liu, L., & Hill, R. (2013, March 25). Business Intelligence Security on the Clouds: Challenges, Solutions and Future Directions. Retrieved April 06, 2016, from http://ieeexplore.ieee.org/xpl/abstractAuthors.jsp?arnumber=6525515
|
5.12 | Nimmy, K., & Sethumadhaven, M. (2014, February 17). Novel mutual authentication protocol for cloud computing using secret sharing and steganography. Retrieved from http://ntserver1.wsulibs.wsu.edu:2310/xpls/icp.jsp?arnumber=6814685&tag=1
|
5.13 | Petrantonakis, P. (2014, July 7). The cost of a crisis in an Irregular Dynamic Data Space. Retrieved April 6, 2016, from http://ntserver1.wsulibs.wsu.edu:2310/xpls/icp.jsp?arnumber=6878737
|
5.14 | Qadiree, J., & Maqbool, M. (2016, March 2). Solutions of Cloud Computing Security Issues. Retrieved April 4, 2016, from http://www.ijcstjournal.org/volume-4/issue-2/IJCST-V4I2P7.pdf
|
5.15 | Rashid, F. (2016, March 11). The dirty dozen: 12 cloud security threats. Retrieved April 05, 2016, from http://www.infoworld.com/article/3041078/security/the-dirty-dozen-12-cloud-security-threats.html
|
5.16 | Rawat, S., Dhruv, B., & Kumar, P. (2015, February 13). Dissection and Proposal of Multitudinal Security Threats and Menace in Cloud Computing. Retrieved March 29, 2016, from http://ieeexplore.ieee.org/xpls/icp.jsp?arnumber=7078680
|
5.17 | Rosenquist, M. (2016, March 30). The true cost of data breaches. Retrieved April 06, 2016, from http://blogs.intel.com/evangelists/2016/03/30/the-true-cost-of-data-breaches/
|
5.18 | Thompson, D. (2016). 2016 Security Trends: What's Next for Data Breaches? Retrieved April 6, 2016, from http://www.itbusinessedge.com/slideshows/2016-security-trends-whats-next-for-data-breaches-07.html
|
5.19 | Turkey to investigate massive leak of personal data. (2016, April 06). Retrieved April 06, 2016, from http://www.aljazeera.com/news/2016/04/turkey-investigate-massive-leak-personal-data-160406082317417.html
|
5.20 | Weiquan, X., & Houkui, W. (2013, December 15). The Design Research of Data Security Model Based on Public Cloud. Retrieved April 5, 2016, from http://ntserver1.wsulibs.wsu.edu:2310/xpls/icp.jsp?arnumber=6746501
|
|
|