SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 2 Issue 2 ǁ June 2017.
w w w . i j m r e t . o r g Page 1
Return on Investment of Diversity and Inclusion
Initiatives in Information Governance
Brendan James Moore, MA & Dr. Syed Adeel Ahmed
School of Professional Advancement, 800 E Commerce Rd., Tulane University, Elmwood, 70123, Louisiana, United States
Xavier University of Louisiana, 1 Drexel Drive, New Orleans, 70125, Louisiana, United States
Abstract Over the past several years, companies are pairing diversity efforts with inclusion initiatives and roles
surrounding innovations that promote diversity of thought [13]. However, much return on investment (ROI) focus
has been on business and corporate functioning in general, but not on specifics related to information governance
(IG). We address this research gap byconsidering various return on investment (ROI) metrics and what might
ground the benefits of diversity and inclusion initiatives related to IG policy. Then, wesuggest what the results
mean in terms of changing and influencing current industry practices.
Keywords:Diversity and Inclusion, D/I, Information GovernanceIG, RiskManagement, RM,Return on
Investment, ROI, Hackathon, LGBT, Electronic Records Management, ERM, HIPAA,triple bottom line (TBL),
Corporate Social Responsibility (CSR).
I. Introduction
Over the past several years, companies are pairing
diversity efforts with inclusion initiatives and roles
surrounding innovations that promote diversity of
thought [13]. However, much return on investment
(ROI) focus has been on business and corporate
functioning in general, but not on specifics related to
information governance (IG) practices.
Scarceresearchexists on how to measure the ROI
of diversity and inclusion (D/I) initiatives, let alone in
the context of information governance policy creation,
so a research gap exists. The following questions
arise naturally from this research gap, and answering
them requires careful considerations surrounding
current IG practices.
Problem Statements in the form of Questions:
1. How do D/I efforts relate to current industry
IG best practices?
2. How can previously unsought D/I initiatives
relating to IG provide business opportunities
and new solutions to current problems?
Methodology: The primary research method for this
study is literature review, followed by conceptual
analysis.
Some of the suggestions were inspired by Xavier
University of Louisiana’s 2017 first annual
Hackathon, which has teams develop
technology-oriented innovations to try to solve
problems that arise in the healthcare industry.
In this paper, we first explore what diversity
means in the context of information governance.
Then, we consider various ROI metrics and what
might ground the benefits of D/I initiatives related to
information governance(IG). Finally, we suggest
what the results mean in terms of changing and
influencing current healthcare industry best practices.
II. What does diversity mean in the
context of information governance?
Whenexploring what diversity means in the
context of information governance, we ought to start
by clearly defining our terms. We will begin by
defining information governance, in general,
followed by an outline of IG best practices,and
ending on defining three types of diversity.
By initially defining these terms and practices,we
will avoid confusion later when wesuggest changes to
IG best practices and discuss specifics surrounding
whichmetrics are appropriate to track in assessing
ROI.
2.1 Information Governance
There are many ways people have defined
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 2 Issue 2 ǁ June 2017.
w w w . i j m r e t . o r g Page 2
information governance. For our purposes, we will
refer to the Association of Records Mangers and
Administrators (ARMA) definition.
According to the Association of Records
Managers and Administrators (ARMA), IG is “a
strategic framework composed of standards,
processes, roles, and metrics that hold
organizations and individuals accountable to
create, organize, secure, maintain, use, and
dispose of information in ways that align with
and contribute to the organization’s goals” [16].
The above definition is clear and provides a
broad enough description to encompass a variety of
practices surrounding the managing of information,
storage, and disposal. Next, we will briefly cover 25
best IG-related practices.
2.2 Current IG Best Practices
“The following is a list of 25 IG best practices:
1. IG is a key underpinning for a successful
records management(RM) program.
2. IG is not a project but rather an ongoing
program.
3. Using an IG framework or maturity model is
helpful in assessing and guiding IG
programs.
4. Defensible deletion of data debris and
information that no longer has value is
critical in the era of Big Data.
5. IG policies must be developed before
enabling technologies are deployed to assist
in enforcement.
6. To provide comprehensive e-document
security throughout a document’s life cycle,
documents must be secured upon creation
using highly sophisticated technologies,
such as information rights management
(IRM) technology.
7. A records retention schedule and legal hold
notification (LHN) process are the two
primary elements of a fundamental IG
program.
8. A cross-functional team is required to
implement IG.
9. The first step in information risk planning is
to consider the applicable laws and
regulations that apply to your organization
in the jurisdiction in which it conducts
business.
10. Developing a risk profile is a basic building
block in enterprise risk management, which
assists executives in understanding the risks
associated with stated business objectives
and in allocating resources within a
structured evaluation approach or
framework.
11. An information risk mitigation plan is a
critical part of the IG planning process.
12. Proper metrics are required to measure the
conformance and performance of your IG
program.
13. IG programs must be audited for
effectiveness.
14. An enterprise wide retention schedule is
preferable, because it eliminates the
possibility that different business units will
have conflicting records retention periods.
15. Senior management must set the tone and
lead sponsorship for vital records program
governance and compliance.
16. Business processes must be redesigned to
improve and optimize the management and
security of information and especially the
most critical of information, electronic
records, before implementing enabling
technologies.
17. E-mail messages, both inbound and
outbound, should be archived automatically
and (preferably) in real time.
18. Personal archiving of e-mail messages
should be disallowed.
19. Destructive retention of e-mail helps to
reduce storage costs and legal risk, while
improving “findability” of critical records.
20. Take a practical approach and limit cloud
use to documents that do not have long
retention periods and carry a low litigation
risk.
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 2 Issue 2 ǁ June 2017.
w w w . i j m r e t . o r g Page 3
21. Manage social media content by IG policies
and monitor it with controls that ensure
protection of critical information assets and
preservation of business records.
22. International and national standards provide
effective guidance for implementing IG.
23. Creating standardized metadata terms should
be a part of an IG effort that enables faster,
more complete, and more accurate searches
and retrieval of records.
24. Some digital information assets must be
preserved permanently as part of an ongoing
organization’s documentary heritage.
25. Executive sponsorship is crucial” [16; ch5]
2.3Types of Diversity
In this section, we will cover several types of
diversity that should be taken into consideration
when forming, maintaining, and implementing IG
policies.
2.3.1 Diverse Roles
Ensuring the IG policies are brought about
through a diverse group that accounts for all
stakeholders is important.“There are no set
requirements or formulas for making up your IG
team… You will need representatives from different
departments -Absolutes include:” [16; ch5].
• IT (info. Technology) departments
• Legal staff
• Executive sponsor
• SRO (senior records officer)
• Risk management specialist or
manager
• IG Program managers
When making an IG team, ensuring that inputs
are gathered from a variety of sources is important.
“Other inputs can be in the form of managers of
human resources, company communications, IT
security, agency archivists, business analysts, chief
security officers, financial analysts, and others” [16;
ch5].
2.3.2Diverse Identities
IG best practice #8 described in section 2.2
suggests that cross-functional teams are important in
forming IG policy.
TheInformation Governance Reference Model
(IGRM) represents a process for IG policy integration
that recognizes and considers a variety of stakeholders
[6]. Although diversifying roles when making IG
policy will help mitigate risk, ensuring that a
diversified set of identities and stakeholders are
involved is as essential.
“The IGRM is aimed at fostering IG adoption
by facilitating communication and collaboration
between disparate IG stakeholder functions,
including IT, legal, RM, risk management, and
business units’ stakeholders” [16; ch6]
Information Governance Reference Model
(IGRM)
[6; http://www.edrm.net/papers/igrm-it-viewpoint/]
Next, we consider metric selection and how the
best metrics to track will be contextualized not only
to the needs of an IG program but dependent upon
the industry, or area, an organization operates.
III. Grounding various benefits of D/I
initiatives
3.1 Assessing Metrics
We should ask ourselves, “Is this metric a fair
application and a fair development of what you’re
looking for?... If you can’t prove to them your worth,
it’s hard for them to see you as integral to the
company” [4].
One difficulty in finding research on the
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 2 Issue 2 ǁ June 2017.
w w w . i j m r e t . o r g Page 4
effectiveness of D/I initiatives is that many times
companies will conduct internal research using their
own metrics and not share results publically. Another
reason is that many times, the value (which considers
more than mere financial cost) often results in what
are called intangible benefits [4].
Intangible benefits include better
communication, cultivating a corporate culture of
respect, and other valuable variables that are
extremely difficult to measure. This difficulty brings
me to an axiom concerning how to choose what
metrics to measure.
Metrics will be Industry Specific
The metrics to measure whether D/I efforts have
affected an organization’s processes will be industry
specific. Simply put, when measuring the benefits of
a value-add initiative, the industry an organization
participates in will affect what could as a beneficial
and effective initiative.
• Service Industry: In the retail industry, for
example, having a customer focus and D/I
efforts in handling data may impact
customer satisfaction, and customer’s
perceptions surrounding an organization’s
CSR (corporate social responsibility).
• Education: In education, if D/I affect ease of
communication and transferring knowledge,
data points surrounding the effectiveness of
D/I educational developmental learning
outcomes
• Manufacturing: In agriculture, for example,
will measure whether productivity, or yield,
changes after initiatives have been
implemented.
• Production: In construction, theeffectiveness
of D/I efforts efficiencies and time spent on
a project
In short, when making a business case for
various D/I efforts, ensure that careful consideration
is spent in determining which metrics should be
tracked both before and after implementation.
“Determining relevant ways of measuring
progress may take some serious effort and
consultation with stakeholders.Metrics are
required to measure progress…” [16; ch 4].
Also, use specific metrics when tracking
progress towards an organizational goal. For example,
if your organization is in the service industry, then set
a goal related to customer satisfaction. Then, when
implementing an initiative, or change in policy or
procedure, the organization will find it easier to test
the effectiveness of policy changes.We now consider
one of the intangible variables discussed earlier in
this subsection and explain why diversifying an
organization’s IG group is important.
3.2 Communication& Varying Perspectives
“The IG approach to governance focuses not on
detailed IT or data capture and quality processes but
rather on controlling the information that is generated
by IT and office systems” [16; ch2].
Counter-intuitively, traditional IG board members –
executive sponsors, etc. - might not be in the best
positions to inform every IG policies. Who, then,
should help decide IG policies?
“Knowledge workers who work with records
and sensitive information in any capacity best
understand the nature and value of the records they
work with” [16; ch3]. Having diversity across job
levels, as well as identities, helps communication
between the IG policy board and other stakeholders
(i.e. employees).
Another difficult value to measure from D/I
efforts can be a benefit surrounding an organizational
culture of respect. To be clearer by what this means,
and how we might approach measuring changes in
corporate culture, we will elaborate on a
second-personal account of respect, which bridges
commonplace first-personal accounts, and a Nagel,
Kantian, third-personal account.
3.3 Respect
At this point, we have avoided discussing
moralistic arguments surrounding an imperative to
include D/I efforts in IG practice. We will first define
the concept of respect as requiring a second-personal
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 2 Issue 2 ǁ June 2017.
w w w . i j m r e t . o r g Page 5
standing towards another in the moral community,
which bridges a conceptual gap between
first-personal, agent relative, accounts and
third-personal, agent neutral, accounts. Our
second-personal stance will take into account the
cultural context of how culturally sensitive policies
are developed and implemented. Later, we will
suggestmeasuringan organization’s respect through
tracking metrics surrounding an organization’s
respect-centric practice and ownership of practices
indicative of corporate social responsibility (CSR).
In The Possibility of Altruism,Thomas Nagel
outlines a systematic, third-personal, account of
respect that does not rely on an agent’s desires or
sympathies. Nagel’s project is to construct an
altruism, “a considerateness for others”, that went
“beyond the reach of complicated reflections about
social advantage, and which does not require the
operation of any specific sentiment” [12;p.82]. His
aim is to create a universal formal principle that is
general in scope. He does this first by having us ask
the question “How would we like it if someone did
that to us?” which requires imagining ourselves being
victims, perhaps of violence or a rights violation.
“You would not only dislike it if someone else
treated you in that way; you would resent it. That
is, you would think that your plight gave the
other person a reason to terminate or modify his
contribution to it, and that failing to do so he was
acting contrary to reasons which were plainly
available to him” [12; p.83].
Although sympathy is not required, a
perspective-taking ability is necessary to recognize
the other person’s reality. What this ability also does
is it allow us to abstract our own interests in a
situation to being someone’s interests in that same
way that we can abstract another person’s interests
into also being someone’s interests. “His interests are
someone’s interests as much as yours are” [12; p.84].
Contrasting with the third-personal, agent neutral,
approach is a first-personal stance regarding
something as important. A very basic first-personal
account would include Simple Subjectivism. “The
simplest version of the theory is this: When a person
says that something is morally good or bad, this
means that he or she approves of that thing, or
disapproves of it, and nothing more” [14, p. 34]. This
stance means that whether someone evaluates
something as good or bad is wholly agent-relative.
However, a third option, besides first personal and
third personal accounts for evaluating the importance
of something, seems possible.
A second-personal relation considers how moral
agents stand in relation to one another. The obligation
a parent has in treating a child well does not stem
from a first-personal disposition that parent holds for
that particular-child. Otherwise, a parent could
reasonably discard their obligation simply by failing
to hold the disposition. The obligation a parent has in
treating a child well also does not stem from a
third-personal abstraction that any parent is obligated
to take care of any child. Rather, a second-personal
stance demonstrates that a particular-parent has an
obligation towards a particular-child precisely
because of the relation they stand with respect to that
particular-child.
Another example will illustrate the point. As I
eat my frozen strawberry ice cream cone, I do not
feel pleasure simply because I am a human eating ice
cream. I also do not feel pleasure from eating the ice
cream because I have a unique first personal stance.
The more accurate way to describe the situation
would be to consider that I stand in a unique relation
to this particular ice cream cone, second-personally.
By using second personal-relational accounts,
we can bridge the gap created by first-personal,
agent-relative, accounts of what is important and
third personal, agent neutral, accounts.
In our organizations, measuring engagement and
Likert-scaled assessments of stress, anxiety, and
lethargy may be appropriate. Other measurable
elements might include instances of workplace
conflict, the number of complaints, legal suits, and
turnover.
How we measure an organization’s progress
towards generating respect-centric practices can also
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 2 Issue 2 ǁ June 2017.
w w w . i j m r e t . o r g Page 6
be tracked by seeing whether a corporation
participates in corporate social responsibility (CSR)
practices and whethertheir operational and strategic
goals considerparticipation in the economic
marketplace as affecting social and environmental
facets.
Triple bottom line (TBL) is an accounting
method that ensures that decisions are made that
consider how an organization’s participation in one
area of our social world may impact another. TBL
framework can evaluate an organization’s
performance in operating in social, environmental, as
well as economic spaces.The following venn diagram
also indicates how each area (social, economic, and
environmental) overlaps to some degree and seeing
one’s interactions in the economic marketplace may
affect other areas important to human social
functioning [5].
We will now cover suggested changes for
current industry practices.
IV. Suggested changes for current
industry practices
In the following three sections, we present 3 cases
where changes D/I efforts affecting IG policy can be
tracked. Although there are many different industries,
we will focus on the healthcare industry, which is a
part of the service industry.
My descriptions surroundinghealthcare metrics to
track are generalizable and so may be used across
similar industries within the service industry. First,
we will discuss a change in how treatment options are
communicated.
4.1 Communication Changes
Case 1: Patient & Physician Transparency
Current Problem: Communication gaps between
communities and healthcare professionals.
Suggested Solution: Include professional interpreters
when collecting patient information and signatures of
consent.
Currently, there is no requirement to have a
professional interpreter present when signatures are
gathered and treatment options are relayed. Some
hospitals are insmall, fourty-bed, buildings and reside
in areas where professional interpreters are not
present.
A solution for smaller facilitaties that cannot
afford their own interpreters is to web-relay through a
health-centric community of practice, which
incorporates the emerging industry of Telemedicine.
Although emergency situations may arise, mitigating
circumstances may warrant reasonable adjustments to
professional practice standards.
In New Orleans, after hurricane Katrina, there
were only a few dozen mental health professionals
practicing for a city-wide population.For efficiency
sake, non-professional healthcare workers received
training and practiced until the city could recover.
Presumably, healthcare workers practicing within
their own communities will be in a better position to
be sensitive to culturally relevant features of target
populations in their community.
Return on Investment (ROI) on the effectiveness
of this diversity and culturally sensitive initiative can
be assessed by tracking patient satisfaction from
diverse populations relative to the hospital. Also, if
there is a reduction of legal complains concerning
informed consent and following treatments
instructions, the requirement may be considered
successful by all involved.
Tracking some of the metrics related to diversity
raise HIPAA concerns; however, if information is
given on a volunteer basis, concerns surrounding the
collection of data will be mitigated.
ROI: less complaints, less legal issues, and
greater patient satisfaction.
Next, we will discuss another healthcare
industry relatedIG practice change.
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 2 Issue 2 ǁ June 2017.
w w w . i j m r e t . o r g Page 7
4.2 Perspective-based Changes
Case 2: Transgendered Record-Keeping
Current Problem: Healthcare professionals use
gendered assumptions about the range of treatment
options.
Suggested Solution: include options for non-binary
gender patients in electronic records management
(ERM) practices.
Currently, there are no requirements for medical
record-keeping concerning gender preference.
However, at several hospital facilities surrounding the
Greater New Orleans area, LGBT (Lesbian, Gay, Bi,
and Transgender) complaints have risen in the past
year. Namely,transgendered patients are suggested to
select whether they are a man or woman, then their
sex partners are assumed to be the opposite.
Since STDs rates vary between sexes, which
tests are performed and suggested explanations for
symptoms are being misdiagnosed due to
assumptionssurrounding gender identification.
A solution would be to change how medical
records are kept and how data is used. By including
options for non-binary gender patients in electronic
records management (ERM) practices, patients may
have more useful conversations with their personal
care provider.
A concern can be raised about privacy; however,
HIPAA laws require privacy and security regulations
that can treat certain information as Protected Health
Information (PHI). Given that employers may use
information surrounding transgender status as
grounds for discrimination, accounting for sensitive,
yet health-treatment related, information falls under
PHI. As mentioned previously, a company
implementing an IG policy ought to consider all
stakeholders when forming a policy. Given that large
scale breaches of data are becoming more accessible,
ensuring patient confidentiality in safe ERM
practices is becoming an even more pressing issue
[13].
Measuring ROI on the effectiveness of this D/I
initiative can be tracked by seeing which physician
arepopularly attended by transgendered populations.
Similar to before, there are HIPAA concerns in terms
of tracking some of the metrics related to diversity,
unless information is volunteered.
Also, one way to track success is to look at the
initial negative consequences of bad IG policies and
see if there is a substantive change after
implementing the newer, D/I sensitive, IG policy. In
this case, we would check if there are less
misdiagnoses within the target population.
ROI: less complaints, greater patient satisfaction,
and less misdiagnoses.
Next, we will discuss another healthcare
industry related IG practice change.
4.3 Respect-oriented Changes
Case 3: Access to Healthcare Service Laws
Current Problem: Privately-owned hospitals may turn
away patients in non-emergency situations.
Suggested Solution: Impartial treatment in how we
handle data-driven decisions. Treat patients equally,
regardless of sexual orientation, beliefs, genetic
heritage, etc.
Currently, in the USA, “Public and private
hospitals alike are prohibited by law from denying a
patient care in an emergency. The Emergency
Medical and Treatment Labor Act (EMTLA) passed
by Congress in 1986 explicitly forbids the denial of
care to indigent or uninsured patients based on a lack
of ability to pay”; however, privately-owned hospitals
may turn away patients in a non-emergency [14].
Related to our second case, Protected Health
Information (PHI) needs to be secure and considered
whenever a hospital is developing their IG policy.
The Return on Investment (ROI) on the
effectiveness of this D/I initiative can be tracked by
seeing which physician is attended. Also, depending
on the demographics of the area, if changes in better
protected information leads to less complaints and a
greater patient pool of the target demographic.
ROI: less complaints and a greater patient pool
V. Hackathon
At Xavier University’s first annual Hackathon
(2017), We presented and won funding for two project
proposals: Health DAT &HealthyMind in the “access
to healthcare” and “behavioral health” categories
respectively. We will go over each before discussing
general business case presentation strategies.
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 2 Issue 2 ǁ June 2017.
w w w . i j m r e t . o r g Page 8
5.1 Hackathon Introduction
At Xavier University’s first annual Hackathon
(2017), I presented two project proposals: Health DAT
&HealthyMind in the “access to healthcare” and
“behavioral health” categories respectively. I will go
over each before discussing general business case
presentation strategies.
5.2 Health DAT
Health DAT is a rapid development E-learning
software tool that uses could-based computing and
connects healthcare workers who are working with
unique populations. Rather than developing cultural
sensitivity training for healthcare professionals
through laborious training development cycles,
Health DAT can support a community of practice that
connects healthcare workers across regions and give
them the tools they need to quickly inform other
healthcare workers.
Total costs would be around $50,000.00 in design,
development, and implementation costs. Revenue
will be generated from user subscriptions.
Possible funding avenues are the Texas Health
Institute, since they have previous partnered with
Region 6’s Public Health Partnership in the past.
This proposal won second-place At Xavier
University’s first annual Hackathon (2017) in the
category of “access to health.” Next, we will go over
another winning business proposal, HealthyMind.
5.3 HealthyMind
The United States is home to a long history of
support groups. Some use support groups for fighting
additions, depression, and other mental health issues.
Social Media tools are a great way for keeping others
in touch; however, those tools are underutilized
concerning mental health issues.
HealthyMind is a social media app that can
connect people to groups that will support them.
Whether someone is in a city on vacation or has just
moved to a city, HealthyMind can help. As opposed
to Facebook and other social media apps,
HealthyMind will also ensure user privacy by only
allowing avatars and generic identifiers of
individuals.
Startup-costs are around $100,000.00, including
two $20,000.00 server fees. Revenue will be
generated from pharmaceutical advertisements.
This proposal won first-place At Xavier
University’s first annual Hackathon (2017) in the
category of behavioral health.
VI. Conclusion
In conclusion, there are a lot of considerations
about how D/I initiatives impact IG best practices,
and the value that comes from those initiatives can go
beyond moral arguments. In other words, a business
case can be made for having culturally sensitive IG
policies.
Hackathons, such as the 2017 one at Xavier
University of Louisiana, can help organizations find
technology and information governance-based
solutions to industry problems. Although we have
focused on examples in healthcare, tracking the
effectiveness and ROI of D/I initiatives will depend
upon what type of industry an organization resides.
In tracking metrics, focusing on the ROI of D/I
initiatives presents challenges that typical initiatives
do not encounter, such as customer and patient
privacy, challenges related to the respect of persons,
and navigating complex discussions surrounding
organizational perspective-based changes. However,
this paper has provided a framework and suggestions
towards how to approach measuring and assessing
such initiatives.
VII. Acknowledgements
Brendan Moore is a philosopher and instructional
designer currently working on a leadership
development program at Ochsner Health Systems in
New Orleans, Louisiana. His background includes 7+
years of university medical ethics teaching at Ohio
University and several years of work in the area of
information technology, instructional technology, and
applied computing systems.
Dr. Syed Adeel Ahmedis a faculty member of
Division of Business at Xavier University of Louisiana
and Editorial Board member/Reviewer of UJEEE at
HRPUB.
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 2 Issue 2 ǁ June 2017.
w w w . i j m r e t . o r g Page 9
REFERENCES
[1] Brown, C., Deheyes, D., Hoffer, J., Martin, W.,
Perkins, W. Managing Information Technology
7th ed., Pearson Education, Inc., 2012.
[2] Charles M., Creary, S.J. Diversity and Inclusion:
Global Challenges and Opportunities, The
Conference Board, 2009.
[3] CIDI. What Gets Measured Gets Done:
Measuring the Return of Investment of Diversity
and Inclusion, Canadian Institute of Diversity
and Inclusion, 2013.
[4] Diversity Primer. The Diversity Scorecard:
Evaluating the Impact of Diversity on
Organizational Performance, 2004 & “The ROI
of Diversity and Inclusion”, Diversity Primer,
Diversity Best Practices, pp. 24-29, 2009.
http://www.diversitybestpractices.com/sites/dive
rsitybestpractices.com/files/import/embedded/an
chors/files/diversity_primer_chapter_02.pdf
[5] EcoTech, “What’s the Triple Bottom Line?”
EcoTech Institute, College for Renewable
Energy and Management, 2014.
https://www.ecotechinstitute.com/ecotech-news/
what-s-the-triple-bottom-line
[6] EDRM.net, “IGRM IT Viewpoint” EDRM Duke
Law, March 31, 2015.
http://www.edrm.net/papers/igrm-it-viewpoint/
[7] FreeAdvice staff, “Can hospitals turn away
patients?” law.freeadvice.com, 2017.
http://law.freeadvice.com/malpractice_law/hosp
ital_malpractice/hospital-patients.htm
[8] Heizer, J.; Render, B. Operations Management:
10th Edition, Pearson Education Inc, 2011.
[9] Hoffman, S., Lane, R., Posner, D., Nagel, M.
“Measurement: Proving the ROI of Global
Diversity and Inclusion Efforts” Global
Diversity Primer, Diversity Best Practices, 2013.
http://www.cisco.com/c/dam/en_us/about/ac49/
ac55/docs/Global_Diversity_Primer_Cisco_Cha
pter.pdf
[10] Hubbard, E. The Business Case for Diversity,
Hubbard and Hubbard Inc., 2009.
http://multiculturaladvantage.com/recruit/metric
s/The-Business-Case-for-Diversity.asp
[11] Hubbard, E. Measuring the Value and Impact of
Workforce Diversity, Oregon Executive Forum,
2005.
http://www.executiveforum.com/PDFs/e_hubba
rd.pdf
[12] Nagel, T., The Possibility of Altruism, Clarendon
Press, Oxford, 1970.
[13] Perlroth, N., Sanger, D.E. “Hackers Hit Dozens
of Countries Exploiting Stolen N.S.A. Tool” NY
Times, 2017.
https://www.nytimes.com/2017/05/12/world/eur
ope/uk-national-health-service-cyberattack.html
?_r=0
[14] Rachels, J., The Elements of Moral Philosophy:
7th
edition, McGraw Hill Companies, Inc. New
York, 2012.
[15] Rezvani, S. “Five Trends Driving Workplace
Diversity in 2015” Forbes, 2015.
https://www.forbes.com/sites/work-in-progress/
2015/02/03/20768/#39c35b776490
[16] Smallwood, R.F., Information Governance:
Concepts, Strategies, and Best Practices, Wiley
CIO Series, April, 2014.

Contenu connexe

Tendances

2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee StudyHiten Sethi
 
Conceptualizing Information Technology Governance Model for Higher Education:...
Conceptualizing Information Technology Governance Model for Higher Education:...Conceptualizing Information Technology Governance Model for Higher Education:...
Conceptualizing Information Technology Governance Model for Higher Education:...journalBEEI
 
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...IJNSA Journal
 
Establishing an information governance program
Establishing an information governance programEstablishing an information governance program
Establishing an information governance programLouise Spiteri
 
Information governance presentation
Information governance   presentationInformation governance   presentation
Information governance presentationIgor Swann
 
Securing Cloud Computing Through IT Governance
Securing Cloud Computing Through IT GovernanceSecuring Cloud Computing Through IT Governance
Securing Cloud Computing Through IT GovernanceITIIIndustries
 
Protecting business interests with policies for it asset management it-tool...
Protecting business interests with policies for it asset management   it-tool...Protecting business interests with policies for it asset management   it-tool...
Protecting business interests with policies for it asset management it-tool...IT-Toolkits.org
 
Planning Information Governance and Litigation Readiness
Planning Information Governance and Litigation ReadinessPlanning Information Governance and Litigation Readiness
Planning Information Governance and Litigation ReadinessRich Medina
 
Scenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information govScenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information govAKHIL969626
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionCapgemini
 
Boosting Cybersecurity with Data Governance (peer reviewed)
Boosting Cybersecurity with Data Governance (peer reviewed)Boosting Cybersecurity with Data Governance (peer reviewed)
Boosting Cybersecurity with Data Governance (peer reviewed)Guy Pearce
 
Challenges & Benefits In Creating An Information Governance Program
Challenges & Benefits In Creating An Information Governance ProgramChallenges & Benefits In Creating An Information Governance Program
Challenges & Benefits In Creating An Information Governance ProgramKevin Nugent
 
Developing Metrics for Information Security Governance
Developing Metrics for Information Security GovernanceDeveloping Metrics for Information Security Governance
Developing Metrics for Information Security Governancedigitallibrary
 
Running head organizational information system1 organizational
Running head organizational information system1 organizational Running head organizational information system1 organizational
Running head organizational information system1 organizational AKHIL969626
 
The Whole is Greater than the Sum of its Parts with IG
The Whole is Greater than the Sum of its Parts with IGThe Whole is Greater than the Sum of its Parts with IG
The Whole is Greater than the Sum of its Parts with IGRonke Ekwensi
 

Tendances (20)

2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
Conceptualizing Information Technology Governance Model for Higher Education:...
Conceptualizing Information Technology Governance Model for Higher Education:...Conceptualizing Information Technology Governance Model for Higher Education:...
Conceptualizing Information Technology Governance Model for Higher Education:...
 
Task 2
Task 2Task 2
Task 2
 
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...
A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FE...
 
task 1
task 1task 1
task 1
 
Establishing an information governance program
Establishing an information governance programEstablishing an information governance program
Establishing an information governance program
 
Information governance presentation
Information governance   presentationInformation governance   presentation
Information governance presentation
 
Securing Cloud Computing Through IT Governance
Securing Cloud Computing Through IT GovernanceSecuring Cloud Computing Through IT Governance
Securing Cloud Computing Through IT Governance
 
Protecting business interests with policies for it asset management it-tool...
Protecting business interests with policies for it asset management   it-tool...Protecting business interests with policies for it asset management   it-tool...
Protecting business interests with policies for it asset management it-tool...
 
Planning Information Governance and Litigation Readiness
Planning Information Governance and Litigation ReadinessPlanning Information Governance and Litigation Readiness
Planning Information Governance and Litigation Readiness
 
Scenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information govScenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information gov
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer Satisfaction
 
Boosting Cybersecurity with Data Governance (peer reviewed)
Boosting Cybersecurity with Data Governance (peer reviewed)Boosting Cybersecurity with Data Governance (peer reviewed)
Boosting Cybersecurity with Data Governance (peer reviewed)
 
Challenges & Benefits In Creating An Information Governance Program
Challenges & Benefits In Creating An Information Governance ProgramChallenges & Benefits In Creating An Information Governance Program
Challenges & Benefits In Creating An Information Governance Program
 
Developing Metrics for Information Security Governance
Developing Metrics for Information Security GovernanceDeveloping Metrics for Information Security Governance
Developing Metrics for Information Security Governance
 
Running head organizational information system1 organizational
Running head organizational information system1 organizational Running head organizational information system1 organizational
Running head organizational information system1 organizational
 
The Whole is Greater than the Sum of its Parts with IG
The Whole is Greater than the Sum of its Parts with IGThe Whole is Greater than the Sum of its Parts with IG
The Whole is Greater than the Sum of its Parts with IG
 

Similaire à Return on Investment of Diversity and Inclusion Initiatives in Information Governance

71 Information Governance Policy Development .docx
71 Information Governance Policy Development      .docx71 Information Governance Policy Development      .docx
71 Information Governance Policy Development .docxsleeperharwell
 
Information governance a_necessity_in_to
Information governance a_necessity_in_toInformation governance a_necessity_in_to
Information governance a_necessity_in_toAnne ndolo
 
Health Information Governance Analysis
Health Information Governance AnalysisHealth Information Governance Analysis
Health Information Governance AnalysisKaty Allen
 
An Empirical Study on the information systems in the Moroccan organizations: ...
An Empirical Study on the information systems in the Moroccan organizations: ...An Empirical Study on the information systems in the Moroccan organizations: ...
An Empirical Study on the information systems in the Moroccan organizations: ...INFOGAIN PUBLICATION
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docxMargenePurnell14
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docxbagotjesusa
 
empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...INFOGAIN PUBLICATION
 
Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkIJCSIS Research Publications
 
13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy
13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy
13 Top GRC Tools for an Integrated Governance, Risk and Compliance StrategyQuekelsBaro
 
The impact of the digital era on the implementation of lean six sigma
The impact of the digital era on the implementation of lean six sigmaThe impact of the digital era on the implementation of lean six sigma
The impact of the digital era on the implementation of lean six sigmaUduakLuke
 
Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...CSITiaesprime
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft CorpAntoinette Williams
 
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfkimangeloullero
 
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...ijait
 
Project Organizational Responsibility Model - ORM
Project Organizational Responsibility Model -  ORMProject Organizational Responsibility Model -  ORM
Project Organizational Responsibility Model - ORMGuttenberg Ferreira Passos
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...Finni Rice
 

Similaire à Return on Investment of Diversity and Inclusion Initiatives in Information Governance (20)

71 Information Governance Policy Development .docx
71 Information Governance Policy Development      .docx71 Information Governance Policy Development      .docx
71 Information Governance Policy Development .docx
 
Information governance a_necessity_in_to
Information governance a_necessity_in_toInformation governance a_necessity_in_to
Information governance a_necessity_in_to
 
S36169184
S36169184S36169184
S36169184
 
Health Information Governance Analysis
Health Information Governance AnalysisHealth Information Governance Analysis
Health Information Governance Analysis
 
An Empirical Study on the information systems in the Moroccan organizations: ...
An Empirical Study on the information systems in the Moroccan organizations: ...An Empirical Study on the information systems in the Moroccan organizations: ...
An Empirical Study on the information systems in the Moroccan organizations: ...
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
 
empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...
 
Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance Framework
 
13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy
13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy
13 Top GRC Tools for an Integrated Governance, Risk and Compliance Strategy
 
The impact of the digital era on the implementation of lean six sigma
The impact of the digital era on the implementation of lean six sigmaThe impact of the digital era on the implementation of lean six sigma
The impact of the digital era on the implementation of lean six sigma
 
Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft Corp
 
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdf
 
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...
 
Project Organizational Responsibility Model - ORM
Project Organizational Responsibility Model -  ORMProject Organizational Responsibility Model -  ORM
Project Organizational Responsibility Model - ORM
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
 

Plus de International Journal of Modern Research in Engineering and Technology

Plus de International Journal of Modern Research in Engineering and Technology (20)

Numerical Simulations of the Bond Stress-Slip Effect of Reinforced Concrete o...
Numerical Simulations of the Bond Stress-Slip Effect of Reinforced Concrete o...Numerical Simulations of the Bond Stress-Slip Effect of Reinforced Concrete o...
Numerical Simulations of the Bond Stress-Slip Effect of Reinforced Concrete o...
 
Building an integrated vertical chain - a factor for sustainable construction
Building an integrated vertical chain - a factor for sustainable constructionBuilding an integrated vertical chain - a factor for sustainable construction
Building an integrated vertical chain - a factor for sustainable construction
 
Applicability Study on the Optical Remote Sensing Techniques in a River
Applicability Study on the Optical Remote Sensing Techniques in a RiverApplicability Study on the Optical Remote Sensing Techniques in a River
Applicability Study on the Optical Remote Sensing Techniques in a River
 
There is Always A Better Way: The Argument for Industrial Engineering
There is Always A Better Way: The Argument for Industrial EngineeringThere is Always A Better Way: The Argument for Industrial Engineering
There is Always A Better Way: The Argument for Industrial Engineering
 
Study on the LandCover Classification using UAV Imagery
Study on the LandCover Classification using UAV ImageryStudy on the LandCover Classification using UAV Imagery
Study on the LandCover Classification using UAV Imagery
 
Comparative Analysis between Five Level Conventional and Modified Cascaded H-...
Comparative Analysis between Five Level Conventional and Modified Cascaded H-...Comparative Analysis between Five Level Conventional and Modified Cascaded H-...
Comparative Analysis between Five Level Conventional and Modified Cascaded H-...
 
Cytotoxicity Studies of TiO2/ZnO Nanocomposites on Cervical Cancer Cells
Cytotoxicity Studies of TiO2/ZnO Nanocomposites on Cervical Cancer CellsCytotoxicity Studies of TiO2/ZnO Nanocomposites on Cervical Cancer Cells
Cytotoxicity Studies of TiO2/ZnO Nanocomposites on Cervical Cancer Cells
 
Investigation of Performance Properties of Graphene Coated Fabrics
Investigation of Performance Properties of Graphene Coated FabricsInvestigation of Performance Properties of Graphene Coated Fabrics
Investigation of Performance Properties of Graphene Coated Fabrics
 
Effects of bagasse ash additive on the physiochemical and biological paramete...
Effects of bagasse ash additive on the physiochemical and biological paramete...Effects of bagasse ash additive on the physiochemical and biological paramete...
Effects of bagasse ash additive on the physiochemical and biological paramete...
 
Production and Analysis of Bioresin From Mango (Mangifera Indica) Kernel Oil
Production and Analysis of Bioresin From Mango (Mangifera Indica) Kernel OilProduction and Analysis of Bioresin From Mango (Mangifera Indica) Kernel Oil
Production and Analysis of Bioresin From Mango (Mangifera Indica) Kernel Oil
 
Particle Swarm Optimization Algorithm Based Window Function Design
Particle Swarm Optimization Algorithm Based Window Function DesignParticle Swarm Optimization Algorithm Based Window Function Design
Particle Swarm Optimization Algorithm Based Window Function Design
 
Computed Tomography Image Reconstruction in 3D VoxelSpace
Computed Tomography Image Reconstruction in 3D VoxelSpaceComputed Tomography Image Reconstruction in 3D VoxelSpace
Computed Tomography Image Reconstruction in 3D VoxelSpace
 
Antimicrobial Activity of Capsicum Essential Oil of Peppers
Antimicrobial Activity of Capsicum Essential Oil of PeppersAntimicrobial Activity of Capsicum Essential Oil of Peppers
Antimicrobial Activity of Capsicum Essential Oil of Peppers
 
Design of Window Function in LABVIEW Environment
Design of Window Function in LABVIEW EnvironmentDesign of Window Function in LABVIEW Environment
Design of Window Function in LABVIEW Environment
 
A study of the temporal flow of passenger and cargo transport in a Brazilian ...
A study of the temporal flow of passenger and cargo transport in a Brazilian ...A study of the temporal flow of passenger and cargo transport in a Brazilian ...
A study of the temporal flow of passenger and cargo transport in a Brazilian ...
 
Determination of Linear Absorption Coefficient for Different Materials
Determination of Linear Absorption Coefficient for Different MaterialsDetermination of Linear Absorption Coefficient for Different Materials
Determination of Linear Absorption Coefficient for Different Materials
 
Evaluation of Naturally Occurring Radionuclide in Soil Samples from Ajiwei Mi...
Evaluation of Naturally Occurring Radionuclide in Soil Samples from Ajiwei Mi...Evaluation of Naturally Occurring Radionuclide in Soil Samples from Ajiwei Mi...
Evaluation of Naturally Occurring Radionuclide in Soil Samples from Ajiwei Mi...
 
Kinematics Modeling and Simulation of SCARA Robot Arm
Kinematics Modeling and Simulation of SCARA Robot ArmKinematics Modeling and Simulation of SCARA Robot Arm
Kinematics Modeling and Simulation of SCARA Robot Arm
 
Air and Moisture Permeability of Textiles
Air and Moisture Permeability of TextilesAir and Moisture Permeability of Textiles
Air and Moisture Permeability of Textiles
 
Strength and durability assessment of concrete substructure in organic and hy...
Strength and durability assessment of concrete substructure in organic and hy...Strength and durability assessment of concrete substructure in organic and hy...
Strength and durability assessment of concrete substructure in organic and hy...
 

Dernier

Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsapna80328
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
Industrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsIndustrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsAlirezaBagherian3
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 

Dernier (20)

Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveying
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
Industrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsIndustrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal Compressors
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 

Return on Investment of Diversity and Inclusion Initiatives in Information Governance

  • 1. International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 2 Issue 2 ǁ June 2017. w w w . i j m r e t . o r g Page 1 Return on Investment of Diversity and Inclusion Initiatives in Information Governance Brendan James Moore, MA & Dr. Syed Adeel Ahmed School of Professional Advancement, 800 E Commerce Rd., Tulane University, Elmwood, 70123, Louisiana, United States Xavier University of Louisiana, 1 Drexel Drive, New Orleans, 70125, Louisiana, United States Abstract Over the past several years, companies are pairing diversity efforts with inclusion initiatives and roles surrounding innovations that promote diversity of thought [13]. However, much return on investment (ROI) focus has been on business and corporate functioning in general, but not on specifics related to information governance (IG). We address this research gap byconsidering various return on investment (ROI) metrics and what might ground the benefits of diversity and inclusion initiatives related to IG policy. Then, wesuggest what the results mean in terms of changing and influencing current industry practices. Keywords:Diversity and Inclusion, D/I, Information GovernanceIG, RiskManagement, RM,Return on Investment, ROI, Hackathon, LGBT, Electronic Records Management, ERM, HIPAA,triple bottom line (TBL), Corporate Social Responsibility (CSR). I. Introduction Over the past several years, companies are pairing diversity efforts with inclusion initiatives and roles surrounding innovations that promote diversity of thought [13]. However, much return on investment (ROI) focus has been on business and corporate functioning in general, but not on specifics related to information governance (IG) practices. Scarceresearchexists on how to measure the ROI of diversity and inclusion (D/I) initiatives, let alone in the context of information governance policy creation, so a research gap exists. The following questions arise naturally from this research gap, and answering them requires careful considerations surrounding current IG practices. Problem Statements in the form of Questions: 1. How do D/I efforts relate to current industry IG best practices? 2. How can previously unsought D/I initiatives relating to IG provide business opportunities and new solutions to current problems? Methodology: The primary research method for this study is literature review, followed by conceptual analysis. Some of the suggestions were inspired by Xavier University of Louisiana’s 2017 first annual Hackathon, which has teams develop technology-oriented innovations to try to solve problems that arise in the healthcare industry. In this paper, we first explore what diversity means in the context of information governance. Then, we consider various ROI metrics and what might ground the benefits of D/I initiatives related to information governance(IG). Finally, we suggest what the results mean in terms of changing and influencing current healthcare industry best practices. II. What does diversity mean in the context of information governance? Whenexploring what diversity means in the context of information governance, we ought to start by clearly defining our terms. We will begin by defining information governance, in general, followed by an outline of IG best practices,and ending on defining three types of diversity. By initially defining these terms and practices,we will avoid confusion later when wesuggest changes to IG best practices and discuss specifics surrounding whichmetrics are appropriate to track in assessing ROI. 2.1 Information Governance There are many ways people have defined
  • 2. International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 2 Issue 2 ǁ June 2017. w w w . i j m r e t . o r g Page 2 information governance. For our purposes, we will refer to the Association of Records Mangers and Administrators (ARMA) definition. According to the Association of Records Managers and Administrators (ARMA), IG is “a strategic framework composed of standards, processes, roles, and metrics that hold organizations and individuals accountable to create, organize, secure, maintain, use, and dispose of information in ways that align with and contribute to the organization’s goals” [16]. The above definition is clear and provides a broad enough description to encompass a variety of practices surrounding the managing of information, storage, and disposal. Next, we will briefly cover 25 best IG-related practices. 2.2 Current IG Best Practices “The following is a list of 25 IG best practices: 1. IG is a key underpinning for a successful records management(RM) program. 2. IG is not a project but rather an ongoing program. 3. Using an IG framework or maturity model is helpful in assessing and guiding IG programs. 4. Defensible deletion of data debris and information that no longer has value is critical in the era of Big Data. 5. IG policies must be developed before enabling technologies are deployed to assist in enforcement. 6. To provide comprehensive e-document security throughout a document’s life cycle, documents must be secured upon creation using highly sophisticated technologies, such as information rights management (IRM) technology. 7. A records retention schedule and legal hold notification (LHN) process are the two primary elements of a fundamental IG program. 8. A cross-functional team is required to implement IG. 9. The first step in information risk planning is to consider the applicable laws and regulations that apply to your organization in the jurisdiction in which it conducts business. 10. Developing a risk profile is a basic building block in enterprise risk management, which assists executives in understanding the risks associated with stated business objectives and in allocating resources within a structured evaluation approach or framework. 11. An information risk mitigation plan is a critical part of the IG planning process. 12. Proper metrics are required to measure the conformance and performance of your IG program. 13. IG programs must be audited for effectiveness. 14. An enterprise wide retention schedule is preferable, because it eliminates the possibility that different business units will have conflicting records retention periods. 15. Senior management must set the tone and lead sponsorship for vital records program governance and compliance. 16. Business processes must be redesigned to improve and optimize the management and security of information and especially the most critical of information, electronic records, before implementing enabling technologies. 17. E-mail messages, both inbound and outbound, should be archived automatically and (preferably) in real time. 18. Personal archiving of e-mail messages should be disallowed. 19. Destructive retention of e-mail helps to reduce storage costs and legal risk, while improving “findability” of critical records. 20. Take a practical approach and limit cloud use to documents that do not have long retention periods and carry a low litigation risk.
  • 3. International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 2 Issue 2 ǁ June 2017. w w w . i j m r e t . o r g Page 3 21. Manage social media content by IG policies and monitor it with controls that ensure protection of critical information assets and preservation of business records. 22. International and national standards provide effective guidance for implementing IG. 23. Creating standardized metadata terms should be a part of an IG effort that enables faster, more complete, and more accurate searches and retrieval of records. 24. Some digital information assets must be preserved permanently as part of an ongoing organization’s documentary heritage. 25. Executive sponsorship is crucial” [16; ch5] 2.3Types of Diversity In this section, we will cover several types of diversity that should be taken into consideration when forming, maintaining, and implementing IG policies. 2.3.1 Diverse Roles Ensuring the IG policies are brought about through a diverse group that accounts for all stakeholders is important.“There are no set requirements or formulas for making up your IG team… You will need representatives from different departments -Absolutes include:” [16; ch5]. • IT (info. Technology) departments • Legal staff • Executive sponsor • SRO (senior records officer) • Risk management specialist or manager • IG Program managers When making an IG team, ensuring that inputs are gathered from a variety of sources is important. “Other inputs can be in the form of managers of human resources, company communications, IT security, agency archivists, business analysts, chief security officers, financial analysts, and others” [16; ch5]. 2.3.2Diverse Identities IG best practice #8 described in section 2.2 suggests that cross-functional teams are important in forming IG policy. TheInformation Governance Reference Model (IGRM) represents a process for IG policy integration that recognizes and considers a variety of stakeholders [6]. Although diversifying roles when making IG policy will help mitigate risk, ensuring that a diversified set of identities and stakeholders are involved is as essential. “The IGRM is aimed at fostering IG adoption by facilitating communication and collaboration between disparate IG stakeholder functions, including IT, legal, RM, risk management, and business units’ stakeholders” [16; ch6] Information Governance Reference Model (IGRM) [6; http://www.edrm.net/papers/igrm-it-viewpoint/] Next, we consider metric selection and how the best metrics to track will be contextualized not only to the needs of an IG program but dependent upon the industry, or area, an organization operates. III. Grounding various benefits of D/I initiatives 3.1 Assessing Metrics We should ask ourselves, “Is this metric a fair application and a fair development of what you’re looking for?... If you can’t prove to them your worth, it’s hard for them to see you as integral to the company” [4]. One difficulty in finding research on the
  • 4. International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 2 Issue 2 ǁ June 2017. w w w . i j m r e t . o r g Page 4 effectiveness of D/I initiatives is that many times companies will conduct internal research using their own metrics and not share results publically. Another reason is that many times, the value (which considers more than mere financial cost) often results in what are called intangible benefits [4]. Intangible benefits include better communication, cultivating a corporate culture of respect, and other valuable variables that are extremely difficult to measure. This difficulty brings me to an axiom concerning how to choose what metrics to measure. Metrics will be Industry Specific The metrics to measure whether D/I efforts have affected an organization’s processes will be industry specific. Simply put, when measuring the benefits of a value-add initiative, the industry an organization participates in will affect what could as a beneficial and effective initiative. • Service Industry: In the retail industry, for example, having a customer focus and D/I efforts in handling data may impact customer satisfaction, and customer’s perceptions surrounding an organization’s CSR (corporate social responsibility). • Education: In education, if D/I affect ease of communication and transferring knowledge, data points surrounding the effectiveness of D/I educational developmental learning outcomes • Manufacturing: In agriculture, for example, will measure whether productivity, or yield, changes after initiatives have been implemented. • Production: In construction, theeffectiveness of D/I efforts efficiencies and time spent on a project In short, when making a business case for various D/I efforts, ensure that careful consideration is spent in determining which metrics should be tracked both before and after implementation. “Determining relevant ways of measuring progress may take some serious effort and consultation with stakeholders.Metrics are required to measure progress…” [16; ch 4]. Also, use specific metrics when tracking progress towards an organizational goal. For example, if your organization is in the service industry, then set a goal related to customer satisfaction. Then, when implementing an initiative, or change in policy or procedure, the organization will find it easier to test the effectiveness of policy changes.We now consider one of the intangible variables discussed earlier in this subsection and explain why diversifying an organization’s IG group is important. 3.2 Communication& Varying Perspectives “The IG approach to governance focuses not on detailed IT or data capture and quality processes but rather on controlling the information that is generated by IT and office systems” [16; ch2]. Counter-intuitively, traditional IG board members – executive sponsors, etc. - might not be in the best positions to inform every IG policies. Who, then, should help decide IG policies? “Knowledge workers who work with records and sensitive information in any capacity best understand the nature and value of the records they work with” [16; ch3]. Having diversity across job levels, as well as identities, helps communication between the IG policy board and other stakeholders (i.e. employees). Another difficult value to measure from D/I efforts can be a benefit surrounding an organizational culture of respect. To be clearer by what this means, and how we might approach measuring changes in corporate culture, we will elaborate on a second-personal account of respect, which bridges commonplace first-personal accounts, and a Nagel, Kantian, third-personal account. 3.3 Respect At this point, we have avoided discussing moralistic arguments surrounding an imperative to include D/I efforts in IG practice. We will first define the concept of respect as requiring a second-personal
  • 5. International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 2 Issue 2 ǁ June 2017. w w w . i j m r e t . o r g Page 5 standing towards another in the moral community, which bridges a conceptual gap between first-personal, agent relative, accounts and third-personal, agent neutral, accounts. Our second-personal stance will take into account the cultural context of how culturally sensitive policies are developed and implemented. Later, we will suggestmeasuringan organization’s respect through tracking metrics surrounding an organization’s respect-centric practice and ownership of practices indicative of corporate social responsibility (CSR). In The Possibility of Altruism,Thomas Nagel outlines a systematic, third-personal, account of respect that does not rely on an agent’s desires or sympathies. Nagel’s project is to construct an altruism, “a considerateness for others”, that went “beyond the reach of complicated reflections about social advantage, and which does not require the operation of any specific sentiment” [12;p.82]. His aim is to create a universal formal principle that is general in scope. He does this first by having us ask the question “How would we like it if someone did that to us?” which requires imagining ourselves being victims, perhaps of violence or a rights violation. “You would not only dislike it if someone else treated you in that way; you would resent it. That is, you would think that your plight gave the other person a reason to terminate or modify his contribution to it, and that failing to do so he was acting contrary to reasons which were plainly available to him” [12; p.83]. Although sympathy is not required, a perspective-taking ability is necessary to recognize the other person’s reality. What this ability also does is it allow us to abstract our own interests in a situation to being someone’s interests in that same way that we can abstract another person’s interests into also being someone’s interests. “His interests are someone’s interests as much as yours are” [12; p.84]. Contrasting with the third-personal, agent neutral, approach is a first-personal stance regarding something as important. A very basic first-personal account would include Simple Subjectivism. “The simplest version of the theory is this: When a person says that something is morally good or bad, this means that he or she approves of that thing, or disapproves of it, and nothing more” [14, p. 34]. This stance means that whether someone evaluates something as good or bad is wholly agent-relative. However, a third option, besides first personal and third personal accounts for evaluating the importance of something, seems possible. A second-personal relation considers how moral agents stand in relation to one another. The obligation a parent has in treating a child well does not stem from a first-personal disposition that parent holds for that particular-child. Otherwise, a parent could reasonably discard their obligation simply by failing to hold the disposition. The obligation a parent has in treating a child well also does not stem from a third-personal abstraction that any parent is obligated to take care of any child. Rather, a second-personal stance demonstrates that a particular-parent has an obligation towards a particular-child precisely because of the relation they stand with respect to that particular-child. Another example will illustrate the point. As I eat my frozen strawberry ice cream cone, I do not feel pleasure simply because I am a human eating ice cream. I also do not feel pleasure from eating the ice cream because I have a unique first personal stance. The more accurate way to describe the situation would be to consider that I stand in a unique relation to this particular ice cream cone, second-personally. By using second personal-relational accounts, we can bridge the gap created by first-personal, agent-relative, accounts of what is important and third personal, agent neutral, accounts. In our organizations, measuring engagement and Likert-scaled assessments of stress, anxiety, and lethargy may be appropriate. Other measurable elements might include instances of workplace conflict, the number of complaints, legal suits, and turnover. How we measure an organization’s progress towards generating respect-centric practices can also
  • 6. International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 2 Issue 2 ǁ June 2017. w w w . i j m r e t . o r g Page 6 be tracked by seeing whether a corporation participates in corporate social responsibility (CSR) practices and whethertheir operational and strategic goals considerparticipation in the economic marketplace as affecting social and environmental facets. Triple bottom line (TBL) is an accounting method that ensures that decisions are made that consider how an organization’s participation in one area of our social world may impact another. TBL framework can evaluate an organization’s performance in operating in social, environmental, as well as economic spaces.The following venn diagram also indicates how each area (social, economic, and environmental) overlaps to some degree and seeing one’s interactions in the economic marketplace may affect other areas important to human social functioning [5]. We will now cover suggested changes for current industry practices. IV. Suggested changes for current industry practices In the following three sections, we present 3 cases where changes D/I efforts affecting IG policy can be tracked. Although there are many different industries, we will focus on the healthcare industry, which is a part of the service industry. My descriptions surroundinghealthcare metrics to track are generalizable and so may be used across similar industries within the service industry. First, we will discuss a change in how treatment options are communicated. 4.1 Communication Changes Case 1: Patient & Physician Transparency Current Problem: Communication gaps between communities and healthcare professionals. Suggested Solution: Include professional interpreters when collecting patient information and signatures of consent. Currently, there is no requirement to have a professional interpreter present when signatures are gathered and treatment options are relayed. Some hospitals are insmall, fourty-bed, buildings and reside in areas where professional interpreters are not present. A solution for smaller facilitaties that cannot afford their own interpreters is to web-relay through a health-centric community of practice, which incorporates the emerging industry of Telemedicine. Although emergency situations may arise, mitigating circumstances may warrant reasonable adjustments to professional practice standards. In New Orleans, after hurricane Katrina, there were only a few dozen mental health professionals practicing for a city-wide population.For efficiency sake, non-professional healthcare workers received training and practiced until the city could recover. Presumably, healthcare workers practicing within their own communities will be in a better position to be sensitive to culturally relevant features of target populations in their community. Return on Investment (ROI) on the effectiveness of this diversity and culturally sensitive initiative can be assessed by tracking patient satisfaction from diverse populations relative to the hospital. Also, if there is a reduction of legal complains concerning informed consent and following treatments instructions, the requirement may be considered successful by all involved. Tracking some of the metrics related to diversity raise HIPAA concerns; however, if information is given on a volunteer basis, concerns surrounding the collection of data will be mitigated. ROI: less complaints, less legal issues, and greater patient satisfaction. Next, we will discuss another healthcare industry relatedIG practice change.
  • 7. International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 2 Issue 2 ǁ June 2017. w w w . i j m r e t . o r g Page 7 4.2 Perspective-based Changes Case 2: Transgendered Record-Keeping Current Problem: Healthcare professionals use gendered assumptions about the range of treatment options. Suggested Solution: include options for non-binary gender patients in electronic records management (ERM) practices. Currently, there are no requirements for medical record-keeping concerning gender preference. However, at several hospital facilities surrounding the Greater New Orleans area, LGBT (Lesbian, Gay, Bi, and Transgender) complaints have risen in the past year. Namely,transgendered patients are suggested to select whether they are a man or woman, then their sex partners are assumed to be the opposite. Since STDs rates vary between sexes, which tests are performed and suggested explanations for symptoms are being misdiagnosed due to assumptionssurrounding gender identification. A solution would be to change how medical records are kept and how data is used. By including options for non-binary gender patients in electronic records management (ERM) practices, patients may have more useful conversations with their personal care provider. A concern can be raised about privacy; however, HIPAA laws require privacy and security regulations that can treat certain information as Protected Health Information (PHI). Given that employers may use information surrounding transgender status as grounds for discrimination, accounting for sensitive, yet health-treatment related, information falls under PHI. As mentioned previously, a company implementing an IG policy ought to consider all stakeholders when forming a policy. Given that large scale breaches of data are becoming more accessible, ensuring patient confidentiality in safe ERM practices is becoming an even more pressing issue [13]. Measuring ROI on the effectiveness of this D/I initiative can be tracked by seeing which physician arepopularly attended by transgendered populations. Similar to before, there are HIPAA concerns in terms of tracking some of the metrics related to diversity, unless information is volunteered. Also, one way to track success is to look at the initial negative consequences of bad IG policies and see if there is a substantive change after implementing the newer, D/I sensitive, IG policy. In this case, we would check if there are less misdiagnoses within the target population. ROI: less complaints, greater patient satisfaction, and less misdiagnoses. Next, we will discuss another healthcare industry related IG practice change. 4.3 Respect-oriented Changes Case 3: Access to Healthcare Service Laws Current Problem: Privately-owned hospitals may turn away patients in non-emergency situations. Suggested Solution: Impartial treatment in how we handle data-driven decisions. Treat patients equally, regardless of sexual orientation, beliefs, genetic heritage, etc. Currently, in the USA, “Public and private hospitals alike are prohibited by law from denying a patient care in an emergency. The Emergency Medical and Treatment Labor Act (EMTLA) passed by Congress in 1986 explicitly forbids the denial of care to indigent or uninsured patients based on a lack of ability to pay”; however, privately-owned hospitals may turn away patients in a non-emergency [14]. Related to our second case, Protected Health Information (PHI) needs to be secure and considered whenever a hospital is developing their IG policy. The Return on Investment (ROI) on the effectiveness of this D/I initiative can be tracked by seeing which physician is attended. Also, depending on the demographics of the area, if changes in better protected information leads to less complaints and a greater patient pool of the target demographic. ROI: less complaints and a greater patient pool V. Hackathon At Xavier University’s first annual Hackathon (2017), We presented and won funding for two project proposals: Health DAT &HealthyMind in the “access to healthcare” and “behavioral health” categories respectively. We will go over each before discussing general business case presentation strategies.
  • 8. International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 2 Issue 2 ǁ June 2017. w w w . i j m r e t . o r g Page 8 5.1 Hackathon Introduction At Xavier University’s first annual Hackathon (2017), I presented two project proposals: Health DAT &HealthyMind in the “access to healthcare” and “behavioral health” categories respectively. I will go over each before discussing general business case presentation strategies. 5.2 Health DAT Health DAT is a rapid development E-learning software tool that uses could-based computing and connects healthcare workers who are working with unique populations. Rather than developing cultural sensitivity training for healthcare professionals through laborious training development cycles, Health DAT can support a community of practice that connects healthcare workers across regions and give them the tools they need to quickly inform other healthcare workers. Total costs would be around $50,000.00 in design, development, and implementation costs. Revenue will be generated from user subscriptions. Possible funding avenues are the Texas Health Institute, since they have previous partnered with Region 6’s Public Health Partnership in the past. This proposal won second-place At Xavier University’s first annual Hackathon (2017) in the category of “access to health.” Next, we will go over another winning business proposal, HealthyMind. 5.3 HealthyMind The United States is home to a long history of support groups. Some use support groups for fighting additions, depression, and other mental health issues. Social Media tools are a great way for keeping others in touch; however, those tools are underutilized concerning mental health issues. HealthyMind is a social media app that can connect people to groups that will support them. Whether someone is in a city on vacation or has just moved to a city, HealthyMind can help. As opposed to Facebook and other social media apps, HealthyMind will also ensure user privacy by only allowing avatars and generic identifiers of individuals. Startup-costs are around $100,000.00, including two $20,000.00 server fees. Revenue will be generated from pharmaceutical advertisements. This proposal won first-place At Xavier University’s first annual Hackathon (2017) in the category of behavioral health. VI. Conclusion In conclusion, there are a lot of considerations about how D/I initiatives impact IG best practices, and the value that comes from those initiatives can go beyond moral arguments. In other words, a business case can be made for having culturally sensitive IG policies. Hackathons, such as the 2017 one at Xavier University of Louisiana, can help organizations find technology and information governance-based solutions to industry problems. Although we have focused on examples in healthcare, tracking the effectiveness and ROI of D/I initiatives will depend upon what type of industry an organization resides. In tracking metrics, focusing on the ROI of D/I initiatives presents challenges that typical initiatives do not encounter, such as customer and patient privacy, challenges related to the respect of persons, and navigating complex discussions surrounding organizational perspective-based changes. However, this paper has provided a framework and suggestions towards how to approach measuring and assessing such initiatives. VII. Acknowledgements Brendan Moore is a philosopher and instructional designer currently working on a leadership development program at Ochsner Health Systems in New Orleans, Louisiana. His background includes 7+ years of university medical ethics teaching at Ohio University and several years of work in the area of information technology, instructional technology, and applied computing systems. Dr. Syed Adeel Ahmedis a faculty member of Division of Business at Xavier University of Louisiana and Editorial Board member/Reviewer of UJEEE at HRPUB.
  • 9. International Journal of Modern Research in Engineering and Technology (IJMRET) www.ijmret.org Volume 2 Issue 2 ǁ June 2017. w w w . i j m r e t . o r g Page 9 REFERENCES [1] Brown, C., Deheyes, D., Hoffer, J., Martin, W., Perkins, W. Managing Information Technology 7th ed., Pearson Education, Inc., 2012. [2] Charles M., Creary, S.J. Diversity and Inclusion: Global Challenges and Opportunities, The Conference Board, 2009. [3] CIDI. What Gets Measured Gets Done: Measuring the Return of Investment of Diversity and Inclusion, Canadian Institute of Diversity and Inclusion, 2013. [4] Diversity Primer. The Diversity Scorecard: Evaluating the Impact of Diversity on Organizational Performance, 2004 & “The ROI of Diversity and Inclusion”, Diversity Primer, Diversity Best Practices, pp. 24-29, 2009. http://www.diversitybestpractices.com/sites/dive rsitybestpractices.com/files/import/embedded/an chors/files/diversity_primer_chapter_02.pdf [5] EcoTech, “What’s the Triple Bottom Line?” EcoTech Institute, College for Renewable Energy and Management, 2014. https://www.ecotechinstitute.com/ecotech-news/ what-s-the-triple-bottom-line [6] EDRM.net, “IGRM IT Viewpoint” EDRM Duke Law, March 31, 2015. http://www.edrm.net/papers/igrm-it-viewpoint/ [7] FreeAdvice staff, “Can hospitals turn away patients?” law.freeadvice.com, 2017. http://law.freeadvice.com/malpractice_law/hosp ital_malpractice/hospital-patients.htm [8] Heizer, J.; Render, B. Operations Management: 10th Edition, Pearson Education Inc, 2011. [9] Hoffman, S., Lane, R., Posner, D., Nagel, M. “Measurement: Proving the ROI of Global Diversity and Inclusion Efforts” Global Diversity Primer, Diversity Best Practices, 2013. http://www.cisco.com/c/dam/en_us/about/ac49/ ac55/docs/Global_Diversity_Primer_Cisco_Cha pter.pdf [10] Hubbard, E. The Business Case for Diversity, Hubbard and Hubbard Inc., 2009. http://multiculturaladvantage.com/recruit/metric s/The-Business-Case-for-Diversity.asp [11] Hubbard, E. Measuring the Value and Impact of Workforce Diversity, Oregon Executive Forum, 2005. http://www.executiveforum.com/PDFs/e_hubba rd.pdf [12] Nagel, T., The Possibility of Altruism, Clarendon Press, Oxford, 1970. [13] Perlroth, N., Sanger, D.E. “Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool” NY Times, 2017. https://www.nytimes.com/2017/05/12/world/eur ope/uk-national-health-service-cyberattack.html ?_r=0 [14] Rachels, J., The Elements of Moral Philosophy: 7th edition, McGraw Hill Companies, Inc. New York, 2012. [15] Rezvani, S. “Five Trends Driving Workplace Diversity in 2015” Forbes, 2015. https://www.forbes.com/sites/work-in-progress/ 2015/02/03/20768/#39c35b776490 [16] Smallwood, R.F., Information Governance: Concepts, Strategies, and Best Practices, Wiley CIO Series, April, 2014.