DOUBLE-CLICK TO INSERT SHORT TITLE (50 CHARACTERS OR LESS) 1
DOUBLE-CLICK TO TYPE IN ABBRIEVATED TITLE (50 CHARACTERS OR LESS) 2This Is Your Title: It Should Be Less Than Twelve Words
Your Name
Course Name
College Name
Abstract
The abstract is on its own page. The first paragraph of the abstract should not be indented. It is typically 150 to 250 words and summarizes the main points of the paper. It should include your thesis and summarize your main points and results. Do not include quotations here. Define any abbreviations and acronyms you use in the paper here. You might want to write it after you’ve written the rest of your paper, so that it’s easy to summarize.
In academic publishing, writing a good abstract is important, because it is the first, and sometimes only, bit of information your readers get to help them decide whether they should read or buy your article. After this paragraph, there is a page break that forces the beginning of your paper onto its own page: You will want to keep it there.
This Is Your Title: It Should Be Less Than Twelve Words
This is your introduction and thesis paragraph. The introduction should be about five or six sentences and provide some background or context for your topic. Do not use I or you in academic writing. When appropriate, include recent events relating to the topic. For example, if you are writing about cyber warfare, you might mention Russia using cyber-attacks to influence the last US presidential election. Your thesis should be one sentence and outline the main points of the paper. Literature Review or Background
Summarize and quote the important research on this topic that has gone before you. Define subject-specific vocabulary or related theory. Usually, you want to look at books for background. You might want to use your textbook or an encyclopedia to find the names of researchers or theories that are important to the topic, then, search for those names on the library website. Use keywords when research of your topic in databases (example: cyber warfare or cyber attack) to find related articles and books. Need help? Ask A Librarian.
Anytime you summarize what someone else has said, include the author’s last name and year either in the text or in parentheses at the end. If you quote someone else, include the author’s last name, year, and page number either in the text or in parentheses at the end. If an article has three to five authors, write their last names out the first time, then cite only the first author’s last name followed by “et al.” If an article has six or more authors, include only the first author’s last name followed by “et al.” If the source does not have an author, such as a website, put the name of the article or webpage in parentheses at the end.
The whole point of in-text citations is so your reader can find the correct source in your References, so make sure authors or titles match both in-text and in References. Find out more about in-text citation on t ...
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
DOUBLE-CLICK TO INSERT SHORT TITLE (50 CHARACTERS OR LESS)
1. DOUBLE-CLICK TO INSERT SHORT TITLE (50
CHARACTERS OR LESS) 1
DOUBLE-CLICK TO TYPE IN ABBRIEVATED TITLE (50
CHARACTERS OR LESS) 2This Is Your Title: It Should Be
Less Than Twelve Words
Your Name
Course Name
College Name
Abstract
The abstract is on its own page. The first paragraph of the
abstract should not be indented. It is typically 150 to 250 words
and summarizes the main points of the paper. It should include
your thesis and summarize your main points and results. Do not
include quotations here. Define any abbreviations and acronyms
you use in the paper here. You might want to write it after
you’ve written the rest of your paper, so that it’s easy to
summarize.
In academic publishing, writing a good abstract is important,
because it is the first, and sometimes only, bit of information
your readers get to help them decide whether they should read
or buy your article. After this paragraph, there is a page break
that forces the beginning of your paper onto its own page: You
will want to keep it there.
This Is Your Title: It Should Be Less Than Twelve Words
This is your introduction and thesis paragraph. The introduction
should be about five or six sentences and provide some
background or context for your topic. Do not use I or you in
academic writing. When appropriate, include recent events
relating to the topic. For example, if you are writing about
cyber warfare, you might mention Russia using cyber-attacks to
influence the last US presidential election. Your thesis should
be one sentence and outline the main points of the paper.
Literature Review or Background
Summarize and quote the important research on this topic that
2. has gone before you. Define subject-specific vocabulary or
related theory. Usually, you want to look at books for
background. You might want to use your textbook or an
encyclopedia to find the names of researchers or theories that
are important to the topic, then, search for those names on the
library website. Use keywords when research of your topic in
databases (example: cyber warfare or cyber attack) to find
related articles and books. Need help? Ask A Librarian.
Anytime you summarize what someone else has said, include
the author’s last name and year either in the text or in
parentheses at the end. If you quote someone else, include the
author’s last name, year, and page number either in the text or
in parentheses at the end. If an article has three to five authors,
write their last names out the first time, then cite only the first
author’s last name followed by “et al.” If an article has six or
more authors, include only the first author’s last name followed
by “et al.” If the source does not have an author, such as a
website, put the name of the article or webpage in parentheses
at the end.
The whole point of in-text citations is so your reader can find
the correct source in your References, so make sure authors or
titles match both in-text and in References. Find out more about
in-text citation on the Hagan Memorial Library Citation Help
page.
Business sources are not standard APA citations; See Purdue
Owl for more information. Discussion
The discussion should be the largest part of your paper and
include your argument, research, and experiences (for example,
through Service-Learning). Each main point of your paper
should start its own paragraph with a strong first sentence.
Again, do not use I or you in academic writing.
Remember to introduce quotations with who said it and/or why
it’s important. Make sure quotes fit seamlessly in your paper.
Include short quotations (40 words or less) in-text with
quotation marks. Use ellipsis (...) when omitting sections from a
quote and use four periods (....) if omitting the end section of a
3. quote.
This is a longer quote, which is 40 or more words. Indent the
quote a half-inch from the left margin and double-space it with
no quotation marks. To get the right format, just click on
“Quote” in the Styles area on the Word frame above. In
parentheses, include the author’s last name, year, and page
number.Conclusion
The conclusion restates the thesis and summarizes the main
arguments or points of the article, so that your reader could just
read the conclusion to generally understand the paper. What is
important to learn from reading your paper? If you know of
areas in this topic that need further study, mention them. After
this paragraph, there is a page break that forces References onto
its own page: You will want to keep it there.
References
American Psychological Association. (year). Article title. Name
of Journal, volume, pages.
Author(s). (year). Book title. Where published: Publisher.
Retrieved from URL of book
Author(s) of essay or chapter. (year). In Author (Ed.), Book
title (pages of essay or chapter). Where published: Publisher.
Retrieved from URL of chapter or essay
Freud, S. (year). Article title. Name of Journal, volume (issue),
pages. Retrieved from journal URL
Jung, C., & Freud, S. (year). Article title. Name of Journal,
volume (issue), pages. Retrieved from article URL if poor
navigation on site
Neu, J, Lakoff, R., Kamin, J., Green, P. Lessig, L., Brody, E.,
… Prinzker, T. (year). Book title (edition if given). Where
published: Publisher.
Pavlov, I., Jung, C., & Freud, S. (year of last update). Web page
title. Retrieved from URL of Web page
Skinner, B. F. (year). Article title. Name of Journal, volume,
pages. doi:xx.xxxxxxxxxx
4. DOUBL
E
-
CLICK
TO
INSERT
SHORT
TITLE (50 CHARACTERS OR LESS)
1
This I
s Your
Title: It
Should
Be Less Than Twelve Words
Your
Name
Course Name
College Name
DOUBLE-CLICK TO INSERT SHORT TITLE (50
CHARACTERS OR LESS) 1
This Is Your Title: It Should Be Less Than Twelve Words
5. Your Name
Course Name
College Name
Scenario:
You have recently been hired as a Chief Information
Governance Officer (CIGO) at a large company (You may
choose your industry). This is a newly created position and
department within the organization that was founded on the
need to coordinate all areas of the business and to provide
governance of the information. You will need to hire for all
positions within your new department.
The company has been in business for more than 50 years and in
this time has collected vast amounts of data. Much of this data
has been stored in hard copy format in filing cabinets at an
offsite location but in recent times, collected business data is in
electronic format stored in file shares. Customer data is being
stored in a relational database, but the lack of administration
has caused data integrity issues such as duplication. There are
currently no policies in place to address the handling of data,
business or customer. The company also desires to leverage the
marketing power of social media, but has no knowledge of the
types of policies or legal issues they would need to consider.
You will also need to propose relevant metrics that should be
collected to ensure that the information governance program is
effective.
The CEO and Board of Directors have tasked you to develop a
proposal (paper) that will give them the knowledge needed to
make informed decisions on an enterprise-wide Information
Governance program, addressing (at a minimum) all of these
issues, for the company.
Requirements:
6. 1. The paper should include at a minimum of the following
sections:
a. Title page
b. Executive Summary (Abstract)
c. Body
i. Introduction
ii. Literature review
iii. Program and technology recommendations
d. Conclusion
e. References
2. You must include at least two figures or tables. These must
be of your own creation. Do not copy from other sources.
3. Must cite at least 10 references and 5 must be from peer
reviewed scholarly journals (accessible from the UC Library).
4. This paper should be in proper APA format and avoid
plagiarism when paraphrasing content. It should be a minimum
of 10 to a maximum of 15 pages in length (double-spaced),
excluding the title page and references.
Milestones:
Week 3 – A one-page paper describing the industry chosen and
potential resources to be used. See the individual assignment for
more details. 150 pts
Week 5 – Develop a full annotated outline of the paper
including sections in which each resource will be used. 150 pts
Week 7– Completed final research paper 300 pts.
Total: 600 pts
Running Head: ANNOTATED BIBLIOGRAPHY
1
7. ANNOTATED BIBLIOGRAPHY
2
Annotated Bibliography
University of Cumberlands
Information Governance
Google Governance Policy
The google governance policy is mainly meant to secure the
data of the people who are the users in this case and the
company entirely. The governance policies are mainly seen as
the source of the success to the company and the growth of the
trust from the clients. The information security that has been
observed and adhered by google exists in various ways right
from the Americas citizens to the whole users globally.
Wallace, M., & Webber, L. J. (2019). It governance 2020:
Policies and procedures. Aspen Publishers.
8. In the journal of the IT governance 2020, policies and
procedures, Wallace, & Webber discussed about the
significance of the policy governance. In the journal, the
authors have focused on why the organizations should take their
governance policy as an important factor for the growth of the
institution. They also explain the cost that the company
undergoes when the data breach occurs.
Gray, J. E. (2020). “Innovate first, permission later”. Google
Rules, 41-64. doi:10.1093/oso/9780190072070.003.0003
In the article, Gray explains how the google company has
promoted the art of innovation among the users. The
applications that are developed by the help of the google search
engine. Once the users have developed their innovation or
rather the app, they shall need to put the application on the
google play store where the developers have got to subscribe to
the googles terms and conditions before availing the
application.
Blanckenburg, K. V. (2018). Google search abuses dominant
position to illegally favor Google shopping: An economic
review of the EU decision. Digital Policy, Regulation and
Governance, 20(3), 211-224. doi:10.1108/dprg-05-2017-0020
Blackenberg reiterates that the google how the google is
misusing the monopoly to ensure that the clients intending to
make search in other sites then the google priorities the options
that favor the services they offer. In other words, the author
sees the google digital governance is a cyber crime and breach
of it is governance policy.
Davies, J. (2010). Implementing SSL/TLS using cryptography
and PKI. doi:10.1002/9781118255797
Google implemented the encryption as discussed by Davies
using SSL. Davis adds that the google account came up made an
initiation of the technique of the two-step technique of making
the google account. However, the author says that SSL is not
enough to implement full governance since there have series for
other security breaches after implementation of SSL.
Curwen, P. (2018). Google. Digital Policy, Regulation and
9. Governance, 20(2), 191-194. doi:10.1108/dprg-10-2017-0053
The research done by Curwen discusses the preventive
measures that the google company undertook to enhance the
governance policy of the company. Having experienced the
attacks on through malware, it is an account, Google
implemented the technique of clouding where the data is backed
up and can be retrieved if needed.
Making cloud computing trustworthy. (2016). Trustworthy
Cloud Computing, 113-146. doi:10.1002/9781119114215.ch4
In his article, it emphasizes the importance of cloud computing
and the reason why clouding is essential to the ancient
technique of keeping information on the disks. The writer the
importance of cloud backing; he says that the data that has been
uploaded to the cloud is safer and enables the clients to access
the information remotely.
Lee, N. (2016). To Google or not to Google. Google It, 3-52.
doi:10.1007/978-1-4939-6415-4_1
The article focuses on governance policy and the challenges it
encounters for implementation, Lee says due to the future
threat, Google has begun making the massive investment to
ensure that it makes advances in the field of social media. Lee
says that instead of clients using google search to order items,
the clients, on the other hand, ensures that they use different
applications to make orders. Lee such options limit better
implementation governance and policies as due to lack of big
data analytics where more usage of it help google to collect data
for improvement.
Reyna, A., & Martin, D. (2017). Symposium on Google search
(Shopping) decision ∙ online Gatekeeping and the Google
shopping antitrust decision. European Competition and
Regulatory Law Review, 1(3), 204-207.
doi:10.21552/core/2017/3/7
The rules that have been set by the European Union have
limited the google into implementing the google governance
policies to make shopping decisions. The strict rules are result
of the mistrust between European policies and google
10. governance rules. Reyna reiterates that google are mainly based
on American laws where it does not favor other international
laws.
Timm, C., & Perez, R. (2010). Malware attacks. Seven
Deadliest Social Network Attacks, 23-41. doi:10.1016/b978-1-
59749-545-5.00002-1
One of the very big issues that the google has undergone mainly
is the cyber-attack. Cyber-attack affects the implementation of
governance policies in the google such information security.
Timm says that the most of the attacks directed towards google
is malware. However, Timm says it is up to Google Company to
ensure that the security of the clients is safeguarded despite
such threats.
Gray, J. E. (2020). Google vs. the copyright tradition. Google
Rules, 65-96. doi:10.1093/oso/9780190072070.003.0004
Google in it is course of executing governance policy; the
company has encountered a lot of piracy in its online
information. Gray says that the information that belongs to
google has been used somewhere else as private property. The
piracy infringes the rights of the company.
I would apply the governance policies, as seen in the above
articles, by ensuring that the company adheres to the safe
governance policy that ensures that the data protection of both
the parties takes the privacy of the users adequately. In the
article, I learned that the success of the company is well
determined by a governance policy that has been put into place.
Poor information security is, as a result, poor governance. The
privacy policy ensures that the data privacy of the clients is
well taken care of.
In summary for the Google to ensure that its policies are do not
affect other companies and to kill the distrust issue, it has to
ensure that it makes their policies clear to other companies’ the
company has to ensure that they upgrade their data security
systems apart from encrypting the mails with SSL. Google
should also ensure that its rules adhere to international laws and
not only basing on American laws only.
11. Running Head: GOVERNANCE POLICY
1
GOVERNANCE POLICY
4
University of Cumberlands
03/22/2020
Google Governance Policy
The governance policies in organizations are very crucial as
much as the data is concerned. The security of the data is most
cases determine the success of the company. Information
governance has been on the go as much the threats of data
breach exist. Governance policy covers the data privacy of both
the clients and the organizations (Wallace & Webber, 2019). In
the new organization, the CIGO has to check on the loopholes
that exist in the organization as a first procedure to manage the
governance of the organization.
In the famous Google organization, I take it as my choice to
discuss the governance policy they deployed in the process of
12. their growth. The Google Company put in place its governance
policy for the people, and one of the significant governance
policies was the information security of the clients and theirs.
The Google data for themselves and their clients has been
encrypted and that no party can access the data that it does not
belong to them. Google does not allow third-parties to obtain
information from other people. The use of the SSL has
facilitated the encryption of the Google’s information (Wallace
et al.2019). Furthermore, Google has initiated a two-step
authentication technique when verifying the Google account.
Unfortunately, on the other hand, the challenges that that
Google has undergone in the overseeing of the government
policy is the hacking of the Google account by the hackers.
Severally many of the Google account passwords have been
taken by hackers and the personal data stolen. During this
process of hacking, Google made a lot of losses as some of the
biggest companies that were affected demanded the
compensation to their loss of the data.
Google has taken some preventative measures to protect its
governance policy. Google has developed a Google cloud
whereby the clients can back up their data for more safety. The
data should be kept in the cloud compared to the removable
disks where the data can be interfered with or stolen. The cloud
back also ensures that the data can be accessed by the users
whenever they are (Wallace et al.2019). Cloud also offers
enough space for the data storage where it could be costly,
keeping then in the removable disk due to lack of enough space.
13. References
Wallace, M., & Webber, L. J. (2019). It Governance 2020:
Policies and Procedures. Aspen Publishers.