Citations

Existing Citations

  • availability (s.v. availability): The assurance that an enterprise’s IT infrastructure has suitable recoverability and protection from system failures, natural disasters or malicious attacks. (†1451)
  • best practice (s.v. "best practice"): A group of tasks that optimizes the efficiency (cost and risk) or effectiveness (service level) of the business discipline or process to which it contributes. It must be implementable, replicable, transferable and adaptable across industries. (†692)
  • big data (s.v. "big data"): High-volume, high-velocity and high-variety information assets that demand cost-effective, innovative forms of information processing for enhanced insight and decision making. (†691)
  • blockchain (s.v. "blockchain"): Blockchain is a type of distributed ledger in which value exchange transactions (in bitcoin or other token) are sequentially grouped into blocks. Each block is chained to the previous block and immutably recorded across a peer-to-peer network, using cryptographic trust and assurance mechanisms. Depending on the implementation, transactions can include programmable behavior. (†2626)
  • business process (s.v. "business process"): An event-driven, end-to-end processing path that starts with a customer request and ends with a result for the customer. Business processes often cross departmental and even organizational boundaries. (†911)
  • class (s.v. "class"): A specification that defines the operations and the data attributes for a set of objects. (†2499)
  • cloud bursting (s.v. "cloud bursting"): The use of an alternative set of public or private cloud-based services as a way to augment and handle peaks in IT system requirements at startup or during runtime. Cloudbursting can span between on-premises IT systems and services and the cloud, across multiple cloud providers or across multiple resource pools of a single provider. It can also be enabled across multiple internal data centers, across multiple external data centers, or between internal and external data centers. (†695)
  • cloud computing (s.v. "cloud computing"): A style of computing in which scalable and elastic IT-enabled capabilities are delivered as a service using Internet technologies. (†694)
  • community cloud (s.v. "community cloud"): A shared cloud computing service environment that is targeted to a limited set of organizations or employees (such as banks or heads of trading firms). The organizing principle for the community will vary, but the members of the community generally share similar security, privacy, performance and compliance requirements. Community members may wish to invoke a mechanism that is often run by themselves (not just the provider) to review those seeking entry into the community. (†708)
  • compliance (s.v. compliance): The process of adhering to policies and decisions. Policies can be derived from internal directives, procedures and requirements, or from external laws, regulations, standards and agreements. (†1294)
  • context (s.v. context): Generally refers to the combination of user identity, environmental, process and community-based information about the customer, leading to real-time offers, delivered at the right time via the right touchpoint, and valuable to the customer. Refers to meanings that are clear to the sender or receiver (e.g., application or person), either because they are stated elsewhere in the message or because they have been predefined (e.g., the number “30” means “30 pounds of flour” in one message and “30 cases of orange soda” in another message). Sender and receiver may have different interpretations of meaning (i.e., different context). For example, “customer” could be the party that pays the freight bill in a billing application, but the receiver of the item (which might not be the payer) in a warehousing application. (†1293)
  • crowdsourcing (s.v. "crowd sourcing"): The processes for sourcing a task or challenge to a broad, distributed set of contributors using the Web and social collaboration techniques. Crowdsourcing applications typically include mechanisms to attract the desired participants, stimulate relevant contributions and select winning ideas or solutions. (†696)
  • dark data (s.v. "dark data"): The information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposes (for example, analytics, business relationships and direct monetizing). Similar to dark matter in physics, dark data often comprises most organizations’ universe of information assets. Thus, organizations often retain dark data for compliance purposes only. Storing and securing data typically incurs more expense (and sometimes greater risk) than value. (†697)
  • dark data (s.v. "dark data"): the information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposes (for example, analytics, business relationships and direct monetizing). Similar to dark matter in physics, dark data often comprises most organizations’ universe of information assets. Thus, organizations often retain dark data for compliance purposes only. Storing and securing data typically incurs more expense (and sometimes greater risk) than value. (†2702)
  • data lake (s.v. "data lake"): A collection of storage instances of various data assets additional to the originating data sources. These assets are stored in a near-exact, or even exact, copy of the source format. The purpose of a data lake is to present an unrefined view of data to only the most highly skilled analysts, to help them explore their data refinement and analysis techniques independent of any of the system-of-record compromises that may exist in a traditional analytic data store (such as a data mart or data warehouse). (†2605)
  • data masking (s.v. "redaction tools"): Redaction tools have been included as part of document imaging products since their introduction. In electronic documents, redaction refers to the permanent removal of information, not the masking or obfuscating of data. (†1591)
  • data mining (s.v. "data mining"): The process of discovering meaningful correlations, patterns and trends by sifting through large amounts of data stored in repositories. Data mining employs pattern recognition technologies, as well as statistical and mathematical techniques. (†689)
  • data obfuscation (s.v. "application obfuscation"): A set of technologies used to protect an application and its embedded intellectual property (IP) from application-level intrusions, reverse engineering and hacking attempts. Application obfuscation tools protect the application code as the increasing use of intermediate language representations (such as Java and .NET) enables hackers to easily reverse-engineer IP embedded in software. (†2648)
  • data state (s.v. data loss protection): Data loss protection (DLP) describes a set of technologies and inspection techniques used to classify information content contained within an object – such as a file, email, packet, application or data store – while at rest (in storage), in use (during an operation) or in transit (across a network). (†1453)
  • data warehouse (s.v. "data warehouse"): A storage architecture designed to hold data extracted from transaction systems, operational data stores and external sources. The warehouse then combines that data in an aggregate, summary form suitable for enterprise-wide data analysis and reporting for predefined business needs. ¶ The five components of a data warehouse are: · production data sources · data extraction and conversion · the data warehouse database management system · data warehouse administration · business intelligence (BI) tools ¶ A data warehouse contains data arranged into abstracted subject areas with time-variant versions of the same records, with an appropriate level of data grain or detail to make it useful across two or more different types of analyses most often deployed with tendencies to third normal form. A data mart contains similarly time-variant and subject-oriented data, but with relationships implying dimensional use of data wherein facts are distinctly separate from dimension data, thus making them more appropriate for single categories of analysis. (†2606)
  • digital forensics (s.v. digital forensics): The use of specialized, investigative techniques and technologies to determine whether illegal or otherwise inappropriate events have occurred on computer systems, and provide legally defensible information about the sequence of those events. (†1419)
  • disintermediation (s.v. "HR disintermediation"): The practice of bypassing the HR department to define and implement technology practices to support human capital management (HCM) issues. When no clear HCM strategy is in place, business leaders formulate departmental plans and adopt the technologies they feel they need to support individual and group responsibilities for enterprise performance. (†2623)
  • encryption (s.v. "encryption"): The process of systematically encoding a bit stream before transmission so that an unauthorized party cannot decipher it. (†698)
  • enterprise risk management (s.v. "enterprise risk management (ERM) applic): Enterprise risk management (ERM) applications support the establishment of an integrated, thorough and strategic approach to the management of risk across the organization by helping organizations to identify, measure and manage various risk classes, including market risks, credit risks, liquidity risks and operational risks. In particular, the applications allow organizations to aggregate and normalize data from multiple data sources, including operational and financial systems. By providing a better understanding of the risks to business objectives, ERM enables better business performance. ERM applications also help companies address the increasing pressure from regulators to improve the risk reporting in annual reports and improve the board’s role in risk management oversight. ERM applications usually include functionality to extract data in a controlled way from multiple source systems, such as financial systems, into an integrated risk register. In addition, they include functions for risk analytics, reports and alerts to support decision making. ERM applications also include compliance-related functions, such as audit trails, regulatory reporting or control policy management. (†711)
  • enterprise risk management (s.v. enterprise risk management (ERM) applica): An integrated, thorough and strategic approach to the management of risk across the organization by helping organizations to identify, measure and manage various risk classes, including market risks, credit risks, liquidity risks and operational risks. (†1292)
  • governance (s.v. "information governance"): Data governance is a component of IT governance, which is part of corporate governance. (†941)
  • hybrid cloud (s.v. "hybrid cloud computing"): Policy-based and coordinated service provisioning, use and management across a mixture of internal and external cloud services. (†706)
  • hype cycle (s.v. "hype cycle"): A Gartner model designed to help clients make intelligent decisions about when to implement emerging technologies. The Gartner Hype Cycle provides not only a scorecard to separate hype from reality, but also a model that can be used to decide when it makes sense for an enterprise to move forward with a new technology. The five phases in the Hype Cycle are: · Technology Trigger · Peak of Inflated Expectations · Trough of Disillusionment · Slope of Enlightenment · Plateau of Productivity (†699)
  • identity (s.v. "identity and access management (IAM)"): Identity and access management (IAM) is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons. ¶ IAM addresses the mission-critical need to ensure appropriate access to resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements. This security practice is a crucial undertaking for any enterprise. It is increasingly business-aligned, and it requires business skills, not just technical expertise. ¶ Enterprises that develop mature IAM capabilities can reduce their identity management costs and, more importantly, become significantly more agile in supporting new business initiatives. (†700)
  • information asset (s.v. information (knowledge) assets): Information relevant to an enterprise’s business function, including captured and tacit knowledge of employees, customers or business partners; data and information stored in highly-structured databases; data and information stored in textual form and in less-structured databases such as messages, e-mail, workflow content and spreadsheets; information stored in digital and paper documents; purchased content; and public content from the Internet or other sources. (†1290)
  • information governance (s.v. "information governance"): The specification of decision rights and an accountability framework to ensure appropriate behavior in the valuation, creation, storage, use, archiving and deletion of information. It includes the processes, roles and policies, standards and metrics that ensure the effective and efficient use of information in enabling an organization to achieve its goals. (†690)
  • information governance (s.v. "information governance"): An information governance model can be used to provide context to discussions of an integration of information management, risk management, and records management considerations. This framework would address all types of information, whether meeting the criteria established for a record or not. There are three basic elements to a records information management governance framework: policies, processes, and compliance (†942)
  • information management (s.v. information management): A method of using technology to collect, process and condense information with a goal of efficient management. Most large enterprises have a central IM function to facilitate this coordination. (†964)
  • information technology governance (s.v. "information technology governance"): The processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals. (†931)
  • information technology governance (s.v. "information technology governance"): IT demand governance (ITDG–what IT should work on) is the process by which organizations ensure the effective evaluation, selection, prioritization, and funding of competing IT investments; oversee their implementation; and extract (measurable) business benefits. ITDG is a business investment decision-making and oversight process, and it is a business management responsibility. IT supply-side governance (ITSG–how IT should do what it does) is concerned with ensuring that the IT organization operates in an effective, efficient and compliant fashion, and it is primarily a CIO responsibility. (†932)
  • Infrastructure as a Service (IaaS) (s.v. infrastructure as a service (IaaS)): A standardized, highly automated offering, where compute resources, complemented by storage and networking capabilities are owned and hosted by a service provider and offered to customers on-demand. Customers are able to self-provision this infrastructure, using a Web-based graphical user interface that serves as an IT operations management console for the overall environment. API access to the infrastructure may also be offered as an option. (†1289)
  • internet (s.v. "internet"): A loose confederation of independent yet interconnected networks that use the Transmission Control Protocol/Internet Protocol (TCP/IP) protocols for communications. The Internet evolved from research done during the 1960s on a network called the ARPANet. It provides universal connectivity and three levels of network services: connectionless packet delivery, full-duplex stream delivery, and application-level services. (†701)
  • internet (s.v. internet): A loose confederation of independent yet interconnected networks that use the Transmission Control Protocol/Internet Protocol (TCP/IP) protocols for communications. The Internet evolved from research done during the 1960s on a network called the ARPANet. It provides universal connectivity and three levels of network services: connectionless packet delivery, full-duplex stream delivery, and application-level services. (†1288)
  • mashup (s.v. "mashups"): Lightweight composite applications that source all of their content from existing systems and data sources; they have no native data store or content repository. To access the resources that they leverage, mashups employ the technologies of the Web, including representational state transfer (REST) APIs, RSS and ATOM feeds and widgets. (†702)
  • metadata (s.v. metadata): Information that describes various facets of an information asset to improve its usability throughout its life cycle. It is metadata that turns information into an asset. Generally speaking, the more valuable the information asset, the more critical it is to manage the metadata about it, because it is the metadata definition that provides understanding that unlocks the value of data. (†1060)
  • object (s.v. object data model): An object data model is a data model based on object-oriented programming, associating methods (procedures) with objects that can benefit from class hierarchies. Thus, “objects” are levels of abstraction that include attributes and behavior. An object-oriented data model is one that extends the individual program space into the world of persistent object management and shareability. (†2689)
  • open architecture (s.v. "open architecture"): Technology infrastructure with specifications that are public as opposed to proprietary. This includes officially approved standards as well as privately designed architectures, the specifications of which are made public by their designers. (†703)
  • open data (s.v. open data): Information or content made freely available to use and redistribute, subject only to the requirement to attribute it to the source. The term also may be used more casually to describe any data that is shared outside the organization and beyond its original intended use, for example, with business partners, customers or industry associations. Formally, data designated as “open” is subject to several conditions and licensing that can be found at opendefinition.org. (†1061)
  • open source (s.v. "open source"): Software that comes with permission to use, copy and distribute, either as is or with modifications, and that may be offered either free or with a charge. The source code must be made available. (†704)
  • open source (s.v. "proprietary software"): Software that is owned by an organization or an individual, as opposed to “public-domain software,” which is freely distributed. The explosion in the use of the Internet has expanded the reach of public-domain software since it is now much easier to transmit these programs. While many commercial software developers have developed software that has become the de facto standard (e.g., Microsoft’s Windows programs), proprietary software that is based on proprietary protocols, or standards, can create obstacles for application development and usage. (†709)
  • permission (s.v. "open source"): Open source describes software that comes with permission to use, copy and distribute, either as is or with modifications, and that may be offered either free or with a charge. (†2661)
  • Platform as a Service (PaaS) (s.v. platform as a service (PaaS)): A broad collection of application infrastructure (middleware) services (including application platform, integration, business process management and database services). However, the hype surrounding the PaaS concept is focused mainly on application PaaS (aPaaS) as the representative of the whole category. (†1045)
  • preservation metadata (s.v. metadata): Information that describes various facets of an information asset to improve its usability throughout its life cycle. It is metadata that turns information into an asset. Generally speaking, the more valuable the information asset, the more critical it is to manage the metadata about it, because it is the metadata definition that provides understanding that unlocks the value of data. (†1044)
  • privacy (s.v. "privacy management tools"): Privacy management tools help organizations conduct privacy impact assessments, check processing activities against requirements from privacy regulations, and track incidents that lead to unauthorized disclosures of personal data (investigation, remediation, reporting). They analyze and document data flows of personal information (nature of data, purpose of processing, data controller), support authoring and distribution of privacy policies (for which they provide templates) and track user awareness (users acknowledge having read the policies). (†693)
  • private cloud (s.v. "private cloud computing"): A form of cloud computing that is used by only one organization, or that ensures that an organization is completely isolated from others. (†705)
  • public cloud (s.v. public cloud computing): A style of computing where scalable and elastic IT-enabled capabilities are provided as a service to external customers using Internet technologies – i.e., public cloud computing uses cloud computing technologies to support customers that are external to the provider’s organization. Using public cloud services generates the types of economies of scale and sharing of resources that can reduce costs and increase choices of technologies. From a government organization’s perspective, using public cloud services implies that any organization (in any industry sector and jurisdiction) can use the same services (e.g., infrastructure, platform or software), without guarantees about where data would be located and stored. (†1042)
  • rapid elasticity (s.v. cloud service elasticity): The ability to increase or decrease the amount of system capacity (for example, CPU, storage, memory and input/output bandwidth) that is available for a given cloud service on demand, in an automated fashion. This gives their customers the perception of unlimited capacity. From the consumer and RTI perspectives, cloud service elasticity is an automated means to increase or decrease a specific service capacity in response to increasing or scheduled demand changes. (†1011)
  • records management (s.v. "records management (RM)"): Software that is owned by an organization or an individual, as opposed to “public-domain software,” which is freely distributed. The explosion in the use of the Internet has expanded the reach of public-domain software since it is now much easier to transmit these programs. While many commercial software developers have developed software that has become the de facto standard (e.g., Microsoft’s Windows programs), proprietary software that is based on proprietary protocols, or standards, can create obstacles for application development and usage. (†710)
  • redaction (s.v. "redaction"): The process of “redacting” documents has been used in the legal profession for decades to black out confidential or privileged information during the exchange of documents during litigation. In electronic documents, redaction refers to the permanent removal of information, not the masking or obfuscating of data. (†1590)
  • risk management (s.v. "vendor risk managemenet (VRM)"): Vendor risk management (VRM) is the process of ensuring that the use of service providers and IT suppliers does not create an unacceptable potential for business disruption or a negative impact on business performance. VRM technology supports enterprises that must assess, monitor and manage their risk exposure from third-party suppliers (TPSs) that provide IT products and services, or that have access to enterprise information. (†712)
  • service level agreement (s.v. "service levels"): The performance goals of specific business processes to meet overall business-unit objectives. (†714)
  • service level agreement (s.v. "SLA"): An agreement that sets the expectations between the service provider and the customer and describes the products or services to be delivered, the single point of contact for end-user problems and the metrics by which the effectiveness of the process is monitored and approved. (†715)
  • service level agreement (s.v. SLA (service-level agreement)): An agreement that sets the expectations between the service provider and the customer and describes the products or services to be delivered, the single point of contact for end-user problems and the metrics by which the effectiveness of the process is monitored and approved. (†993)
  • social media (s.v. "social media"): online environment in which content is created, consumed, promoted, distributed, discovered or shared for purposes that are primarily related to communities and social activities, rather than functional, task-oriented objectives. “Media” in this context is an environment characterized by storage and transmission, while “social” describes the distinct way that these messages propagate in a one-to-many or many-to-many fashion. (†716)
  • social media (s.v. social media): An online environment in which content is created, consumed, promoted, distributed, discovered or shared for purposes that are primarily related to communities and social activities, rather than functional, task-oriented objectives. “Media” in this context is an environment characterized by storage and transmission, while “social” describes the distinct way that these messages propagate in a one-to-many or many-to-many fashion. (†994)
  • social network (s.v. social networking): The act of establishing online many-to-many human connections for the purposes of sharing information with the network or subsets thereof. Although one-to-one connections are possible in social network sites, the preponderance of activity engages a broader range of participants in any given network. (†995)
  • Software as a Service (SaaS) (s.v. software as a service (SaaS)): Software that is owned, delivered and managed remotely by one or more providers. The provider delivers software based on one set of common code and data definitions that is consumed in a one-to-many model by all contracted customers at anytime on a pay-for-use basis or as a subscription based on use metrics. (†996)
  • text mining (s.v. text mining): The process of extracting information from collections of textual data and utilizing it for business objectives. (†984)
  • transparency (s.v. "transparency"): Transparency is a condition where the material facts of an enterprise are made available in a timely, and preferably reusable, manner. · Material facts encompass reliable information critical to the decision making of both internal and external stakeholders. · The object of transparency is the enterprise (not an individual). · Reusability allows consumers of information to construct their own analyses without compromising the contextual meaning of the material facts. (†272)
  • web 2.0 (s.v. web 2.0): The evolution of the Web from a collection of hyperlinked content pages to a platform for human collaboration and system development and delivery. (†968)