please refer to the attachments. week 2 introduction was the introduction for the main project needs some corrections and which needs  bibliography  and literature review.Week 2

Portfolio Project

Introduction

Ankitha Pagadala

Introduction

I have been selected as the Chief Information Governance Information Officer (CIGO) at Apple

Company to develop a policy to promote secure data transmission and protect the enterprise and

its customers from the vulnerable to cyber-attacks. Apple Company stores transmit sensitive

information and handle large sums of money, which are at risk of increasingly sophisticated

cyber-attacks (Kangyi, 2021). The damage that can be caused, both in terms of financial losses

and damage to reputation, means that it is vital that companies take appropriate measures to

protect their information.

Like many other companies in the electronic industry that hire and endorse the position of a

CIGO, the company found it fit to hire me to assess the cyber-attack vulnerability and provide

recommendations to the necessary authorities. One key role is that of the Chief Information

Governance Officer (CIGO). As a CIGO, I am responsible for ensuring that all the processes are

secure, and that the organization complies with relevant legislation when ensuring the privacy of

its data system. The other significant role is to ensure that the company’s community is protected

from cyber-attacks. It is also in the customers’ interests that the company takes appropriate action

to protect its information.

Based on the assessment provided by the executive, the company faces many technical and

managerial challenges that create vulnerability to its sensitive data. One challenge is that the

company still stores much of its data in hard copy. Information stored in hard copy is prone to

theft, misplacement, and tearing, thus erasing critical information that can use during decision-

making. Although the company has started to collect its data in electronic format, they lack a

technology that fully protects the information. For instance, storing data in the file shares create

security vulnerability since the technology is not compatible with advancing Firewall software,

Lori Farr

Lori Farr

Lori Farr

Lori Farr

Lori Farr

Lori Farr
Bold

Lori Farr

Lori Farr
Page number on each page

Lori Farr

The other challenge is storing information in a relational database without policies and systems

to monitor the administration. The duplication issue can overwhelm the system, leading to the

database’s crash and losing data without any chance of recovery (Mullon & Ngoepe, 2019). In

business, managers always need to plan for the future. The most successful companies plan, set

goals and take responsibility for achieving those goals. However, some businesses do not plan. A

business that does not have policies to address the management of data, business, or customers,

is at a disadvantage.

Therefore, the main challenge of handling customers and data and leveraging social media with

considering the legal issues or adaptive policies that govern other organiza· This is the second milestone of the portfolio project.

For milestone 2, you will develop an annotated bibliography with a minimum of 10 peer reviewed scholarly articles.

Additionally, you will write the literature review for the final project. The entire milestone should be a minimum of 6 pages with 10 peer reviewed scholarly articles.

For your reference, the portfolio project guidelines are attached here. 
Please see the UC library for help in formatting your bibliography.
Here are some examples: 
·
Annotated Bibliography Samples

·
How to Prepare an Annotated Bibliography: The Annotated Bibliography

·
Annotated Bibliographies

Here are some resources to complete a literature review:
·
Literature Review: Purpose of a Literature Review

·
How to Write a Literature Review

·
Literature Reviews

·
The Writing Center – Literature Reviews

·
Writing a Literature Review

Expectations are that it will be a scholarly work, using largely peer-reviewed resources, formatted to APA 7 style. Grammar, spelling, and punctuation are significantly weighted.

Scenario:

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company.

Requirements:

The paper should include at a minimum of the following sections:
0. Title page
0. Executive Summary (Abstract)
0. Body
2. Introduction (including industry discussion – 1-2 pages)
2.
Annotated Bibliography (2-3 pages)

2.
Literature review (2-3 pages)

2. Program and technology r




Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.