SlideShare uma empresa Scribd logo
1 de 13
DOUBLE-CLICK TO INSERT SHORT TITLE (50
CHARACTERS OR LESS) 1
DOUBLE-CLICK TO TYPE IN ABBRIEVATED TITLE (50
CHARACTERS OR LESS) 2This Is Your Title: It Should Be
Less Than Twelve Words
Your Name
Course Name
College Name
Abstract
The abstract is on its own page. The first paragraph of the
abstract should not be indented. It is typically 150 to 250 words
and summarizes the main points of the paper. It should include
your thesis and summarize your main points and results. Do not
include quotations here. Define any abbreviations and acronyms
you use in the paper here. You might want to write it after
you’ve written the rest of your paper, so that it’s easy to
summarize.
In academic publishing, writing a good abstract is important,
because it is the first, and sometimes only, bit of information
your readers get to help them decide whether they should read
or buy your article. After this paragraph, there is a page break
that forces the beginning of your paper onto its own page: You
will want to keep it there.
This Is Your Title: It Should Be Less Than Twelve Words
This is your introduction and thesis paragraph. The introduction
should be about five or six sentences and provide some
background or context for your topic. Do not use I or you in
academic writing. When appropriate, include recent events
relating to the topic. For example, if you are writing about
cyber warfare, you might mention Russia using cyber-attacks to
influence the last US presidential election. Your thesis should
be one sentence and outline the main points of the paper.
Literature Review or Background
Summarize and quote the important research on this topic that
has gone before you. Define subject-specific vocabulary or
related theory. Usually, you want to look at books for
background. You might want to use your textbook or an
encyclopedia to find the names of researchers or theories that
are important to the topic, then, search for those names on the
library website. Use keywords when research of your topic in
databases (example: cyber warfare or cyber attack) to find
related articles and books. Need help? Ask A Librarian.
Anytime you summarize what someone else has said, include
the author’s last name and year either in the text or in
parentheses at the end. If you quote someone else, include the
author’s last name, year, and page number either in the text or
in parentheses at the end. If an article has three to five authors,
write their last names out the first time, then cite only the first
author’s last name followed by “et al.” If an article has six or
more authors, include only the first author’s last name followed
by “et al.” If the source does not have an author, such as a
website, put the name of the article or webpage in parentheses
at the end.
The whole point of in-text citations is so your reader can find
the correct source in your References, so make sure authors or
titles match both in-text and in References. Find out more about
in-text citation on the Hagan Memorial Library Citation Help
page.
Business sources are not standard APA citations; See Purdue
Owl for more information. Discussion
The discussion should be the largest part of your paper and
include your argument, research, and experiences (for example,
through Service-Learning). Each main point of your paper
should start its own paragraph with a strong first sentence.
Again, do not use I or you in academic writing.
Remember to introduce quotations with who said it and/or why
it’s important. Make sure quotes fit seamlessly in your paper.
Include short quotations (40 words or less) in-text with
quotation marks. Use ellipsis (...) when omitting sections from a
quote and use four periods (....) if omitting the end section of a
quote.
This is a longer quote, which is 40 or more words. Indent the
quote a half-inch from the left margin and double-space it with
no quotation marks. To get the right format, just click on
“Quote” in the Styles area on the Word frame above. In
parentheses, include the author’s last name, year, and page
number.Conclusion
The conclusion restates the thesis and summarizes the main
arguments or points of the article, so that your reader could just
read the conclusion to generally understand the paper. What is
important to learn from reading your paper? If you know of
areas in this topic that need further study, mention them. After
this paragraph, there is a page break that forces References onto
its own page: You will want to keep it there.
References
American Psychological Association. (year). Article title. Name
of Journal, volume, pages.
Author(s). (year). Book title. Where published: Publisher.
Retrieved from URL of book
Author(s) of essay or chapter. (year). In Author (Ed.), Book
title (pages of essay or chapter). Where published: Publisher.
Retrieved from URL of chapter or essay
Freud, S. (year). Article title. Name of Journal, volume (issue),
pages. Retrieved from journal URL
Jung, C., & Freud, S. (year). Article title. Name of Journal,
volume (issue), pages. Retrieved from article URL if poor
navigation on site
Neu, J, Lakoff, R., Kamin, J., Green, P. Lessig, L., Brody, E.,
… Prinzker, T. (year). Book title (edition if given). Where
published: Publisher.
Pavlov, I., Jung, C., & Freud, S. (year of last update). Web page
title. Retrieved from URL of Web page
Skinner, B. F. (year). Article title. Name of Journal, volume,
pages. doi:xx.xxxxxxxxxx
DOUBL
E
-
CLICK
TO
INSERT
SHORT
TITLE (50 CHARACTERS OR LESS)
1
This I
s Your
Title: It
Should
Be Less Than Twelve Words
Your
Name
Course Name
College Name
DOUBLE-CLICK TO INSERT SHORT TITLE (50
CHARACTERS OR LESS) 1
This Is Your Title: It Should Be Less Than Twelve Words
Your Name
Course Name
College Name
Scenario:
You have recently been hired as a Chief Information
Governance Officer (CIGO) at a large company (You may
choose your industry). This is a newly created position and
department within the organization that was founded on the
need to coordinate all areas of the business and to provide
governance of the information. You will need to hire for all
positions within your new department.
The company has been in business for more than 50 years and in
this time has collected vast amounts of data. Much of this data
has been stored in hard copy format in filing cabinets at an
offsite location but in recent times, collected business data is in
electronic format stored in file shares. Customer data is being
stored in a relational database, but the lack of administration
has caused data integrity issues such as duplication. There are
currently no policies in place to address the handling of data,
business or customer. The company also desires to leverage the
marketing power of social media, but has no knowledge of the
types of policies or legal issues they would need to consider.
You will also need to propose relevant metrics that should be
collected to ensure that the information governance program is
effective.
The CEO and Board of Directors have tasked you to develop a
proposal (paper) that will give them the knowledge needed to
make informed decisions on an enterprise-wide Information
Governance program, addressing (at a minimum) all of these
issues, for the company.
Requirements:
1. The paper should include at a minimum of the following
sections:
a. Title page
b. Executive Summary (Abstract)
c. Body
i. Introduction
ii. Literature review
iii. Program and technology recommendations
d. Conclusion
e. References
2. You must include at least two figures or tables. These must
be of your own creation. Do not copy from other sources.
3. Must cite at least 10 references and 5 must be from peer
reviewed scholarly journals (accessible from the UC Library).
4. This paper should be in proper APA format and avoid
plagiarism when paraphrasing content. It should be a minimum
of 10 to a maximum of 15 pages in length (double-spaced),
excluding the title page and references.
Milestones:
Week 3 – A one-page paper describing the industry chosen and
potential resources to be used. See the individual assignment for
more details. 150 pts
Week 5 – Develop a full annotated outline of the paper
including sections in which each resource will be used. 150 pts
Week 7– Completed final research paper 300 pts.
Total: 600 pts
Running Head: ANNOTATED BIBLIOGRAPHY
1
ANNOTATED BIBLIOGRAPHY
2
Annotated Bibliography
University of Cumberlands
Information Governance
Google Governance Policy
The google governance policy is mainly meant to secure the
data of the people who are the users in this case and the
company entirely. The governance policies are mainly seen as
the source of the success to the company and the growth of the
trust from the clients. The information security that has been
observed and adhered by google exists in various ways right
from the Americas citizens to the whole users globally.
Wallace, M., & Webber, L. J. (2019). It governance 2020:
Policies and procedures. Aspen Publishers.
In the journal of the IT governance 2020, policies and
procedures, Wallace, & Webber discussed about the
significance of the policy governance. In the journal, the
authors have focused on why the organizations should take their
governance policy as an important factor for the growth of the
institution. They also explain the cost that the company
undergoes when the data breach occurs.
Gray, J. E. (2020). “Innovate first, permission later”. Google
Rules, 41-64. doi:10.1093/oso/9780190072070.003.0003
In the article, Gray explains how the google company has
promoted the art of innovation among the users. The
applications that are developed by the help of the google search
engine. Once the users have developed their innovation or
rather the app, they shall need to put the application on the
google play store where the developers have got to subscribe to
the googles terms and conditions before availing the
application.
Blanckenburg, K. V. (2018). Google search abuses dominant
position to illegally favor Google shopping: An economic
review of the EU decision. Digital Policy, Regulation and
Governance, 20(3), 211-224. doi:10.1108/dprg-05-2017-0020
Blackenberg reiterates that the google how the google is
misusing the monopoly to ensure that the clients intending to
make search in other sites then the google priorities the options
that favor the services they offer. In other words, the author
sees the google digital governance is a cyber crime and breach
of it is governance policy.
Davies, J. (2010). Implementing SSL/TLS using cryptography
and PKI. doi:10.1002/9781118255797
Google implemented the encryption as discussed by Davies
using SSL. Davis adds that the google account came up made an
initiation of the technique of the two-step technique of making
the google account. However, the author says that SSL is not
enough to implement full governance since there have series for
other security breaches after implementation of SSL.
Curwen, P. (2018). Google. Digital Policy, Regulation and
Governance, 20(2), 191-194. doi:10.1108/dprg-10-2017-0053
The research done by Curwen discusses the preventive
measures that the google company undertook to enhance the
governance policy of the company. Having experienced the
attacks on through malware, it is an account, Google
implemented the technique of clouding where the data is backed
up and can be retrieved if needed.
Making cloud computing trustworthy. (2016). Trustworthy
Cloud Computing, 113-146. doi:10.1002/9781119114215.ch4
In his article, it emphasizes the importance of cloud computing
and the reason why clouding is essential to the ancient
technique of keeping information on the disks. The writer the
importance of cloud backing; he says that the data that has been
uploaded to the cloud is safer and enables the clients to access
the information remotely.
Lee, N. (2016). To Google or not to Google. Google It, 3-52.
doi:10.1007/978-1-4939-6415-4_1
The article focuses on governance policy and the challenges it
encounters for implementation, Lee says due to the future
threat, Google has begun making the massive investment to
ensure that it makes advances in the field of social media. Lee
says that instead of clients using google search to order items,
the clients, on the other hand, ensures that they use different
applications to make orders. Lee such options limit better
implementation governance and policies as due to lack of big
data analytics where more usage of it help google to collect data
for improvement.
Reyna, A., & Martin, D. (2017). Symposium on Google search
(Shopping) decision ∙ online Gatekeeping and the Google
shopping antitrust decision. European Competition and
Regulatory Law Review, 1(3), 204-207.
doi:10.21552/core/2017/3/7
The rules that have been set by the European Union have
limited the google into implementing the google governance
policies to make shopping decisions. The strict rules are result
of the mistrust between European policies and google
governance rules. Reyna reiterates that google are mainly based
on American laws where it does not favor other international
laws.
Timm, C., & Perez, R. (2010). Malware attacks. Seven
Deadliest Social Network Attacks, 23-41. doi:10.1016/b978-1-
59749-545-5.00002-1
One of the very big issues that the google has undergone mainly
is the cyber-attack. Cyber-attack affects the implementation of
governance policies in the google such information security.
Timm says that the most of the attacks directed towards google
is malware. However, Timm says it is up to Google Company to
ensure that the security of the clients is safeguarded despite
such threats.
Gray, J. E. (2020). Google vs. the copyright tradition. Google
Rules, 65-96. doi:10.1093/oso/9780190072070.003.0004
Google in it is course of executing governance policy; the
company has encountered a lot of piracy in its online
information. Gray says that the information that belongs to
google has been used somewhere else as private property. The
piracy infringes the rights of the company.
I would apply the governance policies, as seen in the above
articles, by ensuring that the company adheres to the safe
governance policy that ensures that the data protection of both
the parties takes the privacy of the users adequately. In the
article, I learned that the success of the company is well
determined by a governance policy that has been put into place.
Poor information security is, as a result, poor governance. The
privacy policy ensures that the data privacy of the clients is
well taken care of.
In summary for the Google to ensure that its policies are do not
affect other companies and to kill the distrust issue, it has to
ensure that it makes their policies clear to other companies’ the
company has to ensure that they upgrade their data security
systems apart from encrypting the mails with SSL. Google
should also ensure that its rules adhere to international laws and
not only basing on American laws only.
Running Head: GOVERNANCE POLICY
1
GOVERNANCE POLICY
4
University of Cumberlands
03/22/2020
Google Governance Policy
The governance policies in organizations are very crucial as
much as the data is concerned. The security of the data is most
cases determine the success of the company. Information
governance has been on the go as much the threats of data
breach exist. Governance policy covers the data privacy of both
the clients and the organizations (Wallace & Webber, 2019). In
the new organization, the CIGO has to check on the loopholes
that exist in the organization as a first procedure to manage the
governance of the organization.
In the famous Google organization, I take it as my choice to
discuss the governance policy they deployed in the process of
their growth. The Google Company put in place its governance
policy for the people, and one of the significant governance
policies was the information security of the clients and theirs.
The Google data for themselves and their clients has been
encrypted and that no party can access the data that it does not
belong to them. Google does not allow third-parties to obtain
information from other people. The use of the SSL has
facilitated the encryption of the Google’s information (Wallace
et al.2019). Furthermore, Google has initiated a two-step
authentication technique when verifying the Google account.
Unfortunately, on the other hand, the challenges that that
Google has undergone in the overseeing of the government
policy is the hacking of the Google account by the hackers.
Severally many of the Google account passwords have been
taken by hackers and the personal data stolen. During this
process of hacking, Google made a lot of losses as some of the
biggest companies that were affected demanded the
compensation to their loss of the data.
Google has taken some preventative measures to protect its
governance policy. Google has developed a Google cloud
whereby the clients can back up their data for more safety. The
data should be kept in the cloud compared to the removable
disks where the data can be interfered with or stolen. The cloud
back also ensures that the data can be accessed by the users
whenever they are (Wallace et al.2019). Cloud also offers
enough space for the data storage where it could be costly,
keeping then in the removable disk due to lack of enough space.
References
Wallace, M., & Webber, L. J. (2019). It Governance 2020:
Policies and Procedures. Aspen Publishers.

Mais conteúdo relacionado

Semelhante a DOUBLE-CLICK TO INSERT SHORT TITLE (50 CHARACTERS OR LESS)

I have used this site before some teachers are good some are not..docx
I have used this site before some teachers are good some are not..docxI have used this site before some teachers are good some are not..docx
I have used this site before some teachers are good some are not..docxsamirapdcosden
 
Title of the research proposal
Title of the research proposalTitle of the research proposal
Title of the research proposalElisha Bhandari
 
Research Paper Using Word This assignment has two goals.docx
Research Paper Using Word   This assignment has two goals.docxResearch Paper Using Word   This assignment has two goals.docx
Research Paper Using Word This assignment has two goals.docxaudeleypearl
 
Format and references
Format and referencesFormat and references
Format and referencesAnnMayLaneta
 
Running head TITLE OF PAPER1TITLE OF PAPER5Title .docx
Running head TITLE OF PAPER1TITLE OF PAPER5Title .docxRunning head TITLE OF PAPER1TITLE OF PAPER5Title .docx
Running head TITLE OF PAPER1TITLE OF PAPER5Title .docxtoltonkendal
 
Assignment InstructionsRespond to the following questionAs pa.docx
Assignment InstructionsRespond to the following questionAs pa.docxAssignment InstructionsRespond to the following questionAs pa.docx
Assignment InstructionsRespond to the following questionAs pa.docxrock73
 
WritingaResearchPaper.ppt
WritingaResearchPaper.pptWritingaResearchPaper.ppt
WritingaResearchPaper.pptSeventhSky1
 
1 Created in 2015 IN-TEXT CITATION GUIDE What .docx
1 Created in 2015 IN-TEXT CITATION GUIDE What .docx1 Created in 2015 IN-TEXT CITATION GUIDE What .docx
1 Created in 2015 IN-TEXT CITATION GUIDE What .docxhoney725342
 
Week 5 engl. 145 sep 21 st and 23rd
Week 5 engl. 145 sep 21 st and 23rdWeek 5 engl. 145 sep 21 st and 23rd
Week 5 engl. 145 sep 21 st and 23rdlisyaseloni
 
PSYC 2301 & PSYC 2319 Semester Assignment3PSYC 2301 & PSYC 231.docx
PSYC 2301 & PSYC 2319 Semester Assignment3PSYC 2301 & PSYC 231.docxPSYC 2301 & PSYC 2319 Semester Assignment3PSYC 2301 & PSYC 231.docx
PSYC 2301 & PSYC 2319 Semester Assignment3PSYC 2301 & PSYC 231.docxwoodruffeloisa
 
APA Style Writing.pptxAPA Style WritingAmerican Psychologi.docx
APA Style Writing.pptxAPA Style WritingAmerican Psychologi.docxAPA Style Writing.pptxAPA Style WritingAmerican Psychologi.docx
APA Style Writing.pptxAPA Style WritingAmerican Psychologi.docxarmitageclaire49
 
APA Style Writing.pptxAPA Style WritingAmerican Psychologi.docx
APA Style Writing.pptxAPA Style WritingAmerican Psychologi.docxAPA Style Writing.pptxAPA Style WritingAmerican Psychologi.docx
APA Style Writing.pptxAPA Style WritingAmerican Psychologi.docxRAHUL126667
 

Semelhante a DOUBLE-CLICK TO INSERT SHORT TITLE (50 CHARACTERS OR LESS) (12)

I have used this site before some teachers are good some are not..docx
I have used this site before some teachers are good some are not..docxI have used this site before some teachers are good some are not..docx
I have used this site before some teachers are good some are not..docx
 
Title of the research proposal
Title of the research proposalTitle of the research proposal
Title of the research proposal
 
Research Paper Using Word This assignment has two goals.docx
Research Paper Using Word   This assignment has two goals.docxResearch Paper Using Word   This assignment has two goals.docx
Research Paper Using Word This assignment has two goals.docx
 
Format and references
Format and referencesFormat and references
Format and references
 
Running head TITLE OF PAPER1TITLE OF PAPER5Title .docx
Running head TITLE OF PAPER1TITLE OF PAPER5Title .docxRunning head TITLE OF PAPER1TITLE OF PAPER5Title .docx
Running head TITLE OF PAPER1TITLE OF PAPER5Title .docx
 
Assignment InstructionsRespond to the following questionAs pa.docx
Assignment InstructionsRespond to the following questionAs pa.docxAssignment InstructionsRespond to the following questionAs pa.docx
Assignment InstructionsRespond to the following questionAs pa.docx
 
WritingaResearchPaper.ppt
WritingaResearchPaper.pptWritingaResearchPaper.ppt
WritingaResearchPaper.ppt
 
1 Created in 2015 IN-TEXT CITATION GUIDE What .docx
1 Created in 2015 IN-TEXT CITATION GUIDE What .docx1 Created in 2015 IN-TEXT CITATION GUIDE What .docx
1 Created in 2015 IN-TEXT CITATION GUIDE What .docx
 
Week 5 engl. 145 sep 21 st and 23rd
Week 5 engl. 145 sep 21 st and 23rdWeek 5 engl. 145 sep 21 st and 23rd
Week 5 engl. 145 sep 21 st and 23rd
 
PSYC 2301 & PSYC 2319 Semester Assignment3PSYC 2301 & PSYC 231.docx
PSYC 2301 & PSYC 2319 Semester Assignment3PSYC 2301 & PSYC 231.docxPSYC 2301 & PSYC 2319 Semester Assignment3PSYC 2301 & PSYC 231.docx
PSYC 2301 & PSYC 2319 Semester Assignment3PSYC 2301 & PSYC 231.docx
 
APA Style Writing.pptxAPA Style WritingAmerican Psychologi.docx
APA Style Writing.pptxAPA Style WritingAmerican Psychologi.docxAPA Style Writing.pptxAPA Style WritingAmerican Psychologi.docx
APA Style Writing.pptxAPA Style WritingAmerican Psychologi.docx
 
APA Style Writing.pptxAPA Style WritingAmerican Psychologi.docx
APA Style Writing.pptxAPA Style WritingAmerican Psychologi.docxAPA Style Writing.pptxAPA Style WritingAmerican Psychologi.docx
APA Style Writing.pptxAPA Style WritingAmerican Psychologi.docx
 

Mais de troutmanboris

Christian Schussele Men of ProgressOil on canvas, 1862Coope.docx
Christian Schussele  Men of ProgressOil on canvas, 1862Coope.docxChristian Schussele  Men of ProgressOil on canvas, 1862Coope.docx
Christian Schussele Men of ProgressOil on canvas, 1862Coope.docxtroutmanboris
 
Christian EthicsChristian ethics deeply align with absolutism. E.docx
Christian EthicsChristian ethics deeply align with absolutism. E.docxChristian EthicsChristian ethics deeply align with absolutism. E.docx
Christian EthicsChristian ethics deeply align with absolutism. E.docxtroutmanboris
 
Christian Ethics BA 616 Business Ethics Definiti.docx
Christian Ethics BA 616 Business Ethics Definiti.docxChristian Ethics BA 616 Business Ethics Definiti.docx
Christian Ethics BA 616 Business Ethics Definiti.docxtroutmanboris
 
CHPSI think you made a really good point that Howard lacks poli.docx
CHPSI think you made a really good point that Howard lacks poli.docxCHPSI think you made a really good point that Howard lacks poli.docx
CHPSI think you made a really good point that Howard lacks poli.docxtroutmanboris
 
Chrétien de Troyes, Lancelot, 1Chrétien de Troyes, Lancelo.docx
Chrétien de Troyes, Lancelot, 1Chrétien de Troyes, Lancelo.docxChrétien de Troyes, Lancelot, 1Chrétien de Troyes, Lancelo.docx
Chrétien de Troyes, Lancelot, 1Chrétien de Troyes, Lancelo.docxtroutmanboris
 
Chosen brand CHANELStudents are required to research a fash.docx
Chosen brand CHANELStudents are required to research a fash.docxChosen brand CHANELStudents are required to research a fash.docx
Chosen brand CHANELStudents are required to research a fash.docxtroutmanboris
 
Chose one person to reply to ALBORES 1. Were Manning’s acti.docx
Chose one person to reply to ALBORES 1. Were Manning’s acti.docxChose one person to reply to ALBORES 1. Were Manning’s acti.docx
Chose one person to reply to ALBORES 1. Were Manning’s acti.docxtroutmanboris
 
Choosing your literary essay topic on Disgrace by J. M. Coetzee .docx
Choosing your literary essay topic on Disgrace by J. M. Coetzee .docxChoosing your literary essay topic on Disgrace by J. M. Coetzee .docx
Choosing your literary essay topic on Disgrace by J. M. Coetzee .docxtroutmanboris
 
Choosing your Philosophical Question The Final Project is an opp.docx
Choosing your Philosophical Question The Final Project is an opp.docxChoosing your Philosophical Question The Final Project is an opp.docx
Choosing your Philosophical Question The Final Project is an opp.docxtroutmanboris
 
Choosing Your Research Method in a NutshellBy James Rice and.docx
Choosing Your Research Method in a NutshellBy James Rice and.docxChoosing Your Research Method in a NutshellBy James Rice and.docx
Choosing Your Research Method in a NutshellBy James Rice and.docxtroutmanboris
 
Choose two of the systems (education, work, the military, and im.docx
Choose two of the systems (education, work, the military, and im.docxChoose two of the systems (education, work, the military, and im.docx
Choose two of the systems (education, work, the military, and im.docxtroutmanboris
 
Choose two disorders from the categories presented this week.C.docx
Choose two disorders from the categories presented this week.C.docxChoose two disorders from the categories presented this week.C.docx
Choose two disorders from the categories presented this week.C.docxtroutmanboris
 
Choose ONE of the following topics Length 750-900 words, .docx
Choose ONE of the following topics Length 750-900 words, .docxChoose ONE of the following topics Length 750-900 words, .docx
Choose ONE of the following topics Length 750-900 words, .docxtroutmanboris
 
Choose one of the following topicsAmerica A Narrative.docx
Choose one of the following topicsAmerica A Narrative.docxChoose one of the following topicsAmerica A Narrative.docx
Choose one of the following topicsAmerica A Narrative.docxtroutmanboris
 
Choose one of the following topics below. Comparecont.docx
Choose one of the following topics below. Comparecont.docxChoose one of the following topics below. Comparecont.docx
Choose one of the following topics below. Comparecont.docxtroutmanboris
 
Choose one of the following topics below. Comparecon.docx
Choose one of the following topics below. Comparecon.docxChoose one of the following topics below. Comparecon.docx
Choose one of the following topics below. Comparecon.docxtroutmanboris
 
Choose one of the states of RacialCultural Identity Development.docx
Choose one of the states of RacialCultural Identity Development.docxChoose one of the states of RacialCultural Identity Development.docx
Choose one of the states of RacialCultural Identity Development.docxtroutmanboris
 
Choose one of the following topicsNative AmericansWomenEnvi.docx
Choose one of the following topicsNative AmericansWomenEnvi.docxChoose one of the following topicsNative AmericansWomenEnvi.docx
Choose one of the following topicsNative AmericansWomenEnvi.docxtroutmanboris
 
Choose one of the following films for review (with faculty’s appro.docx
Choose one of the following films for review (with faculty’s appro.docxChoose one of the following films for review (with faculty’s appro.docx
Choose one of the following films for review (with faculty’s appro.docxtroutmanboris
 
Choose and complete one of the two assignment options.docx
Choose and complete one of the two assignment options.docxChoose and complete one of the two assignment options.docx
Choose and complete one of the two assignment options.docxtroutmanboris
 

Mais de troutmanboris (20)

Christian Schussele Men of ProgressOil on canvas, 1862Coope.docx
Christian Schussele  Men of ProgressOil on canvas, 1862Coope.docxChristian Schussele  Men of ProgressOil on canvas, 1862Coope.docx
Christian Schussele Men of ProgressOil on canvas, 1862Coope.docx
 
Christian EthicsChristian ethics deeply align with absolutism. E.docx
Christian EthicsChristian ethics deeply align with absolutism. E.docxChristian EthicsChristian ethics deeply align with absolutism. E.docx
Christian EthicsChristian ethics deeply align with absolutism. E.docx
 
Christian Ethics BA 616 Business Ethics Definiti.docx
Christian Ethics BA 616 Business Ethics Definiti.docxChristian Ethics BA 616 Business Ethics Definiti.docx
Christian Ethics BA 616 Business Ethics Definiti.docx
 
CHPSI think you made a really good point that Howard lacks poli.docx
CHPSI think you made a really good point that Howard lacks poli.docxCHPSI think you made a really good point that Howard lacks poli.docx
CHPSI think you made a really good point that Howard lacks poli.docx
 
Chrétien de Troyes, Lancelot, 1Chrétien de Troyes, Lancelo.docx
Chrétien de Troyes, Lancelot, 1Chrétien de Troyes, Lancelo.docxChrétien de Troyes, Lancelot, 1Chrétien de Troyes, Lancelo.docx
Chrétien de Troyes, Lancelot, 1Chrétien de Troyes, Lancelo.docx
 
Chosen brand CHANELStudents are required to research a fash.docx
Chosen brand CHANELStudents are required to research a fash.docxChosen brand CHANELStudents are required to research a fash.docx
Chosen brand CHANELStudents are required to research a fash.docx
 
Chose one person to reply to ALBORES 1. Were Manning’s acti.docx
Chose one person to reply to ALBORES 1. Were Manning’s acti.docxChose one person to reply to ALBORES 1. Were Manning’s acti.docx
Chose one person to reply to ALBORES 1. Were Manning’s acti.docx
 
Choosing your literary essay topic on Disgrace by J. M. Coetzee .docx
Choosing your literary essay topic on Disgrace by J. M. Coetzee .docxChoosing your literary essay topic on Disgrace by J. M. Coetzee .docx
Choosing your literary essay topic on Disgrace by J. M. Coetzee .docx
 
Choosing your Philosophical Question The Final Project is an opp.docx
Choosing your Philosophical Question The Final Project is an opp.docxChoosing your Philosophical Question The Final Project is an opp.docx
Choosing your Philosophical Question The Final Project is an opp.docx
 
Choosing Your Research Method in a NutshellBy James Rice and.docx
Choosing Your Research Method in a NutshellBy James Rice and.docxChoosing Your Research Method in a NutshellBy James Rice and.docx
Choosing Your Research Method in a NutshellBy James Rice and.docx
 
Choose two of the systems (education, work, the military, and im.docx
Choose two of the systems (education, work, the military, and im.docxChoose two of the systems (education, work, the military, and im.docx
Choose two of the systems (education, work, the military, and im.docx
 
Choose two disorders from the categories presented this week.C.docx
Choose two disorders from the categories presented this week.C.docxChoose two disorders from the categories presented this week.C.docx
Choose two disorders from the categories presented this week.C.docx
 
Choose ONE of the following topics Length 750-900 words, .docx
Choose ONE of the following topics Length 750-900 words, .docxChoose ONE of the following topics Length 750-900 words, .docx
Choose ONE of the following topics Length 750-900 words, .docx
 
Choose one of the following topicsAmerica A Narrative.docx
Choose one of the following topicsAmerica A Narrative.docxChoose one of the following topicsAmerica A Narrative.docx
Choose one of the following topicsAmerica A Narrative.docx
 
Choose one of the following topics below. Comparecont.docx
Choose one of the following topics below. Comparecont.docxChoose one of the following topics below. Comparecont.docx
Choose one of the following topics below. Comparecont.docx
 
Choose one of the following topics below. Comparecon.docx
Choose one of the following topics below. Comparecon.docxChoose one of the following topics below. Comparecon.docx
Choose one of the following topics below. Comparecon.docx
 
Choose one of the states of RacialCultural Identity Development.docx
Choose one of the states of RacialCultural Identity Development.docxChoose one of the states of RacialCultural Identity Development.docx
Choose one of the states of RacialCultural Identity Development.docx
 
Choose one of the following topicsNative AmericansWomenEnvi.docx
Choose one of the following topicsNative AmericansWomenEnvi.docxChoose one of the following topicsNative AmericansWomenEnvi.docx
Choose one of the following topicsNative AmericansWomenEnvi.docx
 
Choose one of the following films for review (with faculty’s appro.docx
Choose one of the following films for review (with faculty’s appro.docxChoose one of the following films for review (with faculty’s appro.docx
Choose one of the following films for review (with faculty’s appro.docx
 
Choose and complete one of the two assignment options.docx
Choose and complete one of the two assignment options.docxChoose and complete one of the two assignment options.docx
Choose and complete one of the two assignment options.docx
 

Último

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Último (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

DOUBLE-CLICK TO INSERT SHORT TITLE (50 CHARACTERS OR LESS)

  • 1. DOUBLE-CLICK TO INSERT SHORT TITLE (50 CHARACTERS OR LESS) 1 DOUBLE-CLICK TO TYPE IN ABBRIEVATED TITLE (50 CHARACTERS OR LESS) 2This Is Your Title: It Should Be Less Than Twelve Words Your Name Course Name College Name Abstract The abstract is on its own page. The first paragraph of the abstract should not be indented. It is typically 150 to 250 words and summarizes the main points of the paper. It should include your thesis and summarize your main points and results. Do not include quotations here. Define any abbreviations and acronyms you use in the paper here. You might want to write it after you’ve written the rest of your paper, so that it’s easy to summarize. In academic publishing, writing a good abstract is important, because it is the first, and sometimes only, bit of information your readers get to help them decide whether they should read or buy your article. After this paragraph, there is a page break that forces the beginning of your paper onto its own page: You will want to keep it there. This Is Your Title: It Should Be Less Than Twelve Words This is your introduction and thesis paragraph. The introduction should be about five or six sentences and provide some background or context for your topic. Do not use I or you in academic writing. When appropriate, include recent events relating to the topic. For example, if you are writing about cyber warfare, you might mention Russia using cyber-attacks to influence the last US presidential election. Your thesis should be one sentence and outline the main points of the paper. Literature Review or Background Summarize and quote the important research on this topic that
  • 2. has gone before you. Define subject-specific vocabulary or related theory. Usually, you want to look at books for background. You might want to use your textbook or an encyclopedia to find the names of researchers or theories that are important to the topic, then, search for those names on the library website. Use keywords when research of your topic in databases (example: cyber warfare or cyber attack) to find related articles and books. Need help? Ask A Librarian. Anytime you summarize what someone else has said, include the author’s last name and year either in the text or in parentheses at the end. If you quote someone else, include the author’s last name, year, and page number either in the text or in parentheses at the end. If an article has three to five authors, write their last names out the first time, then cite only the first author’s last name followed by “et al.” If an article has six or more authors, include only the first author’s last name followed by “et al.” If the source does not have an author, such as a website, put the name of the article or webpage in parentheses at the end. The whole point of in-text citations is so your reader can find the correct source in your References, so make sure authors or titles match both in-text and in References. Find out more about in-text citation on the Hagan Memorial Library Citation Help page. Business sources are not standard APA citations; See Purdue Owl for more information. Discussion The discussion should be the largest part of your paper and include your argument, research, and experiences (for example, through Service-Learning). Each main point of your paper should start its own paragraph with a strong first sentence. Again, do not use I or you in academic writing. Remember to introduce quotations with who said it and/or why it’s important. Make sure quotes fit seamlessly in your paper. Include short quotations (40 words or less) in-text with quotation marks. Use ellipsis (...) when omitting sections from a quote and use four periods (....) if omitting the end section of a
  • 3. quote. This is a longer quote, which is 40 or more words. Indent the quote a half-inch from the left margin and double-space it with no quotation marks. To get the right format, just click on “Quote” in the Styles area on the Word frame above. In parentheses, include the author’s last name, year, and page number.Conclusion The conclusion restates the thesis and summarizes the main arguments or points of the article, so that your reader could just read the conclusion to generally understand the paper. What is important to learn from reading your paper? If you know of areas in this topic that need further study, mention them. After this paragraph, there is a page break that forces References onto its own page: You will want to keep it there. References American Psychological Association. (year). Article title. Name of Journal, volume, pages. Author(s). (year). Book title. Where published: Publisher. Retrieved from URL of book Author(s) of essay or chapter. (year). In Author (Ed.), Book title (pages of essay or chapter). Where published: Publisher. Retrieved from URL of chapter or essay Freud, S. (year). Article title. Name of Journal, volume (issue), pages. Retrieved from journal URL Jung, C., & Freud, S. (year). Article title. Name of Journal, volume (issue), pages. Retrieved from article URL if poor navigation on site Neu, J, Lakoff, R., Kamin, J., Green, P. Lessig, L., Brody, E., … Prinzker, T. (year). Book title (edition if given). Where published: Publisher. Pavlov, I., Jung, C., & Freud, S. (year of last update). Web page title. Retrieved from URL of Web page Skinner, B. F. (year). Article title. Name of Journal, volume, pages. doi:xx.xxxxxxxxxx
  • 4. DOUBL E - CLICK TO INSERT SHORT TITLE (50 CHARACTERS OR LESS) 1 This I s Your Title: It Should Be Less Than Twelve Words Your Name Course Name College Name DOUBLE-CLICK TO INSERT SHORT TITLE (50 CHARACTERS OR LESS) 1 This Is Your Title: It Should Be Less Than Twelve Words
  • 5. Your Name Course Name College Name Scenario: You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department. The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective. The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. Requirements:
  • 6. 1. The paper should include at a minimum of the following sections: a. Title page b. Executive Summary (Abstract) c. Body i. Introduction ii. Literature review iii. Program and technology recommendations d. Conclusion e. References 2. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources. 3. Must cite at least 10 references and 5 must be from peer reviewed scholarly journals (accessible from the UC Library). 4. This paper should be in proper APA format and avoid plagiarism when paraphrasing content. It should be a minimum of 10 to a maximum of 15 pages in length (double-spaced), excluding the title page and references. Milestones: Week 3 – A one-page paper describing the industry chosen and potential resources to be used. See the individual assignment for more details. 150 pts Week 5 – Develop a full annotated outline of the paper including sections in which each resource will be used. 150 pts Week 7– Completed final research paper 300 pts. Total: 600 pts Running Head: ANNOTATED BIBLIOGRAPHY 1
  • 7. ANNOTATED BIBLIOGRAPHY 2 Annotated Bibliography University of Cumberlands Information Governance Google Governance Policy The google governance policy is mainly meant to secure the data of the people who are the users in this case and the company entirely. The governance policies are mainly seen as the source of the success to the company and the growth of the trust from the clients. The information security that has been observed and adhered by google exists in various ways right from the Americas citizens to the whole users globally. Wallace, M., & Webber, L. J. (2019). It governance 2020: Policies and procedures. Aspen Publishers.
  • 8. In the journal of the IT governance 2020, policies and procedures, Wallace, & Webber discussed about the significance of the policy governance. In the journal, the authors have focused on why the organizations should take their governance policy as an important factor for the growth of the institution. They also explain the cost that the company undergoes when the data breach occurs. Gray, J. E. (2020). “Innovate first, permission later”. Google Rules, 41-64. doi:10.1093/oso/9780190072070.003.0003 In the article, Gray explains how the google company has promoted the art of innovation among the users. The applications that are developed by the help of the google search engine. Once the users have developed their innovation or rather the app, they shall need to put the application on the google play store where the developers have got to subscribe to the googles terms and conditions before availing the application. Blanckenburg, K. V. (2018). Google search abuses dominant position to illegally favor Google shopping: An economic review of the EU decision. Digital Policy, Regulation and Governance, 20(3), 211-224. doi:10.1108/dprg-05-2017-0020 Blackenberg reiterates that the google how the google is misusing the monopoly to ensure that the clients intending to make search in other sites then the google priorities the options that favor the services they offer. In other words, the author sees the google digital governance is a cyber crime and breach of it is governance policy. Davies, J. (2010). Implementing SSL/TLS using cryptography and PKI. doi:10.1002/9781118255797 Google implemented the encryption as discussed by Davies using SSL. Davis adds that the google account came up made an initiation of the technique of the two-step technique of making the google account. However, the author says that SSL is not enough to implement full governance since there have series for other security breaches after implementation of SSL. Curwen, P. (2018). Google. Digital Policy, Regulation and
  • 9. Governance, 20(2), 191-194. doi:10.1108/dprg-10-2017-0053 The research done by Curwen discusses the preventive measures that the google company undertook to enhance the governance policy of the company. Having experienced the attacks on through malware, it is an account, Google implemented the technique of clouding where the data is backed up and can be retrieved if needed. Making cloud computing trustworthy. (2016). Trustworthy Cloud Computing, 113-146. doi:10.1002/9781119114215.ch4 In his article, it emphasizes the importance of cloud computing and the reason why clouding is essential to the ancient technique of keeping information on the disks. The writer the importance of cloud backing; he says that the data that has been uploaded to the cloud is safer and enables the clients to access the information remotely. Lee, N. (2016). To Google or not to Google. Google It, 3-52. doi:10.1007/978-1-4939-6415-4_1 The article focuses on governance policy and the challenges it encounters for implementation, Lee says due to the future threat, Google has begun making the massive investment to ensure that it makes advances in the field of social media. Lee says that instead of clients using google search to order items, the clients, on the other hand, ensures that they use different applications to make orders. Lee such options limit better implementation governance and policies as due to lack of big data analytics where more usage of it help google to collect data for improvement. Reyna, A., & Martin, D. (2017). Symposium on Google search (Shopping) decision ∙ online Gatekeeping and the Google shopping antitrust decision. European Competition and Regulatory Law Review, 1(3), 204-207. doi:10.21552/core/2017/3/7 The rules that have been set by the European Union have limited the google into implementing the google governance policies to make shopping decisions. The strict rules are result of the mistrust between European policies and google
  • 10. governance rules. Reyna reiterates that google are mainly based on American laws where it does not favor other international laws. Timm, C., & Perez, R. (2010). Malware attacks. Seven Deadliest Social Network Attacks, 23-41. doi:10.1016/b978-1- 59749-545-5.00002-1 One of the very big issues that the google has undergone mainly is the cyber-attack. Cyber-attack affects the implementation of governance policies in the google such information security. Timm says that the most of the attacks directed towards google is malware. However, Timm says it is up to Google Company to ensure that the security of the clients is safeguarded despite such threats. Gray, J. E. (2020). Google vs. the copyright tradition. Google Rules, 65-96. doi:10.1093/oso/9780190072070.003.0004 Google in it is course of executing governance policy; the company has encountered a lot of piracy in its online information. Gray says that the information that belongs to google has been used somewhere else as private property. The piracy infringes the rights of the company. I would apply the governance policies, as seen in the above articles, by ensuring that the company adheres to the safe governance policy that ensures that the data protection of both the parties takes the privacy of the users adequately. In the article, I learned that the success of the company is well determined by a governance policy that has been put into place. Poor information security is, as a result, poor governance. The privacy policy ensures that the data privacy of the clients is well taken care of. In summary for the Google to ensure that its policies are do not affect other companies and to kill the distrust issue, it has to ensure that it makes their policies clear to other companies’ the company has to ensure that they upgrade their data security systems apart from encrypting the mails with SSL. Google should also ensure that its rules adhere to international laws and not only basing on American laws only.
  • 11. Running Head: GOVERNANCE POLICY 1 GOVERNANCE POLICY 4 University of Cumberlands 03/22/2020 Google Governance Policy The governance policies in organizations are very crucial as much as the data is concerned. The security of the data is most cases determine the success of the company. Information governance has been on the go as much the threats of data breach exist. Governance policy covers the data privacy of both the clients and the organizations (Wallace & Webber, 2019). In the new organization, the CIGO has to check on the loopholes that exist in the organization as a first procedure to manage the governance of the organization. In the famous Google organization, I take it as my choice to discuss the governance policy they deployed in the process of
  • 12. their growth. The Google Company put in place its governance policy for the people, and one of the significant governance policies was the information security of the clients and theirs. The Google data for themselves and their clients has been encrypted and that no party can access the data that it does not belong to them. Google does not allow third-parties to obtain information from other people. The use of the SSL has facilitated the encryption of the Google’s information (Wallace et al.2019). Furthermore, Google has initiated a two-step authentication technique when verifying the Google account. Unfortunately, on the other hand, the challenges that that Google has undergone in the overseeing of the government policy is the hacking of the Google account by the hackers. Severally many of the Google account passwords have been taken by hackers and the personal data stolen. During this process of hacking, Google made a lot of losses as some of the biggest companies that were affected demanded the compensation to their loss of the data. Google has taken some preventative measures to protect its governance policy. Google has developed a Google cloud whereby the clients can back up their data for more safety. The data should be kept in the cloud compared to the removable disks where the data can be interfered with or stolen. The cloud back also ensures that the data can be accessed by the users whenever they are (Wallace et al.2019). Cloud also offers enough space for the data storage where it could be costly, keeping then in the removable disk due to lack of enough space.
  • 13. References Wallace, M., & Webber, L. J. (2019). It Governance 2020: Policies and Procedures. Aspen Publishers.