SlideShare a Scribd company logo
Company Metadata and MasterData Management Page 1
Company Metadata and Master Data Management
ISTM5020 - Lead Global IT Enterprise Sys
Jessica Graf
Capella University
Dr. Vincent Tran
December 14, 2014
Company Metadata and MasterData Management Page 2
Metadata is organized data that defines, clarifies, pinpoints, or otherwise makes it easier
to recover, use, or handle an information source. Metadata is frequently termed data about data
or information about information. The expression metadata is used otherwise in diverse
communities. Some use it to denote to machine comprehensible information, while others use it
only for archives that define electronic resources. In the library environment, metadata is
commonly used for any formal scheme of resource description, applying to any type of object,
digital or non-digital. (Godinez M., 2010)
There are three main types of metadata that corporations use. The first is called
Descriptive metadata. This type of metadata is a source for processes such as discovery and
identification. It can include elements such as title, abstract, author, and keywords. Another type
of metadata is Structural metadata and designates how complex objects are composed, for
example, how pages are ordered to form chapters. Another important type of metadata is
Administrative Metadata. Administrative metadata delivers information to aid management of a
resource, such as when and how it was produced, file category and other technical information,
and who can open it. There are several subsets of administrative data. There is two that are
important, the first one is Rights management metadata, which used with intellectual property
rights and then there is Preservation metadata, which encompasses information needed to
document and preserve a source. Metadata can describe resources at any level of aggregation. It
can describe a collection, a single resource, or a component part of a larger resource. (Godinez
M., 2010)
Security issues around metadata are something that a corporation should take seriously.
Metadata can contain anything from DNS information about an environment to customers’
Company Metadata and MasterData Management Page 3
ordering history and payment method. While this metadata is useful to company, it is a gold
mine to the hacker as they can use tools such as Exit to find to extract this useful information.
Access control is the first security issue that you would need to address. By keeping who
can access metadata to a very granular level, the safer your metadata will be. The second security
concern revolves around the use of mobile devices. As workforces become more mobile, there
are more security risks such as lost or stolen devices, unsecure connection to the metadata and
shoulder surfing for passwords and other information. While these are concerns, security
policies that surround metadata can be a security issue as well. If the policies are not flexible
enough to allow the users to do their jobs, they will find ways around the policies and that can
lead to your metadata being even more vulnerable. What you keep as metadata and where you
keep it is also a security risk. If you allow users to keep metadata locally on their computers or is
your metadata kept in a secure environment. A secure environment is not only technically secure,
but physically secure. (Yee, 2004)
When it comes to Dell’s Service division, the metadata that would have to be integrated
into a new system would include customer technical issue history and dispatch history. This
would cover service request numbers, part numbers and information about what they have
purchased from Dell. It would also have to include information about technicians that have
worked on their environment, TAMs and Sales personal that have worked with a customer.
Another important piece of metadata would be the logs from any troubleshooting done and
solutions to any technical issues. This needs to be kept not only for internal use, but for legal
reasons as well. Any metadata that pertains to the customer interaction with the service division
would need to be integrated into a new system.
Company Metadata and MasterData Management Page 4
Master Data is defined as data that is critical for your business. It can also be defined as
data that is the dependable and undeviating set of identifiers and protracted attributes that
designates the fundamental entities of the enterprise including customers, prospects, citizens,
suppliers, sites, hierarchies and chart of accounts.
Master Data for the Service division would definitely include customer information,
however it would also include organizational data such as organizational charts, team charts and
workflows for escalations. These are important as the teams within the service division need to
have cross functionality in order to troubleshoot and build data centers and complex issues.
Company Metadata and MasterData Management Page 5
References
Chen, M., Jin, H., Wen, Y., & Leung, V. (2013, August). Enabling technologies for future data
center networking: a primer. Network, IEEE, pp. 8-15.
Conroy, P. (2012). CPG and the Cloud: Building Better Consumer Relationships for Less. CIO
Journal.
Godinez M., H. E. (2010). The Art of Enterprise Information Architecture. Crawfordsville, IN:
IBM Press.
Sahar, F. (2013). Tradeoffs between Usability and Security. International Journal of
Engineering and Technology, 434.
Yee, K.-P. (2004). Aligning security and usability. Security & Privacy, IEEE, 2(5), 48-55.
doi:10.1109

More Related Content

What's hot

km ppt neew one
km ppt neew onekm ppt neew one
km ppt neew one
Sahil Jain
 
Datasheet top reasons
Datasheet top reasonsDatasheet top reasons
Datasheet top reasonsJos Reterink
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
ShubhraGoyal4
 
Data Sovereignty and the Cloud
Data Sovereignty and the CloudData Sovereignty and the Cloud
Data Sovereignty and the Cloud
IESL - The Institution of Engineers, Sri Lanka
 
D R M Evolution 2005 10 19
D R M  Evolution 2005 10 19D R M  Evolution 2005 10 19
D R M Evolution 2005 10 19Amit Maitra
 
Scenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information govScenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information gov
AKHIL969626
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
LindaWatson19
 
Unstructured Data Fact Sheet
Unstructured Data Fact SheetUnstructured Data Fact Sheet
Unstructured Data Fact Sheet
Connexica
 
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESBIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
ijcsit
 
Data management for proposal writing
Data management for proposal writingData management for proposal writing
Data management for proposal writing
Olatunbosun Obileye
 
Database Systems
Database SystemsDatabase Systems
Database Systems
Usman Tariq
 
Data
DataData
Business Operation
Business OperationBusiness Operation
Business Operation
TimothyNdakalu
 
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
IOSR Journals
 
enterprise-data-everywhere
enterprise-data-everywhereenterprise-data-everywhere
enterprise-data-everywhereBill Peer
 
DATA VIRTUALIZATION FOR DECISION MAKING IN BIG DATA
DATA VIRTUALIZATION FOR DECISION MAKING IN BIG DATADATA VIRTUALIZATION FOR DECISION MAKING IN BIG DATA
DATA VIRTUALIZATION FOR DECISION MAKING IN BIG DATA
ijseajournal
 
Pptsample dm km_mis
Pptsample dm km_misPptsample dm km_mis
Pptsample dm km_mis
Louie AU
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEY
cscpconf
 

What's hot (19)

km ppt neew one
km ppt neew onekm ppt neew one
km ppt neew one
 
Datasheet top reasons
Datasheet top reasonsDatasheet top reasons
Datasheet top reasons
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
Data Sovereignty and the Cloud
Data Sovereignty and the CloudData Sovereignty and the Cloud
Data Sovereignty and the Cloud
 
D R M Evolution 2005 10 19
D R M  Evolution 2005 10 19D R M  Evolution 2005 10 19
D R M Evolution 2005 10 19
 
Scenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information govScenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information gov
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Basic concepts
Basic conceptsBasic concepts
Basic concepts
 
Unstructured Data Fact Sheet
Unstructured Data Fact SheetUnstructured Data Fact Sheet
Unstructured Data Fact Sheet
 
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESBIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
 
Data management for proposal writing
Data management for proposal writingData management for proposal writing
Data management for proposal writing
 
Database Systems
Database SystemsDatabase Systems
Database Systems
 
Data
DataData
Data
 
Business Operation
Business OperationBusiness Operation
Business Operation
 
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
 
enterprise-data-everywhere
enterprise-data-everywhereenterprise-data-everywhere
enterprise-data-everywhere
 
DATA VIRTUALIZATION FOR DECISION MAKING IN BIG DATA
DATA VIRTUALIZATION FOR DECISION MAKING IN BIG DATADATA VIRTUALIZATION FOR DECISION MAKING IN BIG DATA
DATA VIRTUALIZATION FOR DECISION MAKING IN BIG DATA
 
Pptsample dm km_mis
Pptsample dm km_misPptsample dm km_mis
Pptsample dm km_mis
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEY
 

Similar to Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf

data collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptxdata collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptx
Sourabhkumar729579
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...
Angie Jorgensen
 
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxRunning head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
cowinhelen
 
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docxWeek 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
jessiehampson
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Neil Raden
 
Information economics and big data
Information economics and big dataInformation economics and big data
Information economics and big data
Mark Albala
 
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
IRJET Journal
 
Intro to big data and applications - day 1
Intro to big data and applications - day 1Intro to big data and applications - day 1
Intro to big data and applications - day 1
Parviz Vakili
 
Color Blind 1.pdfColor Blind 2.pdfColor Blind 3.pdfC.docx
Color Blind 1.pdfColor Blind 2.pdfColor Blind 3.pdfC.docxColor Blind 1.pdfColor Blind 2.pdfColor Blind 3.pdfC.docx
Color Blind 1.pdfColor Blind 2.pdfColor Blind 3.pdfC.docx
drandy1
 
Color Blind 1.pdfColor Blind 2.pdfColor Blind 3.pdfC.docx
Color Blind 1.pdfColor Blind 2.pdfColor Blind 3.pdfC.docxColor Blind 1.pdfColor Blind 2.pdfColor Blind 3.pdfC.docx
Color Blind 1.pdfColor Blind 2.pdfColor Blind 3.pdfC.docx
cargillfilberto
 
Unified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphUnified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge Graph
Vaticle
 
leewayhertz.com-AI in Master Data Management MDM Pioneering next-generation d...
leewayhertz.com-AI in Master Data Management MDM Pioneering next-generation d...leewayhertz.com-AI in Master Data Management MDM Pioneering next-generation d...
leewayhertz.com-AI in Master Data Management MDM Pioneering next-generation d...
KristiLBurns
 
Application Of A New Database Management System
Application Of A New Database Management SystemApplication Of A New Database Management System
Application Of A New Database Management System
Pamela Wright
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
curwenmichaela
 
Bigdata
Bigdata Bigdata
Bigdata
NithiDazz
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdf
Data Science Council of America
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdf
Data Science Council of America
 
Data set module 1
Data set   module 1Data set   module 1
Data set module 1
Data-Set
 
ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...
ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...
ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...
ijasuc
 
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond HillDOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
ClaraZara1
 

Similar to Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf (20)

data collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptxdata collection, data integration, data management, data modeling.pptx
data collection, data integration, data management, data modeling.pptx
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...
 
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxRunning head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
 
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docxWeek 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
 
Global Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldGlobal Data Management: Governance, Security and Usefulness in a Hybrid World
Global Data Management: Governance, Security and Usefulness in a Hybrid World
 
Information economics and big data
Information economics and big dataInformation economics and big data
Information economics and big data
 
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
IRJET- A Scrutiny on Research Analysis of Big Data Analytical Method and Clou...
 
Intro to big data and applications - day 1
Intro to big data and applications - day 1Intro to big data and applications - day 1
Intro to big data and applications - day 1
 
Color Blind 1.pdfColor Blind 2.pdfColor Blind 3.pdfC.docx
Color Blind 1.pdfColor Blind 2.pdfColor Blind 3.pdfC.docxColor Blind 1.pdfColor Blind 2.pdfColor Blind 3.pdfC.docx
Color Blind 1.pdfColor Blind 2.pdfColor Blind 3.pdfC.docx
 
Color Blind 1.pdfColor Blind 2.pdfColor Blind 3.pdfC.docx
Color Blind 1.pdfColor Blind 2.pdfColor Blind 3.pdfC.docxColor Blind 1.pdfColor Blind 2.pdfColor Blind 3.pdfC.docx
Color Blind 1.pdfColor Blind 2.pdfColor Blind 3.pdfC.docx
 
Unified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphUnified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge Graph
 
leewayhertz.com-AI in Master Data Management MDM Pioneering next-generation d...
leewayhertz.com-AI in Master Data Management MDM Pioneering next-generation d...leewayhertz.com-AI in Master Data Management MDM Pioneering next-generation d...
leewayhertz.com-AI in Master Data Management MDM Pioneering next-generation d...
 
Application Of A New Database Management System
Application Of A New Database Management SystemApplication Of A New Database Management System
Application Of A New Database Management System
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
 
Bigdata
Bigdata Bigdata
Bigdata
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdf
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdf
 
Data set module 1
Data set   module 1Data set   module 1
Data set module 1
 
ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...
ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...
ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...
 
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond HillDOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
DOCUMENT SELECTION USING MAPREDUCE Yenumula B Reddy and Desmond Hill
 

Company Metadata and Master Data Management Unit 9 Assigment 1 Jessica Graf

  • 1. Company Metadata and MasterData Management Page 1 Company Metadata and Master Data Management ISTM5020 - Lead Global IT Enterprise Sys Jessica Graf Capella University Dr. Vincent Tran December 14, 2014
  • 2. Company Metadata and MasterData Management Page 2 Metadata is organized data that defines, clarifies, pinpoints, or otherwise makes it easier to recover, use, or handle an information source. Metadata is frequently termed data about data or information about information. The expression metadata is used otherwise in diverse communities. Some use it to denote to machine comprehensible information, while others use it only for archives that define electronic resources. In the library environment, metadata is commonly used for any formal scheme of resource description, applying to any type of object, digital or non-digital. (Godinez M., 2010) There are three main types of metadata that corporations use. The first is called Descriptive metadata. This type of metadata is a source for processes such as discovery and identification. It can include elements such as title, abstract, author, and keywords. Another type of metadata is Structural metadata and designates how complex objects are composed, for example, how pages are ordered to form chapters. Another important type of metadata is Administrative Metadata. Administrative metadata delivers information to aid management of a resource, such as when and how it was produced, file category and other technical information, and who can open it. There are several subsets of administrative data. There is two that are important, the first one is Rights management metadata, which used with intellectual property rights and then there is Preservation metadata, which encompasses information needed to document and preserve a source. Metadata can describe resources at any level of aggregation. It can describe a collection, a single resource, or a component part of a larger resource. (Godinez M., 2010) Security issues around metadata are something that a corporation should take seriously. Metadata can contain anything from DNS information about an environment to customers’
  • 3. Company Metadata and MasterData Management Page 3 ordering history and payment method. While this metadata is useful to company, it is a gold mine to the hacker as they can use tools such as Exit to find to extract this useful information. Access control is the first security issue that you would need to address. By keeping who can access metadata to a very granular level, the safer your metadata will be. The second security concern revolves around the use of mobile devices. As workforces become more mobile, there are more security risks such as lost or stolen devices, unsecure connection to the metadata and shoulder surfing for passwords and other information. While these are concerns, security policies that surround metadata can be a security issue as well. If the policies are not flexible enough to allow the users to do their jobs, they will find ways around the policies and that can lead to your metadata being even more vulnerable. What you keep as metadata and where you keep it is also a security risk. If you allow users to keep metadata locally on their computers or is your metadata kept in a secure environment. A secure environment is not only technically secure, but physically secure. (Yee, 2004) When it comes to Dell’s Service division, the metadata that would have to be integrated into a new system would include customer technical issue history and dispatch history. This would cover service request numbers, part numbers and information about what they have purchased from Dell. It would also have to include information about technicians that have worked on their environment, TAMs and Sales personal that have worked with a customer. Another important piece of metadata would be the logs from any troubleshooting done and solutions to any technical issues. This needs to be kept not only for internal use, but for legal reasons as well. Any metadata that pertains to the customer interaction with the service division would need to be integrated into a new system.
  • 4. Company Metadata and MasterData Management Page 4 Master Data is defined as data that is critical for your business. It can also be defined as data that is the dependable and undeviating set of identifiers and protracted attributes that designates the fundamental entities of the enterprise including customers, prospects, citizens, suppliers, sites, hierarchies and chart of accounts. Master Data for the Service division would definitely include customer information, however it would also include organizational data such as organizational charts, team charts and workflows for escalations. These are important as the teams within the service division need to have cross functionality in order to troubleshoot and build data centers and complex issues.
  • 5. Company Metadata and MasterData Management Page 5 References Chen, M., Jin, H., Wen, Y., & Leung, V. (2013, August). Enabling technologies for future data center networking: a primer. Network, IEEE, pp. 8-15. Conroy, P. (2012). CPG and the Cloud: Building Better Consumer Relationships for Less. CIO Journal. Godinez M., H. E. (2010). The Art of Enterprise Information Architecture. Crawfordsville, IN: IBM Press. Sahar, F. (2013). Tradeoffs between Usability and Security. International Journal of Engineering and Technology, 434. Yee, K.-P. (2004). Aligning security and usability. Security & Privacy, IEEE, 2(5), 48-55. doi:10.1109