Total Information Risk Management
eBook - ePub

Total Information Risk Management

Maximizing the Value of Data and Information Assets

  1. 316 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Total Information Risk Management

Maximizing the Value of Data and Information Assets

About this book

How well does your organization manage the risks associated with information quality? Managing information risk is becoming a top priority on the organizational agenda. The increasing sophistication of IT capabilities along with the constantly changing dynamics of global competition are forcing businesses to make use of their information more effectively. Information is becoming a core resource and asset for all organizations; however, it also brings many potential risks to an organization, from strategic, operational, financial, compliance, and environmental to societal. If you continue to struggle to understand and measure how information and its quality affects your business, this book is for you. This reference is in direct response to the new challenges that all managers have to face. Our process helps your organization to understand the "pain points" regarding poor data and information quality so you can concentrate on problems that have a high impact on core business objectives. This book provides you with all the fundamental concepts, guidelines and tools to ensure core business information is identified, protected and used effectively, and written in a language that is clear and easy to understand for non-technical managers.- Shows how to manage information risk using a holistic approach by examining information from all sources- Offers varied perspectives of an author team that brings together academics, practitioners and researchers (both technical and managerial) to provide a comprehensive guide- Provides real-life case studies with practical insight into the management of information risk and offers a basis for broader discussion among managers and practitioners

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Total Information Risk Management by Alexander Borek,Ajith Kumar Parlikad,Jela Webb,Philip Woodall in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.
Part 1
Total Information Risk Management Background
Outline
Chapter 1 Data and Information Assets
Chapter 2 Enterprise Information Management
Chapter 3 How Data and Information Create Risk
Chapter 4 Introduction to Enterprise Risk Management
Chapter 1

Data and Information Assets

Abstract

This chapter introduces key concepts about data and information assets, including a discussion on characteristics of data and information assets, quality of data and information assets, and their business impact.

Keywords

Data and Information Assets; Characteristics; Information Manufacturing; Data and Information Quality; Business Impact
“I would like to assert that data will be the basis of competitive advantage for any organization that you run.”
—Ginni Rometty, CEO of IBM

What you will learn in this chapter

ent
How data and information have become the most important assets of the 21st century
ent
How to define data and information assets and what their unique characteristics are
ent
Key concepts of data and information quality
ent
The business impact of having low-quality data and information assets

Where napoleon meets michael porter: data and information are assets

Napoleon Bonaparte, the great French emperor, conquered nearly the whole of Europe in the early 19th century before he was finally defeated at Waterloo. According to some sources, one of his famous sayings was “war is 90% information.”
In the Second World War, the allies could decrypt the secret codes generated by the ENIGMA machine that the Nazi regime used for communicating. This enabled the allies to end Nazi Germany’s submarine dominance in the world’s oceans.
More recently, in the mid-1980s, Michael Porter, one of the great management thinkers of our generation, observed, together with Victor Millar, that “the information revolution is sweeping through our economy,” thus making information the foremost competitive differentiator.
In a way, in the time between Napoleon and Porter, not much seems to have changed in this regard: information was and is one of the most important factors for competitive advantage. Data and information can help to win wars—both real ones and those we fight in business and our everyday life. And even if you are not competing against another organization, your biggest obstacles might be the constraint of time and resources, thereby limiting the means with which to follow your noble goals. It is no understatement to say that information can make the difference in the fight against poverty, environmental pollution, climate change, and diseases like cancer, malaria, and HIV.
It really does not matter what type of business you are in—information will be key to your success. Your organization could be in the private, public, or nonprofit sector. It may be local, national, or global. It may be a sole trader, a partnership, a company, or a charity. It may be large or small. The permutations are varied, but what is homogenous is the reliance upon information.
Analyzing large volumes of data can provide us with such valuable insights that it can be a true game changer. And because data and information are so valuable and powerful, we call them assets. This chapter explores what is behind the concept of data and information assets. We start with some recent history, look at data and information themselves, including how they are manufactured, their quality, and how they influence the success of organizations.

How data and information have become the most important assets of the 21st century

When you think of the most significant innovation drivers in the 20th century, one of them is surely information technology (IT). IT has fundamentally changed how organizations do business and has revolutionized both product offerings and processes. Think, for example, of the level of automation in manufacturing today, where computer-controlled robot arms have replaced human work, or the digitalization of services, which has led to the emergence of companies like Amazon, Facebook, and Google. In recent years, we have seen IT assets increasingly turn into a commodity (similar to, for example, electricity and water), to such a degree that they are in many cases relatively insignificant in terms of competitive advantage. However, IT has provided the foundation for the rise of another type of resource, which has become central from a strategic point of view: information.
There are two major trends that brought us to the Information Age, and made information a central resource in the 21st century. The first is the massive abundance of information due to the rise of the capabilities and the decreasing costs of IT over the last few decades. Today, information can be automatically captured with technologies like sensors and radio-frequency identification (RFID), efficiently processed using large computer systems, and accessed at any time and place via the Internet. The retailer Wal-Mart, alone, processes one million customer transactions every hour—that is, 2.5 petabytes (The Economist, 2010)—that can be used, for instance, to analyze customer behaviors in ways that have not been possible before.
Of course, this is not exclusive to Wal-Mart. Large IT vendors such as IBM, having recognized the potential that organizations can leverage from all this data, have strategically aligned themselves for a future of Big Data (see, for instance, http://www-01.ibm.com/software/data/bigdata/). The degree of automation that is possible when it comes to managing large quantities of data and information is constantly advancing. Today, we are living in the middle of what has been defined as the Information Age. Nearly every aspect of private and corporate life can and often is captured, processed, and exchanged digitally using personal computers, mobile devices, cameras, microphones, and other types of sensors, radio-frequency identification, Internet, e-commerce applications, social networking, emails, enterprise applications, and corporate and public databases. Potentially, every piece of information, wherever it may reside, could be accessed from any place within seconds. It can be automatically analyzed and combined to provide higher-level insights. Big Data is a resource that we not only have to protect, but also utilize in a way that is most beneficial for society.
The second major trend is the globalization of all economies, which puts organizations under constantly increasing pressure to adapt, innovate, and speed up their processes to keep up with their competitors. Information, using the enormous capabilities of today’s IT, can help companies to make better-informed timely decisions and innovate the business. In a world where almost everything can be outsourced to a cheaper supplier, information (and knowledge) are often the only remaining effective differentiators when no other traditional market barriers exist.
So, “Is data the new oil?” (see Figure 1.1), a question posed by Perry Rotella in an article for Forbes.com, a leading business magazine (Rotella, 2012), referring to a comparison first expressed by Clive Humbyat at the ANA Senior Marketer’s Summit 2006 at Kellogg School of Management, and to Michael Palmer’s blog post in which he wrote: “Data is just like crude. It’s valuable, but if unrefined it cannot really be used. It has to be changed into gas, plastic, chemicals, etc., to create a valuable entity that drives profitable activity; so must data be broken down, analyzed for it to have value” (Palmer, 2006). Jer Thorp responded in a blog article for Harvard Business Review, in which he points out a very valid distinction between data and oil: “Information is the ultimate renewable resource. Any kind of data reserve that exists has not been lying in wait b...

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. In praise of Total Information Risk Management: Maximizing the Value of Data and Information Assets
  7. Acknowledgments
  8. Foreword by Thomas C. Redman
  9. Foreword by John Ladley
  10. About the Authors
  11. Introduction
  12. Part 1: Total Information Risk Management Background
  13. Part 2: Total Information Risk Management Process
  14. Part 3: Total Information Risk Management Techniques
  15. Part 4: Conclusion
  16. Index