Data, Cleansing, Duplication, Paper
Organizations are struggling to reduce and right-size their information foot-print, using data governance techniques like data cleansing and de-duplication.
Why is this effort necessary? Briefly explain and support from your readings, using APA style citations. Remember to appropriately respond to two other learners for full credit.
In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management step is to develop metrics and measure results. From your required readings, discuss the value that metrics brings to the organization, and identify critical measures of success that should be tracked.
Chapter 4 discusses Information Asset Risk Planning and Management. Explain the five basic steps Smallwood (2019) identified that should be included in an information risk assessment.
Chapter Eight (8): Information Governance and Legal Functions: According to the authors, Smallwood, Kahn, and Murphy (2019), IG is perhaps one of the functional areas that impact legal functions most. Failure to meet them could be literally put an organization out of business or land executives in prison.
Privacy, security, records management, information technology (IT), and business management functions are very important. However, the most significant aspect of all of these functions relates to legality and regulatory compliance from a critical perspective.
For this week’s discussion, FIRST, review the Week 3 folder where you will see the Final Research Paper requirements! Also, view the Week3 Lecture, where the Research Paper requirements are reviewed in detail.
Then, for this week’s discussion board post, identify the industry you will be writing about in your final Research paper and discuss the regulatory compliance requirements that the company has to meet.
Include the corresponding security, privacy, and records management functions that would need to be enabled for that organization. Remember to cite your sources and critically respond to two other learners.
According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies.
Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.
As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.
For this discussion, find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring. Remember to critically respond appropriately to two other leaners for full points.
Our reading by Arinze and Ezema discusses Web 2.0. In our second discussion forum this week, please discuss how you think Web 2.0 has changed the behavior of Internet users. Do you feel the behavior change is for the good or are there disadvantages? Please discuss your thoughts on Web 2.0 including concepts of privacy and social media in a substantive, well-researched discussion thread.
We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today. In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.
The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact.
With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation? Support with references and do your usual critical review of at least 2 other students’ posts.
Discussion Week 5 – The Role of Blockchain in Information Governance
While blockchain is successful with cryptocurrencies, it is also beneficial for information governance in businesses. After reading this article ( https://www.everteam.com/en/role-of-blockchain-in-information-governance/ ), discuss at least two ways you foresee blockchain transforming information governance in businesses. Be sure to utilize sources and provide at least one detailed example of your findings.
We learned from our readings that the use of mobile devices in our society today has indeed become ubiquitous. In addition, CTIA asserted that over 326 million mobile devices were in use within the United States as of December 2012 – an estimated growth of more than 100 percent penetration rate with users carrying more than one device with notable continues growth.
From this research, it’s evident that mobile computing has vastly accelerated in popularity over the last decade due to several factors noted by the authors in our chapter reading. In consideration with this revelation, identify and name these factors, and provide a brief discussion about them.
According to your readings, cloud computing represents one of the most significant paradigms shifts in information technology (IT) history, due to an extension of sharing an application-hosting provider that has been around for many years, and was common in highly regulated vertical industries like banks and health care institutions.
The author’s knowledge from their research continue to assert that, the impetus behind cloud computing lies on the idea that it provides economies of scale by spreading costs across many client organizations and pooling computing resources while matching client computing needs to consumption in a flexible, real-time version.
Identify the issues and risks that pose concern to organizations storing data in the cloud – briefly support your discussion.
as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained.
Though this assessment holds true to the authors, business organizations continue to face significant challenges in meeting their LTDP needs, especially those organizations whose primary mission is to preserve and provide access to permanent records.
Looking at your identified industry for your paper, what considerations would have to be made in developing a long-term archival plan for a company within that industry?