Chapter 7
Leveraging Information Asset Management Standards and Approaches

In the mid-1990s, MIT’s Media Lab founder Nicholas Negroponte introduced the metaphor of our collective shift from “processing atoms to processing bits” as a means of explaining the transition to a digital economy. However, we shouldn’t dismiss everything we learned about processing physical things as we immerse ourselves in all things digital, particularly how to manage them effectively.

We have already examined the barriers to managing information in the enterprise and how to leverage physical supply chains as a model for managing the information supply chain. In this chapter, we will explore the management of other corporate assets to build an approach to information asset management. Yes, we data professionals have really just been improvising for decades.

One of the key issues for chief data officers and those tasked with managing information as an asset is the lack of standards for information. In fact, the only standard related to information management is in the mouthful: “ISO/IEC 27001 Information technology—Security techniques—Information security management systems—Requirements,”1 Currently, this is the only widely accepted international standard which deals at all with managing information.2 The standard calls for the inventorying of all kinds of assets, including documenting their classification, owner, usage rules, labeling, control, and handling guidelines.3

Sure, the Institute of Electrical and Electronics Engineers (IEEE) has standards for information technology, the North Atlantic Treaty Organization (NATO) and the United Nations (UN) have standards for information sharing among military organizations and countries, various multinational industry associations such as the World Bank and the International Astronomical Union and have developed regulations for information sharing among member organizations, and various countries alone or together have laws and regulations for information handling. But as for a comprehensive, enterprise approach to managing information, there exists no agreed upon standard.

A Bevy of Non-Standard Information Management Standards

Several associations, collaborative open standards groups, and professional services organizations and industry luminaries have succeeded to various degrees in filling the gap with their own information management-related methodologies or other tools. These include the Capability Maturity Model Integration (CMMI), Data Management Association International (DAMA), Enterprise Data Management (EDM) Council, Experience Matters, Cicero Group, MIKE2.0, Accenture, CapGemini, Deloitte, EY, IBM, KPMG, Wipro, John Ladley, Rob Hillard, and William McKnight. As well, IT research organizations including Gartner publish a large body of research and consultative guidance on information management trends and best practices.4

Each of these bodies of knowledge, approaches, resources, and tools has its unique uses and benefits for information management leaders and professionals. Yet, most of them tend to be lacking in adoption, completeness, integration, and/or usability. Usually these challenges are by design. For example: research organizations are not in the “methodology business”; DAMA and CMMI are strictly focused on methodology maturity; and systems integrators generally do not publish their approaches for competitive and compensatory reasons. And as for accreditation, the ICCP and DAMA offer data management professional certifications, although they are neither widely recognized nor often required.

We’re well into the Information Age, and we have been managing electronic information for at least fifty years. Most business models and much of the world is flipping to digital, and in the last ten years many of the most successful companies have monetized information more than they have monetized products and services. Still, most organizations have their IT department (or worse, various business units themselves) managing their information as less of an asset than their technology, and without any generally accepted, enforceable standards.

Across the information realm, however, are other close neighbors such as the specialties of IT asset management, IT service management, records management, content management, knowledge management, and even library science. Each of these fields includes standards and procedures worthy of consideration, as we look to better manage information as an actual asset. In the next chapter, we’ll weave these best practices into an approach for improving EIM maturity across the seven dimensions described in chapter 5.

An IT Asset Management Eye-Opener

Recently, I attended an IT asset management conference and had a chance to speak with several attendees about their approaches to managing their company’s various software and hardware assets. To my surprise, not only are there entire departments in some companies just for tracking who has which corporate laptops and mobile devices, but there’s a whole industry around software solutions and best practices for inventorying, tracking, monitoring, and servicing—along with managing the vendors and contracts—for all manner of technology stuff.

First, there’s an entire family of International Organization for Standardization (ISO) standards for IT asset management (ITAM):

  • ISO 19770–1 is a process defining best practices for software asset management (SAM) in an organization,
  • ISO 19770–2 is an XML standard for inventorying and identifying what software is deployed on a given device,
  • ISO 19770–3 is a schema describing the entitlements and rights associated with a software license, including how to measure the license and entitlement consumption, and
  • ISO 19770–4 is a standard for reporting on resource utilization.

These processes and standards educate end users on compliance, help budget managers make technology redeployment decisions, provide IT service departments with guidance on warranty and other service information, and offer procedures on invoice and IT asset inventory level information for finance departments.5

Now, substitute the phrase “information asset” for “technology” or “IT asset.” Do information management departments or leaders have a global standard for information best practices? Do they have any kind of inventory standard for information assets? Do they have a standard way to document the contractual rights and privileges for information usage, or to track them (other than for information security or privacy regulations)? Is there a recognized standard for reporting on information utilization? At best, the answer to any of these is: hardly.

Now, ask yourself: which is more critical to an organization, the customer information or the hardware upon which it resides? It’s no wonder why the ITAM conference attendees I met were dumbfounded when I mentioned no such standards or procedures exist for the management of information assets.

I’m not suggesting at all that IT/infrastructure/technology isn’t important, only that there’s a whole lot that we info-folks can learn and perhaps steal from the impressive discipline around managing it.

IT Service Management—Servicing Information Needs?

A close cousin of ITAM is IT service management (ITSM), a discipline dealing with aligning IT services with the needs of the business. A set of processes, procedures and other tools known as the Information Technology Infrastructure Library (ITIL) is the prevailing standard for IT service management.67

ITIL currently specifies twenty-six processes grouped into five high-level areas:

  1. ITIL Service Strategy: understanding organizational objectives and customer needs.
  2. ITIL Service Design: turning the service strategy into a plan for delivering the business objectives.
  3. ITIL Service Transition: developing and improving capabilities for introducing new services into supported environments.
  4. ITIL Service Operation: managing services in supported environments.
  5. ITIL Continual Service Improvement: achieving incremental and large-scale services improvements.

Imagine if there were such a library of standards and procedures for information management. Or even in advance of one, what if CDOs borrowed liberally from the ITIL cookbook to establish similar approaches for their own organization: a discipline dealing with aligning information services with the needs of the business. Such an “information management library” could include:

  • An Information Service Strategy process that identifies business demand for information, a catalog of information assets, a set of user profiles, patterns of information creation and usage, budgeting and charging for information access, and an operations approach for fulfilling information needs/requests and resolving information service failures.
  • An Information Services Design for a catalog of information assets and services, service level agreements (SLAs) among users and providers of information and information services, and the management of information capacity and throughput, continuity, and supplier/provider management.
  • An Information Service Transition process to ensure information services supports continual and periodic changes to information availability, demand, and needed information service components.
  • Information Service Operations to ensure information demand and delivery are constantly monitored, and that requests, incidents, and problems related to information assets and their required facilities and technical components are managed effectively.
  • An Information Service Continual Service Improvement process for monitoring, reviewing, and evaluating ongoing information service needs, and learning from past successes and failures.

It’s well beyond the scope of this book, but I’d be really impressed with anyone who took the initiative to adapt and adopt ITIL for an information services organization! But wait, we have several other asset management approaches yet to examine and learn from.

Records Management—From Hard Copies to Hardened Practices

Records information management (RIM) is a mysterious function within many organizations that quietly goes about its business of preserving and safeguarding the organization’s institutional memory. Often RIM is part of a broader governance, risk, and compliance (GRC) function under the auspices of the legal department, not IT. Although RIM’s heredity is in moving about boxes of files among offices and storage facilities, the discipline has kept up with the times. It now includes the management of electronic records as well.

The current ISO standard for RIM, ISO 15489–1:2016, defines records as “information created, received, and maintained as evidence and information by an organization or person, in pursuance of legal obligations or in the transaction of business.”89 The standard describes concepts and principles relating to:

  • Records, metadata for records, and record systems,
  • Policies, assigned responsibilities, monitoring, and training in support of effective records management,
  • Recurrent analysis of business context and identifying records requirements,
  • Records controls, and
  • Processing for creating, capturing, and managing records.10

Even with a somewhat dated set of vernacular, this standard seems like an excellent framework for a set of data governance policies and procedures. Invariably, however, data governance programs are designed from scratch, based on someone else’s data governance program, or leaning on a specific practitioner’s book or methodology, enhanced with a smattering of best and emerging practices from magazine articles and analyst organization research reports.

RIM standards also introduce some concepts seldom seen well documented at all in data governance programs, such as that of a defensible solution—one which can be supported with clearly documented policies, processes, and procedures. One defensible solution I see only occasionally in information management policies and practices is that of “defensible disposition” or “defensible destruction” of records, which defines explicitly which records to destroy/dispose of, by whom, where, and when. Another well-defined RIM concept that would be useful in architecting and articulating an information lifecycle is classifying records as “active,” “inactive,” or “semi-current,” along with their disposition or other handling requirements.

RIM standards are meticulous about defining a record’s lifecycle—from creation, through its storage, modification, conversion, movement, circulation, retrieval, and destruction. RIM discriminates different classes of records with different properties and legal status. RIM professionals themselves can become formally certified via the Institute of Certified Records Managers and other societies, and even can obtain a master’s degree in archives and records administration from various universities around the world. Surely this is a sound basis on which to build information asset management practices, standards and accreditation, right?

Contending Approaches for Content Management

Enterprise Content Management (ECM) is a discipline for “the strategies, methods and tools used to capture, manage, store, preserve, and deliver content and documents related to organizational processes.”11 In this way, ECM is more workflow-oriented that RIM. Gartner’s definition also incorporates the creation, discovery, and usage analysis of content, and its graphical depiction of ECM includes “return on information” at the center.12 Often the main discriminator between ECM and EIM is a simple artificial one: unstructured versus structured information. Yet they remain almost entirely distinct disciplines with distinct departments and distinct technologies.

Also, within the family of ECM are intersecting, overlapping, and sometimes conflicting disciplines of: Document Management, Digital Asset Management (DAM), and Web Content Management (WCM). Vendors rather than standards bodies tend to drive most of the accepted or expected capabilities and processes.

Because ECM and EIM are closely related, requiring some of the same basic methodological approaches, there may not be much we can borrow from ECM. However, some unique concepts and focus areas from these disciplines CDOs might consider incorporating into their overall information management approach include:13

  • Specifications concerning the capture or entry and validation of content,
  • Storing content in an optimal format/structure,
  • Content classification,
  • Content findability, searchability, and discovery,
  • Digital rights and digital signatures,
  • Content as a service,
  • Content versioning and derivatives, and
  • Collaboration among users in terms of: 1) document workflows and 2) joint content creation and editing.

Very few CDOs also oversee content management, but in the realm of overall enterprise information management, it makes sense that they should. And I believe they will in the coming years. As the founder and CEO of one content management vendor suggested to me, “Other than the different technologies involved and a few unique workflow considerations, data and content management are more like ‘brothers from another mother.’” It might make sense they live under the same roof.

Knowledge Management Know-How

Knowledge is a deadly friend when no-one sets the rules. The fate of all mankind, I see, is in the hands of fools.

Peter John Sinfield, King Crimson

More than two decades after release of the album In the Court of the Crimson King, rules around compiling and deploying institutional knowledge began to coalesce. Knowledge Management (KM) became a more formalized discipline in the early 1990s, but still sufferers from an unwieldy number of differing definitions. Most center on the identification, capture, structuring, value, sharing, and deployment of an organization’s intellectual assets to enhance its performance and competitiveness. Knowledge assets are segregated into explicit and tacit knowledge. As such, KM is quite human-centered compared to asset management disciplines and draws upon a number of diverse fields, from cognitive science to anthropology to web and document management technologies:1415

Information leaders such as CDOs would be well advised to leverage much of what KM offers in the way of:

  • Adapting and dealing with new and exceptional situations in establishing a vision for EIM, including scenario planning,
  • Developing, communicating, and sharing an EIM vision to transmit an “information culture,”
  • Collaborating across other areas of the organization, including IT, business, finance, legal, etc.,
  • Identifying, capturing, codifying, and sharing expertise as part of defining the information management organization and associated roles (including other resources spread throughout the enterprise),
  • Developing, implementing, and improving repeatable, experience-based information asset management methods, and
  • Transferring and incorporating knowledge/information assets into business products and services.

CDOs would also benefit by adopting certain KM technologies such as work-flow management, and groupware for capturing and disseminating knowledge.

What’s on the Library Science Shelf?

Closing the book, as it were, on formal approaches to other information-related management disciplines, is that of library science, or library and information science (LIS).

Although a French librarian, Gabriel Naudé, published the earliest known text on library operations in 1627, a Bavarian librarian named Martin Schrettinger coined the discipline in the early 1800s with his work, Versuch eines vollständigen Lehrbuchs der Bibliothek-Wissenschaft oder Anleitung zur vollkommenen Geschäftsführung eines Bibliothekars.16 Oddly, Schrettinger opted to organize his library not by topic, but in alphabetical order.

OK, maybe there’s not a lot we can learn from old Schrettinger himself.17 However, many of Naudé’s principles endure, and are instructive to information professionals even today. In Naudé’s first chapter of his book, Advis pour dresser une bibliothèque, he poses and answers the question: Why create a library? His answer suggests he believed there to be no greater honor than collecting human knowledge and sharing it. Naudé goes on to define a plan which includes inspecting the catalogs of other libraries. He advises that the first books curated ought to be those highly regarded books by highly regarded practitioners in a particular field, and they ought to be collected in their original languages to avoid meanings being lost in translation. He also writes that select interpretations or commentaries should be included, that every book has a reader no matter how obscure the topic, and that multiple copies of popular books should be considered. As for arranging the library, he quoted Cicero: “It is order that gives light to memory,” suggesting books should be organized by key subjects and subcategories. Additionally, Naudé offered guidance on bookbinding techniques.18

Any information professional will recognize several key principles in Naudé’s Advice which could be readily adopted as part of a vision and strategy for information asset management, such as:

  • There is no greater asset than information (if you think your office furniture, laptops, or other equipment are of greater importance, then you’re a 17th century and a 21st century laggard),
  • Learn what information assets are collected and compiled by competitors and others,
  • Focus on the most important information first,
  • Collect information from respected (high quality) sources,
  • Capture raw, original (not transformed) data when possible,
  • Include available commentaries (i.e., metadata) on information,
  • Recognize that all information has potential and probable value to someone or some process,
  • Ensure the availability for high-demand information assets,
  • Organize information assets in ways they are easy to locate, and nearby other information assets of similar topic interest, and
  • Ensure the protection and preservation of information assets.

Today, the leading LIS governing body is the International Federation of Library Associations and Institutions (IFLA), whose principles include:

  • The promotion of high standards for the provision and delivery of library information services,
  • Encouraging widespread understanding of the value of good library and information services, and
  • Endorsing the principles of freedom of access to information, and the con viction that the delivery of high-quality LIS helps guarantee that access.

Over the past couple of decades LIS has been transformed by the digital age. The IFLA has developed and published conceptual models and digital formats for bibliographic encoding and sharing, and for resource descriptions. Additionally, it offers dozens of formal guidelines on the handling and storage of various media, content curation and sharing, a growing range of library services, ensuring easy resource accessibility for multiple types of user communities, artifact digitization and preservation, and overall operations.19 Many of these guidelines, no doubt, would offer CDOs and other information professionals fascinating insights and useful ideas to bring into the information asset management fold.

Balance Sheet Assets and Other Major Proto-Assets

Now let’s get away from the world of IT and information to expand our exploration of asset management concepts into other areas.

Physical Asset Management—Living in a Material World

On the spectrum of assets (or things that should qualify as assets), physical assets and information assets, no doubt, are at opposite ends. Physical assets are as tangible as assets get, while information is of course intangible. Still, just as with other IT and information-related standards and practices, we can learn much from accepted physical asset management approaches—the primary one of which is PAS 55 (the basis for ISO 55001).

The Publicly Available Specification (PAS) was first published in 2004 in response to demand for a standard for asset management. It’s applicable in any organization in which physical assets are central to the business, especially transportation, mining, and energy companies. Increasingly, PAS has relevance for any organization managing operational technology (OT)—devices and equipment differentiated from but often integrated or communicating with information technologies.

Quoted benefits from these implementations range from “it provided a structured basis for coordinating all our efforts into a common, business-prioritized direction,” to very substantial bottom-line performance gains. China Light & Power, for example, report a 90 percent reduction in system outages, while meeting a 20 percent growth in demand and, simultaneously, reducing customer charging tariffs by 40 percent.20

PAS 55 is structured around the Plan-Do-Check-Act cycle of continual improvement, and it introduces a number of essential “enablers and controls” to ensure alignment, integration, and sustainability of efficient and effective asset management activities.

PAS answers five key questions:

  1. What assets do you have?
  2. What is your risk of an asset-related disaster?
  3. Do you know the current condition of your assets?
  4. What are the costs of corrective versus preventative maintenance?
  5. Should you repair or replace any given asset?

Shouldn’t any CDO or data governance lead have the answers to these at hand regarding the organization’s information assets? Are there any who do?

Many of these questions are difficult to answer without a framework—and this is where PAS 55 comes into play.

The adoption and sponsorship at the highest levels of many organizations is the primary reason for the success of PAS 55. Leadership sees it as the means to reduce capital investments and operational costs while improving the uptime of key assets. The executive support it garners also helps those maintaining assets to meet their commitments, even when they may conflict with other imperatives.

An Asset Register

Much like ITAM does for IT assets, PAS requires a reliable and comprehensive physical asset register which includes where assets are located and their condition. So in today’s Information Age, why would any organization think about foregoing a register of its information assets? Yet PAS even goes a couple steps further, requiring that asset failure risks are recorded, and an accounting of asset depreciation and replacement. The former is certainly applicable to information assets: What is the impact if a product Universal Product Code (UPC) or SKU is wrong? Even the depreciation and replacement of information could also be a consideration: What is the value of our aging customer database, and should we maintain it ourselves or license updates from a data broker?

Gartner analyst Alan Duncan writes about the state of data cataloging:

“To monetize internal and external business data, chief data officers must learn lessons from traditional asset management disciplines. By using an information catalog properly, CDOs can develop and expand a data-driven culture and derive new value from their organization’s information assets.”21

Duncan cites several challenges with, and inhibitors to organizations being successful with cataloging information assets:

  • Classic attempts at cataloging data have been technically focused and are poorly aligned with business outcomes.
  • Exogenous datasets are becoming increasingly important sources of business insight, at the same time as the overall complexity of business data is overwhelming human analysts.
  • Organizations are often unclear about the extent of their data holdings, or what that data could be used for. Business opportunity is thereby lost, and data-driven innovation inhibited.
  • The semantic meaning of data is poorly understood and poorly communicated. Inconsistency arises, contentions occur, and time is wasted on reconciliation, rather than focusing on new business actions.
  • The ability to track causal relationships between business data, analytic outputs, and business outcomes is still immature. Diagnostic root-cause analysis is time-consuming and can be applied inconsistently.22

Interestingly, PAS 55 addresses most of these issues in relation to physical assets, but with approaches that could and should be adapted to information asset.

Asset Risks

Certain kinds of physical risks as well as information risks are as unacceptable as they are preventable. But when there is a maintenance backlog, as there often is with data quality, how do you know which information assets should be maintained first to mitigate risk and avoid catastrophe? Fortunately, PAS 55 provides an approach to determining this.

With PAS, asset categories are established and each asset category is risk-weighted, ranked, and scored. Doing so with information assets would enable data stewards to assign and schedule priorities, establish budgets, and better align resources for their mitigation.

Asset Condition

Just as with physical asset–intensive industries, the overall performance in information-intensive industries is based on the performance of those assets. When those assets are not performing, your organization is either not driving revenue, or is leaking cash or customers or partners. To account for this, PAS 55 offers a comprehensive approach for evaluating asset condition which consider the history of inspections, repairs, and maintenance. For physical assets, Enterprise Asset Management (EAM) systems will generate recommended actions for inspecting, repairing, maintaining, or replacing assets. There’s no good reason today why we don’t see similar kinds of functionality available for information assets—other than perhaps that the accounting profession has us believing that information assets are not really assets.

Many ERP systems see assets as a single unit. Similarly, most data governance applications see information assets (e.g., datasets) as a single unit. One of the key differentiators for EAM systems is the use of an asset hierarchy. As the relationships among information assets in an organization are often quite complex or even convoluted, an EAM-like solution would certainly help in documenting, understanding, and leveraging these relationships—at a minimum from a maintenance perspective.

Asset Maintenance and Replacement Costs

In the physical asset world, fixing something broken can be two-to-three times more expensive than the cost of maintaining it.23 Balancing the costs of preventative versus reactive work on an asset can be difficult. Other costs that PAS accounts for include the cost of replacing a failed part or the cost of an unplanned outage. As with other assets, information assets are especially prone to letting quality problems flow downstream. Information maintenance (quality) costs can be a barrier to ensuring the best long-term maintenance strategy.

Maybe this is just the nature of information we’ve come to accept: it flows, carrying its detritus along with it for the next department to deal with. A preferable strategy and approach—such as those embodied in PAS—would offer rational, quantitative guidance to CDOs and data governance/quality leads, and ensure overall data quality costs are minimized while the operational and analytical effectiveness of information is maximized.

PAS methods could also be used to make fiscally reasoned decisions about maintaining and repairing certain information assets, versus sourcing them elsewhere. Many organizations today struggle with whether and when to rely upon certain open data sources, license data from data brokers, or enter into partnerships in which information assets are exchanged.

However, since PAS 55 is just a framework, various software vendors offer EAM systems to automate the underlying foundation for this process. Although several data governance software vendors like Collibra, Informatica, SAP, and Global IDs support some PAS framework-like considerations for information assets, both the discipline of data governance and data stew-ardship would benefit from becoming more PAS-like in process and EAM-like in automation.

As Gartner analyst and operational technology (OT) expert Kristian Steenstrup said: “PAS is sort of like ‘religion in a box.’ All the parts are there and it’s useful if you don’t already have a religion.”24 Perhaps it’s time for CDOs, other information leaders, and senior executives to get the same kind of religion about managing their information assets.

An Investment in Financial Asset Management Methods

With all the media attention and political hand-wringing about banking and financial industry regulatory compliance, surprisingly few standards exist for the management of financial assets within an organization. Certainly there are wealth managers, stock brokers, and financial advisors who are held to various established standards and may require certain training and certification. But these roles do not offer much guidance for managing an organization’s own information assets with improved rigor.

As a capital investment executive with a major global financial services company confided,

I look at the engineers we work with on deals. They have all sorts of codified standards, but we don’t have the same kind of defined procedures in the investment world. I wish we did. We have developed our own internal procedures, but they’re not auditable at all, and make collaboration with other parties involved in a deal quite inefficient. Even worse, they’re not even the same across different groups within our own company.25

Another investment executive, Bruce Weininger, a principal with Kovitz Investment, acknowledged that even as an investment firm, more than half of his time is spent managing information assets: “The financial assets themselves, without other information assets, don’t mean much. I spend more time on issues related to gathering and processing nonfinancial information about our clients than dealing with their financial assets in a vacuum.”

Even lacking formal processes, two key items we can consider instructive from the world of finance are those of a fiduciary, and the common, if not regulated, financial management roles and responsibilities of the CFO.

Fiduciary Responsibility

A fiduciary is an individual who knowingly accepts the responsibility to act in the best interest and for the benefit of another party whose assets he or she is managing. A fiduciary’s duties are both ethical and legal. Moreover, fiduciaries cannot benefit personally from their management of the other party’s assets. Fiduciaries come in the form of: corporate board members and shareholders, executors, guardians, lawyers, and investment companies. Some types of fiduciaries are certified, but all have an explicit or implied contract with another party.

Back in information-land we talk about and assign data “owners” and “stewards” and “custodians,” but it never seems to include anyone with contractual legal and ethical responsibilities for the management of information assets. I have long advised clients that their data stewards also take on the role of advocates wherein they assume responsibility for improving the enablement and value generated from information assets. But the idea of a true “information fiduciary” (or “trustee”) could help elevate the status of information assets and their caretakers (e.g., CDOs).

The Chief Financial Officer

CFOs need little introduction, but the full scope of their role may not be all that familiar. Moreover, the role introduces a few levels of executive responsibility over the organization’s financial assets that CDOs should be assuming for their organization’s information assets. These include:

  • Controllership— CFOs must provide accurate, timely reporting on the financial status of the organization. Similarly, CDOs should be compelled to report to the board on the health of the enterprise’s information assets.
  • Treasury Duties— Just as CFOs decide how to invest the company’s money, a CDO should be leading or guiding decisions on how best to leverage the company’s information.
  • Economic Strategy— CFOs must financially model the business, taking advantage of available internal and external information. The CDO should be an active participant in this process, helping to identify, curate, and analyze available information and other leading indicators.

Other integral CFO responsibilities include managing budgets and cash flow, measuring the company’s liabilities, managing relationships with the financial community (e.g., investors, financial analysts, shareholders), and raising capital. In parallel, CDOs should be chartered with managing information availability and flow, identifying information-borne risks, managing relationships with other information ecosystem participants, and identifying and assimilating needed exogenous information sources.

Human Capital Management

As I mentioned in the previous chapter, people are not assets because we can no longer be owned. (Score one for humanity at the expense of accounting.) Still, labor is expensed on the income statement, and the discipline of human capital has emerged to manage us as if we were assets. If you think I’m kidding, see the 619-page People Capability Maturity Model (P-CMM). It’s longer than any of these other standards (other than SCOR), because well, I guess people and organizations are more difficult to manage than most other things.

The P-CMM, fi rst released in 1995, is advertised as “a tool to help you successfully address the critical people issues in your organization… [and] guides organizations in improving their processes for managing and developing their workforce.” As one of Software Engineering Institute’s many capability maturity models, it is more assessment-oriented than methodological.

Oriented toward the chief resource officer (CRO) or chief human resource officer (CHRO) and their organizations, the P-CMM contains guidance on:

  • Developing and implementing human capital strategies and plans,
  • Managing and developing workforces,
  • Nurturing teams,
  • Transforming organizational culture,
  • Guiding organizational changes (e.g., downsizing, mergers and acquisitions, changes in ownership, etc.),
  • Managing individual development and growth,
  • Managing knowledge assets,
  • Improving workforce practices,
  • Motivating individuals,
  • Improving retention, and
  • Dealing with changing demographics, labor markets, and other external workforce issues.

Similarly a robust information management process should include strategies and plans, “nurture” information assets, help to transform the organization, enable organizational changes, improve the acquisition and retention of business, and respond to a changing landscape of externally available information sources.

As with the Gartner Information Management Maturity Model, the P-CMM’s maturity levels parallel a stepwise improvement in planning, competencies, collaboration, and performance. The P-CMM (Figure 7.1), however, includes ten principles upon which the model is based, which are worth calling out:26

Figure 7.1 People Capability Maturity Model

Figure 7.1 People Capability Maturity Model

Not to poke fun at these philosophies, but rather embrace them—if we were to substitute “information” for “workforce” and do a little tweaking, we can construct a similar set of philosophies for information management:

  1. In mature organizations, information capability is directly related to business performance.
  2. Information capability is a competitive issue and a source of strategic advantage.
  3. Information capability must be defined in relation to the organization’s strategic objectives.
  4. Knowledge-intensive work shifts the focus from job elements to information competencies.
  5. Capability can be measured and improved at multiple levels of enterprise information, including at a record level, a dataset level, information competencies, and the entire portfolio of information assets.
  6. An organization should invest in improving the information-related capabilities that are critical to its core competency as a business.
  7. Information leadership (e.g., the CDO) is responsible for the capability of the information assets.
  8. The improvement of information capabilities can be pursued as a process composed from proven practices and procedures.
  9. The organization is responsible for providing opportunities to use information, and business people are responsible for taking advantage of them.
  10. Because technologies and business models evolve rapidly, organizations must continually evolve their information management practices and competencies.

Other Intangible Assets

Finally, let’s examine one last class of asset: intangibles. Increasingly we compete in a marketplace of ideas. These ideas manifest not in tangible things like hardware or equipment, but in things you can’t hold in your hand, like knowledge, designs, patents, processes, trademarks, domains, copyrights, trade secrets, and even brand. And yes, information.

However, certain intangibles, intellectual property (IP), are recognized as formal assets and property, while others are not. Those most formal which you might find explicitly or rolled-up on a balance sheet include patents, trademarks, and copyrights. Lawyers have long sought to help their clients in protecting IP, but over the past couple of decades an entire industry has cropped up around valuing, licensing, and advising companies on how to manage their IP.

Paul Adams, CEO of Everedge, a New Zealand-based firm that provides such services, told me, “When we talk about IP, most execs are only thinking about valuing and licensing their patents and trademarks. They struggle to realize their larger portfolio of intellectual assets, including their data, is a massive trove of value.” Adams’s firm focuses on measuring that value to better position its clients for business transactions or risk mitigation, managing the IP to reduce costs and risks, and helping them identify and develop markets for it.

However, Everedge and other IP specialists like Ocean Tomo and a division of Thomson Reuters (which claims to manage more than 20 million IP assets worldwide),27 keep their methods and models close to the vest. Yes, these processes are their IP. Unfortunately however, in the vast majority of organizations, the responsibility for IP is foisted upon the legal staff who typically are not involved in IP planning. As a result, IP tends to be managed in silos rather than as an enterprise portfolio.28

Software exists for tracking and valuing and licensing IP, but a comprehensive, standardized approach does not exist. Harvard Law professors William W. Fisher III and Felix Oberholzer-Gee, however, have detailed five IP management techniques for the strategic management of IP, which include:

  • Exercising market power by protecting or not disclosing IP as a means to thwart competition and enable differential pricing of your related products or services,
  • Selling the IP to generate immediate income from it,
  • Licensing the IP to generate an ongoing revenue stream,
  • Collaborating with partners or customers, enabling them to leverage the IP for mutual benefit, and
  • Donating the IP, which may seem counterintuitive, but placing IP in the public domain can restrict competitors from protecting related IP they may subsequently develop.

But these sound more like ways to monetize IP than manage it, don’t they? Such is the state of IP management.

A Unified Approach to Information Asset Management

We’ve taken a protracted journey through the worlds of supply chains and ecosystems, various IT processes and standards, physical, financial, and intangible asset management approaches, and even library science. But not just for fun. These well-honed industry-standard methodologies, capability models, and standards and checklists offer tremendous new precepts for how to manage information, no longer as a byproduct or resource or some ephemeral, nebulous artifact of business, but rather as an actual asset. In the next chapter, I will extract the juicy bits and pull it all together into a manifesto for information asset management.

Notes

1 Part of a body of 40-plus ISO27k standards related to information technology security techniques.

2 ISO 8000, a body of standards dealing with data quality and master data management, has been under development for almost a decade without significant support or adoption.

3 Ironically, ISO/IEC 27001 calls for the responsibility of ascertaining the value of the information with a view to securing it, without providing any guidance on how to perform such a valuation.

4 Other frameworks such as the Control Objectives for Information and Related Technologies (COBIT), The Open Group Architecture Framework (TOGAF), the Committee of Sponsoring Organizations of the Treadway Commission (COSO), and the Business Information Services Library (BiSL) also include some processes related to information.

5 Gartner software asset management analyst, Victoria Barber, indicates that adoption of these standards is low, particularly by software vendors who are key to the standard’s success. (ref: email to author 14 December 2016).

6 G.S. Priyadharshini, “ITIL: Key Concepts and Summary,” Simplilearn.com, 10 February 2013, www.simplilearn.com/itil-key-concepts-and-summary-article.

7 Another IT service management standard, ISO/IEC 20000, was developed to reflect best practice guidance from within the ITIL.

8 “ISO 15489–1: 2016, Information and Documentation—Records Management—Part 1: Concepts and Principles,” iso.org, accessed 09 February 2017, www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=62542.

9 Similarly, ISO 30300:2011 defines terms and definitions applicable to the standards on management systems for records (MSR).

10 “ISO 15489–1: 2016(en), Information and Documentation—Records Management—Part 1: Concepts and Principles,” iso.org, accessed 09 February 2017, www.iso.org/obp/ui/#iso:std:iso:15489:-1:ed-2:v1:en.

11 “What Is Enterprise Content Management (ECM)?,” aiim.org, accessed 09 February 2017, www.aiim.org/What-is-ECM-Enterprise-Content-Management.

12 “Enterprise Content Management (ECM),” Gartner IT Glossary, accessed 09 February 2017, www.gartner.com/it-glossary/enterprise-content-management-ecm/.

13 AIIM, the ECM3 collaborative, Gartner, and others offer maturity models, best practices publications, and other methodological guidance on ECM.

14 “Introduction to Knowledge Management,” MIT Press, accessed 09 February 2017, https://mitpress.mit.edu/sites/default/files/titles/content/9780262015080_sch_0001.pdf.

15 Note that Knowledge Centered Support (KCS) is a service delivery methodology that focuses on knowledge as a key asset of the organization. It has gained traction in some service desks. Its dynamic model for how to identifies and codify knowledge assets could prove useful in an information asset context.

16 “Schrettinger, Martin,” Deutsche Biographie, accessed 09 February 2017, www.deutsche-biographie.de/sfz79181.html.

17 Michael Buckland, “Information Schools: A Monk, Library Science, and the Information Age,” Manuscript for Humboldt University Students’ Book Project: Bibliothekswissenschaft—quo vadis? = Library Science—Quo vadis? ed. by Petra Hauke. Munich: K. G. Saur, 2005, pp. 19–32. Revised 12 June 2005, http://people.ischool.berkeley.edu/~buckland/huminfo.pdf.

18 Gabriel Naudé, Advice on Establishing a Library (translation of Advis pour dresser une bibliothèque) (Berkeley: University of California Press, Westport, CT: Greenwood Press, 1976 reprint).

19 “Current IFLA Standards,” IFLA.org, accessed 09 February 2017, www.ifla.org/node/8750.

20 “PAS 55, Publicly Available Specification for the Optimal Management of Physical Assets,” assetmanagementstandards.com, accessed 09 February 2017, www.assetmanagementstandards.com/pas-55/.

21 Alan D. Duncan, Douglas Laney, and Guido De Simony, “How Chief Data Officers Can Use an Information Catalog to Maximize Business Value From Information Assets,” Gartner, 06 May 2016, www.gartner.com/document/3310017.

22 Ibid.

23 Kristian Steenstrup, email to author, 21 December 2016.

24 Kristian Steenstrup, email to author, 19 December 2016.

25 Capital Investment Executive (Anonymous), interview with author, 23 December 2016.

26 Bill Curtis, Sally A. Miller, and William E. Hefley, “People Capability Maturity Model (P-CMM) Version 2.0,” Software Engineering Institute, Carnegie Mellon University, accessed 09 February 2017, http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=5329.

27 “Thompson IP Manager,” thompsonipmanagement.com, accessed 09 February 2017, http://ipscience.thomsonreuters.com/product/thomson-ip-manager.

28 William W. Fisher III, and Felix Oberholzer-Gee, “Strategic Management of Intellectual Property: An Integrated Approach,” California Management Review, Volume 55, No. 4, 2013, pp. 157–183, www.hbs.edu/faculty/Publication%20Files/CMR5504_10_Fisher_III_7bbf941f-fe1b-4069-a609-9c6cd9a8783b.pdf.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.219.22.107