KP – Cloud Chapter 3-7

 Kavis, Michael J. (2014). Architecting the Cloud: Design Decisions for Cloud Computing
Service Models, (3rd Edition). Hoboken, New Jersey: John Wiley & Sons, Inc., ISBN-
13: 978-1118617618 

Discussion: ITS-833: Information Governance – Privacy and Security Considerations for Information Governance

Discussion: Privacy and Security Considerations for Information Governance

Word count: 300+ words

According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.   

For this discussion, find an example of a security breach that compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend being in place (be certain to remember to cite sources) that could have prevented this breach from occurring. Share an applicable personal experience

  • Provide an outside source that applies to the topic, along with additional information about the topic (please cite properly in APA).
  • At least one scholarly source should be used in the discussion. Be sure to use information from your readings. 
  • Use proper citations and references in your post

Textbook: 

For this assignment, please read chapters 11 and 12 from the below textbook.

Chapter 11 – Information Governance and Privacy and Security Functions
Chapter 12 – Information Governance for E-Mail and Instant MessagingManagement 

Title: Information Governance, ISBN: 9781118421017 Authors: Robert F. Smallwood Publisher: John Wiley & Sons Publication Date: 2014-03-28

Note: plagiarism check required, APA7 format, include References, within 8hrs

Research Ethics and Plagiarism Paper

 

Write a Ethic and Plagiarism paper with the following content:

  1. Introduce what Ethical Standards and Plagiarism is in Research
  2. Describes the ethical and legal principles in writing and research regarding goals of ensuring the accuracy of scientific knowledge, protecting rights and welfare of research participants, and protecting intellectual property rights.
  3. Describe how to avoid plagiarism, understand risks and consequences, cite sources properly and how to develop sound writing principles
  4. Describe informed consent and its importance
  5. Describe research bias and how to avoid and overcome it
  6. Provide a summary of all information previously offered

 

  • Assignment Format: APA format 
  • Submission Format: MS Word 
  • Length: 8 pages (not including cover & references pages)
  • Citations Required: Minimum 2 – 3 scholarly citations and 2 – 3 Professional Citations

Final Research Paper

Choose a publicly available data visualization. (be sure to provide the link, cite, and reference).

Analyze the visualization within the context of the data visualization workflow.

Create a proposal of enhancements to create a better user/viewer experience.

Use the data visualization workflow as a framework for both your analysis and your proposal.

Consider the various roles of the project team as specified by Kirk’s concept of “hats”.

APA compliance required.

References and In-text citations required.

Minimum word count = 1500.

Technology Projects

Part 1:

Sunstein (2014) suggested that many people making small contributions can complete significant projects. There are several stories of an idea taken on by a small group of people and transformed into a very significant development (Bill Gates and Microsoft come to mind). Describe such an action and how this action affected technology and the world in a positive manner. Were there any downsides to the results?

Part 2:

Contributing to a project is an important part of working in a team environment.  Consider a scenario where you’re interviewing for a position and are asked to discuss your previous contributions to a team in an ethical context. How can you best convey your skills in working with a team while maintaining your ethical boundaries?  Research appropriate interview styles and identify what interview style will work to convey your abilities in this area.

Sunstein, C.R. (2014). Nudging: A very short guide. Journal of Consumer Policy 37, 583-588. https://doi.org/10.1007/s10603-014-9273-1 

CREATE A PRESENTATION

 Upper Coast Bank has branches all over the United States. Sophia Baker, the Vice President of Residential Lending at the Hartford, Connecticut branch, hired you as her executive assistant. Sophia wants to create a simple presentation that will help her explain some of the details about applying for a mortgage to first-time home buyers. She asks you research all the details for applying for a mortgage for first-time home buyers and then create the presentation that the company will be using to present the information to the customers. Sophia is depending on you to represent the company well with this presentation. 

Analyse the data

Attached is the last 6 months of data for one of our websites. Please analyse the data pulling out key trends of performance and actions you would advise the trading team to take to generate more income. Please also consider how you would show the data to key stakeholders to inform them on trade performance.

Present back your findings in detail notes.

***Sample file attached below***

10s1

ead SP 800-37 revision 1 (http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf (Links to an external site.)), and compare and contrast the six (6) step risk management framework (RMF) lifecycle with the COSO ERM cube discussed by Paul Hopkin on pp. 62-64 of the course text.  For additional information on the COSO ERM cube, refer to the 2004 ERM – Integrated Framework Executive Summary (http://www.coso.org/documents/coso_erm_executivesummary.pdf (Links to an external site.))