62998 – Assessment 3 InformationSubject Code: DATA4000Subject

SOLUTION AT Australian Expert Writers

3 InformationSubject Code: DATA4000Subject Name: Introduction to Business AnalyticsAssessment Title: Individual Report and Individual PresentationAssessment Type: Report and PresentationWord Count: 1800 words ± 10% for Part A (report)8 – 12 slides for Part B (presentation)Weighting: 40 % (25 + 15)Total Marks: 40Submission: Turnitin and In classDue Date: Part A due Monday Week 12, 23:55pm AEST through TurnitinPart B video presentation due Monday Week 13, 23:55pm AEST through MyKBS link.Your TaskConsider below information regarding two case studies. Choose ONE of the two case studies and using the resources listed, together with your own research, :• Part A (Industry Report) Individually by Monday 23: 55pm AEDT Week 12• Part B (Application for data access presentation) submitted in Monday Week 13 at 23:55 AEST, as an individual video upload.Assessment DescriptionOption 1: EquifaxBackgroundWho is Equifax?Equifax is a global company who provides data, analytics and technology services. Their main service involves providing credit ratings, credit reports and credit histories for loan applications. The main users of this service are banks, mortgage brokers and finance providers. Equifax provides credit reports by using the name, address, phone number, social security number and forms of identification such as a driver licence or passport. They therefore hold a database of all the individuals who have been input in the Equifax .Source: https://www.equifax.com/about-equifax/HistoryEquifax started out in Australia as a mutual organization named Credit Reference Association. After being renamed to Veda Advantage in 2006, they became the first company in Australia to comprehensive reports of car histories. Veda Advantage was eventually purchased by Equifax (NYSE:EFX) in 2016 to become the leader in credit reports in Australia.When an individual applies for any sort of financing, especially with banks, a thorough check is made on the client in order to assess the credit worthiness of the individual. This is to decrease the asymmetric information issue which arises in principal agent relationships. Equifax being the leader in credit reports in Australia and having a presence in 21 countries, the company has amassed a vast database of individuals and their financial information.In September 2017, Equifax announced a breach in their system in which 147 million customers were affected. This large scale breach is believed to be one of the most substantial in . The hackers were able to retrieve credit card numbers, social security numbers, identification numbers and more. the case investigation, it was found that Equifax were made aware of the possibility of a breach six months prior but did not act to safeguard their data adequately. As a result, the company has had to pay $700 million to settle federal and state suits.Source: https://www.cnbc.com/2019/07/22/what-you-need-to-know-equifax-data-breach-700-million-settlement.htmlIssues with sharing and integration of personal credit and personal financial data1. SecurityHackers were able to access the company’s servers using a known vulnerability in the Equifax system. The servers were not properly segmented, hence the hackers were able to access unencrypted data from the customer complaint portal. Although this fault should have been rectified long before the breach, no actions were taken due to a defective internal system within the company. The company also did not announce the breach straight away. Firstly, it took Equifax 76 days to realise that hackers had entered their system. Moreover, it took the company more than a month after they were aware of the breach to disclose it to the public, giving the hackers ample time to mine a significant amount of data but also to sell it on the dark web if they wanted to.Source: https://www.csoonline.com/article/3444488/equifax-data-breach-faq-what-happened-who-was-affectedwhat-was-the-impact.html2. PrivacyAs a remedy to the breach, Equifax created a secondary domain called equifaxsecurity2017.com. This move was greatly criticized as the domain name resembles a phishing scam domain. It was said that customers would have trouble trusting the new website, especially since their personal information and identity had just been compromised.Source: https://www.csoonline.com/article/3444488/equifax-data-breach-faq-what-happened-who-was-affectedwhat-was-the-impact.htmlOption 2: FacebookBackgroundWhat is Facebook?Facebook is an American social media platform which originated from the dorms of Harvard College. Mark Zuckerberg, along with four fellow students founded the platform and expanded the service continuously until 2006, where any individual over the age of 13 years were allowed to join Facebook.HistoryFacebook has worked its way through the masses to become the leading social networking service provider, by acquiring giants such as Instagram in 2012 and Whatsapp in 2014. With the four most downloaded apps under their belt, the company holds extremely valuable data, which it uses to provide analytics solutions to companies and marketers.Source: https://analytics.facebook.com/In April 2020, Facebook announced another cyber-security breach regarding its database. This breach resulted in the profiles of 267 million people being sold on the dark web. The profiles included personal information such as e-mail addresses, names, phone numbers, etc being sold for a mere $623. The information stolen did not include passwords, but with the use of e-mail addresses and phone numbers, the individuals whose profiles were compromised are now at risk of falling victim of phishing e-mails and texts to retrieve passwords and other information.Source: https://www.techradar.com/au/news/millions-of-facebook-profiles-for-sale-on-the-dark-webThe above breach is not the first one committed to the Facebook server. In September 2018, the personal information of nearly 50 million users was stolen from the Facebook network. This breach was the largest in the company’s history at the time. The hackers used a vulnerability in the code of the social platform in order to gain control of the data. This has come at an opportune time for Facebook, as they were already under review for allegedly giving access to the data of 87 million users to a British analytics firm.Source: https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-breach.htmlIssues with handling of personal data on and by social network platforms1. AcquisitionFacebook was found to have logged data from its users’ phones and collected their phone calls and SMS texts without having clearly informed the users. This goes against Facebook’s earlier claim that they only acquired the data for those user who have “opted-in” to having their data collected.Source: https://www.theguardian.com/technology/2018/mar/29/facebook-logged-sms-text-phone-calls-userscomplain2. Data HarvestingIn 2018, it was found that the data stored for around 50 million profiles had been harvested by Cambridge Analytica, a firm working with Donald Trump’s election team. The British analytics company used the data to target users in the now POTUS’s electoral campaign. This scandal arose after Facebook executives claimed that the company had stopped giving access to their data to third-party app developers.Sources: https://www.bbc.com/news/business-49099364 & https://www.theguardian.com/technology/2018/dec/14/facebook-privacy-problems-roundupAssessment InstructionsPart A: Industry Report (1800 words, 25 marks)- IndividualYou are required to choose ONE of the two options provided above and evaluate the implications of the GDPR on the company’s business model. The structure of your report should be as follows.Your report needs to be structured in line with the Kaplan Business School Report Writing Guide and address the following areas:• Data Usability? Benefits and costs of the database to its stakeholders.? Descriptive, predictive and prescriptive applications of the data available and the data analytics software tools this would require.• Data Security and privacy? Data security, privacy and accuracy issues associated with the database.• Ethical Considerations? The ethical considerations behind whether the user has the option to opt in or opt out of having their data stored.? Other ethical issues of gathering, maintaining and using the data.• Artificial Intelligence? How developments in AI intersects with data security, privacy and ethics.• Use the sources below as well as your own research.• https://research.vu.edu.au/ordsite/ethics/ethics_childlren_handbook.pdfNOTE: Be mindful that your choice of company in Part A will greatly affect what you may need to do for Part B).Part B: Presentation (5 minutes, 15 marks)Instructions: Students to prepare a presentation of 10 – 12 slides. Students can use MS Powerpoint to organize their slide deck but other tools will be accepted as well (e.g. Prezi).Imagine that you are an analyst from one of the companies wanting to access the data generated by your chosen company in Part A for an analytics-based research project.Create a presentation of approximately 5 minutes in which you discuss how your organization uses its data and the broad implications involved. Discuss the issues below, and imagine you are communicating this presentation to government (regulators and / or legislators) as your audience.Consider:1. Why you want the data and the resulting benefits to the community;2. How the data can be sourced ethically and securely;3. How you will keep the data safe and de- individuals; and4. How you will present the results and add insights in an ethical way.Use the sources below as well as your own research.http://www.health.gov.au/internet/main/publishing.nsf/Content/964591B00A3C9D72CA2582C70083A1CA/$File/Public%20Consultations%20Paper.pd fhttps://www.oaic.gov.au/agencies-and-organisations/guides/de-identification-and-the-privacy-actImportant Study InformationAcademic Integrity PolicyKBS values academic integrity. All students must understand the meaning and consequences of cheating, plagiarism and other academic offences under the Academic Integrity and Conduct Policy.What is academic integrity and misconduct?What are the penalties for academic misconduct?What are the late penalties?How can I appeal my grade?Click here for answers to these :http://www.kbs.edu.au/current-students/student-policies/.Word Limits for Written AssessmentsSubmissions that exceed the word limit by more than 10% will cease to be marked from the point at which that limit is exceeded.Study AssistanceStudents may seek study assistance from their local Academic Learning Advisor or refer to the resources on the MyKBS Academic Success Centre page. Click here for this information.Assessment Marking GuideSection Criteria NN (Fail) 0%-49% P (Pass)50%-64% CR (Credit) 74%-65% DN (Distinction) 75%-84% HD (High Distinction) 85%-100%Part A:IndividualReport Evaluate the data usability, security and ethics associated with creating a data repository for diverse stakeholders and consider software requirements Failure to address data usability and security issuesassociated with thecompany databaseor failure to consider software requirements Basic of data usability and security issues associated withcreating the systemLimited consideration of software capabilities Considered discussion of data usability and security issues associated withcreating the systemAdequate description of the feasibility of data usability given current software capabilities Clear evaluation of key data usability and security issues associated withcreating systemWell-supported consideration of the feasibility of data usability given current software capabilities Comprehensive evaluation ofkey data usability and security considerations associated with creating the system with a focus onvarious stakeholdersVery high standard assessment of the feasibility of data usability given current software capabilitiesProduce a report which is well-researched,correctly referenced, professionally presented, logical, wellstructured and addresses the relevant issues Report is not logical and fails to evaluate majorissuesInadequate research conducted and sources incorrectly acknowledged Partially referenced evaluation of issues, without alogical structure and acknowledgement of some sources from limited research Referenced evaluation of some relevant issues with acknowledgement of most sources and evidence of reasonable research conducted into the topic Referenced and congruent evaluation of relevant issues with acknowledgement of a wide range of sources and evidence of broadresearch conductedinto the topic Well-referenced, engaging and logical evaluation of relevant issues with correct acknowledgement of extensive sources and evidence of comprehensive research conducted into the topicSee part B next pageSection Criteria NN (Fail) 0%-49% P (Pass) 50%-64% CR (Credit) 74%-65% DN (Distinction) 75%-84% HD (HighDistinction) 85%-100%Part B: Presentation Construct a business case outlining the benefits of using and storing the data, while addressing the relevant ethical and security issues and concerns Failure to make an effective argument around using the data for research and no consideration ofdrawbacks A limited description of the benefits of using the data for research purposes is made and very few of the ethical and security drawbacks are mentioned A solid presentation of the benefits of using the data for research purposes is made and some of the ethical and security draw-backs are discussed A high-quality business case for using the data for research purposes is made by considering its major benefits and analysing the ethicaland security draw-backs An effective business case for using the data for research purposes is made byconvincinglyarticulating the benefits this would provide for society, and expertly analysing the ethical and security draw-backsEffectively and clearly communicate an argument to use the data for research purposes while considering the audience and their motivations Failure to effectively communicate key messages and a lack of consideration for the audience’s needs Brief listing of how the data can be used for research in a way that is understandable to most people Solid description of the use of the data for research in a way that considers some of the target audience’s needs Clear communication and justification of the use of the data for research in a way that sufficiently considers the target audience’s needs Effectivecommunication and convincing justification of the use of the data for research in a way that persuades a target audienceAssignment SubmissionPart B to be submitted In class in week 12. Students must submit Part A via Turnitin on Monday of Week 12 at 23:55pm AEST.This file must be submitted as a PDF document to avoid any technical issues that may occur from incorrect file format upload. Uploaded files with a virus will not be considered as a legitimate submission. Turnitin will notify you if there is any issue with the submitted file. In this case, you must contact your lecturer via email and provide a brief description of the issue and a screen shot of the Turnitin error message.Students are also encouraged to submit their work well in advance of the time deadline to avoid any possible delay with Turnitin similarity report generation or any other technical difficulties.Late assignment submission penaltiesPenalties will be imposed on late assignment submissions in accordance with Kaplan Business School’s Assessment Policy.Number of days Penalty1* – 9 days 5% per day for each calendar day late deducted from the student’s total Marks.10 – 14 days 50% deducted from the student’s total marks.After 14 days Assignments that are submitted more than 14 calendar days after the due date will not be accepted and the student will receive a mark of zero for the assignment(s).Note Notwithstanding the above penalty rules, assignments will also be given a mark of zero if they are submitted after assignments have been returned to students.*Assignments submitted at any stage within the first 24 hours after deadline will be considered to be one day late and therefore subject to the associated penalty.If you are unable to complete this assessment by the due date/time, please refer to the Special Consideration Application Form, which is available at the end of the KBS Assessment Policy:https://www.kbs.edu.au/wp-content/uploads/2016/07/KBS_FORM_Assessment-Policy_MAR2018_FA.pdf

Order from Australian Expert Writers
Best Australian Academic Writers