Information governance.
Research Paper Sentence Outline
Runningheader: Online policies to see how the financial companies manages privacy issues.
7
Rajesh Chamallamudi
Spring 2020 – Information Governance (ITS-833-10) – Second Bi-term
Assignment: Sentence outline of online policies to see how the financial companies manage privacy issues.
Due date: 03/22/2020
University of the Cumberlands
ABSTRACT
As many technology tools are available to collect data and analysis from the internet we need to protect the data and secure customer’s data from hackers. To protect the data from hackers my research paper deals with how to create policies to protect the data.
INTRODUCTION
As being a financial company our major goal is to protect the data from hackers and not to disclose any sensitive data to unauthorized personals or third party vendors. Day by day as technology is growing cyber-crime also increases rapidly among through internet and from website cookies. As I am researching data policy my major goal is to design a policy to manage privacy issues.
LITERATURE REVIEW
(Aleecia M et al.,) understood from research paper how they deal with data privacy techniques and workarounds to mitigate the data leakages from internal or external resources from financial origination. (Pollach Irene, 2007) understood how do we create trust with customers on data protection policies and Identified weaknesses in privacy policies.
RESEARCH METHOD
Per the above research papers and articles and research methods, I have arrived on policy-making aspects In terms of avoiding data leakages. (Julia B. Earp,2005)
· Content analysis: content analysis is a theoretical approach for making valid inferences from text-based data.
· Developing a survey instrument to measure users: This topic deals with a web-based survey like measurement items, pilot testing and survey distribution.
· Survey results.
· Exploratory factor analysis.
· Confirmatory factor analysis.
Based on the above parameter analysis will come to get a conclusion on the good measure for the research question about whether the privacy policy statements provide the information that customers want to understand.
RESULTS
Based on the above research results, it helped a lot to choose the right information technology tool to protect the data from third-party vendors and data hackers. In our organization we did implement a (secure sockets layer) and PCI DSS techniques.
DISCUSSION
I found from the best particle and suggestions that information practice principles determine below 5 principles, (Julia B. Earp,2005).
1. Access/participation,
2. Choice/consent,
3. Enforcement/Redress
4. Integrity/security
5. Notice/Awareness.
SSL/PC DSS software tools that provide data privacy on customer’s data through an online website and provide inbound and outbound securities.
CONCLUSION
I conclude with my research we as a financial company provided 100 % data protection by following the survey techniques and pally the software policy techniques (SSL, PC DSS, EXABEAM and GLBA) in terms of firewall mechanisms avoid from hackers. In the coming future our projects are planning to implement the same techniques as well.
My current research paper contained a sentence outline of each section and in future weeks will develop sentence outlines based on statements that are under each section.
REFERENCE
Aleecia M. McDonald,1 Robert W. Reeder,2 Patrick Gage Kelley, 1 Lorrie Faith Cranor1 1 Carnegie Mellon, Pittsburgh, PA 2 Microsoft, Redmond, WA “A Comparative Study of Online Privacy Policies and Formats” .
Pollach, Irene. (2007). What’s wrong with online privacy policies?. Commun. ACM. 50. 103-108. 10.1145/1284621.1284627.
Julia B. Earp, Member, IEEE, Annie I. Antón, Senior Member, IEEE, Lynda Aiman-Smith, and William H. Stufflebeam. Examining Internet Privacy Policies Within the Context of User Privacy Values IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 52, NO. 2, MAY 2005.
University of the Cumberlands
School of Computing and Information Sciences
Certification of Authorship
Submitted to (Professor’s Name): Dr. Mary Cecil
Course: __ITS 833_Information Governance
Student’s Name: _Rajesh Chamallamudi
Date of Submission: 03/22/2020
Purpose and Title of Submission: Sentence outline of online policies to see how the financial companies manage privacy issues
Certification of Authorship: I hereby certify that I am the author of this document and that any
assistance I received in its preparation is fully acknowledged and disclosed in the document. I
have also cited all sources from which I obtained data, ideas, or words that are copied directly or
paraphrased in the document. Sources are properly credited according to accepted standards for
professional publications. I also certify that this paper was prepared by (me or by my group #)
for this purpose.
Students’ Signature: ___Rajesh Chamallamudi Date : 03/22/2020
Grammarly result screenshot: