Data Governance
Data Governance
GOVERNANCE
Creating Value from
Information Assets
DATA
GOVERNANCE
Creating Value from
Information Assets
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize to
copyright holders if permission to publish in this form has not been obtained. If any copyright material has
not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit-
ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented,
including photocopying, microfilming, and recording, or in any information storage or retrieval system,
without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.
com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the CCC,
a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used
only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
v
vi • Contents
Index..................................................................................................... 241
Preface
As a rule, he or she who has the most information will have the greatest
success in life.
Benjamin Disraeli
vii
viii • Preface
ix
Contributors
xi
xii • Contributors
xiii
1
The Role of Data Governance
in an Organization
Neera Bhansali
CONTENTS
Introduction.........................................................................................................1
The Need for Data Governance.........................................................................2
Place for Data Governance in Organizational Strategy..................................3
Data Governance across Intrafirm Networks..................................................4
Data Governance Characteristics of Organizations through Their
Life Cycle..............................................................................................................5
Data Governance Program.................................................................................7
Benefits from Data Governance........................................................................9
Data Quality and Data Governance Process..................................................10
Data Governance and Master Data Management.........................................13
Managing Risk with Data Governance...........................................................13
Information Governance and Cloud Computing.........................................14
Conclusion.........................................................................................................15
References...........................................................................................................16
Further Readings...............................................................................................16
INTRODUCTION
In today’s fast-paced global economy, changes in the environment result
in new opportunities for wealth creation that decision makers use in strat-
egy formulation and implementation. Organizations have grown global by
not only expanding businesses and setting up branches overseas, but they
have grown global in a different kind of way—leveraging on knowledge
tapped globally rather than merely growing outward from a domestic
base. In organizations, information from various departments and func-
tions, as well as formal and informal sources of information, are bought
1
2 • Neera Bhansali
outside the organization. Data governance also helps the business units
to be better prepared for information sharing with the other units within
the organization. Data governance structures promote the develop-
ment of intrafirm networks within the organization in order for data
and other resources to be transferred or exchanged and distributed effi-
ciently throughout the organization to gain competitive advantage. Strong
intrafirm networks enhance reciprocity, cohesiveness, and connectivity
among business units (Rindfleisch and Moorman, 2001).
Globalization of the economy, dealing with trusting business partners
at great distances and ensuring that information is properly used and has
agreed-upon qualities and limits, emphasizes the need of a data gover-
nance structure. These needs are met by data governance policies that
oversee the flow of information and design information products to meet
new values criteria. Managements have to make data governance decisions
as to what information should be shared, what quality controls should be
in place to assure others of its validity, who should have access to data and
information, in what forms, and at what levels of access,
analysis to another and naming dissimilar data with different names pro-
motes transparency and consistency in analyses both individually and
as a whole. Knowing the audience, context, and purpose of data collec-
tion leads to good data stewardship. By implementing standards and data
governance processes, organizations are able to reduce potential risk of
accepting and analyzing poor quality data, and the costs of rework and
duplicate data.
created the need for enterprises to develop formal data governance strat-
egies and programs. In the financial sector, compliance, data security,
brand and trust protection, and the need for quality data are all elements
critically important to the sector. Technological advances have provided
wider access to data that has been accompanied by widening data security
problems. This dynamic nature of security threats makes a strong corpo-
rate data governance program essential. Data governance is an ongoing
process of monitoring, evaluating, and assessing data, its users, and data-
base activity to better understand and control data risk; and to ensure that
data is being used for the maximum benefit of all stakeholders.
Data governance provides a system of checks and balances. Data gover-
nance comprises the people, processes, and technology necessary for an
entity to properly use and manage data. It uses technology tools and solu-
tions to protect the integrity and security of the data and monitoring and
reporting processes to ensure the data governance policies of the organi-
zation are adhered to.
There are major data risk categories across a variety of data sources.
Data sources could be Web data, such as email, Internet; mobile data, such
as laptops, USB; or core data stored in databases and file servers. Data
risks could comprise confidentiality, integrity, and availability risks for
data. The data governance program puts into practice risk management
across these data sources to meet governance goals at the business level.
The data governance program prioritizes risks and data sources and out-
lines appropriate measures to contain the risks. These measures are based
on the sensitivity of the business data (person-identifiable data, such as
Social Security numbers, private health information), the security of the
stored data (encrypted or unencrypted), the controls around accessing the
data (type of users, data flow, application access), and processes toward
reduction of risks caused by data access (risk mitigation policies enforced,
user access control, firewalls).
INFORMATION GOVERNANCE
AND CLOUD COMPUTING
Reduced transaction costs, increased computational power, and new
communication technologies are shifting many interactions from the
physical realm to the virtual. Cloud computing is a movement that allows
The Role of Data Governance in an Organization • 15
CONCLUSION
The digital world has led to an exponential growth in both the volume
and detail of information that can be captured. The McKinsey Global
Institute estimates that data volume is growing 40% per year, and will
grow 44-fold between 2009 and 2020. Big data, which is information
gleaned from nontraditional sources such as blogs, social media, email,
16 • Neera Bhansali
REFERENCES
Achrol, R., and P. Kotler. 1999. Marketing in the network economy. Journal of Marketing
63: 146–163.
Blair, B. T. 2010. Governance for protecting information in the cloud. Information
Management 44 (5): HT1–HT4
Khatri, V. and C. V. Brown. 2010. Designing data governance. Communications of the ACM
January 53 (1): 148–152.
Porter, M. E. 1980. Competitive Strategy: Technique for analyzing industries and competitors.
New York: The Free Press.
Rindfleisch, A., and C. Moorman. 2001. The acquisition and utilization of information in
new product alliances: Strength of ties perspective. Journal of Marketing 65 (2): 1–18.
Waddington, B. 2010. Data governance, MDM, and data quality. Information Management
(Sept./Oct.) 10: 14–16.
FURTHER READINGS
Craine, K. 2007. Managing the cycle of change: Resisting change is normal, but it is prob-
lematic for organizations looking to make changes or implement new technologies.
Information Management 41 (5) September-October: 44.
Dearstyne, B. 2004. Strategic information management: Continuing need, continuing
opportunities. Information Management 38 (2) March-April: 28.
Griffin, J. 2010. Four critical principles of data governance success: Appreciation for
the true value of business data is key. Information Management 20 (1) Feb 1: 28.
Lam, L. T., and S. Kirby. 2002. Is EQ an advantage? An exploration of the impact of emo-
tional and general intelligence on individual performance. Journal of Social Psychology
142: 133–143.
Marvel, M. R., and M. Afzalur Rahim. 2011. The role of emotional intelligence in environ-
mental scanning behavior: A cross-cultural study. Academy of Strategic Management
Journal 10 (2) July: 83.
The Role of Data Governance in an Organization • 17
Oracle White Paper. 2012. Big data for the enterprise. Available online at: http://www.
oracle.com/us/products/database/big-data-for-enterprise-519135.pdf
Salovey, P., and J. D. Mayer. 1990. EQ. Journal of Imagination, Cognition, and Personality
9 (3): 85–211.
Sparrow, P. R. 2000. Strategic management in a world turned upside down: The role of cogni-
tion, intuition and emotional intelligence. In Managing strategy implementation, eds.
P. Flood, T. Dromgoole, S. Carroll, and L. Gorman, pp. 15–30. Oxford, U.K.: Blackwell.
Vednere, G. 2010. Harnessing the winds of change. Information Management 44 (6)
November-December: 28.
2
Navigating the Organization
to Ensure Data Governance
Neera Bhansali
CONTENTS
Introduction...................................................................................................... 20
Data Governance Maturity Models................................................................ 20
Data Governance Structure..............................................................................24
Data Stewardship..........................................................................................26
Organizational Responsibilities for Data Governance.................................27
Stakeholder Relationships.......................................................................... 28
Senior Management Responsibilities............................................................. 30
Disaster Recovery.........................................................................................31
User Responsibilities.........................................................................................32
Emotional Intelligence Affecting Data Governance.....................................32
Change Management in Data Governance....................................................33
Organizational Culture and Its Impact On Data Governance....................36
Culture of Accountability............................................................................36
What Makes Data Governance a Successful Program?................................38
Clear Ownership...........................................................................................38
Value Recognition........................................................................................39
Data Policies and Procedures......................................................................39
Data Quality................................................................................................. 40
Challenges of Data Governance..................................................................... 40
Lessons Learned................................................................................................41
References.......................................................................................................... 42
Further Readings.............................................................................................. 42
19
20 • Neera Bhansali
INTRODUCTION
In today’s increasingly digital environment, organizations are informa-
tion-aggressive. They routinely collect, analyze, and use information in
key areas relating to customers, products, changes in the business envi-
ronment, and other areas. Information is recognized and understood to
be an important strategic resource and asset in advancing organizational
goals. Organizations recognize that for surviving and growing in this
highly competitive and digital environment, controlling all aspects of data
and information is essential. Organizations are increasingly realizing the
inherent value of their data as they exploit the services offered by cloud
computing. Data governance facilitates an organization in taking control
of its data resources. The need for data governance has risen as the neces-
sity to coordinate, control, and manage all aspects of data in an enterprise
has grown. Data governance is a convergence of several areas concerned
with data, such as data management, data security, data administration,
and data quality.
Data governance initiatives are funded in diverse manners within dif-
ferent organizations, such as out of operational budgets. In some cases, it
is a one-off executive decision. Sometimes the costs are buried in different
departments within the organization, e.g., information technology (to buy
software tools to support data quality), sales, or planning. Data governance
is not a one-time project, but an ongoing exercise of continuous improve-
ment and, therefore, requires continued support in the organization.
Understanding the readiness of the organization for data governance is
the first step in the implementation of data governance in an organization.
Certain parts of the organization are more ready than others. Data gov-
ernance must be a business-driven program that uses a data governance
maturity model to build a strategic road map. Apart from strong executive
sponsorship (working across the dimensions of people), process, technology,
and information are critical to the success of the data governance program.
and disposition. For each of these, the GARP consists of the following
five levels:
Data
Governance
Council
Data Stewards
FIGURE 2.1
Data governance structure.
issues to the data governance office for resolution. The leader of the data
governance program usually displays a strong leadership style and holds
delegated authority from the CEO.
Data Stewardship
Data stewards include business stewards (who are responsible for the data)
and IT stewards (who are responsible for the technology). Data gover-
nance is an organizational discipline, driven by the business, but enabled
by IT. The data stewards, along with IT, create new processes that span
enterprise-wide applications, to handle anomalies in the master data,
to correct error conditions across multiple databases, and to create data
governance policies and processes that are enforced automatically. The
data governance organization, while being business-driven, utilizes tech-
nology to attain its goals. The tactical execution of data governance poli-
cies and decisions is through data management. Just as data governance is
business-driven, data management is often IT driven. This includes tools
for master data management (MDM), data integration, data quality and
data profiling, metadata management, business process management,
business rules management, data policy management, collaboration tools,
and data security management.
Data stewardship is handling data in a responsible, consistent, and
trustworthy way. Many data-intensive industries have recognized the
need for employees whose role is to monitor and enforce good data prac-
tices. The data stewards enable the management of data as an enterprise
asset. The data stewards from the business areas are each responsible for a
set of data. That responsibility includes providing definitions, establishing
quality expectations, and ensuring compliance. It also includes establish-
ing business rules for acquisitions, maintenance, and use of data. A data
stewardship program helps perform these business functions in a system-
atic manner. To effectively perform these roles, the data steward needs to
have appropriate technical, interpersonal, and positional skills.
Because data stewards are responsible for making the decisions in their
areas, it is essential that they have a solid understanding of the business
area they represent, the data used within that area, and the business pro-
cesses that impact that data and its use. The data stewards have data quality
responsibilities as well. It requires their comprehensive understanding of
quality improvement concepts, including data profiling, to understand the
data’s current state and determine data quality issues, root cause analysis
Navigating the Organization to Ensure Data Governance • 27
to identify the reasons for data quality issues, and continuous quality
improvement to identify preventive and corrective actions. Data stewards
ensure that the data definitions, data standards, and the associated busi-
ness rules are defined and documented within their domain for organi-
zational use and that the data is profiled. They also track data deficiencies
and help in formalizing and improving data management processes. An
overall knowledge of data modeling and database design also is required
as they interact with IT to determine the way data is stored and recorded in
physical databases. Apart from technical skills, possessing interpersonal
skills for a data steward is very important. Excellent people and negotiat-
ing skills allow them to be diplomatic, be a team player where necessary,
and mandate changes where appropriate.
Organizations have begun to recognize the need to define terminology
and business rules around data that is increasingly shared across business
processes and organizations. Business leaders are recognizing the costs
incurred in the enormous and often-replicated efforts involved in finding,
gathering, annotating, consolidating, and deploying data to support grow-
ing projects. Clear policies for the definition, access, and use of c orporate
information raise the probability of data being leveraged to streamline
business processes, generate new r evenue, and drive innovation.
As data governance involves people and processes in addition to data,
business process management or process automation is often the way
to effectively solve some governance problem costs. As data governance
evolves, it encompasses new roles, new processes, and specialized skills to
support it. It cultivates an awareness of specialized skills, processes, and
tools needed to define, maintain, and provision data across the enterprise.
ORGANIZATIONAL RESPONSIBILITIES
FOR DATA GOVERNANCE
Data governance incorporates five major components:
Stakeholder Relationships
Stakeholder relationships are important in data governance and data man-
agement. The relevance of stakeholder relationships is even greater given
governance failures involving data warehouses. This section discusses the
importance and determinants of stakeholder relationship and the role it plays
in determining whether data governance will be effective. An organization’s
ability to develop and maintain strong relationships with their salient stake-
holder groups improves the chance that data governance will continue.
Superior stakeholder satisfaction is critical for successful data gover-
nance in a hypercompetitive environment. The success or failure of data
governance is dependent on both the characteristics of the organization
as well as the specific stakeholder groups and the nature of the interaction
between them. Porter (1980) recognized the importance of the stakeholder
groups when he formulated his “Five Forces” model of competition, which
includes the bargaining power of customers and the bargaining power of
suppliers. The nature of stakeholder relationships can be very dynamic.
Data managers should promote stakeholder relationship strategies as
effective managerial tools for their organizations. Stakeholders are those
without whose continuing participation, the data governance cannot
Navigating the Organization to Ensure Data Governance • 29
Disaster Recovery
Data governance also extends to the disaster recovery plans for an orga-
nization. IT systems are gaining ever greater prominence in the overall
structure of many corporations. An organization’s success depends on its
ability to provide data and information to its customers and employees
in a reliable manner. Establishing reliable disaster recovery capabilities is
critical to ensuring that an organization will be able to survive significant
events, such as computer outage due to natural calamities or power out-
age. A disaster could mean an outage of the entire IT infrastructure or
some components for several hours to several days or months. Examples
of such events are the earthquake and tsunamis in Japan, 2011, and
Hurricane Katrina in New Orleans in 2005. Due to the ever-increasing
complexity in today’s computer networks, disaster recovery plans have to
be well laid out so that an organization can reinstate its IT systems and
services after a significant large-scale interruption. A disaster recovery
plan describes the IT mechanisms for the purpose of bringing a func-
tioning system back online (Robb, 2005). This applies to data loss and
information components of the information systems (ISs), too. Creation
of a remote disaster recovery center is often the first step in developing a
well-organized plan. Other times multiple backup sites are established
for business critical applications and resources are dedicated to data
communication channels and external data storage. An appropriate plan
depending on the organization should be created and the contents of the
plan should be documented, tested, and updated. Effective documenta-
tion and procedures are extremely important in a disaster recovery plan
for continuity of operations after the disaster.
32 • Neera Bhansali
USER RESPONSIBILITIES
Data governance is not just the responsibility of the senior leadership and
management. The responsibility of successful data governance lies with
the users as well. User responsibilities include:
EMOTIONAL INTELLIGENCE
AFFECTING DATA GOVERNANCE
For effective data governance, the level of emotional intelligence of its
participants plays an important role. Emotional intelligence is one’s ability
to be aware of one’s own feelings, be aware of others’ feelings, to differenti-
ate among them, and to use the information to guide one’s thinking and
behavior (Salovey and Mayer, 1990). A person’s ability to exercise emo-
tional intelligence (EQ) influences his/her ability to work across depart-
ments or functions. EQ has been linked to work outcomes and improved
task performance (Lam and Kirby, 2002). Organizations around the world
seek and analyze information to compete effectively. Managers use their
skill sets and competencies to understand their organizational world and
translate information into actionable strategies (Sparrow, 2000). Often
managerial executives have unequal abilities to bring about or transfer
new data or information. Unequal competencies exist in collecting or
socializing information. These differences affect the performance of good
data governance. They hinder the transfer of key information between the
source of data or information and its recipient.
National and organizational culture has been found to affect mana-
gerial styles and behaviors (Marvel and Rahim, 2011). Managerial atti-
tudes and beliefs reflect the views, norms, and assumptions embedded in
Navigating the Organization to Ensure Data Governance • 33
changes in the underlying governance process. All the above reasons cause a
change in the data governance policies and procedures of the organization.
For effective data governance, these changes have to be managed both
proactively and reactively. Change control data policies and procedures
have to developed and implemented. Along with change comes resistance
to new policies and procedures. Resistance to change is a phenomenon
widely seen in organizations today. People cling to the status quo, and to
overcome resistance, data governance initiative leaders need to address
change management early on. Rapid innovation in technology is forcing
people to face change at an ever-quickening pace. Change affects people’s
ability to feel comfortable, capable, and confident because it means that
they must learn new systems, work in new ways, and accept new respon-
sibilities. It may result in reassignment, retraining, and reengineering.
Clear communication and sharing of information can reduce the levels
of anxietyand uncertainty. Successful change management processes
involve key players and stakeholders and use a structured approach to
implement and minimize resistance to change. Providing information
about the purpose of the change, providing a vision of the expected out-
comes and the future, and providing clear and specific expectations are
some ways to overcome the resistance. With any change management pro-
cess, the primary concern is to understand the change, assess the impact
on existing processes, and develop ways to either minimize the impact or
update existing processes to absorb that change (Vednere, 2010).
Data governance policies and procedures are subject to change and need
to be reevaluated periodically. Organizational changes, transformations
in business processes, audits, regulatory changes, or other circumstances
leading to a change in data management can lead to a revision and updat-
ing of the current data governance policies and procedures. These updates
to data governance policies should be made after proper assessment, eval-
uation, and understanding of the impact of the changes taking place. Data
governance committees evaluate and approve all modifications. These
modifications must be reflected in all documentation, procedure manuals,
and training materials. This should be followed by training and commu-
nication of the policy changes or procedure changes to all stakeholders in
the data governance process. If the change in the data governance policy
is substantial, a slow and structured approach to implement the changes
should be adopted. Rolling out all the changes at once may not be the opti-
mal approach. Development of appropriate training and documentation
Navigating the Organization to Ensure Data Governance • 35
emphasizing the reasons and benefits of the changes to the data gover-
nance policies and procedures ensures an effective and smooth transition.
Data is regarded as an important asset in organizations. It is an asset that
is constantly undergoing change unlike a static asset. Data governance
should consist of data management processes with appropriate checks and
controls built in. Maintaining change control logs of data, the request-
ing and authorizing body of changes, and maintaining version history
of the policies is helpful when dealing with data governance in diversi-
fied organizations. It also is useful during audit, enabling organizations
to explain why, how, and when data was shared, transferred, deleted, or
replaced. Change management also should address record retention poli-
cies and any changes to them. A change in the retention requirements
due to change in a regulatory requirement or amendment of laws may
not only result in a change in the duration of time data is retained, it may
result as well in a change in how the data itself is fundamentally managed.
It may affect the way data is retained electronically, its offsite storage, or
data d
isposition requirements.
Organizations undergo reorganizations to avail of opportunities, expand
their operations, or in the case of mergers and acquisitions. The impact of
the reorganization should be evaluated carefully and appropriate changes
in data governance plans must be incorporated. The data governance pro-
cess should be tied into the organizational change management process.
In case of business process changes that affect data and information pro-
cesses, the data governance committee should try to secure a seat on the
change management committee and provide the necessary expertise and
guidance when discussion of and decisions about various business pro-
cess changes occur. Many times changes in technology or in systems can
affect the data governance process. When there is a change in one busi-
ness system or application, it can have a rippling effect on other business
applications or systems that lie downstream from it or feed into it. Having
a plan to manage these changes and involving and keeping the application
owners and stakeholders updated and informed contribute toward a good
data governance process.
Changes in personnel also affect the data governance process in many
ways. People leaving or changing roles could result in changes in the data
custodianship, data ownership, data management, and points of con-
tacts. During the period of change, identifying appropriate backup and
contingency personnel, training the new personnel, and maintaining an
appropriate level of communication and documentation leads to an easier
36 • Neera Bhansali
Culture of Accountability
Data governance changes how an organization views its data. It involves
a cultural shift away from thinking about data as a commodity toward
thinking of data as one of the organization’s most valuable assets, and
creatingan organizational mindset of accountability.
For data governance to be implemented successfully, the entire enter-
prise must be willing to be accountable for data governance success.
Navigating the Organization to Ensure Data Governance • 37
They must buy into the importance of data governance and acceptance
of responsibility according to the role played by individuals for the con-
tinued success of the data governance effort. A culture of accountability
would be required for continued success.
Accountability pertains to willingness to be answerable for something.
Accountability is the acknowledgment and assumption of responsibility
for actions, decisions, and policies for data governance and its implemen-
tation within the scope of the role of the individual, and encompasses the
obligation to be answerable for resulting consequences.
A culture of accountability rests on awareness, buy-in, responsibility,
and communication. Awareness involves educating employees of the
data governance program. It creates a deeper level of understanding of
the usage of data, the underlying processes that use data, and how that
data impacts other processes downstream. It results in the realization of
how data governance benefits the individual’s job and how a lack of data
governance impacts the individual’s performance and the performance of
others in the organization.
For example, if clinical data managers enter data into a clinical database
and that data is later used by physicians to make decisions on the treat-
ment of the patients, it is essential for the clinical data managers to under-
stand how the quality of data they entered affects patient care. Educating
them on the benefits of having data governance policies and procedures
helps enforce data standardization and consistency. Once the benefits
of the data governance program are clear, it leads to accountability and
buy-in to the data governance program.
To instill an ethos of responsibility, it is necessary to incentivize people.
A formal delineation of roles and tasks, tied to compensation along with
data ownership, stewardship, and policies and procedures, should be
established throughout the organization. Realistic metrics to measure the
effectiveness of the data governance program should be developed and an
incentive mechanism to reward those who meet or exceed their perfor-
mance targets should be installed.
Communication is vital to getting buy-in from the organization as a
whole. Communication from the executive sponsors is key to gathering
buy-in from knowledge workers in the lines of business. It is not easy to
build a culture of responsibility. Everyone in the organization from top to
bottom must buy into the importance of data governance and they must
accept responsibility according to the role they play for the continued
success of the data governance effort.
38 • Neera Bhansali
Clear Ownership
A data governance program should be enterprise-wide and have clear
ownership. If there is no ownership for the data governance effort, it will
flounder for a lack of clear purpose and direction. Data governance is
not an IT project. Its success lies in the joint ownership between business
and IT. If IT alone owns the effort, the business may not feel that the data
governance initiative meets its needs or requires its input. Establishing
a data governance committee or council resolves this problem. The gov-
ernance committee or council should be composed of representatives
from all business units. The data governance council sets the data poli-
cies, procedures, and standards for the organization. These should be
implemented throughout the organization and updated with council
consensus when appropriate.
At the outset of the program, the data governance council should for-
mally define and assign data governance roles and responsibilities. Data
ownership, stewardship, and policies and procedures should be established
throughout the enterprise. This is often achieved by implementing a RACI
(responsible, accountable, consulted, and informed) chart of decision
rights for a data governance program. It is necessary to incentivize people,
along with a formal delineation of roles and tasks, with rewards tied to
compensation. There must be empowerment of data stewards that includes
valuing initiative, encouraging people to take responsibility for advancing
Navigating the Organization to Ensure Data Governance • 39
Value Recognition
For successful data governance, its value must be recognized. It is difficult
to quantify the value of data in dollar terms, but data is one of the most
important assets of any organization today and it has many intangible
benefits. The organization cannot function effectively without data stan-
dards and quality. Poor-quality data leads to compromised information
internally and dissatisfied customers externally. Therefore, in any data
governance effort, appreciation for the true value of business data is criti-
cal, along with upper management’s financial support for the time, effort,
and expense to effectively manage that data.
Communication, especially from the upper management, including the
CEO, COO, CIO, and CFO, is crucial to building awareness of the impor-
tance of a data governance program. It leads to a cultural shift in thinking
about data as not just a commodity, but one of the organization’s most
valuable assets. It leads to the creation of an organizational mindset of
accountability. Communication is vital to getting buy-in from the orga-
nization as a whole. The internalization of the value of data governance
is reflected in the formal communication by the sponsors of the data gov-
ernance program who are valued by the organization. Communication
from the executive sponsors and the chief data officer is key to getting
buy-in from the different quarters of the organization. The organization
culture should be one that supports and rewards openness, sharing, and
exchanging information within the organization.
data governance successful should exist. This vision should be shared and
be understood by all.
Data Quality
The final principle of successful data governance is data quality. It is criti-
cal for an organization’s knowledge workers and management to be able
to trust the data source. IT needs to know all sources of data, its complete-
ness, quality, and lineage for both operational and regulatory purposes.
However, in reality, it is a difficult task to accomplish. Few companies can
absolutely trust their data. Organizations deal with it by implementing
human middleware to fix and control data quality. Currently, the m arket
offers a plethora of data quality tools and methodologies to address
poor-quality data.
of the main challenges. Aligning security with the business and taking a
risk-based approach manages these threats through data governance. For
example, one could implement data categorization and tagging rules using
industry-specific best practices to support internal policies and external
regulations, or implement risk-based enforcement, incorporating prompts,
justifications, and blocks that support policy awareness and risk deter-
rence. Implementing a scalable taxonomy where document characteristics,
including metadata, security, and retention requirements, are inherited in
a content taxonomy also helps mitigate this threat by making it easier to
identify where documents belong.
With the latest trends of “big data” and the innovative ways in which
organizations are leveraging value from their data and information assets,
data governance and data management are important in providing a com-
petitive advantage to organizations. Without a data governance frame-
work, organizations will be unable to effectively manage their valuable data
assets and meet the increased demands for data to support management
information systems and business decision making.
LESSONS LEARNED
Some of the lessons learned from organizations that have succeeded in sus-
tained data governance are discussed above. For effective data governance,
individuals and leadership skills matter. Skilled and experienced leaders
must be the champions of data governance in an organization to ensure
its success. These leaders must not only understand the vision but be able
to communicate the vision throughout the organization and motivate the
stakeholders and data stewards for effective data governance. Achieving and
sustaining excellent working relationships between the various stakehold-
ers, data custodians, and IT is critical. An open and transparent relationship
contributes to the success of the data governance program. Building these
relationships and a good data governance program takes time. The organiza-
tion needs time to move through the different stages of maturity to achieve
a sustained data governance program. The evaluation of data opportuni-
ties during the data governance processes must be thoughtful and aligned
to the strategic goals of the organization. A mature and strong alignment
between the data governance strategy and the organizational strategy leads
to an effective and sustained data governance program in an organization.
42 • Neera Bhansali
REFERENCES
ARMA. 2010. International’s Information Governance Maturity Model. Available online at:
http://www.arma.org/garp/Garp%20maturity%20Model.pdf
IBM. 2007. Data Governance Council Maturity Model: Building a road map for effective data
governance, October. Available online at: http://www-935.ibm.com/services/us/cio/
pdf/leverage_wp_data_gov_council_maturity_model.pdf
Lam, L. T., and S. Kirby. 2002. Is EQ an advantage? An exploration of the impact of emo-
tional and general intelligence on individual performance. Journal of Social Psychology
142: 133–143.
Marvel, M. R., and M. A. Rahim. 2011 The role of emotional intelligence in environmental
scanning behavior: A cross-cultural study. Academy of Strategic Management Journal
10 (2) July: 83.
NASCIO. 2009. Data Governance Part II: Maturity models—A path to progress. March.
Available online at: www.nascio.org/publications
Robb, D. 2005. Affording Disaster Recovery from the World Wide Web. www.cioupate.com
Salovey, P., and J. D. Mayer. 1990. EQ. Journal of Imagination, Cognition, and Personality
9 (3): 85–211.
Sparrow, P. R. 2000. Strategic management in a world turned upside down: The role of
cognition, intuition and emotional intelligence. In Managing strategy implemen-
tation, eds. P. Flood, T. Dromgoole, S. Carroll, and L. Gorman, pp. 15–30. Oxford,
U.K.: Blackwell.
Vednere, G. 2010. Harnessing the winds of change. Information Management 44 (6)
November-December: 28.
FURTHER READINGS
Achrol, R., and P. Kotler. 1999. Marketing in the network economy. Journal of Marketing
63: 146–163.
Begg, C., and Caira, T. 2012. Exploring the SME quandary: Data governance in practice
in the small to medium-sized enterprise sector. The Electronic Journal Information
Systems Evaluation 15 (1): 1–12.
Blair, B. T. 2010. Governance for protecting information in the cloud. Information
Management 44 (5): HT1–HT4.
Craine, K. 2007. Managing the cycle of change. Information Management 41 (5) September-
October: 44.
Dearstyne, B. 2004. Strategic information management: Continuing need, continuing
opportunities. Information Management 38 (2) March-April: 28.
Griffin, J. 2010. Four critical principles of data governance success. Information Management
20 (1) Feb 1: 28.
Khatri, V. and Brown C. V. 2010. Designing data governance. Communications of the ACM
January 53 (1): 148–152.
Rindfleisch, A., and C. Moorman. 2001. The acquisition and utilization of information in
new product alliances: Strength of ties perspective. Journal of Marketing 65 (2): 1z–18.
Waddington, B. 2010. Data governance, MDM and data quality. Information Management
Sept/Oct. 10: 14–16.
3
Metadata Management
and Data Governance
Michael Schrader
CONTENTS
What Is Governance?....................................................................................... 44
Why Governance?............................................................................................ 44
Fit for Purpose versus Single Version of the Truth.......................................45
Governance Board.............................................................................................47
Program versus Project Governance..............................................................47
Metadata Framework Defined.........................................................................47
Metadata Types................................................................................................. 48
Business Metadata....................................................................................... 48
Searchable.................................................................................................49
Easy to Access and Integrated................................................................50
Exposed.....................................................................................................50
Technical Metadata......................................................................................50
Process Metadata..........................................................................................51
Data Lineage.............................................................................................52
Impact Analysis........................................................................................52
Operational Metadata..................................................................................53
Case Study of Metadata Use for Data Governance.......................................53
Master Data Management............................................................................... 54
Metadata Repository Types..............................................................................55
Data Profiling: Investigation and Enforcement............................................ 56
Data Life Cycle...................................................................................................58
Data Retention Techniques..............................................................................59
Data Versioning................................................................................................ 60
Data Versioning Techniques...................................................................... 60
Star Dimensional Model Data Versioning........................................... 60
Third Normal Form Data Versioning...................................................63
43
44 • Michael Schrader
Enforcement.......................................................................................................63
Conclusion........................................................................................................ 64
WHAT IS GOVERNANCE?
Data governance is the process of creating and enforcing standards and
policies concerning data. Data governance standards and policies are
created and enforced by a single authoritative organization called the
Governance Board.
The governance process isn’t a transient, short-term project. The gover-
nance process is a continuing enterprise-focused program.
Governance provides standards and policies around the following in
relation to processes and data:
• Software products
• Infrastructure
• Quality
• Security
• Dispute resolution
• Life cycle
• Best practices
• Architecture and future road maps
• Project prioritization
• Asset management
• Version control
• Evangelizing and communication
• Vendor relationship management
• Legal and corporate compliance
WHY GOVERNANCE?
A strong governance program is vital to the success of any enterprise
architecture. It provides:
FIGURE 3.1
Fit for Purpose model.
Peer Table
FIGURE 3.2
Peer table.
Metadata Management and Data Governance • 47
FIGURE 3.3
Additional columns for Fit for Purpose model.
GOVERNANCE BOARD
The Governance Board should be a group of key BI senior sponsors, p
roject
sponsors, and IT (information technology) personnel from each of the
business units. IT should serve the Governance Board as trusted advisors,
not the primary drivers of the board. The leadership of the board should
come from the business side. The board is not expected to be involved in
day-to-day management of the governance program, but is there to set
policies and standards.
The Governance Board should meet regularly, e.g., every month or quar-
terly depending upon number of issues. When the governance program is
first initiated, more frequent meeting will be required.
• Requires architecture with the benefits • Does not require architecture with the
of standards and reuse benefits of standards and reuse
FIGURE 3.4
Program versus project governance.
METADATA TYPES
Metadata can be classified into four types:
1. Business metadata
2. Technical metadata
3. Process metadata
4. Operational metadata
Business Metadata
Business metadata describes the business meaning of data. It includes busi-
ness definitions of the objects and metrics, hierarchies, and business rules.
An object is a data storage structure, such as the patient table. A metric is a
measure of something such as age. A hierarchy organizes the relationships
Metadata Management and Data Governance • 49
• Searchable
• Easy to access and integrated
• Exposed
Searchable
Exposed
Technical Metadata
Technical metadata describes the data structures and formats, such as
table types, data types, indices, and partitioning method. For example,
FIGURE 3.5
Data dictionary example.
Metadata Management and Data Governance • 51
FIGURE 3.6
Technical metadata example.
Process Metadata
Process metadata describes the data input process. It includes source target
maps, integration rules, validation rules, and consolidation rules. An inte-
gration rule could transform a 43 code to a standard code of Co (Colorado).
A validation rule would verify that the Gender Code was an M or F or that
the age of a patient was less than 200 years. A consolidation rule could
combine North Zanesville and South Zanesville data into one Zanesville.
Process metadata tools need to support two important governance
features: (1) data lineage and (2) impact analysis.
52 • Michael Schrader
Clinical Data
Mart
Source 1
Mike Master
Schrader Patient
Index
Michael
Schrader
Source 2
M Schrader
Michael
Schrader
FIGURE 3.7
Data lineage chart example.
Data Lineage
Impact Analysis
Operational Metadata
Operational metadata stores information about who accessed what and
when. This information is not only important for legal requirements, but
for the design of the data warehouse itself. For example, we can identify
that a particular data mart is not being utilized. This will enable us to
develop a plan. Should we eliminate the data mart? Should we be provid-
ing better education for the end users? Should we redesign the application
or the data mart?
The goal of data warehousing is to provide business users with a
time-based, nonvolatile integrated view of cross-functional data. We
integrate, transform, and consolidate the data to create an integrated
view of the data. Data warehousing provides historical data. An Online
Transactional Processing (OLTP) system has a current view of the data
and can answer the question: How many patients are currently in the ER
(emergency room)? A data warehouse could answer the question: How
many patients were processed in May by the ER and how does that com-
pare to last year?
Operational metadata is supported by many tools including Oracle®
Audit Vault.
attention from the governance process. For example, what degree of confi-
dence is required for a match or, once patient records are merged, if there
is a requirement to be able to break them apart again.
The following represent objects to consider for MDM in healthcare:
In addition, the following represent objects for MDM that are not specific
to healthcare:
• Location
• Time (months, quarters, and fiscal year)
Product Code
123XYX
Wrench
FIGURE 3.8
Overloading column example.
58 • Michael Schrader
There are many data profiling tools, one of which is Oracle® Datanomics.
• Soft Delete: A soft delete means that a data row is marked as deleted;
however, the row is physically not removed from the data table.
• Permanent Delete: A permanent delete physically removes the data
row from the data table. The data row can only be recovered from a
backup tape.
• Archiving: Archiving takes the data from the normal access environ-
ment. There are three types of archiving: off-site archiving, offline
archiving, and inline database archiving:
• Off-site archiving removes the data from the server to a location
for storage. This archiving strategy is for long-term storage. The
main concern of off-site archiving is the cost of retrieval after many
years or even decades. After many years, the operating system, the
hardware and software, will be very different. Retrieving the data
after an extended period can be very expensive and very difficult.
• Offline archiving removes the data from the database; however,
it keeps it local. For example, Oracle database provides a feature
called Transportable Tablespace. A tablespace is a unit of stor-
age. One can store each month’s data in a different tablespace.
After a period of time, you can unplug a tablespace and move it
to tape. To retrieve the data, you restore the tablespace to online
disk storage and plug it back into the database. The main concern
is that the backup tablespace must be upgraded to the current
database version.
• Inline database archiving keeps the data in the database; h owever,
it would compress the data. The data would still be accessible;
however, the access times to retrieve the data would be much
slower. For example, Oracle Exadata Database Machine has a
60 • Michael Schrader
DATA VERSIONING
Data governance provides business rules for the versioning of data. There
are different data versioning techniques depending upon the data format in
which the data is stored—star dimensional model versus third normal form.
Star Dimensional model is very different from the 3rd normal form. It is
a much flatter or simpler data model, and consists of fact and dimension
tables. The fact tables represent the WHAT. A fact table consists of foreign
keys from the dimension tables and measurements or metrics of a business
process. It is the center of a star schema surrounded by dimension tables.
For example, what are the total sales by product, by state, and by year? Total
Sales is the fact (metric). The dimension tables are the HOW. A dimension
is a category used to view/access the metrics. In our example, product,
state, and year are the dimensions, or how we want to view the data.
In the Star Model in Figure 3.9, we have one large table called the Sales
fact table and a set of smaller tables called Dimension tables: Product,
Date, Customer, and Location.
Star Dimensional Model data versioning is supported through slowly
changing dimensions, which are dimension data values that change over
time. For example, the customer dimension stores information, such as
a customer name. Often when a female marries, she will change her last
name to that of her husband’s last name. Data governance will give us the
Metadata Management and Data Governance • 61
Patient Date
Dimension Dimension
Sales
Fact Table
Patient_ID
Location_ID
Date_ID
Product_ID
Quality
Product
Location Dimension
Dimension
FIGURE 3.9
Star model example.
Type 1
Type 1 simply writes over the previous value. The historical facts are lost.
For example, in the customer dimension, Rachael Schrader marries William
Smith. In this example, a Type 1 methodology overwrites Schrader to Smith.
The fact that Rachael was once Rachael Schrader is lost. In this example,
the data in the database would change as diagramed in Figure 3.10.
Type 2
In a Type 2 slowly changing dimension, we add an additional row to
store the new data values with an effective start date and an effective end
date, thereby saving the historical fact that before she was Rachael Smith,
Rachael was Rachael Schrader (Figure 3.11).
Type 3
In a Type 3 slowly changing dimension, we add additional attributes to
the row to store the prior information. In our example, a Type 3 slowly
62 • Michael Schrader
Before
After
FIGURE 3.10
Slowly changing dimension Type 1 example.
FIGURE 3.11
Slowly changing dimension Type 2 example.
FIGURE 3.12
Slowly changing dimension Type 3 example.
changing dimension change would add columns to the rows to store the
old name. The prior last name field would be changed to Schrader, and the
last name field would be changed to Smith. Also, there will be an effective
date (Figure 3.12).
Type 3 slowly changing dimension is utilized less than Type 1 or Type 2
because of the overhead of additional columns. If we have a table with 60
columns and 36 columns would require versioning, the new column total
would be 96. Another disadvantage of Type 3 slowly changing dimensions
is that history is usually limited to one change. If we need more than one
change stored, we would need to add additional rows.
The main advantage is that history is stored on a single row so that we
can retrieve both the prior value and the current value at the same time.
Metadata Management and Data Governance • 63
Eff_Start_ Eff_End_
Patient ID Version # First Name Last Name Date Date
FIGURE 3.13
Data versioning Third Normal Form composite surrogate key example.
ENFORCEMENT
There are many enforcement techniques for data governance, including:
• Data Profiling: The data profiling investigates the data to verify that
business rules are enforced.
• Funding: If there are repeated major violations, the offending unit
is fined by reducing their Business intelligence or overall IT budget.
• Training: One of the most important for enforcement is training.
People will follow policies if they are trained to understand what the
policies are and why they exist.
64 • Michael Schrader
CONCLUSION
Data governance is critical for the successful business operations. Gov-
ernance provides standards and policies that allow us to harmonize
resources and provide transparency for legal compliance. The governance
process is an ongoing enterprise-focused program. At the heart of a data
governance program is a metadata program, which needs to support Busi-
ness metadata, Technical metadata, Process metadata, and Operational
metadata. Data versioning requirements need to be specified by the data
governance program. In addition, a data governance program relies on an
enforcement program, such a data profiling. By implementing these pillars
of data governance, the organization is able to manage its most important
resource—data.
4
Operationalizing Data Quality
through Data Governance
Julia Zhang
CONTENTS
A Pharmaceutical Industry Perspective.........................................................65
What Is Data Quality?.......................................................................................65
Importance of Data Quality............................................................................ 68
Data Governance Drives Data Quality...........................................................71
Data Standards Enables Automation of Data Quality Control Process.....73
Data Quality Strategy....................................................................................... 80
Best Practices for Achieving Data Quality in the Pharmaceutical
Industry..............................................................................................................83
Experiences and Lessons Learned............................................................. 88
Conclusions........................................................................................................91
References...........................................................................................................92
65
66 • Julia Zhang
Traceability
Are all data Accuracy
Completeness
traceable? Does data reflect
Is all necessary the real-world objcets or
data present? a verifiable source?
Data
Quality Consistency
Timeliness Is data consistent
Is the data available between systems?
at the time needed? Do duplicate
Integrity
Are the relations records exist?
between entities and
attributes consistent?
FIGURE 4.1
Data quality is demonstrated by different data dimensions.
Organizations must not only address structured data, they also need to
leverage unstructured text data from word processing documents, PDF
files, email messages, blogs, and Web pages to gain significant insights
into their business. They want to identify emerging trends, and proactively
respond to opportunities or potential risks. Companies need to be able to
sort through the noise of unstructured content and automatically identify
what that text content is “about.” To be competitive, large and midsize
businesses must be able to access all types of data from throughout their
organization, no matter which vendor’s technology or solution houses the
information. Companies need to respond quickly and effectively to the
influx of new data, as well as prepare for and meet anticipated factors,
such as federal or industry regulations governing information protec-
tion and control. To find a solution for achieving the right strategic deci-
sion, overcoming the competition in the market, efficiently and effectively
using enterprise-wide information/data, and bringing back the high
return-on-investment (ROI), data quality is a critical factor. For example,
the drug development process can be treated as an international trip; data
quality is the passport in this journey for reaching the final destination—an
approved drug. Without a valid passport (i.e., high-quality data), you will
not be able to reach your destination. Data quality represents the state of
data completeness, consistency, accuracy, timeliness, integrity, and trace-
ability that makes data appropriate for a specific use.1,2 Improving enter-
prise data quality is critical for enterprise ROI. The London-based market
research firm, BDRC Continental, did an Information Difference survey
in 2009. It is indicated that poor data quality can have serious financial
costs for organization.3 For example, one respondent to the survey said
that problems with data quality and consistency had led to the orphan-
ing of about £20 million worth of product stock. The goods (values at
$30.8 million at currency exchange rates) were sitting in a warehouse and
couldn’t be sold because they had been “lost” in the company’s system.
Let us take an example from the biomedical world to illustrate the
importance of data quality to the field of biomedicine. There have been
phenomenal developments in the field of biomedicine over the past 15
to 20 years. Most of these have been in the form of incredible volume
and/or diversity of biomedical information generation. There are thou-
sands of clinical trials, tens of millions of polymorphisms identified, and
billions of pairs of sequences. Expression profiles now are increasingly
measured in the hundreds of thousands of structures, animal models,
new modalities of data intensive imaging, and disease characterization.
70 • Julia Zhang
5,000–10,000 250 5
Compounds
One FDA-
Approved
Drug
Phase Phase Phase
1 2 3
NCA Submitted
IND Submitted
Number of Volunteers
20–100 100–500 1,000–5,000
3–6 Years 6–7 Years 0.5–2 Years
FIGURE 4.2
Unsustainable model of drug development.4
Are data quality and data governance the same thing? They share the
same goal, essentially striving for the same outcome of optimizing data
and information results for business purposes. Data governance plays a
very important role in achieving high data quality. It deals primarily with
orchestrating the efforts of people, processes, objectives, technologies, and
lines of business in order to optimize outcomes around enterprise data
assets. This includes, among other things, the broader cross-functional
Operationalizing Data Quality through Data Governance • 73
through some challenges and address what standards can help and sug-
gest how to implement standards.
Enterprise-wide challenges: In a collaborative environment, com-
munication issues are everywhere; different dialects (technical language
and business language) exist internally between research and develop-
ment (R&D), across R, and across D, externally between internal and our
partners, vendors, and regulatory authorities. For example, there is the
representation of males versus females in clinical trials. The data may be
presented in various ways, such as ‘‘male and female,’’ ‘‘M and F,’’ ‘‘1 and 2,’’
or ‘‘0 and 1.’’ The “language of gender” should be standardized in order
for an efficient communication. As one can imagine, inconsistencies of
this “gender language” usage across department, enterprise, or outside
partners can cause communication and efficiency problems when trying
to exchange data from multiple clinical studies and make assessments
within and across therapeutic areas nearly impossible. On the other hand,
information/data is stored in multiple or siloed systems with no “global”
standards to use, there is no infrastructure for data sharing, and no com-
mon data model or formats or common terminology/vocabulary for data
exchange. If globalization is the trend for business, then data collection,
process, storage, analysis, and exchange should be globalized as well.
Economy challenges: With the current economic situation and drug
R&D innovation reaching its plateau, resource and monetary constraints,
and increased cost and complexity of trials (see Figure 4.2), we expect the
budget increase to support the business needs. However, we face budgets
cut, budgets limited, budgets unavailable, and budgets frozen all the time.
We probably all feel that making cash stretch is like a rubber band.
People challenges: People’s roles changed due to the business needs and
changes in the economy, technology, etc. For example, a clinical trial data
manager’s previous role was reviewing protocol, developing case report
forms (CRF), designing the database, collecting data, validating data
(performing edit checks and quarries), and locking the database. With
the turning of the business trend and its needs, the data manager’s role
now will not only cover the above functions, but also will be to manage
different projects and other operational management. Most people act on
change differently, such as resistance, avoidance, and complaining.
Technology challenges: Many technologies, such as XML, SOA, Public
cloud, Private cloud, Hybrid cloud, Community cloud, SaaS (Software as
a Services), PaaS (Platform as a Service), IssS (Infrastructure as a Service),
and many more, are emerging. Which one you will need? We almost can
Operationalizing Data Quality through Data Governance • 75
see or hear new tools/e-tools often using emerging technology, but which
one is good for us to use? There are many standards being developed by
different standard organizations, such as HL7 (Health Level seven), CDISC
(Clinical Data Interchange Standards Consortium), ICH (International
Conference on Harmonization), ISO (International Organization for
Standardization), etc. Which one is the right one to apply? With increas-
ing outsourcing activities, issues from how to perform better on educa-
tion, training, implementation, and communication are all popping up.
How do we handle them?
How do we face all these challenges? How can we improve the data qual-
ity leading to business efficiency and effectiveness? The adoption of data
standards will facilitate and enhance data sharing, analysis, and compa-
rability across functional, jurisdictional, or geographical boundaries. Data
standards are established rules, principles, or measures that are widely used
and are recognized and accepted as having permanent value. The goal of a
data standard is to enable the sharing or exchange of information between
multiple parties in a way that guarantees that the interactive parties share
the same understanding of what is represented within that information.
For example, when fire engines come from other municipalities to put out
a fire in our neighborhood, we aren’t concerned with whether or not their
trucks will be able to hook up to the local fire hydrants because all connec-
tions are standardized. Contrast this with the Great Baltimore Fire of 1904
where thousands of fire fighters from the surrounding cities and states
were unable to assist as the fire raged for 30 hours, simply because their
fire hoses were not compatible with the Baltimore hydrant connections.11
Standards are necessary for interoperability, portability, and reusability,
and are the most efficient way to facilitate the development of cost-effective,
interoperable systems. Standards lead the way to achieve interoperability,
which provides a technical foundation for data integration (“reuse without
rework,” facilitates exchange of information between two or more parties
with common interest), establishes data consistency, and facilitates commu-
nication that enforce a common language with others, ensuring integrity of
data and meaning for every user. Standards also streamline business pro-
cesses, from protocol development through reporting/submission activi-
ties; reduce time and cost of clinical trials including decreased learning
times over time; compliance and risk reduction; reduce submission review
times; and eliminate some proposed postmarketing studies because infor-
mation and knowledge can be extracted from a standards-based r epository.
Standards improve data quality both from efficiency and effectiveness,
76 • Julia Zhang
MDR
Process
Oncology
CRFs Pulmonary
SDTM
Pulmonary Company
CDASH Company Oncology
CRFs
SDTM SDTM
CDISC CDISC
RA CDASH RA
SDTM
CRFs SDTM
Oncology RA Pulmonary
Lab Lab Lab
FIGURE 4.3
A suggestion for a metadata repository architecture.
Metadata has been used in the clinical data life cycle from protocol devel-
opment, CRF design, data c ollection, validation, derivation, and reporting
to submission and postmarketing research with or without realization.
Implementing standards from protocol design to regulatory submis-
sion appropriately can streamline the clinical trial development process.
In this streamline process, all standards used should be from a central
source—MDR. This will ensure that the harmonized standards, includ-
ing terminology, can be used effectively and efficiently throughout the
entire life cycle of a clinical program. The structure of a metadata reposi-
tory varies by business goals and objectives. A metadata repository can be
defined at many different levels, e.g., global/industry standard level, com-
pound/product level, therapeutic level, study level, dataset/domain level
(description, structure, class, keys), and variable level (label, type, origin,
length, controlled terminology). Figure 4.3 sketches an idea of an MDR
structure at three levels using dotted oval shapes: industry level, company
level, and therapeutic level. It contains a metadata dynamic governance
process as a driving engine. When designing a metadata repository, a
detailed and thorough requirement is critical for a particular business.
For example, how can MDR help the statistician develop a study analysis
plan, how can it help a statistical programmer to process clinical data,
78 • Julia Zhang
and how can it help a clinical trial study team develop protocol, CRF, etc.,
in a pharmaceutical company?
To ensure clinical data quality and business process efficiency, a meta-
data-driven method is a necessary methodology in clinical data p rocessing.
Using the metadata-driven method will allow all components to share infor-
mation about the data as it moves through its life cycle, thereby enabling
consistency, accountability, and true control of data. It also will increase the
capability to share and manage data within and across organizations and
reduce the impacts on the safety, effectiveness, and cost of healthcare by
having the right information at the right place at the right time. Using an
example of creating a study analysis data, we can see a tremendous waste
of time and resources when not implementing a metadata-driven process.
There are three processes in a clinical trial analysis data derivation: docu-
mentation, SAS programming, and QC (quality control) processes. Without
using metadata-driven methodology, variable name, variable label, vari-
able format, variable length, and variable type will be manually typed in
each process. Assuming there are 30 SDTM (study data tabulation model)
datasets and 20 ADaM (analysis dataset model) datasets for each study,
30 variables per data set, 5 attributes per variable, plus about 500 elements
of controlled terminology terms, the total data attributes can be as many
as 5,000 per study. Without metadata to use, each attribute is manually
typed three times (private communication). All information about clini-
cal trial development can be driven by a standard-based, metadata-driven
architecture—metadata repository. When completely implemented, a
well-designed metadata repository can help industry to reduce time and
cost, increase efficiency and quality, while remaining compliant and
aligned with evolving regulatory and industry initiative in the product life
cycle from clinical data collection, data processing, data analyzing, report-
ing data, and postmarketing research. Therefore, metadata and a metadata
repository can help us to reach interoperability while ensuring data quality.
The metadata repository is the origination point for semantic changes
and it manages metadata as an asset. Imagine every new development
project starting with the metadata repository to determine what data cur-
rently exists, which can be reused, who owns the data, how comprehen-
sive it is, what other processes affect it, and where it is currently reported.
A well-designed metadata repository is like a high-quality engine in a
vehicle; however, to specify a metadata repository requirement is a com-
plicated topic, it varies by the business goals and objectives. Based on
Operationalizing Data Quality through Data Governance • 79
15
Analysis/reporting
Study conduct
Study start-up
Cycle Time in Months
70–90%
0
BenchMark CDISC Standards Impact
FIGURE 4.4
CDISC business case survey with Gartner.12
eCRF- EDC-
Database Data Collection
Development & Processing
Data
Standards
Trial Design- e-Computing
Protocol Analysis &
Development Reportng
MDR
Standards
Governance
Regulatory
Reviewer e-Submission
FIGURE 4.5
Streamline of the clinical trial data life cycle by implementing data standards.
external) matches all specified requirements. The data validation tool also
ensures “quality by design.” Data validation is the processes and tech-
nologies involved in ensuring the conformance of data values to business
requirements and acceptance criteria. It uses routines, often called valida-
tion rules or check routines, that check for correctness, meaningfulness,
and security of the data that is inputted in the system. The rules may be
implemented through the automated facilities of a data dictionary or by
the inclusion of explicit application program validation logic.
Data validation generally can be defined as a systematic process that com-
pares a body of data to the requirements in a set of documented acceptance
criteria. A data validation tool can provide data quality checks based on
implemented standards and provide metrics to gauge data quality. The vision
and ultimate goals of a data validation tool in drug development include:
• Be able to check CRF (Case Report Form), Central Lab, SDTM
(Study Data Tabulation Model), ADaM (Analysis Data Model) data,
and define.xml file against CDISC standards and company-specific
requirements to ensure that the company receives, produces, and
submits quality data.
• Align with the MDR to ensure metadata validation.
• Automate and streamline data validation processes.
Operationalizing Data Quality through Data Governance • 87
MDR
Data
Data Process/
Protocol Collection Analysis Regulatory
Structure CDASH DVT DVT Submission
Pass SDTM Pass
Protocol LAB
ADaM
ECG
Not-pass Define.xml
Not-pass
FIGURE 4.6
Data validation process through a streamlined drug development workflow.
DVT Rules:
• SAFETY checks: DVT Capability:
• Send • Validate EDC data
• CDASH • Validate CRO data
• SDTM • Validate Lab data
• CDISC Lab • Validate SEND data
• Therapeutic standard checks • Validate SDTM data
Raw • Company-specific checks • Validate ADaM data
Data • EFFICACY checks: • Validate Define. xml
• ADaM Checks
Quality
• Company-Specific Checks
DVT
Data
Derived DVT Users:
Data • CROs – Contract Research Organizations
• EDCs – Electronic Data Captures
• FSPs – Functional Service Providers
• Central Labs
• Company data managers
• Company statistician and statistical programmers
• Company Global Patient Safety & Risk Management
FIGURE 4.7
Data validation tool’s (DVT) basic capabilities, potential users, and some requirements.
CROs, EDCs, FSPs, and Central Labs are external activities.
validations rules. This will include checks from SEND, CDASH, SDTM,
ADaM, and define.xml, plus the company’s specific data checks. This DVT
will be able to check data from EDC, CROs, and different central labs. The
possible users can be in-house users, such as data managers, statistical
programmers, statisticians, clinicians, and program/project managers;
in addition, the outsourced partners are possible users. With the effi-
cient DVT tools designed, developed, and implemented, we can achieve
high-quality data goals with the help of data governance and standards.
Next, we would like to summarize some experiences and lessons learned
from quality data management.
important to set them up at the right time when your business needs it. Do
not overload committees; the more people on each committee, the more
politics come into play and the more watered down governance respon-
sibilities become. To be successful, try to limit the size of a committee to
between 6 and 12 people and make sure that committee members have the
required decision-making authority.
Do not try to boil the ocean: The significant trap that many data quality
efforts fall into is trying to solve all of an organization’s data problems in
the initial phase of the project. You need to think globally and act locally;
in other words, data problems need to be broken down into incremental
deliverables. “Too big, too fast” will not help you to resolve data quality
problems. It is much more costly to fix data quality errors downstream
than it is at the point of origin. Usually a specific data quality problem was
identified and project initiated and delivered to be resolved. This approach
was characterized by a heavy emphasis on data cleansing, a one-off process
where shortcomings were recognized and quantified and improvements
made. The end result was that data cleanse became a regular, reactive,
routine activity, with some data sources cleansed again and again. Often
the data quality improvement achieved was not sustainable. Moreover,
these tactical approaches failed to recognize a critical truth about data
quality—the places in the organization where the problems originated.
Technology alone will not solve data quality issues: People may think
that buying a master data management, data integration, or data quality
software will solve enterprise data quality problems. However, this is not
always true. You still need internal interactions, such as setting up data
governance guidance and processes, creating your own data validation
rules, and change management and many more, in place. Let the busi-
ness drive the data quality implementation. All too often, an organization
will move rapidly from a business imperative to a technology imperative.
Soon, the organization is purchasing software, hiring systems integra-
tors, and starting toward a data quality initiative. However, improv-
ing data quality is a complex project; it is the quality culture within an
organization. Successful data quality efforts have two goals in mind:
(1) planningfor a long-term success (the organization must establish a
vision for high-quality data and establish the long-term objectives), and
(2) delivering against short-term goals.
Quality data requires a dedicated culture shift across the enterprise:
Quality data requires a cross-functional effort involving resources (both
Operationalizing Data Quality through Data Governance • 91
people and monetary) and mindshare. The problem will involve key
stakeholders from across the organization.
Data quality measuring: You cannot improve what you cannot mea-
sure, so we need a means for measuring the data quality. Once the sys-
tems and the data quality rules are identified and the data is characterized,
scoring the data quality needs to be performed. Scoring represents the
state of the data quality for identified data quality rules, and it is a relative
measure of conformance to rules.
Responsibility of data stewards: The data steward is responsible for
tracking and improving data across the company supply chain, ensur-
ing the trustworthiness of business data. This includes monitoring data
quality and fitness for purpose, and demonstrating measurable benefits
of data management to lines of business, business processes, and systems.
Data stewards also participate in data governance activities, serving as the
connectors between data governance and data management communities
within the organization. Without strict controls, an organization has no
idea when or how changes were made, who made them, or why an origi-
nal entry was altered. Thus, corporations run the risk of owning multiple
versions of the same information or building a business model on faulty
data. To avoid errors and confusion, and to ensure corporations create
and adhere to stringent information governance controls, best practices
suggest that leading organizations employ data stewards who determine,
describe, and administer the company’s business policies and data defi-
nitions. Data stewards steer their company’s information policies and
pilot employees through the d eluge of data housed in multiple databases
throughout the corporation.
CONCLUSIONS
In this chapter, we have defined data quality and suggested some data
quality strategies under data governance by implementing data standards.
We also introduced some standard implementation methodologies and
shared some data quality best practices. To achieve high data quality, we
need the right governance, strategy, methodology, technology, and cul-
ture, and we should think globally, act locally, start from small, and scale
up to create values.
92 • Julia Zhang
REFERENCES
1. Zhang, J. Z., and S. Dubman. 2011. Quality by design: Automating validation of
standards-based data, end to end. Contract Pharma: 88–93.
2. Zhang, J. Z., and S. Dubman. 2011. Quality data depends on quality governance.
Pharmaceutical Executive (June): 2–14.
3. SearchDataManagement. 2010. Uncover the real costs behind poor data quality,
E-Guide. Online at [email protected]
4. Esserman, L. 2011. Putting precompetitive/new trial models into practice: The I SPY-2
experience. Paper presented at the NCI Translational Science Meeting, Washington,
D.C., July 28–29.
5. Munos, B. 2009. Lessons from 60 years of pharmaceutical innovation. Nature Reviews
Drug Discovery 8: 959–968.
6. Paul, S. M., D. S. Mytelka, C. T. Dunwiddie, C. C. Persinger, B. H. Munos, S. R. Lindborg,
and A. L. Schacht. 2010. How to improve R&D productivity: The pharmaceutical
industry’s grand challenges. Nature Reviews Drug Discovery 9: 203–214.
7. Collins, F. S. 2011. Reengineering translational science: The time is right. Science
Translational Medicine 3 (90): 6.
8. Financial Services Technology. Online at: http://www.usfst.com/article/Enterprise-
Content-Management-getting-started/
9. MIT Sloan Experts. Online at: http://mitsloanexperts.wordpress.com/2011/05/18/
riding-the-rising-information-wave-are-you-swamped-or-swimming-mit-hosts-
experts/
10. Christian Science Monitor. Online at: http://www.csmonitor.com/Business/The-
Reformed-Broker/2011/0609/Big-Data-hits-Wall-Street
11. Seck, M., and D. D. Evans. 2004. Major U.S. cities using national standard fire hydrants:
One century after the great Baltimore fire (NISTIR 7158). Gaithersburg, MD: National
Institute of Standards and Technology.
12. CDISC Business Case for Standards. Online at: http://www.cdisc.org/stuff/contentmgr/
files/0/ff2953ea8dbc8e81080f0e44ba6714c7/misc/businesscasesummarywebmar09.
pdf
5
Semantic Analytics and Ontologies
CONTENTS
Introduction.......................................................................................................94
Ontology.............................................................................................................95
Definition of Ontologies............................................................................. 96
Purposes for Constructing Ontologies..................................................... 96
Construction of Ontologies.........................................................................98
Concepts (Classes)...................................................................................98
Properties (Slots)..................................................................................... 99
Axioms................................................................................................... 100
Representation of Linguistic Vocabulary on a Semantic Web............. 100
RDF (Resource Description Framework)...........................................101
RDFS (Resource Description Framework Schema)..........................101
OWL (Web Ontology Language).........................................................103
Semantic Analytics..........................................................................................104
Semantic Analysis Based on Natural Language Text.............................106
Semantic Analysis Based on Conditional Expression of
Graph-Based Representation....................................................................107
Semantic Analytics on a Semantic Web...................................................108
A Framework for Definition and Calculation of Quality Indications......108
Quality Indicators.......................................................................................109
Overview of QI-Framework......................................................................110
Outline of QI-RS.........................................................................................111
Medical Service Ontology.........................................................................112
Outline of MSO Concepts....................................................................112
Patients....................................................................................................112
Events......................................................................................................114
States of Patients.....................................................................................115
Main Relations in MSO.........................................................................115
93
94 • O. Takaki, N. Izumi, K. Murata, and K. Hasida
INTRODUCTION
This chapter explains semantic analytics in data governance (DG) by
introducing a framework to define quality indicators and to calculate
their values based on medical databases, where quality indicators are
measures of medical service quality, which are represented by n umerical
values . Most importantly, we introduce an ontology called Medical
Service Ontology (MSO) as an example of an ontology that plays the
central role in semantic analytics.
Semantic analytics plays an important role in DG. The term semantic
analytics in this chapter refers to a technique used for semantically
analyzing, retrieving, integrating, or managing data resources in several
databases and on the Internet using ontologies. In fact, it is one of DG’s
primary roles to manage and utilize the data accumulated by an organiza-
tion and to use that data for the organizational decision making. However,
for this purpose, it is essential to be able to deal with data in an integrated
manner beyond differences in data formats or expressions. Semantic
analytics judges the semantic identity or similarity between data beyond
syntactic differences, making it possible to collectively deal with the same
or similar data from data resources in various formats. Moreover, ontolo-
gies are important as the fundamental tools of current semantic analysis.
We here explain a role of ontology in semantic analytics by natural lan-
guage processing (NLP). NLP is an area of research and application that
explores how computers can be used to understand and manipulate natu-
ral language text or speech to do useful things [Chowdhury, 2003]. NLP
can be regarded as a basic theory of semantic analytics. Knowledge used
in the four stages of analysis in NLP—morphological analysis, syntactic
analysis, semantic analysis, and context analysis—can roughly be divided
Semantic Analytics and Ontologies • 95
into the following two types: constraints and preferences. Constraints judge
whether a given document satisfies the requirements, whereas preferences
are used for selecting the analysis result of a given sentence that is con-
sidered the best. Further, while reasoning is considered a major approach
for realizing constraints, ontologies are considered a major approach for
realizing preferences. In other words, while constraints regard the struc-
tural analysis of a document as important, the analysis of the vocabu-
lary comprising a document plays an important role in determining the
preferences. Because the structural analysis of sentences and a vocabulary
analysis, in fact, could be conducted with reference to the analysis results
of each other, both the techniques (reasoning and ontologies) are required
for analysis in natural language processing. This chapter presents, in par-
ticular, a discussion on the topic with a focus on ontologies.
Below, we explain the MSO that is introduced in [Takaki et al., 2012] to
define quality indicators. We also briefly explain a framework to define
quality indicators by using MSO and to calculate its value based on medical
databases as an example of semantic analytics in medical service domains.
We call the framework QI-framework. MSO provides unified vocabulary to
describe assessment of medical service quality and to define quality indica-
tors, and QI-framework helps accurately compare medical service quality
among multiple hospitals based on databases of the hospitals. Medical
staffs, including managers of hospitals, have to make judgments based on
values of quality indicators, which provide a benchmark of hospitals based
on data in medical databases. Thus, one can consider QI-framework to be a
typical example of semantic analytics in medical service domains.
The first section (Ontology) will present an overview of this subject.
The next section (Semantic Analytics) will provide a brief overview of
semantic analytics in natural language processing and a semantic web.
The following section is A Framework for Definition and Calculation of
Quality Indications, which will explain the MSO and QI-framework. In
the final two sections, we will introduce several related works and explain
the results.
ONTOLOGY
In this chapter, ontology is explained. First, is a simple definition of ontologies
and purposes for constructing ontologies from the viewpoint of knowledge
96 • O. Takaki, N. Izumi, K. Murata, and K. Hasida
Definition of Ontologies
Although the definitions of ontology vary according to different publi-
cations, the most well known is that of ontology being “explicit formal
specifications of the terms in the domain and relations among them”
[Gruber, 1993]. In this chapter, we adopt this definition and explain ontol-
ogy as either a discipline that appropriately clarifies important concepts
and their origins in order to achieve a given purpose or a corresponding
research, or a product of this clarification. However, the scope and extent
of clarification stated here is limited; it is important to the extent that it
fulfills one purpose appropriately.
Construction of Ontologies
In this section, the construction of ontology (in other words, what ontol-
ogy represents and how it is built) will be explained.
It was stated previously that the direct purpose of building an ontol-
ogy is the creation, sharing, and management of knowledge. Furthermore,
even though we did not clearly define the term knowledge, we did state
that it is an intermediary wherein the creation, sharing, and manage-
ment is carried out through the cooperation of individuals and systems.
Therefore, in this section, we will assume that ontology is represented by
this intermediary.
Ontology as an expression of the above-mentioned knowledge is formed
by a series of parts. These parts also can be defined in various ways. In
this section, we will introduce one of the most well-known definitions,
the definition of a component, according to [Noy and McGuinness, 2001].
Concepts (Classes)
Concepts are entities that are recognized as parts having a certain consis-
tency or can be seen as existing independently. For example, in ontology
related to medical treatment, the words patient (in relation to the person
who receives the medical services) or operation (in relation to a form
of medical service) can be considered to be typical concepts. A name
(or label) is assigned to each class.
Semantic Analytics and Ontologies • 99
Properties (Slots)
• Attribute: Most concepts, when seen from certain aspects, have cer-
tain characteristics. For example, when one considers the concept
of a [Human], it has certain characteristics, such as [sex] and [birth
date], that are innate. These characteristics are known as base con-
cepts and attributes. Frequently in this section, when C has attributes
(R, D) against the relation R, R is known as a (C, D) attribute relation.
Axioms
and OWL, which serve as the fundamental parts of the framework related
to the vocabulary proposed for a semantic web.
Data governance is a process by which online marketing and Web ana-
lytics organizations define and manage different types and categories of
data related to behavior tracking, audience measurement, e-commerce,
and other aspects of online business. Synonymous with “quality control,”
data governance strives to ensure companies have reliable and consistent
datasets to assess performance and make management decisions. While
data governance is one of the least visible aspects of Web analytics, it’s
easily one of the most impactful [Hassert, 2011]. RDF, RDFS, and OWL
provide a standard framework of vocabulary for the Web analytics or the
semantic analytics on a semantic web.
RDFS is the framework that defines the vocabulary in an RDF graph. The
nodes in an RDF graph, namely, subjects and objects in RDF triples, are
defined by the classes or literals. On the other hand, edges are defined by
properties. Therefore, the definition of the expression of classes and prop-
erties in RDFS is important.
The foundational vocabulary for an RDF schema has the following
classes as a basis ([Brickley and Guha, 2004] and [Kanzaki, 2005]):
The following basic properties also are defined as the fundamental rela-
tionships between classes [Brickley and Guha, 2004]:
ex:Patient
ex:Hospital_Stay rdfs:type
ex:name
_:p1 John Smith
rdfs:type
ex:subject_person
ex:person_in_charge ex:name
_:hs1 _:d1 Mary Brown
rdfs:type
ex:data_of_admission 05 June 2012
ex:data_of_discharge ex:Doctor
20 June 2012
FIGURE 5.1
RDF graph defining hospitalization (graphical representation).
Semantic Analytics and Ontologies • 103
SEMANTIC ANALYTICS
In this section, we will briefly introduce semantic analytics, mainly that of
text described by natural language and charts, and semantic analysis on a
semantic web. All of these technologies make use of ontologies.
One of the major challenges when integrating information systems in
any domain, especially in healthcare, is the challenge of interoperability,
such as integration of vocabulary for electronic health records or semantic
integration of biomedical data warehouses. There are three aspects of inter
operability: technical, semantic, and organizational. The s emantic a nalytics
deals with sharing the same understanding (semantics) of exchanged infor-
mation among all applications and services.
With respect to DG, semantic analytics plays an important role in refer-
ring to the data in multiple databases; however, in order to do this, it is
necessary to search and identify the data that have to be referred to and
managed for a specific condition. To accomplish this, the semasiological
analytics of condition text or data is needed. Here, the semantic analytics
of language processing and semantic web plays an important role.
Semantic Analytics and Ontologies • 105
TABLE 5.1
Class and Property Axioms of OWL Lite
Class axioms of OWL Lite as Short explanation in the first order logic
RDF triples
ObjectProperty (R
super(R1)…super(Rn) The extension of R is included in every extension of
Ri (i = 1,…,n).
[InverseOf R0] For each x and y, R(x, y) if and only if R0(y, x).
[Symmetric] For each x and y, if R(x, y), then R(y, x).
[Functional] For each x, y, and z, if R(x, y) and R(x,z), then y = z.
[InverseFunctional] For each x, y, and z, if R(x, z) and R(y,z), then x = y.
domain(A1)…domain(Am) For each i = 1,…,m and for each x and y, if R(x, y),
then Ai(x).
range(A’1)…range(A’l)) For each i = 1,…,l and for each x and y, if R(x, y),
then A’i(y).
Quality Indicators
Quality indicators are measures of medical service quality that are rep-
resented numerically. A quality indicator consists of a name (or a label)
and a calculating formula. For example, “fracture rate among in-patients
aged 75 or older” is the name of a quality indicator [NHO, 2009], and its
calculating formula is given as follows:
The value that is obtained from a quality indicator by using the calcu-
lating formula and data in a hospital (or hospitals) is called “the value of
a quality indicator (in a hospital (or hospitals))” or “the data of a quality
indicator (in a hospital (or hospitals)).” We assume that the values of
quality indicators are basically calculated from data in medical databases.
Though we here distinguish a quality indicator and its calculating formula,
we simply will often call the calculating formula of a quality indicator by
“a quality indicator,” unless it makes readers get confused.
In decision making about medical services in a hospital, it needs to
assess medical service quality in the hospital or to compare them among
the hospital and other ones. In comparison and/or assessment of medical
service quality, quality indicators play an important role as evidences of
the comparison and assessment. However, it is not easy to realize appro-
priate comparison of medical service quality of multiple hospitals based
on quality indicators. In fact, it is not straightforward to properly share the
definition of a quality indicator. For example, the calculating formula CF1
has at least the following two problematic points:
Overview of QI-Framework
Though the purpose of this section is to introduce a representation system
QI-RS of quality indicators, we briefly explain an overview of a framework
QI-FW to develop quality indicators and to calculate their values based on
medical databases before entering upon a discussion of QI-RS.
QI-FW consists of (1) QI-RS, (2) medical databases in hospitals, and
(3) mapping systems (Figure 5.2). Moreover, QI-RS has Medical Service
Ontology (MSO) as the main component. Medical staffs and system
engineers who administer medical databases (and knowledge engineers,
if necessary) collaborate in developing and improving MSO. We will
explain QI-RS and mapping systems later.
Users of QI-FW are assessors of the medical service quality of a hospital
(or hospitals) based on data in medical databases, who are supposed to be
patients, medical staffs, and so forth. They can develop quality indicators
in QI-RS via some interface of QI-FW. A quality indicator Q in QI-RS is
expressed as a graph. Some nodes in Q are concepts in MSO, while edges
in Q are properties in MSO. On the other hand, main concepts and prop-
erties in MSO are automatically translated to entities or terms in entities
in Global Data Model (GDM), which is a virtual data model, under certain
rules. According to the translation, Q is translated to a data (Q1,…, Qn, A)
Semantic Analytics and Ontologies • 111
FIGURE 5.2
The overview of QI-framework.
Outline of QI-RS
The representation system QI-RS is developed based on an idea to regard
a quality indicator as a combination of a target of quantification and a
way to quantify the target and to develop the target and the way indepen-
dently. For example, the calculating formula CF1, in the Quality Indicators
section above, is regarded as a combination of the following components:
We will first show main concepts in MSO and their main attributes.
To describe results of assessment of medical service quality, the follow-
ing vocabulary words are especially important: patients and their states,
medical services in hospitals to such patients, and outcomes of such medi-
cal services. In many cases, an outcome is represented as an event that
happens in a hospital. For example, death of a patient as an outcome of
a surgery is represented by an event of a death discharge of a hospital.
Therefore, we regard concepts related to patients, states of patients, and
events in hospitals as main concepts in MSO. In the following, we will
explain the main concepts and properties.
Patients
FIGURE 5.3
Basic concepts and attributes related to patients.
patient classified +
subClassOf by growth process
patient classified by
subClassOf +
psychosomatic discorder
special type
patient subClassOf
of patient staff as a patient
subClassOf +
classified by positiions
dom01
trigger event range short term event
dom01
ending event range short term event
dom01
beginning time point range time point
dom01
ending time point range time point
FIGURE 5.4
Patients classified by four aspects (partial).
114 • O. Takaki, N. Izumi, K. Murata, and K. Hasida
Events
FIGURE 5.5
Basis concepts and attributes related to events (partial).
Semantic Analytics and Ontologies • 115
FIGURE 5.6
Basis concepts and attributes related to states of patients.
Each long-term event has attributes: the subject (target patient), pur-
poses, the starting date, and the ending date, while each short-term
event has the subject and occurring time point (see Figure 5.5). Though
scheduled and unscheduled events have their own attributes, we omit
their explanation due to space limitation.
States of Patients
relation denotes the relations between patients and their hospital stays
(we describe a relation by angle brackets and a label).
Note that these relations share the same name “subject (of an event).” We
omit the explanation of the relations between patients and other events
due to limitation of space.
Relations of patients and states: The relations also are defined between
[patient] and concepts of patients’ states. For example, the following rela-
tion denotes the relationship between patients and their states of diseases.
These relations also share the same name “subject (of a state)” and all
concepts of patients’ states have the attributes of starting time points and
terminating time points. We also omit the explanation of the relations
between patients and other states.
Relations of time ordering: The relations are also defined between the
concepts of events and patients’ states. For example, the following rela-
tions denote the relationships between operations.
Here, “<p>” denotes a parameter. For example, the relation {before more
than <2 weeks>} consists of a pair <op1, op2> if op1 and op2 are performed
and if op1 is performed more than two weeks before op2.
Belonging relations of events: The relations are defined between con-
cepts of events with no term and events with terms. For example, the
following relation denotes the relations between operations and hospital
stays that have operations.
The relation contains a pair (op, sty) of an event of an operation (op) and
that of a hospital stay (sty) if op is performed in the duration of sty.
Semantic Analytics and Ontologies • 117
Quantifying Concepts
source
hospitalization of aged patients Definition hospital stay base event with term discharge source during target base term
target
include period
source
subject (of an event)
patient state object state of age age-group age-group lower age limit 75
FIGURE 5.7
Hospitalization of aged patients.
bone fracture
base event with term
target
FIGURE 5.8
Hospitalization of aged patients in which they break bones and receive treatments for fractures.
120 • O. Takaki, N. Izumi, K. Murata, and K. Hasida
FIGURE 5.9
The quality indicator in Section 1.1.1 expressed with QI-RS.
RELATED WORK
Research of quality indicators has a long history, and one can see a
starting point in Nightingale’s work [Nightingale, 1859]. One can see
researches on the ways to define quality indicators in [Donabedian, 1980],
[Mainz, 2003], and [Mainz et al., 2004]. Moreover, in recent years, com-
parison results of quality indicators among multiple hospitals or countries
are seen in [Mainz et al., 2004], [OECD, 2006], and [Mainz et al., 2009].
Though these researches are important for actual definition of quality
indicators for comparison of medical service quality, they have been done
from the viewpoints of epidemiology. On the other hand, because this
chapter focuses on how to describe quality indicators from the viewpoint
of knowledge representation, especially, we focus on a representation of a
quality indicator that satisfies understandability and formality.
Formality and understandability of ontology-based representation
for medical services have been researched in [Huser et al., 2010] and
[Mabotuwana and Warren, 2009]. The later authors propose a framework
to indentify hypertensive patients who satisfy evidence-based criteria for
quality improvement potential. They propose three issues for domain
modeling: (1) shareability, (2) extensibility, and (3) easy visualization of
a knowledge base for domain modeling. On the other hand, [Huser et al.,
2010] establish a query system of an electronic health record data based on
a flowchart that indicates processes to treat patients. The authors propose
a tradeoff problem of readability and expressiveness of query representa-
tion. [Huser et al., 2010] and [Mabotuwana and Warren, 2009] focus on
how to represent queries correctly and/or easily on the basis of consider-
ably restricting the domain of the query, and their approaches are not easy
to extend for evaluation of general medical service quality. This chapter
enhances formality and understandability of QI-RS by MSO that provides
sufficient vocabulary words to define quality indicators and by establish-
ing a general framework of ontology-based graph representation.
For more general medical information, there are a lot of researches for
ontology-based information retrieval, or ontology-based information
Semantic Analytics and Ontologies • 121
integration (e.g., see [Hartel et al., 2005], [Kaiser, Akkaya, and Miksch,
2007], and [Serban et al., 2007]). However, to define quality indicators, it is
important to provide sufficient vocabulary not only to represent concepts
in medical domain, but also to cover description patterns of medical service
assessment, such as “how a certain medical service was executed” or “what
results were obtained from a contain medical service.” In this chapter, we
provide MSO and object graphs, by which we specify description patterns
of medical service quality assessment, and quantifying concepts, by which
we stipulate how to quantitatively represent medical service quality.
CONCLUSIONS
In this chapter, we introduce a framework QI-FW for defining and cal-
culating quality indicators for assessment of medical services qualities in
hospitals as a semantic analytics in medical service domains. In particular,
we explain Medical Service Ontology (MSO) and a representation system
QI-RS of quality indicators based on MSO. QI-RS is the main component
of QI-FW and it helps develop quality indicators with unified vocabulary
and structures. Like other semantic analytics, the ontology plays the cen-
tral role to consider how to represent assessment of medical service quality
and how to define quality indicators. Medical staffs including managers
of hospitals have to make judgments based on values of quality indica-
tors, which provide a benchmark of hospitals based on data in medical
databases. So, one can consider QI-framework to be a typical example of
semantic analytics in medical service domains.
ACKNOWLEDGEMENT
This work was supported by a JSPS KAKENHI Grant Number 24500167. The
authors would like to thank Dr. Neera Bhansali for her helpful comments.
REFERENCES
[Aleman-Meza et al., 2005] Boanerges Aleman-Meza, Amit P. Sheth, Devanand Palaniswami,
Matthew Eavenson, and I. Budak Arpinar. 2006. Semantic analytics in intelligence:
122 • O. Takaki, N. Izumi, K. Murata, and K. Hasida
[Horrocks et al., 2003] Ian Horrocks, Peter F. Patel-Schneider, and Frank van Harmelen. 2003.
From SHIQ and RDF to OWL: The making of a web ontology language. Journal of Web
Semantics 1(1):7–26.
[Horrocks et al., 2007] Ian Horrocks, Peter F. Patel-schneider, Deborah L. Mcguinness, and
Christopher A. Welty. 2007. OWL: a description logic based ontology language for the
semantic web. The Description Logic Handbook 2nd Edition: 458–486.
[Huser et al., 2010] V. Huser, S. P. Narus, and R. A. Rocha. 2010. Evaluation of a flowchart-
based EHR query system: A case study of RetroGuide. Journal of Biomedical Informatics
43 (1): 41–50.
[Jurafsky and Martin, 2009] Daniel Jurafsky and James H. Martin. 2009. Speech and language
processing: An introduction to natural language processing, speech recognition, and com-
putational linguistics, 2nd ed. Upper Saddle River, NJ: Prentice-Hall.
[Kaiser, Akkaya, and Miksch, 2007] K. Kaiser, C. Akkaya, and S. Miksch. 2007. How can
information extraction ease formalizing treatment processes in clinical practice guide-
lines? A method and its evaluation. Artificial Intelligence in Medicine 39 (2): 151–163.
[Kanzaki, 2005] Masahide Kanzaki. 2005. Introduction of RDF/OWL for the semantic web.
Chiyoda, Japan: Morikita Shuppan Co., Ltd. (in Japanese).
[Mabotuwana and Warren, 2009] T. Mabotuwana and J. Warren. 2009. An ontology-based
approach to enhance querying capabilities of general practice medicine for better
management of hypertension. Artificial Intelligence in Medicine 47 (2): 87–103.
[Mainz, 2003] J. Mainz. 2003. Developing evidence-based clinical indicators: A state of the
art methods primer. International Journal for Quality in Health Care 15 (1): i5–i11.
[Mainz et al., 2004] J. Mainz, B. R. Krog, B. Bjørnshave, and P. Bartels. 2004. Nationwide
continuous quality improvement using clinical indicators: The Danish National
Indicator Project. International Journal for Quality in Health Care 16 (1): i45–i50.
[Mainz et al., 2009] J. Mainz, A. M. Hansen, T. Palshof, and P. D. Bartels. 2009. National
quality measurement using clinical indicators: The Danish National Indicator Project.
Journal of Surgical Oncology 99 (8): 500–504.
[Mizoguchi, 2003] Riichiro Mizoguchi. 2003. Part 1: Introduction to ontological engineering.
New Generation Computing 21 (4): 365–384.
[Nightingale, 1859] F. Nightingale. 1859. A contribution to the sanitary history of the British
army during the late war with Russia. London: John W. Parker and Son.
[NHO, 2009] Nihon Hospital Organization. 2009. Clinical indicators 2009. Online at:
http://www.hosp.go.jp/7,7018,61.html (in Japanese).
[Noy and McGuinness, 2001] Natalya F. Noy and Deborah L. McGuinness. 2001. Ontology
development 101: A guide to creating your first ontology. Stanford Knowledge Systems
Laboratory Technical Report KSL-01-05 and Stanford Medical Informatics Technical
Report SMI-2001-0880, Stanford, CA.
[OECD, 2006] OECD. 2006. Health care indicators project initial indicators report. OECD
(Organisation for Economic Co-operation and Development) Health Working Paper
22, Paris.
[Okumura, 2012] Manabu Okumura. 2010. Introduction to natural language processing.
Tokyo: Corona-sha (in Japanese).
[Serban et al., 2007] R. Serban, A. ten Teije, F. van Harmelen, M. Marcos, and C. Polo-Conde.
2007. Extraction and use of linguistic patterns for modelling medical guidelines.
Artificial Intelligence in Medicine 39 (2): 137–149.
124 • O. Takaki, N. Izumi, K. Murata, and K. Hasida
[Takaki et al., 2012] O. Takaki, I. Takeuti, K. Takahashi, N. Izumi, K. Murata, and K. Hasida.
2012. Representation system of quality indicators towards accurate evaluation of
medical services based on medical databases. Paper presented at the proceedings
of the 4th International Conference on eHealth, Telemedicine, and Social Medicine
(eTELEMED 2012), February 4, Valencia, Spain.
[W3C 2012] World Wide Web Consortium. 2012. The World Wide Web Consortium
(W3C). Online at: http://www.w3.org/
6
Data Privacy, Security, and Compliance
through Data Governance
Charlyn A. Hilliman
CONTENTS
Introduction.....................................................................................................125
People Management: Identifying Appropriate Stakeholders to
Manage Privacy and Compliance..................................................................129
Process Management: Defining Data Governance through
Implementing Policy Standards and Appropriate Strategies to
Achieve Privacy, Security, and Compliance.................................................136
Technology Management: Using Technology Frameworks and
Initiatives to Ensure Appropriate Access across Systems...........................139
Risk Management: Defining and Managing Risks Using
Data-Related Controls to Ensure Security and Compliance.....................142
Enforcement: Enforcing Regulatory and Contractual Compliance.........145
Conclusions......................................................................................................147
References.........................................................................................................147
Further Readings.............................................................................................147
INTRODUCTION
This chapter will provide a framework for developing data privacy, secu-
rity, and compliance through a systematic data governance structure.
An effective data governance initiative within an organization should be
focused on issues related to data management. There are several aspects of
data management, for example, designing, warehousing, and ensuring the
quality of the data. This chapter will provide a foundation for protecting
data and complying with the federal regulations that govern data usage
125
126 • Charlyn A. Hilliman
Data security refers to the processes that are used to ensure that data are
not only available to those who need it for servicing customers, but that such
data are private and include aspects of access controls and other measures
to ensure privacy and compliance. Data security requires that personal data
are protected through safekeeping, free from corruption and unauthorized
access. Many computer systems and databases used throughout the busi-
ness world, educational institutions, and healthcare facilities encompass
information containing names, addresses, telephone numbers, birthdates,
social security numbers, and other financial or personal health informa-
tion, depending on the agency or organization’s mission. While these data
elements are essential components for the day-to-day operations, such data
can be used to harass, steal a person’s identity, sell to the media, or simply
learn embarrassing information regarding the customer. Therefore, many
organizations choose to encrypt its data or use various layers of control
to protect the data used for business purposes. Even though organiza-
tions should consider privacy and data security as essential components of
doing business, the rationale behind adherence to these basic needs have
not always been based on altruism. Therefore, the state and federal govern-
ment have mandated several regulations that require compliance as part of
doing business.
Compliance with regulations is not an arbitrary concept and noncom-
pliance is not inconsequential. Regulatory compliance, in terms of insti-
tutional compliance, is the process to ensure that laws and regulations
that govern how business is conducted are followed. Throughout the data
governance discourse, techniques on improving compliance and mech-
anisms for doing so efficiently and effectively are deliberated. There are
ever-increasing regulations that can govern a single organization and each
must be adhered to while under not only internal scrutiny, but that of the
general public, shareholders, and governmental entities. As the needs for
compliance grow and the penalties associated with noncompliance also
increase, organizations are adding compliance officers to the staff and
relying on their expert guidance as internal policies and procedures are
created. These individuals are legally trained and experts in interpreting
the regulatory codes that impact the organization’s business model. The
compliance officer’s role is one of great importance within the data gover-
nance committee.
The data governance committee is focused primarily on defining and
understanding data as an asset and must develop policies and procedures
that not only align with the organization’s mission, but with regulatory
Data Privacy, Security, and Compliance through Data Governance • 129
TABLE 6.1
Example of 20 HIPAA Policies
Policy Number HIPAA Policy Title
HIPAA-1 Responsibility of IT Security Office or Administrator
HIPAA-2 Sanctions for Unauthorized Use or Disclosure of PHI
HIPAA-3 Disclosing PHI to Business Associates
HIPAA-4 Use of PHI for Purposes of Treatment, Payment and Healthcare
Operations
HIPAA-5 Required Education for Covered Workforce
HIPAA–6 Providing Notice of Privacy Practices
HIPAA-7 Obtaining Individual Authorization for Use and Disclosure of PHI
HIPAA-8 Minimum Necessary Standard
HIPAA-9 Access Controls to Systems Containing Electronic PHI
HIPAA-10 Authentication and Audit Controls for Electronic PHI
HIPAA-11 Inventory of Hardware and Software Containing Electronic PHI
HIPAA-12 Technical Security Measures for the Transmission of Electronic PHI
HIPAA-13 Responsibility for Conducting Risk Assessment of PHI
HIPAA-14 Duty to Report Security Incidents Involving Electronic PHI
HIPAA-15 Access to Facilities Warehousing Electronic PHI
HIPAA-16 Use of De-Identified PHI
HIPAA-17 Use of PHI for Research
HIPAA-18 Use of PHI for Marketing
HIPAA-19 Use of PHI for Fundraising
HIPAA-20 Operating Contingency Planning for Electronic PHI
And, finally: Where does the IT department fit into all of this? IT should
be tasked with using all available technologies to implement and enforce
the policies (policy compliance) set forth by the executive sponsors and
regulatory agencies. The business side of an organization in conjunction
with IT also should be responsible for defining the data dictionary and
standards through the use of data governance subcommittees that report
back to the larger data governance committee. IT is responsible for the
actual implementation of the data dictionary within the relational data-
base management system.
If each of the aforementioned parameters are considered when deter-
mining the requisite stakeholders for ensuring compliance, a model for
data governance can be constructed using an interorganizational group,
with each member holding various responsibilities for data governance
and privacy and security. Table 6.1 depicts four scenarios for executive
sponsorship. In each scenario, a different group member within the data
governance committee assumes responsibility for the data based on the
type of data. This structure offers a solution to the dilemma detailed above
by reassigning primary responsibility for privacy, compliance, data integ-
rity, and quality based on the data type and the user of the data.
In this model, we will assume that the organization has a clear financial
hierarchy, includes clinical care, and has a strong research component.
This may be a hospital, a medical school, or another healthcare organiza-
tion with research interests. Within scenario 1, the primary focus of the
data will be financial data used for business intelligence and overall orga-
nizational management. In this model, the CEO/CFO hold the primary
responsibility for the data; the CMO/CMIO/COO also have a high level of
responsibility for the data, its integrity, and quality based on the c linical
care aspects of the organization; the PIs of the organization have little
responsibility and will serve an ancillary role within the data governance
committee; and IT will serve as the implementation arm of the committee.
In scenario 2, the focus of the data is research driven. Despite the research
nature, the CEO/CFO should still maintain a high level of responsibility
followed by the CMO/CFO, and overall research compliance rests with the
Institutional Review Board (IRB), which may not be represented within
the organization’s data governance structure. In the absence of IRB mem-
bership within the committee, the IT/Compliance member will serve as a
liaison and provide advisory functionality within this scenario.
In scenario 3, IT/Compliance is considered the executive sponsor for the
data. An example of such data would be an IT asset management system.
Data Privacy, Security, and Compliance through Data Governance • 133
Scenario 4
Scenario 3 IT/compliance
PI
CMO/COO
CEO/CFO
Scenario 2
Scenario 1
institution’s data. Thus, the roles within the committee change from s cenario
1 all the way to scenario 4. Each member will share responsibility for data
privacy and compliance based on his or her role as the executive sponsor.
There is a greater level of accountability for compliance as roles vary, and
interorganizational membership to the data governance committee assures
this. Using this model will help identify the key stakeholders to help an
organization adhere to privacy, security, and compliance regulations.
The Four-Scenario Model provides examples of key stakeholders that
should govern a data governance committee based on the type of data
presented. This strategy distributes responsibilities equitably across the
committee. Nonetheless, a great concern in issues related to security and
compliance still remains: What is the role of IT? Should the data gover-
nance committee create a hierarchical structure that reports to the board
on issues of privacy, security, and compliance? What would the hierarchy
look like? In Figure 6.1 through Figure 6.3, there are three potential hierar-
chical models within the committee that may produce the level of account-
ability desired by organizations. In scenario 1, the CIO/Compliance officer
lead the organization followed by the CEO/CFO and the COM/COO. In
this model, other committee members would be ancillary and provide
supporting functionality and advise as needed. The CIO/Compliance
CIO/Compliance
Officer
CEO/CFO
CMO/COO
FIGURE 6.1
Hierarchical model 1.
Data Privacy, Security, and Compliance through Data Governance • 135
CEO/CFO
CMO/COO
CIO/Compliance
Officer
FIGURE 6.2
Hierarchical model 2.
CMO/COO
CIO/Compliance
Officer
CEO/CFO
FIGURE 6.3
Hierarchical model 3.
136 • Charlyn A. Hilliman
officer has ultimate responsibility for data compliance and would report
directly to the board. An example of this scenario would be an organiza-
tion where the CIO has implemented a new data model, such as an IT asset
management/tracking system. The CIO ultimately owns all IT assets and
is the appropriate person to lead the data governance committee.
In scenario 2, the CEO and CFO have the responsibility for the data and
report directly to the board, followed by the CMO/CMIO/COO and the
CIO. As is the case in scenario 1, the other data governance committee
members are ancillary to the hierarchical body represented and have no
real reporting responsibilities. This scenario places the responsibility on
the CMO/CMIO/COO, followed by the CIO/Compliance officer and the
CEO/CFO. While these scenarios depict reasonable hierarchical models
within the data governance committee organizations that would leave a
single person or group of people within the committee responsible to the
board, organizations must be careful in adopting such hierarchy within
the committee as the interdisciplinary nature of the committee may be lost
and true oversight may cease to exist. Data governance oversight should
exist in an interdisciplinary and accountable setting and provide orga-
nizations with the guidance and oversight needed to ensure regulatory
compliance. In Figure 6.4, you will find a model for data governance and
compliance oversight where each member works as a team and the leader
varies based on the type of data addressed. The committee membership
reflects the scenarios depicted in Table 6.2.
CEO/CFO
Executive
Sponsor
PI (Varies, CIO, CMO/COO
CEO/CFO,
CMO/COO, PI)
CIO
FIGURE 6.4
Hierarchical model 4.
TABLE 6.3
Policymaking Process for Data Governance
Policy Standards and Compliance
Technology
Management
Privacy &
Security Access
Management
FIGURE 6.5
Technology Management Solution
Security threats can come from internal and external sources. Hackers,
competitors, partners, such as vendors and suppliers, and consultants may
cause intentional or unintentional loss of data, data breaches, or other
forms of security risks to an organization. Similarly, employees can cause
intentional or unintentional security risks to an organization. Thus, orga-
nizations are responsible for assessing their risks regularly and mitigating
all known or discovered risks.
Organizations that realize that information security and risk manage-
ment are simply a part of doing business and have deep financial impli-
cations will develop comprehensive risk management processes that not
only examine IT resources and systems, but all aspects of risks within
the organization. While risk management may be viewed as an organiza-
tional albatross, the data governance committee can turn the process into
a major asset, educating the organization on documenting and mitigating
risks. Risk documentation and mitigation provides a level of transparency
and is just smart business. Table 6.4 defines the data governance commit-
tee risk management process.
Although risk management can be initiated from any level of an orga-
nization, the data governance committee can assume responsibility for
developing policies and procedures around risk management. In doing so,
they can define a process such as the example used in Table 6.4. Within
this process, the data governance committee would determine the goals for
the risk assessment and may decide to develop the tools or simply approve
tools presented by the designated organizational representative. Once the
governance committee initiates the risk assessment, the assessment team
will identify the risks, and use an approved tool for determining the like-
lihood of occurrence and the associated consequences of this risk as part
of the risk analysis. The next phase will include a complete evaluation of
the risks, mitigation of the risks, and a report back to the data g overnance
committee. In the final step, the data governance committee will develop a
monitoring and review process to ensure that avoidable risks are mitigated
and controlled and unavoidable risks are contained.
Data Privacy, Security, and Compliance through Data Governance • 145
TABLE 6.4
Risk Assessment through Data Governance
Identify Risks
Evaluate Risks
Mitigate Risks
framework. Within this process are policies and procedures that require
management and technical solutions for implementation and enforce-
ment. The ability to apply physical security, network solutions, asset track-
ing, appropriate authentication, approved privacy layers for defense, and
role definitions for access control are all needed to ensure an organiza-
tion’s ability to enforce regulations and respond to lapses in compliance.
HIPAA, one among the many regulations previously discussed, requires
that consumer data and PHI are not only protected through technical
safeguards, but through obvious physical controls, such as double locked
doors or doors accessed through employee credentials and biometrics.
Thus, the demand for biometric devices increases, and so are the data
requirements for storing information on who is allowed access to par-
ticular devices and rooms based on a fingerprint or retinal scan. These
techniques satisfy multiple purposes, such as physical security, appropri-
ate authentication, role based access, and a layered security defense. Asset
tracking of technical purchases and resources where protected consumer
information is stored is a key requirement of the regulations around data.
Data governance organizations must have policies and procedures around
how such assets are tagged, tracked, and monitored.
A layered security approach is a commonly used strategy for assuring
security and enforcement within an organization. In a layered IT security
approach, there are application level controls, access controls, firewall con-
trols, policy controls, and detection and mitigation controls. Application
level controls and firewall controls often accomplish the same goal of con-
trolling the input, output, and/or access to a specific application or service.
An organization also may use firewall policies, such as prohibiting access
to specific types of Web site, e.g., pornography or game sites, to protect
against unwanted viruses or other malware from entering the organiza-
tion’s intranet. If the preventative measures fail to achieve the appropriate
security, the data governance committee is responsible for ensuring that
appropriate mitigation/solutions or controls exist. Each layer helps orga-
nizations achieve robust information security over their data. The data
governance committee is ultimately responsible for policies and proce-
dures to help IT and Compliance achieve the overall mission. The data
governance committee is responsible for using available technologies and
other organizational resources to communicate policies and procedures
throughout the organization. The data governance committee provides
the appropriate institutional credence to those responsible for implement-
ing and enforcing aspects of regulatory and contractual compliance. Once
Data Privacy, Security, and Compliance through Data Governance • 147
the data governance committee ensures that all policies and procedures
are adhered to, violators can be appropriately sanctioned as per institu-
tional policies and regulatory requirements. However, the enforcement
standards must be publically available.
CONCLUSIONS
This chapter provided a comprehensive background for developing data
privacy, security, and compliance through a systematic data governance
structure. The chapter focused on issues related to stakeholder and people
management to ensure privacy, security, and regulatory compliance. There
was an emphasis on process management that included data management,
the policymaking process, and strategies to achieve privacy, security, and
compliance. Important challenges to this process were outlined along with
its causes. Technology management through the use of software solutions
and the creation of a robust system architecture was addressed along with
processes for conducting risk management and enforcement as mandated
by regulation.
REFERENCES
Lederer, S., J. I. Hong, A. K. Dey, and J. A. Landay. 2004. Personal privacy through under-
standing and action: Five pitfalls for designers. Personal Ubiquitous Computing 8 (6):
440–454.
National Institute of Standards and Technology (NIST). NISTIR 7628. Guidelines for smart
grid cyber security: Vol. 2, Privacy and the smart grid. The smart grid i nteroperability
panel—Cyber security working group. Washington, D.C.: U. S. Department of
Commerce. Online at: www.csrc.nist.gov/publications/nistir-7628-vol2.pdf (accessed
February 13, 2013).
FURTHER READINGS
Cheong, L., and V. Chang. 2007. The need for data governance: A case study. Paper presented
at the ACIS 2007 Proceedings, no. 100. Online at: http://aisel.aisnet.org/acis2007/100
(accessed on January 12, 2012).
Khatari, V., and C. V. Brown. 2010. Designing data governance. Communication of the ACM
53 (1): 148–152.
148 • Charlyn A. Hilliman
Dasaratha Rama
CONTENTS
Introduction.....................................................................................................150
Getting to at Ease.............................................................................................151
The AT-EASE Model and Change Management.........................................152
The AT-EASE Elements................................................................................. 154
Develop Awareness: Accessing and Trying.............................................155
Realize Early Wins: Exploring and Applying..........................................157
Develop Ownership: Seeking and Embedding.......................................158
Using the AT-EASE Model.............................................................................159
The Six Cs and AT-EASE...........................................................................159
Six Cs and AT-EASE Change Management Practices...........................160
Enhancing AT-EASE Application with Systems Thinking........................161
Models of Data Governance......................................................................162
Making Distinctions..............................................................................162
Organizing into Systems.......................................................................164
Forming Relationships..........................................................................164
Taking Perspectives...............................................................................165
Constructing and using AT-EASE Models..................................................166
Constructing an AT-EASE Model: Noninvasive Data Governance.....166
Constructing an AT-EASE Diagram: Adaptive Data Governance.......169
Make Distinctions..................................................................................169
Organize into Systems...........................................................................169
Document Relationships.......................................................................170
Summary and Implications for Practice.......................................................171
References.........................................................................................................172
149
150 • Dasaratha Rama
INTRODUCTION
This chapter presents the AT-EASE change management approach for
adaptive data governance. The term adaptive data governance is based on
the notion of adaptive challenges. In adaptive challenges, problem defi-
nition, solution, and implementation of solutions are not clearly defined
at the outset and require new learning (Heifetz, Grashow, and Linsky,
2009a). Given the rapid changes in the technology and business envi-
ronment, as well as the continuously expanding knowledge base of data
governance standards and best practices, data governance requires an
adaptive process of ongoing learning and problem solving for leaders as
well as for employees. Further, data governance requires people to change
their v alues, beliefs, and behaviors related to data collection, protection,
and use. Accordingly, data governance requires a sustained commitment
to change management (Harris, 2011).
Recent change management approaches recognize that people do not
change based on logical analysis and facts alone, and that the way people
feel about the change affects the extent to which they embrace change.
Leaders should assess the emotional and behavioral factors that affect
people’s willingness to change, and take steps to guide and support them
through the change process over an extended period of time. Rather
than using a universal checklist, organizations need an intentional and
systematic process that can help them assess potential pitfalls in their
IT initiatives, and develop appropriate strategies for managing change
(McAfee, 2003). Such a process can help organizations overcome pitfalls
and realize the value of data governance initiatives.
While many approaches incorporate ideas, such as emotion and motiva-
tion, the notion of at ease is the pivotal organizing idea for the AT-EASE
approach. The AT-EASE learning model provides a systemic model that
supports integration of technical and adaptive elements of data gover-
nance in a way that maintains a consistent focus on helping individuals
toward greater at ease as they move through the change process over time.
The AT-EASE model is based on the premise that feeling at ease supports
engagement and participation in learning and change (Ciborra, 2004;
Immordino-Yang and Damasio, 2007; Kahn, 1990; Porges, 2004; Schore,
2009). Based on an extensive review of recent neuroscience findings, Rock
(2009) suggests that the brain’s over-arching principle in responding to
Adaptive Data Governance • 151
GETTING TO AT EASE
In addition to the notion of adaptive challenges, the choice of the term
adaptive data governance is motivated by two other central ideas from
adaptive leadership (Heifetz, Grashow, and Linsky, 2009b): promoting
employee ownership and regulating distress. Adaptive leadership is rooted
in the idea that the responsibility for the solution to adaptive challenges
lies with followers rather than leaders. Many data governance practices,
such as those related to security and privacy, affect all employees. Further,
many employees are involved with defining, collecting, and using data in
organizations. The recent trend toward big data governance (Evans, 2012)
further underscores the pervasive nature of data-related activities in orga-
nizations. Hence, creating ownership of data management practices and
helping employees embed and sustain such practices may be critical for
successful data governance.
The adaptive leadership model also recognizes disequilibrium as an
expected and natural part of the change process. Accordingly, regulating
distress is identified as one of the core practices of adaptive leadership. The
152 • Dasaratha Rama
Ac
ces g
sing din
bed
Em
Tr yi Employees
ng ing
Seek
Explo
ring ing
Apply
Become Aware Realize early wins Take ownership
Enhance access Encourage Focus attention on Support Encourage Provide support as
to people and conversations to vision and priorities implementation of participant inputs needed as
other data identify possibilities to help employees chosen next steps on evolving data participants
governance for enhancing data identify next steps governance continue to embed
resources governance
ring Applyin data governance in
Explo g daily routine
in g Seek
Tr y ing
Change Leaders
Em
sing bed
ces din
Ac g
FIGURE 7.1
Helping employees get to AT-EASE with data governance.
1. Develop awareness
2. Realize early wins
3. Develop ownership
governance. The third phase represents the highest level of at ease that
arises when employees have internalized new practices and successfully
embedded them in routine work. Leaders’ priorities evolve depending on
the level of at ease. The six components are described below.
Employee
Change Leader
Connections
1
FIGURE 7.2
AT-EASE elements.
that employees know specific steps that they need to take to implement
data governance. However, they also need confidence in their ability to
implement ideas in practice. In other words, confidence in implementing
the selected steps helps individuals progress from Exploring to Applying.
During Exploring and Applying, information needs are narrower and
relate to specific data governance issues and practices rather than the
broader range of information provided during accessing and trying.
Leaders can assist employees in this phase through providing training and
support, and by providing access to information and tools.
their context. In turn, thinking about possible actions during trying helps
employees commit to a specific course of action.
If the conversation is not focused, people may be too overwhelmed to try
and committing to a specific course of action may be difficult. Note that
the word commitment is used in a narrow sense of settling on a particular
course of action that seems most promising at that particular time. On the
other hand, committing to a specific course of action does not necessar-
ily result in at ease because a few individuals may drive the process and
decide on a course of action without adequate buy-in from others.
Individuals need to feel confidence to feel at ease with a specific course
for a chosen course of action to be translated into application. Thus,
confidence is shown as the link between exploration and application.
Confidence also means that employees have the knowledge and skills
required to implement this action plan. Over time, individuals evolve to
a different level of at ease where they are comfortable initiating ideas and
actions because they personally care about data governance and under-
stand its personal relevance. Finally, integrating and evolving new learn-
ing over time helps develop competence and a higher level of at ease.
Making Distinctions
increase by including more detail, but by including elements that add value
to a particular inquiry (Imam, LaGoy, and Williams, 2007). Different data
governance approaches that emphasize a systemic or holistic approach
may differ widely in how they define data governance, and make dif-
ferent choices on issues and practices included in their scope. While
selecting a data governance approach, it is important to consider questions
such as: What does a given model of data governance include/exclude?
What are the implications of these boundary choices in practice?
While existing models may differ in many ways, the key distinction for
this chapter involves the extent to which existing models of data gover-
nance incorporate the idea of helping people move from initial disequili
brium to greater levels of AT-EASE over time. The noninvasive data
governance approach (Seiner, 2012) recognizes that data governance efforts
are adversely affected by the need for above-normal work efforts and a
command and control approach. The underlying idea behind noninvasive
data governance practices is that data governance is already embedded
in informal ways in organizations, and that formalizing and integrating
these practices results in a nonthreatening approach to data governance
implementation. The idea of at ease underlying noninvasive governance
focuses on minimizing threat. Managers and employees are more likely to
be at ease if current data governance practices are evolved gradually.
In contrast, DMBOK focuses on different areas of data management and
integrating data governance and management. DMBOK materials provide
detailed guidance on data governance and nine other disciplines:
• Activities
• Deliverables
• Roles and responsibilities
• Practices and techniques
• Technology
Forming Relationships
Taking Perspectives
governance. Initial experiences of this nature can help prepare people for
more challenging experiences.
In summary, the noninvasive data governance and DMBOK approaches
have different mental models that incorporate the notion of at ease to dif-
ferent degrees, and, hence, recommend different kinds of practices. Both
of these models offer valuable insights. No single model may be structured
in a way that meets the needs of an organization at all times. Rather than
evaluating models to identify the best one, an organization’s model of
data governance can be seen as a dynamic construction that draws upon
diverse sources and integrates them in a way that meets the organiza-
tion’s needs. The following section uses DSRP diagramming techniques to
develop such representations.
Stewardship
conversations
3
Informal
1
Stewardship Practices
Formal Stewardship
2
Practices
FIGURE 7.3
AT-EASE and noninvasive data governance™.
Make Distinctions
As seen from Figure 7.4, the six adaptive components can be organized into
two groups. The first two practices relate to the leader’s own learning and
problem solving. The second practice of identifying adaptive challenges
corresponds to “Trying” under AT-EASE. The broad range of information
accessed by the leader is narrowed down to frame adaptive challenges.
The next three practices (regulate distress, maintain disciplined attention,
and give work back to people) represent steps that leaders take to facilitate
170 • Dasaratha Rama
Adaptive
Leadership
Employee
Adaptive Leader
FIGURE 7.4
AT-EASE and adaptive leadership.
Document Relationships
Three key relationships are shown in Figure 7.4 to clarify the evolution
of the holding environment created by leaders over time. The first link
between Embedding on the leader side and Accessing on the employee
side represents the holding environment that provides a safe and struc-
tured environment for employees to begin exploring data governance. The
practice of regulating distress is shown as a link from the leader to Trying
for the targets of change.
The process of maintaining disciplined attention may be most signif-
icant in the exploration step. Leaders have to help employees maintain
their attention on the issues, choose and commit to a particular course
Adaptive Data Governance • 171
of action, and help people acquire the knowledge and skills required to
implement the chosen course of action.
The practice of giving work back to people corresponds to the Accessing
component of the AT-EASE model. Once employees know what needs to
be done and how, greater responsibility can be transferred to them. These
components reflect the increasing ownership assumed by the stakeholders
in addressing the challenge.
REFERENCES
Ambler, S. 2012. Agile/Lean data governance best practices. Online at: http://www.agiledata.
org/essays/dataGovernance.html
Cabrera, D., L. Colosi, and C. Lobdell. 2007. Systems thinking. Evaluation and Program
Planning 31: 299–310
Ciborra, C. 2004. Encountering information systems as a phenomenon. In The social study
of information and communication technology: Innovation, actors, and contexts, eds.
C. Avgerou, C. Ciborra, and F. Land (pp. 17–37). Oxford and New York: Oxford
University Press.
Adaptive Data Governance • 173
Corcoran, C. K. 2009. People and organizational cultural issues in data governance. https://
www.msu.edu/~corcora1/proposals/corcoranck_confppt.pdf
Evans, P. 2012. What big data means for the future of self-service business intelligence.
Information Management. Online at: http://www.information-management.com/
newsletters/big-data-BI-self-service-Peter-Evans-10022611-1.html
Goodman, M. 1991. Systems thinking as a language. Systems Thinker 2 (3): 1–2. Online at:
http://www.appliedsystemsthinking.com/supporting_documents/IntroLanguage.pdf
Harris, J. 2011. Retrograde organizational motion. The Data Roundtable. Online at: http://
www.dataroundtable.com/?p=6926
Heifetz, R., A. Grashow, and M. Linsky. 2009a. The theory behind the practice: A brief intro
duction to the adaptive leadership framework. Cambridge, MA: Harvard Business
Press. Online at: https://www.cu.edu/articles/upload/theory_behind_practice.pdf
Heifetz R., A. Grashow, and M. Linsky. 2009b. Orchestrate conflict: Leading adaptive
change by surfacing and managing conflict. Excerpted from the authors’ The practice
of adaptive leadership: Tools and tactics for changing your organization and the world.
Boston: Harvard Business Press.
Hiatt, J. M. 2006. ADKAR: A model for change in business, government and our community:
How to implement successful change in our personal lives and professional careers.
Loveland, CO: Prosci Learning Center Publications.
Imam, I., A. LaGoy, and B. Williams. 2007. Introduction. In Systems concepts in evaluation:
An expert anthology American evaluation association. Point Reyes, CA: EdgePress
on Inverness.
Immordino-Yang, M. H., and A. Damasio. 2007. We feel, therefore we learn: The relevance of
affective and social neuroscience to education. Mind, Brain, and Education 1 (1): 3–10.
Kahn, W. A. 1990. Psychological conditions of personal engagement and disengagement at
work. Academy of Management Journal 33 (4): 692–724.
Kotter, J. P. 1996. Leading Change. Harvard Business Press: Boston, MA.
McAfee, A. 2003. When too much IT is a dangerous thing. Sloan Management Review
(Winter): 83–89.
Moseley, M. 2008. DAMA-DMBOK functional framework, ver 3.02. DAMA International.
Online at: http://www.dama.org/files/public/DAMA-DMBOK_Functional_Frame-
work_v3_02_20080910.pdf
Porges, S. W. 2004. Neuroception: A subconscious system for detecting threats and safety.
Zero to Three 24 (5): 19–24.
Rock, D. 2009. Your brain at work: Strategies for overcoming distraction, regaining focus, and
working smarter all day long, 1st ed. New York: Harper Business.
Schore, A. 2009. The paradigm shift: The right brain and the relational unconscious. Invited
plenary address to the American Psychological Association 2009 Convention,
August, Toronto, Canada.
Schell, S. 2012. Data security and privacy: Can it be institutionalized and internalized.
Online at: http://www.isaca.org/Education/Upcoming-Events/Documents/2012-
NACACS-Presentations/314-nac2012.pdf
Seiner, R. S. 2012. Real world data governance: Non-invasive data governance—The practi-
cal approach. Monthly Webinar Series, Dataversity. Online at: http://www.slideshare.
net/Dataversity/seiner-dataversity-real-world-data-governance-webinar-3-noninva-
sive-data-governance-20120315-final-ii
8
Case Study: State Level Governance
of Health Information Exchange
Christopher B. Sullivan
CONTENTS
Introduction.....................................................................................................176
Values of Health Information Exchange (HIE) Governance.....................177
Case Study: State-Level Governance of Health Information Exchange.....178
Background to the Development of State-Level Health Information
Exchange...........................................................................................................179
Technical Background to Health Information Exchange......................179
Patient Lookup Model of Health Information Exchange.................180
Secure Messaging for Health Information Exchange........................183
Values of Governance in Health Information Exchange............................184
The Value of HIE Governance in Convening Healthcare
Stakeholders................................................................................................185
The Value of HIE Governance for Data Sharing....................................186
Value of HIE Governance in Bridging Public and Private Sectors......187
Determinants of Value for Governance of Health Information
Exchange......................................................................................................188
Authority.................................................................................................189
Leadership...............................................................................................189
Neutral Convener................................................................................. 190
Coordinate Policy Development and Strategic Planning................ 190
Business Operations............................................................................. 190
Accountability........................................................................................191
Transparency..........................................................................................191
Case Study: Development of HIE Governance through Federal
Initiatives..........................................................................................................191
AHRQ Health Information Exchange Grants........................................192
175
176 • Christopher B. Sullivan
INTRODUCTION
One of the major revolutions taking place in healthcare in the United
States is the move from paper to electronic records in physicians’ offices
and hospitals across the country. This is a transformation that is more
than just adopting the use of a computer and electronic health record soft-
ware to replace the paper prescription pad and handwritten notes. It is
a fundamental change from inaccessible, office-bound paper documents
to electronic records in a database that can be queried, summarized, and
used to track patient care. The electronic record increases accessibility to
a patient’s health information by office staff and physicians, benefitting
administrative efficiency. Having the data in electronic format means
that it can be sent electronically to another physician any time a patient
is referred or transferred for care, bypassing the paper-based facsimile
machine for the electronic exchange of records. This ability to exchange
records electronically is the key to the transformation of patient care.
Case Study • 177
Emergency Department
physicians need to Current medical problem Patient presents
obtain accurate, timely with past medical
Current medications
information on a history that may
patient to make an Treatment from other not be available to
accurate diagnos is and physicians the treating
to deliver the most Other disease states physician
appropriate care and Life style issues
treatment.
Hospital
Community Health
Laboratory
Centers & Clinics,
Hospital
Pharmacy Health
Information Medication
Exchange History
MPI/RLS
FIGURE 8.1
Emergency room health information exchange (HIE) use case.
The use of these six identifiers allows a lab result to be fully described and
distinguished from any other lab result. Without this step of standardiza-
tion, laboratory results from different reference laboratories could not be
compared for patient care management (McDonald et al., 2010).
The use and deployment of these technical standards ultimately falls
under the purview of the HIE governing organization that must ensure
the interoperability of EHRs and the community HIE, and must be imple-
mented by the HIE technical vendor. Equally complex for the HIE govern-
ing organization are the social, legal, and political constraints developed
Case Study • 183
VALUES OF GOVERNANCE
IN HEALTH INFORMATION EXCHANGE
Following the passage of the American Recovery and Reinvestment Act
in 2009, a nationwide project was initiated to build an HIE infrastructure
that would support the exchange or records for the coordination of care
all across the United States. One of the key actions of ARRA for building
this nationwide network was to require each state government to estab-
lish a “state-designated entity.” These organizations would be responsible
for managing the funding for state-level HIEs provided in the act and for
engaging resources within the state to actually construct the HIE infra-
structure. With this action, the federal government passed the role of
HIE governance to the states. Following ARRA, ONC launched the HIE
Cooperative Agreement Program for state-level HIEs and governance of
HIEs by the state-designated entities became an important state issue.
Governance of local HIEs is manageable, because many of the healthcare
stakeholders are familiar with each other. At the state level, governance
takes on greater complexity in part because the diversity of stakeholders
can increase substantially, especially in large states, and the effort to foster
collaboration and data sharing increases exponentially.
Case Study • 185
and federal law. Data stewardship and the control of medical records
are written into state and federal laws that specify the requirements of
record storage, record protection, and the limits of record sharing. Federal
laws, such as the Health Insurance Portability and Accountability Act
(HIPAA), Family Educational Rights and Privacy Act (FERPA), and the
Public Health Services Act contain strict guidelines for maintaining the
security and privacy of records and provide for penalties in the case of a
breach that releases records improperly. HIPAA limits the transfer and use
of patient records for treatment, payment, and operations only. HIPAA
allows physicians to exchange medical records with another physician for
treatment purposes, but also allows patients the right to “opt out” of shar-
ing their records. While HIPAA was enacted to facilitate the exchange of
medical records, healthcare providers sometimes misinterpret its intent
and use it to limit access to their records.
Most states also have statutes that protect specific classes of records, such
as mental health notes, HIV information, and drug abuse treatment, requir-
ing physicians to obtain patient authorization before transferring them to
another physician. While both state and federal laws set constraints on the
exchange of a patient’s medical records, state laws prevail when these laws
are more strict than HIPAA. Some state laws require the patient to actively
“opt in” by authorizing the transfer of records over a health information
exchange, while other states endorse the “opt out” approach.
These two issues of opt in versus opt out of record exchange form a
major challenge for the governance of health information exchange and
for setting exchange policies (Goldstein and Rein, 2010). To make things
more complex, some states have addressed the issue through statute,
othersthrough administrative rules, and others through the subscription
agreements for joining the health information exchange. The lack of con-
sistency of medical record laws from state to state is a challenge to gover-
nance of health information exchange and one factor in the variance of
governance models across the states (Pritts et al., 2009).
• Authority
• Leadership
• Neutral Convener
• Coordinate Policy Development and Strategic Planning
• Business Operations
• Accountability
• Transparency
Authority
The HIE governing body must be granted the authority to engage with stake-
holders as a convening and coordinating body. Under the ONC HIE Coop-
erative Agreements, each state government nominated a state-designated
entity, either a state agency or a not-for-profit Health Information Organi-
zation. With this designation, the authority to convene healthcare stake-
holders was established as well as start-up funding from ONC. However,
it is up to each state-designated entity to craft its governance model and
determine the extent to which it puts together public–private partnerships.
Some state legislators have crafted state laws designating the state-level
HIE, others have relied on executive orders or on the current HIE environ
ment to delegate authority for state-level HIE. Every state is unique.
Leadership
The state-level HIE governing body will be expected to take the lead in
decisions that define expectations for the HIE, grant power to partici-
pants, and verify their performance. It must take the lead in aligning HIE
190 • Christopher B. Sullivan
Neutral Convener
The state-level HIE must deliver the processes and organizational capacity
to support HIE serving all healthcare stakeholders. The statewide entity
can drive public good by enabling the development of local as well as
state-level HIEs. Its role is to develop policy and implementation guides to
ensure that local, regional, and state-level operators of HIEs act in coor-
dinated fashion, and it serves as a means for consensus on the adoption
of HIE standards. Private and public actors must work together to achieve
the goals of the HIE based on a realization that everyone is better off nego-
tiating around differences and collaborating toward progress.
Business Operations
The HIE governance organization will have to address business models for
the state-level HIE and to plan a strategy for sustainability. It will have to
deal with technical operations and determine what it takes to build, operate,
and maintain the HIE, even if the HIE operations are undertaken by a tech-
nical vendor that is contracted to the HIE governing organization. In this
Case Study • 191
Accountability
Transparency
In order to gain the trust of its participants and its stakeholders, the HIE
governing organization has to operate under the principle of governance
with transparency and openness. It needs to rely on the professional trust
of its members and its customers in order to succeed in its governance
activities. The HIE governing organization needs to develop policies that
make its meetings and decisions open to the public, and should accept
input from all interested parties.
at the state level prior to the American Recovery and Reinvestment Act
of 2009, and the state-designated entities are only three years old at this
point. Their having to work through the principals of HIE governance to
launch state-level networks becomes an interesting case study in how well
the values of governance underlie their efforts.
A starting point for HIE began with the establishment of the Community
Health Information Networks (CHIN) in the early 1990s. Their goal
was to facilitate the exchange of health data among all members of the
healthcare system, including providers, payers, managed care companies,
clinical laboratories, pharmacies, and others. The CHINs were an exciting
concept, but due to technical and financial constraints, most CHINs were
not successful (Soper, 2001). However, the CHINs did set the stage for the
resurgence in health information exchange 10 years later.
In 2001, the National Committee on Vital and Health Statistics pro-
posed the development of the National Health Information Infrastructure
(NHII) to facilitate the exchange of medical records for the coordination of
care. The study compared multiple healthcare settings and focused on an
infrastructure that facilitated information sharing and “health-oriented
interactions” more so than just technical data systems (National Com-
mittee on Vital and Health Statistics, 2001). The study finished by recom-
mending the creation of a permanent office in U.S. Department of Health
and Human Services (HHS) to oversee the creation of the NHII.
In 2004, President George W. Bush announced the creation of the
Office of the National Coordinator for Health Information Technology
(ONC) and the secretary of HHS appointed Dr. David J. Brailer as the first
national coordinator. ONC was to become the major federal conduit for
funding health information technology projects, but the first set of dem-
onstration projects to promote health information exchange and engage
with community HIE governance efforts came from the HHS Agency for
Healthcare Research and Quality (AHRQ).
TABLE 8.1
AHRQ State and Regional Demonstrations in Health Information Technology Awardees
Contracting Governing
State Institution Organization Description of Project
Colorado University of Colorado Develop a statewide HIE
Colorado Health Regional Health for physician access to
Sciences Center Information clinical records
Organization
Delaware Delaware Health Delaware Health Develop a statewide health
Information Information information exchange
Network Network for physician access to
clinical records
Indiana Indiana University Indiana Network Develop HIE and implement
School of for Patient Care a statewide public health
Medicine surveillance network to share
emergency department data
Rhode Island State of Rhode Rhode Island Develop a Master Patient
Island, Quality Institute Index to facilitate
Department interoperability and sharing
of Health patient data
Tennessee Vanderbilt Mid-South Implement a regional data
University e-Health sharing and interoperability
Medical Center Alliance services in three counties
Utah Utah Health Utah Health Expand current statewide
Information Information network for the electronic
Network Network exchange of patient
administrative and
clinical data
TABLE 8.2
NHIN 1 Prototype Architecture Awardees
Contracting
States Institution Participating Organizations
West Virginia Accenture West Virginia Medical Institute
Kentucky Eastern Kentucky Regional Health Community
Tennessee CareSpark
North Carolina IBM North Carolina Healthcare Information and
New York Communications Alliance (NCHICA)
North Carolina Division of Public Health
Taconic Health Information Network
Community (THINC)
New York State Dept. of Health
Indiana CSC Indiana Health Information Exchange
Massachusetts MA-SHARE
California Mendocino HRE
Colorado Northrup Grumman Quality Health Network
California Santa Cruz RHIO
Ohio University Hospitals Health System
TABLE 8.3
NHIN 2 Trial Implementation Awardees
States Participating Organizations
Virginia MedVirginia
Tennessee CareSpark
Delaware Delaware Health Information Network
Indiana Indiana University
California Long Beach Network for Health
New Mexico Lovelace Clinic Foundation
New Mexico Health Information Collaborative
New York New York eHealth Collaborative
North Carolina North Carolina Healthcare Information and Communications Alliance
West Virginia West Virginia Health Information Network
In the HITECH Act, the secretary of HHS was directed to invest in the
technical infrastructure necessary to “support the nationwide electronic
exchange and use of health information in a secure, private, and accurate
198 • Christopher B. Sullivan
The HITECH Act established two new committees under ONC to pro-
vide quasigovernance activities of the Nationwide Health Information
Network, though their function is to provide recommendations rather
than oversight to ONC. The HIT Policy Committee was created to develop
a policy framework for the development of the health IT infrastructure,
and develop standards and specifications for building the infrastructure
for secure health information exchange. The mission of the HIT Policy
Committee also included developing policy standards for the security of
health information exchange, public health biosurveillance, and telehealth
monitoring technologies. The HIT Policy Committee was expected to offer
a balanced representation to all sectors of the healthcare system and serve
as a forum for stakeholder input, which is its major governance function.
The second committee created was the HIT Standards Committee.
Its job was to recommend technical standards and specifications for
health IT and specifically for the exchange of healthcare records to
Case Study • 199
The HITECH Act directed ONC to update the Federal Health IT Strategic
Plan that it had published a year earlier in 2008. ONC was required to
address specific objectives and metrics with respect to implementing HIE,
such as strategies for incorporating privacy and security protections for
HIE, educating the public about health IT, and developing strategies to
ensure quality health outcomes from the use of health IT for the coor-
dination of care. ONC was also to establish a framework to coordinate
the recommendations and policies that stemmed from the HIT Policy and
Standards Committees (American Recovery and Reinvestment Act, 2009).
The Federal Health IT Strategic Plan, published in 2008, addressed
the governance of HIEs as an integral part of its strategy by inserting a
Case Study • 201
governance objective in each of its strategic goals. At that time, the ONC
strategic plan argued that “planning, consensus building, priority setting,
and consistent approaches to implementing policies can best be achieved
through appropriate structures and mechanisms for collaborative gov-
ernance” (Office of the National Coordinator for Health IT, 2008, p. 4).
In the view of the 2008 ONC strategic plan, proper governance of HIE
should include individuals and organizations who are healthcare stake-
holders cutting across both public and private sectors.
In 2011, ONC published its second Strategic Plan, as required by
the HITECH Act. In this new plan, there is little discussion of HIE
governance, except by way of reference. ONC states that it will “estab-
lish a governance mechanism through rulemaking that seeks to include
accountability and oversight of nationwide information exchange”
(Office of the National Coordinator for Health IT, 2011b, p. 18). The gov-
ernance mechanism proposed by ONC was published as a Request for
Information (RFI) in 2012 and was based, in part, on the recommenda-
tions of the governance workgroup of the HIT Policy Committee (HIT
Policy Committee, 2010b). The approach taken by ONC in the RFI pro-
posed the “creation of a voluntary program under which entities that
facilitate electronic health information exchange could be validated with
respect to their conformance to certain ONC-established ‘conditions for
trusted exchange (CTEs)’” (Federal Register, 2012, p. 28544). Under these
governance guidelines, the ONC was offering a validation or credential-
ing mechanism for HIEs to promote trust rather than an approach that
promotes engaged stakeholder collaboration and input. This approach
was a step back from the consensus-building priority of governance in its
previous strategic plan in 2008, and the evidently “hands on” approach
of the HIT Policy Committee recommendations. In September 2012, the
ONC pulled back from the governance plan established in the RFI in
favor of leading through action and guidance rather than direct regula-
tion (Office of the National Coordinator for Health IT, 2010).
60 57
50
40
40
32
30 26
25
20
9
10
0
2004 2005 2006 2007 2008 2009 2010 2011
Fully operational HIEs
FIGURE 8.2
eHealth Initiative survey of fully operational HIEs, 2004–2011.
2005). The data from the eHealth Initiative surveys on the number of fully
operational HIEs in Stages Five and Six is shown in Figure 8.2. Each of
these HIEs had to demonstrate success in their governance models for
bringing community stakeholders to the table and for developing the rules
of data sharing among them. These governance models would become the
basis for furthering the exchange of health information under the new
requirements of the HITECH Act.
sponsorship role for early HIE efforts, it is most valuable for a state-level HIE
entity to be a structure that engages, but sits outside of, state government”
(State Level HIE Consensus Project, 2008). In this model, then, the role of the
independent not-for-profit organization as the HIE governing entity brings
value to governance by virtue of its independence and ability to represent
all stakeholders.
HIE policy research identified several models of HIE governance that had
emerged prior to the ONC HIE Cooperative Agreement Program, but were
very influential in creating the governance models that have emerged among
the state-designated entities (Alfreds, 2009; Deloitte Center for Health
Solutions, 2006). The basic models for government-based HIE include:
Centralized Model
issues for the state and the need to maintain consensus across a diverse set
of healthcare communities.
Decentralized Model
Hybrid Model
CONCLUSIONS
The institution of governance oversight is critical for establishing success-
ful health information exchange among a diverse set of healthcare provid-
ers. There are many concerns and issues about data sharing that create
barriers to the effective exchange of health information. It takes a strong,
neutral group of concerned people to bring the different healthcare stake-
holders to the table to work through their differences to create some com-
mon ground for sharing the healthcare records for which they are data
stewards. This role as the Neutral Convener is a key value for governance
of the HIE because it must establish the trust among all participants and
must display a preference only for maintaining an equal playing field for
all. A related value for the governance body in its neutral convening role is
transparency of actions, in which all meetings, discussions, and decisions
are accomplished in the open. This value is essential to the formation of
trust and for maintaining its credibility in the healthcare community.
There are other values that the HIE governance brings to the table. The
HIE governing body must have Authority vested in it, either by the com-
munity of healthcare stakeholders or, as in the case of the state-designated
entities, by the state government. This is essential for its credibility and
representation of all participants. With that responsibility comes the task
of Leadership in articulating a vision of health information exchange
210 • Christopher B. Sullivan
that enables the sharing of healthcare data while addressing the concerns
and issues of all stakeholders. One of the major requirements of the HIE
governance body in its leadership role is Policy Development by which it
negotiates consensus on the rules and expectations of implementing data
sharing through an HIE. It then must express stakeholder agreements as
a set of clear guidelines and policies that all participants are willing to
follow and hold them accountable to the rules that are established. The
governance value of Accountability is essential for maintaining the cred-
ibility and trust of HIE operations.
Finally, the HIE governing organization has to address the operational
and business side of the HIE. For this responsibility, it must apply the value
of Strategic Planning to look to the future and determine how to bring in
more participants in data-sharing activities, engage their needs, and work
to develop policies and rules that benefit all participants. In addition to
planning for the expansion of its membership, the governing body must
apply skill in determining the appropriate Business Operations that will
move it forward technically. It has to ensure that the HIE infrastructure
maximizes its potential and the needs of participants and can maintain
a sustainable revenue stream. These last two value function of the gov-
ernance organization speak to its ability to build a business entity that
can continue to operate and provide its members with a reliable technical
infrastructure for the ongoing exchange of health information.
With the passing of ARRA and creation of state-level state-designated
entities, the knowledge and lessons learned from developing local HIEs did
not necessarily translate to the state-designated entity. The first issue to be
dealt with was the locus of power and authority for the state-designated
entity, whether within the state or with a state-level not-for-profit. Some
states had already worked through this decision, like Rhode Island and
Delaware, in part due to prior work on HIEs with AHRQ and ONC fund-
ing. Most states had to work through this problem for the first time, which
was a challenge. Also, whereas local HIE governance could deal principally
with a known set of healthcare stakeholders, the state-designated entity
had to bring stakeholders together from disparate parts of the healthcare
system, such as physicians, hospitals, payers, health departments, and
consumers. Some stakeholders do not have the same goals or objectives
in endorsing health information exchange, so these minor conflicts add to
the difficulties of the governing body in negotiating consensus and achiev-
ing a coordination of effort among participants (eHealth Initiative, 2012a).
Case Study • 211
There are other problems facing the state-designated entities. They have
the common problems of a day-to-day governing board participation, but
also have to deal with issues such as a lack of technical knowledge of HIE
among board members as well as competing interests, if not conflicts of
interests, among board members (eHealth Initiative, 2012a). In addition,
government control of the state-level HIE does not necessarily engender
trust in participants, although it can. However, the pattern in many states
is to migrate the control of the state-level HIE from a government agency
to an independent not-for-profit. This could indicate the difficulty of
establishing a functioning HIE with state resources, or it could indicate a
general perspective on the appropriate locus of control. The approach that
state governments and the state-designated entity have taken to build-
ing out the HIE infrastructure, whether a centralized or decentralized or
hybrid model, raises governance issues unique to that model. It is still too
soon to determine which is most successful.
Yet, the requirements of good HIE governance do not go away, and the
state-designated entities are the generally responsible organizations, many
mandated by state statute, to get the job done. The success of the federal
initiative to create a national HIE infrastructure will be determined by
the steady efforts of the state-designated entities as they engage in the HIE
governance of their state-level HIEs and apply the lessons learned from
their community-based counterparts.
REFERENCES
Adams, L. (president and CEO of Rhode Island Quality Institute). 2012. Personal commu-
nication. April 30.
Agency for Healthcare Research and Quality. 2004. AHRQ State and Regional Demonstra-
tions in Health Information Technology. Online at: http://archive.ahrq.gov/fund/
contarchive/rfp040015.htm
Agency for Healthcare Research and Quality. 2006. AHRQ Health Information Technology
Programs: Update 2005-06. Online at: http://www.ahrq.gov/research/hitfact.htm
Albritton, P. (executive director, Colorado Regional Health Information). 2012. Personal
communication, April 4.
Alfreds, S. T. 2008. Examination of public oversight, accountability, and financing of a sus-
tainable electronic health information exchange industry. Web presentation to the
National Conference of State Legislators, September 10. Online at: http://www.ncsl.
org/print/health/forum/accountability.pdf
212 • Christopher B. Sullivan
Alfreds, S. T. 2009. Report to the State Alliance for e-Health: Public governance models for
a sustainable health information exchange industry. Shrewsbury, MA: University of
Massachusetts Medical School Center for Health Policy and Research, National Opinion
Research Center, National Governors Association Center for Best Practices. Online at:
http://www.nga.org/files/live/sites/NGA/files/pdf/0902EHEALTHHIEREPORT.PDF
American Recovery and Reinvestment Act. 2009. Online at www.gpo.gov/fdsys/pkg/
BILLS-111hr1enr/pdf/ (p. 116).
Anderson, H. (executive director, North Carolina Healthcare Information & Communica-
tions Alliance, Inc.). 2012. Personal communication, May 29.
Bakalar, R. 2008. Establishing governance: Focus on sustainability and community inclusion.
Best Practices for Community Health Information Exchange. New Haven, CT: Center
for Community Health Leadership. Online at: http://www.allscriptscenter.com/NR/
rdonlyres/6B8E9E8A-93BD-467D-A3BB-52B0E4DC6107/0/CCHL_BPG.pdf
Barnes, K. (HIT coordinator, Commonwealth of Virginia). 2012. Personal communication,
April 5.
Blair, H. (deputy commissioner and HIT coordinator, Department of Vermont Health
Access). 2012. Personal communication, April 24.
Block, R. (HIT coordinator, New York State Department of Health). 2012. Personal com-
munication, April 12.
Covich, J., D. R. Jones, G. Morris, and M. Bates. 2011. Governance models for health informa-
tion exchange. eHealth Initiative and Thomson Reuters. Online at: http://healthcare.
thomsonreuters.com/hie/assets/Governance_Models WP.pdf
Deloitte Center for Health Solutions. 2006. Health information exchange (HIE) business
models: The path to sustainable financial success produced by the Deloitte Center
for Health Solutions (Chicago). Online at: http://www.providersedge.com/ehdocs/
ehr_articles/Health_Info_Exchange_Business_Models.pdf
Dierker, L. 2008. State-level efforts in health information exchange. Working Paper,
American Health Information Management Association. Online at: http://library.
ahima.org/xpedio/groups/public/documents/ahima/bok1_038086.hcsp?dDocName
= bok1_038086
Dierker, L. (senior program director, National Academy for State Health Policy). 2012.
Personal communication, May 30.
Dimitropoulos, L. L. 2009. RTI International. Perspectives on patient matching: Approaches,
findings, and challenges. Online at: http://healthit.hhs.gov/portal/server.pt/gateway/
PTARGS_0_11673_911437_0_0_18/PatientMatchingWhite_Paper_Final.pdf
DURSA Task Group. 2011. Data Use and Reciprocal Support Agreement (DURSA). Version
date: May 3, 2011. Online at: http://healthit.hhs.gov/portal/server.pt/gateway/
PTARGS_0_16869_956178_0_0_18/Restatement_I_of_the_DURSA_5.3.11_FINAL-
forPARTSIGN.pdf
eHealth Initiative. 2005. Emerging trends and issues in health information exchange.
Selected findings from eHealth Initiative’s Second Annual Survey of State, Regional
and Community-Based Health Information Exchange Initiatives and Organizations,
2005, Washington, D.C.
eHealth Initiative. 2006. Improving the quality of healthcare through health information
exchange, September 25, Washington, D.C.
eHealth Initiative. 2007. eHealth Initiative’s fourth annual survey of health informa-
tion exchange at the state and local levels overview of 2007 findings, December 19,
Washington, D.C.
Case Study • 213
eHealth Initiative. 2008. eHealth Initiative’s fifth annual survey of health information
exchange at the state and local levels overview of 2008 findings, September 11,
Washington, D.C.
eHealth Initiative. 2009. Migrating toward meaningful use: The state of health informa-
tion exchange eHealth Initiative’s sixth annual survey. A report based on the results
of the eHealth Initiative’s 2009 sixth annual survey of health information exchange,
Washington, D.C.
eHealth Initiative. 2011a. Report on health information exchange: The changing landscape.
based on results from eHealth Initiative’s eighth annual survey of health information
exchange, Washington, D.C.
eHealth Initiative. 2011b. Setting up a governance structure. Online at: http://www.ehealth-
initiative.org/setting-up-a-governance-structure.html
eHealth Initiative. 2012a. HIE toolkit. Governance challenges. Online at: http://www.
ehealthinitiative.org/setting-up-a-governance-structure/governance-challenges.html
eHealth Initiative. 2012b. HIE toolkit. State run HIE. Online at: http://www.ehealthinitiative.org/
setting-up-a-governance-structure/types-of-legal-entities/state-run-hie.html
Federal Register, vol. 77, no. 94. Tuesday, May 15, 2012.
Fox, H. (administrator of the Office of Health Information Exchange, Florida Agency for
Healthcare Administration). 2012. Personal communication, April 2.
Gartner, Inc. 2007. Summary of the NHIN prototype architecture contracts: A report for the
Office of the National Coordinator for Health IT, Washington, D.C., May 31. Online at:
http://healthit.hhs.gov/portal/server.pt/gateway/PTARGS_0_10731_848093_0_0_18/
summary_report_on_nhin_Prototype_architectures.pdf
Giles, B. 2012. Introduction to digital certificates, Part 3: X509v3. Online at: http://invariant-
properties.com/2012/05/29/introduction-to-digital-certificates-part-3-x509v3/
Goldstein, M. M., and A. L. Rein. 2010. Consumer consent options for electronic health
information exchange: Policy considerations and analysis. Online at: http://.hhs.gov/
portal/server.pt/gateway/PTARGS_0_10741_911154_0_0_18/ChoiceModelFinal.pdf
Gravely, S. 2011. Restatement I of the data use and reciprocal support agreement:
DURSA briefing on recent amendments. Nationwide Health Information Network
Exchange, May 19. Online at: http://assess4ed.net/sites/default/files/nhin303special
briefingslidesnwhin.pdf
Health IT Policy Committee. 2010a. A Public advisory body on health information technol-
ogy to the national coordinator for Health IT. Recommendation letter to Dr. David
Blumenthal, MPP Chair, HIT Policy Committee, August 19. Online at: http://
healthit.hhs.gov/portal/server.pt/document/947492/tigerteamrecommendation
letter8-17 2 pdf
Health IT Policy Committee. 2010b. Nationwide Health Information Network Governance
Workgroup: Revised draft recommendations on nationwide health information
network governance roles and responsibilities, December 1, v8. Online at: http://
healthit.hhs.gov/portal/server.pt/gateway/PTARGS_0_11673_949146_0_0_18/
draftrecs-govwg-120210.ppt
Health Level Seven, Inc. 2004. HL7 EHR system functional model: A major development towards
consensus on electronic health record system functionality. Online at: http://www.hl7.
org/documentcenter/public_temp_A7BC6625-1C23-BA170C299757440ACEB8/wg/
ehr/EHR-SWhitePaper.pdf
214 • Christopher B. Sullivan
Healthcare IT Standards Panel. 2009. HITSP summary documents using HL7 continuity
of care document (CCD) component. HITSP/C32, v 2.5. Online at: http://exchange-
specifications.wikispaces.com/file/view/HITSP_V2.5_2009_C32_-_Summary_
Documents_Using_CCD.pdf
Housley, R., W. Ford, W. Polk, and D. Solo. 1999. Network working group. The
Internet X.509 public key infrastructure certificate and CRL profile. Online at:
http://www.ietf.org/rfc/rfc2459.txt
HIE Guide Work Group. 2009. A HIMSS guide to participating in a health information
exchange, November. Online at: http://www.himss.org/content/files/HIE/HIE_
GuideWhitePaper.pdf
IHE International, Inc. 2010. Patient identifier cross-reference HL7 V3 PIXV3 and
patient demographic query HL7 V3 PDQV3 trial implementation, August 10.
Online at: http://www.ihe.net/Technical_Framework/index.cfm
IHE International, Inc. 2011a. Integrating the healthcare enterprise. IHE radiology techni-
cal framework, vol. 1 IHE RAD TF-1 integration profiles. Revision 10.0, final text,
February 18. Online at: http://www.ihe.net/Technical_Framework/upload/IHE_
RAD_TF_Rev10-0_Vol1_2011-02-18.pdf
IHE International, Inc. 2011b. Integrating the healthcare enterprise. IHE radiology techni-
cal framework, vol. 2 IHE RAD TF-2, transactions. Revision 10.0, final text, February
18. Online at: http://www.ihe.net/Technical_Framework/upload/IHE_RAD_TF_
Rev10-0_Vol2_2011-02-18.pdf
IHE International, Inc. 2011c. Integrating the healthcare enterprise. IHE radiology techni-
cal framework, vol. 3. IHE RAD TF-3, transactions. Revision 10.0, final text, February
18. Online at: http://www.ihe.net/Technical_Framework/upload/IHE_RAD_TF_
Rev10-0_Vol3_2011-02-18.pdf
Just, B. H., and S. Durkin. 2008. Clinical data exchange models: Matching HIE goals with
IT foundations. Journal of AHIMA, February, 79: 2.
Kanaan, S. B., and J. M. Carr. 2009. Health data stewardship: What, why, who, how—An NCVHS
primer. U.S. Department of Health and Human Services, NCVHS, Washington, D.C.,
September, p. 2. Online at: http://www.ncvhs.hhs.gov/090930lt.pdf
Kolkman, L. 2011. The health information exchange formation guide. Chicago: Health
Information Management Systems Society.
Kolkman, L. (president, Mosaica Partners). 2012. Personal communication, May 30.
Kuperman, G., J. Blair, R. Franck, S. Devaraj, and A. Low. 2010. Developing data content
specifications for the Nationwide Health Information network trial implementations.
Journal of the American Medical Informatics Association, January 171: 6–12.
Lumpkin, J. 2010. HIT policy committee’s governance workgroup seeks comments,
September 15. Online at: http://healthit.hhs.gov/blog/faca/index.php/2010/09/15/
hit-policy-committee%E2%80%99s-governance-workgroup-seeks-comments/
Majurski, B. 2011. Cross-enterprise document sharing XDS. IHE IT infrastructure webinar
series. Online at: http://www.ihe.net/Participation/upload/iti6_ihewkshp07_xds_
majurski.pdf
Markle Foundation. 2012. Connecting for health common framework for private and secure
health information. Exchange policies in practice. governance of health information shar-
ing efforts: Achieving trust and interoperability with meaningful consumer participation.
Online at: http://www.markle.org/sites/default/files/Governance%20softlaunch.pdf
Case Study • 215
Office of the National Coordinator for Health IT. 2012. ONC’s proposed strategy on gover-
nance for the Nationwide Health Information Network following public comments
on RFI. Presentation to the HIT Policy Committee Meeting, September 6, 2012.
Online at http://www.healthit.gov/sites/default/files/hitpc_briefing_090512.pdf
O’Mara, L. G. (HIT coordinator, Nevada Department of Health & Human Services.) 2012.
Personal communication, March 22.
Pritts, J., S. Lewis, R. Jacobson, K. Lucia, and K. Kayne. 2009. Privacy and security solutions for
interoperable health information exchange report on state law requirements for patient
permission to disclose health information. Online at: http://www.healthit.hhs.gov/
portal/server.pt/gateway/PTARGS_0_10741_910326_0_0_18/DisclosureReport.pdf
Root, J. (president and CEO, Utah Health Information Network (UHIN)). 2012. Personal
communication, May 23.
Ruggeri, R., and V. Peytchev. 2011. Cross-enterprise document sharing-b XDS.bb. IHE IT
infrastructure webinar series. Online at: http://www.ihe.net/Participation/upload/
iti9_ihewkshp07_xds.pdf
Soper, P. 2001. Realizing the potential of community health information networks for
improved quality and efficiency through the continuum of care: A case study of the
HRSA community access program and the Nebraska panhandle partnership for
health and human services,WHP023A, December. Online at: http://www.stchome.
com/media/white_papers/WHP023A.pdf
Stark, S. (Rhode Island Quality Institute). 2012. Personal communication, April 30.
State Level Health Information Exchange Consensus Project. 2008. State-level health infor-
mation exchange: Roles in ensuring governance and advancing interoperability, final
report, Part I, March 10. Chicago: Foundation of Research and Education of the
American Health Information Management Association. Online at: http://library.
ahima.org/xpedio/groups/public/documents/ahima/bok1_040348.pdf
State Level HIE Consensus Project. 2009. Advancing effective state-level approaches to
interoperability in the new federal context realizing state-level HIE value and sus-
tainability, May 15. Chicago: Foundation of Research and Education of the American
Health Information Management Association. Online at: http://library.ahima.org/
xpedio/groups/public/documents/ahima/bok1_045664.pdf
Turner, C. (Florida Center for Health Information and Policy Analysis, Florida Agency for
Healthcare Administration). 2012. Personal communication, April 2.
Vermont State Agency of Human Services. 2010. Vermont Health Information Technology
Plan. Department of Health Access, Division of Healthcare Reform. Online at: http://
hcr.vermont.gov/sites/hcr/files/Vermont_HIT_Plan_4_6__10-26-10__0.pdf
Ward, S. (HIT coordinator, Florida Agency for Healthcare Administration). 2012. Personal
communication, April 2.
West, D. M., and A. Friedman. 2012. Health Information Exchanges and megachange.
Brookings Institute, Washington, D.C. Online at: http://www.brookings.edu/research/
papers/2012/02/08-health-info-exchange-friedman-west
Whitlinger, D. (executive director, New York eHealth Collaborative Inc.). 2012. Personal
communication, March 28.
Yi, R. H., A. Samarth, C. Dearfield, J. Wong, A. Gluck, P. Vazquez, and A. Bhardwaj. 2011.
Final report: Synthesis of lessons learned in the first 5 years of state and regional dem-
onstration health information exchange projects, AHRQ Publication No. 11-0050-
EF. Washington, D.C.: Agency for Healthcare Research and Quality, U.S. Department
of Health and Human Services. Online at: http://healthit.ahrq.gov/portal/server.pt/
document/954515/synthesis_of_lessons_learned_pdf (pp. 11–13).
9
Bridging the Gap between Business
and IT: An Information Governance
Perspective in the Banking Industry*
CONTENTS
Introduction.....................................................................................................217
The Gap between Business and IT................................................................218
An Introduction to Information Governance in the Banking Industry......220
Defining Information Governance (IG)................................................. 222
Banking and IT.......................................................................................... 223
The Bridge: IGF and Its Possibilities............................................................ 224
IGF Dimensions and Factors................................................................... 225
Lessons and Examples on IG from the Banking Industry........................ 227
The Context and the Case Studies........................................................... 227
IG Relevance................................................................................................232
Implementing IG through an IGF............................................................233
Perceptions of the Proposed IGF............................................................. 234
Concluding Remarks......................................................................................235
Acknowledgments.......................................................................................... 238
References........................................................................................................ 238
INTRODUCTION
Discussed in this chapter will be information governance (IG) and how
an information governance framework (IGF) can be helpful in bridging
the gap between business and IT by clarifying the factors that must be
* Based on Information governance in the Banking Industry, by Fernando de Abreu Faria, Antonio
Carlos, Gastaud Macada, Antonio Carlos, and Kuldeep Kumar. 46th Annual Hawaii International
Conference on Systems Sciences. 2013. IEEE.
217
218 • Fernando A. Faria and Gladys E. Simpson
is not so simple. There are many challenges involved, given the long-standing
gap between business and IT, which makes it difficult to align IT invest-
ments and efforts with business strategy.
This gap is a result of years of disconnected strategies from IT and busi-
ness areas inside organizations. Despite the efforts to deal with this prob-
lem through the formulation of IT strategic plans, promoting executive
meetings, increasing the CIO’s (chief information officer) presence on the
boards, and use of IT governance frameworks, the problem persists. It is
not an easy task to align what sometimes represents different interests
even inside the same company. Harmonizing IT strategies with business
strategies, making decisions about what is necessary for business and IT,
executing plans within time and budget, and balancing IT investments
among interested areas are some of the difficulties for the alignment.
This gap arises in great part due to the communication barriers that
exist between IT and non-IT people in organizations. People from IT tend
to have a technical background and use a language unfamiliar to business
people. For example, thinking about some commonly used IT acronyms,
such as C#, C++, .NET, Java, VB, XML, SQL, DB2, ADABAS, ODBC, BPM,
ECM, ERP, CRM, SOA, VPN, PKI, OLAP, among many others, is possible
to state that people from IT know the meaning of these awkward words,
but we cannot say the same about people from the business side. The ter-
minology used in IT is so vast that it is very difficult, even for the experi-
enced CIO, to know about all of the terms. On the other hand, depending
on the business area, it is quite possible to have similar issues with spe-
cific technical jargon used by business professionals that are unknown to
IT people. Another source of conflict that contributes to the gap between
IT and business comes from the need to balance IT investments among
the company areas following business demands. How to decide what is the
priority for the company’s success or determining if it is better to invest
in IT to support what exists, or to invest in business growth, can create
internal tensions within a company.
To reduce the gap between business and IT, it is essential that technical
and nontechnical people share a common knowledge base and learn to
collaborate effectively in spite of their differences.
When this doesn’t occur, organizations end up focusing mostly on data
capture, production, and storage while devoting little attention to the use
of information and deriving value from it. In other words, the focus is
not on the “information” but on the “technology” part of IT. Deriving
220 • Fernando A. Faria and Gladys E. Simpson
value from information requires closing the gap and having an effective
interplayof the business and IT areas.
One of the contributing factors to the gap between business and IT
is the lack of a framework to clarify how the different roles within the
organization become a part of information governance. Such a frame-
work can identify critical elements that must be explicitly considered by
business and IT in key decision-making processes and communications.
Furthermore, the framework must consider information as an asset that
has some special characteristics, very different from usual goods (Kooper,
Maes, and Lindgreen, 2011):
• It is both an end product and an input into the creation of other goods.
• It is expensive to produce and cheap to reproduce.
• Its value is subjective.
• Its context should be considered when consumed.
AN INTRODUCTION TO INFORMATION GOVERNANCE
IN THE BANKING INDUSTRY
Tom Davenport (1998) made the following observation over a decade ago:
“Our fascination with technology has made us forget the main purpose of
the information: to inform.” Even nowadays it seems clear that the field
of IT is still being dominated by the T (Technology). The annual expen-
diture on IT, globally, was nearly $4 trillion dollars in 2012 (IDG, 2012)
and half of it goes explicitly to the digital infrastructure of organizations.
Bridging the Gap between Business and IT • 221
Banking and IT
The core of the business practice of banking has not changed; a bank still
acts as an intermediary between people who have money to invest and
people who want to borrow money. However, the way banking opera-
tions are carried out has changed drastically in the past three decades.
Technological developments have had and will continue to have a major
impact on the delivery of banking services. Banks no longer need hun-
dreds or thousands of physical branches to provide their services. The rela-
tionship between banks and their customers can now be based entirely on
electronic and automatic processes. The goal of IT in banking is to support
these business processes.
Furthermore, banks also have undergone major transformations due
to financial and legal reasons. For example, the crisis of 2008, triggered
by the collapse of the U.S. subprime mortgage market and the reversal
of the housing boom in other industrialized economies, caused the fall
of world stock markets and the collapse of large financial institutions,
which resulted in the rise of government’s rescue packages to bail out their
financialsystems (Global Issues, 2010).
The crisis provoked a wave of litigations that required banks to reveal
large amounts of information. Consequently, banks were forced to
put their houses in order and rethink their processes for managing infor-
mation. The ability to handle information effectively inside a company
depends on a variety of factors, including executive involvement and a
business culture that supports collective ownership of information.
224 • Fernando A. Faria and Gladys E. Simpson
Policies
rs
To
ble
ol
Ena
Information
Governance
People Technology
Context
FIGURE 9.1
IG under different angles.
226 • Fernando A. Faria and Gladys E. Simpson
• Accessibility
• Accountability
• Communication
• Compliance
• Consumerization
• Context
• Culture
• Ethics
• Formal structure
• Mobility
• Monitoring
• Privacy
• Quality
• Retention
• Security
• Sharing
• Standardization
• Systems
• Transparency
• Value
All of these factors have come from theoretical elements (agency theory,
resource-based view of the firm, dynamic capabilities) and each one was
associated with one of the three dimensions; by proceeding this way, the
IGF was formatted. The IGF derived from this process is summarized in
Figure 9.2.
The first of the three IGF dimensions, People, includes factors such as
context, culture, and ethics. The second dimension, Policies, represents
the central part of the model, and has the following factors: accessibility,
accountability, communication, compliance, formal structure, monitor-
ing, privacy, quality, retention, security, sharing, standardization, trans-
parency, and value. The third and final dimension is Technology, which
Bridging the Gap between Business and IT • 227
Information Governance
Framework
Information
FIGURE 9.2
Information governance framework (IGF). (From: Faria, Macada, and Kumar. 2013. Paper
presented at the proceedings of the 46th Annual Hawaii International Conference on
System Sciences, January 7–10, Maui, HI. IEEE Computer Society Press. With permission.)
TABLE 9.1
IGF Dimensions and Factors Description
People: Refers to people within the organization and the people who relate to it
FACTOR DESCRIPTION REFERENCE
Context Context is an element of the information Davenport and
environment, which incorporates all the Prusak (1998)
factors affecting how an organization deals
with information.
Culture Organization culture is thought to shape values Kondra and
and norms, is learned and transmitted between Hurst (2009)
individuals and teams through social learning,
role modeling, and observation, and, as a result,
assists organization members in dealing with
external pressures that threaten organizational
survival and/or internal integration.
Ethics When we talk about morality and ethics within McManus
government, public, and private sector (2004b)
organizations, we are referring to the behavior
and collective outcome of actions taken by the
managers and staff.
Technology: Refers to the set of technological mechanisms or artifacts that support the
IG strategy
FACTOR DESCRIPTION REFERENCE
Consumerization The term consumerization first gained popularity Clevenger
in 2001 when it was used by Douglas Neal and (2011)
John Taylor as a description for how information
technology innovation was emerging in
consumer-based technology, with the expectation
it would eventually migrate into the enterprise.
Mobility Mobile ICT provides workers the means to access Basole (2008)
and utilize work-critical data and information
wherever and whenever they need it. However,
these benefits represent only the tip of the
iceberg. Enterprise mobility solutions have
the potential to fundamentally transform
organizations, supply chains, and markets.
Systems (IS) The combination of hardware, software, data, and Mukherji (2002)
communication formed the core of information
systems. As each of these dimensions developed
and integrated, the concept, design, and
capability of information systems underwent
massive changes.
Bridging the Gap between Business and IT • 229
TABLE 9.1 (Continued)
IGF Dimensions and Factors Description
Policies and Practices: Refers to the set of IG policies and practices adopted by the organization
FACTOR DESCRIPTION REFERENCE
Accessibility It means that information is able to be found and Martin,
presented to the person who needs it, when he or Dmitriev, and
she need it, as well as in the appropriate form. Akeroyd (2010)
Accountability Accountability is the linkage of two components: Schedler (1999);
the ability to know what an actor is doing and Hale (2008)
the ability to make that actor do something else.
Communication Refers to transferability (signs) and the Grant (1996)
mechanisms for transfer across individuals,
across space, and across time.
Compliance Compliance is the duty to comply and ABBI (2009)
enforce internal and external
regulations imposed on the institution’s activities.
Formal Structure Governance bodies to create strategies, policies, and The Economist
procedures surrounding the distribution of (2008)
information inside and outside the firm.
Monitoring Monitoring is done to increase the amount of Anderson,
information available to shareholders and can Melanson, and
alleviate agency problems when insider Maly (2007);
ownership is low. Becher and
Frye (2011)
Privacy Claim of individuals, groups, or institutions to Westin (1967)
determine for themselves, when, how, and to what
extent information about them is communicated
to others.
Quality Information quality can be defined as information Huang, Lee, and
that is fit for use by information consumers. Wang (1999);
Eppler (2003)
Retention Formal or consistently observed procedure for Bailey (2011)
ensuring that records are kept for legal or
statutory compliance, or for judging the
potentially historical importance of records.
Security The aim of information security is to assess the McManus
level of risk to the information and take (2004a)
appropriate measures to protect the security and
confidentiality of the information without
compromising the need for the information to
remain accessible to authorized users.
Continued
230 • Fernando A. Faria and Gladys E. Simpson
TABLE 9.1 (Continued)
IGF Dimensions and Factors Description
FACTOR DESCRIPTION REFERENCE
Sharing Sharing is the free exchange of nonsensitive and Marchand,
sensitive information. Sharing occurs between Kettinger, and
individuals in teams, across functional Rollins (2000)
boundaries, and across organizational
boundaries (i.e., with customers, suppliers,
and partners).
Standardization Metadata or data about data is information DNA. Samuelson
Consistency here will pay dividends and make (2010)
compliance and auditing less painful. By
standardizing foundational components, you
become more agile.
Transparency An institution is transparent if it makes its behavior Marchand,
and motives readily knowable to interested parties. Kettinger, and
A transparency mechanism is a policy that makes Rollins (2000)
an institution more transparent.
Value The value of information is subjective, because it Kooper, Maes,
may be more useful in satisfying the wants of one and Lindgreen
person than another, or of no use to one person (2009)
and of use to another.
Source: Faria, Macada, and Kumar. 2013. Paper presented at the Proceedings of the 46th Annual
Hawaii International Conference on System Sciences, January 7–10, Maui, HI. IEEE
Computer Society Press. With permission.
TABLE 9.2
List of Case Studies
Bank
Number of
Case Study City of Interview Country of Origin Employees
1 Brasília Brazil 120,000
2 Brasília Brazil 86,000
3 São Paulo Brazil 8,200
4 Hong Kong China 310,000
5 Hong Kong Japan 26,000
6 Hong Kong China 13,000
7 Hong Kong France 157,000
8 Hong Kong Germany 102,000
9 New York, Fort Lauderdale, São Paulo United States 230,000
10 New York United States 48,000
11 New York United Kingdom 288,000
12 New York United States 62,000
13 New York United States 240,000
Source: Faria, Macada, and Kumar. 2013. Paper presented at the Proceedings of the 46th Annual
Hawaii International Conference on System Sciences, January 7–10, Maui, HI. IEEE Computer
Society Press. With permission.
by questions about each IGF factor. Some additional questions like those
related to topics such as dynamism of the banking industry or the rele-
vance of IG subject, complete the document.
The interviews were carried out between October 2011 and March 2012
in the cities of Brasília, São Paulo, New York, Fort Lauderdale, and Hong
Kong. All interviews were recorded with the express consent of the inter-
viewees, and their contents transcribed and analyzed by authors using
NVivo software. Sixteen major executives of banks were interviewed: five
in Brazil, five in Hong Kong, and six in the United States. All interviewees
are male and occupy high positions in their organizations. The case s tudies
are summarized in Table 9.2.
Each bank had at least two basic methods adopted in the research: an
interview with a major executive and analysis of documents captured in
the organization Web site. In some banks the researcher had access to
internal documents, and, for others, articles in journals and trade maga-
zines were selected.
To complete the scope, a special conversation was conducted in Hong
Kong to discuss the IG subject with a senior consultant of CBRC (China
Banking Regulatory Commission). CBRC is the agency that regulates
232 • Fernando A. Faria and Gladys E. Simpson
the banking sector in China. The interview’s main purpose with the
CBRC consultant was to investigate the vision of Chinese regulation
on IG practices. Additionally, it was possible to understand the differ-
ent stages of governance between the Hong Kong and mainland China
banking systems.
IG Relevance
Many banks are currently engaged in attempts, for example, to achieve
KYC (know your customer). This is only additional evidence from all the
interviewed executives that banking is basically “information.” Indeed,
information is highlighted as a very sensitive subject presently in banks.
To illustrate the importance of information governance, there is the state-
ment of a senior advisor from China: “Reliable information is the real asset
for banks. It helps bankers to make good decisions. Reliable information
comes from governance.”
When asked whether they believe that information governance is an
important issue for banks, the bank executives from the three countries
offered different and interesting answers. One Brazilian executive stated,
“Yes. At the moment, within the IT area, we are creating a specific struc-
ture to deal with information management and information governance.
That initiative is linked to an auditing project.” Another Brazilian execu-
tive was more emphatic: “I’d say that what was once desirable will become
essential. Those who do not have good IG will be out the market. And,
I also think at some point in the future, it will be criteria for obtaining a
license to operate or not.”
A bank executive in Hong Kong provided a very comprehensive answer:
“Yes. Without proper governance, one can use information for improper
activities, which may damage a firm’s reputation, revenue, credibility,
and may be subject to regulatory and legal litigations.” In a similar way,
another Chinese executive said, “Yes. With better use of information, a
bank can be more efficient, reduce risks, and improve services. All [of]
these combined will lead to higher returns for shareholders and create
greater employee engagement.”
A particularly interesting response was given by an executive in the
United States: “Yes. My central thesis is that information governance is
increasingly important, massively important in the megadata world. If we
don’t get these policies right, we’ll have unnecessary duplication, unneces-
sary linkage, unnecessary complexity.” From an experienced executive, the
Bridging the Gap between Business and IT • 233
The importance of IGF was demonstrated by the use of the words cost,
risk, and performance. In the words of one banker: “I think it helps you
manage risk, I think it helps you manage costs, I think it helps you man-
age the service levels that you provide.” For another, “With no proper
governance framework, information might be used for improper activi-
ties, which may damage the firm’s reputation, revenue, credibility, and the
firm may be subject to regulatory and legal litigation.” Complementing
the responses above, there is a notable remark from a senior advisor in
China: “An information governance framework can help banks ensure
data quality, speed up time to market in product creation and innovation,
simplify data architecture, and reduce costs and risks.”
CONCLUDING REMARKS
This final section starts with setting a new definition for IG. Information
governance refers to the establishment of policies through formal struc-
tures that define rules, procedures, and decision-making rights regarding
information management, in order to mitigate regulatory and operational
risk, reduce costs, and optimize the performance of the organization.
Some of the executives interviewed in this study agreed that there is
a tendency for the T (Technology) in IT to predominate in the IT field.
In recent years, organizations of all sizes have become fascinated by the
resources created by information technology. This is easy to understand
when one looks at the global figures for IT. According to Gartner, global
spending on IT in 2012 will reach US$3.8 trillion (IDG, 2012), a large part
of which will be used to acquire new products and infrastructures. As
mentioned before, to reduce the gap between business and IT is necessary
to change the present technology bias from the enterprises’ investments
in IT. An IGF can help organizations review their investments priorities
by refocusing them on the subject of information. In 2003, Nicholas Carr
published “IT Doesn’t Matter,” which caused a huge stir in the IT industry.
Indeed, mainly since the advent of Internet, the evolution in software
production, the spread of networks, and the rise of the consumerization
phenomenon, there is a common perception that technology is available
236 • Fernando A. Faria and Gladys E. Simpson
everywhere. The differential lies with information use. That is a clear sign
of what is happening in the business world today—information is being
elevated to its former prominence, a privileged position that was over-
taken for a while by the glamour of IT. In other words, the “I” matters.
That does not mean the “T” is not important; on the contrary, it is vital to
support the information processes inside organizations.
The comments made by the bank executives during interviews on differ-
ent continents, such as:
TABLE 9.3
Units for Computer Data Storage
Bit Byte Kilobyte Megabyte Gigabyte Terabyte Petabyte Exabyte Zettabyte
(b) (B) (KB) (MB) (GB) (TB) (PB) (EB) (ZB)
ACKNOWLEDGMENTS
I would like to thank Professor Antonio Carlos Gastaud Maçada from
Universidade Federal do Rio Grande do Sul, and Professor Kuldeep
Kumar from City University of Hong Kong for their advice and sugges-
tions. I would also like to thank Professor Neera Bhansali from Florida
International University for her very helpful comments. Special thanks to
all bank executives that agreed to participate in our research. Last, but not
least, my thanks to CAPES Foundation—Ministry of Education of Brazil,
and Universidade Banco Central do Brasil (UniBacen) for their support.
Fernando A. Faria
REFERENCES
ABBI. 2009. Função de Compliance. Online at: http://www.abbi.com.br/download/
funcaodecompliance_09.pdf (accessed September 14, 2011).
Anderson, D. W., S. J. Melanson, and J. Maly. 2007. The evolution of corporate governance:
Power redistribution brings boards to life. Corporate Governance 15 (5).
Bailey, S. 2011. Measuring the impact of records management data and discussion from the
U.K. higher education sector. Records Management Journal 21 (1): 46–68.
Basole, R. 2008. Enterprise mobility: Researching a new paradigm. Information Knowledge
Systems Management 7: 1–7.
Beccalli, E. 2007. IT European bank performance. New York: Palgrave MacMillan.
Becher, D., and M. Frye. 2011. Does regulation substitute or complement governance?
Journal of Banking & Finance 35: 736–751.
Beijer, P. 2009. Meaningfulness in Information Governance: A new literacy is required.
Primavera Working Paper. University of Amsterdam.
Bridging the Gap between Business and IT • 239
Carr, N., 2003. IT doesn’t matter. Harvard Business Review. May 2003: 5–12.
CELENT. 2011. IT spending in financial services: A global perspective. Online at: http://www.
celent.com/reports/it-spending-financial-servicesglobal-perspective-1 (accessed July
27, 2012).
Clevenger, N. 2011. How the iPad will change IT forever. Online at: http://www.info-
world.com/t/it-management/how-the-ipad-will-change-it-forever-166948 (accessed
September 14, 2011).
Cortada, J. W. 2011. Information and the modern corporation. Cambridge, MA: MIT Press.
Davenport, T. H. 1998. Ecologia da Informação: por que só a tecnologia não basta para o
sucesso na era da informação. São Paulo: Futura.
Davenport, T., and L. Prusak. 1998. Working knowledge: How organizations manage what
they know. Boston: Harvard University Press.
Donaldson, A., and P. Walker. 2004. Information governance: A view from the NHS.
International Journal of Medical Informatics 73: 281–284.
Eppler, M. 2006. Managing information quality. Berlin: Springer.
Faria, F. A., A. C. G. Macada, and K. Kumar. 2013. Information governance in the banking
industry. Paper presented at the proceedings of the 46th Annual Hawaii International
Conference on System Sciences, Maui, HI, January 7–10. IEEE Computer Society
Press, Washington, D.C.
Global Issues. 2010. Global financial crisis. Online at: http://www.globalissues.org/
article/768/global-financial-crisis (accessed July 28, 2012).
Grant, R. M. 1996. Toward a knowledge-based theory of the firm. Strategic Management
Journal 17: 109–122.
Hale, T. 2008. Transparency, accountability, and global governance. Global Governance
14: 73–94.
Huang, H., Y. Lee, and R. Wang. 1999. Quality information and knowledge. Upper Saddle
River, NJ: Prentice Hall.
IDG. 2012. Gartner lowers global IT spending forecast. Online at: http://www.itworldcanada.
com/news/gartner-lowers-global-it-spending-forecast/144604#ixzz1qiim5N6p
(accessed March 31, 2012).
Internet World Stats. 2012. Internet usage statistics, The Internet Big Picture. Online at:
http://www.internetworldstats.com/stats.htm (accessed April 4, 2012).
Kondra, A., and D. Hurst. 2009. Institutional processes of organizational culture. Culture
and Organization 15 (1): 39–58.
Kooper, M. N., R. Maes, and R. Lindgreen. 2009. Information governance: In search of the
forgotten grail. Primavera Working Paper. University of Amsterdam.
Kooper, M. N., R. Maes, and R. Lindgreen. 2011. On the governance of information:
Introducing a new concept of governance to support the management of informa-
tion. International Journal of Information Management 31: 195–200.
Marchand, D. A., W. J. Kettinger, and J. D. Rollins. 2000. Information orientation: People,
technology and the bottom line. Sloan Management Review. Summer 2000: 69–80.
Martin, A., D. Dmitriev, and J. Akeroyd. 2010. A resurgence of interest in information
architecture. International Journal of Information Management 30: 6–12.
McManus, J. 2004a. Working towards an information governance strategy. Management
Services. August 2004: 8–13.
McManus, J. 2004b. Information governance an ethical perspective. Management Services.
December 2004: 16–17.
Mukherji, A. 2002. The evolution of information systems: Their impact on organization and
structures. Management Decision 40 (5): 497–507.
240 • Fernando A. Faria and Gladys E. Simpson
Samuelson, K. 2010. Information governance isn’t so bad after all. Online at: http://www.
cioupdate.com/insights/article-php/11049_3889396_2/Information-Governance-
isn’t-so-bad-after-all.htm (accessed September 16, 2011).
Schedler, A. 1999. Conceptualizing accountability. In The self-restraining state: Power and
accountability in new democracies, eds. A. Schedler, L. Diamond, and M. Plattner.
London: Lynne Rienner.
Soares, S. 2011. Selling information governance to the business: Best practices by industry and
job function. Ketchum, ID: MC Press.
The Economist. 2008. The future of enterprise information governance. Online at: http://
www.emc.com/collateral/analyst-reports/economist-intell-unit-info-governence.pdf
(accessed March 25, 2011).
The Economist. 2010. Data, data everywhere. A special report on managing information.
Online at: http://www.economist.com/node/15557443 (accessed March 30, 2011).
Van Grembergen, W., and S. Haes. 2009. Enterprise governance of information technology.
New York: Springer.
Westin, A. F. 1967. Privacy and freedom. New York: Atheneum.
Index
241
242 • Index
HIPAA, see Health Insurance Portability inline archiving retention technique, 59–60
and Accountability Act (HIPAA) Integrated Delivery Networks (IDNs), 190,
HISP, see Health Information Service 207
Provider (HISP) Integrating the Healthcare Enterprise (IHE),
historical facts, 61 181
HITECH, see Health Information integration
Technology for Economic and business metadata, 50
Clinical Health (HITECH) data profiling, 56
HL7, see Health Level seven (HL7) integrity of data, 67
holding environment, 165 International Conference on
Hong Kong, 227, 230–233 Harmonization (ICH), 75
hybrid metadata repository, 55 International Organization for
hybrid model, HIE, 208 Standardization (ISO), 75
interoperability, standards, 75, 76
intrafirm networks, 4–5
I
investigation, 56–58
IBM “is-a” relation, 99
Data Security and Privacy, 158 IT issues
model overview, 22–23 and banking, 223–224
ICH, see International Conference on business gap, 218–220
Harmonization (ICH) data stewardship, 27
IDC research firm, 73 exposing metadata, 50
IHE, see Integrating the Healthcare monarchy maturity level, 23
Enterprise (IHE) ownership, 38
impact analysis, 52–53 people management, 132–136
implementation sources of data, 40
best practices, 84 Izumi, N., xi, 93–121
information governance, 233–234
implications for practice, 171–172
K
incremental deliverables, 90
in development level, 24 key performance indicators (KPI), 82, 89
informal processes, 22 knowledge, 96, see also ADKAR
Informatic Metadata Manager, 53 (Awareness-Desire-Knowledge-
information Ability-Reinforcement) model
cloud computing, 15 know your customer, 232
leveraging assets, 3 Kotter;s eight-step model, 152
superabundance, 221
“information age,” 221
L
information-aggressive organizations,
10, 20 leadership, 189
information governance and information lessons learned
governance framework (IG/IGF) banking industry, 227, 230–235
defined, 222–223 operationalizing data quality, 88–91
dimensions and factors, 225–229 organizational readiness, 41
implementation, 233–234 leveraging information assets, 3
overview, 224–225 liaison responsibilities, 30
perceptions, 234–235 life cycle
relevance, 232–233 metadata, 58–59, 77
infrastructure strategies, data, 27 organizational data governance, 5–6
248 • Index