Index

A

ABA (American Bar Association), and digital signatures, 228

Abdulmutallab, Umar Farouk, 72–74

AbiliTec, Acxiom, 439

abstract MDM-Star models, for multidomain MDM, 190–191

Access Certification, 223

access control

Access Certification in, 223

biometrics for, 232

data-at-rest protection, 249–251

groups and roles, 260–262

MDM roadmap view for, 306

overview of, 259–260

perimeter security and, 217

physical, 218

Roles-Based Access Control, 262–264

SSO for, 233–235

Access Control Lists (ACLs), 261

account-centric-to-customer-centric transformations

Customer Data Integration and, 15–16

and customer identifiers, 365–366

evolution of MDM architecture, 27–29, 81

key benefits of, 23

account numbers

bulk statistical testing challenges, 383–384

challenges of managing master data, 10

in customer-centric view, 365–366

as entity identifiers, 365

as identity attribute candidates, 334

information protection architecture for, 257

test data protection by obfuscation of, 388

account takeover, identity theft, 211

account types, impact on project scope, 318

accountability, as business requirement, 220

ACLs (Access Control Lists), 261

Activity Manager (AM), Siperian Hub, 435

Acxiom MDM, 439

address-alias libraries, 348

AddressAbility, Acxiom, 439

addresses

data matching requirements/solutions, 350

false negatives in party matching, 333

false positives in party matching, 332

as identity attribute, 334

using address-alias libraries, 348

Adjustment application, 391

administration

matching engine, 159

MDM reducing costs/inefficiencies in, 35

MDM requirements, 390–393

security management with user, 220

affinity clusters, 12

aggregation

of entity information, 160–162

project scope impacted by levels of, 318–319

agile data governance, 421

agile enterprise architecture, 44–45

airlines

drivers of MDM, 67–68

relationship data critical to, 357

ALE (annualized loss expectancy), quantitative risk analysis, 197

algorithms

approach to record matching, 157–158

encryption, 226

aliases

data matching and, 350

similarity libraries for, 348

AM (Activity Manager), Siperian Hub, 435

American Bar Association (ABA), and digital signatures, 228

American Recovery and Reinvestment Act (ARRA), 8, 50

AML (Anti-Money Laundering) provision, USA Patriot Act

MDM detecting and preventing fraud, 22

overview of, 206–207

using MDM to comply with, 8

Analytical MDM

3NF modeling not best choice for, 169

bottom-up estimation of MDM impact using, 290–291

Data Hub usage style and, 302

data modeling requirement, 186–187

data zones and, 126

definitions of, 21, 36

information value of Data Hub data in, 138

Master Data Governance for data quality in, 407–408

star schema modeling design supporting, 172

summary of, 442

as use pattern for MDM data, 102–103

annualized loss expectancy (ALE), quantitative risk analysis, 197

annualized rate of occurrence (ARO), quantitative risk analysis, 197

anonymous data

data-integration challenges, 46

popular techniques for, 389

test data protection challenges, 388–389

Anti-Phishing Working Group (APWG), 211

APIs (application programming interfaces), and Web Services, 93

application layers, designing MDM, 389–393

application programming interfaces (APIs), and Web Services, 93

application servers, 394

application transparency, data-at-rest security, 250, 251

applications

data protection, 247

impact on project scope, 320

layered security model, 216

MDM roadmap views for, 299, 301

security of, 217

security technologies, 230–233

APWG (Anti-Phishing Working Group), 211

architecture

choosing Data Hub style, 320–325

definition of, 79–80

evolution of, 81–84

importance of, 78

philosophy and principles of, 84–89

references, 109

roadmap view for Data Hub and data ownership, 302–303

technical implications of data security/privacy regulations on, 213–214

architecture, data management

data governance, 114–116

in Data Hub. See Data Hub, data management in

data quality, 117–120

data stewardship and ownership, 116–117

data strategy, 112

guiding principles of information architecture, 112–114

overview of, 111–112

references, 138

architecture, for entity resolution

aggregation entity resolution, 160–162

Data Hub keys and life-cycle management services, 162–165

entity recognition, matching, and unique identifiers, 155–156

key services and capabilities, 151–152

matching and linking services/techniques, 156–160

MDM reference architecture, 152–155

overview of, 150–151

references, 165

architecture viewpoints

Design and Deployment classification, 99–102

Information Scope or Data Domain dimension, 103

overview of, 89–90

reference architecture viewpoint, 105–109

reference data and hierarchy management, 103–105

references, 109

services architecture. See services architecture viewpoint

Use Pattern dimension, 102–103

archival services, 372, 374

ARO (annualized rate of occurrence), quantitative risk analysis, 197

ARRA (American Recovery and Reinvestment Act), 8

ARRA (American Recovery and Reinvestment Act) of 2009, 50

artifacts, Project Initiation phase, 326

asymmetric (public) key encryption, 226

asymmetric relationships, 359–360

asynchronous messages, and Web Services, 93

Attribute Locator service, MDM Data Hub, 135, 321

attribute match

binary rule for, 343–344

defining rules for, 341–342

for entity identification, 333–339

quantification, 342

score for, 344

attribute survivorship rules

processing data change in Data Hub based on, 407

Registry-style Data Hub applying, 100, 127

source system attributes contributing to canonical model using, 184

template defining, 352

attributes

business challenges of MDM, 11

Data Hub phased implementation of, 325

history needs for data modeling, 177

impacting project scope, 319

attrition rates, MDM reducing customer, 31–32

auditing

as business requirement, 220

as data synchronization component, 374

enabling for data governance, 116

use case scenario, 372

authentication

in access control, 259–260

biometrics-based, 232

as business requirement, 218

data-at-rest protection, 249–251

data-in-transit protection, 248–249

digital signature, 228

integrated conceptual security/visibility architecture, 277–278

integrating authorization and, 233–235

mechanisms for, 231

multifactor technologies got, 231–233

network, 217

perimeter, 217

personalization, privacy and, 233

smart card, 232–233

VPN, 229

Web Services concerns, 235

Authoring services, MDM, 390–391

authorization

as business requirement, 219

data-at-rest protection, 249–251

integrated conceptual security/visibility architecture, 277–278

integrating authentication and, 233–235

network, 217

perimeter, 217

using groups and roles for, 260–262

automatic merges, avoiding, 161–162

availability

as business requirement, 220

data security and, 246

as discriminating attribute, 336

B

B2B (business-to-business) commerce, MDM applications by industry airline, 67–68

financial services, banking, and insurance, 57–60

healthcare services, 61–63

hospitality and gaming, 63–64

manufacturing, 64–65

overview of, 57

pharmaceutical, 66–67

retail sales, 68–69

shipping, 67

software publishing, 65–66

telecommunications, 60–61

B2B (business-to-business) organizations Party or Customer requirement for, 142

Product domain challenges, 19

Web Services and, 93

B2C (business-to-consumer), MDM applications by industry airline, 67–68

financial services, banking, and insurance, 57–60

healthcare services, 61–63

hospitality and gaming, 63–64

manufacturing, 64–65

overview of, 57

pharmaceutical, 66–67

in public sector, 69–74

retail sales, 68–69

shipping, 67

software publishing, 65–66

telecommunications, 60–61

B2C (business-to-consumer) organizations, Party/Customer requirement, 55, 142

backdoor Trojans, 241

banking services

driving MDM in commercial sector, 58–60

risk management. See risk management for master data

banking Trojans, 241

Basel II Capital Accord

data protection and privacy regulations of, 48

for operational and credit risks, 201

overview of, 208

using MDM for compliance with, 7–8, 21

Basel III Accord, 208

batch matching mode, 340

behavioral biometrics, 232

benchmark development process, data quality, 407

BGM (Bipartite Graph Matching), 348, 437

BI (Business Intelligence) tools

delivering customer information to, 32

EDW solutions supporting, 83

Master Data Consumption zone providing data for, 124–125

using Analytical MDM, 102

bidirectional synchronization flows, 129, 131

Big Bang deployment, 395

Bill of Materials (BOM), and MDM, 65, 84

binary rule, attribute and record matches, 343

biometrics, 71, 232

biotechnology companies, driving MDM in pharmaceuticals, 65–66

block-level encryption, for data-at-rest, 250

BOM (Bill of Materials), and MDM, 65, 84

border protection agencies, driving MDM, 71–74

botnet worms, 241

bottom-up estimation, 289

BPM (Business Process Management), 12, 117

BRE (business rules engine), 130–132

break groups, and performance, 346–347

bulk statistical analysis testing, data quality, 383–385

business and operational drivers of MDM

business development, 29

growing revenue through relationships, 32–33

improving customer experience, 31

improving customer retention/reducing attrition, 31–32

improving customer service time, 33–34

improving marketing effectiveness, 34

overview of, 29–31

reducing administrative costs/inefficiencies, 35

reducing IT maintenance costs, 35

Business Benefits view, MDM roadmap, 299

business case

business processes and MDM drivers, 288–289

business strategy-driven MDM, 286–287

conclusions, 295–296, 307–308

importance of, 285–286

IT strategy-driven MDM, 287

preceding building/buying MDM with strong, 26–27

project failure from lack of justifiable, 446

references, 308–309

requirement of successful MDM initiative, 442–443

roadmap. See roadmap development plan, MDM

what stakeholders want to know, 288

business case, estimating benefits of capability maturity model, 293–295

conclusions, 295

economic value of information, 292–293

overview of, 289

traditional methods for, 289–292

business challenges

customer centricity, 38–39

key challenges, 35–36

overcoming socialization obstacles, 41–42

overview of, 10–12

Product domain, 19

selling MDM inside enterprise, 39–41

senior management commitment/value proposition, 38

Business Incorporation Date, in entity identification, 336–337

Business Intelligence. See BI (Business Intelligence) tools

business metadata, 136

Business Objects, acquisition by SAP, 436

Business Process Management (BPM), 12, 117

business processes, and MDM drivers

development of business case, 288–289

growing revenue by leveraging relationships, 32–33

impacting project scope, 317

improve customer experience, 31

improve customer retention/reducing attrition rates, 31–32

improve customer service time, 33–34

improve marketing effectiveness, 34

overview of, 29–30

reduce IT maintenance costs, 35

reducing administrative costs/inefficiencies, 35

requirements of USA Patriot Act, 206–207

Business Processes layer, MDM reference architecture

Data Hub, 152

high-level services of, 125

overview of, 106

Business QA testing, 382

business requirements

matching algorithms adapting to, 160

overlapping data governance initiative with, 421

business rules engine (BRE), 130–132

business strategy-driven MDM, 286–287, 311

business trust, 225

business units, in integrated risk management, 199–200

business value dimensions, and security, 219

buy over build trend, MDM, 26

C

California’s SB1386

for data security, 243

defined, 201

overview of, 209

canonical data model defined, 119

legacy system message creation and, 373

project initiation and, 319

Capability Maturity Model (CMM)

for data governance, 404

MDM business case estimation, 293–295

cardinality, discriminating attributes having lower, 335

CardSystems Solutions, security breach, 240

CDH (Customer Data Hub), Oracle, 433–434

CDI (Customer Data Integration)

Data Domain dimension, 103

evolution of MDM, 7, 16–18

evolution of MDM architecture, 81

in fight against terrorism, 22

key benefits of, 22–23

overview of, 14–16

summary of, 443

use case example of regulatory compliance, 255–256

centralized metadata repository, 137

certificate authorities, digital certificates, 231

chain of evidence archives, auditing/accountability, 220

chaining, 344–346

challenge-response handshakes, authentication, 231

challenges, MDM

customer centricity, 38–39

data quality, synchronization and integration, 45–47

data visibility, security and regulator compliance, 47–50

global MDM implementations, 51–52

implementation costs and time-to-market concerns, 43–45

overcoming socialization obstacles, 41–42

overview of, 35–38

references, 53

selling MDM inside the enterprise, 39–41

senior management commitment and value proposition, 38

technical, 42–43

change capture, in data synchronization, 374

Change Management server, infrastructure, 394

change transaction, initiated by Data Hub, 372

character sets

approaches to multilingual MDM issues, 350

challenges of multilingual MDM issues, 51–52, 306

Oracle’s Data Quality module for, 433

Children Act 2004, UK, 71

Children’s On-Line Privacy Protection Act (COPPA), 243

choreography, SOA and, 91

CIF (Customer Information File)

evolution of MDM architecture, 82

as precursor to MDM single-customer view, 57

as predecessor to CDI, 17

CIM (Collaborative Information Manager), Tibco, 437

claim-processing systems, MDM enabling, 58

classification dimensions, MDM

architecture viewpoints of, 98–103

overview of, 20–21

summary of, 442

Climbié, Victoria, 71

CMM (Capability Maturity Model)

for data governance, 404

MDM business case estimation, 293–295

Codd, Edgar F., 167–168

Coexistence Hub style, Data Hub

choosing for project, 322–323

loading data, 128–129

overview of, 101

roadmap view for, 302–303

Collaborative Information Manager (CIM), Tibco, 437

Collaborative MDM

Data Hub usage style, 302

defined, 21

summary of, 442

use pattern for MDM data usage, 102–103

combining algorithm, 274

Command Center, Acxiom, 439

commercial sector, MDM in, 57–69

airline industry, 67–68

financial services, banking, and insurance, 57–60

healthcare services ecosystem, 61–63

hospitality and gaming industry, 63–64

manufacturing industry, 64–65

overview of, 57

pharmaceutical industry, 66–67

references, 74–76

retail sales industry, 68–69

shipping industry, 67

software publishing industry, 65–66

telecommunications industry, 60–61

Committee of Sponsoring Organizations of the Treadway Commission (COSO), 209

Committee on Uniform Security Identification Procedures (CUSIP), 59–60

common sense, matching rules for customer records, 342

Communities of Practice approach, marketing effectiveness, 34

compensating transactions, 374–376

Complexity of Cross-Domain Information Sharing, roadmap view, 306

Complexity of Data Security, Visibility, and Access Control Requirements, roadmap view, 306

compliance, as MDM business driver, 29

compliance (legal) risk, 196, 243

compression, 250

Computer Reservation Systems (CRS), airlines, 68

confidentiality

as business requirement, 219

data security and, 246

as emerging requirement, 224–225

technologies supporting, 225–228

Web Services concerns, 235

configuration requirements, MDM, 390–393

consistency of definitions, in metadata, 136

consolidation, MDM market, 430

Consumer Proprietary Network Information (CPNI) regulation, privacy protection, 50

ContactPoint program, 71

contacts, relationship challenges of institutional, 361–362

content protection, secure MDM. See data security

Context Handler component, PDP, 273

contract research organizations (CROs), pharmaceutical industry, 67

control, as MDM business driver, 29

COPPA (Children’s On-Line Privacy Protection Act), 243

Core component, PDP, 273

Core MDM Data Hub, 394

COSO (Committee of Sponsoring Organizations of the Treadway Commission), 209

cost of implementing MDM

basic components, 297–298

bottom-up estimation of business case, 289–292

business case for. See business case

data quality improvement, 118

integrated risk management challenges, 199

overcoming, 43–44

requiring senior management commitment, 38

risk management calculations, 196–197

cost savings of MDM

administrative, 35

IT maintenance, 35

overview of, 21

costs, security breach, 240

country attribute, in entity identification, 338

country-specific plug-ins, for data matching, 350

CPNI (Consumer Proprietary Network Information) regulation, privacy protection, 50

credentials, authentication, 259–260

credit card fraud, 211, 239–240

CRM (Customer Relationship Management)

EDW supporting, 83

evolution of MDM architecture, 84

Master Data Consumption zone providing data to, 124–125

MDM growth and customer centricity vs., 27–28

as predecessor to CDI, 18

CROs (contract research organizations), pharmaceutical industry, 67

cross-domain information sharing, MDM roadmap view for, 306

Cross-Reference Record Locator, 372, 378

CRS (Computer Reservation Systems), airlines, 68

CRUD (Create, Read, Update and Delete) operations

Data Management layer supporting, 106–107, 153

Entity Resolution and Life-Cycle Management services supporting, 153–154

CRUD (Create, Read, Update and Delete)

ERM designed for, 254

Master Data Authoring designed for, 391

master data modeling styles supporting, 189–190

CRUDE (Create, Read, Update, Delete, Execute) authorization, 261

cryptanalysis, 226

cryptography, 226

cryptology, 226

CUSIP (Committee on Uniform Security Identification Procedures), 59–60

custom hierarchies, entity groupings and, 148

customer affiliation information, 334

customer centricity. See also account-centric-to-customer-centric transformations

business challenges of implementing MDM, 38–39

evolution of MDM architecture, 7, 27–29, 81

party-centric model supporting, 329

time, resources and cost of, 39

Customer Data Hub (CDH), Oracle, 433–434

Customer Data Integration. See CDI (Customer Data Integration)

customer-focused MDM, 22

Customer Group, 361–362

customer identification. See also entity identification

break groups and performance, 346–347

creating and protecting test data, 388

defining matching rules for customer records, 341–344

effect of chaining, 344–346

matching modes, 340–341

minimum data requirements, 339–340

similarity libraries and fuzzy logic for attribute comparisons, 348

use case with Reconciliation Engine, 369–372

use case with Transaction Hub, 372–373

Customer Information File. See CIF (Customer Information File)

Customer Master, 14

Customer MDM, 14

customer on-boarding, 58

Customer/Party domain 360-degree view of customer. See 360-degree view of customer

complexity of merge operation for, 353

as Customer domain. See Customer/Party domain

customer identifiers, 365–366

defined, 142

developing direct relationships with individual, 355–357

developing relationships with individuals, 355–358

dominating enterprise MDM, 142, 443–444, 450

EDW solutions supporting, 83

entity identification in, 329–330

entity recognition, matching, and unique identifiers, 155–156

ERM use case of regulatory compliance, 255–256

evolution of MDM architecture, 81

as focus of B2C or G2C, 55

matching and linking entities in, 149, 156–160

MDM in retail sales, 68–69

merging entities in, 351–354

Oracle’s MDM products for, 433–434

recognizing individuals, groups and relationships in, 142–145

Registry architectural style for, 100

relationship challenges of institutional customers, 361–364

splitting entities in, 354–355

symmetric vs. asymmetric relationships, 358–359

Tibco’s investments in, 437

use of term in this book, 142

Customer Relationship Management. See CRM (Customer Relationship Management)

customer relationships, entity identification

as identity attribute, 334

record qualification attribute, 338–339

customer risk, 198

customer touch points, impacting project scope, 318

customers

data-integration challenges, 46

fraud protection for, 48

growing revenue by leveraging relationships with, 32–33

improving data accuracy, 35

improving experience of, 31

improving retention/decreasing attrition of, 31–32

improving service time, 33–34

D

D&B (Dun and Bradstreet) Purisma MDM, 438–439

data acquisition, Data Hub architecture, 128

data aggregation, impacting project scope, 318–319

data-at-rest defined, 248

protection of, 249–251

solution considerations, 251–252

data attributes. See attributes

data-centric view of MDM architecture, 107–108

data-cleansing tools, 118–119, 435

Data Definition Language (DDL), 190

data delivery

benefits of integrated risk management, 199

distribution of reference data, 132–133

hierarchy management and, 133–134

Master Data Consumption zone concerns, 124–125

using EII services, 138

data domain-specific models, multidomain MDM, 190

data domains. See domains

Data Domains, Entities, and High-Level

Data Model view, MDM roadmap, 299–300

data enrichment processing, batch processing, 378

data entry validation, legacy systems, 373

data governance. See also MDG (Master data governance)

agile, 421

business requirements overlapping with, 421

creating more focused and efficient, 421–423

Data Governance Institute framework, 403

data quality, information theory approach, 411–417

data quality, management, 405–407

data quality, policies, 409–410

data quality, processes, 407–408

data quality, quantifying, 410–411

definitions of, 114–115, 400–401

IBM Data Governance Council framework, 403–404

information quality metrics, 410

integrated risk management with, 199

introduction and history of, 399–400

matching algorithm metrics used in, 417–421

Mike2.0 framework, 402–403

overview of, 399

project failure from insufficient, 447

reference code reconciliation, 185

references, 423–425

roadmap views, 304–305, 307

rules for rejecting changes from Data Hub, 372

steps in applying, 115–116

for successful MDM initiative, 443

Data Governance Board, Mike2.0 framework, 402

Data Governance Institute (DGI), 114, 400, 403

Data Hub

applying data governance to, 115–116

applying SOA principles to, 95–96

architectural change resulting from, 187

architectural styles, 100–102

architectural styles, choosing in project initiation, 320–326

customer-focused, 14–15

ETL processing in, 377–378

Key Generation service, 163

Oracle’s products for, 433–434

overview of, 80

phased implementation of, 325–326

Product domain challenges, 20, 395–397

Record Locator service, 164–165

reference architecture, 151–152

as service platform, 154–155

SOA misconceptions and, 97–98

source system entities and attributes stored in, 183–184

use case scenario with Reconciliation Engine, 369–372

Data Hub Architecture and Data Ownership

Style view, MDM roadmap, 302–303

Data Hub, data management in business rules engine, 130–132

data delivery and metadata concerns, 132–137

data synchronization, 129–130

data zone architecture, 120–126

enterprise information challenges, 111–112

Enterprise Information Integration and integrated data views, 138

loading data into Data Hub, 127–129

Operational/Analytical MDM and data zones, 126–127

overview of, 120

references, 138

Data Hub Usage Style view, MDM roadmap, 302

data-in-transit, 248–249

data inventory and classification program, 244

data lineage, metadata clarifying, 136

Data Management layer, MDM reference

architecture

Data Hub, 152

entity resolution and, 152–153

high-level services of, 125

overview of, 106–107

requirements for, 390–393

Data Manipulation Language (DML), abstract MDM-Star model, 190–191

data masking, for data-at-rest, 250

data matching. See matching

data-model-agnostic products, Data Hub, 396

The Data Model Resource Book (Silverston), 319

data modeler, 163, 167–168

data models

adding non-identity attributes, 178

for arbitrary complex relationships, 146–147

creating MDM-Star schema, 178–179

defining attribute history needs/versioning, 177

defining entity domains, 176

defining entity resolution for master domains, 176

defining identity attributes, 176

hierarchies, 181–182

importance of, 167–168

landing and staging areas, 185

mapping to source systems, 183–184

for master data consumption, 185

MDM roadmap view for high-level, 299–300

overview of, 175

product approaches to Data Hub, 395–397

project failure from choosing poorly from, 447

of reference data, 182

references, 192

relationships, 180–181

styles, 168–174, 188–191

data obfuscation/masking procedures, 245

data ownership

Data Hub Architecture and Data Ownership MDM roadmap view, 302–303

data stewardship and, 116–117

integrated risk management and total cost of, 199

MDM roadmap view for, 302

data-parsing and standardization tools, 119

data profiling

for data accuracy at source, 119

metrics for data quality improvement, 410–411

WebSphere ProfileStage tool for, 433

data providers, 123

data quality

challenges of MDM at business level, 11–12

data steward’s role in, 116–117

data testing for, 383

enabling with MDM, 7, 22

MDM architecture and, 85, 117–118

MDM roadmap view for, 305

ordering master data to improve, 6

reducing administrative process costs, 35

technical challenges of, 45–46

technologies, 18, 83

tools and technologies, 119–120

Data Quality layer, MDM reference architecture

Data Hub, 152

entity resolution and, 153

high-level services of, 125

overview of, 106–107

Data Quality module, Oracle/Siebel’s MDM, 433

Data Quality Suite, Informatica, 435

data quality, through data governance

existing approaches to quantify, 410–412

information theory approach to, 412–417

management, 405–407

metrics for, 410

overview of, 115

policies for, 409–410

processes, 407–408

use of matching algorithm metrics, 417–420

data redundancy, burden and costs of, 168

Data Rules layer, MDM reference architecture

Data Hub, 152

entity resolution and, 153

high-level services of, 125

overview of, 106–107

data security

for data-at-rest, 249–252

for data-in-transit, 248–249

defined, 245

enterprise rights management and, 252–257

evolution of, 239–240

information security emerging threats, 240–242

layered framework for, 246–248

MDM roadmap view for complexity of, 306

MDM technology trends, 452

overview of, 245–246

references, 257

regulatory drivers of, 242–243

risks of compromise, 243–244

technical implications of regulations, 244–245

for test data, 388

using MDM to comply with, 8

data sources

Data Hub content acquired from, 128

MDM roadmap view for third-party, 301

Source Systems zone of Data Hub and, 122–123

data stewardship integrated risk management and, 199

Mike2.0 framework, 402

overview of, 116–117

data strategy, managing

data governance, 114–116

data quality, 117–118

data quality tools and technologies, 119–120

data stewardship and ownership, 116–117

overview of, 112

principles of information architecture, 112–114

data synchronization

batch processing using ETL for, 376–379

in context of MDM Data Hub, 129–130

exceptions processing and, 379–381

goals of, 367–368

real-time/near real-time components for, 373–376

Reconciliation Engine style and, 101, 128, 369–372

technical challenges of, 45

Transaction Hub style and, 372–373

data types

data-at-rest security, 250

as technical challenge of MDM, 38

data validation. See validation

data visibility

challenges, 268–269

entitlements and, 267–271

MDM roadmap view for complexity of, 306

MDM technology trends, 452

for policy decision and enforcement, 273–274

RBAC limitations, 264

security architecture requirements, 278–280

security services integrated with, 272–273, 274–278

as technical challenge of MDM, 47–50

XACML-based implementations and, 274

Data Volumes and Performance

Considerations, MDM roadmap view, 303

data warehousing

history in retail chain operations, 68

implementing MDM with focus of enabling, 36

MDM data modeling requirements, 185–187

MDM hierarchy management and, 104–105

MDM-Star schema and, 188

project scope and aggregation in, 318–319

Data Zone architecture

distribution of reference data and, 132–133

ESB zone, 125

ETL/Acquisition zone, 123–124

hierarchy management and, 133–134

Hub Services zone, 124

loose coupling in, 122

mapping Data Hub service to data zones, 129

Master Data Consumption zone, 124–125

MDM SOA reference architecture, 125–126

Operational and Analytical MDM and, 126–127

overview of, 120–122

Source Systems zone, 122–123

Third-Party Data Provider zone, 123

Database Administrator (DBA), 393–394

database servers, building infrastructure, 394

DataFlux Integration Server, SAS, 437

DataFlux, SAS, 436–437

Date of Birth (DOB) attribute, in entity identification, 335–337

DBA (Database Administrator), 393–394

DDL (Data Definition Language), 190

DDoS (Distributed Denial-of-Service), 241

DEA (Drug Enforcement Administration), 63

debit card fraud, 239–240

Decommissioning of Systems and Applications, roadmap view, 301

decryption, for anonymization of data, 389

dedicated port, HTTPS, 229

defense-in-depth, layered security framework, 246–248

delta processing mode, data acquisition, 128–129

demilitarized zone (DMZ), perimeter security, 246

Deming, Edward, 422–423

denial-of-service (DOS) attacks, on Web Services, 236

Deny Override algorithm, 274

Department of Social Services, using MDM, 70–71

deployment options, 395

Deployment Strategy view, MDM roadmap, 303–304

depth of interactivity, socialization challenge of MDM, 42

derivatives, MDM and securities master, 59–60

description orientation, SOA, 91

Design and Deployment classification

architectural implications, 99

defined, 20

External Reference style, 100

Reconciliation Engine style, 101

Registry style, 100–101

summary of, 442

Transaction Hub style, 101–102

deterministic algorithms, record matching, 157

Deterministic ETL, insufficiency of, 36

deterministic outcome, matching and linking services, 159

dfPowerStudio, SAS DataFlux, 437

DGI (Data Governance Institute), 114, 400, 403

Diffie, Whitfield, 226–227

digital certificates, 231

digital identities, 222–223, 227–228

Digital Rights Management (DRM), 242, 253

digital signatures, 227–228

dimension modeling, 173–174

direct relationships, 355–358

direct trust, 225

discriminating attributes defined, 333

defining matching rules for records, 341

disqualifying similar records using, 335–337

Distributed Denial-of-Service (DDoS), 241

distributed metadata repository, 137

Distributed Query Constructor, synchronization, 375

distribution channels, driving MDM in manufacturing, 65

DML (Data Manipulation Language), abstract MDM-Star model, 190–191

DMZ (demilitarized zone), perimeter security, 246

DNC (Do Not Call) legislation

overview of, 212–213

privacy protection, 49–50

protection of customer privacy, 201

Do Not Call. See DNC (Do Not Call)

legislation

DOB (Date of Birth) attribute, in entity identification, 335–337

document authentication, digital signatures, 228

domains

associated with master entities, 6

common master data, 7

Customer. See Customer/Party domain

customer-focused. See CDI (Customer Data Integration)

data modeling styles supporting multidomain MDM, 188–191

dominating enterprise MDM, 450

in early stages of MDM, 7

layered security, 216

MDM roadmap views for, 299–300, 306

Party. See Party domain

Product domain. See Product domain

of retail store, 68

of scope, 316–317

systems of records for given, 5

domestic identifiers attribute, entity identification, 338

DoS (denial-of-service) attacks, on Web Services, 236

DRM (Data Relationship Management) tool, Oracle, 434

DRM (Digital Rights Management), 242, 253

Drug Enforcement Administration (DEA), 63

DSF product, Acxiom, 439

dual threshold capabilities, 344, 349

Dun and Bradstreet (D&B) Purisma MDM, 438–439

DUNS number, D&B, 438

duplicate records, in data quality problems, 418

E

e-mail

data-in-transit security considerations, 249

as online identity attribute, 334

ease of use, 159

Eastern Europe, challenges of MDM, 51

Economic Value Added (EVA), 289

Economic Value estimation. See EV (Economic Value) estimation

ecosystem, MDM, 313–315

edge, Small World theory, 169–170

EDW (Enterprise Data Warehouse)

in evolution of MDM architecture, 83

hierarchy management and, 134

history of retail chains using, 68

as precursor to MDM single-customer view, 57

as predecessor to CDI, 17

EHRs (Electronic Health Records), 62–63

EIA (enterprise information architecture), 112–114

EII (Enterprise Information Integration)

evolution of MDM architecture, 84

overview of, 138

as predecessor to CDI, 18

Electronic Health Records (EHRs), 62–63

Electronic Medical Record (EMR), 62

Electronic Personal Health Record (ePHR), 62

electronic signature legislation, 220

EMB (Enterprise Message Bus), 369–372

EMPI (Enterprise Master Patient Index), 62, 305

employees

in bottom-up estimation of business case, 291–292

MDM roadmap view for resources and skills, 307

project failure and, 447

EMR (Electronic Medical Record), 62

Enabling Technologies: ETL, SOA, and ESB, MDM roadmap view, 307

encapsulation, Web Services, 92

encryption

anonymization of data using, 389

cryptography, cryptology and cryptanalysis, 226

data-at-rest security, 249–251

data-in-transit security, 248–249

data security, 245

digital certificate authentication, 231

network security, 217

symmetric vs. asymmetric key, 226–227

VPNs using, 229

end-to-end security

for integrated security and visibility, 274–278

overview of, 217

SSL providing, 230

enrollment, in biometrics, 232

enterprise architecture framework

data strategy for, 112–120

introduction to, 86–88

mapping SOA to viewpoints of, 91–92

Mike2.0, 403

not necessary to craft MDM with, 89

what MDM stakeholders want to know, 288

Enterprise Attribute Locator, synchronization, 375

enterprise data modeling, 167–170

enterprise data strategy. See data strategy, managing

Enterprise Data Warehouse. See EDW (Enterprise Data Warehouse)

enterprise information architecture (EIA), 112–114

Enterprise Information Integration. See EII (Enterprise Information Integration)

Enterprise Master Patient Index (EMPI), 62, 305

Enterprise Message Bus (EMB), 369–372

Enterprise Record Locator

batch processing mode, 378

data synchronization, 374–375

use case scenario, 372

Enterprise Resource Planning (ERP) market, 436

Enterprise Rights Management. See ERM (Enterprise Rights Management)

enterprise security. See also information

security and identity management

access control basics, 259–264

entitlements and visibility, 267–271

integrating MDM with information security, 272–280

overview of, 259

policies and entitlements, 264–267

references, 280–281

Enterprise Service Bus. See ESB (Enterprise Service Bus)

entities

impact on project scope, 319

MDM roadmap view for, 299–300

as members of arbitrary complex groups, 443

merging, 351–354

Small World theory and, 169–170

splitting, 354–355

entitlement provisioning, 222

entitlements

assigning user access privileges with, 222–223

defined, 219

enforced locally, 267

policies and, 264–267

standardization of, 269–271

taxonomy, 265–266

transactional, 266–267

and visibility, 267–271, 277–278

Entity Aggregation Service, Data Hub, 161–162

entity domains, in data modeling, 176

entity identification. See also customer

identification

goal of, 329–330

granularity impacting, 330

in merge and split operations, 351–355

need for persistent Match Group Identifiers, 365–366

in relationships and groups. See relationships and groups

using discriminating attributes for, 335–337

using identity attributes for, 334–335

using record qualification attributes for, 337–339

entity resolution

attributes/attribute categories for, 333–339

combining probabilistic MDM with, 72

customer identification. See customer identification

data-matching requirements/solutions, 348–350

defined, 145

false negatives in party matching, 333

false positives in party matching, 332–333

importance of history, 177

MDM data modeling requirements, 175–188

overview of, 329–330

references, 350

terms and definitions, 331–332

entity resolution, MDM services for

aggregation entity resolution, 160–162

challenge of product identification, recognition and linking, 149–150

Data Hub keys and life-cycle management services, 162–165

entity groupings and hierarchies, 147–149

entity recognition, matching, and unique identifiers, 155–156

key services and capabilities, 151–152

matching and linking services/techniques, 156–160

MDM and party data model, 146–147

MDM reference architecture, 152–155

overview of, 141–142, 150–151

recognizing individuals, groups and relationships, 142–145

references, 165

entropy, in Information Theory, 413–415

environment considerations, building Data Hub, 393–394

ePHR (Electronic Personal Health Record), 62

equivalencies defined, 348

effect on data quality of consistently applied, 417–419

ERM (Enterprise Rights Management) defined, 254

for information asset protection, 242

as MDM technical requirement, 254–255

overview of, 252–254

use case examples, 255–257

ERP (Enterprise Resource Planning) market, 436

error processing

data matching requirements/solutions, 350

data synchronization, 375

ESB (Enterprise Service Bus)

building infrastructure, 394

Data Hub zone, 125

MDM roadmap view enabling, 307

use case scenario, 369

eSign (Electronic Signatures in Global and National Commerce Act) legislation, 220, 227–228

ETL/Acquisition zone, Data Hub, 123–124, 128–129

ETL (Extract, Transform, and Load) tools

batch data synchronization using, 376–379

building infrastructure, 394

data-cleansing of, 118

ensuring data quality and integrity, 119–120

evolution of MDM architecture, 82–83

IBM products, 433

insufficiency of traditional deterministic, 36

MDM roadmap view for enabling, 307

as predecessor to CDI, 17

European Union Data Protection Directive, 201, 243

EV (Economic Value) estimation defined, 289

MDM Capability Maturity Model, 293–295

of MDM impact, 292–293

EVA (Economic Value Added), 289

Every Child Matters initiative, UK, 71

exact match, rules for customer records, 341

exceptions processing, 379–381

executive management (CEO, CFO), 286–288

eXtensible Access Control Markup

Language. See XACML (eXtensible Access Control Markup Language)

eXtensible Resource Identifier (XRI), 270

external reference data providers, MDM market trends, 450

External Reference style, MDM Data Hub, 100

external trusted source, establishing relationships/hierarchies, 359–360

Extract, Transform, and Load tools. See ETL (Extract, Transform, and Load) tools

F

fact tables, star schema data modeling, 172–173

Fair Credit Reporting Act (FCRA), 212

false negatives

avoiding in law enforcement/intelligence, 72

in biometric techniques, 232

errors in matching, 332

in Match Group testing, 387

false positives

in biometric techniques, 232

errors in matching, 332

in Match Group testing, 387

reasons for, 332–333

Father of Information Theory, 412–413

FCRA (Fair Credit Reporting Act), 212

federated metadata repository, 137

Federated Query Constructor, synchronization, 375

Federated SSO, 234–235

FFIEC (Federal Financial Institutions Examination Council)

compliance and authentication requirements, 208–209

data protection and privacy regulations of, 48

expanding GLBA, 204–205

guidelines to prevent banking fraud, 201

field-level encryption, data-at-rest, 250–251

fifth normal form (5NF) data modeling, 171

file-level encryption, data-at-rest, 250–251

Financial Consolidation Hub, Oracle, 434

Financial Crimes Enforcement Network (FinCEN), 207

Financial Modernization Act of 1999, 49

Financial Privacy Rule, GLBA, 49

financial services institutions (FSIs), MDM in

overview of, 57–60

risk management. See risk management for master data

FinCEN (Financial Crimes Enforcement Network), 207

fine-grained data access, 268

firewalls, 217, 228–229

first-class citizen entities, MDM data modeling, 176–177

First Logic, acquisition by SAP, 436

fit-for-purpose approach to data quality, 410–411

5NF (fifth normal form) data modeling, 171

flexibility of matching engine, 159

focus, of MDM, 3, 6

Fortune 2000 companies, adoption of MDM, 26

Fortune 5000 companies, adoption of MDM, 26

4NF (fourth normal form) data modeling, 171

frameworks, data governance, 401–404, 422

fraud. See also risk management for master data

identity theft, 210–211

using MDM to detecting gaming, 64

frequent-flier miles, airlines, 68

FSIs (financial services institutions), MDM in

overview of, 57–60

risk management. See risk management for master data

FTEs (full-time equivalents), bottom-up estimation, 291–292

full-time equivalents (FTEs), bottom-up estimation, 291–292

future of MDM. See MDM (Master Data Management), future of

fuzzy logic algorithms

providing inexact match comparison, 348

testing Match Group for false negatives, 387

Tibco products, 437–438

G

G2C (government-to-citizen) organizations

Party/Customer master for, 55, 142

in public sector, 69

gaming industry, driver of MDM, 63–64

GDP (Gross Domestic Product), in healthcare ecosystem, 62

GDS (Global Distribution Systems), airline ticket reservations, 68

gender, as discriminating attribute, 335–336

geography, deployment by, 395

gibberish, for anonymization of data, 389

GLBA (Gramm-Leach-Bliley Act) of 1999

ability to opt-out of sharing personal information, 212

data protection provisions, 49, 201, 204–205

data security, 242

test data protection, 388

using MDM to comply with, 8, 21

Global Distribution Systems (GDS), airline ticket reservations, 68

global MDM challenges, 51–52, 200

Golden copy

and matching modes, 340–341

need for persistent Match Group Identifiers, 365

golden customer record

business challenges of MDM, 38–39

information theory for data quality and, 412

MDM resolving master data to maintain, 55

two merged records creating, 353

Google Health, 62

governance. See data governance

government. See also public sector, MDM in

MDM benefits for, 44

relationship data critical to, 357

security value of CDI customer-centric model, 15–16

government-to-citizen organizations. See G2C (government-to-citizen) organizations

GPS coordinates, technical challenges of MDM, 38

Gramm-Leach-Bliley Act. See GLBA (Gramm-Leach-Bliley Act) of 1999

granularity

defining SOA, 91

exceptions processing and, 380–381

impacting entity identification, 330

impacting project scope, 317

relationship challenges of institutional customers, 363

Web Services supporting coarse, 93

Gross Domestic Product (GDP), in healthcare ecosystem, 62

group-based access control, 260–262

groups. See relationships and groups

groups, entity

creating, 145

entity resolution and MDM reference architecture, 153

hierarchies and, 147–149

mapping accounts to, 161

recognizing individual members of complex, 443

H

Hannaford Brothers Co., security breach, 240

hardware, data-at-rest security, 250–251

Health Insurance Portability and Accountability Act. See HIPAA (Health Insurance Portability and Accountability Act)

healthcare services ecosystem

driver of MDM in commercial sector, 61–63

relationship data in, 357

unstructured master data in, 63

HealthVault, Microsoft, 62

Heartland Payment Systems, security breach, 239

Hellman, Martin, 226–227

hierarchies

building entity relationships and, 359–360

of customers, as identity attribute, 334

MDM data modeling, 181–182

MDM roadmap view for, 300–301

hierarchy management

data warehousing and, 104–105

Data Zone architecture and, 133–134

entity groupings and, 147–149

MDM and, 103–104

reference data and, 103

relationship challenges of institutional customers, 364

Hierarchy management application, 391–392

Hierarchy Manager (HM), Siperian Hub, 435

HIPAA (Health Insurance Portability and Accountability Act)

data protection and privacy regulations of, 50

for data security, 242

ERM use case example of ensuring regulatory compliance, 256

protection of patient health information, 201

using MDM to comply with, 8

HM (Hierarchy Manager), Siperian Hub, 435

Hope Is Not a Strategy (Page), 288

horizontal discipline, of MDM, 26

hospitality and gaming industry

drivers of MDM in commercial sector, 63–64

relationship data critical to, 357

host (platform) security, 216–218, 247

hotels, drivers of MDM, 63–64

Household Group, recognizing, 360–361

HSISA, H.R. 4598 (Homeland Security Information Sharing Act), 201

HTTPS (HTTP Secure), 229–230

hub-and-spokes environment, MDM, 14–15, 80

Hub Data Management layer, MDM reference architecture, 152

Hub Data Quality layer, MDM reference architecture, 152

Hub Data Rules layer, MDM reference architecture, 152

Hub Master components, data synchronization, 376

Hub Services zone, Data Hub, 124

Hub System Services layer, MDM reference architecture, 152

Human Services departments, drivers of MDM, 70–71

hybrid approach

access control, 265–266

algorithms for record matching, 158

data quality tools and technologies, 120

metadata repository, 137

product approaches to Data Hub, 396

Hyperion, Oracle acquisition of, 434

I

IAM (identity and access management), 244, 260

IAS2005 (International Accounting Standards Reporting), 201

IBM

Data Governance Council, 400, 403–404

MDM vendor and products of, 431–433

ID-WSF (ID-Web Services Framework), 235

identification, authentication as component of, 218

identifiers, identity attributes, 334

identity and access management (IAM), 244, 260

identity attributes defined, 333

discriminating attributes used with, 335

matching and entity identification using, 334–335

matching rules for customer records, 341

MDM data modeling requirements, 176–177

identity federation technologies, 234–235

identity grabbers, information security threat, 241

identity management

as emerging security requirement, 221–222

information security and. See information security and identity management

Identity Store, synchronization, 374

Identity Systems, acquisition by Informatica, 434

identity theft

customer protection from, 48

identity management requirement, 221–222

overview of, 210–211

phishing and pharming as forms of, 211–212

implementation challenges

designing MDM application and presentation layers, 389–393

environment and infrastructure, 393–397

references, 397

summary of, 443

testing. See testing

implementation concerns, data

synchronization

batch processing, 376–379

Data Hub with multiple points of entry for entity information, 369–372

exceptions processing, 379–381

goals of, 367

Transaction Hub master model, 372–376

use case scenario, 368–369

IND (Investigational New Drug)

applications, 67

Indeterminate value, PDP, 273

individuals

developing direct relationships with, 355–358

discriminating attributes for, 335–337

mapping accounts to, 161

merging records of, 351–354

recognizing using MDM for Customer domain, 143–145

symmetric vs. asymmetric relationships, 358–360

industries, marketing campaigns across, 34

industry views of MDM

commercial sector. See commercial sector, MDM in

overview of, 55–57

public sector, 69–74

references, 69–74

inference engines, BRE, 131

Informatica, as MDM vendor/products, 434–435

Information Development, Mike2.0 framework, 402–403

information entropy, Information Theory, 413–415

information governance. See data governance

information integrity, 224

Information Scope or Data Domain dimension

architectural implications of, 103

defined, 21

summary of, 442

information security. See also data security

emerging threats to, 240–242

layered security model, 216

overview of, 217

technologies, 230–233

information security and identity management

application, data, and user security, 218

emerging requirements, 221–225

end-to-end security framework, 218

integrating authentication and authorization, 233–235

network security, 217

perimeter security, 217

platform (host) security, 217–218

putting it all together, 236–237

references, 237

traditional requirements, 218–220

Web Services concerns, 235–236

what we need to secure, 215–217

information security and identity

management, technologies

authentication mechanisms, 231–233

cryptography, cryptology and cryptanalysis, 226–227

firewalls, 228–229

nonrepudiation, 228

PKI and digital signatures, 227–228

secure HTTP protocols/SSL/TLS/WTLS, 229–230

VPNs, 229

Information Theory, approach to data quality, 412–417

InfoSphere MDM Server, 431–432

InfoSphere MDM Server for PIM (Product Information Master), 431–433

infrastructure, building Data Hub, 393–394

infrastructure project, project failure when MDM built as, 446

initial data load mode, data acquisition, 128

Initiate Systems, acquisition by IBM, 431

institutional customers, relationship challenges of, 361–364

insurance agencies, as drivers of MDM, 58–60

Integrated Risk Management (IRM), 198–200

integration

technical challenges of, 45

testing, 382

Integration with Unstructured Data, MDM roadmap view, 305

integrity

as business requirement, 219

data security and, 246

information and software, 224

technologies supporting, 225–228

transactional, 375–376

Web Services security concerns, 235

intelligence agencies, as drivers of MDM, 71–74

Interceptors, Spring Security, 274

internalization, of data protection, 50

International Accounting Standards Reporting (IAS2005), 201

international identifiers attribute, 338

International Securities Identification Numbering (ISIN) style, 60

Internet

as driver of MDM, 65

information security and identity management for. See information security and identity management, technologies

Internet service provider (ISP), as online identity attribute, 334

interoperable electronic health records, 8, 62–63

intrusion detection

for data security, 244

as emerging security requirement, 224

integrated conceptual security and visibility, 277–278

for perimeter security, 246

Intrusion Prevention Systems. See IPS (Intrusion Prevention Systems)

Investigational New Drug (IND) applications, 67

IP address, as online identity attribute, 334

IPS (Intrusion Prevention Systems)

for data security, 244

defined, 224

integrated conceptual security and visibility, 277–278

for perimeter security, 246

IRM (Integrated Risk Management), 198–200

ISIN (International Securities Identification Numbering) system, 60

ISO 17799 standard

defining confidentiality, 219

information security, 201

ISP (Internet service provider), as online identity attribute, 334

IT (information technology). See also technical approaches and challenges

bottom-up estimation of MDM business case, 291–292

challenges of MDM, 42

challenges of selling MDM inside enterprise, 39–41

data governance overlapped with enterprise, 421–422

Enterprise Rights Management, 254–255

implications of data security regulations, 213–214, 244–245

information security and identity management. See information security and identity management, technologies

Integrated Risk Management, 198

IT strategy-driven MDM, 287

MDM roadmap view for enabling, 307

in Mike2.0 data governance framework, 403

project initiation requirements, 316

reducing maintenance costs with MDM, 35

Single Sign-On, 233–235

supporting USA Patriot Act, 207

IT strategy-driven MDM, 287, 311

Italy, challenges of MDM, 51

J

JAAS (Java Authentication and Authorization Service), 218

Japanese Protection for Personal Information Act, 201

joins

challenges and performance problems of, 169

model for master data consumption, 185–187

star schema data modeling, 172–173

Joint Technical QA/Business QA testing, 382

just-in-time information availability

improving customer service time, 33–34

for terrorist groups, 71

using EII services, 138

K

Kantara Initiative, 221

Kerberos authentication, 231

Key Generation service, Data Hub, 163, 165

Key Lookup service, 355

key management, 220, 251

Kimball, Ralph, 171

Knowledge Base, Acxiom, 439

knowledge base intelligence, matching customer records, 342

Knowledge Management server, 394

Korea, challenges of MDM, 52

KYC (Know Your Customer) provision, USA

Patriot Act

data protection and privacy regulations of, 48

detecting and preventing fraud, 22

overview of, 207–208

using MDM to comply with, 8

L

Laboratory Information Management Systems (LIMS), 67

LACS (Locatable Address Conversion System), Acxiom, 439

landing and staging area data models, 185, 188

language

data modeling, 167

multilingual requirements in MDM, 305–306

law enforcement agencies

CDI customer-centric model for, 15–16

as drivers of MDM, 71–74

MDM benefits for, 444

layered security framework, 216, 246–248

LDW (Loss Data Warehouses), 208

Leading Relationship attribute, entity identification, 338–339

legacy applications

batch processing, 377–378

Coexistence Hub partially decommissioning, 322

data-in-transit protection for, 248–249

data synchronization in, 129, 373

decommissioning, 301, 320

evolution of MDM, 16

External Reference style and, 100

incomplete and inconsistent data in, 81

integration of new MDM with, 36, 58–59

MDM solutions eventually replacing, 21

moving from account-centric-to-customer-centric, 87

policies and entitlements in, 264–265

project failure from not considering impact of, 447

Reconciliation Engine style and, 101

Registry Hub fixing and enhancing, 322

Registry style and, 100

as technical challenge of MDM, 42–44

Transaction Hub decommissioning, 323, 325

Transaction Hub implementations and, 372–373

Transaction Hub style and, 101–102

legal issues, reasons to use MDM, 7–8

lessons learned in this book, summary of, 442

Liberty Alliance, 221

libraries, industry-specific model, 186

life-cycle phases/releases, socialization of MDM, 41–42

LIMS (Laboratory Information Management Systems), 67

lines of business (LOB). See LOB (lines of business)

linked records, merging, 351–354

linking

matching speed and, 158

MDM technology trends, 452

overview of, 156

uniqueness and persistence of link keys, 159

Loading area, ETL processing, 377

loading data into Data Hub, 127–129

Loading zone, ETL/Acquisition zone of Data Hub, 124

LOB (lines of business) deployment by, 395

impacting project scope, 317–318

what MDM stakeholders want to know, 288

Locatable Address Conversion System (LACS), Acxiom, 439

location domain, MDM in retail sales, 68–69

logging, use case scenario, 372

logical view, defining SOA, 91

loose coupling

in software design, 122

Web Services, 93

Web Services security issues, 236

Loss Data Warehouses (LDW), 208

Lower Threshold, match accuracy, 344

loyalty programs

airline, 68

hospitality and gaming industry, 63–64

relationship data critical to, 357

Lucene fuzzy matching technology, Tibco, 437

M

M&A (mergers and acquisitions)

in airlines, 68

benefits of integrated risk management, 199

driving MDM in telecommunications sector, 61

MDM enabling, 59

of MDM vendors. See vendors and their products, MDM

machine learning algorithms, record matching, 158

manufacturing industry, as driver of MDM, 64–65

market drivers, MDM

business and operational. See business and operational drivers of MDM

challenges. See challenges, MDM

market growth, 26–29

references, 53

markets

adoption of MDM and growth in, 26–29

consolidation of, 430

improving effectiveness with MDM, 34, 450–451

masking data, for anonymization, 389

Massachusetts Law 201 CMR 17.00, 243

Master Customer Reference Database, SAS, 437

master data

architectural principles, 85

data modeling requirements, 176, 185–187

defined, 13, 70

defining, 6–7, 79–80

External Reference style and, 100

for manufacturing organizations, 65

technical challenges of, 42–43, 45–47

unstructured in healthcare ecosystem, 63

in Use Pattern classification, 102–103

Master Data Authoring application, 390–391

Master Data Consumption zone, Data Hub

concerns of, 124–125

data delivery concerns, 132–136

using EII services, 138

Master data governance Maturity view, MDM roadmap, 304–305

master data modeling

importance of data modeling, 167–168

MDM requirements, 175–188

references, 192

styles, 168–174

styles for multidomain MDM, 188–191

master data quality (MDQ), 405

Master Data Quality Processes, Metrics, and Technology Support, MDM roadmap view, 305

master data service (MDS), 97, 431–432

master model of MDM Data Hub. See Transaction Hub style, Data Hub

Master Reference Manager (MRM), Siperian Hub, 435

Master Search application, 393

Match Groups

effect of chaining, 344–346

merging records, 351–354

need for persistent identifiers, 365–366

overview of, 340–341

testing, 386–387

Match Suspect Extractor

in batch processing mode, 378

data synchronization component, 374

use case scenario, 370

matching

accuracy threshold, defining, 344

address problems, 19

avoiding false negatives in, 72

in batch processing mode, 378

chaining impacting, 344–346

for customer identification. See customer identification

as Data Hub core function, 378

discriminating attributes for disqualifying records, 334–335

for entity identification. See entity identification; entity resolution

entity recognition and, 155–156

entity resolution in Customer domain, 149

entity resolution in Product domain, 149–150

errors in, 332

false negatives in Party, 333

false positives in Party, 332–333

in hospitality industry, 64

identify attributes in, 334–335

implementation issues of, 340–341

multilingual requirements, 306

name problems, 19

product problems, 19

quantification of, 342

record-level, 342–344

Registry style for, 100

requirements and solutions, summary, 348–349

rules at attribute/attribute group level, 341–342

rules for customer records, defining, 341

similarity libraries and fuzzy logic in, 348

technology trends, 452

use case scenario, 369

matching algorithms

for data quality, Master data governance, 417–420

establishing relationships/hierarchies with rules for, 360

Tibco products, 437–438

matching and linking

aggregating entity information, 160–162

algorithmic approaches to record matching, 157–158

choosing technique for, 158–160

overview of, 156–157

matching modes, customer identification, 340–341

material non-public information. See MNPI (material non-public information)

MDG (Master Data Governance)

data quality management, 405–407

data quality processes, 407–408

definition, 404

existing approaches to quantify data quality, 410–412

information theory approach to data quality, 412–417

MDM market trends in, 451

metrics for information quality, 410

mission, 405

policies for data quality, 409–410

use of matching algorithm metrics, 417–420

MDM architecture. See architecture

MDM ecosystem, 313–315

MDM (Master Data Management), future of

guiding principles, 448–449

lessons learned in this book, 441–445

market trends, 450–451

reasons for project failure, 446–448

references, 453

as target for identity thieves, 212

technical capabilities trends, 451–453

MDM (Master Data Management), overview of

benefits of, 21–23

capabilities of, 154

challenges of creating/managing, 10–12

classification dimensions, 20–21

customer centricity and data quality, 7

defining, 12–14, 79–80

focus of, 3

introduction to, 1–2

master data, defining, 6–7

other variants of, 18–20

overview of, 5

references, 23–24

risk management for. See risk management for master data

using CDI (Customer Data Integration), 14–18

why now? 7–10

MDM Servers, IBM, 431–433

MDM-Star schema

creating, 178–179

entity and relationship resolution with, 188

modeling for master data consumption, 185–187

modeling relationships from, 180–181

source-system specific view of, 183–185

MDQ (master data quality), 405

MDS (master data service), 97, 431–432

merge operations

data matching requirements/solutions, 349

mapping accounts to individuals and groups, 161–162

overview of, 351–354

use case scenario, 372

mergers and acquisitions. See M&A (mergers and acquisitions)

message creation, legacy systems, 373

message-level security, data-in-transit, 249

message orientation, SOA

defining, 91

ESB zone of Data Hub and, 125

Web Services, 93

Message Response Assembler, data synchronization, 375

meta-model. See metadata

metadata

Attribute Location service and, 135

basics, 135–136

MDM roadmap view for, 300–301

models, 189–190

Record Locator service based on, 164

repository architecture, 137

Metadata Management services, 135, 392–393

metadata-only MDM products, 190

metadata repository

data quality of, 118

Enterprise Information Integration and, 138

Metadata Management Services supporting, 135

Registry-style Data Hub using, 321

technical challenges of MDM, 37

metrics for data quality, Master Data Governance, 410, 422

Mike2.0 framework, 402–403

minimum data requirements, customer identification, 339–340

mission, Master Data Governance, 405

MNPI (material non-public information)

compliance (legal) risk and, 196

creating and protecting test data, 388

GLBA data protection requirements, 204

protection of, 198

model relationships, 180–181

money laundering. See AML (Anti-Money Laundering) provision, USA Patriot Act

monitoring security events, 220

Moseley, Marty, 421

MRM (Master Reference Manager), Siperian Hub, 435

multidomain MDM, 7, 188–191

multifactor authentication technologies, 231–233

Multilingual Requirements, MDM roadmap view, 305–306

MySAP Customer Relationship Management, SAP, 436

N

N-DEx (National Data Exchange), Law Enforcement, 71

NAHIT (National Alliance for Health Information Technology), 62

name alias libraries, 348

names

challenges of global MDM, 51–52

creating 360-degree view of customer using, 331–332

data matching requirements/solutions, 350

as discriminating attribute, 335

false negatives in Party matching, 333

false positives in Party matching, 332

as identity attribute, 334

minimum data requirements for, 339–340

similarity libraries for, 348

NASD rules 2711 and 3010, 201

National Alliance for Health Information Technology (NAHIT), 62

National Change of Address. See NCOA (National Change of Address) information

National Data Exchange (N-DEx), Law Enforcement, 71

National Numbering Agency (NNA), 60

National Security Agency (NSA), 245

NCOA (National Change of Address) information

Acxiom licensing of, 439

creating 360-degree view of customer, 331

matching rules for customer records, 342

merging records, 352

NDA (New Drug Applications), 67

Netrics, acquisition by Tibco, 437–438

NetWeaver, SAP MDM based on, 436

network orientation, SOA, 91

network security

concerns, 217

layered security model, 216

overview of, 217

protection of data with, 247

technologies, 228–229

Nevada Law NRS 597.970, 243

New Drug Applications (NDA), 67

New York Reg. 173, 201

New York State Identification and Intelligence (NYSIIS) acronym, 348

nicknames, similarity libraries for, 348

NNA (National Numbering Agency), 60

non-identity attributes, data modeling requirements, 178

nonrepudiation, 220, 228

normalized data models

4NF and 5NF, 171

eliminating data redundancy with, 168–169

illustrative example of, 170

strengths and weaknesses of 3NF, 171

Not Applicable value, PDP, 273–274

NSA (National Security Agency), 245

nullification, for anonymization of data, 389

number variance, for anonymization of data, 389

NYSIIS (New York State Identification and Intelligence) acronym, 348

O

OASIS (Organization for the Advancement of Structured Information Standards)

SAML, 234

SOA reference architecture, 94

WS-Security, 236, 265

obfuscation, in protecting test data, 388

obligations, policy, 273–274

OCC (Office of the Comptroller of the Currency)

2001-47 regulation, 201, 206

risk management for master data, 198, 206

ODS (Operational Data Store)

evolution of MDM architecture, 83

as precursor to MDM single-customer view, 57

as predecessor to CDI, 18

OFAC (Office of Foreign Asset Control) lists

data protection/privacy regulations of, 49

financial services leveraging MDM to match applicant records with, 58

USA Patriot Act requirements, 207

OLAP (On-Line Analytical Processing), star schema modeling, 172

OLTP (On-Line Transaction Processing), 3 NF modeling, 169

ONC (Office of the National Coordinator for Health Information Technology), 62

one-time passwords, authentication, 231

online identity attributes, 334

online matching mode, 340–341

Open Source MDM trend, 451–452

OpenID, for identity federation, 235

Operational Data Store. See ODS (Operational Data Store)

operational drivers of MDM. See business and operational drivers of MDM

operational efficiency, as MDM business driver, 29

Operational MDM

Data Hub usage style, 302

data zones and, 126–127

defined, 21

information value of Data Hub data in, 138

Master Data Governance for, 407–408

summary of, 442

as use pattern for MDM data usage, 102–103

operational metadata, 136

operational risk, 195–196, 244

Operational Risk Framework and Management Structure, Basel II requirements, 208

Operations/scheduling controller, 392

opt-in option, 212–213

opt-out option, 212–213

Oracle, as MDM vendor and products, 433–434

orchestration, SOA, 91

Organization for the Advancement of Structured Information Standards. See OASIS (Organization for the Advancement of Structured Information Standards)

overmatching, 331, 348

ownership. See data ownership

P

PAP (Policy Administration Point), OASIS defined, 272–273

integrated conceptual security and visibility with, 277–280

policy enforcement with, 275–276

partnerships with vendors, implementing MDM, 44–45

party-centric model defined, 329

for financial services, 58

overview of, 146–147

reasons for false positives in party matching, 332–333

party data model, MDM and, 146–147

Party domain. See Customer/Party domain

Party entity, party data model, 146–147

Party group defined, 340–341

party data model, 147

recognizing, 360–361

party match. See also entity resolution

party type attribute, 337–338

passenger security, airline, 68

password authentication, 231

patient-centric MDM, 66

Patriot Act. See USA Patriot Act

patterns, architectural, 87–89

Payment Card Industry (PCI) standard, 201

PBM (Pharmacy Benefits Management), 63

PCI (Payment Card Industry) standard, 201

PDP (Policy Decision Point), OASIS defined, 272–273

for policy decision and enforcement, 273–277

visibility and security requirements, 277–280

People Resources and Skills, MDM roadmap view, 307

PEP (Policy Enforcement Points), OASIS defined, 272–273

integrated conceptual security and visibility, 277–280

for policy decision and enforcement, 273–277

performance

data-at-rest security, 251

data-cleansing tool issues, 118

matching records in large sets with break groups, 346–347

MDM roadmap view for, 303

perimeter security

concerns of, 217

for data security, 244

layered security model, 216

overview of, 217

protection of data with, 246–248

technologies, 228–229

Person of Interest (POI), in law enforcement/intelligence, 71–72

personal identification numbers (PINs), authentication, 231

personalization, and privacy, 233

personally identifiable information. See PII (personally identifiable information)

pharmaceutical industry

drivers of MDM in commercial sector, 66–67

MDM improving pharmacy health information, 63

pharming, 211, 241

philosophy, MDM architectural

architectural patterns, 87–89

enterprise architecture framework, 86–88

overview of, 84–86

phishing, 211, 241

phone numbers

false negatives in party matching, 332

false positives in party matching, 333

as identity attributes, 334

physical security, 218

physiological biometrics, 232

PII (personally identifiable information)

creating and protecting test data, 388

definition of privacy and, 219

financial services and healthcare protection of, 200

GLBA requirements, 204

Massachusetts Law 201 CMR 17.00 for, 243

PIM (Product Information Management)

challenges of MDM for Product domain, 19–20

Data domain and, 103

emergence as single domain in MDM, 7

evolution of MDM and, 81

overview of, 18–19

summary of, 443

PINs (personal identification numbers), authentication, 231

PIP (Policy Information Point), OASIS, 272–273

PKI (Public Key Infrastructure)

asymmetric cipher as basis of, 226–227

digital certificates based on, 231

digital signatures and nonrepudiation using, 227–228

ERM using, 255

network security using, 217

platform (host) security, 216–218, 247

platform-neutral, defining SOA, 91

PLM (product life-cycle management), SAP, 436

PMA (Policy Management Authority), OASIS, 272–273

POI (Person of Interest), in law enforcement/intelligence, 71–72

policies

data governance and, 402

data quality, Master Data Governance, 409–410

decision and enforcement of, 273–274

defined, 265

entitlements and, 264–267

reducing number of, 260

standardization through, 269–271

Policy Decision Point. See PDP (Policy Decision Point), OASIS

Policy Enforcement Points. See PEP (Policy Enforcement Points), OASIS

Policy Information Point (PIP), OASIS, 272–273

Policy Management Authority (PMA), OASIS, 272–273

Policy Store, 277–278

ports, HTTPS dedicated, 229

presentation layers, MDM, 389–393

pretexting provisions, GLBA, 49

primary keys, 163

privacy. See also risk management for master data

ContactPoint for children in UK and, 71

customer, 198

data security, 246

definition of, 219

as emerging security requirement, 224–225

GLBA, FCRA, and opt-out, 212–213

GLBA requirements, 204

as MDM business driver, 8, 29

party-level preferences, 147

personalization as threat to, 233

technical implications on MDM architecture, 213–214

Privacy Profile, XACML, 271

private keys, PKI, 227, 231

Probabilistic Attribute Match algorithm, 157, 342

probabilistic MDM approach, 64, 72

probabilistic self-scoring of entity record, 339–340

probability theory, in Information Theory, 413–417

Product domain

benefits of MDM in, 22

challenge of entity resolution in, 149–150, 329

challenges of MDM in, 19–20

developing direct relationships with individual, 355–357

dominating enterprise MDM, 450

driving MDM in telecommunications, 61

EDW supporting, 83

evolution in MDM, 81

in manufacturing industry, 64–65

MDM in retail sales, 68–69

PIM solutions, 18–19

Product Information Management (PIM). See PIM (Product Information Management)

product life-cycle management (PLM), SAP, 436

product master, 84

product type

as identity attribute, 334

impacting project scope, 318

project failure, MDM

guiding principles to avoid, 448–449

reasons for, 445–448

project initiation

addressing complexity, 312–316

implementation begins, 311–312

MDM Data Hub solution architecture, 320–326

overview of, 311

project work streams, 326–327

references, 327

scope definition, 316–320

project work streams, planning/executing, 326–327

public (asymmetric) key encryption, 226

Public Key Infrastructure. See PKI (Public Key Infrastructure)

public keys, PKI, 227

public sector, MDM in

border protection agencies, 71–74

intelligence agencies, 71–74

law enforcement organizations, 71–74

overview of, 69

references, 74–76

Social Services agencies, 70–71

purge

data synchronization and, 374

use case scenario, 372

Purisma, acquisition by D&B, 438–439

Q

QA (quality assurance) testing, 382

qualitative benefits, 289

qualitative risk analysis, 197

quality. See data quality

quantify data quality, 410–411

quantitative benefits, 289

quantitative risk analysis, 197

R

R&D process, in pharmaceutical industry, 67

race conditions

batch processing resolving, 378

data synchronization, 375

radio frequency identification (RFID), 38

RADIUS (Remote Authentication Dial-In User Service), 231

Rational Unified Process (RAP), for project scope, 317

RBAC (Roles-Based Access Control)

overview of, 260

roles-engineering approach, 262–263

sample roles-engineering process, 263–264

shortcomings of, 264

RDBMS (Relational Database Management Systems), 163

reaction rules engines, BRE, 132

Reconciliation Engine style, Data Hub

loading data into Data Hub, 128–129

overview of, 101

real-time synchronization components, 373–376

use case scenario, 369–372

record-level match, 342–344

Record Locator service, Data Hub, 164–165

record qualification attributes defined, 333

defining matching rules for customer records, 341

overview of, 337–339

record-shuffling, for anonymization of data, 389

records

Data Volumes and Performance Considerations roadmap view, 303

matching. See matching

MDM data modeling requirements, 177

merging, 340–341

multilingual requirements in MDM, 305–306

Reference Architecture, MDM

Data Hub, 151–152

defining, 105

entity resolution and, 152–155

SOA, 94, 125–126

viewpoint, 105–109

reference code maintenance application, 391

reference codes

during batch processing, 377

MDS rules mandating release of, 97

message validation and translation of, 373

multilingual MDM issues for, 51

reconciliation of, 185, 303

reference data

Data Zone architecture and distribution of, 132–133

and hierarchy management, 103, 133–134

managing in MDM, 6

MDM data modeling requirements, 182

MDM market trends, 450

multilingual requirements in MDM, 306

Reference Data view, MDM roadmap, 303

reference database, External Reference style, 100–102

Reference MDM Data Hub, 132–133

referential integrity

causing exceptions, 379

overview of, 163

Registry-style Data Hub

choosing for project, 321–322

loading data into Data Hub with, 127–129

overview of, 100–101

roadmap view for, 302–303

regulatory compliance

auditability, 116

data security, 242–245

ERM use case example of, 255–256

financial services, 59

impact on IT infrastructure, 47–50, 200–202

information security and, 210–213

as key benefit of MDM, 7–8, 21

pharmaceutical industry, 67

in risk management for master data, 198–200

test data protection, 388–389

regulatory compliance, legislation

Basel II Capital Accord. See Basel II Capital Accord

California’s SB1386, 201, 209, 243

FFIEC. See FFIEC (Federal Financial Institutions Examination Council)

GBLA. See GLBA (Gramm-Leach-Bliley Act) of 1999

OCC. See OCC (Office of the Comptroller of the Currency)

SOX. See SOX (Sarbanes-Oxley Act) of 2002

USA Patriot Act. See USA Patriot Act

Related Initiatives view, MDM roadmap, 304

Relational Database Management Systems (RDBMS), 163

relationship

Leading Relationship and level of, 338–339

metadata clarifying, 136

Party data model, 146–147

project scope impacted by, 318–319

recognizing for Customer domain, 143–145

resolution of, 153

relationships and groups

challenges of institutional customers, 361–364

direct business relationships with individual, 355–358

overview of, 355

recognizing households or party groups, 360

references, 366

symmetric vs. asymmetric relationships, 358–360

Relationships, Hierarchies, and Metadata view, MDM roadmap, 300–301

release strategy, 43–44

Remote Authentication Dial-In User Service (RADIUS), 231

reporting

3NF modeling not best choice for, 169

building/deploying Data Hub, 393

data matching requirements/solutions, 350

Reporting server, building infrastructure, 394

reputational risk, 196, 243

REST-based Web Services, testing, 385–386

retail sales industry, driving MDM, 68–69

return on equity (ROE), integrated risk management, 199

return on investment. See ROI (return on investment)

revenue, leveraging customer relationships to grow, 32

RFID (radio frequency identification), 38

“right” data models, multidomain MDM, 189–190

risk

analysis, 197

of data compromise, 243–244

defined, 196

FFIEC compliance and authentication requirements, 208

as MDM business driver, 29

technical challenges of MDM, 43

risk-based authentication, FFIEC compliance, 209

risk management for master data

Basel II Capital Accord technical requirements, 208

California’s SB1386, 209

defined, 196

FFIEC compliance and authentication requirements, 208–209

Gramm-Leach-Bliley Act data protection provisions, 204–205

information security and regulatory concerns, 210–213

Integrated Risk Management, 199

Office of the Comptroller of the Currency, 206

overview of, 195

references, 214

regulatory compliance and impact on IT, 200–202, 213–214

regulatory compliance landscape, 198–200

risk analysis, 197

risk taxonomy, 195–198

Sarbanes-Oxley Act of 2002, 202–203

USA Patriot Act, 206–208

Risk Management Solutions, D&B, 438

roadmap development plan, MDM

basic costs of, 297–298

basing projects on, 311

conclusion, 307–308

overview of, 296–297

references, 308–309

using roadmap views in. See roadmap views

roadmap views

Business Benefits, 299

Complexity of Cross-Domain Information Sharing, 306

Complexity of Data Security, Visibility, and Access Control Requirements, 306

Data Domains, Entities, and High-Level Data Model, 299–300

Data Hub Architecture and Data Ownership Style, 302–303

Data Hub Usage Style, 302

Data Volumes and Performance Considerations, 303

Decommissioning of Systems and Applications, 301

Deployment Strategy, 303–304

Enabling Technologies: ETL, SOA, and ESB, 307

Integration with Unstructured Data, 305

Master Data Governance Maturity, 304–305

Master Data Quality Processes, Metrics, and Technology Support, 305

MDM ecosystem, 313–315

Multilingual Requirements, 305–306

overview of, 298–299

People Resources and Skills, 307

Reference Data, 303

Related Initiatives, 304

Relationships, Hierarchies, and Metadata, 300–301

Systems and Applications in Scope of MDM, 299

Third-Party Data Sources, 301

ROE (return on equity), integrated risk management, 199

ROI (return on investment)

bottom-up estimation of MDM, 289–290

calculating risk management, 196–197, 199

MDM business case, 26–27, 285–286

selling MDM inside enterprise, 39–41

role

authorization based on user, 262–264

identity attribute used for identification, 334

roles-and-rules-based access control (RRBAC), 265

Roles-Based Access Control. See RBAC (Roles-Based Access Control)

roles engineering, RBAC, 262–264

RRBAC (roles-and-rules-based access control), 265

RSA SecureID, authentication, 231

RSA Security/EMC2, digital certificate issuer, 231

RuBACs (Rules-Based Access Controls), 265

rule sets, 131

Rules-Based Access Controls (RuBACs), 265

RUP (Rational Unified Process), for project scope, 317

Russia, challenges of MDM, 51

S

S-HTTP (Secure HTTP), 229–230

S/MIME, securing e-mail, 249

Safeguards Rule, GLBA, 49

safety, using MDM for, 8–9

sales and marketing, driving MDM, 29

Sales and Marketing Solutions, D&B, 439

SAML (Security Assertion Markup Language), 234–235

SAP MDM, 436

Sarbanes-Oxley Act. See SOX (Sarbanes-

Oxley Act) of 2002

SAS DataFlux MDM, 436–437

scalability

data-at-rest security, 251

limitations of ACLs, 261–262

limitations of RBAC, 264

of matching and linking services, 159

technical challenges of MDM, 38

SCDs (Slow Change Dimensions), hierarchy management, 134

scenario-based testing of data quality, 383, 385, 387

scope

defining project, 316–320

of protection, 249

SDN (Specially Designated Nationals) lists, 49, 58

search services, Master Search application, 393

SEC Final Rule, Privacy of Consumer Financial Information, 201

SEC (Securities and Exchange Commission) rulings, 7–8, 49

secret key encryption, 226–227

Secure HTTP (S-HTTP), 229–230

Secure Sockets Layer (SSL). See also SSL/TLS, 230

Securities and Exchange Commission (SEC) rulings, 7–8, 49

securities master, MDM and, 59–60

security

as business requirement, 220

data. See data security

enterprise. See enterprise security

information. See information security

layered framework model for, 216, 246–248

MDM architectural principles, 85

MDM improving, 8–9, 68

network. See network security

perimeter. See perimeter security

risk management. See risk management for master data

technical challenges of MDM, 38, 47–50, 213–214

user. See user security

value of CDI customer-centric model, 15–16

Security Assertion Markup Language (SAML), 234–235

self-score distribution, and data quality, 419–420

semantic metadata, 135

semantics-based solutions, entity resolution in Product domain, 150, 329

semi-structured master data, MDM technology trend, 452

senior management

addressing complexity of MDM projects to, 312–313

challenges of selling MDM inside enterprise, 39–41

getting commitment of, 38

separation of concerns

data visibility and, 272–274

in Data Zone architecture, 120–121

defined, 120

separation of duties (SoD), and data visibility, 272, 274

servers, building infrastructure, 394

service-oriented architecture. See SOA (service-oriented architecture)

service-oriented MDM architecture, 447, 451

services

Data Hub as platform for, 154–155

entity resolution. See entity resolution, MDM services for

Hub Services zone of Data Hub, 124

leveraging MDM for social, 70–71

MDM architecture and, 81

MDM platform for, 155–156

MDM reference architecture and, 125–126

testing MDM, 385–386

services architecture viewpoint

introduction to SOA, 90–92

MDM and SOA, 94–96

MDM and SOA misconceptions, 97–98

overview of, 90

SOA benefits, 92

Web Services, 92–94

17 CFR Part 210, for records retention, 201

Shannon, Claude, 412–413

shared (secret or symmetric) key encryption, 226–227

Shark Chart concept, 288

shipping industry, driving MDM, 67

Siebel UCM/Oracle MDM solution, 433

signer authentication, digital signatures, 228

similarity libraries, 348

Similarity Systems, acquisition by Informatica, 434

single-customer view

in financial services, 59

in hospitality and gaming industry, 63–64

MDM precursors to, 57

in telecommunications sector, 60–61

single loss expectancy (SLE), quantitative risk analysis, 197

Single Sign-On (SSO) technologies, 233–235

single threshold capabilities, 344, 349

single version of truth

business challenges of implementing MDM, 38–39

for business processes, 12

defined, 5

defining MDM as, 12–13, 79–80

impact on project scope, 319

other variants of, 6–7

pervasive need for, 443

as problem with every enterprise, 6

Siperian Hub, acquisition by Informatica, 434–435

SIT (system integration testing), 382

slave model of MDM Data Hub. See Reconciliation Engine style, Data Hub

SLE (single loss expectancy), quantitative risk analysis, 197

slice and dice capabilities

quality of complex dimensions, 36

star schema data modeling, 172

Slow Change Dimensions (SCDs), hierarchy management, 134

Small World theory

MDM-Star schema readability, 179

overview of, 169–170

star schema model in, 173

smart cards, multifactor authentication, 232–233

snowflake schema data modeling, 173–174

SOA (service-oriented architecture)

benefits of, 92

Data Hub, ESB zone support for, 125

Data Hub, mapping service to data zones, 129

Data Hub processes improving, 129

defining, 85

growing MDM framework from, 36

implementing data modeling styles, 189–191

implementing MDM as, 13, 44–45, 94–96

introduction to, 90–91

in linking and matching, 160, 385–386

in MDM architectural principles, 85–86

MDM roadmap view enabling, 307

misconceptions, 97–98

in real-time delta processing, 128–129

in reference architecture, 94, 125–126

in reference architecture viewpoint, 105–109

in Tibco MDM, 437

Web Services, 93–94

SOAP-based Web Services, testing, 385–386

Social Services agencies, driving MDM in public sector, 70–71

socialization challenge of MDM

overview of, 41–42

and project failure, 447

project initiation requirements, 315–316

SoD (separation of duties), and data visibility, 272

software

data-at-rest security, 250–251

data governance, 422

driver of MDM in commercial sector, 65–66

tamper-resistance and integrity of, 224

solution change control, history of configuration changes, 349

SOR (system of record)

for business processes, 12

defined, 5

evolution of MDM and CDI, 16–18

misconception about, 97–98

source system models

mapping data models to, 183–185

MDM-Star schema, 188

Source Systems zone, Data Hub, 122–123, 128

SOX (Sarbanes-Oxley Act) of 2002

creating and protecting test data, 388

data protection and privacy regulations of, 49

for data security, 242

integrity of financial data, 201

requiring businesses to attest to data quality/accuracy, 115

risk management requirements of, 202–203

using MDM to comply with, 7–8

Spain, challenges of MDM, 51

spear-phishing, 212

Specially Designated Nationals (SDN) lists, 49, 58

spinners

recognizing bad customers or frauds, 27

relationship data critical to detecting, 357

split operations

data matching with, 349

overview of, 354–355

use case scenario with Reconciliation Engine, 372

sponsorship scenarios, MDM, 286–287

Spring Framework, 274

spyware, 241

SSL (Secure Sockets Layer), 230

SSL/TLS

data-in-transit security with, 248–249

data security on networks with, 245

in HTTPS, 229

overview of, 230

SSO (Single Sign-On) technologies, 233–235

stability, as discriminating attribute, 336

Staging area, ETL processing, 124, 377

stakeholders

addressing complexity of MDM project to, 312–313

business case for. See business case

selling MDM inside enterprise to, 39–41

socializing MDM project with, 41, 315–316

standardization

data-integration challenges from lack of, 46

data quality processes in Data Hub, 129

entity resolution in Product domain, 19, 150

policies, entitlements and, 269–271

star schema data modeling, 171–174

stewardship. See data stewardship

strategic risk, 196

styles, architectural

choosing Data Hub for project, 320–325

Data Hub, 99–102

roadmap view for Data Hub and data ownership, 302–303

styles, data modeling

3NF, 168–171

overview, 168

star schema (dimensional), 171–174

supporting multidomain MDM, 188–191

substitution, for anonymization of data, 389

supplier domain, MDM in retail sales, 68–69

Supply Chain Marketing Solutions, D&B, 439

Sybase, acquisition by SAP, 436

symmetric key encryption, 226–227

symmetric relationships, 358–360

synchronization. See data synchronization

synchronous messages, in Web Services, 93

system integration testing (SIT), 382

system of record. See SOR (system of record)

system on-boarding, 380

System Services layer, MDM reference

architecture

Data Hub, 152

high-level services of, 125

overview of, 106–107

systems

impact on project scope, 320

MDM roadmap view for decommissioning, 301

testing, 382

Systems and Applications in Scope of MDM view, MDM roadmap, 299

T

Target, XACML, 271

taxonomies

entitlement, 266–267

risk, 195–198, 202

TCO (total cost of ownership), and integrated risk management, 199

technical approaches and challenges

data quality, synchronization and integration, 45–47

data visibility, security and regulator compliance, 47–50

global MDM, 51–52

implementation costs and time-to-market, 43–45

integrated risk management, 200

key challenges, 36–38

key MDM technical capabilities, 445

overview of, 42–43

summary of, 444

technical capabilities trends, 451

technical infrastructure, and data security/privacy regulations, 213–214

technical metadata, 136

Technical QA testing, 382, 386

technology

information security. See information security and identity management, technologies

project failure and, 446

telecommunications industry, drivers of MDM, 60–61

telegraph code transmission, in Information Theory, 412–413

telemarketers, Do Not Call legislation, 49–50

templates, predefined biometric, 232

terrorism

MDM in government and, 71–73

MDM management of security, 8–9

relationship data for protection from, 357–358

USA Patriot Act, 207

using CDI against, 22

Terrorist Identities Datamart Environment (TIDE) list, 72

Test Management server, building infrastructure, 394

testing

bulk statistical, 383–385

creating and protecting test data, 388–389

Match Group, 386–387

MDM data and services, 381–383

MDM roadmap view for resources and skills, 307

MDM services, 385–386

reporting and, 393

scenario-based, 385

Thailand, challenges of MDM, 51–52

third normal form. See 3NF (third normal form) data modeling

Third-Party Data Provider zone, Data Hub, 123, 128–129

Third-Party Data Sources view, MDM roadmap, 301

third-party information sharing risk, 244

third-party trust, 225

Thomas, Gwen, 400

thought leaders, and marketing effectiveness, 34

360-degree view of customer

addressing complexity of MDM projects to stakeholders, 312–313

customer centricity and data quality, 38–39

holistic entity view, 331–332

merging match group records, 351–352

system integration, 330

3NF (third normal form) data modeling

as most widely adopted standard, 168–170

not moving between dimensional models and, 174

not optimal for reporting and analytics, 169

strengths and weaknesses of, 171

threshold, match accuracy

binary rule for attribute match and score for record match, 343

defining, 344

scoring for attribute and record match, 344

use case scenario with Reconciliation Engine, 370–371

Tibco MDM, 437–438

TIDE (Terrorist Identities Datamart Environment) list, 72

time-to-market concerns, implementing MDM, 43–44

TJX Companies, Inc., security breach, 240

TLS (Transport Layer Security), 230

total cost of ownership (TCO), and integrated risk management, 199

traditional bottom-up estimation, of MDM impact, 289–292

traditional security requirements, 218–220

Transaction Hub style, Data Hub

choosing for project, 323–324

loading data into Data Hub, 128–129

overview of, 101–102

Purisma support for, 438

roadmap view for, 302–303

use case scenario, 372–373

transaction-level data, Operational Data Store, 83

Transaction Manager, 369–371, 373–374

transaction risk

benefits of integrated risk management, 199

from data compromise, 244

overview of, 195–196

transactional entitlements, 266–267

transactional integrity, 375–376

Transport Layer Security (TLS), 230

Transportation Security Administration (TSA), 68

travel

relationship data critical to, 357

Transportation Security Administration, 68

Trigo company, acquisition by IBM, 431

trust

business semantics and, 225

defining Enterprise Attribute Locator information at levels of, 375

as emerging security requirement, 224–225

TSA (Transportation Security Administration), 68

21 CFR Part 11 (SEC and FDA regulations), 201, 243

U

UAN (Universal Application Network), UCM (Universal Customer Master), Oracle/UI (user interface), hierarchy management, 392

UK Financial Services Act of 1986, 49

Ukraine, MDM challenges, 51

unidirectional synchronization flows, 129

uniformed architecture approach, implementing MDM, 37

unique identifiers

aggregating entity information with, 161

discriminating attributes and, 336

entity matching and generation of, 85, 155–156

generating/managing in Data Quality layer, 107, 153

Key Generation service storing and managing, 163

Registry-style Data Hub acting as master of, 100

unit testing, 381

United States Postal Service (USPS) information, Acxiom licensing, 439

Universal Application Network (UAN), Universal Customer Master (UCM), Oracle/Siebel’s MDM, 433

universal identification cards, 38

universality, discriminating attribute, 336

unstructured master data

in healthcare services ecosystem, 63

MDM roadmap view for integration with, 305

MDM technology trends, 452

Upper Threshold, match accuracy, 344

USA Patriot Act

AML and KYC provisions, 201, 206–207

business process requirements, 207–208

data protection and privacy regulations, 48

using MDM to comply with, 8, 22

use case examples, ERM, 255–257

Use Pattern, classification dimension, 21, 102–103

MDM solution, 433

user interface (UI), hierarchy management, 392

MDM, 433

user involvement

project failure from lack of, 447

socialization challenge of MDM, 42

user provisioning

Access Certification with, 223

as business requirement, 220

provisioning and deprovisioning users, 222–223

user security, 217, 230–233

USPS (United States Postal Service) information, Acxiom licensing, 439

V

validation

discriminating attributes and, 336

legacy system data entry, 373

of relationship rules, 360

use case with Reconciliation Engine, 369

value proposition, business

challenges of selling MDM inside enterprise, 39

data quality technology tools in, 83

defining compelling, 35

improving business processes, 317

lines of business and functions in, 318

reasons for MDM project failure, 446

for reference architecture, 105–106

senior management commitment and, 38

through business and operational drivers. See business and operational drivers of MDM

vendors

data-at-rest, 252

ETL, 378–379

GLBA data protection, 205

obtaining Data Hub data model from, 396

partnerships with, 44–45

vendors and their products, MDM

Acxiom, 439

Dun & Bradstreet Purisma, 438–439

IBM, 431–433

Informatica, 434–435

market consolidation and, 430

MDM market trends, 451

Oracle, 433–434

overview of, 429–430

references, 440

SAP, 436

SAS DataFlux, 436–437

Tibco, 437–438

verification, as business requirement, 219

VeriSign, 231

versioning requirements, MDM data modeling, 177

vertex, Small World theory, 169–170

viewpoints, MDM architecture, 98–103

Design and Deployment dimension, 99–102

Information Scope or Data Domain dimension, 103

overview of, 89–90

patterns vs., 89

reference architecture viewpoint, 105–109

reference data and hierarchy management, 103–105

references, 109

services. See services architecture viewpoint

Use Pattern dimension, 102–103

Virtual Private Networks. See VPNs (Virtual Private Networks)

viruses, 241

visibility. See data visibility

visibility context, 269

VPNs (Virtual Private Networks)

data-in-transit security, 248–249

network security using, 217

overview of, 229

W

W3C (World Wide Web Consortium) defining SOA, 90–91

WS-Policy, 265

WAP (Wireless Application Protocol), 230

watch lists, 58

Web servers, building infrastructure, 394

Web Services

identity management requirement for, 221–222

introduction to, 92–94

security concerns, 235–236

SOA for, 92, 94

testing in MDM, 385–386

Web Services Architecture (WSA), 93

WebSphere ProfileStage, 433

WebSphere QualityStage, 433

well-formed identifiers, 366

Windows CardSpace, identity federation, 234

Wireless Application Protocol (WAP), 230

WS-Policy, 265, 269

WS-Security, 236, 265

WSA (Web Services Architecture), 93

WTLS (Wireless Transport Layer Security) protocol, 230

X

XACML (eXtensible Access Control Markup Language)

implementing policy-enforced visibility, 269–271

integrating conceptual security/visibility, 277

policy decision/enforcement in, 274

policy enforcement architecture, 275

separation of duties principle in, 272

visibility and security architecture requirements, 278–280

XRI (eXtensible Resource Identifier), 269–270

XrML (XML licensing standard), 255

Z

Zachman, John, 86–89

ZIFA Zachman’s Institute for Framework Advancement), 87–89

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.166.94