SlideShare a Scribd company logo
1 of 871
Strategic Management Concepts:
A Competitive Advantage Approach
Sixteenth Edition
Chapter 8
Implementing Strategies: Marketing, Finance/Accounting, R and
D, and MIS Issues
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
If this PowerPoint presentation contains mathematical
equations, you may need to check that your computer has the
following installed:
1) MathType Plugin
2) Math Player (free versions available)
3) NVDA Reader (free versions available)
1
Learning Objectives (1 of 2)
8.1 Identify and describe strategic marketing issues vital for
strategy implementation.
8.2 Explain why social media marketing is an important
strategy-implementation tool.
8.3 Explain why market segmentation is an important strategy-
implementation tool.
8.4 Explain how to use product positioning (perceptual
mapping) as a strategy-implementation tool.
8.5 Identify and describe strategic finance/accounting issues
vital for strategy implementation.
8.6 Perform EPS/EBIT analysis to evaluate the attractiveness of
debt versus stock as a source of capital to implement strategies.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
After studying this chapter, you should be able to do the
following:
8-1. Identify and describe strategic marketing issues vital for
strategy implementation.
8-2. Explain why social media marketing is an important
strategy-implementation tool.
8-3. Explain why market segmentation is an important strategy-
implementation tool.
8-4. Explain how to use product positioning (perceptual
mapping) as a strategy-implementation
tool.
8-5. Identify and describe strategic finance/accounting issues
vital for strategy
implementation.
8-6. Perform EPS/EBIT analysis to evaluate the attractiveness
of debt versus stock as a
source of capital to implement strategies.
8-7. Develop projected financial statements to reveal the impact
of strategy
recommendations.
8-8. Determine the cash value of any business using four
corporate evaluation methods.
8-9. Discuss IPOs, keeping cash offshore, and issuing corporate
bonds as strategic
decisions
that face many firms.
8-10. Discuss the nature and role of research and development
(R&D) in strategy
implementation.
8-11. Explain how management information systems (MISs)
impact strategy-implementation
efforts.
2
Learning Objectives (2 of 2)
8.7 Develop projected financial statements to reveal the impact
of strategy recommendations.
8.8 Determine the cash value of any business using four
corporate evaluation methods.
8.9 Discuss IPOs, keeping cash offshore, and issuing corporate
bonds as strategic decisions that face many firms.
8.10 Discuss the nature and role of research and development
(R&D) in strategy implementation.
8.11 Explain how management information systems (MISs)
impact strategy-implementation efforts.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Figure 8-1 Comprehensive Strategic-Management Model
Source: Fred R. David, “How Companies Define Their
Mission,” Long Range Planning 22, no. 3 (June 1988): 40. See
also Anik Ratnaningsih, Nadjadji Anwar, Patdono Suwignjo,
and Putu ArtamaWiguna, “Balance Scorecard of David’s
Strategic Modeling at Industrial Business for National
Construction Contractor of Indonesia,” Journal of Mathematics
and Technology, no. 4 (October 2010): 20.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
This chapter is highlighted in the strategic management model.
4
Strategic Marketing Issues (1 of 2)
How to make advertisements more interactive to be more
effective
How to best take advantage of Facebook and Twitter
conservations about the company and industry
To use exclusive dealerships or multiple channels of
distribution
To use heavy, light, or no TV advertising versus online
advertising
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Countless marketing variables affect the success or failure of
strategy implementation efforts. Some strategic marketing
issues or decisions are on the next two slides.
5
Strategic Marketing Issues (2 of 2)
To limit (or not) the share of business done with a single
customer
To be a price leader or a price follower
To offer a complete or limited warranty
To reward salespeople based on straight salary, straight
commission, or a combination salary/commission
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Social Media Marketing
Marketers must get customers involved in the company website
and solicit suggestions in terms of product development,
customer service, and ideas.
The company should enable customers to interact with the firm
on the following social media networks:
Facebook
Google Plus
Twitter
LinkedIn
Instagram
Pinterest
Foursquare
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Social media marketing has become an important strategic
issue. Marketing has evolved to be more about building a two-
way relationship with consumers than just informing consumers
about a product or service.
7
Table 8-1 The New Principles of Marketing1. Do not just talk at
consumers—work with them throughout the marketing process.
2. Give consumers a reason to participate.
3. Listen to—and join—the conversation outside your
company’s website.
4. Resist the temptation to sell, sell, sell. Instead attract, attract,
attract.
5. Do not control online conversations; let it flow freely.
6. Find a “marketing technologist,” a person who has three
excellent skill sets (marketing, technology, and social
interaction).
7. Embrace instant messaging and chatting.
Source: Based on Salvatore Parise, Patricia Guinan, and Bruce
Weinberg, “The Secrets of Marketing in a Web 2.0 World,”
Wall Street Journal, December 15, 2008, R1
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Customers must not feel like they are a captive audience for
advertising at a firm’s website. Table 8-1 provides new
principles of marketing according to Parise, Guinan, and
Weinberg.
8
Market Segmentation (1 of 3)
Market Segmentation
subdividing of a market into distinct subsets of customers
according to needs and buying habits
widely used in implementing strategies
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Market segmentation enables a small firm to compete
successfully with a large firm by maximizing per-unit profits
and per-segment sales.
9
Market Segmentation (2 of 3)
Strategies such as market development, product development,
market penetration, and diversification require increased sales
through new markets and products.
Market segmentation allows a firm to operate with limited
resources because mass production, mass distribution, and mass
advertising are not required.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
To implement these strategies successfully, new or improved
market-segmentation approaches are required.
10
Market Segmentation (3 of 3)
Market segmentation decisions directly affect the marketing mix
variables:
Product
Place
Promotion
Price
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Geographic and demographic bases for segmenting markets are
the most commonly employed.
11
Table 8-2 The Marketing Mix Component
VariablesProductPlacePromotionPriceQualityDistribution
channelsAdvertisingLevelFeatures and optionsDistribution
coveragePersonal sellingDiscounts andStyleOutlet locationSales
promotionallowancesBrand nameSales
territoriesPublicityPayment termsPackagingInventory levels and
locationsblankblankProduct lineTransportation
carriersblankblankWarrantyblankblankblankService
levelblankblankblankOther servicesblankblankblank
Source: Based on E. Jerome McCarthy, Basic Marketing: A
Managerial Approach, 9th ed. (Homewood, IL: Richard D.
Irwin, Inc., 1987), 37–44. Used with permission.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Evaluating potential market segments requires strategists to
determine the characteristics and needs of consumers, to
analyze consumer similarities and differences, and to develop
consumer group profiles.
12
Retention-Based Segmentation
Tag #1: Is this customer at high risk of canceling the company’s
service?
Tag #2: Is this customer worth retaining?
Tag #3: What retention tactics should be used to retain this
customer?
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Tag #1: Is this customer at high risk of canceling the company's
service? One of the most common indicators of high-risk
customers is a drop off in usage of the company's service. For
example, in the credit card industry this could be signaled
through a customer's decline in spending on his or her card.
Tag #2: Is this customer worth retaining? This determination
boils down to whether the post-retention profit generated from
the customer is predicted to be greater than the cost incurred to
retain the customer. Customers need to be managed as
investments.
Tag #3: What retention tactics should be used to retain this
customer? For customers who are deemed “save-worthy,” it's
essential for the company to know which save tactics are most
likely to be successful. Tactics commonly used range from
providing “special” customer discounts to sending customers
communications that reinforce the value proposition of the
given service.
13
Alternative Bases for Market Segmentation
Geographic
Region, country size, city size, density, climate
Demographic
Age, gender, family size, family life cycle, income, occupation,
education, religion, race, nationality
Psychographic
Social class, personality
Behavioral
Use occasion, benefits sought, user status, usage rate, loyalty
status, readiness stage, attitude toward product
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Market segmentation on these characteristics is possible with
the use of business analytics or data mining.
14
Product Positioning (1 of 2)
Product Positioning
entails developing schematic representations that reflect how
your products or services compare to competitors' on
dimensions most important to success in the industry
Also called perceptual mapping
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Product positioning is widely used for deciding how to meet the
needs and wants of particular consumer groups.
15
Product Positioning Steps (1 of 2)
Select key criteria that effectively differentiate products or
services in the industry.
Diagram a two-dimensional product-positioning map with
specified criteria on each axis.
Plot major competitors' products or services in the resultant
four-quadrant matrix.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Product positioning can be summarized in five steps.
16
Product Positioning Steps (2 of 2)
Identify areas in the positioning map where the company's
products or services could be most competitive in the given
target market. Look for vacant areas (niches).
Develop a marketing plan to position the company's products or
services appropriately.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Rules for Using Product Positioning as a Strategy-
Implementation Tool
Look for the hole or vacant niche.
Don’t serve two segments with the same strategy.
Don't position yourself in the middle of the map.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Some rules for using product positioning as a strategy-
implementation tool are on this slide.
18
Product Positioning (2 of 2)
An effective product positioning strategy meets two criteria:
It uniquely distinguishes a company from the competition
It leads customers to expect slightly less service than a
company can deliver
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Firms need to inform customers about what to expect and then
exceed the promise. Underpromise and overdeliver! That is a
key for excellent strategy implementation.
19
Example of a Product-Positioning Map
Figure 8-2 A Perceptual Map for the Automobile Industry
Source: Based on info at
http://en.wikipedia.org/wiki/Perceptual_mapping.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
This is an example of a product positioning map for the auto
industry.
20
Finance/Accounting Issues (1 of 3)
To raise capital with short-term debt, long-term debt, preferred
stock, or common stock
To lease or buy fixed assets
To determine an appropriate dividend payout ratio
To use LIFO (Last-in, First-out), FIFO (First-in, First-out), or a
market-value accounting approach
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Several finance and accounting concepts central to strategy
implementation are acquiring needed capital, developing
projected financial statements, preparing financial budgets, and
evaluating the worth of a business. Some examples of decisions
that may require finance and accounting policies are included
on the next two slides.
21
Finance/Accounting Issues (2 of 3)
To extend the time of accounts receivable
To establish a certain percentage discount on accounts within a
specified period of time
To determine the amount of cash that should be kept on hand
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Finance/Accounting Issues (3 of 3)
Acquire needed capital to implement strategies.
Develop projected financial statements to show expected impact
of strategies implemented.
Determine the firm’s value (corporate valuation) in the event an
offer is received.
Decide whether to go public with an Initial Public Offering
(IPO).
Decide whether to keep cash offshore that was earned offshore.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Five especially important finance and accounting activities
central to strategy implementation are listed on this slide and
explained on later slides.
23
Acquiring Capital to Implement Strategies (1 of 2)
Successful strategy implementation often requires additional
capital.
Besides net profit from operations and the sale of assets, two
basic sources of capital for an organization are debt and equity.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
When a firm needs additional capital, the choice is often made
between debt or equity financing.
24
Acquiring Capital to Implement Strategies (2 of 2)
EPS = Earnings Per Share, which is Net Income divided by # of
Shares Outstanding
Another term for Shares Outstanding is Shares Issued
EBIT = Earnings Before Interest and Taxes (also called
operating income)
EBT = Earnings Before Tax
EAT = Earnings After Tax
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Successful strategy implementation often requires additional
capital. Besides net profit from operations and the sale of
assets, two basic sources of capital for an organization are debt
and equity.
25
Table 8-4 EPS/EBIT Analysis for the XYZ Company
Conclusion: The best financing alternative is 100% stock
because the EPS values are largest; the worst financing
alternative is 100% debt because the EPS values are lowest.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
The best way to explain EPS/EBIT analysis is by working
through an example for the XYZ Company, as provided in Table
8-4. Note that 100 percent stock is the best financing alternative
as indicated by the EPS values of 0.0279 and 0.056.
26
Figure 8-6 An EPS/EBIT Chart for the XYZ Company
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
As noted in Figure 8-6, the top row (EBIT) on the x-axis is
graphed with the bottom row (EPS) on the y-axis, and the
highest plotted line reveals the best method. Sometimes the
plotted lines will interact, so a graph is especially helpful in
making the capital acquisition decision, rather than solely
relying on a table of numbers.
27
Projected Financial Statements
Projected Financial Statements
allows an organization to examine the expected results of
various actions and approaches
allows an organization to compute projected financial ratios
under various strategy-implementation decisions
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Most financial institutions require at least three years of
projected financial statements whenever a business seeks
capital.
28
Performing Projected Financial Analysis (1 of 2)
Prepare the projected income statement before the balance
sheet.
Use the percentage-of-sales method to project cost of goods
sold (CGS) and the expense items in the income statement.
Calculate the projected net income.
Subtract from the net income any dividends to be paid for that
year.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Projected financial analysis can be explained in seven steps.
29
Performing Projected Financial Analysis (2 of 2)
Project the balance sheet items, beginning with retained
earnings and then forecasting stockholders' equity, long-term
liabilities, current liabilities, total liabilities, total assets, fixed
assets, and current assets (in that order).
Use the cash account as the plug figure.
List commentary (remarks) on the projected statements.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Corporate Valuation
Methods:
The Net Worth Method
Total Shareholders’ Equity (SE) minus (Goodwill + Intangibles)
The Net Income Method
Net Income × Five
Price-Earnings Ratio Method
Outstanding Shares Method
# of Shares Outstanding × Stock Price
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Four methods are often used to determine the monetary value of
a company.
31
IPOs, Cash Management, and Corporate Bonds
Go public with an IPO?
Keep cash offshore if earned offshore?
Issue corporate bonds for what purpose?
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
This slide lists important financial decisions that companies
must make.
32
Research and Development (R and D) Issues
Emphasize product or process improvements.
Stress basic or applied research.
Be leaders or followers in R and D.
Develop robotics or manual-type processes.
Spend a high, average, or low amount of money on R and D.
Perform R and D within the firm or contract R and D to outside
firms.
Use university researchers or private-sector researchers.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Research and development (R&D) personnel can play an
integral part in strategy implementation. These individuals are
generally charged with developing new products and improving
old products effectively.
33
R and D Approaches for Implementing Strategies
Be the first firm to market new technological products.
Be an innovative imitator of successful products, thus
minimizing the risks and costs of start-up.
Be a low-cost producer by mass-producing products similar to
but less expensive than products recently introduced.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
There are at least three major R&D approaches for
implementing strategies.
34
Management Information System (M I S) Issues
Having an effective management information system (M I S)
may be the most important factor in differentiating successful
from unsuccessful firms.
The process of strategic management is facilitated immensely in
firms that have an effective information system.
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Firms that gather, assimilate, and evaluate external and internal
information most effectively are gaining competitive advantages
over other firms.
35
Mobile Computing
Mobile tracking of employees
Mobile apps for customers
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Mobile devices and inexpensive monitoring software now
enable companies to know where employees are, eavesdrop on
their phone calls, and do other things such as know whether or
not a driver is wearing his/her seatbelt.
Companies are increasingly developing mobile apps for
customers and using resultant data to devise improved strategies
for attracting customers.
36
Copyright
Copyright © 2017, 2015, 2013 Pearson Education, Inc. All
Rights Reserved
Stock Price
NI
EPS
´
INFORMATION
GOVERNANCE
Founded in 1807, John Wiley & Sons is the oldest independent
publishing company in
the United States. With offi ces in North America, Europe,
Asia, and Australia, Wiley
is globally committed to developing and marketing print and
electronic products and
services for our customers’ professional and personal
knowledge and understanding.
The Wiley CIO series provides information, tools, and insights
to IT executives
and managers. The products in this series cover a wide range of
topics that supply
strategic and implementation guidance on the latest technology
trends, leadership, and
emerging best practices.
Titles in the Wiley CIO series include:
The Agile Architecture Revolution: How Cloud Computing,
REST-Based SOA, and
Mobile Computing Are Changing Enterprise IT by Jason
BloombergT
Big Data, Big Analytics: Emerging Business Intelligence and
Analytic Trends for Today’s
Businesses by Michael Minelli, Michele Chambers, and Ambiga
Dhiraj
The Chief Information Offi cer’s Body of Knowledge: People,
Process, and Technology by
Dean Lane
CIO Best Practices: Enabling Strategic Value with Information
Technology (Second
Edition) by Joe Stenzel, Randy Betancourt, Gary Cokins, Alyssa
Farrell, Bill
Flemming, Michael H. Hugos, Jonathan Hujsak, and Karl
Schubert
The CIO Playbook: Strategies and Best Practices for IT Leaders
to Deliver Value by
Nicholas R. Colisto
Enterprise Performance Management Done Right: An Operating
System for Your
Organization by Ron Dimon
Executive’s Guide to Virtual Worlds: How Avatars Are
Transforming Your Business and
Your Brand by Lonnie Bensond
IT Leadership Manual: Roadmap to Becoming a Trusted
Business Partner by Alan R. r
Guibord
Managing Electronic Records: Methods, Best Practices, and
Technologies by Robert F. s
Smallwood
On Top of the Cloud: How CIOs Leverage New Technologies to
Drive Change and Build
Value Across the Enterprise by Hunter Muller
Straight to the Top: CIO Leadership in a Mobile, Social, and
Cloud-based World (Second
Edition) by Gregory S. Smith
Strategic IT: Best Practices for Managers and Executives by
Arthur M. Langer ands
Lyle Yorks
Transforming IT Culture: How to Use Social Intelligence,
Human Factors, and
Collaboration to Create an IT Department That Outperforms by
Frank Wanders
Unleashing the Power of IT: Bringing People, Business, and
Technology Together by Dan
Roberts
The U.S. Technology Skills Gap: What Every Technology
Executive Must Know to Save
America’s Future by Gary J. Beach
Information Governance: Concepts, Strategies and Best
Practices by Robert F. Smallwoods
Robert F. Smallwood
INFORMATION
GOVERNANCE
CONCEPTS, STRATEGIES AND
BEST PRACTICES
Cover image: © iStockphoto / IgorZh
Cover design: Wiley
Copyright © 2014 by Robert F. Smallwood. All rights reserved.
Chapter 7 © 2014 by Barclay Blair
Portions of Chapter 8 © 2014 by Randolph Kahn
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a
retrieval system, or transmitted in any form
or by any means, electronic, mechanical, photocopying,
recording, scanning, or otherwise, except as
permitted under Section 107 or 108 of the 1976 United States
Copyright Act, without either the prior
written permission of the Publisher, or authorization through
payment of the appropriate per-copy fee
to the Copyright Clearance Center, Inc., 222 Rosewood Drive,
Danvers, MA 01923, (978) 750-8400, fax
(978) 646-8600, or on the Web at www.copyright.com. Requests
to the Publisher for permission should
be addressed to the Permissions Department, John Wiley &
Sons, Inc., 111 River Street, Hoboken, NJ
07030, (201) 748-6011, fax (201) 748-6008, or online at
http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: While the publisher
and author have used their best
efforts in preparing this book, they make no representations or
warranties with respect to the accuracy
or completeness of the contents of this book and specifi cally
disclaim any implied warranties of
merchantability or fi tness for a particular purpose. No
warranty may be created or extended by sales
representatives or written sales materials. The advice and
strategies contained herein may not be suitable
for your situation. You should consult with a professional
where appropriate. Neither the publisher nor
author shall be liable for any loss of profi t or any other
commercial damages, including but not limited to
special, incidental, consequential, or other damages.
For general information on our other products and services or
for technical support, please contact our
Customer Care Department within the United States at (800)
762-2974, outside the United States at (317)
572-3993 or fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and
by print-on-demand. Some material included
with standard print versions of this book may not be included in
e-books or in print-on-demand. If this book
refers to media such as a CD or DVD that is not included in the
version you purchased, you may download this
material at http://booksupport.wiley.com. For more information
about Wiley products, visit www.wiley.com.
Library of Congress Cataloging-in-Publication Data:
Smallwood, Robert F., 1959-
Information governance : concepts, strategies, and best
practices / Robert F. Smallwood.
pages cm. — (Wiley CIO series)
ISBN 978-1-118-21830-3 (cloth); ISBN 978-1-118-41949-6
(ebk); ISBN 978-1-118-42101-7 (ebk)
1. Information technology—Management. 2. Management
information systems. 3. Electronic
records—Management. I. Title.
HD30.2.S617 2014
658.4’038—dc23
2013045072
Printed in the United States of America
10 9 8 7 6 5 4 3 2 1
http://www.copyright.com
http://www.wiley.com/go/permissions
http://booksupport.wiley.com
http://www.wiley.com
For my sons
and the next generation of tech-savvy managers
vii
CONTENTS
PREFACE xv
ACKNOWLEDGMENTS xvii
PA RT O N E — Information Governance Concepts,
Defi nitions, and Principles 1p
C H A P T E R 1 The Onslaught of Big Data and the
Information Governance
Imperative 3
Defi ning Information Governance 5
IG Is Not a Project, But an Ongoing Program 7
Why IG Is Good Business 7
Failures in Information Governance 8
Form IG Policies, Then Apply Technology for Enforcement 10
Notes 12
C H A P T E R 2 Information Governance, IT Governance, Data
Governance: What’s the Difference? 15
Data Governance 15
IT Governance 17
Information Governance 20
Impact of a Successful IG Program 20
Summing Up the Differences 21
Notes 22
C H A P T E R 3 Information Governance Principles 25
Accountability Is Key 27
Generally Accepted Recordkeeping Principles® 27
Contributed by Charmaine Brooks, CRM
Assessment and Improvement Roadmap 34
Who Should Determine IG Policies? 35
Notes 38
PA RT T W O — Information Governance Risk Assessment
and Strategic Planning 41g g
C H A P T E R 4 Information Risk Planning and Management
43
Step 1: Survey and Determine Legal and Regulatory
Applicability
and Requirements 43
viii CONTENTS
Step 2: Specify IG Requirements to Achieve Compliance 46
Step 3: Create a Risk Profi le 46
Step 4: Perform Risk Analysis and Assessment 48
Step 5: Develop an Information Risk Mitigation Plan 49
Step 6: Develop Metrics and Measure Results 50
Step 7: Execute Your Risk Mitigation Plan 50
Step 8: Audit the Information Risk Mitigation Program 51
Notes 51
C H A P T E R 5 Strategic Planning and Best Practices for
Information Governance 53
Crucial Executive Sponsor Role 54
Evolving Role of the Executive Sponsor 55
Building Your IG Team 56
Assigning IG Team Roles and Responsibilities 56
Align Your IG Plan with Organizational Strategic Plans 57
Survey and Evaluate External Factors 58
Formulating the IG Strategic Plan 65
Notes 69
C H A P T E R 6 Information Governance Policy Development
71
A Brief Review of Generally Accepted Recordkeeping
Principles® 71
IG Reference Model 72
Best Practices Considerations 75
Standards Considerations 76
Benefi ts and Risks of Standards 76
Key Standards Relevant to IG Efforts 77
Major National and Regional ERM Standards 81
Making Your Best Practices and Standards Selections to Inform
Your IG Framework 87
Roles and Responsibilities 88
Program Communications and Training 89
Program Controls, Monitoring, Auditing and Enforcement 89
Notes 91
PA RT T H R E E — Information Governance Key
Impact Areas Based on the IG Reference Model 95p
C H A P T E R 7 Business Considerations for a Successful IG
Program 97
By Barclay T. Blair
Changing Information Environment 97
CONTENTS ix
Calculating Information Costs 99
Big Data Opportunities and Challenges 100
Full Cost Accounting for Information 101
Calculating the Cost of Owning Unstructured Information 102
The Path to Information Value 105
Challenging the Culture 107
New Information Models 107
Future State: What Will the IG-Enabled Organization Look
Like? 110
Moving Forward 111
Notes 113
C H A P T E R 8 Information Governance and Legal Functions
115
By Robert Smallwood with Randy Kahn, Esq., and Barry
Murphy
Introduction to e-Discovery: The Revised 2006 Federal Rules of
Civil Procedure Changed Everything 115
Big Data Impact 117
More Details on the Revised FRCP Rules 117
Landmark E-Discovery Case: Zubulake v. UBS Warburg 119
E-Discovery Techniques 119
E-Discovery Reference Model 119
The Intersection of IG and E-Discovery 122
By Barry Murphy
Building on Legal Hold Programs to Launch Defensible
Disposition 125
By Barry Murphy
Destructive Retention of E-Mail 126
Newer Technologies That Can Assist in E-Discovery 126
Defensible Disposal: The Only Real Way To Manage Terabytes
and Petabytes 130
By Randy Kahn, Esq.
Retention Policies and Schedules 137
By Robert Smallwood, edited by Paula Lederman, MLS
Notes 144
C H A P T E R 9 Information Governance and Records and
Information Management Functions 147
Records Management Business Rationale 149
Why Is Records Management So Challenging? 150
Benefi ts of Electronic Records Management 152
Additional Intangible Benefi ts 153
Inventorying E-Records 154
Generally Accepted Recordkeeping Principles® 155
E-Records Inventory Challenges 155
x CONTENTS
Records Inventory Purposes 156
Records Inventorying Steps 157
Ensuring Adoption and Compliance of RM Policy 168
General Principles of a Retention Scheduling 169
Developing a Records Retention Schedule 170
Why Are Retention Schedules Needed? 171
What Records Do You Have to Schedule? Inventory and Classifi
cation 173
Rationale for Records Groupings 174
Records Series Identifi cation and Classifi cation 174
Retention of E-Mail Records 175
How Long Should You Keep Old E-Mails? 176
Destructive Retention of E-Mail 177
Legal Requirements and Compliance Research 178
Event-Based Retention Scheduling for Disposition of E-Records
179
Prerequisites for Event-Based Disposition 180
Final Disposition and Closure Criteria 181
Retaining Transitory Records 182
Implementation of the Retention Schedule and Disposal of
Records 182
Ongoing Maintenance of the Retention Schedule 183
Audit to Manage Compliance with the Retention Schedule 183
Notes 186
C H A P T E R 10 Information Governance and Information
Technology Functions 189
Data Governance 191
Steps to Governing Data Effectively 192
Data Governance Framework 193
Information Management 194
IT Governance 196
IG Best Practices for Database Security and Compliance 202
Tying It All Together 204
Notes 205
C H A P T E R 11 Information Governance and Privacy and
Security Functions 207
Cyberattacks Proliferate 207
Insider Threat: Malicious or Not 208
Privacy Laws 210
Defense in Depth 212
Controlling Access Using Identity Access Management 212
Enforcing IG: Protect Files with Rules and Permissions 213
CONTENTS xi
Challenge of Securing Confi dential E-Documents 213
Apply Better Technology for Better Enforcement in the
Extended Enterprise 215
E-Mail Encryption 217
Secure Communications Using Record-Free E-Mail 217
Digital Signatures 218
Document Encryption 219
Data Loss Prevention (DLP) Technology 220
Missing Piece: Information Rights Management (IRM) 222
Embedded Protection 226
Hybrid Approach: Combining DLP and IRM Technologies 227
Securing Trade Secrets after Layoffs and Terminations 228
Persistently Protecting Blueprints and CAD Documents 228
Securing Internal Price Lists 229
Approaches for Securing Data Once It Leaves the Organization
230
Document Labeling 231
Document Analytics 232
Confi dential Stream Messaging 233
Notes 236
PA RT F O U R — Information Governance for
Delivery Platforms 239y
C H A P T E R 12 Information Governance for E-Mail and
Instant Messaging 241
Employees Regularly Expose Organizations to E-Mail Risk 242
E-Mail Polices Should Be Realistic and Technology Agnostic
243
E-Record Retention: Fundamentally a Legal Issue 243
Preserve E-Mail Integrity and Admissibility with Automatic
Archiving 244
Instant Messaging 247
Best Practices for Business IM Use 247
Technology to Monitor IM 249
Tips for Safer IM 249
Notes 251
C H A P T E R 13 Information Governance for Social Media
253
By Patricia Franks, Ph.D, CRM, and Robert Smallwood
Types of Social Media in Web 2.0 253
Additional Social Media Categories 255
Social Media in the Enterprise 256
Key Ways Social Media Is Different from E-Mail and Instant
Messaging 257
Biggest Risks of Social Media 257
Legal Risks of Social Media Posts 259
xii CONTENTS
Tools to Archive Social Media 261
IG Considerations for Social Media 262
Key Social Media Policy Guidelines 263
Records Management and Litigation Considerations for Social
Media 264
Emerging Best Practices for Managing Social Media Records
267
Notes 269
C H A P T E R 14 Information Governance for Mobile Devices
271
Current Trends in Mobile Computing 273
Security Risks of Mobile Computing 274
Securing Mobile Data 274
Mobile Device Management 275
IG for Mobile Computing 276
Building Security into Mobile Applications 277
Best Practices to Secure Mobile Applications 280
Developing Mobile Device Policies 281
Notes 283
C H A P T E R 15 Information Governance for Cloud
Computing 285
By Monica Crocker CRM, PMP, CIP, and Robert Smallwood
Defi ning Cloud Computing 286
Key Characteristics of Cloud Computing 287
What Cloud Computing Really Means 288
Cloud Deployment Models 289
Security Threats with Cloud Computing 290
Benefi ts of the Cloud 298
Managing Documents and Records in the Cloud 299
IG Guidelines for Cloud Computing
Solution
s 300
Notes 301
C H A P T E R 16 SharePoint Information Governance 303
By Monica Crocker, CRM, PMP, CIP, edited by Robert
Smallwood
Process Change, People Change 304
Where to Begin the Planning Process 306
Policy Considerations 310
Roles and Responsibilities 311
Establish Processes 312
Training Plan 313
Communication Plan 313
Note 314
CONTENTS xiii
PA RT F I V E — Long-Term Program Issues 315g g
C H A P T E R 17 Long-Term Digital Preservation 317
By Charles M. Dollar and Lori J. Ashley
Defi ning Long-Term Digital Preservation 317
Key Factors in Long-Term Digital Preservation 318
Threats to Preserving Records 320
Digital Preservation Standards 321
PREMIS Preservation Metadata Standard 328
Recommended Open Standard Technology-Neutral Formats 329
Digital Preservation Requirements 333
Long-Term Digital Preservation Capability Maturity Model®
334
Scope of the Capability Maturity Model 336
Digital Preservation Capability Performance Metrics 341
Digital Preservation Strategies and Techniques 341
Evolving Marketplace 344
Looking Forward 344
Notes 346
C H A P T E R 18 Maintaining an Information Governance
Program
and Culture of Compliance 349
Monitoring and Accountability 349
Staffi ng Continuity Plan 350
Continuous Process Improvement 351
Why Continuous Improvement Is Needed 351
Notes 353
A P P E N D I X A Information Organization and Classifi
cation:
Taxonomies and Metadata 355
By Barb Blackburn, CRM, with Robert Smallwood; edited by
Seth Earley
Importance of Navigation and Classifi cation 357
When Is a New Taxonomy Needed? 358
Taxonomies Improve Search Results 358
Metadata and Taxonomy 359
Metadata Governance, Standards, and Strategies 360
Types of Metadata 362
Core Metadata Issues 363
International Metadata Standards and Guidance 364
Records Grouping Rationale 368
Business Classifi cation Scheme, File Plans, and Taxonomy 368
Classifi cation and Taxonomy 369
xiv CONTENTS
Prebuilt versus Custom Taxonomies 370
Thesaurus Use in Taxonomies 371
Taxonomy Types 371
Business Process Analysis 377
Taxonomy Testing: A Necessary Step 379
Taxonomy Maintenance 380
Social Tagging and Folksonomies 381
Notes 383
A P P E N D I X B Laws and Major Regulations Related to
Records Management 385
United States 385
Canada 387
By Ken Chasse, J.D., LL.M.
United Kingdom 389
Australia 391
Notes 394
A P P E N D I X C Laws and Major Regulations
Related to Privacy 397
United States 397
Major Privacy Laws Worldwide, by Country 398
Notes 400
GLOSSARY 401
ABOUT THE AUTHOR 417
ABOUT THE MAJOR CONTRIBUTORS 419
INDEX 421
xv
PREFACE
I
nformation governance (IG) has emerged as a key concern for
business executives
and managers in today’s environment of Big Data, increasing
information risks, co-
lossal leaks, and greater compliance and legal demands. But few
seem to have a clear
understanding of what IG is; that is, how you defi ne what it is
and is not, and how to
implement it. This book clarifi es and codifi es these defi
nitions and provides key in-
sights as to how to implement and gain value from IG programs.
Based on exhaustive
research, and with the contributions of a number of industry
pioneers and experts, this
book lays out IG as a complete discipline in and of itself for the
fi rst time.
IG is a super-discipline that includes components of several
key fi elds: law, records
management, information technology (IT), risk management,
privacy and security,
and business operations. This unique blend calls for a new breed
of information pro-
fessional who is competent across these established and quite
complex fi elds. Training
and education are key to IG success, and this book provides the
essential underpinning
for organizations to train a new generation of IG professionals.
Those who are practicing professionals in the component fi
elds of IG will fi nd
the book useful in expanding their knowledge from traditional fi
elds to the emerging
tenets of IG. Attorneys, records and compliance managers, risk
managers, IT manag-
ers, and security and privacy professionals will fi nd this book a
particularly valuable
resource.
The book strives to offer clear IG concepts, actionable
strategies, and proven best
practices in an understandable and digestible way; a concerted
effort was made to
simplify language and to offer examples. There are summaries
of key points through-
out and at the end of each chapter to help the reader retain
major points. The text
is organized into fi ve parts: (1) Information Governance
Concepts, Defi nitions, and
Principles; (2) IG Risk Assessment and Strategic Planning; (3)
IG Key Impact Areas;
(4) IG for Delivery Platforms; and (5) Long-Term Program
Issues. Also included are
appendices with detailed information on taxonomy and metadata
design and on re-
cords management and privacy legislation.
One thing that is sure is that the complex fi eld of IG is
evolving. It will continue
to change and solidify. But help is here: No other book offers
the kind of compre-
hensive coverage of IG contained within these pages.
Leveraging the critical advice
provided here will smooth your path to understanding and
implementing successful
IG programs.
Robert F. Smallwood
xvii
ACKNOWLEDGMENTS
I
would like to sincerely thank my colleagues for their support
and generous contribu-
tion of their expertise and time, which made this pioneering text
possible.
Many thanks to Lori Ashley, Barb Blackburn, Barclay Blair,
Charmaine Brooks,
Ken Chasse, Monica Crocker, Charles M. Dollar, Seth Earley,
Dr. Patricia Franks,
Randy Kahn, Paula Lederman, and Barry Murphy.
I am truly honored to include their work and owe them a great
debt of gratitude.
PA RT O N E
Information
Governance
Concepts,
Defi nitions, and
Principles
3
The Onslaught
of Big Data and
the Information
Governance Imperative
C H A P T E R 1
T
he value of information in business is rising, and business
leaders are more and
more viewing the ability to govern, manage, and harvest
information as critical
to success. Raw data is now being increasingly viewed as an
asset that can be
leveraged, just like fi nancial or human capital.1 Some have
called this new age of “Big
Data” the “industrial revolution of data.”
According to the research group Gartner, Inc., Big Data is defi
ned as “high-volume,
high-velocity and high-variety information assets that demand
cost-effective, inno-
vative forms of information processing for enhanced insight and
decision making.” 2
A practical defi nition should also include the idea that the
amount of data—both struc-
tured (in databases) and unstructured (e.g., e-mail, scanned
documents) is so mas-
sive that it cannot be processed using today’s database tools and
analytic software
techniques. 3
In today’s information overload era of Big Data—characterized
by massive growth
in business data volumes and velocity—the ability to distill key
insights from enor-
mous amounts of data is a major business differentiator and
source of sustainable com-
petitive advantage. In fact, a recent report by the World
Economic Forum stated that
data is a new asset class and personal data is “the new oil.” 4
And we are generating more
than we can manage effectively with current methods and tools.
The Big Data numbers are overwhelming: Estimates and
projections vary, but it
has been stated that 90 percent of the data existing worldwide
today was created in the
last two years 5 and that every two days more information is
generated than was from
the dawn of civilization until 2003. 6 This trend will
continue: The global market for
Big Data technology and services is projected to grow at a
compound annual rate of
27 percent through 2017, about six times faster than the general
information and com-
munications technology (ICT) market. 7
Many more comparisons and statistics are available, and all
demonstrate the
incredible and continued growth of data.
Certainly, there are new and emerging opportunities arising
from the accu-
mulation and analysis of all that data we are busy generating
and collecting. New
enterprises are springing up to capitalize on data mining and
business intelligence
opportunities. The U.S. federal government joined in,
announcing $200 million in
Big Data research programs in 2012.8
4 INFORMATION GOVERNANCE
Big Data values massive accumulation of data, whereas in
business, e-discovery
realities and potential legal liabilities dictate that data be culled
to only that
which has clear business value.
But established organizations, especially larger ones, are being
crushed by this
onslaught of Big Data: It is just too expensive to keep all the
information that is being
generated, and unneeded information is a sort of irrelevant
sludge for decision makers
to wade through. They have diffi culty knowing which
information is an accurate and
meaningful “wheat” and which is simply irrelevant “chaff.”
This means they do not
have the precise information they need to base good business
decisions upon.
And all that Big Data piling up has real costs: The burden of
massive stores of
information has increased storage management costs
dramatically, caused overloaded
systems to fail, and increased legal discovery costs. 9 Further,
the longer that data is
kept, the more likely that it will need to be migrated to newer
computing platforms,
driving up conversion costs; and legally, there is the risk that
somewhere in that
mountain of data an organization stores is a piece of
information that represents a
signifi cant legal liability.10
This is where the worlds of Big Data and business collide . For
Big Data proponents,
more data is always better, and there is no perceived downside
to accumulation of mas-
sive amounts of data. In the business world, though, the
realities of legal e-discovery
mean the opposite is true. 11 To reduce risk, liability, and
costs, it is critical for unneeded
information to be disposed of in a systematic, methodical, and
“legally defensible” (jus-
tifi able in legal proceedings) way, when it no longer has legal,
regulatory, or business
value. And there also is the high-value benefi t of basing
decisions on better, cleaner
data, which can come about only through rigid, enforced
information governance
(IG) policies that reduce information glut.
Organizations are struggling to reduce and right-size their
information footprint
by discarding superfl uous and redundant data, e-documents,
and information. But the
critical issue is devising policies, methods, and processes and
then deploying information technol-
ogy (IT) to sort through which information is valuable and
which no longer has business value
and can be discarded.
IT, IG, risk, compliance, and legal representatives in
organizations have a clear
sense that most of the information stored is unneeded, raises
costs, and poses risks.
According to a survey taken at a recent Compliance,
Governance and Oversight
Counsel summit, respondents estimated that approximately 25
percent of information
stored in organizations has real business value, while 5 percent
must be kept as busi-
ness records and about 1 percent is retained due to a litigation
hold. “This means that
The onslaught of Big Data necessitates that information
governance (IG) be
implemented to discard unneeded data in a legally defensible
way.
THE ONSLAUGHT OF BIG DATA AND THE INFORMATION
GOVERNANCE IMPERATIVE 5
[about] 69 percent of information in most companies has no
business, legal, or regulatory value.
Companies that are able to dispose of this data debris return
more profi t to sharehold-
ers, can leverage more of their IT budgets for strategic
investments, and can avoid
excess expense in legal and regulatory response” (emphasis
added). 12
With a smaller information footprint , organizations can more
easily fi nd what they tt
need and derive business value from it.13 They must eliminate
the data debris regularly
and consistently, and to do this, processes and systems must be
in place to cull valuable
information and discard the data debris daily. An IG program
sets the framework to
accomplish this.
The business environment has also underscored the need for
IG. According to
Ted Friedman at Gartner, “The recent global fi nancial crisis
has put information gov-
ernance in the spotlight. . . . [It] is a priority of IT and business
leaders as a result of
various pressures, including regulatory compliance mandates
and the urgent need for
improved decision-making.” 14
And IG mastery is critical for executives: Gartner predicts that
by 2016, one in fi ve chief
information offi cers in regulated industries will be fi red from
their jobs for failed IG initiatives. s 15
Defi ning Information Governance
IG is a sort of super discipline that has emerged as a result of
new and tightened legislation
governing businesses, external threats such as hacking and data
breaches, and the recog-
nition that multiple overlapping disciplines were needed to
address today’s information
management challenges in an increasingly regulated and
litigated business environment.16
IG is a subset of corporate governance, and includes key
concepts from re-
cords management, content management, IT and data
governance, information se-
curity, data privacy, risk management, litigation readiness,
regulatory compliance,
long-term digital preservation , and even business intelligence.
This also means
that it includes related technology and discipline subcategories,
such as document
management, enterprise search, knowledge management, and
business continuity/
disaster recovery.
Only about one quarter of information organizations are
managing has real
business value.
With a smaller information footprint, it is easier for
organizations to fi nd the
information they need and derive business value from it.
IG is a subset of corporate governance.
6 INFORMATION GOVERNANCE
IG is a sort of superdiscipline that encompasses a variety
of key concepts from
a variety of related disciplines.
Practicing good IG is the essential foundation for building
legally defensible
disposition practices to discard unneeded information and to
secure confi dential in-
formation, which may include trade secrets, strategic plans,
price lists, blueprints, or
personally identifi able information (PII) subject to privacy
laws; it provides the basis
for consistent, reliable methods for managing data, e-
documents, and records.
Having trusted and reliable records, reports, data, and databases
enables managers
to make key decisions with confi dence.17 And accessing that
information and business
intelligence in a timely fashion can yield a long-term
sustainable competitive advan-
tage, creating more agile enterprises.
To do this, organizations must standardize and systematize
their handling of in-
formation. They must analyze and optimize how information is
accessed, controlled,
managed, shared, stored, preserved, and audited. They must
have complete, current,
and relevant policies, processes, and technologies to manage
and control information,
including who is able to access what information , and when,
to meet external legal
and regulatory demands and internal governance policy
requirements. In short, IG is
about information control and compliance.
IG is a subset of corporate governance, which has been around
as long as corpora-
tions have existed. IG is a rather new multidisciplinary fi eld
that is still being defi ned,
but has gained traction increasingly over the past decade. The
focus on IG comes not
only from compliance, legal, and records management
functionaries but also from ex-
ecutives who understand they are accountable for the
governance of information and
that theft or erosion of information assets has real costs and
consequences.
“Information governance” is an all-encompassing term for how
an organization
manages the totality of its information.
According to the Association of Records Managers and
Administrators
(ARMA), IG is “a strategic framework composed of standards,
processes, roles, and
metrics that hold organizations and individuals accountable to
create, organize, secure,
maintain, use, and dispose of information in ways that align
with and contribute to the
organization’s goals.”18
IG includes the set of policies, processes, and controls to
manage information in compliance
with external regulatory requirements and internal governance
frameworks . Specifi c policiess
apply to specifi c data and document types, records series, and
other business informa-
tion, such as e-mail and reports.
Stated differently, IG is “a quality-control discipline for
managing, using, improv-
ing, and protecting information.” 19
Practicing good IG is the essential foundation for building
legally defensible
disposition practices to discard unneeded information.
THE ONSLAUGHT OF BIG DATA AND THE INFORMATION
GOVERNANCE IMPERATIVE 7
IG is “a strategic framework composed of standards,
processes, roles, and
metrics, that hold organizations and individuals accountable to
create, orga-
nize, secure, maintain, use, and dispose of information in ways
that align with
and contribute to the organization’s goals.” 20
Fleshing out the defi nition further: “Information governance is
policy-based man-
agement of information designed to lower costs, reduce risk,
and ensure compliance
with legal, regulatory standards, and/or corporate
governance.”21 IG necessarily in-
corporates not just policies but information technologies to
audit and enforce those
policies. The IG team must be cognizant of information
lifecycle issues and be able
to apply the proper retention and disposition policies, including
digital preservation
where records need to be maintained for long periods.
IG Is Not a Project, But an Ongoing Program
IG is an ongoing program , not a one-time project. IG provides
an umbrella to manage
and control information output and communications. Since
technologies change so
quickly, it is necessary to have overarching policies that can
manage the various IT
platforms that an organization may use.
Compare it to a workplace safety program; every time a new
location, team member,
piece of equipment, or toxic substance is acquired by the
organization, the workplace
safety program should dictate how that is handled. If it does
not, the workplace safety
policies/procedures/training that are part of the workplace
safety program need to be
updated. Regular reviews are conducted to ensure the program
is being followed and ad-
justments are made based on the fi ndings. The effort never
ends. s 22 The same is true for IG.
IG is not only a tactical program to meet regulatory,
compliance, and litigation
demands. It can be strategic , in that it is the necessary
underpinning for developing a c
management strategy that maximizes knowledge worker
productivity while minimiz-
ing risk and costs.
Why IG Is Good Business
IG is a tough sell. It can be diffi cult to make the business case
for IG, unless there has been
some major compliance sanction, fi ne, legal loss, or colossal
data breach. In fact, the largest
IG is how an organization maintains security, complies
with regulations, and
meets ethical standards when managing information.
IG is a multidisciplinary program that requires an ongoing
effort.
8 INFORMATION GOVERNANCE
impediment to IG adoption is simply identifying its benefi ts
and costs, according to the Economist
Intelligence Unit. Sure, the enterprise needs better control over
its information, but how
much better? At what cost? What is the payback period and the
return on investment? 23
It is challenging to make the business case for IG, yet making
that case is funda-
mental to getting IG efforts off the ground.
Here are eight reasons why IG makes good business sense, from
IG thought
leader Barclay Blair:
1. We can’t keep everything forever. IG makes sense
because it enables organiza-
tions to get rid of unnecessary information in a defensible
manner. Organi-
zations need a sensible way to dispose of information in order
to reduce the
cost and complexity of the IT environment. Having unnecessary
informa-
tion around only makes it more diffi cult and expensive to
harness informa-
tion that has value.
2. We can’t throw everything away. IG makes sense because
organizations can’t
keep everything forever, nor can they throw everything away.
We need
information—the right information, in the right place, at the
right time.
Only IG provides the framework to make good decisions about
what infor-
mation to keep.
3. E-discovery. IG makes sense because it reduces the cost
and pain of discov-
ery. Proactively managing information reduces the volume of
information
exposed to e-discovery and simplifi es the task of fi nding and
producing
responsive information.
4. Your employees are screaming for it—just listen. IG
makes sense because it
helps knowledge workers separate “signal” from “noise” in their
informa-
tion fl ows. By helping organizations focus on the most valuable
informa-
tion, IG improves information delivery and improves
productivity.
5. It ain’t gonna get any easier. IG makes sense because
it is a proven way for
organizations to respond to new laws and technologies that
create new re-
quirements and challenges. The problem of IG will not get
easier over
time, so organizations should get started now.
6. The courts will come looking for IG. IG makes sense
because courts and regu-
lators will closely examine your IG program. Falling short can
lead to fi nes,
sanctions, loss of cases, and other outcomes that have negative
business and
fi nancial consequences.
7. Manage risk: IG is a big one. Organizations need to do
a better job of identi-
fying and managing risk. The risk of information management
failures is a
critical risk that IG helps to mitigate.
8. E-mail: Reason enough. IG makes sense because it helps
organizations take con-
trol of e-mail. Solving e-mail should be a top priority for every
organization. 24
Failures in Information Governance
The failure to implement and enforce IG can lead to
vulnerabilities that can have dire
consequences. The theft of confi dential U.S. National Security
Agency documents
THE ONSLAUGHT OF BIG DATA AND THE INFORMATION
GOVERNANCE IMPERATIVE 9
by Edward Snowden in 2013 could have been prevented by
properly enforced IG.
Also, Ford Motor Company is reported to have suffered a loss
estimated at $50 to
$100 million as a result of the theft of confi dential documents
by one of its own em-
ployees. A former product engineer who had access to
thousands of trade secret docu-
ments and designs sold them to a competing Chinese car
manufacturer. A strong IG
program would have controlled and tracked access and
prevented the theft while pro-
tecting valuable intellectual property. 25
Law enforcement agencies have also suffered from poor IG. In
a rather frivolous
case in 2013 that highlighted the lack of policy enforcement for
the mobile environ-
ment, it was reported that U.S. agents from the Federal Bureau
of Investigation used
government-issued mobile phones to send explicit text messages
and nude photographs
to coworkers. The incidents did not have a serious impact but
did compromise the
agency and its integrity, and “adversely affected the daily
activities of several squads.” 26
Proper mobile communications policies were obviously not
developed and enforced.
IG is also about information security and privacy, and serious
thought must be
given when creating policies to safeguard personal, classifi ed
or confi dential informa-
tion. Schemes to compromise or steal information can be quite
deceptive and devious,
masked by standard operating procedures—if proper IG controls
and monitoring are
not in place. To wit: Granting remote access to confi dential
information assets for
key personnel is common. Granting medical leave is also
common. But a deceptive
and dishonest employee could feign a medical leave while
downloading volumes of
confi dential information assets for a competitor—and that is
exactly what happened at
Accenture, a global consulting fi rm. During a fraudulent
medical leave, an employee
was allowed access to Accenture’s Knowledge Exchange (KX),
a detailed knowledge
base containing previous proposals, expert reports, cost-
estimating guidelines, and
case studies. This activity could have been prevented by
monitoring and analytics that
would have shown an inordinate amount of downloads—
especially for an “ailing” em-
ployee. The employee then went to work for a direct competitor
and continued to
download the confi dential information from Accenture,
estimated to be as many as
1,000 critical documents. While the online access to KX was
secure, the use of the
electronic documents could have been restricted even after the
documents were down-r
loaded, if IG measures were in place and newer technologies
(such as information
rights management [IRM] software) were deployed to secure
them directly and main-
tain that security remotely. With IRM, software security
protections can be employed
to seal the e-documents and control their use—even after they
leave the organization.
More details on IRM technology and its capabilities is presented
later in this book.
Other recent high-profi le data and document leakage cases
revealing information
security weaknesses that could have been prevented by a robust
IG program include:
■ Huawei Technologies, the largest networking and mobile
communications
company in China, was sued by U.S.-based Motorola for
allegedly conspiring
to steal trade secrets through former Motorola employees.
Ford’s loss from stolen documents in a single case of
intellectual property (IP)
theft was estimated at $50 to $100 million.
10 INFORMATION GOVERNANCE
■ MI6, the U.K. equivalent of the U.S. Central Intelligence
Agency, learned that
one of its agents in military intelligence attempted to sell confi
dential docu-
ments to the intelligence services of the Netherlands for £2
million GBP
($3 million USD).
And breaches of personal information revealing failures in
privacy protection
abound; here are just a few:
■ Health information of 1,600 cardiology patients at Texas
Children’s Hospital
was compromised when a doctor’s laptop was stolen. The
information includ-
ed personal and demographic information about the patients,
including their
names, dates of birth, diagnoses, and treatment histories. 27
■ U.K. medics lost the personal records of nearly 12,000
National Health Service
patients in just eight months. Also, a hospital worker was
suspended after it was
discovered he had sent a fi le containing pay-slip details for
every member of
staff to his home e-mail account. 28
■ Personal information about more than 600 patients of the
Fraser Health
Authority in British Columbia, Canada, was stored on a laptop
stolen from
Burnaby General Hospital.
■ In December 2013, Target stores in the U.S. reported that
as many as 110 million
customer records had been breached in a massive attack that
lasted weeks.
The list of breaches and IG failures could go on and on, more
than fi lling the
pages of this book. It is clear that it is occurring and that it will
continue. IG controls to
safeguard confi dential information assets and protect privacy
cannot rely solely on the trustwor-
thiness of employees and basic security measures. Up-to-date
IG policies and enforcement
efforts and newer technology sets are needed, with active,
consistent monitoring and
program adjustments to continue to improve.
Executives and senior managers can no longer avoid the issue,
as it is abundantly
clear that the threat is real and the costs of taking such
avoidable risks can be high. A
single security breach is an IG failure and can cost the entire
business. According to
Debra Logan of Gartner, “When organizations suffer high-profi
le data losses, espe-
cially involving violations of the privacy of citizens or
consumers, they suffer serious
reputational damage and often incur fi nes or other sanctions. IT
leaders will have to
take at least part of the blame for these incidents.” 29
Form IG Policies, Then Apply Technology for Enforcement
Typically, some policies governing the use and control of
information and records
may have been established for fi nancial and compliance
reports, and perhaps e-mail,
but they are often incomplete and out-of-date and have not been
adjusted for changes
in the business environment, such as new technology platforms
(e.g., Web 2.0, social
IG controls to safeguard confi dential information assets
and protect privacy can-
not rely solely on the trustworthiness of employees and basic
security measures.
THE ONSLAUGHT OF BIG DATA AND THE INFORMATION
GOVERNANCE IMPERATIVE 11
media), changing laws (e.g., U.S. Federal Rules of Civil
Procedure 2006 changes), and
additional regulations.
Further adding to the challenge is the rapid proliferation of
mobile devices like
tablets, phablets, and smartphones used in business—
information can be more easily
lost or stolen—so IG efforts must be made to preserve and
protect the enterprise’s
information assets.
Proper IG requires that policies are fl exible enough not to
hinder the proper fl ow
of information in the heat of the business battle yet strict
enough to control and audit
for misuse, policy violations, or security breaches. This is a
continuous iterative policy-
making process that must be monitored and fi ne-tuned. Even
with the absolute best
efforts, some policies will miss the mark and need to be
reviewed and adjusted.
Getting started with IG awareness is the crucial fi rst step. It
may have popped up on an
executive’s radar at one point or another and an effort might
have been made, but many
organizations leave these policies on the shelf and do not revise
them on a regular basis.
IG is the necessary underpinning for a legally defensible
disposition program that
discards data debris and helps narrow the search for meaningful
information on which
to base business decisions. IG is also necessary to protect and
preserve critical infor-
mation assets. An IG strategy should aim to minimize exposure
to risk, at a reasonable
cost level, while maximizing productivity and improving the
quality of information
delivered to knowledge users.
But a reactive, tactical project approach is not the way to go
about it—haphazardly t
swatting at technological, legal, and regulatory fl ies. A
proactive, strategic program,
with a clear, accountable sponsor, an ongoing plan, and regular
review process, is the
only way to continuously adjust IG policies to keep them
current so that they best
serve the organization’s needs.
Some organizations have created formal governance bodies to
establish strat-
egies, policies, and procedures surrounding the distribution of
information inside
and outside the enterprise. These governance bodies, steering
committees, or teams
should include members from many different functional areas,
since proper IG ne-
cessitates input from a variety of stakeholders. Representatives
from IT, records man-
agement, corporate or agency archiving, risk management,
compliance, operations,
human resources, security, legal, fi nance, and perhaps
knowledge management are
typically a part of IG teams. Often these efforts are jump-started
and organized by
an executive sponsor who utilizes third-party consulting
resources that specialize in
IG efforts, especially considering the newness of IG and its
emerging best practices.
So in this era of ever-growing Big Data, leveraging IG policies
to focus on re-
taining the information that has real business value, while
discarding the majority of
information that has no value and carries associated increased
costs and risks, is criti-
cal to success for modern enterprises. This must be
accomplished in a systematic,
consistent, and legally defensible manner by implementing a
formal IG program.
Other crucial elements of an IG program are the steps taken to
secure confi dential
information by enforcing and monitoring policies using the
appropriate information
technologies.
Getting started with IG awareness is the crucial fi rst step.
12 INFORMATION GOVERNANCE
CHAPTER SUMMARY: KEY POINTS
■ The onslaught of Big Data necessitates that IG be
implemented to discard
unneeded data in a legally defensible way.
■ Big Data values massive accumulation of data, whereas in
business, e-discovery
realities and potential legal liabilities dictate that data be culled
to only that
which has clear business value.
■ Only about one quarter of the information organizations are
managing has
real business value.
■ With a smaller information footprint, it is easier for
organizations to fi nd the
information they need and derive business value from it.
■ IG is a subset of corporate governance and encompasses the
policies and
leveraged technologies meant to manage what corporate
information is re-
tained, where, and for how long, and also how it is retained.
■ IG is a sort of super discipline that encompasses a variety
of key concepts
from a variety of related and overlapping disciplines.
■ Practicing good IG is the essential foundation for building
legally defensible
disposition practices to discard unneeded information.
■ According to ARMA, IG is “a strategic framework
composed of standards,
processes, roles, and metrics that hold organizations and
individuals account-
able to create, organize, secure, maintain, use, and dispose of
information in
ways that align with and contribute to the organization’s goals.”
30
■ IG is how an organization maintains security, complies with
regulations and
laws, and meets ethical standards when managing information.
■ IG is a multidisciplinary program that requires an ongoing
effort and active
participation of a broad cross-section of functional groups and
stakeholders.
■ IG controls to safeguard confi dential information assets
and protect privacy
cannot rely solely on the trustworthiness of employees and basic
security
measures.
■ Getting started with IG awareness is the crucial fi rst step.
Notes
1. The Economist, “Data, Data Everywhere,” February 25,
2010, www.economist.com/node/15557443
2. Gartner, Inc., “IT Glossary: Big Data,”
www.gartner.com/it-glossary/big-data/ (accessed April 15,
2013).
3. Webopedia, “Big Data,”
www.webopedia.com/TERM/B/big_data.html (accessed April
15, 2013).
http://www.economist.com/node/15557443
http://www.gartner.com/it-glossary/big-data/
http://www.webopedia.com/TERM/B/big_data.html
THE ONSLAUGHT OF BIG DATA AND THE INFORMATION
GOVERNANCE IMPERATIVE 13
4. World Economic Forum, “Personal Data:The Emergence of
a New Asset Class”(January 2011), http://
www3.weforum.org/docs/WEF_ITTC_PersonalDataNewAsset_R
eport_2011.pdf
5. Deidra Paknad, “Defensible Disposal: You Can’t Keep All
Your Data Forever,” July 17, 2012, www
.forbes.com/sites/ciocentral/2012/07/17/defensible-disposal-
you-cant-keep-all-your-data-forever/
6. Susan Karlin, “Earth’s Nervous System: Looking at
Humanity Through Big Data,” www.fastcocreate
.com/1681986/earth-s-nervous-system-looking-at-humanity-
through-big-data#1(accessed March 5,
2013).
7. IDC Press Release, December 18, ,2013,
http://www.idc.com/getdoc.jsp?containerId=prUS24542113
New IDC Worldwide Big Data Technology and Services
Forecast Shows Market Expected to Grow to
$32.4 Billion in 2017
8. Steve Lohr, “How Big Data Became So Big,” New York
Times, August 11, 2012, www.nytimes.
com/2012/08/12/business/how-big-data-became-so-big-
unboxed.html?_r=2&smid=tw-share&
9. Kahn Consulting, “Information Governance Brief,”
sponsored by IBM, www.delve.us/downloads/
Brief-Defensible-Disposal.pdf (accessed March 4, 2013).
10. Barclay T. Blair, “Girding for Battle,” Law Technology
News, October 1, 2012, www.law.com/jsp/lawtech-
nologynews/PubArticleLTN.jsp?id=1202572459732&thepage=1
11. Ibid.
12. Paknad, “Defensible Disposal.”
13. Randolph A. Kahn,
https://twitter.com/InfoParkingLot/status/273791612172259329,
November 28, 2012.
14. Gartner Press Release, “Gartner Says Master Data
Management Is Critical to Achieving Effective
Information Governance,”
www.gartner.com/newsroom/id/1898914, January 19, 2012
15. Ibid.
16. Monica Crocker, e-mail to author, June 21, 2012.
17. Economist Intelligence Unit, “The Future of Information
Governance,” www.emc.com/leadership/
business-view/future-information-governance.htm (accessed
November 14, 2013).
18. ARMA International, Glossary of Records and Information
Management Terms , 4th ed., 2012, TR 22–2012.s
19. Arvind Krishna, “Three Steps to Trusting Your Data in
2011,” IT Business Edge , posted March 9, 2011,
www.itbusinessedge.com/guest-opinions/three-steps-trusting-
your-data-2011 . (accessed November
14, 2013).
20. ARMA International, Glossary of Records and Information
Management Terms , 4th ed., 2012, TR 22–2012.s
21. Laura DuBoisand Vivian Tero, “Practical Information
Governance: Balancing Cost, Risk, and Pro-
ductivity,” IDC White Paper (August 2010),
www.emc.com/collateral/analyst-reports/idc-practical-
information-governance-ar.pdf
22. Monica Crocker, e-mail to author, June 21, 2012.
23. Barclay T. Blair, Making the Case for Information
Governance: Ten Reasons IG Makes Sense , ViaLumina
Ltd, 2010. Online at http://barclaytblair.com/making-the-case-
for-ig-ebook/ (accessed November 14,
2013).
24. Barclay T. Blair, “8 Reasons Why Information Governance
(IG) Makes Sense,” June 29, 2009, www.
digitallandfi ll.org/2009/06/8-reasons-why-information-
governance-ig-makes-sense.html
25. Peter Abatan, “Corporate and Industrial Espionage to Rise
in 2011,” Enterprise Digital Rights Man-
agement,
http://enterprisedrm.tumblr.com/post/2742811887/corporate-
espionage-to-rise-in-2011 .
(accessed November 14, 2013).
26. BBC News, “FBI Staff Disciplined for Sex Texts and Nude
Pictures,” February 22, 2013, www.bbc.
co.uk/news/world-us-canada-21546135
27. Todd Ackerman, “Laptop Theft Puts Texas Children’s
Patient Info at Risk,” Houston Chronicle , July 30, 2009, e
www.chron.com/news/houston-texas/article/Laptop-theft-puts-
Texas-Children-s-patient-info-1589473.
php . (accessed March 2, 2012).
28. Jonny Greatrex, “Bungling West Midlands Medics Lose
12,000 Private Patient Records,” Sunday Mer-
cury, September 5, 2010,
www.sundaymercury.net/news/sundaymercuryexclusives/2010/0
9/05/bun-
gling-west-midlands-medics-lose-12–000-private-patient-
records-66331–27203177/ (accessed March
2, 2012).
29. Gartner Press Release, “Gartner Says Master Data
Management Is Critical to Achieving Effective
Information Governance.”
30. ARMA International, Glossary of Records and Information
Management Terms. s
http://www3.weforum.org/docs/WEF_ITTC_PersonalDataNewA
sset_Report_2011.pdf
http://www3.weforum.org/docs/WEF_ITTC_PersonalDataNewA
sset_Report_2011.pdf
http://www.fastcocreate.com/1681986/earth-s-nervous-system-
looking-at-humanity-through-big-data#1
http://www.idc.com/getdoc.jsp?containerId=prUS24542113
http://www.nytimes.com/2012/08/12/business/how-big-data-
became-so-big-unboxed.html?_r=2&smid=tw-share&
http://www.delve.us/downloads/Brief-Defensible-Disposal.pdf
http://www.law.com/jsp/lawtech-
nologynews/PubArticleLTN.jsp?id=1202572459732&thepage=1
http://www.law.com/jsp/lawtech-
nologynews/PubArticleLTN.jsp?id=1202572459732&thepage=1
http://www.law.com/jsp/lawtech-
nologynews/PubArticleLTN.jsp?id=1202572459732&thepage=1
https://twitter.com/InfoParkingLot/status/273791612172259329
http://www.gartner.com/newsroom/id/1898914
http://www.emc.com/leadership/business-view/future-
information-governance.htm
http://www.itbusinessedge.com/guest-opinions/three-steps-
trusting-your-data-2011
http://www.emc.com/collateral/analyst-reports/idc-practical-
information-governance-ar.pdf
http://www.emc.com/collateral/analyst-reports/idc-practical-
information-governance-ar.pdf
http://www.emc.com/collateral/analyst-reports/idc-practical-
information-governance-ar.pdf
http://barclaytblair.com/making-the-case-for-ig-ebook/
http://www.digitallandfill.org/2009/06/8-reasons-why-
information-governance-ig-makes-sense.html
http://enterprisedrm.tumblr.com/post/2742811887/corporate-
espionage-to-rise-in-2011
http://www.bbc.co.uk/news/world-us-canada-21546135
http://www.chron.com/news/houston-texas/article/Laptop-theft-
puts-Texas-Children-s-patient-info-1589473.php
http://www.sundaymercury.net/news/sundaymercuryexclusives/
2010/09/05/bun-gling-west-midlands-medics-lose-
12%E2%80%93000-private-patient-records-
66331%E2%80%9327203177/
http://www.fastcocreate.com/1681986/earth-s-nervous-system-
looking-at-humanity-through-big-data#1
http://www.nytimes.com/2012/08/12/business/how-big-data-
became-so-big-unboxed.html?_r=2&smid=tw-share&
http://www.delve.us/downloads/Brief-Defensible-Disposal.pdf
http://www.emc.com/leadership/business-view/future-
information-governance.htm
http://www.digitallandfill.org/2009/06/8-reasons-why-
information-governance-ig-makes-sense.html
http://www.bbc.co.uk/news/world-us-canada-21546135
http://www.chron.com/news/houston-texas/article/Laptop-theft-
puts-Texas-Children-s-patient-info-1589473.php
http://www.sundaymercury.net/news/sundaymercuryexclusives/
2010/09/05/bun-gling-west-midlands-medics-lose-
12%E2%80%93000-private-patient-records-
66331%E2%80%9327203177/
http://www.forbes.com/sites/ciocentral/2012/07/17/defensible-
disposal-you-cant-keep-all-your-data-forever/
http://www.forbes.com/sites/ciocentral/2012/07/17/defensible-
disposal-you-cant-keep-all-your-data-forever/
15
Information
Governance,
IT Governance, Data
Governance: What’s
the Difference?
C H A P T E R 2
T
here has been a great deal of confusion around the term
information gover-
nance (IG) and how it is distinct from other similar industry
terms, such as
information technology (IT) governance and data governance .
They are all
a subset of corporate governance, and in the above sequence,
become increasingly
more granular in their approach. Data governance is a part of
broader IT governance,
which is also a part of even broader information governance.
The few texts that exist
have compounded the confusion by offering a limited defi nition
of IG, or sometimes
offering a defi nition of IG that is just plain incorrect , often
confusing it with simple datat
governance.
So in this chapter we spell out the differences and include
examples in hopes of
clarifying what the meaning of each term is and how they are
related.
Data Governance
Data governance involves processes and controls to ensure that
information at the data
level—raw alphanumeric characters that the organization is
gathering and inputting—
is true and accurate, and unique (not redundant). It involves
data cleansing ( or data
scrubbing) to strip out corrupted, inaccurate, or extraneous data
and gg de-duplication,
to eliminate redundant occurrences of data.
Data governance focuses on information quality from the
ground up at the lowest
or root level, so that subsequent reports, analyses, and
conclusions are based on clean,
reliable, trusted data (or records) in database tables. Data
governance is the most rudi-
mentary level at which to implement information governance.
Data governance efforts
seek to ensure that formal management controls—systems,
processes, and accountable
employees who are stewards and custodians of the data—are
implemented to govern
critical data assets to improve data quality and to avoid negative
downstream effects of
poor data. The biggest negative consequence of poor or
inaccurate data is poorly and
inaccurately based decisions.
16 INFORMATION GOVERNANCE
Data governance is a newer, hybrid quality control discipline
that includes
elements of data quality, data management, IG policy
development, business process
improvement, and compliance and risk management.
Data Governance Strategy Tips
Everyone in an organization wants good-quality data to work
with. But it is not so
easy to implement a data governance program. First of all, data
is at such a low level
that executives and board members are typically unaware of the
details of the “smoky
back room” of data collection: cleansing, normalization, and
input. So it is diffi cult to
gain an executive sponsor and funding to initiate the effort. 1
And if a data governance
program does move forward, there are challenges in getting
business users to adhere
to new policies. This is a crucial point, since much of the data
is being generated by
business units. But there are some general guidelines that can
help improve a data
governance program’s chances for success:
■ Identify a measureable impact. A data governance program
must be able to dem-
onstrate business value, or it will not get the executive
sponsorship and funding
it needs to move forward. A readiness assessment should
capture the current
state of data quality and whether an enterprise or business unit
level effort
is warranted. Other key issues include: Can the organization
save hard costs
by implementing data governance? Can it reach more customers
or increase
revenue generated from existing customers?2
■ Assign accountability for data quality to business units, not
IT. Typically, IT has had
responsibility for data quality, yet it is mostly not under that
department’s con-
trol, since most of the data is being generated in the business
units. A pointed
effort must be made to push responsibility and ownership for
data to the busi-
ness units that create and use the data.
■ Recognize the uniqueness of data as an asset. Unlike other
assets, such as people,
factories, equipment, and even cash, data is largely unseen, out
of sight, and
intangible. It changes daily. It spreads throughout business
units. It is copied
and deleted. Data growth can spiral out of control, obscuring
the data that has
true business value. So data has to be treated differently, and its
unique qualities
must be considered.
■ Forget the past; implement a going-forward strategy. It is a
signifi cantly greater
task to try to improve data governance across the enterprise for
existing data.
Remember, you may be trying to fi x decades of bad behavior,
mismanagement,
and lack of governance. Taking an incremental approach with an
eye to the
future provides for a clean starting point and can substantially
reduce the pain
required to implement. A proven best practice is to implement a
from-this-
point-on strategy where new data governance policies for
handling data are
implemented beginning on a certain date.
Data governance uses techniques like data cleansing and de-
duplication to
improve data quality and reduce redundancies.
INFORMATION GOVERNANCE, IT GOVERNANCE, DATA
GOVERNANCE 17
Good data governance ensures that downstream negative
effects of poor data
are avoided and that subsequent reports, analyses, and
conclusions are based
on reliable, trusted data.
■ Manage the change. Educate, educate, educate. People must
be trained to under-
stand why the data governance program is being implemented
and how it will
benefi t the business. The new policies represent a cultural
change, and people
need supportive program messages and training in order to make
the shift. 3
IT Governance
IT governance is the primary way that stakeholders can ensure
that investments in IT create
business value and contribute toward meeting business
objectives.4 This strategic align-
ment of IT with the business is challenging yet essential. IT
governance programs
go further and aim to “improve IT performance, deliver
optimum business value and
ensure regulatory compliance.” 5
Although the CIO typically has line responsibility for
implementing IT gover-
nance, the CEO and board of directors must receive reports and
updates to discharge
their responsibilities for IT governance and to see that the
program is functioning well
and providing business benefi ts.
Typically, in past decades, board members did not get involved
in overseeing IT
governance. But today it is a critical and unavoidable
responsibility. According to the
IT Governance Institute’s Board Briefi ng on IT Governance ,
“IT governance is the re-
sponsibility of the board of directors and executive
management. It is an integral part
of enterprise governance and consists of the leadership and
organizational structures
and processes that ensure that the organization’s IT sustains and
extends the organiza-
tion’s strategies and objectives.” 6
The focus is on the actual software development and
maintenance activities of the
IT department or function, and IT governance efforts focus on
making IT effi cient
and effective. That means minimizing costs by following proven
software develop-
ment methodologies and best practices, principles of data
governance and information
quality, and project management best practices while aligning
IT efforts with the busi-
ness objectives of the organization.
IT Governance Frameworks
Several IT governance frameworks can be used as a guide to
implementing an IT
governance program. (They are introduced in this chapter in a
cursory way; detailed
discussions of them are best suited to books focused solely on
IT governance.)
IT governance seeks to align business objectives with IT
strategy to deliver
business value.
18 INFORMATION GOVERNANCE
Although frameworks and guidance like CobiT® and ITIL
have been widely
adopted, there is no absolute standard IT governance
framework; the combination
that works best for an organization depends on business factors,
corporate culture, IT
maturity, and staffi ng capability. The level of implementation
of these frameworks will
also vary by organization.
CobiT®
CobiT (Control Objectives for Information and related
Technology) is a process-T
based IT governance framework that represents a consensus of
experts worldwide.
Codeveloped by the IT Governance Institute and ISACA
(previously known as the
Information Systems Audit and Control Association), CobiT
addresses business
risks, control requirements, compliance, and technical issues. 7
CobiT offers IT controls that:
■ Cut IT risks while gaining business value from IT under an
umbrella of a glob-
ally accepted framework.
■ Assist in meeting regulatory compliance requirements.
■ Utilize a structured approach for improved reporting and
management deci-
sion making.
■ Provide solutions to control assessments and project
implementations to im-
prove IT and information asset control. 8
CobiT consists of detailed descriptions of processes required in
IT and also tools
to measure progress toward maturity of the IT governance
program. It is industry
agnostic and can be applied across all vertical industry sectors,
and it continues to be
revised and refi ned. 9
CobiT is broken out into three basic organizational levels and
their responsibili-
ties: (1) board of directors and executive management; (2) IT
and business manage-
ment; and (3) line-level governance, and security and control
knowledge workers. 10
The CobiT model draws on the traditional “plan, build, run,
monitor” paradigm of
traditional IT management, only with variations in semantics.
The CobiT framework
is divided into four IT domains—(1) plan and organize, (2)
acquire and implement, (3)
deliver and support, and (4) monitor and evaluate—which
contain 34 IT processes and
210 control objectives. Specifi c goals and metrics are assigned,
and responsibilities and
accountabilities are delineated.
The CobiT framework maps to the international information
security standard,
ISO 17799, and is also compatible with IT Infrastructure
Library (ITIL) and other y
“accepted practices” in IT development and operations.11
ValIT®
ValIT is a newer value-oriented framework that is compatible
with and complemen-
tary to CobiT. Its principles and best practices focus is on
leveraging IT investments
to gain maximum value. Forty key ValIT essential management
practices (analogous to
CobiT’s control objectives) support three main processes: value
governance, portfolio
management, and investment management. ValIT and CobiT
“provide a full frame-
work and supporting tool set” to help managers develop policies
to manage business
risks and deliver business value while addressing technical
issues and meeting control
objectives in a structured, methodic way. 12
INFORMATION GOVERNANCE, IT GOVERNANCE, DATA
GOVERNANCE 19
ITIL
ITIL (Information Technology Infrastructure Library) is a set
of process-oriented
best practices and guidance originally developed in the United
Kingdom to standard-
ize delivery of IT service management. ITIL is applicable to
both the private and
public sectors and is the “most widely accepted approach to IT
service management
in the world.”13 As with other IT governance frameworks,
ITIL provides essential
guidance for delivering business value through IT, and it
“provides guidance to or-
ganizations on how to use IT as a tool to facilitate
business change, transformation
and growth.”14
ITIL best practices form the foundation for ISO/IEC 20000
(previously BS15000),
the International Service Management Standard for
organizational certifi cation and
compliance. 15 ITIL 2011 is the latest revision (as of this
printing), and it consists of fi ve
core published volumes that map the IT service cycle in a
systematic way:
1. ITIL Service Strategy
2. ITIL Service Design
3. ITIL Service Transition
4. ITIL Service Operation
5. ITIL Continual Service Improvement 16
ISO 38500
ISO/IEC 38500:2008 is an international standard that provides
high-level principles
and guidance for senior executives and directors, and those
advising them, for the
effective and effi cient use of IT. 17 Based primarily on AS
8015, the Australian IT gov-
ernance standard, it “applies to the governance of management
processes” that are
performed at the IT service level, but the guidance assists
executives in monitoring IT
and ethically discharging their duties with respect to legal and
regulatory compliance
of IT activities.
The ISO 38500 standard comprises three main sections:
1. Scope, Application and Objectives
2. Framework for Good Corporate Governance of IT
3. Guidance for Corporate Governance of IT
CobiT is process-oriented and has been widely adopted as an
IT governance
framework. ValIT is value-oriented and compatible and
complementary with
CobiT, yet focuses on value delivery.
ITIL is the “most widely accepted approach to IT service
management in the
world.”
20 INFORMATION GOVERNANCE
It is largely derived from AS 8015, the guiding principles of
which were:
■ Establish responsibilities
■ Plan to best support the organization
■ Acquire validly
■ Ensure performance when required
■ Ensure conformance with rules
■ Ensure respect for human factors
The standard also has relationships with other major ISO
standards, and embraces
the same methods and approaches. 18
Information Governance
Corporate governance is the highest level of governance in an
organization, and a
key aspect of it is IG. IG processes are higher level than the
details of IT governance
and much higher than data governance, but both data and IT
governance can be (and
should be) a part of an overall IG program. The IG approach to
governance focuses
not on detailed IT or data capture and quality processes but
rather on controlling the
information that is generated by IT and offi ce systems. d
IG efforts seek to manage and control information assets to
lower risk, ensure com-
pliance with regulations, and improve information quality and
accessibility while imple-
menting information security measures to protect and preserve
information that has busi-
ness value.19 (See Chapter 1 for more detailed defi nitions.)
Impact of a Successful IG Program
When making the business case for IG and articulating its
benefi ts, it is useful to focus
on its central impact. Putting cost-benefi t numbers to this may
be diffi cult, unless you
ISO 38500 is an international standard that provides high-
level principles and
guidance for senior executives and directors responsible for IT
governance.
IG is how an organization maintains security, complies with
regulations and
laws, and meets ethical standards when managing information.
INFORMATION GOVERNANCE, IT GOVERNANCE, DATA
GOVERNANCE 21
also consider the worst-case scenario of loss or misuse of
corporate or agency records.
What is losing the next big lawsuit worth? How much are confi
dential merger and
acquisition documents worth? How much are customer records
worth? Frequently,
executives and managers do not understand the value of IG until
it is a crisis, an ex-
pensive legal battle is lost, heavy fi nes are imposed for
noncompliance, or executives
go to jail.
There are some key outputs from implementing an IG program.
A successful IG
program should enable organizations to:
■ Use common terms across the enterprise. This means that
departments must agree
on how they are going to classify document types, which
requires a cross-
functional effort. With common enterprise terms, searches for
information
are more productive and complete. This normalization process
begins with
developing a standardized corporate taxonomy, which defi nes
the terms (and
substitute terms in a custom corporate thesaurus), document
types, and their
relationships in a hierarchy.
■ Map information creation and usage. This effort can be
buttressed with the use of
technology tools such as data loss prevention , which can be
used to discover
the fl ow of information within and outside of the enterprise.
You must fi rst
determine who is accessing which information when and
where it is going. Then
you can monitor and analyze these information fl ows. The goal
is to stop the
erosion or misuse of information assets and to stem data
breaches with moni-
toring and security technology.
■ Obtain “information confi dence” —that is, the assurance
that information has ”
integrity, validity, accuracy, and quality; this means being able
to prove that the
information is reliable and that its access, use, and storage meet
compliance and
legal demands.
■ Harvest and leverage information. Using techniques and
tools like data min-
ing and business intelligence, new insights may be gained that
provide an
enterprise with a sustainable competitive advantage over the
long term,
since managers will have more and better information as a basis
for busi-
ness decisions.21
Summing Up the Differences
IG consists of the overarching polices and processes to
optimize and leverage informa-
tion while keeping it secure and meeting legal and privacy
obligations in alignment
with stated organizational business objectives.
IT governance consists of following established frameworks
and best practices to
gain the most leverage and benefi t out of IT investments and
support accomplishment
of business objectives.
Data governance consists of the processes, methods, and
techniques to ensure that
data is of high quality, reliable, and unique (not duplicated), so
that downstream uses
in reports and databases are more trusted and accurate.
22 INFORMATION GOVERNANCE
Notes
1. “New Trends and Best Practices for Data Governance
Success,” SeachDataManagement.com eBook,
http://viewer.media.bitpipe.com/1216309501_94/1288990195_9
46/Talend_sDM_SO_32247_EB-
ook_1104.pdf, accessed March 11, 2013.
2. Ibid.
3. Ibid.
4. M.N. Kooper, R. Maes, and E.E.O. RoosLindgreen, “On
the Governance of Information: Introducing
a New Concept of Governance to Support the Management of
Information,” International Journal of
Information Management 31 (2011): 195–120,
http://dl.acm.org/citation.cfm?id=2297895 . (accessed t
November 14, 2013).
5. Nick Robinson, “The Many Faces of IT Governance:
Crafting an IT Governance Architecture,”
ISACA Journal 1 (2007), www.isaca.org/Journal/Past-
Issues/2007/Volume-1/Pages/The-Many-Faces-l
of-IT-Governance-Crafting-an-IT-Governance-Architecture.aspx
6. Bryn Phillips, “IT Governance for CEOs and Members of
the Board,” 2012, p.18.
7. Ibid., p.26.
8. IBM Global Business Services/Public Sector, “Control
Objectives for Information and related Tech-
nology (CobiT®) Internationally Accepted Gold Standard for IT
Controls & Governance,” http://
www-304.ibm.com/industries/publicsector/fi
leserve?contentid=187551(accessed March 11, 2013).
CHAPTER SUMMARY: KEY POINTS
■ Data governance uses techniques like data cleansing and
de-duplication to
improve data quality and reduce redundancies.
■ Good data governance ensures that downstream negative
effects of poor
data are avoided and that subsequent reports, analyses, and
conclusions are
based on reliable, trusted data.
■ IT governance seeks to align business objectives with IT
strategy to deliver
business value.
■ CobiT is processoriented and has been widely adopted as an
IT governance
framework. ValIT is valueoriented and compatible and
complementary with
CobiT yet focuses on value delivery.
■ The CobiT framework maps to the international information
security stan-
dard ISO 17799 and is also compatible with ITIL (IT
Infrastructure Library).
■ ITIL is the “most widely accepted approach to IT service
management in the
world.”
■ ISO 38500 is an international standard that provides high-
level principles and
guidance for senior executives and directors responsible for IT
governance.
■ Information governance is how an organization maintains
security, complies
with regulations and laws, and meets ethical standards when
managing
information.
http://viewer.media.bitpipe.com/1216309501_94/1288990195_9
46/Talend_sDM_SO_32247_EB-ook_1104.pdf
http://viewer.media.bitpipe.com/1216309501_94/1288990195_9
46/Talend_sDM_SO_32247_EB-ook_1104.pdf
http://viewer.media.bitpipe.com/1216309501_94/1288990195_9
46/Talend_sDM_SO_32247_EB-ook_1104.pdf
http://dl.acm.org/citation.cfm?id=2297895
http://www.isaca.org/Journal/Past-Issues/2007/Volume-
1/Pages/The-Many-Faces-of-IT-Governance-Crafting-an-IT-
Governance-Architecture.aspx
http://www.isaca.org/Journal/Past-Issues/2007/Volume-
1/Pages/The-Many-Faces-of-IT-Governance-Crafting-an-IT-
Governance-Architecture.aspx
http://www.isaca.org/Journal/Past-Issues/2007/Volume-
1/Pages/The-Many-Faces-of-IT-Governance-Crafting-an-IT-
Governance-Architecture.aspx
http://www-
304.ibm.com/industries/publicsector/fileserve?contentid=18755
1
http://www-
304.ibm.com/industries/publicsector/fileserve?contentid=18755
1
INFORMATION GOVERNANCE, IT GOVERNANCE, DATA
GOVERNANCE 23
9. Phillips, “IT Governance for CEOs and Members of the
Board.”
10. IBM Global Business Services/Public Sector, “Control
Objectives for Information and related Tech-
nology (CobiT®) Internationally Accepted Gold Standard for IT
Controls & Governance.”
11. Ibid.
12. Ibid.
13. www.itil-offi cialsite.com/ (accessed March 12, 2013).
14. ITIL, “What Is ITIL?” www.itil-offi
cialsite.com/AboutITIL/WhatisITIL.aspx(accessed March 12,
2013).
15. Ibid.
16. Ibid.
17. “ISO/IEC 38500:2008 “Corporate Governance of
Information Technology” www.iso.org/iso/
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx
Strategic Management Concepts A Competitive Advantage Approac.docx

More Related Content

Similar to Strategic Management Concepts A Competitive Advantage Approac.docx

Entrepreneurship Chap 8
Entrepreneurship Chap 8Entrepreneurship Chap 8
Entrepreneurship Chap 8Umair Arain
 
Top 10 Questions : Chapter 2 : Ansay
Top 10 Questions : Chapter 2 : AnsayTop 10 Questions : Chapter 2 : Ansay
Top 10 Questions : Chapter 2 : Ansaycatansay
 
Marketing Stategy
Marketing StategyMarketing Stategy
Marketing Stategyajithsrc
 
Managing Marketing Processes_Seminar 4
 Managing Marketing Processes_Seminar 4 Managing Marketing Processes_Seminar 4
Managing Marketing Processes_Seminar 4Robin Teigland
 
Mkt Plan
Mkt PlanMkt Plan
Mkt Plantogtox
 
AMA_Corporate Attitudes and Adoption Trends of Multi-Channel and Omni-Channel...
AMA_Corporate Attitudes and Adoption Trends of Multi-Channel and Omni-Channel...AMA_Corporate Attitudes and Adoption Trends of Multi-Channel and Omni-Channel...
AMA_Corporate Attitudes and Adoption Trends of Multi-Channel and Omni-Channel...Scott Valentine, MBA, CSPO
 
Sample marketing
Sample marketingSample marketing
Sample marketingShubhi Goel
 
In this case, Net profit margin is positive. Company made more money then it...
 In this case, Net profit margin is positive. Company made more money then it... In this case, Net profit margin is positive. Company made more money then it...
In this case, Net profit margin is positive. Company made more money then it...Aqif Chaudary
 
Social media marketing plan
Social media marketing planSocial media marketing plan
Social media marketing planDarianriggs1911
 
Week 05 - Marketing and Project Management
Week 05 - Marketing and Project ManagementWeek 05 - Marketing and Project Management
Week 05 - Marketing and Project ManagementAbid Khan
 
The Project Management Process - Week 5
The Project Management Process - Week 5The Project Management Process - Week 5
The Project Management Process - Week 5Craig Brown
 
Brand as Strategic Device Introduction to Branding
Brand as Strategic Device Introduction to BrandingBrand as Strategic Device Introduction to Branding
Brand as Strategic Device Introduction to BrandingAna Watson
 
Brief of the dimensionality of business strategy among the manufacturing orga...
Brief of the dimensionality of business strategy among the manufacturing orga...Brief of the dimensionality of business strategy among the manufacturing orga...
Brief of the dimensionality of business strategy among the manufacturing orga...Alexander Decker
 
Adjust your audioThis is a narrated slide show. Please adjust .docx
Adjust your audioThis is a narrated slide show. Please adjust .docxAdjust your audioThis is a narrated slide show. Please adjust .docx
Adjust your audioThis is a narrated slide show. Please adjust .docxAMMY30
 

Similar to Strategic Management Concepts A Competitive Advantage Approac.docx (17)

Entrepreneurship Chap 8
Entrepreneurship Chap 8Entrepreneurship Chap 8
Entrepreneurship Chap 8
 
Top 10 Questions : Chapter 2 : Ansay
Top 10 Questions : Chapter 2 : AnsayTop 10 Questions : Chapter 2 : Ansay
Top 10 Questions : Chapter 2 : Ansay
 
Marketing Stategy
Marketing StategyMarketing Stategy
Marketing Stategy
 
Managing Marketing Processes_Seminar 4
 Managing Marketing Processes_Seminar 4 Managing Marketing Processes_Seminar 4
Managing Marketing Processes_Seminar 4
 
Mkt Plan
Mkt PlanMkt Plan
Mkt Plan
 
AMA_Corporate Attitudes and Adoption Trends of Multi-Channel and Omni-Channel...
AMA_Corporate Attitudes and Adoption Trends of Multi-Channel and Omni-Channel...AMA_Corporate Attitudes and Adoption Trends of Multi-Channel and Omni-Channel...
AMA_Corporate Attitudes and Adoption Trends of Multi-Channel and Omni-Channel...
 
Sample marketing
Sample marketingSample marketing
Sample marketing
 
In this case, Net profit margin is positive. Company made more money then it...
 In this case, Net profit margin is positive. Company made more money then it... In this case, Net profit margin is positive. Company made more money then it...
In this case, Net profit margin is positive. Company made more money then it...
 
Social media marketing plan
Social media marketing planSocial media marketing plan
Social media marketing plan
 
Week 05 - Marketing and Project Management
Week 05 - Marketing and Project ManagementWeek 05 - Marketing and Project Management
Week 05 - Marketing and Project Management
 
The Project Management Process - Week 5
The Project Management Process - Week 5The Project Management Process - Week 5
The Project Management Process - Week 5
 
Strategy
StrategyStrategy
Strategy
 
Brand as Strategic Device Introduction to Branding
Brand as Strategic Device Introduction to BrandingBrand as Strategic Device Introduction to Branding
Brand as Strategic Device Introduction to Branding
 
SIT- Chapter 1
SIT- Chapter 1SIT- Chapter 1
SIT- Chapter 1
 
Brief of the dimensionality of business strategy among the manufacturing orga...
Brief of the dimensionality of business strategy among the manufacturing orga...Brief of the dimensionality of business strategy among the manufacturing orga...
Brief of the dimensionality of business strategy among the manufacturing orga...
 
Dtp Strategy
Dtp StrategyDtp Strategy
Dtp Strategy
 
Adjust your audioThis is a narrated slide show. Please adjust .docx
Adjust your audioThis is a narrated slide show. Please adjust .docxAdjust your audioThis is a narrated slide show. Please adjust .docx
Adjust your audioThis is a narrated slide show. Please adjust .docx
 

More from susanschei

Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docxSrc TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docxsusanschei
 
SPT 208 Final Project Guidelines and Rubric Overview .docx
SPT 208 Final Project Guidelines and Rubric  Overview .docxSPT 208 Final Project Guidelines and Rubric  Overview .docx
SPT 208 Final Project Guidelines and Rubric Overview .docxsusanschei
 
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docxSsalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docxsusanschei
 
Spring 2020Professor Tim SmithE mail [email protected]Teach.docx
Spring 2020Professor Tim SmithE mail [email protected]Teach.docxSpring 2020Professor Tim SmithE mail [email protected]Teach.docx
Spring 2020Professor Tim SmithE mail [email protected]Teach.docxsusanschei
 
Spring 2020 – Business Continuity & Disaster R.docx
Spring 2020 – Business Continuity & Disaster R.docxSpring 2020 – Business Continuity & Disaster R.docx
Spring 2020 – Business Continuity & Disaster R.docxsusanschei
 
Sports Business Landscape Graphic OrganizerContent.docx
Sports Business Landscape Graphic OrganizerContent.docxSports Business Landscape Graphic OrganizerContent.docx
Sports Business Landscape Graphic OrganizerContent.docxsusanschei
 
Spring 2020Carlow University Department of Psychology & Co.docx
Spring 2020Carlow University Department of Psychology & Co.docxSpring 2020Carlow University Department of Psychology & Co.docx
Spring 2020Carlow University Department of Psychology & Co.docxsusanschei
 
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docx
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docxSPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docx
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docxsusanschei
 
Sport Ticket sales staff trainingChapter 4Sales .docx
Sport Ticket sales staff trainingChapter 4Sales .docxSport Ticket sales staff trainingChapter 4Sales .docx
Sport Ticket sales staff trainingChapter 4Sales .docxsusanschei
 
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docx
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docxSPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docx
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docxsusanschei
 
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docxSponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docxsusanschei
 
SPM 4723 Annotated Bibliography You second major proje.docx
SPM 4723 Annotated Bibliography You second major proje.docxSPM 4723 Annotated Bibliography You second major proje.docx
SPM 4723 Annotated Bibliography You second major proje.docxsusanschei
 
Speech Environment and Recording Requirements• You must have a.docx
Speech Environment and Recording Requirements• You must have a.docxSpeech Environment and Recording Requirements• You must have a.docx
Speech Environment and Recording Requirements• You must have a.docxsusanschei
 
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docxSped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docxsusanschei
 
Speech Recognition in the Electronic Health Record (2013 u.docx
Speech Recognition in the Electronic Health Record (2013 u.docxSpeech Recognition in the Electronic Health Record (2013 u.docx
Speech Recognition in the Electronic Health Record (2013 u.docxsusanschei
 
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docx
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docxSped Focus Group.m4aJodee [000001] This is a focus group wi.docx
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docxsusanschei
 
Specialized Terms 20.0 Definitions and examples of specialized.docx
Specialized Terms 20.0 Definitions and examples of specialized.docxSpecialized Terms 20.0 Definitions and examples of specialized.docx
Specialized Terms 20.0 Definitions and examples of specialized.docxsusanschei
 
Special notes Media and the media are plural and take plural verb.docx
Special notes Media and the media are plural and take plural verb.docxSpecial notes Media and the media are plural and take plural verb.docx
Special notes Media and the media are plural and take plural verb.docxsusanschei
 
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docxSPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docxsusanschei
 
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
SPECIAL ISSUE  CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docxSPECIAL ISSUE  CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docxsusanschei
 

More from susanschei (20)

Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docxSrc TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
 
SPT 208 Final Project Guidelines and Rubric Overview .docx
SPT 208 Final Project Guidelines and Rubric  Overview .docxSPT 208 Final Project Guidelines and Rubric  Overview .docx
SPT 208 Final Project Guidelines and Rubric Overview .docx
 
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docxSsalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
 
Spring 2020Professor Tim SmithE mail [email protected]Teach.docx
Spring 2020Professor Tim SmithE mail [email protected]Teach.docxSpring 2020Professor Tim SmithE mail [email protected]Teach.docx
Spring 2020Professor Tim SmithE mail [email protected]Teach.docx
 
Spring 2020 – Business Continuity & Disaster R.docx
Spring 2020 – Business Continuity & Disaster R.docxSpring 2020 – Business Continuity & Disaster R.docx
Spring 2020 – Business Continuity & Disaster R.docx
 
Sports Business Landscape Graphic OrganizerContent.docx
Sports Business Landscape Graphic OrganizerContent.docxSports Business Landscape Graphic OrganizerContent.docx
Sports Business Landscape Graphic OrganizerContent.docx
 
Spring 2020Carlow University Department of Psychology & Co.docx
Spring 2020Carlow University Department of Psychology & Co.docxSpring 2020Carlow University Department of Psychology & Co.docx
Spring 2020Carlow University Department of Psychology & Co.docx
 
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docx
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docxSPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docx
SPOTLIGHT ON STRATEGY FOR TURBULENT TIMESSpotlight ARTWORK.docx
 
Sport Ticket sales staff trainingChapter 4Sales .docx
Sport Ticket sales staff trainingChapter 4Sales .docxSport Ticket sales staff trainingChapter 4Sales .docx
Sport Ticket sales staff trainingChapter 4Sales .docx
 
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docx
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docxSPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docx
SPOTLIGHT ARTWORK Do Ho Suh, Floor, 1997–2000, PVC figures, gl.docx
 
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docxSponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
 
SPM 4723 Annotated Bibliography You second major proje.docx
SPM 4723 Annotated Bibliography You second major proje.docxSPM 4723 Annotated Bibliography You second major proje.docx
SPM 4723 Annotated Bibliography You second major proje.docx
 
Speech Environment and Recording Requirements• You must have a.docx
Speech Environment and Recording Requirements• You must have a.docxSpeech Environment and Recording Requirements• You must have a.docx
Speech Environment and Recording Requirements• You must have a.docx
 
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docxSped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
 
Speech Recognition in the Electronic Health Record (2013 u.docx
Speech Recognition in the Electronic Health Record (2013 u.docxSpeech Recognition in the Electronic Health Record (2013 u.docx
Speech Recognition in the Electronic Health Record (2013 u.docx
 
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docx
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docxSped Focus Group.m4aJodee [000001] This is a focus group wi.docx
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docx
 
Specialized Terms 20.0 Definitions and examples of specialized.docx
Specialized Terms 20.0 Definitions and examples of specialized.docxSpecialized Terms 20.0 Definitions and examples of specialized.docx
Specialized Terms 20.0 Definitions and examples of specialized.docx
 
Special notes Media and the media are plural and take plural verb.docx
Special notes Media and the media are plural and take plural verb.docxSpecial notes Media and the media are plural and take plural verb.docx
Special notes Media and the media are plural and take plural verb.docx
 
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docxSPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
 
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
SPECIAL ISSUE  CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docxSPECIAL ISSUE  CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

Strategic Management Concepts A Competitive Advantage Approac.docx

  • 1. Strategic Management Concepts: A Competitive Advantage Approach Sixteenth Edition Chapter 8 Implementing Strategies: Marketing, Finance/Accounting, R and D, and MIS Issues Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved If this PowerPoint presentation contains mathematical equations, you may need to check that your computer has the following installed: 1) MathType Plugin 2) Math Player (free versions available) 3) NVDA Reader (free versions available) 1 Learning Objectives (1 of 2) 8.1 Identify and describe strategic marketing issues vital for strategy implementation. 8.2 Explain why social media marketing is an important strategy-implementation tool. 8.3 Explain why market segmentation is an important strategy- implementation tool. 8.4 Explain how to use product positioning (perceptual mapping) as a strategy-implementation tool. 8.5 Identify and describe strategic finance/accounting issues vital for strategy implementation. 8.6 Perform EPS/EBIT analysis to evaluate the attractiveness of
  • 2. debt versus stock as a source of capital to implement strategies. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved After studying this chapter, you should be able to do the following: 8-1. Identify and describe strategic marketing issues vital for strategy implementation. 8-2. Explain why social media marketing is an important strategy-implementation tool. 8-3. Explain why market segmentation is an important strategy- implementation tool. 8-4. Explain how to use product positioning (perceptual mapping) as a strategy-implementation tool. 8-5. Identify and describe strategic finance/accounting issues vital for strategy implementation. 8-6. Perform EPS/EBIT analysis to evaluate the attractiveness of debt versus stock as a source of capital to implement strategies. 8-7. Develop projected financial statements to reveal the impact of strategy recommendations. 8-8. Determine the cash value of any business using four corporate evaluation methods. 8-9. Discuss IPOs, keeping cash offshore, and issuing corporate bonds as strategic decisions that face many firms. 8-10. Discuss the nature and role of research and development (R&D) in strategy implementation. 8-11. Explain how management information systems (MISs) impact strategy-implementation
  • 3. efforts. 2 Learning Objectives (2 of 2) 8.7 Develop projected financial statements to reveal the impact of strategy recommendations. 8.8 Determine the cash value of any business using four corporate evaluation methods. 8.9 Discuss IPOs, keeping cash offshore, and issuing corporate bonds as strategic decisions that face many firms. 8.10 Discuss the nature and role of research and development (R&D) in strategy implementation. 8.11 Explain how management information systems (MISs) impact strategy-implementation efforts. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Figure 8-1 Comprehensive Strategic-Management Model Source: Fred R. David, “How Companies Define Their Mission,” Long Range Planning 22, no. 3 (June 1988): 40. See also Anik Ratnaningsih, Nadjadji Anwar, Patdono Suwignjo, and Putu ArtamaWiguna, “Balance Scorecard of David’s Strategic Modeling at Industrial Business for National Construction Contractor of Indonesia,” Journal of Mathematics and Technology, no. 4 (October 2010): 20. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved This chapter is highlighted in the strategic management model. 4 Strategic Marketing Issues (1 of 2) How to make advertisements more interactive to be more
  • 4. effective How to best take advantage of Facebook and Twitter conservations about the company and industry To use exclusive dealerships or multiple channels of distribution To use heavy, light, or no TV advertising versus online advertising Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Countless marketing variables affect the success or failure of strategy implementation efforts. Some strategic marketing issues or decisions are on the next two slides. 5 Strategic Marketing Issues (2 of 2) To limit (or not) the share of business done with a single customer To be a price leader or a price follower To offer a complete or limited warranty To reward salespeople based on straight salary, straight commission, or a combination salary/commission Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Social Media Marketing Marketers must get customers involved in the company website and solicit suggestions in terms of product development, customer service, and ideas. The company should enable customers to interact with the firm on the following social media networks: Facebook Google Plus Twitter
  • 5. LinkedIn Instagram Pinterest Foursquare Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Social media marketing has become an important strategic issue. Marketing has evolved to be more about building a two- way relationship with consumers than just informing consumers about a product or service. 7 Table 8-1 The New Principles of Marketing1. Do not just talk at consumers—work with them throughout the marketing process. 2. Give consumers a reason to participate. 3. Listen to—and join—the conversation outside your company’s website. 4. Resist the temptation to sell, sell, sell. Instead attract, attract, attract. 5. Do not control online conversations; let it flow freely. 6. Find a “marketing technologist,” a person who has three excellent skill sets (marketing, technology, and social interaction). 7. Embrace instant messaging and chatting. Source: Based on Salvatore Parise, Patricia Guinan, and Bruce Weinberg, “The Secrets of Marketing in a Web 2.0 World,” Wall Street Journal, December 15, 2008, R1 Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Customers must not feel like they are a captive audience for advertising at a firm’s website. Table 8-1 provides new principles of marketing according to Parise, Guinan, and
  • 6. Weinberg. 8 Market Segmentation (1 of 3) Market Segmentation subdividing of a market into distinct subsets of customers according to needs and buying habits widely used in implementing strategies Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Market segmentation enables a small firm to compete successfully with a large firm by maximizing per-unit profits and per-segment sales. 9 Market Segmentation (2 of 3) Strategies such as market development, product development, market penetration, and diversification require increased sales through new markets and products. Market segmentation allows a firm to operate with limited resources because mass production, mass distribution, and mass advertising are not required. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved To implement these strategies successfully, new or improved market-segmentation approaches are required. 10 Market Segmentation (3 of 3) Market segmentation decisions directly affect the marketing mix variables: Product
  • 7. Place Promotion Price Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Geographic and demographic bases for segmenting markets are the most commonly employed. 11 Table 8-2 The Marketing Mix Component VariablesProductPlacePromotionPriceQualityDistribution channelsAdvertisingLevelFeatures and optionsDistribution coveragePersonal sellingDiscounts andStyleOutlet locationSales promotionallowancesBrand nameSales territoriesPublicityPayment termsPackagingInventory levels and locationsblankblankProduct lineTransportation carriersblankblankWarrantyblankblankblankService levelblankblankblankOther servicesblankblankblank Source: Based on E. Jerome McCarthy, Basic Marketing: A Managerial Approach, 9th ed. (Homewood, IL: Richard D. Irwin, Inc., 1987), 37–44. Used with permission. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Evaluating potential market segments requires strategists to determine the characteristics and needs of consumers, to analyze consumer similarities and differences, and to develop consumer group profiles. 12 Retention-Based Segmentation Tag #1: Is this customer at high risk of canceling the company’s service?
  • 8. Tag #2: Is this customer worth retaining? Tag #3: What retention tactics should be used to retain this customer? Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Tag #1: Is this customer at high risk of canceling the company's service? One of the most common indicators of high-risk customers is a drop off in usage of the company's service. For example, in the credit card industry this could be signaled through a customer's decline in spending on his or her card. Tag #2: Is this customer worth retaining? This determination boils down to whether the post-retention profit generated from the customer is predicted to be greater than the cost incurred to retain the customer. Customers need to be managed as investments. Tag #3: What retention tactics should be used to retain this customer? For customers who are deemed “save-worthy,” it's essential for the company to know which save tactics are most likely to be successful. Tactics commonly used range from providing “special” customer discounts to sending customers communications that reinforce the value proposition of the given service. 13 Alternative Bases for Market Segmentation Geographic Region, country size, city size, density, climate Demographic Age, gender, family size, family life cycle, income, occupation, education, religion, race, nationality Psychographic Social class, personality Behavioral Use occasion, benefits sought, user status, usage rate, loyalty
  • 9. status, readiness stage, attitude toward product Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Market segmentation on these characteristics is possible with the use of business analytics or data mining. 14 Product Positioning (1 of 2) Product Positioning entails developing schematic representations that reflect how your products or services compare to competitors' on dimensions most important to success in the industry Also called perceptual mapping Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Product positioning is widely used for deciding how to meet the needs and wants of particular consumer groups. 15 Product Positioning Steps (1 of 2) Select key criteria that effectively differentiate products or services in the industry. Diagram a two-dimensional product-positioning map with specified criteria on each axis. Plot major competitors' products or services in the resultant four-quadrant matrix. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Product positioning can be summarized in five steps.
  • 10. 16 Product Positioning Steps (2 of 2) Identify areas in the positioning map where the company's products or services could be most competitive in the given target market. Look for vacant areas (niches). Develop a marketing plan to position the company's products or services appropriately. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Rules for Using Product Positioning as a Strategy- Implementation Tool Look for the hole or vacant niche. Don’t serve two segments with the same strategy. Don't position yourself in the middle of the map. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Some rules for using product positioning as a strategy- implementation tool are on this slide. 18 Product Positioning (2 of 2) An effective product positioning strategy meets two criteria: It uniquely distinguishes a company from the competition It leads customers to expect slightly less service than a company can deliver Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Firms need to inform customers about what to expect and then exceed the promise. Underpromise and overdeliver! That is a
  • 11. key for excellent strategy implementation. 19 Example of a Product-Positioning Map Figure 8-2 A Perceptual Map for the Automobile Industry Source: Based on info at http://en.wikipedia.org/wiki/Perceptual_mapping. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved This is an example of a product positioning map for the auto industry. 20 Finance/Accounting Issues (1 of 3) To raise capital with short-term debt, long-term debt, preferred stock, or common stock To lease or buy fixed assets To determine an appropriate dividend payout ratio To use LIFO (Last-in, First-out), FIFO (First-in, First-out), or a market-value accounting approach Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Several finance and accounting concepts central to strategy implementation are acquiring needed capital, developing projected financial statements, preparing financial budgets, and evaluating the worth of a business. Some examples of decisions that may require finance and accounting policies are included on the next two slides. 21 Finance/Accounting Issues (2 of 3)
  • 12. To extend the time of accounts receivable To establish a certain percentage discount on accounts within a specified period of time To determine the amount of cash that should be kept on hand Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Finance/Accounting Issues (3 of 3) Acquire needed capital to implement strategies. Develop projected financial statements to show expected impact of strategies implemented. Determine the firm’s value (corporate valuation) in the event an offer is received. Decide whether to go public with an Initial Public Offering (IPO). Decide whether to keep cash offshore that was earned offshore. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Five especially important finance and accounting activities central to strategy implementation are listed on this slide and explained on later slides. 23 Acquiring Capital to Implement Strategies (1 of 2) Successful strategy implementation often requires additional capital. Besides net profit from operations and the sale of assets, two basic sources of capital for an organization are debt and equity. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved When a firm needs additional capital, the choice is often made
  • 13. between debt or equity financing. 24 Acquiring Capital to Implement Strategies (2 of 2) EPS = Earnings Per Share, which is Net Income divided by # of Shares Outstanding Another term for Shares Outstanding is Shares Issued EBIT = Earnings Before Interest and Taxes (also called operating income) EBT = Earnings Before Tax EAT = Earnings After Tax Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Successful strategy implementation often requires additional capital. Besides net profit from operations and the sale of assets, two basic sources of capital for an organization are debt and equity. 25 Table 8-4 EPS/EBIT Analysis for the XYZ Company Conclusion: The best financing alternative is 100% stock because the EPS values are largest; the worst financing alternative is 100% debt because the EPS values are lowest. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved The best way to explain EPS/EBIT analysis is by working through an example for the XYZ Company, as provided in Table 8-4. Note that 100 percent stock is the best financing alternative as indicated by the EPS values of 0.0279 and 0.056. 26
  • 14. Figure 8-6 An EPS/EBIT Chart for the XYZ Company Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved As noted in Figure 8-6, the top row (EBIT) on the x-axis is graphed with the bottom row (EPS) on the y-axis, and the highest plotted line reveals the best method. Sometimes the plotted lines will interact, so a graph is especially helpful in making the capital acquisition decision, rather than solely relying on a table of numbers. 27 Projected Financial Statements Projected Financial Statements allows an organization to examine the expected results of various actions and approaches allows an organization to compute projected financial ratios under various strategy-implementation decisions Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Most financial institutions require at least three years of projected financial statements whenever a business seeks capital. 28 Performing Projected Financial Analysis (1 of 2) Prepare the projected income statement before the balance sheet. Use the percentage-of-sales method to project cost of goods sold (CGS) and the expense items in the income statement. Calculate the projected net income. Subtract from the net income any dividends to be paid for that
  • 15. year. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Projected financial analysis can be explained in seven steps. 29 Performing Projected Financial Analysis (2 of 2) Project the balance sheet items, beginning with retained earnings and then forecasting stockholders' equity, long-term liabilities, current liabilities, total liabilities, total assets, fixed assets, and current assets (in that order). Use the cash account as the plug figure. List commentary (remarks) on the projected statements. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Corporate Valuation Methods: The Net Worth Method Total Shareholders’ Equity (SE) minus (Goodwill + Intangibles) The Net Income Method Net Income × Five Price-Earnings Ratio Method Outstanding Shares Method # of Shares Outstanding × Stock Price Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Four methods are often used to determine the monetary value of
  • 16. a company. 31 IPOs, Cash Management, and Corporate Bonds Go public with an IPO? Keep cash offshore if earned offshore? Issue corporate bonds for what purpose? Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved This slide lists important financial decisions that companies must make. 32 Research and Development (R and D) Issues Emphasize product or process improvements. Stress basic or applied research. Be leaders or followers in R and D. Develop robotics or manual-type processes. Spend a high, average, or low amount of money on R and D. Perform R and D within the firm or contract R and D to outside firms. Use university researchers or private-sector researchers. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Research and development (R&D) personnel can play an integral part in strategy implementation. These individuals are generally charged with developing new products and improving old products effectively. 33 R and D Approaches for Implementing Strategies Be the first firm to market new technological products.
  • 17. Be an innovative imitator of successful products, thus minimizing the risks and costs of start-up. Be a low-cost producer by mass-producing products similar to but less expensive than products recently introduced. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved There are at least three major R&D approaches for implementing strategies. 34 Management Information System (M I S) Issues Having an effective management information system (M I S) may be the most important factor in differentiating successful from unsuccessful firms. The process of strategic management is facilitated immensely in firms that have an effective information system. Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Firms that gather, assimilate, and evaluate external and internal information most effectively are gaining competitive advantages over other firms. 35 Mobile Computing Mobile tracking of employees Mobile apps for customers Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Mobile devices and inexpensive monitoring software now enable companies to know where employees are, eavesdrop on
  • 18. their phone calls, and do other things such as know whether or not a driver is wearing his/her seatbelt. Companies are increasingly developing mobile apps for customers and using resultant data to devise improved strategies for attracting customers. 36 Copyright Copyright © 2017, 2015, 2013 Pearson Education, Inc. All Rights Reserved Stock Price NI EPS ´ INFORMATION GOVERNANCE Founded in 1807, John Wiley & Sons is the oldest independent publishing company in the United States. With offi ces in North America, Europe, Asia, and Australia, Wiley is globally committed to developing and marketing print and electronic products and services for our customers’ professional and personal knowledge and understanding.
  • 19. The Wiley CIO series provides information, tools, and insights to IT executives and managers. The products in this series cover a wide range of topics that supply strategic and implementation guidance on the latest technology trends, leadership, and emerging best practices. Titles in the Wiley CIO series include: The Agile Architecture Revolution: How Cloud Computing, REST-Based SOA, and Mobile Computing Are Changing Enterprise IT by Jason BloombergT Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today’s Businesses by Michael Minelli, Michele Chambers, and Ambiga Dhiraj The Chief Information Offi cer’s Body of Knowledge: People, Process, and Technology by Dean Lane CIO Best Practices: Enabling Strategic Value with Information Technology (Second Edition) by Joe Stenzel, Randy Betancourt, Gary Cokins, Alyssa Farrell, Bill Flemming, Michael H. Hugos, Jonathan Hujsak, and Karl Schubert The CIO Playbook: Strategies and Best Practices for IT Leaders to Deliver Value by Nicholas R. Colisto
  • 20. Enterprise Performance Management Done Right: An Operating System for Your Organization by Ron Dimon Executive’s Guide to Virtual Worlds: How Avatars Are Transforming Your Business and Your Brand by Lonnie Bensond IT Leadership Manual: Roadmap to Becoming a Trusted Business Partner by Alan R. r Guibord Managing Electronic Records: Methods, Best Practices, and Technologies by Robert F. s Smallwood On Top of the Cloud: How CIOs Leverage New Technologies to Drive Change and Build Value Across the Enterprise by Hunter Muller Straight to the Top: CIO Leadership in a Mobile, Social, and Cloud-based World (Second Edition) by Gregory S. Smith Strategic IT: Best Practices for Managers and Executives by Arthur M. Langer ands Lyle Yorks Transforming IT Culture: How to Use Social Intelligence, Human Factors, and Collaboration to Create an IT Department That Outperforms by Frank Wanders Unleashing the Power of IT: Bringing People, Business, and Technology Together by Dan Roberts
  • 21. The U.S. Technology Skills Gap: What Every Technology Executive Must Know to Save America’s Future by Gary J. Beach Information Governance: Concepts, Strategies and Best Practices by Robert F. Smallwoods Robert F. Smallwood INFORMATION GOVERNANCE CONCEPTS, STRATEGIES AND BEST PRACTICES Cover image: © iStockphoto / IgorZh Cover design: Wiley Copyright © 2014 by Robert F. Smallwood. All rights reserved. Chapter 7 © 2014 by Barclay Blair Portions of Chapter 8 © 2014 by Randolph Kahn Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,
  • 22. recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifi cally disclaim any implied warranties of merchantability or fi tness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profi t or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
  • 23. Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com. Library of Congress Cataloging-in-Publication Data: Smallwood, Robert F., 1959- Information governance : concepts, strategies, and best practices / Robert F. Smallwood. pages cm. — (Wiley CIO series) ISBN 978-1-118-21830-3 (cloth); ISBN 978-1-118-41949-6 (ebk); ISBN 978-1-118-42101-7 (ebk) 1. Information technology—Management. 2. Management information systems. 3. Electronic records—Management. I. Title. HD30.2.S617 2014 658.4’038—dc23 2013045072 Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 http://www.copyright.com http://www.wiley.com/go/permissions http://booksupport.wiley.com http://www.wiley.com
  • 24. For my sons and the next generation of tech-savvy managers vii CONTENTS PREFACE xv ACKNOWLEDGMENTS xvii PA RT O N E — Information Governance Concepts, Defi nitions, and Principles 1p C H A P T E R 1 The Onslaught of Big Data and the Information Governance Imperative 3 Defi ning Information Governance 5 IG Is Not a Project, But an Ongoing Program 7 Why IG Is Good Business 7 Failures in Information Governance 8 Form IG Policies, Then Apply Technology for Enforcement 10 Notes 12
  • 25. C H A P T E R 2 Information Governance, IT Governance, Data Governance: What’s the Difference? 15 Data Governance 15 IT Governance 17 Information Governance 20 Impact of a Successful IG Program 20 Summing Up the Differences 21 Notes 22 C H A P T E R 3 Information Governance Principles 25 Accountability Is Key 27 Generally Accepted Recordkeeping Principles® 27 Contributed by Charmaine Brooks, CRM Assessment and Improvement Roadmap 34 Who Should Determine IG Policies? 35 Notes 38 PA RT T W O — Information Governance Risk Assessment and Strategic Planning 41g g C H A P T E R 4 Information Risk Planning and Management 43 Step 1: Survey and Determine Legal and Regulatory Applicability
  • 26. and Requirements 43 viii CONTENTS Step 2: Specify IG Requirements to Achieve Compliance 46 Step 3: Create a Risk Profi le 46 Step 4: Perform Risk Analysis and Assessment 48 Step 5: Develop an Information Risk Mitigation Plan 49 Step 6: Develop Metrics and Measure Results 50 Step 7: Execute Your Risk Mitigation Plan 50 Step 8: Audit the Information Risk Mitigation Program 51 Notes 51 C H A P T E R 5 Strategic Planning and Best Practices for Information Governance 53 Crucial Executive Sponsor Role 54 Evolving Role of the Executive Sponsor 55 Building Your IG Team 56 Assigning IG Team Roles and Responsibilities 56 Align Your IG Plan with Organizational Strategic Plans 57 Survey and Evaluate External Factors 58
  • 27. Formulating the IG Strategic Plan 65 Notes 69 C H A P T E R 6 Information Governance Policy Development 71 A Brief Review of Generally Accepted Recordkeeping Principles® 71 IG Reference Model 72 Best Practices Considerations 75 Standards Considerations 76 Benefi ts and Risks of Standards 76 Key Standards Relevant to IG Efforts 77 Major National and Regional ERM Standards 81 Making Your Best Practices and Standards Selections to Inform Your IG Framework 87 Roles and Responsibilities 88 Program Communications and Training 89 Program Controls, Monitoring, Auditing and Enforcement 89 Notes 91 PA RT T H R E E — Information Governance Key Impact Areas Based on the IG Reference Model 95p
  • 28. C H A P T E R 7 Business Considerations for a Successful IG Program 97 By Barclay T. Blair Changing Information Environment 97 CONTENTS ix Calculating Information Costs 99 Big Data Opportunities and Challenges 100 Full Cost Accounting for Information 101 Calculating the Cost of Owning Unstructured Information 102 The Path to Information Value 105 Challenging the Culture 107 New Information Models 107 Future State: What Will the IG-Enabled Organization Look Like? 110 Moving Forward 111 Notes 113 C H A P T E R 8 Information Governance and Legal Functions 115
  • 29. By Robert Smallwood with Randy Kahn, Esq., and Barry Murphy Introduction to e-Discovery: The Revised 2006 Federal Rules of Civil Procedure Changed Everything 115 Big Data Impact 117 More Details on the Revised FRCP Rules 117 Landmark E-Discovery Case: Zubulake v. UBS Warburg 119 E-Discovery Techniques 119 E-Discovery Reference Model 119 The Intersection of IG and E-Discovery 122 By Barry Murphy Building on Legal Hold Programs to Launch Defensible Disposition 125 By Barry Murphy Destructive Retention of E-Mail 126 Newer Technologies That Can Assist in E-Discovery 126 Defensible Disposal: The Only Real Way To Manage Terabytes and Petabytes 130 By Randy Kahn, Esq. Retention Policies and Schedules 137 By Robert Smallwood, edited by Paula Lederman, MLS Notes 144
  • 30. C H A P T E R 9 Information Governance and Records and Information Management Functions 147 Records Management Business Rationale 149 Why Is Records Management So Challenging? 150 Benefi ts of Electronic Records Management 152 Additional Intangible Benefi ts 153 Inventorying E-Records 154 Generally Accepted Recordkeeping Principles® 155 E-Records Inventory Challenges 155 x CONTENTS Records Inventory Purposes 156 Records Inventorying Steps 157 Ensuring Adoption and Compliance of RM Policy 168 General Principles of a Retention Scheduling 169 Developing a Records Retention Schedule 170 Why Are Retention Schedules Needed? 171 What Records Do You Have to Schedule? Inventory and Classifi cation 173
  • 31. Rationale for Records Groupings 174 Records Series Identifi cation and Classifi cation 174 Retention of E-Mail Records 175 How Long Should You Keep Old E-Mails? 176 Destructive Retention of E-Mail 177 Legal Requirements and Compliance Research 178 Event-Based Retention Scheduling for Disposition of E-Records 179 Prerequisites for Event-Based Disposition 180 Final Disposition and Closure Criteria 181 Retaining Transitory Records 182 Implementation of the Retention Schedule and Disposal of Records 182 Ongoing Maintenance of the Retention Schedule 183 Audit to Manage Compliance with the Retention Schedule 183 Notes 186 C H A P T E R 10 Information Governance and Information Technology Functions 189 Data Governance 191 Steps to Governing Data Effectively 192
  • 32. Data Governance Framework 193 Information Management 194 IT Governance 196 IG Best Practices for Database Security and Compliance 202 Tying It All Together 204 Notes 205 C H A P T E R 11 Information Governance and Privacy and Security Functions 207 Cyberattacks Proliferate 207 Insider Threat: Malicious or Not 208 Privacy Laws 210 Defense in Depth 212 Controlling Access Using Identity Access Management 212 Enforcing IG: Protect Files with Rules and Permissions 213 CONTENTS xi Challenge of Securing Confi dential E-Documents 213 Apply Better Technology for Better Enforcement in the Extended Enterprise 215
  • 33. E-Mail Encryption 217 Secure Communications Using Record-Free E-Mail 217 Digital Signatures 218 Document Encryption 219 Data Loss Prevention (DLP) Technology 220 Missing Piece: Information Rights Management (IRM) 222 Embedded Protection 226 Hybrid Approach: Combining DLP and IRM Technologies 227 Securing Trade Secrets after Layoffs and Terminations 228 Persistently Protecting Blueprints and CAD Documents 228 Securing Internal Price Lists 229 Approaches for Securing Data Once It Leaves the Organization 230 Document Labeling 231 Document Analytics 232 Confi dential Stream Messaging 233 Notes 236 PA RT F O U R — Information Governance for Delivery Platforms 239y
  • 34. C H A P T E R 12 Information Governance for E-Mail and Instant Messaging 241 Employees Regularly Expose Organizations to E-Mail Risk 242 E-Mail Polices Should Be Realistic and Technology Agnostic 243 E-Record Retention: Fundamentally a Legal Issue 243 Preserve E-Mail Integrity and Admissibility with Automatic Archiving 244 Instant Messaging 247 Best Practices for Business IM Use 247 Technology to Monitor IM 249 Tips for Safer IM 249 Notes 251 C H A P T E R 13 Information Governance for Social Media 253 By Patricia Franks, Ph.D, CRM, and Robert Smallwood Types of Social Media in Web 2.0 253 Additional Social Media Categories 255 Social Media in the Enterprise 256 Key Ways Social Media Is Different from E-Mail and Instant
  • 35. Messaging 257 Biggest Risks of Social Media 257 Legal Risks of Social Media Posts 259 xii CONTENTS Tools to Archive Social Media 261 IG Considerations for Social Media 262 Key Social Media Policy Guidelines 263 Records Management and Litigation Considerations for Social Media 264 Emerging Best Practices for Managing Social Media Records 267 Notes 269 C H A P T E R 14 Information Governance for Mobile Devices 271 Current Trends in Mobile Computing 273 Security Risks of Mobile Computing 274 Securing Mobile Data 274 Mobile Device Management 275 IG for Mobile Computing 276
  • 36. Building Security into Mobile Applications 277 Best Practices to Secure Mobile Applications 280 Developing Mobile Device Policies 281 Notes 283 C H A P T E R 15 Information Governance for Cloud Computing 285 By Monica Crocker CRM, PMP, CIP, and Robert Smallwood Defi ning Cloud Computing 286 Key Characteristics of Cloud Computing 287 What Cloud Computing Really Means 288 Cloud Deployment Models 289 Security Threats with Cloud Computing 290 Benefi ts of the Cloud 298 Managing Documents and Records in the Cloud 299 IG Guidelines for Cloud Computing Solution
  • 37. s 300 Notes 301 C H A P T E R 16 SharePoint Information Governance 303 By Monica Crocker, CRM, PMP, CIP, edited by Robert Smallwood Process Change, People Change 304 Where to Begin the Planning Process 306 Policy Considerations 310 Roles and Responsibilities 311 Establish Processes 312 Training Plan 313 Communication Plan 313 Note 314
  • 38. CONTENTS xiii PA RT F I V E — Long-Term Program Issues 315g g C H A P T E R 17 Long-Term Digital Preservation 317 By Charles M. Dollar and Lori J. Ashley Defi ning Long-Term Digital Preservation 317 Key Factors in Long-Term Digital Preservation 318 Threats to Preserving Records 320 Digital Preservation Standards 321 PREMIS Preservation Metadata Standard 328 Recommended Open Standard Technology-Neutral Formats 329 Digital Preservation Requirements 333 Long-Term Digital Preservation Capability Maturity Model®
  • 39. 334 Scope of the Capability Maturity Model 336 Digital Preservation Capability Performance Metrics 341 Digital Preservation Strategies and Techniques 341 Evolving Marketplace 344 Looking Forward 344 Notes 346 C H A P T E R 18 Maintaining an Information Governance Program and Culture of Compliance 349 Monitoring and Accountability 349 Staffi ng Continuity Plan 350 Continuous Process Improvement 351 Why Continuous Improvement Is Needed 351
  • 40. Notes 353 A P P E N D I X A Information Organization and Classifi cation: Taxonomies and Metadata 355 By Barb Blackburn, CRM, with Robert Smallwood; edited by Seth Earley Importance of Navigation and Classifi cation 357 When Is a New Taxonomy Needed? 358 Taxonomies Improve Search Results 358 Metadata and Taxonomy 359 Metadata Governance, Standards, and Strategies 360 Types of Metadata 362 Core Metadata Issues 363 International Metadata Standards and Guidance 364
  • 41. Records Grouping Rationale 368 Business Classifi cation Scheme, File Plans, and Taxonomy 368 Classifi cation and Taxonomy 369 xiv CONTENTS Prebuilt versus Custom Taxonomies 370 Thesaurus Use in Taxonomies 371 Taxonomy Types 371 Business Process Analysis 377 Taxonomy Testing: A Necessary Step 379 Taxonomy Maintenance 380 Social Tagging and Folksonomies 381
  • 42. Notes 383 A P P E N D I X B Laws and Major Regulations Related to Records Management 385 United States 385 Canada 387 By Ken Chasse, J.D., LL.M. United Kingdom 389 Australia 391 Notes 394 A P P E N D I X C Laws and Major Regulations Related to Privacy 397 United States 397 Major Privacy Laws Worldwide, by Country 398 Notes 400
  • 43. GLOSSARY 401 ABOUT THE AUTHOR 417 ABOUT THE MAJOR CONTRIBUTORS 419 INDEX 421 xv PREFACE I nformation governance (IG) has emerged as a key concern for business executives and managers in today’s environment of Big Data, increasing information risks, co- lossal leaks, and greater compliance and legal demands. But few seem to have a clear understanding of what IG is; that is, how you defi ne what it is and is not, and how to implement it. This book clarifi es and codifi es these defi
  • 44. nitions and provides key in- sights as to how to implement and gain value from IG programs. Based on exhaustive research, and with the contributions of a number of industry pioneers and experts, this book lays out IG as a complete discipline in and of itself for the fi rst time. IG is a super-discipline that includes components of several key fi elds: law, records management, information technology (IT), risk management, privacy and security, and business operations. This unique blend calls for a new breed of information pro- fessional who is competent across these established and quite complex fi elds. Training and education are key to IG success, and this book provides the essential underpinning for organizations to train a new generation of IG professionals. Those who are practicing professionals in the component fi elds of IG will fi nd the book useful in expanding their knowledge from traditional fi elds to the emerging tenets of IG. Attorneys, records and compliance managers, risk
  • 45. managers, IT manag- ers, and security and privacy professionals will fi nd this book a particularly valuable resource. The book strives to offer clear IG concepts, actionable strategies, and proven best practices in an understandable and digestible way; a concerted effort was made to simplify language and to offer examples. There are summaries of key points through- out and at the end of each chapter to help the reader retain major points. The text is organized into fi ve parts: (1) Information Governance Concepts, Defi nitions, and Principles; (2) IG Risk Assessment and Strategic Planning; (3) IG Key Impact Areas; (4) IG for Delivery Platforms; and (5) Long-Term Program Issues. Also included are appendices with detailed information on taxonomy and metadata design and on re- cords management and privacy legislation. One thing that is sure is that the complex fi eld of IG is evolving. It will continue
  • 46. to change and solidify. But help is here: No other book offers the kind of compre- hensive coverage of IG contained within these pages. Leveraging the critical advice provided here will smooth your path to understanding and implementing successful IG programs. Robert F. Smallwood xvii ACKNOWLEDGMENTS I would like to sincerely thank my colleagues for their support and generous contribu- tion of their expertise and time, which made this pioneering text possible.
  • 47. Many thanks to Lori Ashley, Barb Blackburn, Barclay Blair, Charmaine Brooks, Ken Chasse, Monica Crocker, Charles M. Dollar, Seth Earley, Dr. Patricia Franks, Randy Kahn, Paula Lederman, and Barry Murphy. I am truly honored to include their work and owe them a great debt of gratitude. PA RT O N E Information Governance Concepts, Defi nitions, and Principles 3
  • 48. The Onslaught of Big Data and the Information Governance Imperative C H A P T E R 1 T he value of information in business is rising, and business leaders are more and more viewing the ability to govern, manage, and harvest information as critical to success. Raw data is now being increasingly viewed as an asset that can be leveraged, just like fi nancial or human capital.1 Some have called this new age of “Big Data” the “industrial revolution of data.” According to the research group Gartner, Inc., Big Data is defi ned as “high-volume, high-velocity and high-variety information assets that demand cost-effective, inno- vative forms of information processing for enhanced insight and
  • 49. decision making.” 2 A practical defi nition should also include the idea that the amount of data—both struc- tured (in databases) and unstructured (e.g., e-mail, scanned documents) is so mas- sive that it cannot be processed using today’s database tools and analytic software techniques. 3 In today’s information overload era of Big Data—characterized by massive growth in business data volumes and velocity—the ability to distill key insights from enor- mous amounts of data is a major business differentiator and source of sustainable com- petitive advantage. In fact, a recent report by the World Economic Forum stated that data is a new asset class and personal data is “the new oil.” 4 And we are generating more than we can manage effectively with current methods and tools. The Big Data numbers are overwhelming: Estimates and projections vary, but it has been stated that 90 percent of the data existing worldwide today was created in the
  • 50. last two years 5 and that every two days more information is generated than was from the dawn of civilization until 2003. 6 This trend will continue: The global market for Big Data technology and services is projected to grow at a compound annual rate of 27 percent through 2017, about six times faster than the general information and com- munications technology (ICT) market. 7 Many more comparisons and statistics are available, and all demonstrate the incredible and continued growth of data. Certainly, there are new and emerging opportunities arising from the accu- mulation and analysis of all that data we are busy generating and collecting. New enterprises are springing up to capitalize on data mining and business intelligence opportunities. The U.S. federal government joined in, announcing $200 million in Big Data research programs in 2012.8
  • 51. 4 INFORMATION GOVERNANCE Big Data values massive accumulation of data, whereas in business, e-discovery realities and potential legal liabilities dictate that data be culled to only that which has clear business value. But established organizations, especially larger ones, are being crushed by this onslaught of Big Data: It is just too expensive to keep all the information that is being generated, and unneeded information is a sort of irrelevant sludge for decision makers to wade through. They have diffi culty knowing which information is an accurate and meaningful “wheat” and which is simply irrelevant “chaff.” This means they do not have the precise information they need to base good business decisions upon. And all that Big Data piling up has real costs: The burden of massive stores of information has increased storage management costs
  • 52. dramatically, caused overloaded systems to fail, and increased legal discovery costs. 9 Further, the longer that data is kept, the more likely that it will need to be migrated to newer computing platforms, driving up conversion costs; and legally, there is the risk that somewhere in that mountain of data an organization stores is a piece of information that represents a signifi cant legal liability.10 This is where the worlds of Big Data and business collide . For Big Data proponents, more data is always better, and there is no perceived downside to accumulation of mas- sive amounts of data. In the business world, though, the realities of legal e-discovery mean the opposite is true. 11 To reduce risk, liability, and costs, it is critical for unneeded information to be disposed of in a systematic, methodical, and “legally defensible” (jus- tifi able in legal proceedings) way, when it no longer has legal, regulatory, or business value. And there also is the high-value benefi t of basing decisions on better, cleaner
  • 53. data, which can come about only through rigid, enforced information governance (IG) policies that reduce information glut. Organizations are struggling to reduce and right-size their information footprint by discarding superfl uous and redundant data, e-documents, and information. But the critical issue is devising policies, methods, and processes and then deploying information technol- ogy (IT) to sort through which information is valuable and which no longer has business value and can be discarded. IT, IG, risk, compliance, and legal representatives in organizations have a clear sense that most of the information stored is unneeded, raises costs, and poses risks. According to a survey taken at a recent Compliance, Governance and Oversight Counsel summit, respondents estimated that approximately 25 percent of information stored in organizations has real business value, while 5 percent must be kept as busi- ness records and about 1 percent is retained due to a litigation
  • 54. hold. “This means that The onslaught of Big Data necessitates that information governance (IG) be implemented to discard unneeded data in a legally defensible way. THE ONSLAUGHT OF BIG DATA AND THE INFORMATION GOVERNANCE IMPERATIVE 5 [about] 69 percent of information in most companies has no business, legal, or regulatory value. Companies that are able to dispose of this data debris return more profi t to sharehold- ers, can leverage more of their IT budgets for strategic investments, and can avoid excess expense in legal and regulatory response” (emphasis added). 12 With a smaller information footprint , organizations can more easily fi nd what they tt need and derive business value from it.13 They must eliminate the data debris regularly
  • 55. and consistently, and to do this, processes and systems must be in place to cull valuable information and discard the data debris daily. An IG program sets the framework to accomplish this. The business environment has also underscored the need for IG. According to Ted Friedman at Gartner, “The recent global fi nancial crisis has put information gov- ernance in the spotlight. . . . [It] is a priority of IT and business leaders as a result of various pressures, including regulatory compliance mandates and the urgent need for improved decision-making.” 14 And IG mastery is critical for executives: Gartner predicts that by 2016, one in fi ve chief information offi cers in regulated industries will be fi red from their jobs for failed IG initiatives. s 15 Defi ning Information Governance IG is a sort of super discipline that has emerged as a result of new and tightened legislation
  • 56. governing businesses, external threats such as hacking and data breaches, and the recog- nition that multiple overlapping disciplines were needed to address today’s information management challenges in an increasingly regulated and litigated business environment.16 IG is a subset of corporate governance, and includes key concepts from re- cords management, content management, IT and data governance, information se- curity, data privacy, risk management, litigation readiness, regulatory compliance, long-term digital preservation , and even business intelligence. This also means that it includes related technology and discipline subcategories, such as document management, enterprise search, knowledge management, and business continuity/ disaster recovery. Only about one quarter of information organizations are managing has real business value.
  • 57. With a smaller information footprint, it is easier for organizations to fi nd the information they need and derive business value from it. IG is a subset of corporate governance. 6 INFORMATION GOVERNANCE IG is a sort of superdiscipline that encompasses a variety of key concepts from a variety of related disciplines. Practicing good IG is the essential foundation for building legally defensible disposition practices to discard unneeded information and to secure confi dential in- formation, which may include trade secrets, strategic plans, price lists, blueprints, or personally identifi able information (PII) subject to privacy laws; it provides the basis for consistent, reliable methods for managing data, e- documents, and records.
  • 58. Having trusted and reliable records, reports, data, and databases enables managers to make key decisions with confi dence.17 And accessing that information and business intelligence in a timely fashion can yield a long-term sustainable competitive advan- tage, creating more agile enterprises. To do this, organizations must standardize and systematize their handling of in- formation. They must analyze and optimize how information is accessed, controlled, managed, shared, stored, preserved, and audited. They must have complete, current, and relevant policies, processes, and technologies to manage and control information, including who is able to access what information , and when, to meet external legal and regulatory demands and internal governance policy requirements. In short, IG is about information control and compliance. IG is a subset of corporate governance, which has been around as long as corpora- tions have existed. IG is a rather new multidisciplinary fi eld
  • 59. that is still being defi ned, but has gained traction increasingly over the past decade. The focus on IG comes not only from compliance, legal, and records management functionaries but also from ex- ecutives who understand they are accountable for the governance of information and that theft or erosion of information assets has real costs and consequences. “Information governance” is an all-encompassing term for how an organization manages the totality of its information. According to the Association of Records Managers and Administrators (ARMA), IG is “a strategic framework composed of standards, processes, roles, and metrics that hold organizations and individuals accountable to create, organize, secure, maintain, use, and dispose of information in ways that align with and contribute to the organization’s goals.”18 IG includes the set of policies, processes, and controls to
  • 60. manage information in compliance with external regulatory requirements and internal governance frameworks . Specifi c policiess apply to specifi c data and document types, records series, and other business informa- tion, such as e-mail and reports. Stated differently, IG is “a quality-control discipline for managing, using, improv- ing, and protecting information.” 19 Practicing good IG is the essential foundation for building legally defensible disposition practices to discard unneeded information. THE ONSLAUGHT OF BIG DATA AND THE INFORMATION GOVERNANCE IMPERATIVE 7 IG is “a strategic framework composed of standards, processes, roles, and metrics, that hold organizations and individuals accountable to create, orga- nize, secure, maintain, use, and dispose of information in ways
  • 61. that align with and contribute to the organization’s goals.” 20 Fleshing out the defi nition further: “Information governance is policy-based man- agement of information designed to lower costs, reduce risk, and ensure compliance with legal, regulatory standards, and/or corporate governance.”21 IG necessarily in- corporates not just policies but information technologies to audit and enforce those policies. The IG team must be cognizant of information lifecycle issues and be able to apply the proper retention and disposition policies, including digital preservation where records need to be maintained for long periods. IG Is Not a Project, But an Ongoing Program IG is an ongoing program , not a one-time project. IG provides an umbrella to manage and control information output and communications. Since technologies change so quickly, it is necessary to have overarching policies that can manage the various IT
  • 62. platforms that an organization may use. Compare it to a workplace safety program; every time a new location, team member, piece of equipment, or toxic substance is acquired by the organization, the workplace safety program should dictate how that is handled. If it does not, the workplace safety policies/procedures/training that are part of the workplace safety program need to be updated. Regular reviews are conducted to ensure the program is being followed and ad- justments are made based on the fi ndings. The effort never ends. s 22 The same is true for IG. IG is not only a tactical program to meet regulatory, compliance, and litigation demands. It can be strategic , in that it is the necessary underpinning for developing a c management strategy that maximizes knowledge worker productivity while minimiz- ing risk and costs. Why IG Is Good Business
  • 63. IG is a tough sell. It can be diffi cult to make the business case for IG, unless there has been some major compliance sanction, fi ne, legal loss, or colossal data breach. In fact, the largest IG is how an organization maintains security, complies with regulations, and meets ethical standards when managing information. IG is a multidisciplinary program that requires an ongoing effort. 8 INFORMATION GOVERNANCE impediment to IG adoption is simply identifying its benefi ts and costs, according to the Economist Intelligence Unit. Sure, the enterprise needs better control over its information, but how much better? At what cost? What is the payback period and the return on investment? 23 It is challenging to make the business case for IG, yet making that case is funda-
  • 64. mental to getting IG efforts off the ground. Here are eight reasons why IG makes good business sense, from IG thought leader Barclay Blair: 1. We can’t keep everything forever. IG makes sense because it enables organiza- tions to get rid of unnecessary information in a defensible manner. Organi- zations need a sensible way to dispose of information in order to reduce the cost and complexity of the IT environment. Having unnecessary informa- tion around only makes it more diffi cult and expensive to harness informa- tion that has value. 2. We can’t throw everything away. IG makes sense because organizations can’t keep everything forever, nor can they throw everything away. We need information—the right information, in the right place, at the right time. Only IG provides the framework to make good decisions about
  • 65. what infor- mation to keep. 3. E-discovery. IG makes sense because it reduces the cost and pain of discov- ery. Proactively managing information reduces the volume of information exposed to e-discovery and simplifi es the task of fi nding and producing responsive information. 4. Your employees are screaming for it—just listen. IG makes sense because it helps knowledge workers separate “signal” from “noise” in their informa- tion fl ows. By helping organizations focus on the most valuable informa- tion, IG improves information delivery and improves productivity. 5. It ain’t gonna get any easier. IG makes sense because it is a proven way for organizations to respond to new laws and technologies that create new re- quirements and challenges. The problem of IG will not get
  • 66. easier over time, so organizations should get started now. 6. The courts will come looking for IG. IG makes sense because courts and regu- lators will closely examine your IG program. Falling short can lead to fi nes, sanctions, loss of cases, and other outcomes that have negative business and fi nancial consequences. 7. Manage risk: IG is a big one. Organizations need to do a better job of identi- fying and managing risk. The risk of information management failures is a critical risk that IG helps to mitigate. 8. E-mail: Reason enough. IG makes sense because it helps organizations take con- trol of e-mail. Solving e-mail should be a top priority for every organization. 24 Failures in Information Governance The failure to implement and enforce IG can lead to
  • 67. vulnerabilities that can have dire consequences. The theft of confi dential U.S. National Security Agency documents THE ONSLAUGHT OF BIG DATA AND THE INFORMATION GOVERNANCE IMPERATIVE 9 by Edward Snowden in 2013 could have been prevented by properly enforced IG. Also, Ford Motor Company is reported to have suffered a loss estimated at $50 to $100 million as a result of the theft of confi dential documents by one of its own em- ployees. A former product engineer who had access to thousands of trade secret docu- ments and designs sold them to a competing Chinese car manufacturer. A strong IG program would have controlled and tracked access and prevented the theft while pro- tecting valuable intellectual property. 25 Law enforcement agencies have also suffered from poor IG. In a rather frivolous
  • 68. case in 2013 that highlighted the lack of policy enforcement for the mobile environ- ment, it was reported that U.S. agents from the Federal Bureau of Investigation used government-issued mobile phones to send explicit text messages and nude photographs to coworkers. The incidents did not have a serious impact but did compromise the agency and its integrity, and “adversely affected the daily activities of several squads.” 26 Proper mobile communications policies were obviously not developed and enforced. IG is also about information security and privacy, and serious thought must be given when creating policies to safeguard personal, classifi ed or confi dential informa- tion. Schemes to compromise or steal information can be quite deceptive and devious, masked by standard operating procedures—if proper IG controls and monitoring are not in place. To wit: Granting remote access to confi dential information assets for key personnel is common. Granting medical leave is also common. But a deceptive
  • 69. and dishonest employee could feign a medical leave while downloading volumes of confi dential information assets for a competitor—and that is exactly what happened at Accenture, a global consulting fi rm. During a fraudulent medical leave, an employee was allowed access to Accenture’s Knowledge Exchange (KX), a detailed knowledge base containing previous proposals, expert reports, cost- estimating guidelines, and case studies. This activity could have been prevented by monitoring and analytics that would have shown an inordinate amount of downloads— especially for an “ailing” em- ployee. The employee then went to work for a direct competitor and continued to download the confi dential information from Accenture, estimated to be as many as 1,000 critical documents. While the online access to KX was secure, the use of the electronic documents could have been restricted even after the documents were down-r loaded, if IG measures were in place and newer technologies (such as information rights management [IRM] software) were deployed to secure
  • 70. them directly and main- tain that security remotely. With IRM, software security protections can be employed to seal the e-documents and control their use—even after they leave the organization. More details on IRM technology and its capabilities is presented later in this book. Other recent high-profi le data and document leakage cases revealing information security weaknesses that could have been prevented by a robust IG program include: ■ Huawei Technologies, the largest networking and mobile communications company in China, was sued by U.S.-based Motorola for allegedly conspiring to steal trade secrets through former Motorola employees. Ford’s loss from stolen documents in a single case of intellectual property (IP) theft was estimated at $50 to $100 million.
  • 71. 10 INFORMATION GOVERNANCE ■ MI6, the U.K. equivalent of the U.S. Central Intelligence Agency, learned that one of its agents in military intelligence attempted to sell confi dential docu- ments to the intelligence services of the Netherlands for £2 million GBP ($3 million USD). And breaches of personal information revealing failures in privacy protection abound; here are just a few: ■ Health information of 1,600 cardiology patients at Texas Children’s Hospital was compromised when a doctor’s laptop was stolen. The information includ- ed personal and demographic information about the patients, including their names, dates of birth, diagnoses, and treatment histories. 27 ■ U.K. medics lost the personal records of nearly 12,000 National Health Service patients in just eight months. Also, a hospital worker was
  • 72. suspended after it was discovered he had sent a fi le containing pay-slip details for every member of staff to his home e-mail account. 28 ■ Personal information about more than 600 patients of the Fraser Health Authority in British Columbia, Canada, was stored on a laptop stolen from Burnaby General Hospital. ■ In December 2013, Target stores in the U.S. reported that as many as 110 million customer records had been breached in a massive attack that lasted weeks. The list of breaches and IG failures could go on and on, more than fi lling the pages of this book. It is clear that it is occurring and that it will continue. IG controls to safeguard confi dential information assets and protect privacy cannot rely solely on the trustwor- thiness of employees and basic security measures. Up-to-date IG policies and enforcement efforts and newer technology sets are needed, with active,
  • 73. consistent monitoring and program adjustments to continue to improve. Executives and senior managers can no longer avoid the issue, as it is abundantly clear that the threat is real and the costs of taking such avoidable risks can be high. A single security breach is an IG failure and can cost the entire business. According to Debra Logan of Gartner, “When organizations suffer high-profi le data losses, espe- cially involving violations of the privacy of citizens or consumers, they suffer serious reputational damage and often incur fi nes or other sanctions. IT leaders will have to take at least part of the blame for these incidents.” 29 Form IG Policies, Then Apply Technology for Enforcement Typically, some policies governing the use and control of information and records may have been established for fi nancial and compliance reports, and perhaps e-mail, but they are often incomplete and out-of-date and have not been adjusted for changes
  • 74. in the business environment, such as new technology platforms (e.g., Web 2.0, social IG controls to safeguard confi dential information assets and protect privacy can- not rely solely on the trustworthiness of employees and basic security measures. THE ONSLAUGHT OF BIG DATA AND THE INFORMATION GOVERNANCE IMPERATIVE 11 media), changing laws (e.g., U.S. Federal Rules of Civil Procedure 2006 changes), and additional regulations. Further adding to the challenge is the rapid proliferation of mobile devices like tablets, phablets, and smartphones used in business— information can be more easily lost or stolen—so IG efforts must be made to preserve and protect the enterprise’s information assets.
  • 75. Proper IG requires that policies are fl exible enough not to hinder the proper fl ow of information in the heat of the business battle yet strict enough to control and audit for misuse, policy violations, or security breaches. This is a continuous iterative policy- making process that must be monitored and fi ne-tuned. Even with the absolute best efforts, some policies will miss the mark and need to be reviewed and adjusted. Getting started with IG awareness is the crucial fi rst step. It may have popped up on an executive’s radar at one point or another and an effort might have been made, but many organizations leave these policies on the shelf and do not revise them on a regular basis. IG is the necessary underpinning for a legally defensible disposition program that discards data debris and helps narrow the search for meaningful information on which to base business decisions. IG is also necessary to protect and preserve critical infor- mation assets. An IG strategy should aim to minimize exposure
  • 76. to risk, at a reasonable cost level, while maximizing productivity and improving the quality of information delivered to knowledge users. But a reactive, tactical project approach is not the way to go about it—haphazardly t swatting at technological, legal, and regulatory fl ies. A proactive, strategic program, with a clear, accountable sponsor, an ongoing plan, and regular review process, is the only way to continuously adjust IG policies to keep them current so that they best serve the organization’s needs. Some organizations have created formal governance bodies to establish strat- egies, policies, and procedures surrounding the distribution of information inside and outside the enterprise. These governance bodies, steering committees, or teams should include members from many different functional areas, since proper IG ne- cessitates input from a variety of stakeholders. Representatives from IT, records man-
  • 77. agement, corporate or agency archiving, risk management, compliance, operations, human resources, security, legal, fi nance, and perhaps knowledge management are typically a part of IG teams. Often these efforts are jump-started and organized by an executive sponsor who utilizes third-party consulting resources that specialize in IG efforts, especially considering the newness of IG and its emerging best practices. So in this era of ever-growing Big Data, leveraging IG policies to focus on re- taining the information that has real business value, while discarding the majority of information that has no value and carries associated increased costs and risks, is criti- cal to success for modern enterprises. This must be accomplished in a systematic, consistent, and legally defensible manner by implementing a formal IG program. Other crucial elements of an IG program are the steps taken to secure confi dential information by enforcing and monitoring policies using the appropriate information
  • 78. technologies. Getting started with IG awareness is the crucial fi rst step. 12 INFORMATION GOVERNANCE CHAPTER SUMMARY: KEY POINTS ■ The onslaught of Big Data necessitates that IG be implemented to discard unneeded data in a legally defensible way. ■ Big Data values massive accumulation of data, whereas in business, e-discovery realities and potential legal liabilities dictate that data be culled to only that which has clear business value. ■ Only about one quarter of the information organizations are managing has real business value. ■ With a smaller information footprint, it is easier for
  • 79. organizations to fi nd the information they need and derive business value from it. ■ IG is a subset of corporate governance and encompasses the policies and leveraged technologies meant to manage what corporate information is re- tained, where, and for how long, and also how it is retained. ■ IG is a sort of super discipline that encompasses a variety of key concepts from a variety of related and overlapping disciplines. ■ Practicing good IG is the essential foundation for building legally defensible disposition practices to discard unneeded information. ■ According to ARMA, IG is “a strategic framework composed of standards, processes, roles, and metrics that hold organizations and individuals account- able to create, organize, secure, maintain, use, and dispose of information in ways that align with and contribute to the organization’s goals.” 30
  • 80. ■ IG is how an organization maintains security, complies with regulations and laws, and meets ethical standards when managing information. ■ IG is a multidisciplinary program that requires an ongoing effort and active participation of a broad cross-section of functional groups and stakeholders. ■ IG controls to safeguard confi dential information assets and protect privacy cannot rely solely on the trustworthiness of employees and basic security measures. ■ Getting started with IG awareness is the crucial fi rst step. Notes 1. The Economist, “Data, Data Everywhere,” February 25, 2010, www.economist.com/node/15557443 2. Gartner, Inc., “IT Glossary: Big Data,” www.gartner.com/it-glossary/big-data/ (accessed April 15, 2013).
  • 81. 3. Webopedia, “Big Data,” www.webopedia.com/TERM/B/big_data.html (accessed April 15, 2013). http://www.economist.com/node/15557443 http://www.gartner.com/it-glossary/big-data/ http://www.webopedia.com/TERM/B/big_data.html THE ONSLAUGHT OF BIG DATA AND THE INFORMATION GOVERNANCE IMPERATIVE 13 4. World Economic Forum, “Personal Data:The Emergence of a New Asset Class”(January 2011), http:// www3.weforum.org/docs/WEF_ITTC_PersonalDataNewAsset_R eport_2011.pdf 5. Deidra Paknad, “Defensible Disposal: You Can’t Keep All Your Data Forever,” July 17, 2012, www .forbes.com/sites/ciocentral/2012/07/17/defensible-disposal- you-cant-keep-all-your-data-forever/ 6. Susan Karlin, “Earth’s Nervous System: Looking at Humanity Through Big Data,” www.fastcocreate .com/1681986/earth-s-nervous-system-looking-at-humanity-
  • 82. through-big-data#1(accessed March 5, 2013). 7. IDC Press Release, December 18, ,2013, http://www.idc.com/getdoc.jsp?containerId=prUS24542113 New IDC Worldwide Big Data Technology and Services Forecast Shows Market Expected to Grow to $32.4 Billion in 2017 8. Steve Lohr, “How Big Data Became So Big,” New York Times, August 11, 2012, www.nytimes. com/2012/08/12/business/how-big-data-became-so-big- unboxed.html?_r=2&smid=tw-share& 9. Kahn Consulting, “Information Governance Brief,” sponsored by IBM, www.delve.us/downloads/ Brief-Defensible-Disposal.pdf (accessed March 4, 2013). 10. Barclay T. Blair, “Girding for Battle,” Law Technology News, October 1, 2012, www.law.com/jsp/lawtech- nologynews/PubArticleLTN.jsp?id=1202572459732&thepage=1 11. Ibid. 12. Paknad, “Defensible Disposal.” 13. Randolph A. Kahn,
  • 83. https://twitter.com/InfoParkingLot/status/273791612172259329, November 28, 2012. 14. Gartner Press Release, “Gartner Says Master Data Management Is Critical to Achieving Effective Information Governance,” www.gartner.com/newsroom/id/1898914, January 19, 2012 15. Ibid. 16. Monica Crocker, e-mail to author, June 21, 2012. 17. Economist Intelligence Unit, “The Future of Information Governance,” www.emc.com/leadership/ business-view/future-information-governance.htm (accessed November 14, 2013). 18. ARMA International, Glossary of Records and Information Management Terms , 4th ed., 2012, TR 22–2012.s 19. Arvind Krishna, “Three Steps to Trusting Your Data in 2011,” IT Business Edge , posted March 9, 2011, www.itbusinessedge.com/guest-opinions/three-steps-trusting- your-data-2011 . (accessed November 14, 2013). 20. ARMA International, Glossary of Records and Information Management Terms , 4th ed., 2012, TR 22–2012.s
  • 84. 21. Laura DuBoisand Vivian Tero, “Practical Information Governance: Balancing Cost, Risk, and Pro- ductivity,” IDC White Paper (August 2010), www.emc.com/collateral/analyst-reports/idc-practical- information-governance-ar.pdf 22. Monica Crocker, e-mail to author, June 21, 2012. 23. Barclay T. Blair, Making the Case for Information Governance: Ten Reasons IG Makes Sense , ViaLumina Ltd, 2010. Online at http://barclaytblair.com/making-the-case- for-ig-ebook/ (accessed November 14, 2013). 24. Barclay T. Blair, “8 Reasons Why Information Governance (IG) Makes Sense,” June 29, 2009, www. digitallandfi ll.org/2009/06/8-reasons-why-information- governance-ig-makes-sense.html 25. Peter Abatan, “Corporate and Industrial Espionage to Rise in 2011,” Enterprise Digital Rights Man- agement, http://enterprisedrm.tumblr.com/post/2742811887/corporate- espionage-to-rise-in-2011 .
  • 85. (accessed November 14, 2013). 26. BBC News, “FBI Staff Disciplined for Sex Texts and Nude Pictures,” February 22, 2013, www.bbc. co.uk/news/world-us-canada-21546135 27. Todd Ackerman, “Laptop Theft Puts Texas Children’s Patient Info at Risk,” Houston Chronicle , July 30, 2009, e www.chron.com/news/houston-texas/article/Laptop-theft-puts- Texas-Children-s-patient-info-1589473. php . (accessed March 2, 2012). 28. Jonny Greatrex, “Bungling West Midlands Medics Lose 12,000 Private Patient Records,” Sunday Mer- cury, September 5, 2010, www.sundaymercury.net/news/sundaymercuryexclusives/2010/0 9/05/bun- gling-west-midlands-medics-lose-12–000-private-patient- records-66331–27203177/ (accessed March 2, 2012). 29. Gartner Press Release, “Gartner Says Master Data Management Is Critical to Achieving Effective Information Governance.”
  • 86. 30. ARMA International, Glossary of Records and Information Management Terms. s http://www3.weforum.org/docs/WEF_ITTC_PersonalDataNewA sset_Report_2011.pdf http://www3.weforum.org/docs/WEF_ITTC_PersonalDataNewA sset_Report_2011.pdf http://www.fastcocreate.com/1681986/earth-s-nervous-system- looking-at-humanity-through-big-data#1 http://www.idc.com/getdoc.jsp?containerId=prUS24542113 http://www.nytimes.com/2012/08/12/business/how-big-data- became-so-big-unboxed.html?_r=2&smid=tw-share& http://www.delve.us/downloads/Brief-Defensible-Disposal.pdf http://www.law.com/jsp/lawtech- nologynews/PubArticleLTN.jsp?id=1202572459732&thepage=1 http://www.law.com/jsp/lawtech- nologynews/PubArticleLTN.jsp?id=1202572459732&thepage=1 http://www.law.com/jsp/lawtech- nologynews/PubArticleLTN.jsp?id=1202572459732&thepage=1 https://twitter.com/InfoParkingLot/status/273791612172259329 http://www.gartner.com/newsroom/id/1898914 http://www.emc.com/leadership/business-view/future- information-governance.htm http://www.itbusinessedge.com/guest-opinions/three-steps- trusting-your-data-2011
  • 87. http://www.emc.com/collateral/analyst-reports/idc-practical- information-governance-ar.pdf http://www.emc.com/collateral/analyst-reports/idc-practical- information-governance-ar.pdf http://www.emc.com/collateral/analyst-reports/idc-practical- information-governance-ar.pdf http://barclaytblair.com/making-the-case-for-ig-ebook/ http://www.digitallandfill.org/2009/06/8-reasons-why- information-governance-ig-makes-sense.html http://enterprisedrm.tumblr.com/post/2742811887/corporate- espionage-to-rise-in-2011 http://www.bbc.co.uk/news/world-us-canada-21546135 http://www.chron.com/news/houston-texas/article/Laptop-theft- puts-Texas-Children-s-patient-info-1589473.php http://www.sundaymercury.net/news/sundaymercuryexclusives/ 2010/09/05/bun-gling-west-midlands-medics-lose- 12%E2%80%93000-private-patient-records- 66331%E2%80%9327203177/ http://www.fastcocreate.com/1681986/earth-s-nervous-system- looking-at-humanity-through-big-data#1 http://www.nytimes.com/2012/08/12/business/how-big-data- became-so-big-unboxed.html?_r=2&smid=tw-share& http://www.delve.us/downloads/Brief-Defensible-Disposal.pdf http://www.emc.com/leadership/business-view/future- information-governance.htm
  • 89. C H A P T E R 2 T here has been a great deal of confusion around the term information gover- nance (IG) and how it is distinct from other similar industry terms, such as information technology (IT) governance and data governance . They are all a subset of corporate governance, and in the above sequence, become increasingly more granular in their approach. Data governance is a part of broader IT governance, which is also a part of even broader information governance. The few texts that exist have compounded the confusion by offering a limited defi nition of IG, or sometimes offering a defi nition of IG that is just plain incorrect , often confusing it with simple datat governance. So in this chapter we spell out the differences and include examples in hopes of clarifying what the meaning of each term is and how they are
  • 90. related. Data Governance Data governance involves processes and controls to ensure that information at the data level—raw alphanumeric characters that the organization is gathering and inputting— is true and accurate, and unique (not redundant). It involves data cleansing ( or data scrubbing) to strip out corrupted, inaccurate, or extraneous data and gg de-duplication, to eliminate redundant occurrences of data. Data governance focuses on information quality from the ground up at the lowest or root level, so that subsequent reports, analyses, and conclusions are based on clean, reliable, trusted data (or records) in database tables. Data governance is the most rudi- mentary level at which to implement information governance. Data governance efforts seek to ensure that formal management controls—systems, processes, and accountable employees who are stewards and custodians of the data—are
  • 91. implemented to govern critical data assets to improve data quality and to avoid negative downstream effects of poor data. The biggest negative consequence of poor or inaccurate data is poorly and inaccurately based decisions. 16 INFORMATION GOVERNANCE Data governance is a newer, hybrid quality control discipline that includes elements of data quality, data management, IG policy development, business process improvement, and compliance and risk management. Data Governance Strategy Tips Everyone in an organization wants good-quality data to work with. But it is not so easy to implement a data governance program. First of all, data is at such a low level that executives and board members are typically unaware of the details of the “smoky
  • 92. back room” of data collection: cleansing, normalization, and input. So it is diffi cult to gain an executive sponsor and funding to initiate the effort. 1 And if a data governance program does move forward, there are challenges in getting business users to adhere to new policies. This is a crucial point, since much of the data is being generated by business units. But there are some general guidelines that can help improve a data governance program’s chances for success: ■ Identify a measureable impact. A data governance program must be able to dem- onstrate business value, or it will not get the executive sponsorship and funding it needs to move forward. A readiness assessment should capture the current state of data quality and whether an enterprise or business unit level effort is warranted. Other key issues include: Can the organization save hard costs by implementing data governance? Can it reach more customers or increase revenue generated from existing customers?2
  • 93. ■ Assign accountability for data quality to business units, not IT. Typically, IT has had responsibility for data quality, yet it is mostly not under that department’s con- trol, since most of the data is being generated in the business units. A pointed effort must be made to push responsibility and ownership for data to the busi- ness units that create and use the data. ■ Recognize the uniqueness of data as an asset. Unlike other assets, such as people, factories, equipment, and even cash, data is largely unseen, out of sight, and intangible. It changes daily. It spreads throughout business units. It is copied and deleted. Data growth can spiral out of control, obscuring the data that has true business value. So data has to be treated differently, and its unique qualities must be considered. ■ Forget the past; implement a going-forward strategy. It is a signifi cantly greater
  • 94. task to try to improve data governance across the enterprise for existing data. Remember, you may be trying to fi x decades of bad behavior, mismanagement, and lack of governance. Taking an incremental approach with an eye to the future provides for a clean starting point and can substantially reduce the pain required to implement. A proven best practice is to implement a from-this- point-on strategy where new data governance policies for handling data are implemented beginning on a certain date. Data governance uses techniques like data cleansing and de- duplication to improve data quality and reduce redundancies. INFORMATION GOVERNANCE, IT GOVERNANCE, DATA GOVERNANCE 17 Good data governance ensures that downstream negative effects of poor data
  • 95. are avoided and that subsequent reports, analyses, and conclusions are based on reliable, trusted data. ■ Manage the change. Educate, educate, educate. People must be trained to under- stand why the data governance program is being implemented and how it will benefi t the business. The new policies represent a cultural change, and people need supportive program messages and training in order to make the shift. 3 IT Governance IT governance is the primary way that stakeholders can ensure that investments in IT create business value and contribute toward meeting business objectives.4 This strategic align- ment of IT with the business is challenging yet essential. IT governance programs go further and aim to “improve IT performance, deliver optimum business value and ensure regulatory compliance.” 5
  • 96. Although the CIO typically has line responsibility for implementing IT gover- nance, the CEO and board of directors must receive reports and updates to discharge their responsibilities for IT governance and to see that the program is functioning well and providing business benefi ts. Typically, in past decades, board members did not get involved in overseeing IT governance. But today it is a critical and unavoidable responsibility. According to the IT Governance Institute’s Board Briefi ng on IT Governance , “IT governance is the re- sponsibility of the board of directors and executive management. It is an integral part of enterprise governance and consists of the leadership and organizational structures and processes that ensure that the organization’s IT sustains and extends the organiza- tion’s strategies and objectives.” 6 The focus is on the actual software development and maintenance activities of the IT department or function, and IT governance efforts focus on
  • 97. making IT effi cient and effective. That means minimizing costs by following proven software develop- ment methodologies and best practices, principles of data governance and information quality, and project management best practices while aligning IT efforts with the busi- ness objectives of the organization. IT Governance Frameworks Several IT governance frameworks can be used as a guide to implementing an IT governance program. (They are introduced in this chapter in a cursory way; detailed discussions of them are best suited to books focused solely on IT governance.) IT governance seeks to align business objectives with IT strategy to deliver business value. 18 INFORMATION GOVERNANCE
  • 98. Although frameworks and guidance like CobiT® and ITIL have been widely adopted, there is no absolute standard IT governance framework; the combination that works best for an organization depends on business factors, corporate culture, IT maturity, and staffi ng capability. The level of implementation of these frameworks will also vary by organization. CobiT® CobiT (Control Objectives for Information and related Technology) is a process-T based IT governance framework that represents a consensus of experts worldwide. Codeveloped by the IT Governance Institute and ISACA (previously known as the Information Systems Audit and Control Association), CobiT addresses business risks, control requirements, compliance, and technical issues. 7 CobiT offers IT controls that: ■ Cut IT risks while gaining business value from IT under an
  • 99. umbrella of a glob- ally accepted framework. ■ Assist in meeting regulatory compliance requirements. ■ Utilize a structured approach for improved reporting and management deci- sion making. ■ Provide solutions to control assessments and project implementations to im- prove IT and information asset control. 8 CobiT consists of detailed descriptions of processes required in IT and also tools to measure progress toward maturity of the IT governance program. It is industry agnostic and can be applied across all vertical industry sectors, and it continues to be revised and refi ned. 9 CobiT is broken out into three basic organizational levels and their responsibili- ties: (1) board of directors and executive management; (2) IT and business manage-
  • 100. ment; and (3) line-level governance, and security and control knowledge workers. 10 The CobiT model draws on the traditional “plan, build, run, monitor” paradigm of traditional IT management, only with variations in semantics. The CobiT framework is divided into four IT domains—(1) plan and organize, (2) acquire and implement, (3) deliver and support, and (4) monitor and evaluate—which contain 34 IT processes and 210 control objectives. Specifi c goals and metrics are assigned, and responsibilities and accountabilities are delineated. The CobiT framework maps to the international information security standard, ISO 17799, and is also compatible with IT Infrastructure Library (ITIL) and other y “accepted practices” in IT development and operations.11 ValIT® ValIT is a newer value-oriented framework that is compatible with and complemen- tary to CobiT. Its principles and best practices focus is on
  • 101. leveraging IT investments to gain maximum value. Forty key ValIT essential management practices (analogous to CobiT’s control objectives) support three main processes: value governance, portfolio management, and investment management. ValIT and CobiT “provide a full frame- work and supporting tool set” to help managers develop policies to manage business risks and deliver business value while addressing technical issues and meeting control objectives in a structured, methodic way. 12 INFORMATION GOVERNANCE, IT GOVERNANCE, DATA GOVERNANCE 19 ITIL ITIL (Information Technology Infrastructure Library) is a set of process-oriented best practices and guidance originally developed in the United Kingdom to standard- ize delivery of IT service management. ITIL is applicable to both the private and
  • 102. public sectors and is the “most widely accepted approach to IT service management in the world.”13 As with other IT governance frameworks, ITIL provides essential guidance for delivering business value through IT, and it “provides guidance to or- ganizations on how to use IT as a tool to facilitate business change, transformation and growth.”14 ITIL best practices form the foundation for ISO/IEC 20000 (previously BS15000), the International Service Management Standard for organizational certifi cation and compliance. 15 ITIL 2011 is the latest revision (as of this printing), and it consists of fi ve core published volumes that map the IT service cycle in a systematic way: 1. ITIL Service Strategy 2. ITIL Service Design 3. ITIL Service Transition 4. ITIL Service Operation 5. ITIL Continual Service Improvement 16
  • 103. ISO 38500 ISO/IEC 38500:2008 is an international standard that provides high-level principles and guidance for senior executives and directors, and those advising them, for the effective and effi cient use of IT. 17 Based primarily on AS 8015, the Australian IT gov- ernance standard, it “applies to the governance of management processes” that are performed at the IT service level, but the guidance assists executives in monitoring IT and ethically discharging their duties with respect to legal and regulatory compliance of IT activities. The ISO 38500 standard comprises three main sections: 1. Scope, Application and Objectives 2. Framework for Good Corporate Governance of IT 3. Guidance for Corporate Governance of IT CobiT is process-oriented and has been widely adopted as an IT governance framework. ValIT is value-oriented and compatible and complementary with
  • 104. CobiT, yet focuses on value delivery. ITIL is the “most widely accepted approach to IT service management in the world.” 20 INFORMATION GOVERNANCE It is largely derived from AS 8015, the guiding principles of which were: ■ Establish responsibilities ■ Plan to best support the organization ■ Acquire validly ■ Ensure performance when required ■ Ensure conformance with rules ■ Ensure respect for human factors The standard also has relationships with other major ISO standards, and embraces the same methods and approaches. 18 Information Governance
  • 105. Corporate governance is the highest level of governance in an organization, and a key aspect of it is IG. IG processes are higher level than the details of IT governance and much higher than data governance, but both data and IT governance can be (and should be) a part of an overall IG program. The IG approach to governance focuses not on detailed IT or data capture and quality processes but rather on controlling the information that is generated by IT and offi ce systems. d IG efforts seek to manage and control information assets to lower risk, ensure com- pliance with regulations, and improve information quality and accessibility while imple- menting information security measures to protect and preserve information that has busi- ness value.19 (See Chapter 1 for more detailed defi nitions.) Impact of a Successful IG Program When making the business case for IG and articulating its benefi ts, it is useful to focus
  • 106. on its central impact. Putting cost-benefi t numbers to this may be diffi cult, unless you ISO 38500 is an international standard that provides high- level principles and guidance for senior executives and directors responsible for IT governance. IG is how an organization maintains security, complies with regulations and laws, and meets ethical standards when managing information. INFORMATION GOVERNANCE, IT GOVERNANCE, DATA GOVERNANCE 21 also consider the worst-case scenario of loss or misuse of corporate or agency records. What is losing the next big lawsuit worth? How much are confi dential merger and acquisition documents worth? How much are customer records worth? Frequently, executives and managers do not understand the value of IG until it is a crisis, an ex-
  • 107. pensive legal battle is lost, heavy fi nes are imposed for noncompliance, or executives go to jail. There are some key outputs from implementing an IG program. A successful IG program should enable organizations to: ■ Use common terms across the enterprise. This means that departments must agree on how they are going to classify document types, which requires a cross- functional effort. With common enterprise terms, searches for information are more productive and complete. This normalization process begins with developing a standardized corporate taxonomy, which defi nes the terms (and substitute terms in a custom corporate thesaurus), document types, and their relationships in a hierarchy. ■ Map information creation and usage. This effort can be buttressed with the use of technology tools such as data loss prevention , which can be
  • 108. used to discover the fl ow of information within and outside of the enterprise. You must fi rst determine who is accessing which information when and where it is going. Then you can monitor and analyze these information fl ows. The goal is to stop the erosion or misuse of information assets and to stem data breaches with moni- toring and security technology. ■ Obtain “information confi dence” —that is, the assurance that information has ” integrity, validity, accuracy, and quality; this means being able to prove that the information is reliable and that its access, use, and storage meet compliance and legal demands. ■ Harvest and leverage information. Using techniques and tools like data min- ing and business intelligence, new insights may be gained that provide an enterprise with a sustainable competitive advantage over the long term,
  • 109. since managers will have more and better information as a basis for busi- ness decisions.21 Summing Up the Differences IG consists of the overarching polices and processes to optimize and leverage informa- tion while keeping it secure and meeting legal and privacy obligations in alignment with stated organizational business objectives. IT governance consists of following established frameworks and best practices to gain the most leverage and benefi t out of IT investments and support accomplishment of business objectives. Data governance consists of the processes, methods, and techniques to ensure that data is of high quality, reliable, and unique (not duplicated), so that downstream uses in reports and databases are more trusted and accurate.
  • 110. 22 INFORMATION GOVERNANCE Notes 1. “New Trends and Best Practices for Data Governance Success,” SeachDataManagement.com eBook, http://viewer.media.bitpipe.com/1216309501_94/1288990195_9 46/Talend_sDM_SO_32247_EB- ook_1104.pdf, accessed March 11, 2013. 2. Ibid. 3. Ibid. 4. M.N. Kooper, R. Maes, and E.E.O. RoosLindgreen, “On the Governance of Information: Introducing a New Concept of Governance to Support the Management of Information,” International Journal of Information Management 31 (2011): 195–120, http://dl.acm.org/citation.cfm?id=2297895 . (accessed t November 14, 2013). 5. Nick Robinson, “The Many Faces of IT Governance: Crafting an IT Governance Architecture,” ISACA Journal 1 (2007), www.isaca.org/Journal/Past-
  • 111. Issues/2007/Volume-1/Pages/The-Many-Faces-l of-IT-Governance-Crafting-an-IT-Governance-Architecture.aspx 6. Bryn Phillips, “IT Governance for CEOs and Members of the Board,” 2012, p.18. 7. Ibid., p.26. 8. IBM Global Business Services/Public Sector, “Control Objectives for Information and related Tech- nology (CobiT®) Internationally Accepted Gold Standard for IT Controls & Governance,” http:// www-304.ibm.com/industries/publicsector/fi leserve?contentid=187551(accessed March 11, 2013). CHAPTER SUMMARY: KEY POINTS ■ Data governance uses techniques like data cleansing and de-duplication to improve data quality and reduce redundancies. ■ Good data governance ensures that downstream negative effects of poor data are avoided and that subsequent reports, analyses, and conclusions are based on reliable, trusted data.
  • 112. ■ IT governance seeks to align business objectives with IT strategy to deliver business value. ■ CobiT is processoriented and has been widely adopted as an IT governance framework. ValIT is valueoriented and compatible and complementary with CobiT yet focuses on value delivery. ■ The CobiT framework maps to the international information security stan- dard ISO 17799 and is also compatible with ITIL (IT Infrastructure Library). ■ ITIL is the “most widely accepted approach to IT service management in the world.” ■ ISO 38500 is an international standard that provides high- level principles and guidance for senior executives and directors responsible for IT governance.
  • 113. ■ Information governance is how an organization maintains security, complies with regulations and laws, and meets ethical standards when managing information. http://viewer.media.bitpipe.com/1216309501_94/1288990195_9 46/Talend_sDM_SO_32247_EB-ook_1104.pdf http://viewer.media.bitpipe.com/1216309501_94/1288990195_9 46/Talend_sDM_SO_32247_EB-ook_1104.pdf http://viewer.media.bitpipe.com/1216309501_94/1288990195_9 46/Talend_sDM_SO_32247_EB-ook_1104.pdf http://dl.acm.org/citation.cfm?id=2297895 http://www.isaca.org/Journal/Past-Issues/2007/Volume- 1/Pages/The-Many-Faces-of-IT-Governance-Crafting-an-IT- Governance-Architecture.aspx http://www.isaca.org/Journal/Past-Issues/2007/Volume- 1/Pages/The-Many-Faces-of-IT-Governance-Crafting-an-IT- Governance-Architecture.aspx http://www.isaca.org/Journal/Past-Issues/2007/Volume- 1/Pages/The-Many-Faces-of-IT-Governance-Crafting-an-IT- Governance-Architecture.aspx http://www- 304.ibm.com/industries/publicsector/fileserve?contentid=18755 1
  • 114. http://www- 304.ibm.com/industries/publicsector/fileserve?contentid=18755 1 INFORMATION GOVERNANCE, IT GOVERNANCE, DATA GOVERNANCE 23 9. Phillips, “IT Governance for CEOs and Members of the Board.” 10. IBM Global Business Services/Public Sector, “Control Objectives for Information and related Tech- nology (CobiT®) Internationally Accepted Gold Standard for IT Controls & Governance.” 11. Ibid. 12. Ibid. 13. www.itil-offi cialsite.com/ (accessed March 12, 2013). 14. ITIL, “What Is ITIL?” www.itil-offi cialsite.com/AboutITIL/WhatisITIL.aspx(accessed March 12, 2013). 15. Ibid. 16. Ibid. 17. “ISO/IEC 38500:2008 “Corporate Governance of Information Technology” www.iso.org/iso/