Measuring The Economic Value of Data

Today, there are new and changing uses of data in the digital economy. The big questions however are, who is winning with data, where is this data being kept, what makes new data different, when should data be kept, moved, deleted or transformed, how should data be valued, and why data is so much more important than it used to be?

Data is one of the most important assets that any company has, but it’s surprising that we don’t put the same rigor into understanding and measuring the value of our data that we put into more traditional physical assets. 

Furthermore, should data be depreciated as an asset? Or perhaps it appreciates like art. Counter-intuitively, the answer is “yes” to both.

To measure the value of data, we can apply some simple economic principles. For example, we know from IT forecasts that the amount of digital data being produced is much higher than the amount of data storage being purchased. 
Why is this the case? Simply put: Some data is produced, but not stored. Applying a simple supply and demand curve helps to explain why. (Source: IDC Digital Universe, Recode.)
The “supply” curve is storage capacity. This capacity is available at a range of prices, but there is a minimum price threshold for storage capacity. The “demand” curve is data produced. This data creates a demand for storage capacity. That data is stored as long as the value of the data exceeds the cost to store and access it over time. A simple equation to represent this is: 

Data Value (t) >= (Sc + Mc + Ac)/GB/yr * Retention period

Basically data value as a function of time must be greater than the sum of the cost for networking, compute and storage infrastructure(Sc), the cost to maintain the data and infrastructure (Mc) and the cost to access the data (Ac). To normalize between cloud and non-cloud IaaS, all of the measures are per unit per year. This cost is also a function of time, as measured by the retention period for the data.

Of course, in real life, the equation is not quite so simple. The cost to store and maintain data depends on how long it must be kept, whether it must be protected and secured, etc. There is also a penalty for keeping data because there is an increased risk of security violations, and a risk of data loss or data corruption over time.

On the value side of the equation, there is not a well-defined measure for data value. The value of data is really a measure of business value as a result of using or analysing that data in some way. In addition, there is a correlation between the amount of data kept, how accessible that data is, and its value. 

For example, having more data makes all of the data more valuable if the use of the data depends on a historical trend. For example, use of machine learning is already changing the value of larger data sets because most machine learning algorithms work better when trained with large amounts of data.

The area under the curve represents the amount of data that is created but not stored because its value is perceived to be lower than the cost to keep it. If we start with the hypothesis that people would keep all of the digital data that they produce if they could, then we want to eliminate the area under the curve. In order to do that, we need to either lower the cost of storing and maintaining data or increase the value of the data, or both. 

Once we accept the premise that data value should be measured, what would we do with this measure? On the infrastructure side, we focus solutions on maximising the data value measure, rather than a more infrastructure-specific measure, like unit price, power usage efficiency, or cross connect per month cost. 

That will drive innovation in infrastructure solutions in two distinct directions: Lower total cost of ownership on the one hand, and increased enablement for increasing data value on the other hand. This might encompass features for index and search, built in analytics interfaces, data movers, etc.   

Eenterprises need to start applying their own business metrics to establishing a value for their data. Historically, enterprises have done this primarily for measuring changes in data value over time, under the assumption that older data is less valuable because it is accessed less. 

This is no longer a valid assumption, and access to data is not the most relevant measure of its value, but rather the analytical output of data.

Network World

You Might Also Read:

4 Ways to Simplify Your Business Data Management:

Tech Giants Put Big Data To Work:

 

« Cybercrime In The EU - Where Are You Safe?
Global Cyber Conflict Is Close »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

OSSEC

OSSEC

OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS).

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

Crossmatch

Crossmatch

Crossmatch is a world leader in risk-based composite authentication and biometric identity management.

Unitrends

Unitrends

Unitrends helps IT pros do more with less by providing an all-in-one enterprise backup and continuity solution.

SecuLution

SecuLution

SecuLution is an Antivirus product using Application Whitelisting which offers much more protection than Virus Scanners ever can.

infySEC

infySEC

InfySEC is an information security services organization offering Security Technology services, Security Consulting, Security Training, Research & Development.

SPARTA Consortium

SPARTA Consortium

SPARTA tackles hard innovation challenges, leading the way in building transformative capabilities and forming a world-leading cybersecurity competence network across the EU.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

Vilnius Tech Park

Vilnius Tech Park

The region‘s most complex and integrated ICT hub, Vilnius Tech Park aims to attract and unite innovative talent from big data, cyber security, smart solutions, fintech and digital design.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

Darkbeam

Darkbeam

Darkbeam provides a unified solution to protect against security, brand and compliance risks across your digital infrastructure.

Stern Cybersecurity

Stern Cybersecurity

Stern Cybersecurity offers a robust defense against the ever-evolving landscape of digital threats.

CyPro

CyPro

CyPro is a cyber security expert firm that specialises in providing cyber security services tailored for high-growth companies at every stage of their journey.