SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
Sheila Jeffrey SVP, IFC, CDMP
Introduction – Sheila Jeffrey
35+ years of experience in data processing/information technology.
Experience mostly in financial services industry (currently at
Bank of America).
Became interested in data modeling through CASE implementation
in the 1980s (Computer Aided System Engineering), and the rest
is history ….
Background in software development, systems architecture,
application development support, channel strategy and Enterprise and
information architecture.
Strive for work/life balance as a wife, mother & grandmother, daughter and
community member.
Seek to maintain awareness of the ‘big issues’ as well as solves today’s problems.
Purpose and Structure
Provide an overview of some classic components of enterprise architecture with
a focus on principles, and examples of their use in the information domain.
• Why have principles?
• How do they relate to other architecture artifacts?
• What makes them ‘real’?
• An overview of information architecture context
• Getting started with principles for information management
• A few examples
What is a Principle? Definition …
Definition
“A rule or code of conduct.” Merriam-Webster
A principle states a value or expectation that will underpin the requirements of
correct outcomes for a sphere of activity.
What is a Principle?
A group of related principles –
• Encapsulate the relevant vision
• Can be organized into hierarchies
• Set scope and boundaries
• Provide reference for decisions
Each constituent principle –
• Should embody a durable value
• Is widely applicable to processes (how/method) and/or artifacts
(what/outcome)
Why do architects care about principles?
It is necessary to articulate principles to ensure that the appropriate values and
objectives guide (business and technology) decisions (for a given organization or
exercise).
The ability to ensure a useful architecture requires governance. Governance
requires policies - how do we know if we are pursuing the right one(s)?
Characteristics of Architecture Principles (TOGAF 8.1.1)
Architecture principles define the underlying general rules and guidelines for
the use and deployment of all IT resources and assets across the enterprise. They
reflect a level of consensus among the various elements of the enterprise, and
form the basis for making future IT decisions.
Each architecture principle should be clearly related back to the business
objectives and key architecture drivers.
So where do Principles fit in …
Principles Policies
Subordinate
Principles
Standards
Guidelines
(Definitions … )
Policy
Statement of minimum thresholds for behavior and performancewith assigned
governance responsibilities.
Standard
Specification of required degree of excellence for a particular purpose.
Guideline
Recommended but discretionary preferred approach, often providing practical
guidance and suggestions.
Subordinate Principle
Additional principle which may further constrain, but may not expand, the
scope of a superior principle.
… and relate to Governance?
Principles Policies
Subordinate
Principles
Standards
Guidelines
Governance
Principles applied …
Principles Policies
Subordinate
Principles
Standards
Guidelines
Governance
Metrics Actions
Structure of a Principle
Name Should both represent the essence of the rule as
well as be easy to remember. Specific technology
platforms should not be mentioned in the name
or statement of a principle.
Statement Should succinctly and unambiguously
communicate the fundamental rule.
Rationale Should highlight the business benefits of adhering
to the principle, using business terminology. Also
describe the relationship to other principles, and
the intentions regarding a balanced
interpretation. Describe situations where one
principle would be given precedence or carry more
weight than another for making a decision.
Implication Should highlight the requirements, both for the
business and IT, for carrying out the principle - in
terms of resources, costs and activities/tasks. It
will often be apparent that current systems,
standards, or practices would be incongruent with
the principle upon adoption. The impact to the
business and consequences of adopting a principle
should be clearly stated.
Recommended Format for Defining Principles – TOGAF 8.1.1
Principles for Information Architecture
All of the discussion to date can be applied to any relevant context or
architectural domain.
Information Architecture is tasked with providing a comprehensive overview of
an organization’s static and dynamic data to ensure its effective management
(e.g. ownership, security, protection, accessibility) and use (e.g. accessibility,
delivery , reliability).
Identifying the foundational principles for an information architecture is –
• contextual (with other organizational, business and technology
principles, if specified)
• urgent (if not done already)
• potentially transformative.
Enterprise Architecture Context
Business
Process
LOB LOB LOB
IT
Infrastructure
Architecture
Enterprise
Architecture
Solutions
Architecture
Business
Architecture
Information
Architecture
Software
Designer
DBA
Based on IASA Foundation Course material
Information Architecture Characteristics/Concerns
Information architecture addresses business concerns and solution design
relating to:
• What data is of interest to the organization
• What areas are responsible for which data/information
• Acquisition and distribution of data (through business operations)
• Movement of data through business processes (data flows)
• Management of data security and privacy
• Data quality (‘fitness for use’)
• Efficient storage of data
• Enabling appropriate access to data
• Common understanding and reuse of data assets
• Consolidation and integration of data for analytic use
• What regulations or compliance concerns affect which data
• Data retention, archiving and destruction
• Metadata management
Information Architecture Principles Urgency
Well managed data is a necessity for effective business
Deliver efficient process
Identify redundant activities and data.
Regulated activities (financial services, healthcare) are being monitored to
demonstrate good data management practices:
Dodd Frank Act
Health Information Technology for Economic and Clinical Health
(HITECH) Act.
Business is generating exponential amounts of data – if it is not of sufficient
quality and appropriately identified it is a liability rather than an asset.
Understanding and providing data security and protection is an imperative in
today’s connected environment.
The investment in data acquisition and storage must be leveraged to provide
competitive advantage.
Address issues of data retention, archiving and disposal.
Potential Impact of Information Architecture Principles
Identifying and confirming the principles for guiding information management
requires thoughtful assessment of the organization’s business model, values
and goals.
Formulating the principles that will deliver good data management and
effective use of information puts a focus on the evolution of the ‘information
age’ and ‘data driven’ business.
Many organizations are working through what it means to view data as an asset,
and manage it as such.
The exercise of writing information management principles will require
decisions about the role of the business versus technology in this space.
To ensure that the principles are realistic and actionable, challenges such as
data volume (‘big data’) and how to value data must be surfaced and
considered.
Example Principle - 1
Name Primacy of Principles (*1)
Statement The principles of information management apply to all organizations within the
enterprise.
Rationale Ensures consistent and measurable level of quality information to all consumers and
decision makers from reliable data sources.
Implication Prevents exclusions, favoritism and inconsistency of application that would undermine
the consistent management of information.
Initiatives must demonstrate compliance to principles before initiation and through
delivery.
If an initiative does not comply with a principle it must be modified to agree; a
principle cannot be ignored or violated.
*1 - Derived from TOGAF example
Example Principle - 2
Name The Quality of Data Supports Its Business Use
Statement The verified quality of data must ensure correct, accurate and defensible business
results.
Rationale Business activity will be reliable, efficient and free of errors caused by incorrect,
missing or defective data
Implication Data quality requirements must be identified, defined, documented and implemented
based on business context and rules.
All legal, regulatory and audit considerations affecting data quality requirements for
specified data must be identified and met.
All dimensions of data quality must be considered when data quality requirements are
identified
Ongoing data quality measurement and reporting will be required.
Initiatives that alter the use of data must reassess and validate data quality
requirements based on the change.
Example Principle - 3
Name Data is a Business Asset
Statement Data is recognized as a critical business asset, frequently managed by technology.
Rationale Business activity is dependent on correct data, so it must be owned and managed by
business organizations, which may leverage technology solutions to manage their data.
Implication Business organizations must provide stewards to be responsible for the data required
for their business processes.
Business people must understand their data and are responsible for defining all
requirements of the data involved in their functions.
Business data stewards are responsible for data quality reporting.
Business owners must fund and staff for data management activities, in partnership
with technology.
Principles applied …
Principles Policies
Subordinate
Principles
Standards
Guidelines
Governance
Metrics Actions
Closing Thoughts
Architectural principles (for data and information) serve to :
• Drive thoughtful discussion of the vision and goals for the organization
• Anchor policies back to core concerns of the organization
• Identify the most significant dimensions for solution development
• Aid in strategy development and initiative prioritization
• Provide ‘guard rails’ for the scope of initiatives
• Contribute to metric identification and effective management of data
Cautions:
• Strive for a select set (10 – 20 ) of principles
• Each organization is unique and requires it own set of principles.
Questions??
Thank you!
References
IASA Foundation Course materials
TOGAF 8.1.1 online materials
Software Systems Architecture – Rozanski, Woods
Data Architecture (from Zen to Reality) – Charles D. Tupper
Information Solutions Guiding Principles - Bank of America
Information Architecture Review Board
Understanding Principles – Dick Wilson, Bank of America
Artifact Definitions and Dependencies - John Kling, Bank of America

Contenu connexe

Tendances

Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Alan McSweeney
 
Approach To It Strategy And Architecture
Approach To It Strategy And ArchitectureApproach To It Strategy And Architecture
Approach To It Strategy And Architecture
Alan McSweeney
 
What Is It Governance Introduction
What Is It Governance   IntroductionWhat Is It Governance   Introduction
What Is It Governance Introduction
nicxenos
 
Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy Development
Alan McSweeney
 

Tendances (20)

It governance
It governanceIt governance
It governance
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Creating A Business Focussed Information Technology Strategy
Creating A Business Focussed Information Technology StrategyCreating A Business Focussed Information Technology Strategy
Creating A Business Focussed Information Technology Strategy
 
Data Audit Approach To Developing An Enterprise Data Strategy
Data Audit Approach To Developing An Enterprise Data StrategyData Audit Approach To Developing An Enterprise Data Strategy
Data Audit Approach To Developing An Enterprise Data Strategy
 
Approach To It Strategy And Architecture
Approach To It Strategy And ArchitectureApproach To It Strategy And Architecture
Approach To It Strategy And Architecture
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made Easy
 
What Is It Governance Introduction
What Is It Governance   IntroductionWhat Is It Governance   Introduction
What Is It Governance Introduction
 
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
 
Align Information Technology and Business Strategy
Align Information Technology and Business Strategy Align Information Technology and Business Strategy
Align Information Technology and Business Strategy
 
Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy Development
 
Strategic Alignment
Strategic AlignmentStrategic Alignment
Strategic Alignment
 
Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)
 
Governance Of Enterprise Information Technology V3
Governance Of Enterprise Information Technology V3Governance Of Enterprise Information Technology V3
Governance Of Enterprise Information Technology V3
 
Comprehending Information Technology Governance
Comprehending Information Technology GovernanceComprehending Information Technology Governance
Comprehending Information Technology Governance
 
Ea Value And Benefits Ver1 0
Ea Value And Benefits Ver1 0Ea Value And Benefits Ver1 0
Ea Value And Benefits Ver1 0
 
Benefits of Enterprise Content Management (ECM) for Human Resources
Benefits of Enterprise Content Management (ECM) for Human ResourcesBenefits of Enterprise Content Management (ECM) for Human Resources
Benefits of Enterprise Content Management (ECM) for Human Resources
 
IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?
 
It governance
It governanceIt governance
It governance
 
Gilbert Silvius on Business IT Alignment
Gilbert Silvius on Business IT AlignmentGilbert Silvius on Business IT Alignment
Gilbert Silvius on Business IT Alignment
 
Capital Planning And Investment Management And Control In Information Technology
Capital Planning And Investment Management And Control In Information TechnologyCapital Planning And Investment Management And Control In Information Technology
Capital Planning And Investment Management And Control In Information Technology
 

Similaire à Sheila Jeffrey - Well Behaved Data - It's a Matter of Principles

Governance V3 (2)
Governance V3 (2)Governance V3 (2)
Governance V3 (2)
guestf73e68
 
EA_More_Than_Just_Standards
EA_More_Than_Just_StandardsEA_More_Than_Just_Standards
EA_More_Than_Just_Standards
David Rudawitz
 
Enterprise Data Governance for Financial Institutions
Enterprise Data Governance for Financial InstitutionsEnterprise Data Governance for Financial Institutions
Enterprise Data Governance for Financial Institutions
Sheldon McCarthy
 
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docxCHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
bartholomeocoombs
 
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docxCHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
keturahhazelhurst
 
Week 2-What is Enterprise Architecure (1).pptx
Week 2-What is Enterprise Architecure (1).pptxWeek 2-What is Enterprise Architecure (1).pptx
Week 2-What is Enterprise Architecure (1).pptx
RizalPrambudi3
 
Ciber Soa April 2007 Omaha
Ciber Soa April 2007 OmahaCiber Soa April 2007 Omaha
Ciber Soa April 2007 Omaha
kmansour
 

Similaire à Sheila Jeffrey - Well Behaved Data - It's a Matter of Principles (20)

IT Strategy Sample
IT Strategy SampleIT Strategy Sample
IT Strategy Sample
 
rethinking marketing
rethinking marketingrethinking marketing
rethinking marketing
 
Governance V3 (2)
Governance V3 (2)Governance V3 (2)
Governance V3 (2)
 
BI_StrategyDM2
BI_StrategyDM2BI_StrategyDM2
BI_StrategyDM2
 
CIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxCIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptx
 
Data Governance: Description, Design, Delivery
Data Governance: Description, Design, DeliveryData Governance: Description, Design, Delivery
Data Governance: Description, Design, Delivery
 
EA_More_Than_Just_Standards
EA_More_Than_Just_StandardsEA_More_Than_Just_Standards
EA_More_Than_Just_Standards
 
Enterprise Data Governance for Financial Institutions
Enterprise Data Governance for Financial InstitutionsEnterprise Data Governance for Financial Institutions
Enterprise Data Governance for Financial Institutions
 
CGEIT Course Content InfosecTrain.pdf
CGEIT Course Content InfosecTrain.pdfCGEIT Course Content InfosecTrain.pdf
CGEIT Course Content InfosecTrain.pdf
 
CGEIT Course Content InfosecTrain
CGEIT Course Content InfosecTrainCGEIT Course Content InfosecTrain
CGEIT Course Content InfosecTrain
 
Enterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approachEnterprise Information Management Strategy - a proven approach
Enterprise Information Management Strategy - a proven approach
 
IT Operating Model - Fundamental
IT Operating Model - FundamentalIT Operating Model - Fundamental
IT Operating Model - Fundamental
 
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docxCHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
 
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docxCHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx
 
Information governance presentation
Information governance   presentationInformation governance   presentation
Information governance presentation
 
Cobit 41 framework
Cobit 41 frameworkCobit 41 framework
Cobit 41 framework
 
Week 2-What is Enterprise Architecure (1).pptx
Week 2-What is Enterprise Architecure (1).pptxWeek 2-What is Enterprise Architecure (1).pptx
Week 2-What is Enterprise Architecure (1).pptx
 
Formal Information Technology in a Small, Growing Company
Formal Information Technology in a Small, Growing CompanyFormal Information Technology in a Small, Growing Company
Formal Information Technology in a Small, Growing Company
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
 
Ciber Soa April 2007 Omaha
Ciber Soa April 2007 OmahaCiber Soa April 2007 Omaha
Ciber Soa April 2007 Omaha
 

Plus de iasaglobal

Essentials of enterprise architecture tools
Essentials of enterprise architecture toolsEssentials of enterprise architecture tools
Essentials of enterprise architecture tools
iasaglobal
 

Plus de iasaglobal (20)

Adam boczek 2015 agile architecture in 10 steps v1.0
Adam boczek 2015 agile architecture in 10 steps v1.0Adam boczek 2015 agile architecture in 10 steps v1.0
Adam boczek 2015 agile architecture in 10 steps v1.0
 
Adam boczek 2015 agile architecture in 10 steps v1.0
Adam boczek 2015 agile architecture in 10 steps v1.0Adam boczek 2015 agile architecture in 10 steps v1.0
Adam boczek 2015 agile architecture in 10 steps v1.0
 
Adam boczek 2013 bitkom software summit agile architecture v1.3
Adam boczek 2013 bitkom software summit agile architecture v1.3Adam boczek 2013 bitkom software summit agile architecture v1.3
Adam boczek 2013 bitkom software summit agile architecture v1.3
 
Essentials of enterprise architecture tools
Essentials of enterprise architecture toolsEssentials of enterprise architecture tools
Essentials of enterprise architecture tools
 
Understanding business strategy cutting edge paradigm
Understanding business strategy cutting edge paradigmUnderstanding business strategy cutting edge paradigm
Understanding business strategy cutting edge paradigm
 
Information and data relevance to business
Information and data relevance to businessInformation and data relevance to business
Information and data relevance to business
 
Case study value of it strategy in hi tech industry
Case study value of it strategy in hi tech industryCase study value of it strategy in hi tech industry
Case study value of it strategy in hi tech industry
 
Max Poliashenko - Enterprise Product Architecture
Max Poliashenko - Enterprise Product ArchitectureMax Poliashenko - Enterprise Product Architecture
Max Poliashenko - Enterprise Product Architecture
 
Michael Gonzalez - Do The Sum of The Parts Equal the Whole
Michael Gonzalez - Do The Sum of The Parts Equal the WholeMichael Gonzalez - Do The Sum of The Parts Equal the Whole
Michael Gonzalez - Do The Sum of The Parts Equal the Whole
 
Michael Jay Freer - Information Obfuscation
Michael Jay Freer - Information ObfuscationMichael Jay Freer - Information Obfuscation
Michael Jay Freer - Information Obfuscation
 
Creating Enterprise Value from Business Architecture
Creating Enterprise Value from Business ArchitectureCreating Enterprise Value from Business Architecture
Creating Enterprise Value from Business Architecture
 
Scott Whitmire - Just What is Architecture Anyway
Scott Whitmire - Just What is Architecture AnywayScott Whitmire - Just What is Architecture Anyway
Scott Whitmire - Just What is Architecture Anyway
 
Board of Education Vision 2013-2014
Board of Education Vision 2013-2014Board of Education Vision 2013-2014
Board of Education Vision 2013-2014
 
Sean Kenney - Solving Parallel Software Challenges with Patterns
Sean Kenney - Solving Parallel Software Challenges with PatternsSean Kenney - Solving Parallel Software Challenges with Patterns
Sean Kenney - Solving Parallel Software Challenges with Patterns
 
Stephen Cohen - The Impact of Ethics on the Architect
Stephen Cohen - The Impact of Ethics on the ArchitectStephen Cohen - The Impact of Ethics on the Architect
Stephen Cohen - The Impact of Ethics on the Architect
 
William Martinez - Evolution Game
William Martinez - Evolution GameWilliam Martinez - Evolution Game
William Martinez - Evolution Game
 
Paul Preiss - Enterprise Architecture in Transformation
Paul Preiss - Enterprise Architecture in TransformationPaul Preiss - Enterprise Architecture in Transformation
Paul Preiss - Enterprise Architecture in Transformation
 
Nina Grantcharova - Approach to Separation of Concerns via Design Patterns
Nina Grantcharova - Approach to Separation of Concerns via Design PatternsNina Grantcharova - Approach to Separation of Concerns via Design Patterns
Nina Grantcharova - Approach to Separation of Concerns via Design Patterns
 
Roger Sessions - The Snowman Architecture
Roger Sessions - The Snowman ArchitectureRoger Sessions - The Snowman Architecture
Roger Sessions - The Snowman Architecture
 
Strategic Portfolio Management for IT
Strategic Portfolio Management for ITStrategic Portfolio Management for IT
Strategic Portfolio Management for IT
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Sheila Jeffrey - Well Behaved Data - It's a Matter of Principles

  • 2. Introduction – Sheila Jeffrey 35+ years of experience in data processing/information technology. Experience mostly in financial services industry (currently at Bank of America). Became interested in data modeling through CASE implementation in the 1980s (Computer Aided System Engineering), and the rest is history …. Background in software development, systems architecture, application development support, channel strategy and Enterprise and information architecture. Strive for work/life balance as a wife, mother & grandmother, daughter and community member. Seek to maintain awareness of the ‘big issues’ as well as solves today’s problems.
  • 3. Purpose and Structure Provide an overview of some classic components of enterprise architecture with a focus on principles, and examples of their use in the information domain. • Why have principles? • How do they relate to other architecture artifacts? • What makes them ‘real’? • An overview of information architecture context • Getting started with principles for information management • A few examples
  • 4. What is a Principle? Definition … Definition “A rule or code of conduct.” Merriam-Webster A principle states a value or expectation that will underpin the requirements of correct outcomes for a sphere of activity.
  • 5. What is a Principle? A group of related principles – • Encapsulate the relevant vision • Can be organized into hierarchies • Set scope and boundaries • Provide reference for decisions Each constituent principle – • Should embody a durable value • Is widely applicable to processes (how/method) and/or artifacts (what/outcome)
  • 6. Why do architects care about principles? It is necessary to articulate principles to ensure that the appropriate values and objectives guide (business and technology) decisions (for a given organization or exercise). The ability to ensure a useful architecture requires governance. Governance requires policies - how do we know if we are pursuing the right one(s)? Characteristics of Architecture Principles (TOGAF 8.1.1) Architecture principles define the underlying general rules and guidelines for the use and deployment of all IT resources and assets across the enterprise. They reflect a level of consensus among the various elements of the enterprise, and form the basis for making future IT decisions. Each architecture principle should be clearly related back to the business objectives and key architecture drivers.
  • 7. So where do Principles fit in … Principles Policies Subordinate Principles Standards Guidelines
  • 8. (Definitions … ) Policy Statement of minimum thresholds for behavior and performancewith assigned governance responsibilities. Standard Specification of required degree of excellence for a particular purpose. Guideline Recommended but discretionary preferred approach, often providing practical guidance and suggestions. Subordinate Principle Additional principle which may further constrain, but may not expand, the scope of a superior principle.
  • 9. … and relate to Governance? Principles Policies Subordinate Principles Standards Guidelines Governance
  • 10. Principles applied … Principles Policies Subordinate Principles Standards Guidelines Governance Metrics Actions
  • 11. Structure of a Principle Name Should both represent the essence of the rule as well as be easy to remember. Specific technology platforms should not be mentioned in the name or statement of a principle. Statement Should succinctly and unambiguously communicate the fundamental rule. Rationale Should highlight the business benefits of adhering to the principle, using business terminology. Also describe the relationship to other principles, and the intentions regarding a balanced interpretation. Describe situations where one principle would be given precedence or carry more weight than another for making a decision. Implication Should highlight the requirements, both for the business and IT, for carrying out the principle - in terms of resources, costs and activities/tasks. It will often be apparent that current systems, standards, or practices would be incongruent with the principle upon adoption. The impact to the business and consequences of adopting a principle should be clearly stated. Recommended Format for Defining Principles – TOGAF 8.1.1
  • 12. Principles for Information Architecture All of the discussion to date can be applied to any relevant context or architectural domain. Information Architecture is tasked with providing a comprehensive overview of an organization’s static and dynamic data to ensure its effective management (e.g. ownership, security, protection, accessibility) and use (e.g. accessibility, delivery , reliability). Identifying the foundational principles for an information architecture is – • contextual (with other organizational, business and technology principles, if specified) • urgent (if not done already) • potentially transformative.
  • 13. Enterprise Architecture Context Business Process LOB LOB LOB IT Infrastructure Architecture Enterprise Architecture Solutions Architecture Business Architecture Information Architecture Software Designer DBA Based on IASA Foundation Course material
  • 14. Information Architecture Characteristics/Concerns Information architecture addresses business concerns and solution design relating to: • What data is of interest to the organization • What areas are responsible for which data/information • Acquisition and distribution of data (through business operations) • Movement of data through business processes (data flows) • Management of data security and privacy • Data quality (‘fitness for use’) • Efficient storage of data • Enabling appropriate access to data • Common understanding and reuse of data assets • Consolidation and integration of data for analytic use • What regulations or compliance concerns affect which data • Data retention, archiving and destruction • Metadata management
  • 15. Information Architecture Principles Urgency Well managed data is a necessity for effective business Deliver efficient process Identify redundant activities and data. Regulated activities (financial services, healthcare) are being monitored to demonstrate good data management practices: Dodd Frank Act Health Information Technology for Economic and Clinical Health (HITECH) Act. Business is generating exponential amounts of data – if it is not of sufficient quality and appropriately identified it is a liability rather than an asset. Understanding and providing data security and protection is an imperative in today’s connected environment. The investment in data acquisition and storage must be leveraged to provide competitive advantage. Address issues of data retention, archiving and disposal.
  • 16. Potential Impact of Information Architecture Principles Identifying and confirming the principles for guiding information management requires thoughtful assessment of the organization’s business model, values and goals. Formulating the principles that will deliver good data management and effective use of information puts a focus on the evolution of the ‘information age’ and ‘data driven’ business. Many organizations are working through what it means to view data as an asset, and manage it as such. The exercise of writing information management principles will require decisions about the role of the business versus technology in this space. To ensure that the principles are realistic and actionable, challenges such as data volume (‘big data’) and how to value data must be surfaced and considered.
  • 17. Example Principle - 1 Name Primacy of Principles (*1) Statement The principles of information management apply to all organizations within the enterprise. Rationale Ensures consistent and measurable level of quality information to all consumers and decision makers from reliable data sources. Implication Prevents exclusions, favoritism and inconsistency of application that would undermine the consistent management of information. Initiatives must demonstrate compliance to principles before initiation and through delivery. If an initiative does not comply with a principle it must be modified to agree; a principle cannot be ignored or violated. *1 - Derived from TOGAF example
  • 18. Example Principle - 2 Name The Quality of Data Supports Its Business Use Statement The verified quality of data must ensure correct, accurate and defensible business results. Rationale Business activity will be reliable, efficient and free of errors caused by incorrect, missing or defective data Implication Data quality requirements must be identified, defined, documented and implemented based on business context and rules. All legal, regulatory and audit considerations affecting data quality requirements for specified data must be identified and met. All dimensions of data quality must be considered when data quality requirements are identified Ongoing data quality measurement and reporting will be required. Initiatives that alter the use of data must reassess and validate data quality requirements based on the change.
  • 19. Example Principle - 3 Name Data is a Business Asset Statement Data is recognized as a critical business asset, frequently managed by technology. Rationale Business activity is dependent on correct data, so it must be owned and managed by business organizations, which may leverage technology solutions to manage their data. Implication Business organizations must provide stewards to be responsible for the data required for their business processes. Business people must understand their data and are responsible for defining all requirements of the data involved in their functions. Business data stewards are responsible for data quality reporting. Business owners must fund and staff for data management activities, in partnership with technology.
  • 20. Principles applied … Principles Policies Subordinate Principles Standards Guidelines Governance Metrics Actions
  • 21. Closing Thoughts Architectural principles (for data and information) serve to : • Drive thoughtful discussion of the vision and goals for the organization • Anchor policies back to core concerns of the organization • Identify the most significant dimensions for solution development • Aid in strategy development and initiative prioritization • Provide ‘guard rails’ for the scope of initiatives • Contribute to metric identification and effective management of data Cautions: • Strive for a select set (10 – 20 ) of principles • Each organization is unique and requires it own set of principles.
  • 23. References IASA Foundation Course materials TOGAF 8.1.1 online materials Software Systems Architecture – Rozanski, Woods Data Architecture (from Zen to Reality) – Charles D. Tupper Information Solutions Guiding Principles - Bank of America Information Architecture Review Board Understanding Principles – Dick Wilson, Bank of America Artifact Definitions and Dependencies - John Kling, Bank of America