Hello! I need some assistance with this assignment. Please review before agreeing to this bid. I will be cheecking for plagiarism!Thanks :)Part A:Prior to beginning work on this discussion, read Chapt

Hello! I need some assistance with this assignment. Please review before agreeing to this bid. I will be cheecking for plagiarism!Thanks :)Part A:Prior to beginning work on this discussion, read Chapt.

Hello! I need some assistance with this assignment. Please review before agreeing to this bid. I will be cheecking for plagiarism!

Thanks 🙂

Part A:

Prior to beginning work on this discussion, read Chapter 4 in the textbook, the What Wal-Mart Knows About Customers’ Habits (Links to an external site.)Links to an external site. article, the How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did (Links to an external site.)Links to an external site. article, view the Value of Your Personal Data (Links to an external site.)Links to an external site. video, and review any relevant information in this week’s lecture. Research at least one additional credible source on this topic. (Access the MISM Credible Resource Guide (Links to an external site.)Links to an external site. for assistance with finding appropriate credible professional resources.)

In your initial post, analyze the role of data in business by explaining how companies like Walmart and Target are collecting and using consumer data. Evaluate the impact of collecting data on consumer privacy. Provide an example of how your personal data is being collected, and explain what Walmart or Target could learn about you from your purchases. Support your position with evidence from your sources.

Minimum of 300 words.

Part b:

 Prior to beginning work on this discussion, read the Cloud Computing For Business: What is Cloud? (Links to an external site.)Links to an external site. and “A Survey on Security Issues and Solutions at Different Layers of Cloud Computing” articles (found in the online classroom) and review any relevant information in this week’s lecture. Research at least one additional credible source on this topic. (Access the MISM Credible Resource Guide (Links to an external site.)Links to an external site.for assistance with finding appropriate credible professional resources.) 

In your initial post, analyze the role of cloud computing in business, and provide an example of a company that uses cloud computing as a business solution. Identify at least three security issues associated with cloud computing. Distinguish among the hardware components, operating systems, programming languages, and applications that make up cloud computing, and explain how these components can cause or prevent security issues. Based on your research, explain whether or not you would recommend that your company utilize cloud computing as part of their IT Plan. Provide a rationale for your recommendation supporting your statements with evidence from your sources.

Minimum of 300 words.

Part C:

Data Quality and Security

Prior to beginning work on this assignment, review the Week Three Lecture in the left navigation, read Chapters 4 and 14 in the textbook and The Case For ‘Data Governance’ (Links to an external site.)Links to an external site. article, and view the Data: Ethical Use and Storage (Links to an external site.)Links to an external site. video. You will use these sources to support your work in this assignment.

As part of your IT Proposal final assignment, you will explain how your proposed information system solution will ensure data quality and security. This assignment will prepare you for that part of the IT Proposal. Review the instructions provided in the Week Six IT Proposal to begin thinking about how your proposal will address this topic.

The reading in the text provides two key reasons for poor data quality, “the rush to install new systems and the failure to take an integrated view of the organization’s data” (p. 109). Data security breaches seem to occur every other day, and as discussed in the Week Three lecture, there are serious implications for organizations that do not take the necessary measures to ensure data security. Include the following elements in your paper supporting your statements using the required sources for this assignment.

  • Analyze the role of data in information systems for business and describe the risks that can arise from poor data quality.
    • Explain the challenges that can result from poor data quality. Provide an example of the results of poor data quality from your own personal or professional experience.
    • Explain at least two methods of how organizations can ensure good data including the structure and applications necessary.
  • Analyze the risks of poor data security.
    • Research an article in the popular media that covers a recent data breach. Explain the impact of the data security breach on the organization and its leaders using evidence from your article.
  • Explain the role of data governance in keeping data secure.

The Data Quality and Security Paper

  • Must be two to three double-spaced pages (600-900 words) in length (not including title and references pages) and formatted according to APA style.
  • Must include a separate title page with the following:
    • Title of paper
    • Student’s name
    • Course name and number
    • Instructor’s name
    • Date submitted
  • Must use at least two credible sources in addition to the course text.
    • Access the MISM Credible Resource Guide (Links to an external site.)Links to an external site. for assistance with finding appropriate credible professional resources. You may also see the Library’s Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.)Links to an external site. for additional information.
  • Must document all sources in APA style as outlined in the Writing Center.
  • Must include a separate references page that is formatted according to APA style

Hello! I need some assistance with this assignment. Please review before agreeing to this bid. I will be cheecking for plagiarism!Thanks :)Part A:Prior to beginning work on this discussion, read Chapt