{"id":1370,"date":"2010-06-14T01:00:00","date_gmt":"2010-06-14T09:00:00","guid":{"rendered":"https:\/\/systematichr.com\/?p=1370"},"modified":"2010-06-19T22:08:25","modified_gmt":"2010-06-20T06:08:25","slug":"business-intelligence-and-data-dispersion","status":"publish","type":"post","link":"https:\/\/systematichr.com\/?p=1370","title":{"rendered":"Business Intelligence and Data Dispersion"},"content":{"rendered":"<p><a href=\"https:\/\/systematichr.com\/wp-content\/uploads\/2010\/06\/BI.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-1550\" title=\"BI\" src=\"https:\/\/systematichr.com\/wp-content\/uploads\/2010\/06\/BI-150x150.gif\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>Data Encryption with business intelligence and reports has always been a problem.\u00a0 Users are constantly requesting reports, and once data is in someone\u2019s hands, it\u2019s almost impossible to control data dissemination and what I\u2019ll call data diaspora.\u00a0 One must admit, especially in large organizations, that trying to put controls from a procedural perspective is not particularly realistic.\u00a0 With hundreds or thousands of managers out there, controlling the actions of each person is particularly difficult.<\/p>\n<p>In the good old days of ad hoc report files, excel spreadsheets, and powerpoints, any person who got their hands on data could easily forward it to someone else.\u00a0 The fact is that technology was sufficiently difficult to use that most organizations, even the very large ones, have used Excel as the easiest way to aggregate and analyze data from multiple sources.\u00a0 Even for single source reports, excel has long been the easiest way to communicate a data set.\u00a0 Managers didn\u2019t really have robust capabilities to tap into reports on their own, and even then, one of the selling points from software vendors has been the ability to export data into excel where managers or practitioners could continue analysis.<\/p>\n<p>HR technologists have been talking about dashboards and business intelligence for years, but it does seem that the lately emergent technologies are finding some adoption in larger organizations.\u00a0 Perhaps this is just maturity of the technology, perhaps the prices have started coming down from the fully customized ERP BI software to more vanilla and off the shelf analytics tools, or perhaps it\u2019s possible that spending was just down so far in the last 2 years that nobody was buying the stuff.\u00a0 Whatever the reasons, the technology and the market seems to be ready now.<\/p>\n<p>Certainly, increased controls are now much more prevalent with each manager going to their own dashboard to view data, and with the large number of analytics available in the HR and talent realms, ad hoc requests are hopefully going down.\u00a0 All this just means that if you can deliver a set of analytics to the manager desktop as opposed to frequent ad hoc requests, your data is controlled by the application security layer upon delivery.\u00a0 Since you have never sent an email with an excel spreadsheet, there is no data to be fowarded.<\/p>\n<p>You\u2019ll argue with me that this technology has been around for years upon years \u2013 at least a decade.\u00a0 I\u2019ll absolutely agree that this is true, but I\u2019m pretty sure that every single vendor out there (whether publicly or not) will agree with me that until recently the delivered reports were not sufficiently robust or comprehensive.\u00a0 ERP vendors are now also delivering robust prebuilt analytics with sufficient drill downs and drill throughs.\u00a0 The goal of the whole thing is to have enough data presented in a simple but detailed enough manner to eliminate most ad hoc needs.\u00a0 If you can create an environment that does this, you utilize your application&#8217;s security as opposed to releasing your data to the winds of fate.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data Encryption with business intelligence and reports has always been a problem.\u00a0 Users are constantly requesting reports, and once data is in someone\u2019s hands, it\u2019s almost impossible to control data dissemination and what I\u2019ll call data diaspora.\u00a0 One must admit,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[28,27,2],"tags":[158,69,159],"class_list":["post-1370","post","type-post","status-publish","format-standard","hentry","category-communications","category-data-metrics","category-hr-technology","tag-business-intelligence","tag-data-governance","tag-data-security"],"_links":{"self":[{"href":"https:\/\/systematichr.com\/index.php?rest_route=\/wp\/v2\/posts\/1370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/systematichr.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/systematichr.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/systematichr.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/systematichr.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1370"}],"version-history":[{"count":5,"href":"https:\/\/systematichr.com\/index.php?rest_route=\/wp\/v2\/posts\/1370\/revisions"}],"predecessor-version":[{"id":1552,"href":"https:\/\/systematichr.com\/index.php?rest_route=\/wp\/v2\/posts\/1370\/revisions\/1552"}],"wp:attachment":[{"href":"https:\/\/systematichr.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/systematichr.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/systematichr.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}