SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
Managing Blind
                   A Data Quality
                           and
                 Data Governance
                    Vade Mecum
                  By Peter R. Benson

 Project Leader for ISO 8000, the International
              Standard for Data Quality

          Edited by Melissa M. Hildebrand

                     rev 2012.06.28

        Copyright 2012 by Peter R. Benson

                     ECCMA Edition

                ECCMA Edition License Notes:
 This eBook is licensed for your personal enjoyment only. This
eBook may not be re-sold or given away to other people. If you
  would like to share this eBook with another person, please
   purchase an additional copy for each recipient. If you’re
   reading this eBook and did not purchase it, or it was not
 purchased for your use only, then please visit eccma.org and
        purchase your own copy. It is also available at
 Smashwords.com. Thank you for respecting the hard work of
                           this author.
                         ***~~~***


                              2
Table of Contents

Preface

Basic principles

Chapter 1: Show me the money

Chapter 2: The law of unintended consequences

Chapter 3: Defining data and information

Chapter 4: The characteristics of data and information

Chapter 5: A simplified taxonomy of data

Chapter 6: Defining data quality

Chapter 7: Stating requirements for data

Chapter 8: Building a corporate business language

Chapter 9: Classifications

Chapter 10: Master data record duplication

Chapter 11: Data governance

Chapter 12: Where do we go from here?

Appendix 1: Managing a data cleansing process for assets,
materials or services

Further readings

                             ***~~~***




                                 3
Chapter 1: Show me the money

Business is about profit and profit is generated in the short
term by reducing cost and increasing revenue but in the longer
term by managing risk.

Risk management is fundamental to the finance and insurance
industries where the ability to “predict” is at the core of the
business. The difference between an actuary and a gambler is
data. The actuary promotes their ability to record and analyze
data and the gambler must hide any such ability or risk being
asked to leave the casino.

It is not surprising that data plays a key role in risk
management. Taking a “calculated risk” implies there is some
data upon which you can actually perform the calculation.
Other than in the finance and insurance industries, risk
management is a hard sell to all but the most sophisticated
managers. Cost reduction is a management favorite and an
easier sell, but if you can associate data quality and
governance with revenue growth you’ve scored a home run.

Most recorded examples of failures due to missing or incorrect
data fall into the catastrophic loss category. This is only
because of the enormity of the loss compared to the ease with
which the error was made, or the tiny amount of data involved.

There are whole websites devoted to listing the financial
consequences of data errors. Some of my favorites include;
Timo Elliott’s YouTube account of a simple error in the property

                                 17
tax records that resulted in school budget cutbacks, as well as,
the Mars Climate Orbiter. The Mars Climate Orbiter was a $327
million project that came to an untimely end because of what
has become known as the “metric mix-up.” The software on the
Mars Climate Orbiter used the metric system, while the ground
crew was entering data using the imperial system. There is also
the story of Napoleon’s army who was able to force the
surrender of the Austrian army at Ulm when the Russians failed
to turn up as scheduled purportedly because they were using
the Julian calendar and not the Gregorian calendar used by the
Austrians; now that is what I call being stood up!

We all have personal stories in having to deal with the
consequences of data errors but my absolute personal favorite,
at least in hindsight, involves the IRS. It all began one morning
when I was handed a crisp envelope from the IRS. Inside the
envelope was a letter explaining that I was going to be audited.
This sort of letter sends chills up your spine. When I recovered
and mustered the courage to call the number on the letter, I
was surprised to be speaking to an eminently reasonable
inspector. She asked me to confirm that I was claiming a
deduction for alimony paid to my ex-wife. Not exactly the sort
of thing you wanted to be reminded of, but I was happy to
confirm that this was indeed the case. “According to our
records you have been claiming this deduction for over ten
years,” again not something I cared to be reminded of, but the
answer was an easy “yes”. There was a worrying silence,
followed by, “I am afraid this is not possible.” The chills quickly
                                 18
rolled up my spine again. “The social security number you have
entered on your tax return belongs to a fourteen year old
female living in Utah.” To my utter surprise and after a long
exhale, I was glad to be able to correct the error which turned
out to be no more that a reversal of two digits in the social
security number. You have to be impressed by the ability of the
IRS to connect the dots. I know I was, and I should have quit
while I was ahead. There had been recent news reports about
child brides in Utah, so my reply was “Well at least she was
from Utah.” It did not impress the IRS agent who reminded me
that the IRS office I was speaking to was in Utah; apparently
humor is not a requirement for an IRS agent.

What jumps out from these examples is the multiplier effect. A
simple data error can easily, and all too often does, mushroom
into larger, far reaching and lasting economic fallout. Data
errors are rarely benign; more often than not they are
catastrophic.

As a general rule, most managers are natural risk takers, and
unless you are in the insurance industry, it is an uphill struggle
to associate data quality and governance with meaningful value
in the form of risk management or loss mitigation with one
notable exception. By focusing on resolving frequent small
losses, rather than larger catastrophic losses, it is usually
possible to correlate data quality and governance with reducing
loss. Examples include, reducing production down time and
delivery delays. These are most often considered to be revenue

                                 19
generation and not cost reduction. The correlation between
data quality and delivered production capacity or on time
delivery is generally accepted, and the calculation of the
additional revenue generated is straightforward.

The role quality data plays in reducing cost is also generally
accepted, although the specifics are poorly understood. There
is clear evidence that simple vendor rationalization or group
purchasing will drive down price. However this can be easily
overdone to the point of exchanging short term price
advantage for long term reliance on larger suppliers able to
reclaim the price advantage over the longer term. The ultimate
goal is to commoditize goods and services to the point where
there are many competing suppliers. This requires excellent
vendor, material and service master data. The rewards can be
huge, not only in highly competitive pricing but also in a
flexible and resilient supply chain.

As a general rule most companies can save 10% of their total
expenditure on materials and services simply by good
procurement practices which include maintaining up to date
material and service masters supported by negotiated
contracts. The challenge is to maintain the discipline in the face
of urgent and unpredictable requirements for goods or services.

Most companies make it difficult and time consuming to add a
new item to their material or service masters and the result is
“free text” or “maverick spend." These are off contract
purchases where the item purchased is not in the material or
                                 20
service master, instead a “free text” description is entered in
the purchase order. Free text descriptions are rarely
accompanied by rigorous classification and as a result
management reports start to lose accuracy as an ever
increasing percentage of spend appears under the
“miscellaneous” or “unclassified” headings, hardly a
management confidence builder. It is interesting that most ERP
systems require absolute unambiguous identification of the
party to be paid, on the pretext that it is required by law, which
it is, but they do not require the unambiguous identification of
the items purchased. As many have found out at their
considerable expense, the law also requires the identification
and unambiguous description of the goods or service
purchased. As federal and state governments go on the hunt
for more tax revenue, we can expect to see greater scrutiny of
purchase order line item descriptions to determine what is and
what is not accepted as an "ordinary and necessary” business
expense.

The most common scenario is a big effort to rationalize
procurement, which is then accompanied by a substantial drop
in free text spend. A big part of this effort is the identification
of duplicates. Vendor master duplicates are actually rare in
terms of the identification of the legal entity that needs to be
paid, but less rare is a lack of understanding of the relationship
between suppliers and how this impacts pricing. Customer
record duplication is actually surprisingly common, and worst of
all is material master duplication. Material master record
                                 21
duplication all by itself can easily be responsible for up to a
30% price differential. Chapter 10 deals specifically with the
issue of the identification and resolution of duplicate records
but suffice to say it is not as straight forward of an issue as
many believe. Duplication is a matter of perspective and
timing.

Without good data governance that keeps the master data up
to date, data quality degrades and free text purchasing rises
again. Free text spend is actually a great indicator of the
success of a data quality and data governance program; the
lower the free text spend the more successful the program. It
is not hard to justify a data quality and data governance
program based on the initial measurable savings, but it is
harder to maintain a program as a cost avoidance initiative.

The ultimate goal is to associate a data quality and governance
program with revenue growth, preferably profitable revenue
growth. This can appear challenging but in reality it is not.

In 2010, The Economist Intelligence Unit’s editorial team
conducted a survey of 602 senior executives. Of which, 96% of
the executives surveyed considered data either “extremely
(69%) or somewhat (27%) valuable in creating and
maintaining a competitive advantage.”

Debra D'Agostino, Managing Editor of Business Research at the
Economist Intelligence Unit and editor of the report also states
"It's not enough to merely collect the data; companies need to
create strategies to ensure they can use information to get
                                 22
ahead of their competitors."

How do you use data, let alone data quality and governance as
a competitive advantage? The most common answer is to look
inwards and consider data as a source of knowledge to be
mined for business intelligence. This has been done with
phenomenal success. From targeting customers with highly
contextual and relevant offers, to cutting edge logistics, to
product customization and everything in between.

Wal-Mart can rightly be said to be an information company that
uses retail to generate revenue and not a retail outlet that uses
information to maximize revenue. Data itself has value and
many companies have successfully turned their data into a
revenue source.

Roger Ehrenberg states it well when he says, “In today's world,
every business generates potentially valuable data. The
question is, are there ways of turning passive data into an
active asset to increase the value of the business by making its
products better, delivering a better customer experience, or
creating a data stream that can be licensed to someone for
whom it is most valuable?”

I have found that you can often convincingly calculate the
value of data by identifying the data that is essential to a
specific business process. Without the data, the process may
not fail but it would slow down, revenue would be lost and
costs would increase. Data is rarely the only contributing factor
to the efficiency of a specific process however, by looking at
                                23
how data contributes to the efficiency of the process you can
measure the value of the data.

Of course there is nothing like a crisis to focus attention and
liberate financial resources quickly. In order to sell a data
quality or data governance program it helps if you can find a
burning bridge, and if you cannot find one that is actually on
fire, it is not unknown to find one you can set on fire or at the
very least to point to the enormous and imminent risk of fire. It
really does work, ask any politician.

Any good data quality or data governance specialist will tell you
“Show me the data and I will show you the money.”

                          ***~~~***




                                 24

Más contenido relacionado

Destacado

Data-Ed Webinar: Data Governance Strategies
Data-Ed Webinar: Data Governance StrategiesData-Ed Webinar: Data Governance Strategies
Data-Ed Webinar: Data Governance StrategiesDATAVERSITY
 
Data-Ed Online Webinar: Data Architecture Requirements
Data-Ed Online Webinar: Data Architecture RequirementsData-Ed Online Webinar: Data Architecture Requirements
Data-Ed Online Webinar: Data Architecture RequirementsDATAVERSITY
 
Why Migrate from MySQL to Cassandra
Why Migrate from MySQL to CassandraWhy Migrate from MySQL to Cassandra
Why Migrate from MySQL to CassandraDATAVERSITY
 
Unstructured Data and the Enterprise
Unstructured Data and the EnterpriseUnstructured Data and the Enterprise
Unstructured Data and the EnterpriseDATAVERSITY
 
02 Writing Executable Statments
02 Writing Executable Statments02 Writing Executable Statments
02 Writing Executable Statmentsrehaniltifat
 
09 Managing Dependencies
09 Managing Dependencies09 Managing Dependencies
09 Managing Dependenciesrehaniltifat
 
Data warehousing Demo PPTS | Over View | Introduction
Data warehousing Demo PPTS | Over View | Introduction Data warehousing Demo PPTS | Over View | Introduction
Data warehousing Demo PPTS | Over View | Introduction Kernel Training
 
06 Using More Package Concepts
06 Using More Package Concepts06 Using More Package Concepts
06 Using More Package Conceptsrehaniltifat
 
07 Using Oracle-Supported Package in Application Development
07 Using Oracle-Supported Package in Application Development07 Using Oracle-Supported Package in Application Development
07 Using Oracle-Supported Package in Application Developmentrehaniltifat
 
03 Writing Control Structures, Writing with Compatible Data Types Using Expli...
03 Writing Control Structures, Writing with Compatible Data Types Using Expli...03 Writing Control Structures, Writing with Compatible Data Types Using Expli...
03 Writing Control Structures, Writing with Compatible Data Types Using Expli...rehaniltifat
 
05 Creating Stored Procedures
05 Creating Stored Procedures05 Creating Stored Procedures
05 Creating Stored Proceduresrehaniltifat
 
08 Dynamic SQL and Metadata
08 Dynamic SQL and Metadata08 Dynamic SQL and Metadata
08 Dynamic SQL and Metadatarehaniltifat
 
Data-Ed Webinar: Data-centric Strategy & Roadmap
Data-Ed Webinar: Data-centric Strategy & RoadmapData-Ed Webinar: Data-centric Strategy & Roadmap
Data-Ed Webinar: Data-centric Strategy & RoadmapDATAVERSITY
 

Destacado (14)

Data-Ed Webinar: Data Governance Strategies
Data-Ed Webinar: Data Governance StrategiesData-Ed Webinar: Data Governance Strategies
Data-Ed Webinar: Data Governance Strategies
 
Data-Ed Online Webinar: Data Architecture Requirements
Data-Ed Online Webinar: Data Architecture RequirementsData-Ed Online Webinar: Data Architecture Requirements
Data-Ed Online Webinar: Data Architecture Requirements
 
Big Data Hadoop Training Course
Big Data Hadoop Training CourseBig Data Hadoop Training Course
Big Data Hadoop Training Course
 
Why Migrate from MySQL to Cassandra
Why Migrate from MySQL to CassandraWhy Migrate from MySQL to Cassandra
Why Migrate from MySQL to Cassandra
 
Unstructured Data and the Enterprise
Unstructured Data and the EnterpriseUnstructured Data and the Enterprise
Unstructured Data and the Enterprise
 
02 Writing Executable Statments
02 Writing Executable Statments02 Writing Executable Statments
02 Writing Executable Statments
 
09 Managing Dependencies
09 Managing Dependencies09 Managing Dependencies
09 Managing Dependencies
 
Data warehousing Demo PPTS | Over View | Introduction
Data warehousing Demo PPTS | Over View | Introduction Data warehousing Demo PPTS | Over View | Introduction
Data warehousing Demo PPTS | Over View | Introduction
 
06 Using More Package Concepts
06 Using More Package Concepts06 Using More Package Concepts
06 Using More Package Concepts
 
07 Using Oracle-Supported Package in Application Development
07 Using Oracle-Supported Package in Application Development07 Using Oracle-Supported Package in Application Development
07 Using Oracle-Supported Package in Application Development
 
03 Writing Control Structures, Writing with Compatible Data Types Using Expli...
03 Writing Control Structures, Writing with Compatible Data Types Using Expli...03 Writing Control Structures, Writing with Compatible Data Types Using Expli...
03 Writing Control Structures, Writing with Compatible Data Types Using Expli...
 
05 Creating Stored Procedures
05 Creating Stored Procedures05 Creating Stored Procedures
05 Creating Stored Procedures
 
08 Dynamic SQL and Metadata
08 Dynamic SQL and Metadata08 Dynamic SQL and Metadata
08 Dynamic SQL and Metadata
 
Data-Ed Webinar: Data-centric Strategy & Roadmap
Data-Ed Webinar: Data-centric Strategy & RoadmapData-Ed Webinar: Data-centric Strategy & Roadmap
Data-Ed Webinar: Data-centric Strategy & Roadmap
 

Similar a Managing Blind Chapter 1

Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Carolyn Kopf
 
Conclusion Research Pap. Online assignment writing service.
Conclusion Research Pap. Online assignment writing service.Conclusion Research Pap. Online assignment writing service.
Conclusion Research Pap. Online assignment writing service.Lesly Lockwood
 
The Antithesis Area
The Antithesis AreaThe Antithesis Area
The Antithesis AreaAngela Weber
 
DataManagement_Waters_GFT_trimmed
DataManagement_Waters_GFT_trimmedDataManagement_Waters_GFT_trimmed
DataManagement_Waters_GFT_trimmedDana Canavan
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteDave Steer
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO
 
Chapter 12REVENUE AND INVENTORY-RELATED FINANCIAL STATEMENT .docx
Chapter 12REVENUE AND INVENTORY-RELATED FINANCIAL STATEMENT .docxChapter 12REVENUE AND INVENTORY-RELATED FINANCIAL STATEMENT .docx
Chapter 12REVENUE AND INVENTORY-RELATED FINANCIAL STATEMENT .docxcravennichole326
 
Essay On Respect Your Elders In English
Essay On Respect Your Elders In EnglishEssay On Respect Your Elders In English
Essay On Respect Your Elders In EnglishLisa Johnson
 
January 2017 Printed Newsletter
January 2017 Printed NewsletterJanuary 2017 Printed Newsletter
January 2017 Printed NewsletterYigal Behar
 
Ivory Essay Uk. Online assignment writing service.
Ivory Essay Uk. Online assignment writing service.Ivory Essay Uk. Online assignment writing service.
Ivory Essay Uk. Online assignment writing service.Tonya Jackson
 
Achieving Regulatory Compliance The Devil Is In The Data Governance V2
Achieving Regulatory Compliance   The Devil Is In The Data Governance V2Achieving Regulatory Compliance   The Devil Is In The Data Governance V2
Achieving Regulatory Compliance The Devil Is In The Data Governance V2Ken O'Connor
 
8 Best Images Of Printable Lined Letter Writing Paper
8 Best Images Of Printable Lined Letter Writing Paper8 Best Images Of Printable Lined Letter Writing Paper
8 Best Images Of Printable Lined Letter Writing PaperDebra Perea
 
7 reasons why your b2b demand gen sucks
7 reasons why your b2b demand gen sucks7 reasons why your b2b demand gen sucks
7 reasons why your b2b demand gen sucksConvergeHub
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPNick Selby
 
Whats The Fuss?
Whats The Fuss? Whats The Fuss?
Whats The Fuss? barrp
 
Facts, Figures & Fictions
Facts, Figures & Fictions Facts, Figures & Fictions
Facts, Figures & Fictions Johnbillett.com
 
Amazingly Simple Stuff
Amazingly Simple StuffAmazingly Simple Stuff
Amazingly Simple StuffPhilip Arnold
 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009canadianlawyer
 

Similar a Managing Blind Chapter 1 (20)

Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706
 
Conclusion Research Pap. Online assignment writing service.
Conclusion Research Pap. Online assignment writing service.Conclusion Research Pap. Online assignment writing service.
Conclusion Research Pap. Online assignment writing service.
 
The Antithesis Area
The Antithesis AreaThe Antithesis Area
The Antithesis Area
 
DataManagement_Waters_GFT_trimmed
DataManagement_Waters_GFT_trimmedDataManagement_Waters_GFT_trimmed
DataManagement_Waters_GFT_trimmed
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to Waste
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy
 
Chapter 12REVENUE AND INVENTORY-RELATED FINANCIAL STATEMENT .docx
Chapter 12REVENUE AND INVENTORY-RELATED FINANCIAL STATEMENT .docxChapter 12REVENUE AND INVENTORY-RELATED FINANCIAL STATEMENT .docx
Chapter 12REVENUE AND INVENTORY-RELATED FINANCIAL STATEMENT .docx
 
Essay On Respect Your Elders In English
Essay On Respect Your Elders In EnglishEssay On Respect Your Elders In English
Essay On Respect Your Elders In English
 
January 2017 Printed Newsletter
January 2017 Printed NewsletterJanuary 2017 Printed Newsletter
January 2017 Printed Newsletter
 
Ivory Essay Uk. Online assignment writing service.
Ivory Essay Uk. Online assignment writing service.Ivory Essay Uk. Online assignment writing service.
Ivory Essay Uk. Online assignment writing service.
 
10 reasons hr legal dp
10 reasons hr legal dp10 reasons hr legal dp
10 reasons hr legal dp
 
Achieving Regulatory Compliance The Devil Is In The Data Governance V2
Achieving Regulatory Compliance   The Devil Is In The Data Governance V2Achieving Regulatory Compliance   The Devil Is In The Data Governance V2
Achieving Regulatory Compliance The Devil Is In The Data Governance V2
 
8 Best Images Of Printable Lined Letter Writing Paper
8 Best Images Of Printable Lined Letter Writing Paper8 Best Images Of Printable Lined Letter Writing Paper
8 Best Images Of Printable Lined Letter Writing Paper
 
Bus
BusBus
Bus
 
7 reasons why your b2b demand gen sucks
7 reasons why your b2b demand gen sucks7 reasons why your b2b demand gen sucks
7 reasons why your b2b demand gen sucks
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLP
 
Whats The Fuss?
Whats The Fuss? Whats The Fuss?
Whats The Fuss?
 
Facts, Figures & Fictions
Facts, Figures & Fictions Facts, Figures & Fictions
Facts, Figures & Fictions
 
Amazingly Simple Stuff
Amazingly Simple StuffAmazingly Simple Stuff
Amazingly Simple Stuff
 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009
 

Más de DATAVERSITY

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...DATAVERSITY
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceDATAVERSITY
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data LiteracyDATAVERSITY
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsDATAVERSITY
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for YouDATAVERSITY
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?DATAVERSITY
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?DATAVERSITY
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling FundamentalsDATAVERSITY
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectDATAVERSITY
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at ScaleDATAVERSITY
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?DATAVERSITY
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...DATAVERSITY
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?DATAVERSITY
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsDATAVERSITY
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayDATAVERSITY
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise AnalyticsDATAVERSITY
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best PracticesDATAVERSITY
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?DATAVERSITY
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best PracticesDATAVERSITY
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageDATAVERSITY
 

Más de DATAVERSITY (20)

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and Governance
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data Literacy
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business Goals
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for You
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling Fundamentals
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic Project
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at Scale
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and Forwards
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement Today
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best Practices
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best Practices
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive Advantage
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Managing Blind Chapter 1

  • 1.
  • 2. Managing Blind A Data Quality and Data Governance Vade Mecum By Peter R. Benson Project Leader for ISO 8000, the International Standard for Data Quality Edited by Melissa M. Hildebrand rev 2012.06.28 Copyright 2012 by Peter R. Benson ECCMA Edition ECCMA Edition License Notes: This eBook is licensed for your personal enjoyment only. This eBook may not be re-sold or given away to other people. If you would like to share this eBook with another person, please purchase an additional copy for each recipient. If you’re reading this eBook and did not purchase it, or it was not purchased for your use only, then please visit eccma.org and purchase your own copy. It is also available at Smashwords.com. Thank you for respecting the hard work of this author. ***~~~*** 2
  • 3. Table of Contents Preface Basic principles Chapter 1: Show me the money Chapter 2: The law of unintended consequences Chapter 3: Defining data and information Chapter 4: The characteristics of data and information Chapter 5: A simplified taxonomy of data Chapter 6: Defining data quality Chapter 7: Stating requirements for data Chapter 8: Building a corporate business language Chapter 9: Classifications Chapter 10: Master data record duplication Chapter 11: Data governance Chapter 12: Where do we go from here? Appendix 1: Managing a data cleansing process for assets, materials or services Further readings ***~~~*** 3
  • 4. Chapter 1: Show me the money Business is about profit and profit is generated in the short term by reducing cost and increasing revenue but in the longer term by managing risk. Risk management is fundamental to the finance and insurance industries where the ability to “predict” is at the core of the business. The difference between an actuary and a gambler is data. The actuary promotes their ability to record and analyze data and the gambler must hide any such ability or risk being asked to leave the casino. It is not surprising that data plays a key role in risk management. Taking a “calculated risk” implies there is some data upon which you can actually perform the calculation. Other than in the finance and insurance industries, risk management is a hard sell to all but the most sophisticated managers. Cost reduction is a management favorite and an easier sell, but if you can associate data quality and governance with revenue growth you’ve scored a home run. Most recorded examples of failures due to missing or incorrect data fall into the catastrophic loss category. This is only because of the enormity of the loss compared to the ease with which the error was made, or the tiny amount of data involved. There are whole websites devoted to listing the financial consequences of data errors. Some of my favorites include; Timo Elliott’s YouTube account of a simple error in the property 17
  • 5. tax records that resulted in school budget cutbacks, as well as, the Mars Climate Orbiter. The Mars Climate Orbiter was a $327 million project that came to an untimely end because of what has become known as the “metric mix-up.” The software on the Mars Climate Orbiter used the metric system, while the ground crew was entering data using the imperial system. There is also the story of Napoleon’s army who was able to force the surrender of the Austrian army at Ulm when the Russians failed to turn up as scheduled purportedly because they were using the Julian calendar and not the Gregorian calendar used by the Austrians; now that is what I call being stood up! We all have personal stories in having to deal with the consequences of data errors but my absolute personal favorite, at least in hindsight, involves the IRS. It all began one morning when I was handed a crisp envelope from the IRS. Inside the envelope was a letter explaining that I was going to be audited. This sort of letter sends chills up your spine. When I recovered and mustered the courage to call the number on the letter, I was surprised to be speaking to an eminently reasonable inspector. She asked me to confirm that I was claiming a deduction for alimony paid to my ex-wife. Not exactly the sort of thing you wanted to be reminded of, but I was happy to confirm that this was indeed the case. “According to our records you have been claiming this deduction for over ten years,” again not something I cared to be reminded of, but the answer was an easy “yes”. There was a worrying silence, followed by, “I am afraid this is not possible.” The chills quickly 18
  • 6. rolled up my spine again. “The social security number you have entered on your tax return belongs to a fourteen year old female living in Utah.” To my utter surprise and after a long exhale, I was glad to be able to correct the error which turned out to be no more that a reversal of two digits in the social security number. You have to be impressed by the ability of the IRS to connect the dots. I know I was, and I should have quit while I was ahead. There had been recent news reports about child brides in Utah, so my reply was “Well at least she was from Utah.” It did not impress the IRS agent who reminded me that the IRS office I was speaking to was in Utah; apparently humor is not a requirement for an IRS agent. What jumps out from these examples is the multiplier effect. A simple data error can easily, and all too often does, mushroom into larger, far reaching and lasting economic fallout. Data errors are rarely benign; more often than not they are catastrophic. As a general rule, most managers are natural risk takers, and unless you are in the insurance industry, it is an uphill struggle to associate data quality and governance with meaningful value in the form of risk management or loss mitigation with one notable exception. By focusing on resolving frequent small losses, rather than larger catastrophic losses, it is usually possible to correlate data quality and governance with reducing loss. Examples include, reducing production down time and delivery delays. These are most often considered to be revenue 19
  • 7. generation and not cost reduction. The correlation between data quality and delivered production capacity or on time delivery is generally accepted, and the calculation of the additional revenue generated is straightforward. The role quality data plays in reducing cost is also generally accepted, although the specifics are poorly understood. There is clear evidence that simple vendor rationalization or group purchasing will drive down price. However this can be easily overdone to the point of exchanging short term price advantage for long term reliance on larger suppliers able to reclaim the price advantage over the longer term. The ultimate goal is to commoditize goods and services to the point where there are many competing suppliers. This requires excellent vendor, material and service master data. The rewards can be huge, not only in highly competitive pricing but also in a flexible and resilient supply chain. As a general rule most companies can save 10% of their total expenditure on materials and services simply by good procurement practices which include maintaining up to date material and service masters supported by negotiated contracts. The challenge is to maintain the discipline in the face of urgent and unpredictable requirements for goods or services. Most companies make it difficult and time consuming to add a new item to their material or service masters and the result is “free text” or “maverick spend." These are off contract purchases where the item purchased is not in the material or 20
  • 8. service master, instead a “free text” description is entered in the purchase order. Free text descriptions are rarely accompanied by rigorous classification and as a result management reports start to lose accuracy as an ever increasing percentage of spend appears under the “miscellaneous” or “unclassified” headings, hardly a management confidence builder. It is interesting that most ERP systems require absolute unambiguous identification of the party to be paid, on the pretext that it is required by law, which it is, but they do not require the unambiguous identification of the items purchased. As many have found out at their considerable expense, the law also requires the identification and unambiguous description of the goods or service purchased. As federal and state governments go on the hunt for more tax revenue, we can expect to see greater scrutiny of purchase order line item descriptions to determine what is and what is not accepted as an "ordinary and necessary” business expense. The most common scenario is a big effort to rationalize procurement, which is then accompanied by a substantial drop in free text spend. A big part of this effort is the identification of duplicates. Vendor master duplicates are actually rare in terms of the identification of the legal entity that needs to be paid, but less rare is a lack of understanding of the relationship between suppliers and how this impacts pricing. Customer record duplication is actually surprisingly common, and worst of all is material master duplication. Material master record 21
  • 9. duplication all by itself can easily be responsible for up to a 30% price differential. Chapter 10 deals specifically with the issue of the identification and resolution of duplicate records but suffice to say it is not as straight forward of an issue as many believe. Duplication is a matter of perspective and timing. Without good data governance that keeps the master data up to date, data quality degrades and free text purchasing rises again. Free text spend is actually a great indicator of the success of a data quality and data governance program; the lower the free text spend the more successful the program. It is not hard to justify a data quality and data governance program based on the initial measurable savings, but it is harder to maintain a program as a cost avoidance initiative. The ultimate goal is to associate a data quality and governance program with revenue growth, preferably profitable revenue growth. This can appear challenging but in reality it is not. In 2010, The Economist Intelligence Unit’s editorial team conducted a survey of 602 senior executives. Of which, 96% of the executives surveyed considered data either “extremely (69%) or somewhat (27%) valuable in creating and maintaining a competitive advantage.” Debra D'Agostino, Managing Editor of Business Research at the Economist Intelligence Unit and editor of the report also states "It's not enough to merely collect the data; companies need to create strategies to ensure they can use information to get 22
  • 10. ahead of their competitors." How do you use data, let alone data quality and governance as a competitive advantage? The most common answer is to look inwards and consider data as a source of knowledge to be mined for business intelligence. This has been done with phenomenal success. From targeting customers with highly contextual and relevant offers, to cutting edge logistics, to product customization and everything in between. Wal-Mart can rightly be said to be an information company that uses retail to generate revenue and not a retail outlet that uses information to maximize revenue. Data itself has value and many companies have successfully turned their data into a revenue source. Roger Ehrenberg states it well when he says, “In today's world, every business generates potentially valuable data. The question is, are there ways of turning passive data into an active asset to increase the value of the business by making its products better, delivering a better customer experience, or creating a data stream that can be licensed to someone for whom it is most valuable?” I have found that you can often convincingly calculate the value of data by identifying the data that is essential to a specific business process. Without the data, the process may not fail but it would slow down, revenue would be lost and costs would increase. Data is rarely the only contributing factor to the efficiency of a specific process however, by looking at 23
  • 11. how data contributes to the efficiency of the process you can measure the value of the data. Of course there is nothing like a crisis to focus attention and liberate financial resources quickly. In order to sell a data quality or data governance program it helps if you can find a burning bridge, and if you cannot find one that is actually on fire, it is not unknown to find one you can set on fire or at the very least to point to the enormous and imminent risk of fire. It really does work, ask any politician. Any good data quality or data governance specialist will tell you “Show me the data and I will show you the money.” ***~~~*** 24