Project Proposal
Data Analysis and Analytics Research
Information is considered to be the new form of currency in business. Information has become part of people’s everyday lives. We can see data everywhere. For instance, we can find them on our credit card or ATM card, our financial records, property documents, health data, or even in the internet.
Data sharing connects us with each other and promotes globalization. The sharing of data can be advantageous to everyone because it provides a credit is directly attributed to the researcher whose research output allows the results of the research to be scrutinized, maximizing the accountability and transparency of the researcher and their research. It encourages uses of the potential new data as well as innovation. It reduces the duplication of the collection of data expenses; promotes debate and scientific inquiry; encourages the use of data that were established and the findings of the research; provides significant resources for training and education; and leads to a new cooperation between the creators and the users of the data (Eynden et al 2011).
However, the sharing of data can sometimes be considered as a threat that could lead to a breach of security and privacy of an individual. There are several researchers whose findings suggest that the sharing of data can be a disadvantage to everyone. Security breach is believed to be one of the challenges in the sharing of data (Online Trust Alliance 2014; Bennett 2008); thus, it must be stopped or prevented at an early stage. Rather than waiting for the breach of security to occur, it would be better to avoid them from happening by following measures, namely the development of responsive measures and the risk assessment. These two measures must work together for the success of mitigating the breach of security. The development of responsive measures consists of the implementation of technical solutions, the evaluation of risk, and the implementation of the policies for security. On the other hand, risk assessment refers to an efficient program for data security (Jones Day 2008). The services of cloud storage are commonly based on the idea of providing a high level accessibility to the stored information and service from any physical location. However, the providers of cloud services may not have the capacity to implement specific regulation for password or lifespan. In addition, the physical device layer of the cloud services provides storage of data and supporting application. The solution for this is through the layer called the shared resource layer where most of the models of the infrastructure provider offer premium solutions that allow committed hardware at this particular layer. Another issue about cloud services is the cloud email. The main concern with cloud email is the transmission of email within the cloud infrastructure. First is the security of any sensitive data within the attachments, and second is the security of any sensitive data that is within the email body. The acceptable solution is to technically implement the encryption of the attachment, depending on the organization and accessibility of the use of certain software of the client’s email, which is used to connect to the cloud services (Federal Bureau of Investigation 2012).
Opportunities to use analytics to develop performance and to make decisions in every industry as well as in the new large data for technology abound. The opportunities that strengthen data analytics consist of big data that rely upon extensible and scalable information foundation. The initiatives of big data are driven by customer analytics, and the enterprise is practical when it comes to big data (IBM n.d).
References
Bennett, S. (2008). Data Security Breaches: Problems and Solution [PDF Document]. Retrieved
Eynden, V.V.; Corti, L.; Woollardm M.; Bishop, L.; & Horton, L. (2011). Managing and Sharing
Data [PDF Document]. Retrieved from UK Data Archive website: http://www.data-archive.ac.uk/media/2894/managingsharing.pdf
Federal Bureau of Investigation. (2012). Recommendations for Implementation of Cloud
Computing Solutions [PDF Document]. Retrieved from Federal Bureau of Investigation website: https://www.fbi.gov/about-us/cjis/CJIS%20Cloud%20Computing%20Report_20121214.pdf
IBM. (n.d). Analytics: The Real-World Use of Big Data: How Innovative Enterprise Extract
Value from Uncertain Data [PDF Document]. Retrieved from IBM website: http://www-03.ibm.com/systems/hu/resources/the_real_word_use_of_big_data.pdf
Online Trust Alliance. (2014). Data Protection & Breach: Readiness Guide [PDF Document].
Retrieved from Online Trust Alliance website: https://otalliance.org/system/files/files/best-practices/documents/2014otadatabreachguide4.pdf