Skip to main content
Top

2023 | OriginalPaper | Chapter

3. Data Governance

Authors : Indika Kumara, A. S. M. Kayes, Paul Mundt, Ralf Schneider

Published in: Data Science for Entrepreneurship

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Data-intensive products and services aim to turn big data to a value or strategic asset for the organizations. However, the inherent risk and cost of storing and managing a massive amount of data undermine the value creation from such products and services. Consequently, organizations need to adopt an appropriate data governance program to establish the necessary policies and structures in order to strike a balance between value creation and risk and cost. This chapter explores the data governance in detail, focusing on data governance principles, decision domains, and organizational structures. We discuss the data governance challenges, opportunities, and practices for big data and Internet of Things (IoT) domains. We also present two industrial big data applications/products whose data needs to be governed.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Al-Ruithe, M., Benkhelifa, E., & Hameed, K. (2019). A systematic literature review of data governance and cloud data governance. Personal and Ubiquitous Computing, 23(5–6), 839–859.CrossRef Al-Ruithe, M., Benkhelifa, E., & Hameed, K. (2019). A systematic literature review of data governance and cloud data governance. Personal and Ubiquitous Computing, 23(5–6), 839–859.CrossRef
go back to reference Alshboul, Y., Nepali, R., & Wang, Y. (2015). Big data lifecycle: threats and security model. In 21st Americas Conference on Information Systems. Alshboul, Y., Nepali, R., & Wang, Y. (2015). Big data lifecycle: threats and security model. In 21st Americas Conference on Information Systems.
go back to reference Ball, A. (2012). Review of data management lifecycle models. University of Bath, IDMRC. Ball, A. (2012). Review of data management lifecycle models. University of Bath, IDMRC.
go back to reference Batini, C., Cappiello, C., Francalanci, C., & Maurino, A. (2009). Methodologies for data quality assessment and improvement. ACM Computing Surveys, 41(3). Batini, C., Cappiello, C., Francalanci, C., & Maurino, A. (2009). Methodologies for data quality assessment and improvement. ACM Computing Surveys, 41(3).
go back to reference Cheong, L. K., & Chang, V. (2007). The need for data governance: a case study. In ACIS 2007 Proceedings (p. 100). Cheong, L. K., & Chang, V. (2007). The need for data governance: a case study. In ACIS 2007 Proceedings (p. 100).
go back to reference Cumbley, R., & Church, P. (2013). Is “big data” creepy? Computer Law Security Review, 29(5), 601–609.CrossRef Cumbley, R., & Church, P. (2013). Is “big data” creepy? Computer Law Security Review, 29(5), 601–609.CrossRef
go back to reference Di Nitto, E., Cruz, J. G., Kumara, I., Radolović, D., Tokmakov, K., & Vasileiou, Z. (2022). Deployment and operation of complex software in heterogeneous execution environments: The sodalite approach. Springer.CrossRef Di Nitto, E., Cruz, J. G., Kumara, I., Radolović, D., Tokmakov, K., & Vasileiou, Z. (2022). Deployment and operation of complex software in heterogeneous execution environments: The sodalite approach. Springer.CrossRef
go back to reference Doan, Q., Kayes, A. S. M., Rahayu, W., & Nguyen, K. (2020). Integration of IOT streaming data with efficient indexing and storage optimization. IEEE Access, 8, 47456–47467.CrossRef Doan, Q., Kayes, A. S. M., Rahayu, W., & Nguyen, K. (2020). Integration of IOT streaming data with efficient indexing and storage optimization. IEEE Access, 8, 47456–47467.CrossRef
go back to reference Greenberg, J. (2005). Understanding metadata and metadata schemes. Cataloging & Classification Quarterly, 40(3–4), 17–36.CrossRef Greenberg, J. (2005). Understanding metadata and metadata schemes. Cataloging & Classification Quarterly, 40(3–4), 17–36.CrossRef
go back to reference Karkouch, A., Mousannif, H., Al Moatassime, H., & Noel, T. (2016). Data quality in internet of things: A state-of-the-art survey. Journal of Network and Computer Applications, 73, 57–81.CrossRef Karkouch, A., Mousannif, H., Al Moatassime, H., & Noel, T. (2016). Data quality in internet of things: A state-of-the-art survey. Journal of Network and Computer Applications, 73, 57–81.CrossRef
go back to reference Kayes, A. S. M., Han, J., Colman, A., & Islam, Md. S. (2014). Relboss: A relationship-aware access control framework for software services. In OTM Confederated International Conferences “On the Move to Meaningful Internet Systems” (pp. 258–276). Springer. Kayes, A. S. M., Han, J., Colman, A., & Islam, Md. S. (2014). Relboss: A relationship-aware access control framework for software services. In OTM Confederated International Conferences “On the Move to Meaningful Internet Systems” (pp. 258–276). Springer.
go back to reference Kayes, A. S. M., Rahayu, W., Dillon, T., & Chang, E. (2018). Accessing data from multiple sources through context-aware access control. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 551–559). Kayes, A. S. M., Rahayu, W., Dillon, T., & Chang, E. (2018). Accessing data from multiple sources through context-aware access control. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 551–559).
go back to reference Kayes, A. S. M., Kalaria, R., Sarker, I. H., Islam, M., Watters, P. A., Ng, A., Hammoudeh, M., Badsha, S., Kumara, I., et al. (2020a). A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues. Sensors, 20(9), 2464.CrossRef Kayes, A. S. M., Kalaria, R., Sarker, I. H., Islam, M., Watters, P. A., Ng, A., Hammoudeh, M., Badsha, S., Kumara, I., et al. (2020a). A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues. Sensors, 20(9), 2464.CrossRef
go back to reference Kayes, A. S. M., Rahayu, W., Watters, P., Alazab, M., Dillon, T., & Chang, E. (2020b). Achieving security scalability and flexibility using fog-based context-aware access control. Future Generation Computer Systems, 107, 307–323.CrossRef Kayes, A. S. M., Rahayu, W., Watters, P., Alazab, M., Dillon, T., & Chang, E. (2020b). Achieving security scalability and flexibility using fog-based context-aware access control. Future Generation Computer Systems, 107, 307–323.CrossRef
go back to reference Khatri, V., & Brown, C. V. (2010). Designing data governance. Communications of the ACM, 53(1), 148–152.CrossRef Khatri, V., & Brown, C. V. (2010). Designing data governance. Communications of the ACM, 53(1), 148–152.CrossRef
go back to reference Korhonen, J. J., Melleri, I., Hiekkanen, K., & Helenius, M. (2013). Designing data governance structure: An organizational perspective. GSTF Journal on Computing, 2(4), 11–17. Korhonen, J. J., Melleri, I., Hiekkanen, K., & Helenius, M. (2013). Designing data governance structure: An organizational perspective. GSTF Journal on Computing, 2(4), 11–17.
go back to reference Liu, L., & Chi, L. (2002). Evolutional data quality: A theory-specific view. In ICIQ (pp. 292–304). Liu, L., & Chi, L. (2002). Evolutional data quality: A theory-specific view. In ICIQ (pp. 292–304).
go back to reference Malik, P. (2013). Governing big data: Principles and practices. IBM Journal of Research and Development, 57(3/4), 1–13.CrossRef Malik, P. (2013). Governing big data: Principles and practices. IBM Journal of Research and Development, 57(3/4), 1–13.CrossRef
go back to reference Marco, D. (2006). Understanding data governance and stewardship, Part 1. Information Management, 16(9), 28. Marco, D. (2006). Understanding data governance and stewardship, Part 1. Information Management, 16(9), 28.
go back to reference Merino, J., Caballero, I., Rivas, B., Serrano, M., & Piattini, M. (2016). A data quality in use model for big data. Future Generation Computer Systems, 63, 123–130.CrossRef Merino, J., Caballero, I., Rivas, B., Serrano, M., & Piattini, M. (2016). A data quality in use model for big data. Future Generation Computer Systems, 63, 123–130.CrossRef
go back to reference Michener, W. K., Allard, S., Budden, A., Cook, R. B., Douglass, K., Frame, M., Kelling, S., Koskela, R., Tenopir, C., & Vieglais, D. A. (2012). Participatory design of DataONE—Enabling cyberinfrastructure for the biological and environmental sciences. Ecological Informatics, 11, 5–15.CrossRef Michener, W. K., Allard, S., Budden, A., Cook, R. B., Douglass, K., Frame, M., Kelling, S., Koskela, R., Tenopir, C., & Vieglais, D. A. (2012). Participatory design of DataONE—Enabling cyberinfrastructure for the biological and environmental sciences. Ecological Informatics, 11, 5–15.CrossRef
go back to reference Otto, B. (2011). A morphology of the organisation of data governance. Otto, B. (2011). A morphology of the organisation of data governance.
go back to reference Perez-Castillo, R., Carretero, A. G., Caballero, I., Rodriguez, M., Piattini, M., Mate, A., Kim, S., & Lee, D. (2018). Daqua-mass: An ISO 8000-61 based data quality management methodology for sensor data. Sensors, 18(9), 3105.CrossRef Perez-Castillo, R., Carretero, A. G., Caballero, I., Rodriguez, M., Piattini, M., Mate, A., Kim, S., & Lee, D. (2018). Daqua-mass: An ISO 8000-61 based data quality management methodology for sensor data. Sensors, 18(9), 3105.CrossRef
go back to reference Protection Regulation. (1807). Regulation (EU) 2018/1807 of the European parliament and of the council. REGULATION (EU), 2018, 2018. Protection Regulation. (1807). Regulation (EU) 2018/1807 of the European parliament and of the council. REGULATION (EU), 2018, 2018.
go back to reference Protection Regulation. (2016). Regulation (EU) 2016/679 of the European Parliament and of the council. REGULATION (EU), 679, 2016. Protection Regulation. (2016). Regulation (EU) 2016/679 of the European Parliament and of the council. REGULATION (EU), 679, 2016.
go back to reference Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E. (1996). Role-based access control models. Computer, 29(2), 38–47.CrossRef Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E. (1996). Role-based access control models. Computer, 29(2), 38–47.CrossRef
go back to reference Servos, D., & Osborn, S. L. (2017). Current research and open problems in attribute-based access control. ACM Computing Surveys, 49(4). Servos, D., & Osborn, S. L. (2017). Current research and open problems in attribute-based access control. ACM Computing Surveys, 49(4).
go back to reference Sinaeepourfard, A., Garcia, J., Masip-Bruin, X., & Marin-Torder, E. (2016). Towards a comprehensive data lifecycle model for big data environments. In Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, BDCAT ’16 (pp. 100–106). Association for Computing Machinery. Sinaeepourfard, A., Garcia, J., Masip-Bruin, X., & Marin-Torder, E. (2016). Towards a comprehensive data lifecycle model for big data environments. In Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, BDCAT ’16 (pp. 100–106). Association for Computing Machinery.
go back to reference Singh, G., Bharathi, S., Chervenak, A., Deelman, E., Kesselman, C., Manohar, M., Patil, S., & Pearlman, L. (2003). A metadata catalog service for data intensive applications. In Proceedings of the 2003 ACM/IEEE Conference on Supercomputing, SC ’03 (p. 33). Association for Computing Machinery. Singh, G., Bharathi, S., Chervenak, A., Deelman, E., Kesselman, C., Manohar, M., Patil, S., & Pearlman, L. (2003). A metadata catalog service for data intensive applications. In Proceedings of the 2003 ACM/IEEE Conference on Supercomputing, SC ’03 (p. 33). Association for Computing Machinery.
go back to reference Strong, D. M., Lee, Y. W., & Wang, R. Y. (1997). Data quality in context. Communications of the ACM, 40(5), 103–110.CrossRef Strong, D. M., Lee, Y. W., & Wang, R. Y. (1997). Data quality in context. Communications of the ACM, 40(5), 103–110.CrossRef
go back to reference Taleb, I., Dssouli, R., & Serhani, M. A. (2015). Big data pre-processing: A quality framework. In 2015 IEEE International Congress on Big Data (pp. 191–198). Taleb, I., Dssouli, R., & Serhani, M. A. (2015). Big data pre-processing: A quality framework. In 2015 IEEE International Congress on Big Data (pp. 191–198).
go back to reference Taleb, I., Kassabi, H. T. E., Serhani, M. A., Dssouli, R., & Bouhaddioui, C. (2016). Big data quality: A quality dimensions evaluation. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld) (pp. 759–765). Taleb, I., Kassabi, H. T. E., Serhani, M. A., Dssouli, R., & Bouhaddioui, C. (2016). Big data quality: A quality dimensions evaluation. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld) (pp. 759–765).
go back to reference Tallon, P. P. (2013). Corporate governance of big data: Perspectives on value, risk, and cost. Computer, 46(6), 32–38.CrossRef Tallon, P. P. (2013). Corporate governance of big data: Perspectives on value, risk, and cost. Computer, 46(6), 32–38.CrossRef
go back to reference van der Aalst, W. M. P. (2017). Responsible data science: Using event data in a “people friendly” manner. In S. Hammoudi, L. A. Maciaszek, M. M. Missikoff, O. Camp, & J. Cordeiro (Eds.), Enterprise information systems (pp. 3–28). Springer International Publishing.CrossRef van der Aalst, W. M. P. (2017). Responsible data science: Using event data in a “people friendly” manner. In S. Hammoudi, L. A. Maciaszek, M. M. Missikoff, O. Camp, & J. Cordeiro (Eds.), Enterprise information systems (pp. 3–28). Springer International Publishing.CrossRef
go back to reference van der Aalst, W. M. P., Bichler, M., & Heinzl, A. (2017). Responsible data science. Business & Information Systems Engineering, 59(5), 311–313.CrossRef van der Aalst, W. M. P., Bichler, M., & Heinzl, A. (2017). Responsible data science. Business & Information Systems Engineering, 59(5), 311–313.CrossRef
go back to reference Villar, M. (2009). Establishing effective business data stewards. Business Intelligence Journal, 14(2), 23–29. Villar, M. (2009). Establishing effective business data stewards. Business Intelligence Journal, 14(2), 23–29.
go back to reference Weber, K., Otto, B., & Österle, H. (2009). One size does not fit all—a contingency approach to data governance. Journal of Data and Information Quality, 1(1). Weber, K., Otto, B., & Österle, H. (2009). One size does not fit all—a contingency approach to data governance. Journal of Data and Information Quality, 1(1).
go back to reference Wende, K. (2007). A model for data governance-organising accountabilities for data quality management. Wende, K. (2007). A model for data governance-organising accountabilities for data quality management.
go back to reference Wilkinson, M. D., Dumontier, M., Aalbersberg, I. J. J., Appleton, G., Axton, M., Baak, A., Blomberg, N., Boiten, J.-W., da Silva Santos, L. B., Bourne, P. E., et al. (2016). The fair guiding principles for scientific data management and stewardship. Scientific Data, 3(1), 1–9.CrossRef Wilkinson, M. D., Dumontier, M., Aalbersberg, I. J. J., Appleton, G., Axton, M., Baak, A., Blomberg, N., Boiten, J.-W., da Silva Santos, L. B., Bourne, P. E., et al. (2016). The fair guiding principles for scientific data management and stewardship. Scientific Data, 3(1), 1–9.CrossRef
go back to reference Zomaya, A. Y., & Sakr, S. (2017). Handbook of big data technologies. Springer.CrossRef Zomaya, A. Y., & Sakr, S. (2017). Handbook of big data technologies. Springer.CrossRef
Metadata
Title
Data Governance
Authors
Indika Kumara
A. S. M. Kayes
Paul Mundt
Ralf Schneider
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-19554-9_3

Premium Partner