This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

the advancement of technology

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

the advancement of technology

Introduction

In the advancement of technology, various steps have been taken. The OPEN Data is one of a wonderful niche explored. It involves data or information that is accessible to anyone interested (Jain, Gyanchandani & Khare,2016). The data is available in a machine-readable format. Occasionally the data is licensed in a manner that people are permitted to use the data in any way. It can be transformed, changed, and even shared with other parties. Some also may commercialize the data. The executive branch has a vital role in converting paper-based data sets to digital formats. The executive also distributes the data using digital government websites. The data presented is well analyzed, and the originality of the data is maintained. The language used is precise for the comprehension of all people concerned. Hence the OPEN Data initiative comes with several merits, but some challenges involving cyber insecurity often pop up.

Benefits of Open Data in Businesses and General public

Open data has many benefits across businesses and the general public. The benefits are the primary purpose for the quest for cybersecurity to prevent ineffectiveness of the reason the Open Data is used. The benefits cut across social, economic, and environmental ways. Companies related to energy, education, Health care, real-estate, and social-minded buying are the core beneficiaries. In terms of conventional ways, open data enables people to have a platform of sharing opinions and ideas. The platform allows opinions posted to be public as long as they do not have obscene language or violate privacy rules. One can get these ideas and generate businesses. Moreover, ideas about governmental bodies may be used in improving service delivery to the public. In the social-minded buying information of products intended to be bought and their ratings are available. Recent research in the Global institute shows that future creation of $3 trillion or more is likely to occur. Perhaps advertisements for quality products may occur in the open data platform since businesses easily segment their relevant markets. Business ventures are expected to thrive in all areas due to the massive exposure to the platform. Therefore, when the right motives are undertaken in the business world, open data service improves business in possibly all fields.

Concurrently the general public benefits from the platform. Government data seen in the platform empowers the citizens since it is a clear indication of how the government works. Also, the delivery of public services becomes more effortless. Furthermore, with the help of open-data analytics help in understanding consumers’ preference for the products onboard(Attard, Orlandi, Scerri, & Auer,2015). Eventually, according to consumer demands, products are produced to reach their market, thus benefiting the public.

Security issues

Due to multiple technological devices, cybersecurity also needs to be in the same apparent advancement. Cyber Security issues arise when open data is inaccurate and altered. The authenticity of the data becomes unreliable. It leads to the information being correct and causes poor outcomes to businesses and the public who highly depend on the data (Lämmel, Tcholtchev & Schieferdecker, 2017). The federal government works to shun evil acts. All Open Data that is posted on the government website has to be affirmed by the federal government. It happens through the issuing of digital signatures, cryptography, and seals of authenticity.

Moreover, it has the Federal Digital System (FDsy), which manages and preserves its content. Also, being an advanced search engine, it easily monitors the data being processed and can easily detect malicious intended acts on the website. When close vigilance is done, confidentiality and integrity are improved. Open data becomes safe for consumption by all relevant businesses and the public.

 

Recommendations

In getting the best, several steps must be involved in enhancing the best outcome of the recommendations and the effectiveness when implemented. From NIST SP 800-53, the Cyber Risk Management Lifecycle Management is used. It involves understanding the threat and getting the potential effect of the danger. Identifying the risk follows then remediating the risk then eventually reducing the risk. Therefore, as the steps are shown, it shows that all measures have to have a valid reason in understanding the mechanism being shunned in cybersecurity.

Firstly, I recommend using encryption-based methods to protect the data on government websites (Davies & Perini, 2016). It involves the use of strong passwords, which are supported by token devices such as credit cards. Though the Open Data is exposed to everyone, editing the available data and updating it lies under few individuals. These people should ensure that when feeding the data, passwords must be fitted, and confidentiality is highly maintained.

The use of data signatures is another superb recommendation. It happens where all Open data presented for viewing must have the digital signature. Having the signature in place enhances the data exposed to the people is authentic. The data also is reliable since it has the correct statistics and enhances business progression.

The Use of whitelisting software applications is useful. It involves the listing of application and application problems that are legally authorized (Borders,2015). The confidence of the public is improved since there is no fear of getting malicious websites or links in data analy

sis.

Stable antivirus software is a fabulous initiative. Since a lot of malware is used in altering the data, antivirus becomes the best way to solve the spiteful acts. The antivirus detects any intentions of destroying the data, and close vigilance is followed. Eventually, the free-virus open data saves all people the massive tragedy likely to occur.

Regulations of data fed by the public are essential. Having personal information, such as email addresses and phone numbers, should be strictly banned. Furthermore, when expressing opinions and business ideas in the platform, obscene language should not be allowed. Open Data should be precise and open to all people at large.

Conclusion

Open data has many merits in advancing technology and the economy of each country, such as America. However, caution should be taken with a lot of care. Ignorance in this sector causes unbearable effects. Cybercrime may often occur and having the recommendation, such as using digital signatures, encryption-based methods and while listing application software enhanced Open data to be authentic. Open data should all time be secured and closely monitored to allow a positive impact in businesses and the public at large.

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Attard, J., Orlandi, F., Scerri, S., & Auer, S. (2015). A systematic review of open government data initiatives. Government Information Quarterly, 32(4), 399-418.

Davies, T., & Perini, F. (2016). Researching the emerging impacts of open data: revisiting the ODDC conceptual framework. The Journal of Community Informatics, 12(2).

Jain, P., Gyanchandani, M., & Khare, N. (2016). Significant data privacy: a technological perspective and review. Journal of Big Data, 3(1), 25.

Lämmel, P., Tcholtchev, N., & Schieferdecker, I. (2017, December). Enhancing cloud-based data platforms for smart cities with authentication and authorization features. In Companion Proceedings of the10th International Conference on Utility and Cloud Computing (pp. 167-172).

Borders, K. R. (2015). U.S. Patent No. 9,055,093. Washington, DC: U.S. Patent and Trademark Office.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask