Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Data Governance:: A conceptual framework in order to prevent your Data Lake from becoming a Data Swamp
2015 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Information Security nowadays is becoming a very popular subject of discussion among both academics and organizations. Proper Data Governance is the first step to an effective Information Security policy. As a consequence, more and more organizations are now switching their approach to data, considering them as assets, in order to get as much value as possible out of it. Living in an IT-driven world makes a lot of researchers to approach Data Governance by borrowing IT Governance frameworks.The aim of this thesis is to contribute to this research by doing an Action Research in a big Financial Institution in the Netherlands that is currently releasing a Data Lake where all the data will be gathered and stored in a secure way. During this research a framework on implementing a proper Data Governance into the Data Lake is introduced.The results were promising and indicate that under specific circumstances, this framework could be very beneficial not only for this specific institution, but for every organisation that would like to avoid confusions and apply Data Governance into their tasks.

Place, publisher, year, edition, pages
2015. , 45 p.
Keyword [en]
Social Behaviour Law, Data Governance, Data Lake, Standards, Policies, Business, Risk and Compliance, IBM tooling, Hadoop. Data Integration Layer (DIL), Data Quality, Scrum, Agile Methods.
Keyword [sv]
Samhälls-, beteendevetenskap, juridik
Identifiers
URN: urn:nbn:se:ltu:diva-46602Local ID: 438a3487-e940-490f-94aa-5ca90e7dcf60OAI: oai:DiVA.org:ltu-46602DiVA: diva2:1019917
Subject / course
Student thesis, at least 30 credits
Educational program
Information Security, master's level
Examiners
Note
Validerat; 20151222 (global_studentproject_submitter)Available from: 2016-10-04 Created: 2016-10-04Bibliographically approved

Open Access in DiVA

fulltext(1303 kB)327 downloads
File information
File name FULLTEXT02.pdfFile size 1303 kBChecksum SHA-512
b2e7385e8ffb4661860bcd7c5f860229cd3e20a7f0399f48613bcf129e8658c84786cc947b768e94aa2b293657e2df5b2a378cc3d08683ba24558141a128ba48
Type fulltextMimetype application/pdf

Search outside of DiVA

GoogleGoogle Scholar
Total: 327 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 408 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf