topic: Cyber security: Data integrity threats to organizatins make a presentation on the given topic.you can use the information provided in the attached documents I am attaching all the work done so

MITS Advanced Research Techniques

Research Proposal

Student’s Name

Higher Education Department

Victorian Institute of Technology

Proposed Title: Data Integrity Threats to Organizations

Abstract

Data integrity, an integral aspect of cyber security, is identified as the consistence and accuracy that is assured of data in its life cycle, and is an imperative aspect of implementation, design, and utilization of systems which processes, stores, and retrieves data (Graham, 2017). It is estimated that almost 90 percent of the world’s data was generated in the last two year, and this goes to show the rate at which data is being availed. There are various threats associated with data integrity, for example, security, human, and transfer errors, cyber-attacks and malware just to name a few. The purpose of examination of data integrity in the context of organizations and business is due to the impact that it has on the latter’s operations and eventual success.

Data integrity is important when it comes to the productivity and operations of an organization, because management make decisions based on real-time data that is offered to them. If the data presented to management is inaccurate due to lack of proper data integrity, then the decisions that they make might have an adverse effect on an organization. For example, if data related to last year’s projections and profits in the finance department is altered in any way, then the decision of making plans in relation to an organization’s financial position might be lead to further losses. Organizations ought to prioritize security measures through there various Information Systems departments or by seeking third party cyber security specialties to protect and mitigate against the threats related to data integrity.

Outline of the Proposed Research

What are the threats associated with data integrity and the impact they have on organizational productivity and operations?

Background

Data plays an integral role in today’s business environment especially when most organizations are harnessing the benefits of data to facilitate their decision-making processes. It is through understanding why and how data is important in business that one may also comprehend the importance of ensuring the integrity of this same data is upheld. Most individual think that data security and integrity are one and the same thing, which is not true, as security refers to leaking of information such as intellectual property and healthcare documents, whereas data integrity refers to the process of ensuring whether data is trustworthy to facilitate the decision-making process.

Due to the lack of proper systems and structures to ensure that data integrity is at the helm of an organization’s priorities, management has found it difficult to solely rely on data and analytics to facilitate their decision-making process. What this means is that a significant number of businesses are missing out on the advantages accorded through aspects such as data analytics. To enhance the trust of management of various organizations on data and analytics, threats related to data integrity have to be addressed and mitigated. Mitigation of threats ensures that the data presented is reliable, accessible, traceable, and retrievable.

Purpose

The primary purpose of the research is to offer insight into what data integrity is and its relationship to an organization’s decision-making process. After comprehension of data integrity, this should then be followed by understanding the various threats related to it, and the impact each has on data integrity. There are various strategies that organizations might use to eliminate or mitigate the impact of the threats to data integrity. At the end of the day, every organization ought to develop structures and systems that preserve data integrity. The goals of the research is to help an individual understand data integrity, its threats, and mitigation measure, through which they may be able to develop an authentication system that covers all aspect related to data integrity.

Rationale

The main reason why I am taking the time to tackle the issue of threats related to data and its integrity is due to the impact that I have seen data and analytics having on businesses. Technology is advancing at a much faster rate than most traditional businesses, which is the reality in most industries. Managers that accept this fact and actually capitalize on the enhancement of technology create for their organizations a market share and niche that is rather difficult to replace, through the gaining of competitive advantage. It took time before I fully comprehended the impact of data and analytics on business operations and decision-making processes, after which I made it a passion of mine to pursue the same. When it comes to the question of who cares, I would only say that data integrity, analytics, and security should only be the priority of managers that want to remain relevant in the ever-changing business environment.

Research Topic and central research question

What are the threats associated with data integrity and the impact they have on organizational productivity and operations? Some of these treats related to data integrity include transfer errors that were unintended, human errors, cyber-attacks and malware, security errors, and hardware that is compromised. Understanding the threats related to data integrity enables one to develop data preservation measure as well as mitigation measure to ensure that data remains trustworthy to facilitate the organization’s decision-making process. The reality is that organizations that gather the much needed competitive edge are those that capitalize on technology in enhancement of their business processes.

Methodological Approach

The methodological approach that will be implemented in this research will be qualitative research, which entails data that characterizes and approximates. The qualitative data obtained will be centered on the most common threats associated with data integrity, why managers do not fully rely on data for their decision-making processes, and difference between organizations that use data and those that do not completely rely on analytics to enhance their decision-making processes. Data may be collected through questionnaires and interviews, as well as examination of secondary sources.

Research Design

The research design process will also entail development of a questionnaire that will be used to gather information related to the threats that most organizations face and why managers do not fully rely on data for their decision-making processes. This will make up what is referred to as primary data. The research design employed will also be centered on analysis of case studies, and this will make up what are secondary sources. Data gathered from both this approaches will facilitate development of a clear understanding of the issue of threats related to data integrity and how they affect business operations.

Contribution

There is definitely a gap that exists between modern business operations and the impact that data-driven decisions have in profitability and productivity. The research carried out will foster to shed the light on why data and analytics are important and how managers can capitalize on this. A key aspect of data and analytics though is ensuring that the data integrity is upheld throughout the whole process, and this requires an understanding of the threats, mitigation and preservation measures, and the benefits of data integrity for organizations.

Proposed Time Schedule

Date

Tasks

29/03-11/04

11/04-18/04

18/04-02/05

02/05-16/05

16/05-30/05

30/05-13/06

13/06-20/06

20/06-04/07

Development of questionnaires and distribution. Also, gathering sources for case study

Analysis of sources from case studies and data from questionnaires.

Writing of research project.

Conclusion and review of research project.

Literature References

A. Belkacem and Z. Houhamdi, “Model for decision-making process with big data,” Journal of Theoretical and Applied Information Technology, vol. 96, p. 5951 – 5961, September 2018.

A. Nedal and N. Sail, “Data integrity in cloud computing security,” Journal of Theoretical and Applied Information Technology, Vol. 58, no. 3, p. 570, December 2013.

S. Kavale, “The role of data in strategic decision making process,” International journal of current research, vol. 4, no. 4, p. 01-07, February 2012.