Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

It 210 basic security considerations

13/10/2021 Client: muhammad11 Deadline: 2 Day

IT Business Systems Analysis/Design

IT 210 Final Project Guidelines and Rubric

Overview Technology has changed our lives drastically in the past twenty years. For example, consider the rise of mobile devices connected to the internet using wireless communication. We have progressed from shopping solely in brick-and-mortar stores to having the ability to do anything from renting a vacation home to purchasing cupcakes online using a mobile device. To keep up with how consumers communicate, businesses have to incorporate these devices and technologies into their business models to reach customers. Developing appropriate technical solutions to business problems begins with defining, analyzing, and documenting the necessary requirements. For this project, you will play the role of an employee working for a small brick-and-mortar business. Your business is seeking to establish an online presence, but it must first invest in new technology. You will create a business systems analysis to provide the business owner with your recommendations for a technology solution that will support her venture into e-commerce. The project is divided into two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Three and Five. The final product will be submitted in Module Seven. Use the Final Project template document as a guide to ensure you have met all requirements before submitting your final draft. In this assignment, you will demonstrate your mastery of the following course outcomes:

 Analyze a business organization for determining the business requirements related to information technology systems

 Articulate the role and function of information systems in business organizations for how they impact business operations

 Recommend appropriate information technology options for effectively supporting business operations

 Recommend basic security considerations related to business information systems for effectively securing company data

Prompt Imagine that you work for the small brick-and-mortar business described in the final project case scenario. The owner of your business wants to focus on generating new revenue through e-commerce, but she knows that this change in operations requires the company to integrate new technology. To gain an understanding of what the business might need for technology, she has asked you to create a business systems analysis. In this analysis, you will clearly introduce the problem that your business is facing. Then, you will determine the business requirements for solving that problem, including the requirements that any new technology needs to meet. Next, you will explain how your competitors are using the two technologies in which you are investing, to determine

http://snhu-media.snhu.edu/files/course_repository/undergraduate/it/it210/it210_final_project_template.docx
http://snhu-media.snhu.edu/files/course_repository/undergraduate/it/it210/it210_final_project_template.docx
http://snhu-media.snhu.edu/files/course_repository/undergraduate/it/it210/it210_final_project_case_scenario.pdf
2

whether those technologies are appropriate for your business. Finally, you will propose your recommendations for the technology solution that best meets the needs of your business, including what your business owner must consider in regard to security and privacy of company data. Select two of the following technologies to focus on in your business systems analysis paper:

 Big data and knowledge management

 Wireless, mobile computing, and mobile commerce

 Social computing

 Cloud computing

 Business analytics and business intelligence solutions

 Intelligent systems Specifically, the following critical elements must be addressed:

I. Introduction: In this section, you will briefly introduce the small business from the case scenario, and the problem that it is trying to solve. A. Clearly state the problem that the business owner is seeking to solve. Be sure to address the question of what your business ultimately wants to

do. B. Identify and briefly describe the two technologies from the list provided that you will research in your business systems analysis.

II. Business Requirements: In this section, you will determine what the business requirements are for solving the stated problem, and establish the criteria

that will help form your technology recommendations. You will also articulate why the business owner should undertake the project of integrating new technology.

A. Explain the objectives of undertaking this project to integrate new technology. In others words, what should the project accomplish, and how does it support the goal of your business?

B. Provide a project description that explains the purpose of the project. Be sure to address the following: i. What does your business need to do to satisfy the objectives?

ii. What are the desired results at the end of the project? iii. Why is it important for your business owner to consider implementing new technology?

C. State the key technological requirements that will be required of any new technology in order to effectively solve your business’s problem. In other words, what specifically does the technology need to be capable of doing? (These are the technology requirements in the decision matrix.)

3

III. Competitors and Technology: In this section, you will describe two competing companies that operate in the same industry as your business. You will also explain how a company uses the two technologies that you are investigating in order to determine if the technology may be appropriate for your business to use. Remember that a list of competing companies was provided to you in the final project case scenario.

A. Technology One: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and how it uses this technology to support its business in general. Include specific examples.

B. Technology Two: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and how it uses this technology to support its business in general. Include specific examples.

C. Referring to what you learned in your research on the companies above, explain one specific way in which one of the companies is benefitting from technology, and describe the potential benefit to your business if you were to adopt the same approach.

IV. Technology Solutions: In this section, you will discuss how each of the two technologies meets the technology requirements that you identified in

section II. Use your decision matrix to guide your responses. A. Technology One: Explain how well this technology meets the technology requirements of your business. Be sure to address which technology

requirements the technology meets, and where there are gaps. B. Technology Two: Explain how well this technology meets the technology requirements of your business. Be sure to address which technology

requirements the technology meets, and where there are gaps.

V. Recommendations: In this section, you will recommend the technology solution that you believe is most appropriate for your business based on how well each technology meets your business’s technology requirements.

A. Recommend a technology solution for your business, and defend why that solution is appropriate. You may recommend only one technology or any combination of the two that you investigated.

B. Explain the overall benefit of your recommended technology solution to your business. Consider the following: C. How will it will it enhance efficiency?

i. How will it position your business for future growth as you move online?

VI. Basic Security Considerations: In this section, you will briefly explain what the owner of your business must consider in regard to security and privacy if they choose to adopt your recommendations.

A. Explain the security features your recommended technology solution should have. B. Briefly explain what your business should consider in regard to security and privacy as you seek out third-party vendors for the proposed

technology. C. Briefly describe the internal safeguards that should be put in place in your business to guard against loss or misuse of company data. Provide

examples.

4

Milestones Milestone One: Introduction, Business Requirements, and Competitors and Technology In Module Three, you will submit the first milestone, in which you will develop your problem statement, technology requirements, and suggested technologies for your final project. This milestone will be graded with the Milestone One Rubric. Milestone Two: Technology Solutions and Recommendations In Module Five, you will submit the second milestone, in which you will research competitors and analyze the technologies they are using. This milestone will be graded with the Milestone Two Rubric. Module Seven: Basic Security Considerations Note that you will not engage in milestone work for section VI of your final project, basic security considerations. However, you will have an opportunity to work through the information that will inform this part of your project in Module Seven, and to ask your peers and instructor any questions you have about the topic. At this point, you should be able to finish this part of your final project and submit the completed draft with all pieces. Final Submission: Business Systems Analysis In Module Seven, you will submit your final project. It should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded with the Final Project Rubric.

Final Project Rubric Guidelines for Submission: Your business systems analysis should be 6–7 pages in length (not including a cover page and references) and written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins. Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions.

Critical Elements Exemplary Proficient Needs Improvement Not Evident Value

Introduction: State the Problem

Clearly states the problem that the business owner is seeking to solve (100%)

States the problem that the business owner is seeking to solve, but response is unclear or contains inaccuracies (55%)

Does not state the problem that the business owner is seeking to solve (0%)

5.94

http://snhu-media.snhu.edu/files/production_documentation/formatting/rubric_feedback_instructions_student.pdf
5

Introduction: Two Technologies

Identifies and briefly describes the two technologies that the student will research in business systems analysis (100%)

Identifies the two technologies that the student will research in business systems analysis, but does not describe them, or description contains inaccuracies (55%)

Does not identify the two technologies that the student will research in business systems analysis (0%)

5.94

Business Requirements:

Objectives

Meets “Proficient” criteria, and explanation demonstrates sophisticated awareness of the project’s objectives (100%)

Explains the objectives of project to integrate new technology (85%)

Explains the objectives of project to integrate new technology, but explanation is cursory or illogical or contains inaccuracies (55%)

Does not explain the objectives of project (0%)

5.94

Business Requirements:

Project Description

Meets “Proficient” criteria, and project description provided demonstrates keen insight into the purpose of the project (100%)

Provides a project description that explains the purpose of the project (85%)

Provides a project description that explains the purpose of the project, but description is illogical, contains inaccuracies, or is missing required components (55%)

Does not provide a project description (0%)

5.94

Business Requirements: Technological Requirements

Meets “Proficient” criteria, and response demonstrates a sophisticated awareness of what the new technology must be capable of doing for the business (100%)

Describes the key technological requirements that will be required of any new technology to effectively solve the business’s problem (85%)

Describes the key technological requirements that will be required of any new technology to effectively solve the business’s problem, but description is missing key requirements or contains inaccuracies (55%)

Does not describe the key technological requirements that will be required of any new technology (0%)

5.94

Competitors and Technology:

Technology One

Meets “Proficient” criteria, and explanation demonstrates keen insight into the role and function of the technology in the competing company (100%)

Briefly describes what the selected competing company does and explains how it uses the technology to support its business, and includes specific examples (85%)

Briefly describes what the selected competing company does and explains how it uses the technology to support its business, but does not include specific examples, or examples are inappropriate, or explanation is cursory or contains inaccuracies (55%)

Does not briefly describe what the selected competing company does or explain how it uses the technology to support its business (0%)

5.94

6

Competitors and Technology:

Technology Two

Meets “Proficient” criteria, and explanation demonstrates keen insight into the role and function of the technology in the competing company (100%)

Briefly describes what the selected competing company does and explains how it uses the technology to support its business, and includes specific examples (85%)

Briefly describes what the selected competing company does and explains how it uses the technology to support its business, but does not include specific examples, or examples are inappropriate, or explanation is cursory or contains inaccuracies (55%)

Does not briefly describe what the selected competing company does or explain how it uses the technology to support its business (0%)

5.94

Competitors and Technology:

Benefitting From Technology

Meets “Proficient” criteria, and description demonstrates keen insight into how the potential technology could provide a benefit to the business (100%)

Explains one specific way in which one of the competing companies is benefitting from technology, and describes the potential benefit to the business from the scenario if they were to adopt the same approach (85%)

Explains one specific way in which one of the competing companies is benefitting from technology, but does not describe the potential benefit to the business from the scenario, or description is cursory or illogical (55%)

Does not explain one specific way in which one of the competing companies is benefitting from technology (0%)

5.94

Technology Solutions:

Technology One

Meets “Proficient” criteria, and explanation demonstrates a sophisticated awareness of how well the technology meets the needs of the business (100%)

Explains how well this technology meets the technology requirements of the business (85%)

Explains how well this technology meets the technology requirements of the business, but explanation contains inaccuracies or is missing required components (55%)

Does not explain how well this technology meets the technology requirements of the business (0%)

5.94

Technology Solutions:

Technology Two

Meets “Proficient” criteria, and explanation demonstrates a sophisticated awareness of how well the technology meets the needs of the business (100%)

Explains how well this technology meets the technology requirements of the business (85%)

Explains how well this technology meets the technology requirements of the business, but explanation contains inaccuracies or is missing required components (55%)

Does not explain how well this technology meets the technology requirements of the business (0%)

5.94

7

Recommendations: Technology

Solution

Meets “Proficient” criteria, and defense demonstrates a complex grasp of how the recommended technology meets needs of the business (100%)

Recommends a technology solution for the business and defends why that solution is appropriate (85%)

Recommends a technology solution for the business, but does not defend why that solution is appropriate, or defense is illogical or contains inaccuracies (55%)

Does not recommend a technology solution for the business (0%)

5.94

Recommendations: Overall Benefit

Meets “Proficient” criteria, and explanation demonstrates keen insight into how the business could benefit from the recommended technology solution (100%)

Explains the overall benefit of the recommended technology solution to the business (85%)

Explains the overall benefit of the recommended technology solution to the business, but explanation is cursory or illogical or contains inaccuracies (55%)

Does not explain the overall benefit of the recommended technology solution to the business (0%)

5.94

Basic Security Considerations:

Security Features

Meets “Proficient” criteria, and description demonstrates a complex grasp of security features necessary for protecting company data (100%)

Describes the basic security features the recommended technology solution should have in order to protect company data (85%)

Describes the basic security features the recommended technology solution should have, but description is cursory or illogical (55%)

Does not describe the basic security features the recommended technology solution should have (0%)

7.92

Basic Security Considerations:

Third-Party Vendors

Meets “Proficient” criteria, and explanation demonstrates a complex grasp of security considerations in regard to potential third-party vendors (100%)

Briefly explains what the business should consider in regard to security and privacy as it seeks out third-party vendors for the proposed technology (85%)

Briefly explains what the business should consider in regard to security and privacy as it seeks out third-party vendors, but explanation is cursory or illogical or contains inaccuracies (55%)

Does not explain what the business should consider in regard to security and privacy as it seeks out third-party vendors for the proposed technology (0%)

7.92

Basic Security Considerations:

Internal Safeguards

Meets “Proficient” criteria, and description provides keen insight into what the business can do internally to protect company data (100%)

Briefly describes the internal safeguards that should be put in place in the business to guard against loss or misuse of company data, and provides examples (85%)

Describes the internal safeguards that should be put in place in the business to guard against loss or misuse of company data, but does not provide examples, or description is cursory or illogical (55%)

Does not describe the internal safeguards that should be put in place in the business to guard against loss or misuse of company data (0%)

7.92

8

Articulation of Response

Submission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to-read format (100%)

Submission has no major errors related to citations, grammar, spelling, syntax, or organization (85%)

Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas (55%)

Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas (0%)

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Essay & Assignment Help
Professor Smith
Engineering Solutions
George M.
Assignment Hut
Top Academic Tutor
Writer Writer Name Offer Chat
Essay & Assignment Help

ONLINE

Essay & Assignment Help

I have read your project details. I can do this within your deadline.

$20 Chat With Writer
Professor Smith

ONLINE

Professor Smith

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$37 Chat With Writer
Engineering Solutions

ONLINE

Engineering Solutions

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$37 Chat With Writer
George M.

ONLINE

George M.

Give me a chance, i will do this with my best efforts

$21 Chat With Writer
Assignment Hut

ONLINE

Assignment Hut

Give me a chance, i will do this with my best efforts

$43 Chat With Writer
Top Academic Tutor

ONLINE

Top Academic Tutor

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$50 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Theoretical and operational definitions in nursing - How to wire up driving lights diagram - Ipc 610 vs 620 - Pavlov behavioral learning theory - Mike markel practical strategies for technical communication 2nd edition pdf - The warrens enderby nhs - Prefatory parts of a report - Which of the following statements is true regarding gainsharing - Byron bay cookie factory tour - What are the different dramatic conventions - Cisco borderless network architecture - 【(+97•15-2•730-•5642) Abortion Pills in Dubai| Abu Dhabi| Fujairah-cost of mifepristone200mg & misoprostol200mcg tablets in UAE. - Edwin ghiselli leadership traits - Byu independent study proctor - The last stand of fox company chapter summaries - Turkeys in the kitchen by dave barry analysis - Mod 7 Class NIASU - Concept development practice page 18 1 answers - Advantages of soft engineering - Dan murphy's burleigh big head - Herbert j gans the uses of poverty - Www youtube com watch v iyhcn0jf46u - Organ Leader & Decision Making PCA - Problem preparing a payroll register answers - Journalism - David schanzer wikipedia - Trends in organizational behavior and how to adapt it in your organization - Competitive Strengths Assessment - Stress and how it affects your mind and your body - Essay - Tests for visual agnosia - Secondary sector business examples - Southwest airlines swot analysis - Concepts of territoriality privacy and personal space - Toms and townsend orthodontist - DISCUSSION POST 6 - Harley davidson has its engine assembly plant in milwaukee - Www professor garfield com - Rheem tankpak series 2 - Meiotic division beads diagram - IA 7 - Biology equations and formulas - Organizational Ethical Analysis Paper - Tv antenna tower collapse case study - International dimensions of organizational behavior 5th edition pdf - Mark williams enterprises racing calculator - Ksf in strategic management - What are the major categories of crime - Calculate the molar mass of baking soda - Little big book club - International finance mcq questions and answers - Social sciences north flinders university - Marketplace online simulation - milestone 3- Do the continuation of milestone 3 and fix the feedback - Disks of polycarbonate plastic from a supplier are analyzed - The unit contribution margin is computed by mcq - Week 5 Current event - Marketing - Critical thinking week 8 discussion - Https writingcenter unc edu tips and tools literature reviews - Interpersonal communication report - OCI & OSC - Vodafone and hutch merger case study - Burger king case study international business - Firms that achieve higher growth rates without seeking external financing - Marketing analytics data driven techniques with microsoft excel download - X 2 y 2 expand - Discussion - Cloud Computing - Examples of classical literature - A person who demonstrates a foible most probably deserves - Buena school district bus data - Food hygiene level 2 answers - Basement excavation method statement - Recommendation report example - 6318 mccartney ln garland tx 75043 - Superheroes a modern mythology - Module 2 wellness plan flvs answers - Statics of rigid bodies m2 - How should the researcher handle don t know responses - Half bridge isolated dc dc converter - Scholarly Sources and Referencing - Leadership and nursing care management diane huber pdf - The use of absorption costing can result in misleading product cost information. - Implementation plan - Study link 5.7 decimal comparisons - Allowance method vs direct write off - Research Assignment with R script - Followership and servant leadership army - Problem Statement and Background - Teejay 5 14 maths level e - Adf information systems technician - Hamilton north primary school - Maple ta syntax guide - Acting scripts for teens - An old black ram is tupping your white ewe analysis - Vodafone erp implementation failure - How to calculate capacity cushion - Themes of the great depression - Hernan cortes journal entries - Richard fitzsimmons merrill lynch