Companies address information governance in job descriptions

Assignment Help Basic Computer Science
Reference no: EM132361267

Purpose

The purpose of this assignment is to select the research question for your research paper assignment.

Description

The research paper assignment is a semester-long case study research project. Your research project is to discover how companies use information governance. You will achieve this by examining company policies or job descriptions. Your choice is to examine policies for the information governance concept of privacy or study job descriptions for inclusion of information governance.

Review this week's learning activities on case studies. Choose one of the below research questions. Do a preliminary data search to be sure there is data for your research before deciding upon your question.

1. How do eCommerce companies address privacy in its policies?

If you select this question, you will research several online retailers. You will study their online policies to see how the company manages privacy issues.

2. How do healthcare companies address Information Governance in job descriptions?

If you selected this question, you will research several job boards such as indeed.com or monster.com. You will study job descriptions to see how Information Governance is included in healthcare jobs.

(You can interchange the types of organizations for any question if you like. For example, if you like Question #2 but want to look at educational companies, non-profits, financial companies, etc, feel free to do so.)

You will choose the specific companies or job boards to research. You will choose the quantity of policies ad job descriptions to research.

Deliverable

Prepare a Microsoft Word document that includes:

· Title page

· Introduction

· Research question

· Background

· Reference page

The research question should be the last sentence of your introduction. The background is an explanation of the area of your research and sets the context for your study.

Your document should be written in APA style and include at least 3 supporting academic references. Your document should be a minimum of 2 pages in length (excluding the title page, reference page).

Reference no: EM132361267

Questions Cloud

Especially government and healthcare-what is ransomware : Ransomware Ransomware attacks continue to plague various sectors - especially government and healthcare. What is ransomware?
Find two additional academic sources for your attack : Discuss it with the group. Cite the newsarticle and use only legitimate news sources. Find two additional academic sources for your attack.
Workplace of Information Governance-IT and Data Governance : Explain examples from your workplace of Information Governance, IT Governance, and Data Governance that illustrate their differences.
Implementation are necessary to deal with societal problems : "Policy-making and its subsequent implementation are necessary to deal with societal problems."
Companies address information governance in job descriptions : How do healthcare companies address Information Governance in job descriptions? How do eCommerce companies address privacy in its policies?
Process of creating the contingency plan : Discuss why it is (or is not) important to include end users in process of creating the contingency plan? What are the possible pitfalls of end user inclusion?
Citibank backup tapes lost : Using a web browserand a search engine the terms "citibank backup tapes lost." What part of the contingency planning process came up short (IR , BP or CP).
Provide an overview of your campaign : MKT103A - Integrated Marketing Communications Assignment - Integrated Marketing Communication Campaign Plan, Laureate International Universities, Australia
What will be the value of brant financial assets : What will be the value of Brant's financial assets when he retires at age 67? Present all calculations to support your answer.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Predominant part of personal and business

Since people in today's network environment use wireless networks as a predominant part of their personal and business lives

  What are the values of doing formal evaluation

The issue of binding assurance requirements to functional requirements versus treating them as mutually exclusive sets has been debated over the years. Which approach do you think is preferable, and why?

  Come up with a law for other countries

We don't really "come up with a law" for other countries. They all have their own laws just as we have ours.

  Small sample database

You should cite at least three sources include a small sample database relevant to whichever topic you choose.

  Which ceo-jobs or cook-do you think developed

Which CEO-Jobs or Cook-do you think developed and executed the most effective strategic plan? What evidence can you find to support your opinion?

  Marginal costs associated with kloyck production

There are no other marginal costs associated with kloyck production. If the firm were to pay an hourly wage, which worker makes more sense

  Name of the seven-layered model used for networking

What is the name of the seven-layered model used for networking? Using good grammar, describe some benefits of using a layered model approach to networking.

  Display a message indicating that it was not found

If a match is found, display the item number and the number currently in stock; otherwise, display a message indicating that it was not found.

  How much chocolate is a dollar worth

. A bar costs a dollar, and with c coupons you get a free bar. So depending on the value of c, you get more than one bar of chocolate for a dollar when considering the value of the coupons. How much chocolate is a dollar worth (as a function of c)..

  List three design goals for firewall

List three design goals for a firewall. What are some weaknesses of a packet filtering firewall? What is an application-level gateway?

  Emerging market economies in a country

Please explain on how social, political, legal and even physical factors can act as trade barriers or opportunities in developing

  The two main forms of documentation

The two main forms of documentation of program design are flowcharts and pseudcode. Based on this week's text chapter and some relevant web resources, discuss the differences between flowcharts and pseudocode, as well as their merits and faults.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd