Working as a software developer in telecom company Words requirement: 500Courses 1 : Information Governance Course 2 : Data s

Working as a software developer in telecom company 

  • Words requirement: 500

Courses 1 : Information Governance 

Course 2 : Data science and Big data analysis

Nearing the end of the semester, it is now time for students to reflect on the knowledge obtained in their course(s) and determine the effectiveness of incorporating real-world experience into our academic curriculum.  Students should;

  • Be able to apply knowledge and theory gained in their courses of study within current workplace or in their future employment.
  • Be able demonstrate the application of theory to workplace in written form.
  • Be able to identify the benefits of incorporating real-world experience into an academic program.

Requirement for the Reflection:Students will reflect on the connection between knowledge concepts for courses they are enrolled for the current semester and how those have been, or could be, applied in the workplace.

  • If any outside content or resources are used, proper APA citations and references are required.

Courses 1 : Information Governance 

syllabus :

Alves de Freitas, Andrade dos Reis, E., Senra Michel, W., Gronovicz, M. E., & de Macedo Rodrigues, M. A. (2013). Information Governance, Big Data and Data Quality. 2013 IEEE 16th International Conference on Computational Science and Engineering, 1142–1143.Tallon, Ramirez, R. V., & Short, J. E. (2013). The Information Artifact in IT Governance: Toward a Theory of Information Governance. Journal of Management Information Systems, 30(3), 141–178.

Tallon. (2013). Corporate Governance of Big Data: Perspectives on Value, Risk, and Cost. Computer (Long Beach, Calif.), 46(6), 32–38.Turel, Liu, P., & Bart, C. (2017). Board-Level Information Technology Governance Effects on Organizational Performance: The Roles of Strategic Alignment and Authoritarian Governance Style. Information Systems Management, 34(2), 117–136.Simberkoff. (2016). 5 best practices for information governance and risk management. KM World, 25(8), S30–.

Generally Accepted Recordkeeping Principles 2017 ARMA International, www.arma.org/principles.MacLennan, Alan. (2017). Information Governance and Assurance: Reducing Risk, Promoting Policy, pp.10 – 44. Facet Publishing.Hulme. (2012). Information Governance: Sharing the IBM approach. Business Information Review, 29(2), 99–104.New IGRM version recognizes value of privacy, security. (2013). The Information Management Journal, 47(1), 16–.Saffady. (2015). Records management or information governance? The Information Management Journal, 49(4), 38–.

Calderaro, & Craig, A. J. S. (2020). Transnational governance of cybersecurity: policy challenges and global inequalities in cyber capacity building. Third World Quarterly, 41(6), 917–938.Ali, Green, P., Robb, A., & Masli, A. (2022). Governing information technology (IT) investment: A contingency perspective on organization’s IT investment goals. Australian Journal of Management, 47(1), 3–23.DeNardis. (2017). Cybersecurity Governance. In The Global War for Internet Governance (pp. 86–106). Yale University Press.

Manning. (2020). “Rifled Precision”: Using E-discovery Technology to Streamline Books and Records Litigation. Vanderbilt Journal of Entertainment and Technology Law, 22(3), 663–.Ward, Purwin, C., Sipior, J. C., & Volonino, L. (2009). Recognizing the Impact of E-Discovery Amendments on Electronic Records Management. Information Systems Management, 26(4), 350–356.Vinjumur. (2018). Predictive Coding Techniques With Manual Review to Identify Privileged Documents in E-Discovery. ProQuest Dissertations Publishing.Vogel, & Rood, D. K. (2019). Dealing with subpoena requests for digital data. Journal of Accountancy, 227(3), 12–13.

Tallon, Ramirez, R. V., & Short, J. E. (2013). The Information Artifact in IT Governance: Toward a Theory of Information Governance. Journal of Management Information Systems, 30(3), 141–178.Brooks. (2019). Perspectives on the relationship between records management and information governance. Records Management Journal (London, England), 29(1/2), 5–17.Bhatia, Douglas, E. K., & Most, M. (2020). Blockchain and records management: disruptive force or new approach? Records Management Journal (London, England), 30(3), 277–286.

Borgman. (2018). Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier. Berkeley Technology Law Journal, 33(2), 365–412.Henttonen. (2017). Privacy as an archival problem and a solution. Archival Science, 17(3), 285–303.MacLennan, Alan. (2017). Information Governance and Assurance: Reducing Risk, Promoting Policy, pp. 113 – 123. Facet Publishing.Viktor Mayer-Schönberger. (2010). Beyond Privacy, Beyond Rights—Toward a “Systems” Theory of Information Governance. California Law Review, 98(6), 1853–1885.

Lappin, Jackson, T., Matthews, G., & Onojeharho, E. (2019). The defensible deletion of government email. Records Management Journal (London, England), 29(1/2), 42–56.Bojana, K. (2018). Why your information governance strategy must start with email. Jatheon.Gundling, M. (2019). What every company should know about email management for Sarbanes-Oxley Compliance. 

Haynes. (2016). Social media, risk and information governance. Business Information Review, 33(2), 90–93.Olly Jackson. (2018). GDPR: companies at risk over unstructured data. International Financial Law Review.Madhava. (2011). 10 things to know about preserving social media. The Information Management Journal, 45(5), 33–.

Chhabra, & Bala, M. (2018). A Comparative Study of Data Deduplication Strategies. 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), 68–72.Franks. (2015). New technologies, new challenges: Records retention in a cloud environment. Canadian Journal of Information and Library Science, 39(2), 191–.Luciana Duranti & Corinne Rogers. (2019). Trusting Records in the Cloud: The Creation, Management, and Preservation of Trustworthy Digital Content , pp 119 – 131. Facet Publishing.

Course 2 : Data science and Big data analysis

syllabus

Cappa, Oriani, R., Peruffo, E., & McCarthy, I. (2021). Big Data for Creating and Capturing Value in the Digitalized Environment: Unpacking the Effects of Volume, Variety, and Veracity on Firm Performance. The Journal of Product Innovation Management, 38(1), 49–67.

Maqueira-Marín, Bruque-Cámara, S., & Minguela-Rata, B. (2017). Environment determinants in business adoption of Cloud Computing. Industrial Management + Data Systems, 117(1), 228–246.Psomakelis, Aisopos, F., Litke, A., Tserpes, K., Kardara, M., & Campo, P. M. (2016). Big IoT and social networking data for smart cities: Algorithmic improvements on Big Data Analysis in the context of RADICAL city applications.Chan, Cheung, C. M. K., & Wong, R. Y. M. (2019). Cyberbullying on Social Networking Sites: The Crime Opportunity and Affordance Perspectives. Journal of Management Information Systems, 36(2), 574–609.

Dash, Shakyawar, S. K., Sharma, M., & Kaushik, S. (2019). Big data in healthcare: management, analysis and future prospects. Journal of Big Data, 6(1), 1–25.

Nastaran Hajiheydari, Mohammad Soltani Delgosha, Yichuan Wang, & Hossein Olya. (2021). Exploring the paths to big data analytics implementation success in banking and financial service: an integrated approach. Industrial Management + Data Systems, 121(12), 2498–2529.

Dai, Wang, H., Xu, G., Wan, J., & Imran, M. (2019). Big Data Analytics for Manufacturing Internet of Things: Opportunities, Challenges and Enabling Technologies.

Ge, M., Bangui, H., & Buhnova, B. (2018). Big data for internet of things: a survey. Future generation computer systems, 87, 601-614

Ertug, Gruber, M., Nyberg, A., & Steensma, H. K. (2018). From the Editors—A Brief Primer on Data Visualization Opportunities in Management Research. Academy of Management Journal, 61(5), 1613–1625.

Ozgur, Colliau, T., Rogers, G., & Hughes, Z. (2021). MatLab vs. Python vs. R. Journal of Data Science, 15(3), 355–372.Elhoseny, Kabir Hassan, M., & Pejic-Bach, M. (2020). Special Issue on “Cognitive Big Data Analytics for Intelligent Information Systems.” Information Systems and e-Business Management, 18(4), 485–486.Jin, & Kim, H.-J. (2018). Integrated Understanding of Big Data, Big Data Analysis, and Business Intelligence: A Case Study of Logistics. Sustainability (Basel, Switzerland), 10(10), 3778–.Sun, Z., Sun, L., & Strang, K. (2018). Big data analytics services for enhancing business intelligence. Journal of Computer Information Systems, 58(2), 162-169

Cunha, M. N., Chuchu, T., & Maziriri, E. (2020). Threats, challenges, and opportunities for open universities and massive online open courses in the digital revolution. International Journal of Emerging Technologies in Learning (iJET), 15(12), 191-204.Marcu, D., & Danubianu, M. (2019). Learning Analytics or Educational Data Mining? This is the Question… BRAIN. Broad Research in Artificial Intelligence and Neuroscience, 10, 1-14.Poudyal, Akhtar, Z., Dasgupta, D., & Gupta, K. D. (2019). Malware Analytics: Review of Data Mining, Machine Learning and Big Data Perspectives. 2019 IEEE Symposium Series on Computational Intelligence (SSCI), 649–656.Bibri, S. E. (2018). The IoT for smart sustainable cities of the future: An analytical framework for sensor-based big data applications for environmental sustainability. Sustainable cities and society, 38, 230-253.Nica, Konecny, V., Poliak, M., & Kliestik, T. (2020). BIG DATA MANAGEMENT OF SMART SUSTAINABLE CITIES: NETWORKED DIGITAL TECHNOLOGIES AND AUTOMATED ALGORITHMIC DECISION-MAKING PROCESSES. Management Research and Practice, 12(2), 48–57.Trettin, C., Lăzăroiu, G., Grecu, I., & Grecu, G. (2019). The social sustainability of citizen-centered urban governance networks: Sensor-based big data applications and real-time decision-making. Geopolitics, History and International Relations, 11(2), 27-33

Khurshid. (2020). Applying Blockchain Technology to Address the Crisis of Trust During the COVID-19 Pandemic. JMIR Medical Informatics, 8(9), e20477–e20477.Narman, & Uulu, A. D. (2020). Impacts of Positive and Negative Comments of Social Media Users to Cryptocurrency. 2020 International Conference on Computing, Networking and Communications (ICNC), 187–192.Chen, Y., & Bellavitis, C. (2020). Blockchain disruption and decentralized finance: The rise of decentralized business models. Journal of Business Venturing Insights, 13, e00151.Du, W. D., Pan, S. L., Leidner, D. E., & Ying, W. (2019). Affordances, experimentation and actualization of FinTech: A blockchain implementation study. The Journal of Strategic Information Systems, 28(1), 50-65.What is Bitcoin?Nakashima, & Kodate, J. (1999). Integrity of the gate oxide on the thin top Si layer in ITOX-SIMOX wafers. 1999 IEEE International SOI Conference. Proceedings (Cat. No.99CH36345), 119–120.

Khurshid. (2020). Applying Blockchain Technology to Address the Crisis of Trust During the COVID-19 Pandemic. JMIR Medical Informatics, 8(9), e20477–e20477.Narman, & Uulu, A. D. (2020). Impacts of Positive and Negative Comments of Social Media Users to Cryptocurrency. 2020 International Conference on Computing, Networking and Communications (ICNC), 187–192.Chen, Y., & Bellavitis, C. (2020). Blockchain disruption and decentralized finance: The rise of decentralized business models. Journal of Business Venturing Insights, 13, e00151.Du, W. D., Pan, S. L., Leidner, D. E., & Ying, W. (2019). Affordances, experimentation and actualization of FinTech: A blockchain implementation study. The Journal of Strategic Information Systems, 28(1), 50-65.What is Bitcoin?Nakashima, & Kodate, J. (1999). Integrity of the gate oxide on the thin top Si layer in ITOX-SIMOX wafers. 1999 IEEE International SOI Conference. Proceedings (Cat. No.99CH36345), 119–120.

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more