Computer Science ›› 2020, Vol. 47 ›› Issue (11A): 520-523.doi: 10.11896/jsjkx.200200062

• Big Data & Data Science • Previous Articles     Next Articles

Study on Impact Assessment Model of Enterprise Data Application

YUE Wen-jiao1,2, LI Peng1, WEN Jun-hao2, XING Bin1,3   

  1. 1 Chongqing Industrial Big Data Innovation Center,Chongqing 400000,China
    2 School of Big Data and Software,Chongqing University,Chongqing 400000,China
    3 National Engineering Laboratory of Industrial Big Data Application Technology,Beijing 100000,China
  • Online:2020-11-15 Published:2020-11-17
  • About author:YUE Wen-jiao,born in 1995,postgra-duate.Her main research interests include data processing,and edge computing.
    LI Peng,born in 1985,Ph.D,resear-cher,is a member of China Computer Federation.His main research interests include and data analysis.
  • Supported by:
    This work was supported by the National Key Research and Development Project(2019YFB1706104).

Abstract: Aiming at the problems of low data utilization rate and difficult data quality assessment,considering Chinese enterprise data governance and application requirements,in conjunction with the US RMDS laboratory,from the perspective of enterprise data application,the data science assessment dimension is creatively added,and compatible with existing mainstream assessments is proposed Enterprise data impact assessment model (DIAM) framework that is based on the model and better meets the needs of Chinese enterprises.Considering that the existing DIAM model has not yet proposed a specific and feasible evaluation method,based on the model framework research,this paper studies the evaluation method and rating strategy for the DIAM model.To carry out the research,first,this paper uses an improved analytic hierarchy process to calculate the weights of 240 evaluation indicators covering the four dimensions of the DIAM model,covering the three dimensions of data top-level design,data science,and data management.Then,based on the weight calculation,it researches Top-down model evaluation method.Further,it proposes a five-level data impact evaluation level,and defines a comprehensive rating adjustment strategy for the rating results.Through analysis,the improved DIAM model can be applied to enterprise data application impact evaluation for enterprises,and provides a scientific basis for enterprise data governance and application capability.

Key words: Analytic hierarchy process, Data application impact, Data governance, Data maturity model, DIAM model

CLC Number: 

  • TP319
[1] MENG X F,CI X.Big data management:concepts,technologies and challenges[J].Computer Research and Development,2013,50(1):146-169.
[2] SCALA N M,RAJGOPAL J,VARGAS L G,et al.Group Decision Making with Dispersion in the Analytic Hierarchy Process [J].Group Decision and Negotiation,2016,25(2):355-372.
[3] EDM Council.DCAM:the data management capability assess-ment model[EB/OL].[2019-09-25].https://edmcouncil.org/page/aboutdcamreview.
[4] CMMI Institute.Data Management Maturity (DMM)[EB/OL].https://www.cmmiinstitute.com/data-manage-ment-maturity.
[5] China national engineering laboratory of industrial big data application technology,Global Association for Research Methods and Data Science[M]//Enterprise Data Application Influence White Paper.Guizhou,China,California,USA,2019.
[6] YANG Y,WANG H T,JANG Y,et al.Research on software quality evaluation model based on fuzzy analytic hierarchy process[J].Computer and Digital Engineering,2017,45(4).
[7] WANG J L,WU B,XU Y,et al.Study on optimizing water supply performance index weight by improving AHP method[J].Science and Technology Management Research,2019,39(9):49-55.
[8] GAYTHER S.The Analytic Hierarchy process[M]//Encyclopedia of Biostatistics.John Wiley & Sons,2017:19-28.
[9] QIN Z Y.Research on university library data governance andmaturity model under big data environment[J].New Century Library,2019(11):62-67.
[10] XU L X,YUAN L.Research on maturity assessment of local government data opening portal[J].Library and Information Work,2019,63(12):52-58.
[11] LI C,ZHOU C L,HUA B,et al.Information system application maturity evaluation model [J].East China Electric Power,2014,42(11):2428-2431.
[12] FAN Y S.Strategic framework and maturity model of enterprise information management [J].Computer IntegratedManufactu-ring System,2008(7):1290-1296.
[1] WANG Jun, WANG Xiu-lai, PANG Wei, ZHAO Hong-fei. Research on Big Data Governance for Science and Technology Forecast [J]. Computer Science, 2021, 48(9): 36-42.
[2] LIU Zi-qi, GUO Bing-hui, CHENG Zhen, YANG Xiao-bo and YIN Zi-qiao. Science and Technology Strategy Evaluation Based on Entropy Fuzzy AHP [J]. Computer Science, 2020, 47(6A): 1-5.
[3] ZHENG Geng-feng. Emergency Plan Evaluation of Special Equipment Accident Based on Intuitionistic Fuzzy Analytic Hierarchy Process [J]. Computer Science, 2020, 47(6A): 616-621.
[4] FENG Shen-feng, GAO Jian-hua. Test Case Prioritization Method Based on AHP for Regression Testing [J]. Computer Science, 2019, 46(8): 233-238.
[5] ZHENG Zhi-yun, JIA Chun-yuan, WANG Zhen-fei and LI Dun. Computing Research of User Similarity Based on Micro-blog [J]. Computer Science, 2017, 44(2): 262-266.
[6] WAN Xue-lian and ZHANG Jing-he. Research on Comprehensive Assessment Method of Information System Security Based on System Attack and Defense [J]. Computer Science, 2016, 43(Z6): 322-327.
[7] SHAN Mei-jing. Analytic Hierarchy Process-based Assessment Method on Mobile Payment Security [J]. Computer Science, 2015, 42(Z11): 368-371.
[8] CHEN Xi-hong, JIN Yue-hui and YANG Tan. Study on Quality Assessment Model for Mobile Videos over 3G Network [J]. Computer Science, 2015, 42(9): 86-93.
[9] WANG Lei,YE Jun and ZHANG Hong-li. Rough Set and Analytic Hierarchy Process-based Approach on Supplier Selection [J]. Computer Science, 2014, 41(3): 80-84.
[10] JIANG Zheng-wei,ZHAO Wen-rui,LIU Yu and LIU Bao-xu. Model for Cloud Computing Security Assessment Based on Classified Protection [J]. Computer Science, 2013, 40(8): 151-156.
[11] . Analytic Hierarchy Process (AHP)-based Vulnerability Quantitative Assessment Method for Information Systems [J]. Computer Science, 2012, 39(7): 58-63.
[12] ZHANG Hai-tao,WANG Hui-qiang. Autonomic Dependability Evaluation of Autonomic System for Service-oriented [J]. Computer Science, 2011, 38(1): 158-161.
[13] LU Zhen-bang,ZHOU Bo. Network Security Situation Assessment Based on WOWA-FAHP [J]. Computer Science, 2009, 36(7): 63-67.
[14] . [J]. Computer Science, 2006, 33(9): 121-124.
[15] . [J]. Computer Science, 2006, 33(6): 73-75.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!