Toxic Content and Data Governance
|
|
|
- Dominick Fleming
- 10 years ago
- Views:
Transcription
1 IBM Data Software Governance Group Council Toxic Content and Data Governance Steven Adler IBM Data Governance Solutions IBM Corporation
2 The Dreadful Details, by Eric Baudelaire 2007 IBM Corporation 2
3 A lot of time you really can't trust what you see IBM Corporation 3
4 To the public, these men are members of a familiar fraternity, presented tens of thousands of times on television and radio as military analysts whose long service has equipped them to give authoritative and unfettered judgments about the most pressing issues of the post-sept. 11 world. Hidden behind that appearance of objectivity, though, is a Pentagon information apparatus that has used those analysts in a campaign to generate favorable news coverage of the administration s wartime performance, an examination by The New York Times has found. The effort, which began with the buildup to the Iraq war and continues to this day, has sought to exploit ideological and military allegiances, and also a powerful financial dynamic: Most of the analysts have ties to military contractors vested in the very war policies they are asked to assess on air. - NY Times, April 20, IBM Corporation 4
5 The Credit Crisis has its own victims of Toxic Content 2007 IBM Corporation 5
6 The Loan Origination Process 2007 IBM Corporation 6
7 IBM Data Governance Council, Founded in 2004 Customers Business Partners Abbott Kasikornbank Application Security American Express Key Bank Axentis Bank of America MasterCard Continuity Software Bank of Montreal Merrill Lynch Guardium Bank of Tokyo/Mitsubishi Novartis Intellinx Bell Canada Nordea Bank Involv Citigroup PFG Micropole-Univers Chevron RFG OpenPages Danske Bank TIAA-CREF Paisley Deutsche Bank TeliaSonera Perficient Discover Financial VP Securities Services RiskWatch Equifax Washington Mutual SecNap Fannie Mae Wachovia Tizor FSTC The World Bank Veronis 2007 IBM Corporation 7
8 Data Governance Council Maturity Model Requires Data Risk Management & Compliance Outcomes Value Creation Enablers Organizational Structures & Awareness Enhance Stewardship Policy Core Disciplines Data Quality Management Information Life-Cycle Management Information Security and Privacy Supporting Disciplines Supports Data Architecture Classification & Metadata Audit, Logging & Reporting 2007 IBM Corporation 8
9 The Maturity Model Identifies Current and Desired States of DG Maturity 2007 IBM Corporation 9
10 IBM has developed a DG Scorecard 2007 IBM Corporation 10
11 XBRL for Risk Reporting New standards are needed in Risk Measurement and Capitalization Reporting to regulatory authorities is the leading edge of that need IBM Data Governance Council is initiating standards consultations with: Customers Partners US Regulatory Authorities European Regulatory Authorities Asian Regulatory Authorities XBRL standards organizations We see the need for a widespread dialog We invite other interested parties to participate in this dialog as we consider appropriate standards in Risk Measurement, Capitalization, and Reporting 2007 IBM Corporation 11
12 Speakers Today IBM Data Governance Council CHAIR / MODERATOR 1. Steven Adler, Director IBM Data Governance Solutions, USA "Toxic Content and The Need for Data Governance"? SPEAKERS 2. Bent Poulsen, Chief Auditor VP, Denmark 3. Renaud Finaz de Villaine, Directeur Marketingt Micropole-Univers, France 4. Michael Dziekan, Office of Strategy - Director of Research & Solutions Strategy, Cognos an IBM Company, USA 5. Jacques Bus, Head of Security Unit, DG INFOSO & Media, European Commission 6. Sokratis Katsikas, Professor Dept. of Technology Education & Digital Systems, University of Piraeus & member of the Board of the 7. Paris Kokorotsikos, Chairman & CEO Euroconsultants SA, Greece 8. Zahid Jamil, Barrister-at-law, Jamil & Jamil, Pakistan 9. Jean-Marc Suchier VP, Director European Programs, Sagem Securité 10. Thomas Myrup Kristensen, EU Policy Director, Microsoft EMEA, Denmark 11. Thomas Hart, Regulatory Expert EU-China Information Society Project, China 2007 IBM Corporation 12
13 IBM Data Software Governance Group Council Thank You 2007 IBM Corporation
How To Govern Data Effectively
IBM Data Governance Council The Six Questions every Organization should ask about Data Governance Steven B. Adler IBM Data Governance Solutions [email protected] http://www.ibm.com/itsolutions/datagovernance
How To Manage Data
A Flash-light into the Dark: The Starters Guide to Data Governance Steven Adler IBM Data Governance Solutions [email protected] http://www.ibm.com/itsolutions/datagovernance Audience Question 2 Agenda
The IBM Data Governance Council Maturity Model: Building a roadmap for effective data governance
October 2007 The IBM Data Governance Council Maturity Model: Building a roadmap for effective data governance Page 2 Introduction It s been said that IT is the engine for growth and business innovation
Information Governance as a Holistic Approach to Managing and Leveraging Information
Information Governance as a Holistic Approach to Managing and Leveraging Information BeyeNetwork Custom Research Report Prepared for IBM Corporation By Judith R. Davis Brought to you compliments of Copyright
Information Governance as a Holistic Approach to Managing and Leveraging Information
Information Governance as a Holistic Approach to Managing and Leveraging Information BeyeNetwork Custom Research Report Prepared for IBM Corporation By Judith R. Davis TABLE OF CONTENTS Executive Summary
Enterprise Data Management
Enterprise Data Management - The Why/How/Who - The business leader s role in data management Maria Villar, Managing Partner Business Data Leadership Introduction Good Data is necessary for all business
Getting Started with Data Governance. Philip Russom TDWI Research Director, Data Management June 14, 2012
Getting Started with Data Governance Philip Russom TDWI Research Director, Data Management June 14, 2012 Speakers Philip Russom Director, TDWI Research Daniel Teachey Senior Director of Marketing, DataFlux
IBM Information Governance
Information Governance Practice IBM Information Governance Michel Bouma Information Governance Practice Leader Europe Data Stewardship at Social Services Agency Questions from Legislature How many children
A Governance Framework for Building Secure IT Systems *
A Governance Framework for Building Secure IT Systems * Abdelwahab Hamou-Lhadj 1 and AbdelKrim Hamou-Lhadj 2 1 Department of Electrical and Computer Engineering Concordia University 1455 de Maisonneuve
DATA GOVERNANCE AT UPMC. A Summary of UPMC s Data Governance Program Foundation, Roles, and Services
DATA GOVERNANCE AT UPMC A Summary of UPMC s Data Governance Program Foundation, Roles, and Services THE CHALLENGE Data Governance is not new work to UPMC. Employees throughout our organization manage data
Business Glossary. Data Governance; Yet there is a ton of Technology. Aspen Information Solutions, Inc Castle Rock 720 352-8575 www.aspensols.
Business Glossary Business Intelligence Data Architecture Master Data Management Data Governance; It s all about the People and Process Yet there is a ton of Technology Aspen Information Solutions, Inc
Ten Steps to Quality Data and Trusted Information
Ten Steps to Quality Data and Trusted Information ABSTRACT Do these situations sound familiar? Your company is involved in a data integration project such as building a data warehouse or migrating several
InfoSphere Governance Solutions Maximizing your Information Supply Chain
Kimberly Madia, IBM InfoSphere Product Marketing [email protected], 412-667-3256 InfoSphere Governance Solutions Maximizing your Information Supply Chain Information Management Version 2010.09.03 What
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems Proactively address regulatory compliance requirements and protect sensitive data in real time Highlights Monitor and audit data activity
Credit Markets Symposium 2009 Speaker Bios
Credit Markets Symposium 2009 Speaker Bios Sally Green Master of Ceremonies Sally Green became first vice president of the Federal Reserve Bank of Richmond in 2006, after working nearly 30 years at the
Big Data and Big Data Governance
The First Step in Information Big Data and Big Data Governance Kelle O Neal [email protected] 15-25- 9661 @1stsanfrancisco www.firstsanfranciscopartners.com Table of Contents Big Data
Six easy steps for smart governance
IBM Software Thought Leadership White Paper June 2010 Six easy steps for smart governance 2 Six easy steps for smart governance Introduction Consider the modern enterprise and its many sources of internal
Data Governance: proven steps to transform Information into an Asset
Data Governance: proven steps to transform Information into an Asset Apple Maps vs Google Maps Source: http://www.tomshardware.com/picturestory/607-ios-maps-fail.html Bad business because of data Make
The Key Components of a Data Governance Program. John R. Talburt, PhD, IQCP University of Arkansas at Little Rock Black Oak Analytics, Inc
The Key Components of a Data Governance Program John R. Talburt, PhD, IQCP University of Arkansas at Little Rock Black Oak Analytics, Inc My Background Currently University of Arkansas at Little Rock Acxiom
Data Governance With a Focus on Information Quality
MIT Information Quality Industry Symposium, Information Quality By Gwen Thomas, President, The The Data Governance Institute Objectives of this presentation Identify interdependencies between Information
DISCIPLINE DATA GOVERNANCE GOVERN PLAN IMPLEMENT
DATA GOVERNANCE DISCIPLINE Whenever the people are well-informed, they can be trusted with their own government. Thomas Jefferson PLAN GOVERN IMPLEMENT 1 DATA GOVERNANCE Plan Strategy & Approach Data Ownership
FANNIE MAE CORPORATE GOVERNANCE GUIDELINES
FANNIE MAE CORPORATE GOVERNANCE GUIDELINES 1. The Roles and Responsibilities of the Board and Management On September 6, 2008, the Director of the Federal Housing Finance Authority, or FHFA, our safety
DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE
TECHNICAL PROPOSAL DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE A White Paper Sandy Bacik, CISSP, CISM, ISSMP, CGEIT July 2011 7/8/2011 II355868IRK ii Study of the Integration Cost of Wind and Solar
Business Data Authority: A data organization for strategic advantage
Business Data Authority: A data organization for strategic advantage Collibra Data Governance Software Company Reference Customers Business Data Growth and Challenge TREND Exploding volume, velocity and
RIGHT FROM THE START: RESPONSIBILITIES of DIRECTORS of N0T-FOR-PROFIT CORPORATIONS
RIGHT FROM THE START: RESPONSIBILITIES of DIRECTORS of N0T-FOR-PROFIT CORPORATIONS Attorney General ERIC T. SCHNEIDERMAN Charities Bureau www.charitiesnys.com Guidance Document 2015-6, V. 1.0 Issue date:
Developing Leaders Who Deliver Results
Abbott Labs Accenture Allstate Adventist Health Systems Bank One Carat Media Group Children's Memorial Hospital Cognex Corporation Daimler Chrysler Discover Deloitte Consulting Sales Coaching & Business
Washington State s Use of the IBM Data Governance Unified Process Best Practices
STATS-DC 2012 Data Conference July 12, 2012 Washington State s Use of the IBM Data Governance Unified Process Best Practices Bill Huennekens Washington State Office of Superintendent of Public Instruction,
How To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
EUROPEAN CONFEDERATION OF INSTITUTES OF INTERNAL AUDITING (IVZW)
EUROPEAN CONFEDERATION OF INSTITUTES OF INTERNAL AUDITING (IVZW) Phil Tarling PRESIDENT Carolyn Dittmeier VICE PRESIDENT Head Office: c/o IIA Belgium Koningstraat 109-111, bus 5 - B-1000 Brussels (Belgium)
Industry Models and Information Server
1 September 2013 Industry Models and Information Server Data Models, Metadata Management and Data Governance Gary Thompson ([email protected] ) Information Management Disclaimer. All rights reserved.
IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE. Copyright 2012, SAS Institute Inc. All rights reserved.
IRMAC SAS INFORMATION MANAGEMENT, TRANSFORMING AN ANALYTICS CULTURE ABOUT THE PRESENTER Marc has been with SAS for 10 years and leads the information management practice for canada. Marc s area of specialty
IDENTITY THEFT AND DATA BREACH CONFERENCE 2016
IDENTITY THEFT AND DATA BREACH CONFERENCE 2016 Day 1 Thursday January 28, 2016 INTERNATIONAL DATA PRIVACY DAY 7:30am 8:30am Registration 8:30am 9:00am Opening Remarks Conference Chair Kevin M. Scott, President
Implementing and Executing Data Governance & Quality Strategy at Northern Trust
N O R T H E R N T R U S T Implementing and Executing Data Governance & Quality Strategy at Northern Trust 12/9/15 Shaun Malott Vice President, Data Governance Northern Trust Wealth Management Katharine
GOVERNANCE DEFINED. Governance is the practice of making enterprise-wide decisions regarding an organization s informational assets and artifacts
GOVERNANCE DEFINED Governance is the practice of making enterprise-wide decisions regarding an organization s informational assets and artifacts Governance over the use of technology assets can be seen
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
Guy Tozer, Doriq Associates DG Conference Europe 2009
Guy Tozer, Doriq Associates DG Conference Europe 2009 Background Speaker Introduction Audience Profile Purpose and Focus of the Presentation Ground-rules and Capabilities doriq associates 2008 2 Enterprise
AN OVERVIEW OF THE SALLIE MAE DATA GOVERNANCE PROGRAM
AN OVERVIEW OF THE SALLIE MAE DATA GOVERNANCE PROGRAM DAMA Day Washington, D.C. September 19, 2011 8/29/2011 SALLIE MAE BACKGROUND Sallie Mae is the nation s leading provider of saving, planning and paying
Expanding Data Governance Into EIM Governance. [email protected] 321-438-0774. The Data Governance Institute page 1
Gwen Thomas President, page 1 has three arms: 1. Training/consulting 2. Membership (The Data Governance & Stewardship Community of Practice) ce) at www.datastewardship.com 3. Information services, publishing
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to
A Flexible and Comprehensive Approach to a Cloud Compliance Program
A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility
BIG DATA. John A. Eisenhauer Chair, Data Governance Society Rick Young - Managing Director 3Sage Consulting
BIG DATA John A. Eisenhauer Chair, Data Governance Society Rick Young - Managing Director 3Sage Consulting WHAT IS BIG DATA? Volume Amount Velocity Frequency of change Variety Complexity Value WHERE DOES
Coach, Inc. Corporate Governance Principles
Coach, Inc. Corporate Governance Principles The following principles have been approved by the Board of Directors and, along with the charters and protocols of the Board committees, provide the framework
The IIA's 2016 International Conference July 17 20, at the Jacob Javits Center in New York, NY
The IIA's 2016 International Conference July 17 20, at the Jacob Javits Center in New York, NY The panel includes: Dale Jeanes, General Auditor at BB&T Moderator Kevin Ryan, Chief Risk Review Officer and
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
Robert P. Bianchi 5502 Chestermill Court Fairfax, VA 22030 E-mail: [email protected] (571) 233-4780 FAX (703)-222-0258
Robert P. Bianchi 5502 Chestermill Court Fairfax, VA 22030 E-mail: [email protected] (571) 233-4780 FAX (703)-222-0258 Experience November 2003 present - Prescription Drug Research Center I provided
Applying IBM Security solutions to the NIST Cybersecurity Framework
IBM Software Thought Leadership White Paper August 2014 Applying IBM Security solutions to the NIST Cybersecurity Framework Help avoid gaps in security and compliance coverage as threats and business requirements
Ron Sheffield, Ed.D. 3517 Robins Way Williamsburg, Virginia 23185 [email protected] (757) 879 8872
Research Interests My overall areas of academic concern are leadership and management with a focus on cultural influence. I am particularly interested in examining the influences of language on culture
STATEMENT OF CORPORATE GOVERNANCE GUIDELINES
STATEMENT OF CORPORATE GOVERNANCE GUIDELINES As Approved by the Board of Directors on October 10, 2005 and Amended on January 25, 2007, April 17, 2008, October 29, 2009, June 30, 2010, August 9, 2012,
secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress
secure Identity and Access Management solutions user IDs and business processes Your business technologists. Powering progress 2 Protected identity through access management Cutting costs, increasing security
WETHERBY ASSET MANAGEMENT
Firm: WETHERBY ASSET MANAGEMENT WETHERBY ASSET MANAGEMENT Asset Manager Headcount: Hidden Founded in Hidden Assets Under Management: Hidden Hidden Hidden Hidden As tech millionaires multiply, wealth advisers
ACCESS MIDSTREAM PARTNERS, L.P. (ACCESS MIDSTREAM PARTNERS GP, L.L.C.) CORPORATE GOVERNANCE GUIDELINES
ACCESS MIDSTREAM PARTNERS, L.P. (ACCESS MIDSTREAM PARTNERS GP, L.L.C.) CORPORATE GOVERNANCE GUIDELINES Access Midstream Partners, L.P. ( Partnership ) is a master limited partnership, governed by a limited
Cyber security in education in Greece
Cyber security in education in Greece Sokratis K. Katsikas [email protected] NIST SP800-50 NIS education in Europe EU Cyber security strategy and NIS directive http://eeas.europa.eu/policies/eu-cybersecurity/cybsec_comm_en.pdf
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Plenary: Compliance and Legal Trends Tuesday, May 24 4:15 p.m. 5:15 p.m.
Plenary: Compliance and Legal Trends Tuesday, May 24 4:15 p.m. 5:15 p.m. Join us for a special session with senior leaders as they discuss key issues affecting the regulatory landscape. Panelists will
How To Protect Yourself From A Hacker Attack
Cybersecurity Demystified: Information Technology Security Trends Joe Oleksak, Plante Moran Agenda Data Security Trends Example Attacks Industry Examples An Answer 1 Who Are The Victims? Targets - victims
International Conference THE EU AND CHINA: REFORM AND GOVERNANCE PROGRAMME
International Conference THE EU AND CHINA: REFORM AND GOVERNANCE Brussels, 4-5 May 2015 Location: European Economic and Social Committee (4 May: full day) & European Parliament (5 May: morning) PROGRAMME
Information Governance Workshop. David Zanotta, Ph.D. Vice President, Global Data Management & Governance - PMO
Information Governance Workshop David Zanotta, Ph.D. Vice President, Global Data Management & Governance - PMO Recognition of Information Governance in Industry Research firms have begun to recognize the
US & India Aerospace, Defense and Security Advisory. A hybrid US/India focused investment advisory, consulting, and private equity fund
US & India Aerospace, Defense and Security Advisory A hybrid US/India focused investment advisory, consulting, and private equity fund 1 About Us Tzar Investment Group, LLC is a global investment advisory,
The following is a summary of the items that Replicator does and does not replicate, with regards to Managed Metadata:
Replicating Managed Metadata Article 11120807-01 Contents Summary... 1 Replicating and Managed Metadata... 1 Managed Metadata Rule... 2 List Items with Multiple Managed Metadata Values... 3 Terms with
Why do Identity and Access Management Projects Fail? With FishNet Security IAM Services Group January 26, 2012
Why do Identity and Access Management Projects Fail? With FishNet Security IAM Services Group January 26, 2012 Introducing Our Presenters Philip Lentz, Chief Identity Strategist Phillip Lentz is the newly
CIBC INVESTOR DAY SPEAKER BIOGRAPHIES. Victor G. Dodig. President and Chief Executive Officer, CIBC
Victor G. Dodig President and Chief Executive Officer, CIBC Victor Dodig is President and Chief Executive Officer of the CIBC group of companies, one of North America's largest financial services institutions.
CHEVRON CORPORATION AUDIT COMMITTEE CHARTER
CHEVRON CORPORATION AUDIT COMMITTEE CHARTER PURPOSE The purpose of the Audit Committee (the Committee ) of the Board of Directors of Chevron Corporation (the Corporation ) is: 1. To assure that the Corporation
FIN 683 Financial Institutions Management Bank Risk: An Overview
FIN 683 Financial Institutions Management Bank Risk: An Overview Professor Robert B.H. Hauswald Kogod School of Business, AU Life is Risky, It mostly Ends Deadly Overview and short introduction to the
The IBM data governance blueprint: Leveraging best practices and proven technologies
May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and
December 6, 2001. Dear Mr. Speaker and Honorable Members of the Standing Committee:
Testimony of Linda Dworak, Executive Director, Garment Industry Development Corporation Before the Assembly Standing Committee on Economic Development, Job Creation, Commerce and Industry, Assembly Standing
INTEGRATING THE TWO WORLDS OF PHYSICAL AND LOGICAL SECURITY
A White Paper Author: Guy Huntington, President, Huntington Ventures Ltd. Date: February 20, 2009 1 Integrating the Two Worlds of Physical and Logical Security Guy Huntington, Huntington Ventures Ltd.
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5015.02 February 24, 2015 DoD CIO SUBJECT: DoD Records Management Program References: See Enclosure 1 1. PURPOSE. This instruction reissues DoD Directive (DoDD)
Master of Public Administration. A Fast Track to Attaining a Prestigious US MPA Qualification
Master of Public Administration A Fast Track to Attaining a Prestigious US MPA Qualification 1 About UMT The University of Management and Technology (UMT), chartered by the State Council of Higher Education
Info-Tech Research Group. Media Kit
Info-Tech Research Group Media Kit Media Support How can our analysts help you? Info-Tech Research Group is a full-service, IT research and advisory company providing tactical and practical advice to IT
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
Data Privacy, Security, and Risk Management in the Cloud
Data Privacy, Security, and Risk Management in the Cloud Diana S. Hare, Associate General Counsel and Chief Privacy Counsel, Drexel University David W. Opderbeck, Counsel, Gibbons P.C. Robin Rosenberg,
Implementing an Information Governance Program CIGP Installment 2: Building Your IG Roadmap by Rick Wilson, Sherpa Software
Implementing an Information Governance Program CIGP Installment 2: Building Your IG Roadmap by Rick Wilson, Sherpa Software www.sherpasoftware.com 1.800.255.5155 @sherpasoftware [email protected]
CIO Global Cloud Computing Adoption Survey Results Summary Slides January 2011. 2011 VMware Inc. All rights reserved
CIO Global Cloud Computing Adoption Survey Results Summary Slides January 2011 2011 VMware Inc. All rights reserved CIO/IDG Research Services Jen McKean Research Director 508.766.5605 (Direct) 508.766.5600
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
Master of Financial Management: Faculty Bios
Master of Financial Management: Faculty Bios Vikas Mehrotra A.F. (Chip) Collins Chair and Professor of Finance Department Chair, Finance and Statistical Analysis Vikas Mehrotra has been a faculty member
