Design Analysis Discussion Questions

 

 

 

 

 

 

Design Analysis Discussion Questions

Name:

Course Name and Number:

Course Instructor:

Institution:

Date Due:

 

Beside the Federal’s Health Insurance Portability and Accountability Act (HIPAA) of 1996, please provide others federal and state laws that impose data security in organizations? please provide two (1-2).

Data security is simply the practice of ensuring that data protection maintenance is put in place in order to protect it from corruption as well as access without authority. However, the main focus behind data security is ensuring privacy while at the time protecting corporate or personal data. Therefore, this has made it necessary to pass both federal and state legislations whose aim is to ensure providing of data security in organizations (Kennedy, 2009). Hence, despite the Health Insurance Portability and Accountability Act (HIPAA) which is a federal legislation that was put in place in 1996 there are other numerous state and federal legislations serving the same purpose (Ghosh and Turrini, 2010).

For instance, Fair and Accurate Credit Transactions Act of the year 2003 is a federal law allowing consumers to be requesting and obtaining free credit reports once a year from all the leading three nationwide companies that carries out consumer credit reporting such as: Equifax, TransUnion and Experian. This law also contains of provisions that ensures data security in the financial institutions thereby reducing identity theft such as the capability of placing alerts by individuals on their credit histories whenever there is suspicion of identity theft. This law also makes it difficult for  fraudulent application of credit cards. It also requires consumer information disposal which is secure (Ghosh and Turrini, 2010).

Moreover, The California Online Privacy Protection Act of the year 2003 is a  California state law which also ensures data security in organizations. Therefore, according to this law the commercial websites operators collecting information which is personally identifiable from California’s residents needs to be conspicuously posting as well as complying with a privacy policy meeting certain requirements (Kennedy, 2009).

What industries would make good candidates for establishing a data warehouse and why? please provide two (1-2).

Data warehousing has over the  recent past become the decision support trend. Hence, it is mostly used in data combination from multiple as well as varied sources to form a single comprehensive database which can be manipulated easily. However, there are various systems commonly used in accessing of data warehousing including queries, analysis as well as reporting (Wrembel, 2009). Moreover, the final result in data warehousing used by all the industries consist of homogeneous data capable of easy manipulation.

However, the industries that make the good candidate for establishing data warehouse are the telecommunications or information technology and banking industries. Hence, these industries commonly use the data warehousing in order to be  able to  analyze the trend of their businesses over a specific period of time (Wrembel, 2009). Moreover, corporations in these industries use the approach of  data warehousing in  solving their problems while at the same  time meeting their business needs.

For instance, the banking industry utilizes the data warehouse in making a variety financial decisions as well as generating financial statements (Wrembel, 2009). It also uses the data warehousing to view their operations on a day-to-day basis, thereby facilitating strategic planning which results from long-term data overviews. Hence, the  data stored in the data warehouses can be routinely used in providing more financial overviews in the banking industry. Moreover, the telecommunications or information technology industry mostly use data warehousing in analyzing their customer information necessary for integrated marketing (Wrembel, 2009). Therefore, as a result of these reasons the two industries are the most crucial candidates for establishing data warehouses.

References

Ghosh, S. and Turrini, E. (2010). Cybercrimes: A multidisciplinary analysis. Heidelberg: Springer-Verlag.

Kennedy, C.H. (2009). The Business Privacy Law Handbook. Norwood, MA: Artech House, Inc.

Wrembel, R. (2009). A survey of managing the evolution of data warehouses. International Journal of Data Warehousing and Mining, 5(2), 24-24-56.

 

Written by