Harrisburg University GRAD 695 Management of Identity Access in Information Security Research
Harrisburg University GRAD 695 Management of Identity Access in Information Security Research
Harrisburg University GRAD 695 Management of Identity Access in Information Security Research ORDER NOW FOR CUSTOMIZED AND ORIGINAL ESSAY PAPERS ON Harrisburg University GRAD 695 Management of Identity Access in Information Security Research I have attached the 1. Outline format required for the paper: GRAD695_Research_Proposal_Template_062120.docx Harrisburg University GRAD 695 Management of Identity Access in Information Security Research 2. Sample final Paper submitted previously: Final Proposal Sample 1 .docx 3. Previously submitted paper on the topic and feedback: GRAD695_WK7_Midterm_DRAFT_Feedback_082520.docx MidTerm Draft.docx Should add the REFERENCES in Word Document under the REFERENCES -> INSERT CITATION and bibliography. final_proposal_sample_1.docx grad695_research_proposal_template_062120.docx grad695_wk7_midterm_draft_feedback_082520.docx midterm_draft.docx Big Data Quality in Asset Management and Lead Generation: Designing Solutions for Quality Assessment and Quality Maintenance a thesis proposal by Raphael Zachary Cattan Spring 2018 Big Data Quality in Asset Management and Lead Generation Table of Contents ABSTRACT ..2 CHAPTER 1: INTRODUCTION .3 RELATIONSHIP TO CPT .5 RESEARCH QUESTIONS .6 STRUCTURE AND OVERVIEW ..9 CHAPTER 2: BACKGROUND . 10 DEFINITION OF TERMS 10 DATA IN HISTORY . 11 CONTEMPORARY DATA ISSUES .. 12 CHAPTER 3: LITERATURE REVIEW . 13 BIG DATA USAGE IN ENTERPRISE . 13 CHALLENGES OF OUR DATA DRIVEN SOCIETY 15 THE FINANCIAL POWER OF DATA . 16 NUMBERS DO LIE: WHEN DATA FAILS .. 18 CHAPTER 4: THEORY . 19 THE DATA-DRIVEN SOCIETY THEORY 19 BREAKDOWN OF DATA QUALITY . 20 ALTERNATIVE THEORIES .. 21 THEORETICAL FRAMEWORK 22 CHAPTER 5: METHODOLOGY 2Harrisburg University GRAD 695 Management of Identity Access in Information Security Research4 DATA COLLECTION .. 24 INTERVIEW GUIDELINES Harrisburg University GRAD 695 Management of Identity Access in Information Security Research 25 SEARCH TERMS AND DEFINITIONS 26 DATA ANALYSIS 27 CHAPTER 6: OUTPUTS AND CONTRIBUTIONS 30 ANTICIPATED OUTCOMES . 30 IMPACT OF CONTRIBUTIONS . 31 Theoretical Model .. 31 Thematic Analysis .. 31 Set of Guidelines . 31 LIMITATIONS 32 REFERENCES . 33 ABSTRACT 2 Big Data Quality in Asset Management and Lead Generation In todays world, data as a word and idea is gaining more and more importance by the minute. Quite literally, it has been estimated that more than 90% of existing data has been created in the past two years (Bradshaw, 2018). Facts like these force us to redefine what we consider data as well as the use we have for it. In our ever-growing economy and globalized world system, Data is being used not only according to its original use a store of information- but also as a source of information. What I mean by that is that not only does Data provide us with multiple pieces of information, but specifics about this Data as a whole can also now give us information in itself. Harrisburg University GRAD 695 Management of Identity Access in Information Security Research Just like a modern LCD or OLED screen, individual pieces of information pieced together can give birth to a novel image that in itself provides information. In achieving its reflectivity, Data had to develop different vulnerabilities that are becoming the center of attention and the weakest link of developed and sophisticated computerized systems. This thesis will try to explain the structural reasons behind those risks, as well as identify the most probable points of failure in Data Management, and will seek to provide novel solutions for Data Quality and Data Security maintenance. Chapter 1: Introduction 3 Big Data Quality in Asset Management and Lead Generation The very first instance of representation in human history is believed to have taken place in the southwestern part of France, in a set of caves commonly known as Les Grottes de Lascaux. It has been established that those paintings have been drawn over 19,000 years ago. This is the very first recorded (and still visible) transfer of information. As every other instance of evolution, the evolution of transfer of information has evolved on an exponential scale. It took roughly 15,000 years for simple images and drawings to evolve into pictograms, which in turn evolved into hieroglyphs about 1,500 years later, which finally evolved into the final form of language as we know it. Recording of information is one of the most important processes that our society as human beings have done as a group. Harrisburg University GRAD 695 Management of Identity Access in Information Security Research It allows for future generation to learn from the previous generations knowledge and use it as a base for their own studies and intellectual evolution. The Egyptians understood that concept very thoroughly, and proof of that is one of the most extraordinary places ever described: The Royal Library of Alexandria. The idea behind this edifice was very simple: to gather the entire knowledge of our civilization. As the story goes, the library was destroyed accidentally in a fire set by Julius Cesar. What is useful to retain from this story for the purpose of this thesis is that, even though everything seemed lost, data was quickly gathered throughout the following years and decades, and the knowledge contained within these walls is today relatively insignificant. It has been roughly estimated that the entirety of the library could easily be contained in a few Gigabytes of Data, and thus on a physically small entity such as a thumb drive (Bradshaw, 2018). The observed exponential growth of Data continues to this day, and while we have no issue with the containment of this data (thanks to Moores law), we are starting to put ourselves as a society in great danger regarding the quality and preservation (both on the qualitative and security levels) of such data. Recent examples of altered news as well as security breaches among the biggest names in the data gathering industry proves that none is spared. This thesis proposal will 4 Big Data Quality in Asset Management and Lead Generation try to establish the dangers and failure point of the different systems, as well as suggest innovative solution to palliate and resolve the current issues experienced. Relationship to CPT The company I work for as part of my CPT assignment is called Private Client Resources. PCR was created over 18 years ago and has been going through major changes in directions within the past couple of years. The companys new approach is to provide a custom solution targeted for Asset Managers and Wealth Managers for Data Aggregation and Data Analysis. Harrisburg University GRAD 695 Management of Identity Access in Information Security Research While many solutions exist for these services, the company differentiate itself by providing real time valuation for illiquid assets, also called alternative assets. I started this CPT assignment about 2 months ago and my role in the company is twofold at the moment: my first responsibility is ensuring that the data we provide and gather respects standards of quality and accuracy that will allow us to generate new customer leads for the company. My second responsibility is to build a sales system software that will take this data and use it to perform automatic email campaigns for the sales department. My proposed thesis is titled Big Data Quality in Asset Management and Lead Generation: Designing Solutions for Quality Assessment and Quality Maintenance. This thesis project will be beneficial to both my studies and my line of work. It will first allow me to study in depth the current issues and risks that data managers and data systems face today and secondly it will allow me to understand data management in system environments in todays technology. This will add a specialization to my degree as it will go into deeper focus onto how systems manage and keep data safe and of good quality. 5 Big Data Quality in Asset Management and Lead Generation Research Questions Discussing Data and the implications of its usage is a very broad topic. We could be talking about how it comes into creation as well as how it is used but this is not the topic of this research thesis. For the purpose of this thesis proposal, we will be focusing on the particular idea and concept of Data Quality and Data Security. Harrisburg University GRAD 695 Management of Identity Access in Information Security Research What is meant by Data Quality is the following idea: In todays world, Data is not compiled by hand and amassed bit by bit the way it used to be. Data today is created and structured by systems themselves, automatically. Data is generated at an unprecedented rate and compiled by powerful computers throughout networks. The idea is that Data gathered can be wrong in its nature because of multiple reasons (wrong input, fake accounts and data, etc.). We will be discussing the implications of such issues as well as existing consequences of these problem, finally proposing theoretical innovative solutions to solve those issues. The second issue raised by this theoretical analysis is the question of Data security. The safety and security of consumer data can be breached one of two ways: physically, or remotely. In order to address those issues on the specificity that we will need for this thesis proposal, we will make sure to establish a precise set of research questions that will help us defining and centering the scope of our research: Research Question 1: How are Data Quality standards set up and how do these standards influence the implementation of Big Data system in enterprise? Posing this question as the first of our research thesis proposal is crucial because it is necessary that we described the current standards that are being used in todays world in order to understand how they work and what they entail. More specifically, investigating how Data quality standards 6 Big Data Quality in Asset Management and Lead Generation are maintained in enterprises as well as how their security is preserved today allows us to understand how it can fail and how it can be improved. Research Question 2: How did Data shape our society in the past and how will it continue to do so in the future? It is very often said that in order to understand the present, we need to study the past. Data works the same way. Harrisburg University GRAD 695 Management of Identity Access in Information Security Research This second question of our research thesis proposal will allow us to understand how data came to gain such an important place in our society and our business dealings, as well as trying to understand through our research and the observations we made, how it will continue to shape that society in the future. Research Question 3: How does Big Data influence market movements and investors decisions, and what does data insecurity mean for it? This third question will allow us to refine the scope of our research to the influence of Big Data to the financial markets and most precisely general investors decisions as well as algorithmic trading. This question will allow us to center our research to Big Data as a whole picture while investigating the consequences of Bad Data into importance financial decisions. Research Question 4: How do the recent data breaches can give us insights on how to reshape our data handling process and come up with new standards of security? This fourth and last research question will allow us to think and research about the different points of failure in data management that have been the subject of very famous data breaches and understand how those weak links came to be, and what we can do to prevent such links to exist in the future. This is the question that will direct our research towards innovative solutions. 7 Big Data Quality in Asset Management and Lead Generation Research Question Question Boundaries Research Question 1: How are Data Quality standards set up and how do these standards Standards: The standards studied will be limited to standards implemented or created within the past 5 years at maximum in order to avoid obsolescence. In the past: We will focus our research and study on the past 100 years and focus our deep analysis on the past 30 years.Harrisburg University GRAD 695 Management of Identity Access in Information Security Research In the future: We will focus our research and analysis on the next 10-15 years. Market Movements: For the purpose of this study, we will focus on both the SP500 index components as well as a few Crypto-Assets. Recent data breaches: We will limit our scope of research to data incidents that happened within the past 5 years, although we will take into consideration earlier events in order to illustrate solution development. influence the implementation of Big Data system in enterprise? Research Question 2: How did Data shape our society in the past and how will it continue to do so in the future? Research Question 3: How does Big Data influence market movements and investors decisions, and what does data insecurity mean for it? Research Question 4: How do the recent data breaches can give us insights on how to reshape our data handling process and come up with new standards of security? TABLE 1: BOUNDARIES OF RESEARCH QUESTIONS 8 Big Data Quality in Asset Management and Lead Generation Structure and overview The proposed research thesis will begin by an assessment of data as a tool and a solution. It will start with some history background about data as well as global context in the idea of data in its essence. It will address points such as when it started to exist, how it has evolved throughout the year. In our study, we will point out and detail how our society has been shaped by data throughout the years and how it continues to be. Towards the end of this first part, we will transition to Data as it is known today which is computerized data. In the second part of the thesis, we will start by analyzing research based on the state of data usage in todays economy and business development environment. We will study the different standards that exists throughout the financial industry as well as compare it with other industries in order to see how this affects results and usage. Harrisburg University GRAD 695 Management of Identity Access in Information Security Research The third part of the thesis will be focused on Data and its relationship towards the financial world. We will study and research effects of data on market movements as well as new developing data usages in new technologies such as the Blockchain technology and others. Finally, the last and main part of the thesis will focus on data breaches in the recent years and their implications for the future, proposing new solutions based on research and study for reducing or even eliminating the risk of breach and provide solutions for a better future. TABLE 2: ANTICIPATED PROJECT TIMELINE 9 Big Data Quality in Asset Management and Lead Generation Chapter 2: Background Since human beings started recording data and reading it, they have been obsessed with analyzing it. Of course, in the beginning, analyzing data had a very different meaning from what it is today and was much less advanced. As soon as data gathering techniques evolved thanks to the multitude of different technological advances of our world, people were able to analyze data in a more profound and meaningful way. Starting in the 1950s post World War II period, data gave birth to a specialized type of Jobs: Spies. Spying was performed by a sovereign country and consisted in stealing information from another country or an independent organization. It started with physical documents, and then slowly evolved to microfilms. Today, as data became computerized, most of the worlds spying operations are done remotely. So, whether it is of military necessity, or business analysis, data has always been and will continue to be primordial in the development of our world (Isaac R. Porche, 2014). For that purpose, the present thesis will aim to research and explain how the quality of the original data as well as its security can compromise its applications. Definition of Terms Data: Any type of information or facts that are brought together for the purpose of analysis. Big Data: Big set of data that can only be analyze through a computer and can be studied for patterns and trends (Isaac R. Porche, 2014). Harrisburg University GRAD 695 Management of Identity Access in Information Security Research Data Quality: It represents the accuracy of the data provided as well as the degree of relevance. 10 Big Data Quality in Asset Management and Lead Generation Data Security: It is the set of measures to ensure that data is protected from unauthorized access from inside or outside, but it also defines the set of measures to ensure that data is protected from degradation. Data in History As we have explained before, during the early ages of our world, all of its data was stored in one place only and that was the Great Library in Alexandria, Egypt. Today, data is stored very differently. It is for the most part decentralized (compared to what is was before). This means that different companies own different types of data that pertains to their business, or not. We will see during the study of this thesis that the concept of decentralization as it is today being very different from what new thinkers and crypto-assets e Get a 10 % discount on an order above $ 100 Use the following coupon code : NURSING10
Use Promo Code: FIRST15