Research projectContent Assume you are a newly appointed Chief Information Officer at an organization of your choosing (could be your current employer, a professional organization you’re involved...

1 answer below »











  • Research projectContent





    1. Assume you are a newly appointed Chief Information Officer at an organization of your choosing (could be your current employer, a professional organization you’re involved with, or a company you are interested in – please make sure, however, that whatever organization you pick is adequately large to enable you to conduct meaningful research, for the purposes of this project). Given the importance of data as a strategic organizational asset, and the potential liability associated with inadequate data security, one of your top priorities is to conduct a thorough data audit, with particular emphasis on detailing data security measures and protocols, and data access, usage and sharing mechanisms and protocols. Your task is as follows:



      1. to catalog and describe data capture, purchased and otherwise owned by your organization;

      2. to describe specific data access, usage and sharing protocols, and technologies employed and deployed, respectively, by your organization expressly for the purpose of data governance and security;

      3. to identify ‘best practices’ in relation to #2 above, as used by your organization’s peers (e.g., competitors, other companies in the same industry);

      4. to identify ‘points of excellence’ (i.e., where your organization’s practices reflect the industry’s best practices) and ‘areas in need of improvement’ (i.e., where your organization’s practices are noticeably below those of peer companies);

      5. to outline the recommended plan for maintaining ‘points of excellence’ and rectifying ‘areas in need of improvement’.







    Two to three page paper (double spaced written text, not including graphics)




  • I will provide you with an Inventory template (you may attach separately or embed it in the document - it will count as a figure).
    Data Catalog for Final Project (Template)




  • Standard writing structure (intro, body, conclusion) using APA citation guidelines





    • Introduction - what are you going to talk about




    • Body - A section for each of the 5 areas you have been asked to discuss




    • Conclusion - what did you talk about; what was the summary





  • Research, discuss and relate course concepts and your perspective for each of the 5 topics identified in the project task list.





    • You may use a sample table to assist in the “cataloging” of the data sources used by your organization




    • You may use graphics/figures to support your paper




    • NOTE: if you use tables and graphics DO NOT count the figures/tables as part of the written two pages





  • For each of the tasks, the rubric on the next page will be used




  • Submit via Blackboard on the required date



Answered Same DayOct 22, 2021

Answer To: Research projectContent Assume you are a newly appointed Chief Information Officer at an...

Jayageetha answered on Oct 25 2021
157 Votes
Running head: SHORTENED TITLE UP TO 50 CHARACTERS
    1
    SHORTENED TITLE UP TO 50 CHARACTERS
    2
Data Management at Wipro Technologies Ltd.,
Abstract
Data is the bloodline for a company. The technologies and strategies used to collect, store, interpr
et and publish data pave a way for building the image of a company in the eyes of the world. We can manage things only when we measure them (McAfee, 2012). Data analytics is a hot topic in today’s trend and is resource starving. Hence the role of Chief Information Officer, who is responsible for all the data assets of a company is vital. Periodic Data audits secure the vital information of a company and hence promote growth and development. It will help a company to draw standards and commit itself to it. It can also help the company identify its strengths and areas that need focus. Apart from collecting data, it is important to grant access and sharing the data securely across the internet through proven cryptographic methods, which the company feels need an improvement.
Data Management
The initial step towards data management is collecting the data. Data can be qualitative or quantitative. The former employs techniques like social questionnaire, small-world techniques, episodic communication channels in organization (ECCO), etc. (Zwijze-Koning, 2005), All these are a part of network analysis to look at the overall qualitative performance of the company. Quantitative data include, employee’s portfolio, salary stack, company’s official figures, IPR and other vital information. It forms the major game changer in a company’s profile and is collected and interpreted using Extract, Transform and Load (ETL), Hadoop, R-Programming, E-Business Suite (EBS) of Oracle, Enterprise Resource Planning (ERP) and stored in the Enterprise Data Warehouse (EDW) as Comma Separated Values (CSV). In our company, among the collected data, the critical information assets are identified using weighted factor analysis (WFA). They are classified based on their impacts on the business value. They include, Copyrights, patents and other sensitive information about the company and the staff on the whole.
Granting access to the collected data and determining which group of people should be given grant is the next step in using the information wisely. For instance, the biometrics and salary profile of an employee should be handled by the Human resource manager so as to maintain the employee entry and exit formalities on time.
All the data, in our company are...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here