Describe various functions within information systems area

Assignment Help Computer Network Security
Reference no: EM131119219

Project Deliverable: Project Plan Inception

This assignment consists of two sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

You are a newly appointed Chief Information Officer (CIO) of a $25 million dollar data collection and analysis company that has been operating less than two years. It is expected to grow by 60% over the next eighteen months. Your company currently collects data using Web analytics and combines it with operational systems data. Web analytics is an increasingly important part of most business marketing plans. Your company is looking for ways to leverage the collected data but wants to ensure that the information technology infrastructure will support the expected growth that the company is anticipating. The Chief Executive Officer (CEO) has given you sixty days to deliver a comprehensive information systems project plan to address the organizational growth that the company is experiencing. The company will be expanding from one floor to three floors within six months. Since this is a relatively new company, there is currently limited technology infrastructure to support the business. All information technology (hardware and software) must be redesigned to meet organizational needs. The solution should be implemented in either a hosted solution, on-site solution, or a hybrid model. The CEO is expecting you to integrate different technologies from different partners and incorporate industry best practices and cost-effective solutions in connection with the development of technological systems. In addition, the CEO is extremely interested in cloud computing technologies and Software-as-a-Service (SaaS) but is leery of security issues that may be associated. However, he is sure that you will implement proper security protocols. The company currently consists of twenty employees of which four, including yourself, are dedicated to the IT organization.

Section 1: Project Introduction

1. Write a four to six page project introduction that documents the current state of the organization, expands upon the information given above, and includes the following:

o Background information of the company.
o Details regarding the type of business that the company is engaged in.
o A description of current outsourcing and offshoring activities.
o Identification of current skilled information systems personnel in position and responsibilities.
o The specific types of data that the company collects.
o A description of the information systems that the company currently has to support the business. The description at a minimum should include the following:
o Operational Systems and Databases
o Analytics and Interfaces
o Infrastructure and Security
o The use of at least two quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Section 2: Project Plan

Use Microsoft Project to:

2. Create a project plan (summary and detailed) using Microsoft Office Project. The project plan should:

o Record all tasks, subtasks, resources, and time related to the project.
o Outline the planning, analysis, design, and implementation phases.
o Develop in accordance with the systems development life cycle (SDLC).

The specific course learning outcomes associated with this assignment are:

• Describe the various functions and activities within the information systems area, including the role of IT management and the CIO, structuring of IS management within an organization, and managing IS professionals within the firm.

• Use technology and information resources to research issues in information systems.

• Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.

Reference no: EM131119219

Questions Cloud

Group responsible for reducing resistance to change : The Organization and Process Change Process creation, revision, and implementation are all predicated on the ability of the organization and its employees and vendors to accept change. The organization may have the will to change yet find its employe..
What goals would you set for the sales staff : What goals would you set for the sales staff, given your answer to number 1?
Use the financial statements effects template to show effect : Compute the December 31, 2010 PBO and FMV of pension assets. Compute 2010 pension expense. Use the financial statements effects template to show the effects on the 2010 financial statements.
Discuss the concept of justice in the film unforgiven : Discuss the concept of justice in the film Unforgiven. What is this film trying to tell us about "justice"
Describe various functions within information systems area : Describe the various functions and activities within the information systems area, including the role of IT management and the CIO, structuring of IS management within an organization, and managing IS professionals within the firm.
Differences between scholarly resources and popular resource : Explain the differences between scholarly resources and popular resources. Describe the key things to remember when searching for sources within the Ashford University Library (e.g., databases, FindIt@AU search tool).
Strategic value of personnel training and development : Part  1: Discuss the strategic value of personnel training and development. What are the implications for the MNC?
Describing the main aspects of personality testing : Write 150 to 200 words describing the main aspects of personality testing. can someone help
What is the nature of an installment sale : What is the nature of an installment sale? How do installment sales differ from ordinary credit sales?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain why you were unable to complete this part

Modify the attached code to include a exportToJSON method within the Cave object. This method should output the JSON version of our Cave, which should be identical to the JSON within Cave.dat for that particular Cave.

  Identify at least three different social media networks and

identify at least three different social media networks and describe how they are used.explain the advantages and

  Dos attackers use zombies to attack victims

Why do you think DoS attackers use zombies to attack victims instead of sending attack packets directly to victims? Come up with two reasons.

  Write paper about stuxnet virus

Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry. Write paper about Stuxnet..

  Assignment hi i am need your help in my assignment can you

hi i am need your help in my assignment. can you please help me. the date has already been passed i.e. 249 2014. so i

  Compare u.s. and e.u. policies

Compare U.S. and E.U. policies and underlying philosophies of privacy. Include references to monitoring and privacy in the workplace, surveillance, and disclosure/data privacy. In your estimation, could self-regulation be effective or does it need to..

  Explain security strategy for a corporate wan

Prescribe a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks. C

  Critically evaluate the security risk management framework

Critically evaluate the Security Risk Management framework and/or policy in light of other Security Risk Management frameworks

  Discuss physical and logical vulnerabilities

A first step to developing an enterprise security plan is to identify the specific vulnerabilities and related risks facing an organization. This list should be fairly exhaustive. Many vulnerability and threat pairs will not make the final cut for..

  How is risk defined in the context of information technology

How is risk defined in the context of information technology.

  The relation between passwords and key size

the relation between passwords and key size. For this purpose we consider a cryptosystem where the user enters a key in the form of a password

  Differences between file viruses and boot viruses

What are the differences between file viruses and boot viruses

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd