Describe the steps of the systems development life cycle

Assignment Help Management Information Sys
Reference no: EM132219965 , Length: word count : 3500

Assignment topic

The purpose of this assignment is to evaluate your ability to develop a comprehensive implementation proposal for an information system that uses a systems approach.

The proposal should be targeted at a potential ‘sponsor' organisation that will need to be convinced of the appropriateness and effectiveness of the proposed new system.

Choose an information system (e.g., ERP systems, CRM systems, SCM Systems, Management Information Systems, Decision Support Systems, Executive Information Systems, Enterprise Portals, Data Warehouse & Data Mining Applications, Enterprise Collaboration Systems, Knowledge Management Systems, and so on, that you have studied in this unit. Alternatively, you may wish to combine features of several systems.

Please note for the purpose of this assignment, mobile apps or other e-business and digital enterprise applications should not be used as the chosen information system).

Your assignment should describe the steps of the Systems Development Life Cycle (SDLC) discussed in Topic 4 of the subject.

The proposed system must address an identifiable problem/opportunity that exists in the sponsor organisation and relate to particular aspects of the organisation's overall strategic directions. It is important that you select the features of your system carefully and justify your selection.

Do not just use (be critical of the use of) the standard features of a commercially available software package. For the purposes of this assignment, try to keep the system that you are proposing to a manageable size.

Your proposed system could help the ‘sponsor' by:

• improving an existing manual information system

• introducing a new information system

• creating a new business opportunity

• improving organisational productivity.

The sponsor could be:

• top management of your company

• an investor

• a financial institution which will lend you money

• a client who has engaged you as a consultant but is not the same as the financial sponsor.

Format for Assignment 2

The format of the formal assignment will be:

• Covering letter to sponsor

• Title page

• Table of contents

• Executive summary (1 page)

• Introduction

• Body of your assignment with suitable headings and subheadings

• Conclusions

• Reference list (Harvard referencing style is required)

• Appendices (including a background of the organisation for your unit assessor!).

Length: 3,500 words

Reference no: EM132219965

Questions Cloud

How could the shortcoming have been prevented : What part of the contingency planning process came up short? How could the shortcoming have been prevented?
Calculate optimal order quantity and the reorder point : In all cases, you may assume that demand is normally distributed. Calculate the optimal order quantity and the reorder point (ROP).
Discuss about the diagnosis and differentials : The physical examination should include components that are relevant to the patient's complaint and with the patient's history in mind.
According to situational theory of leadership : According to the situational theory of leadership, a _____ can be effective when followers have the necessary education, skills,
Describe the steps of the systems development life cycle : Evaluate your ability to develop a comprehensive implementation proposal for an information system that uses a systems approach.
Employed in organization in human resources department : For those that either manage a team of employees or are employed in an organization in the human resources department,
Review given problem related to women health : As with any assessment, the chief complain is often what drives what our questions are and what clinical pathways we explore. With women's health that approach.
Create a table for your team : Write a 1- to 2-page report for the Director of IT describing the requirements you are considering as your team implements the wireless network.
Suggest one or more controls to support each policy : The attacker copied ransomware into the network shares for the accounting department allowing it spread through the network and encrypt accounting files.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss the ethical issues of social networks and anytime

What are the four primary factors described in the text that set the state for Web 2.0 or the social Web that we enjoy today?

  Define organizational strategy of nlb to fulfil new business

Propose the business strategy and value proposition of NLB and support your answers with examples. Describe the organizational strategy of NLB to fulfil its new business strategy and value proposition.

  Structured wiringexplain the rationale for structured

structured wiringexplain the rationale for structured wiring.explain the differences and similarities between a loop

  Briefly describe the tpm waterfall method

Your company has been using Traditional Project Management (TPM) methods for years, but is now looking into the possibility of adopting agile practices.

  How much damage it caused to the corporate

Type of sections of Saudi anti cybercrime law applied to different cybercrimes occurred in corporate based on their nature, occurrence and type? Explain the whole Forensics process applied to specific cybercrime to justify that it has been committ..

  Create class-responsibility-collaboration card

Create Class-Responsibility-Collaboration (CRC) cards and a class diagram based on the functional models through the use of graphical tools .

  Write a memo based on having a major hot beverage retail

Write a memo, individually, based on having a major hot beverage retail business and establishing an order entry system whereby customers can place orders on a mobile app in advance of arriving at the retail outlet.

  Provides comprehensive reflection of the learning objectives

Write a 2 - 3 page paper (not including the title and reference pages) which provides a comprehensive reflection of the learning objectives and concepts addressed in the course so far.

  Describe one unique and specific example of market basket

Describe one unique and specific example of market basket analysis or DNA sequence analysis where data mining can help.

  Analyse the various approaches for mitigating security risk

Specific issues that you need to address in the forum discussions are provided within the first 3 topics. Be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk

  Discuss it strategy that o-reilly media chose to implement

Discuss the IT strategy that O'Reilly Media chose to implement and whether you believe that it successfully addresses the goals of IT governance and business alignment. Has O'Reilly Media considered all of the stakeholders in this scenario? What c..

  Perform optimization techniques

Provide a real-world example that demonstrates how this information would enable businesses to accurately scale its data processing requirements.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd