Development of a new information system

Assignment Help Computer Network Security
Reference no: EM13846479

Willowbrook School

Willowbrook School is a small private school that has retained your services as a systems analyst to assist in the development of a new information system for the school's administrative needs.

Background

After an initial conversation with Victoria and Kathy, the school's administrators, they have decided that pursuing the possibility of an information system is a good idea. Michelle, the administrative assistant, in particular is feeling the strain of the increased workload associated with the rapid growth in the student population. The system that she has been using, of spreadsheets and word processing documents, worked well when enrollments were smaller, but now the amount of time spent copying information from one place to another is daunting, and the possibility of errors is increasing. An information system is necessary to cope with the growing administrative workload. After your meeting you developed a business profile, organization model, business process model, and began to identify information and processes for Willowbrook School's new information system.

Based on your initial conversation and the work that you prepared, you begin planning to conduct a preliminary investigation. You call Victoria and discuss with her the strategic plan for the school including its mission and vision. You explain to her that planning IT systems and projects requires a similar approach to strategic planning as the school likely took when it initially created its mission, vision, and strategic plan. She begins to ask you questions about the next steps for developing the information system. You tell Victoria that you will put together a memo for detailing the need for strategic planning and describing the stages of preliminary systems investigations.

Tasks

  1. Write a memo to Victoria detailing the need for strategic planning and describing the stages of preliminary systems investigations. Make sure the memo contains the proper formal heading and formatting. It should also include two sections. The first should define strategic planning and how Willowbrook School would benefit. The second section details the six stages that you will go through in the preliminary systems investigation.
  2. You need more information about the proposed system for your plan and need to conduct fact-finding. Make a list of people whom you might want to interview. Also, suggest other fact-finding techniques you should consider.
  3. Consider the internal and external factors that affect information systems. Which factors, in your opinion, will have the greatest impact on the system proposed for the school? Explain your answer.
  4. At the conclusion of the preliminary investigation, you will deliver a written summary of the results and deliver a brief presentation to Willowbrook School's administration and probably its executive board. Prepare a list of recommendations that will help make your written and oral communications more effective. Put your list in priority order, starting with what you consider to be the most important suggestions. Before you complete this task, you should review Part A of the Systems Analyst's Toolkit, which provides suggestions for oral and written presentations.

Reference no: EM13846479

Questions Cloud

Preexisting arrays and functions : You are given a java file HW2.java with preexisting arrays and functions. Do not modify the main function or other functions names .Each function are given a certain implementation which you need to complete.
How can software be applied as a project-planning tool? : How can software be applied as a project-planning tool?
How can transformational experience influence you as leader : How can a transformational experience influence you as a leader and manager and what skills can you acquire from a transformational experience or critical incident?
Brief summary of the movie : Please watch the following movie and provide a one page report on it. The report should include a brief summary of the movie, if you could relate in any way and what could be gained about addiction or recovery from that movie
Development of a new information system : Willowbrook School is a small private school that has retained your services as a systems analyst to assist in the development of a new information system for the school's administrative needs.
Describe the ethical issues you may encounter : Write a 1,050- to-1,400 word paper that includes the following: Include what therapeutic approach you would apply in this case, and explain why you chose it. Describe the ethical issues you may encounter, as well as how you intend to approach them
Develop a simulation model to help analyze : Develop a simulation model to help analyze and investigate the problem.
Address of the router that computer : 1. Your boss wants to know the address of the router that his computer is using. What do you tell him?
Critique of leadership concepts and models : Reflective Portfolio, composed of your reflections on your learning and thinking throughout this module. In this Unit, prepare for this element of your Final Project by writing a second Reflective Journal entry.

Reviews

Write a Review

Computer Network Security Questions & Answers

  How does a password or authentication relate to cia triad

In these weeks readings, we learned about the CIA Triad and how each exhibits dependance on the other. Give examples of how failure of one security property

  Explain computer forensics software or services

Use a web search engine to search for companies specializing in computer forensics software or services. Select two or three and write a one- to two-page report comparing what each company does.

  Name and explain 4 key security tips you would share with

question 1 name and describe 4 key security tips you would share with your coworkers to keep their data safe their

  Describe a malware attack that causes the victim

Describe a malware attack that causes the victim to receive physical advertisements and describe an instance of a file that contain evidence of its own integrity and authenticity.

  How does it affect performance and security

Sector level hard disk encryption is one of the most interesting problems of all. Assume that AES-128 is used to encrypt your local hard disk. What mode will you use? CBC or ECB?

  Dscribe three 3 ways in which businesses use internet

assume that you were recently hired by a manufacturing company as a systems administrator trainee. your first

  Implement network security on edge routers

Implement network security on edge routers and LAN switches  and provide evidence that it is secure.

  What are the various threats to information security

What are the various threats to information security

  Explain security strategy for a corporate wan

Prescribe a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks. C

  Show strategies to prevent such cyber warfare attack

Need a 1000 word paper on the various recent/news on the United States (particular the group known as Anonymous and Lulzsec). Also need the various strategies to prevent such cyber warfare attacks and prevention techniques.

  What was the volume of digital evidence

Select a real world event related to Cybersecurity. This could be a crime, a well-documented breach or intrusion, or an act of cyber warfare/espionage.Needs to be 10 pages.APA format along with no plagiarism. Will be run through plagiarism site ..

  Identity the various security configuration options

Any potential customer of the State Health Centre must be able to securely access all information aspects pertaining to services offered using a variety of mobile devices.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd