How byod is utilised and its associated risks

Assignment Help Basic Computer Science
Reference no: EM13189314

You are the CIO of a successful accounting firm with offices in cities across the nation.  You recently attended a technology seminar on BYOD (Bring Your Own Device).   It occurred to you that this would offer potential benefits to your organisation and would be well-received by staff.

At the seminar you learnt there were many issues to consider, policies to be developed or modified, and new investments to be made to manage a BYOD environment. These included upgrading your ICT Data Security System to accommodate BYOD to protect clients' and your firm's data; this needs to synchronise and ensure the integrity of data on servers and end-user devices.

You plan to present your vision for BYOD to your CEO, Board and executives. You are required to research the background for a project to implement and manage BYOD, use Microsoft Excel to model a business plan, perform sensitivity analysis to validate assumptions, and create a presentation to seek funding and authorisation from senior management to implement and manage BYOD.

As Board members and executives are dispersed across the nation you plan to use YouTube for your presentation.

Activity A: Journal

Prepare a journal which records your activities and progress related to completing this assignment. In date order, clearly list the following:

? Date of research activity/discussion

? Topic researched or discussed

? Time duration

? Brief description of research activity/discussion.

Submit this journal as a separate report. Your journal must provide all these activity details to be awarded marks.

A sample of the journal will be provided in the StudyDesk.

Activity B: Presentation to Senior Management

NOTE: If you are unfamiliar with the business caseand sensitivity analysis concepts you should make an effort to read appropriate material, including those from the Internet, to learn about them.

Before you commence this assignment ensure you have completed Hands-on MIS Project # 1 to 5 in Appendix S.1 in the Study Book.  These exercises are designed to familiarise you with the software, techniques and methods used inthe assignment.

 Part 1: Researchthe background for the BYOD project

Conduct an Internet search to gather relevant background information of BYOD.   In particular, you should address the following:

1. How BYOD is utilised and its associated risks

2. Experiences of other companies

3. Advantages and disadvantages

4. The infrastructure required, and

5. Best-practice for how BYOD should be managed.

Part 2: Develop the Excel model of the business case

Once you have completed Part 1, develop a spread-sheet model of your business costs. Some of the materials provided in the MIS Projects may help you to come up with a simple modelling. For the purpose of modelling, assume a discount rateof 10 percent. Your business model should include the following analysis to ascertain the financial viability of the project:

1. Payback period

2. Net present value (NPV)

3. Internal rate of return (IRR), and

4. Profitability index

 HINTS: To obtain the payback period you would first need to calculate the cumulative net cash flow.  Use the NPV and IRR functions provided in Microsoft Excel. You may need to search the Internet for information if you are not familiar with how to use these functions.

Interpret your results.  Use the note in MIS Project #4 - Capital Budgeting Methods for Information System Investmentsto guide you.

 Part 3: Perform a sensitivity analysis for the business case

Using theresults you obtained inPart 2 as the base case, conduct a sensitivity analysis to examine the impact of the criticalcost and benefit variableson the viability of theBYOD project. Provide three specific scenarios of consideration. You must clearly specify the basis of the three scenarios i.e. which critical cost variables they are examining in the sensitivity analysis

Carefully analyse your results and make appropriate recommendations to the company's senior management as to how the critical cost variables should be managed to ensure that the BYOD project is both viable and sustainable in the long term.

Part 4: Create apresentation to senior management

4.1 Consolidate and cross-analyse your results and findings from Part 1, 2 and 3.  Then prepare a presentation to the company's senior management to seek their financial support and authorisation to embark on the project.

All projects must submit a recorded audio/visual Presentation of their project. Examples for type of presentation:

1. MP4 video of live or Skype presentation or

2. MP4 video ofPowerPoint presentation or

3. Powerpoint presentation.

YouTube is the preferred mode for submission; if you are in a country that does not have access to YouTube or there are other issues preventing you from posting to YouTube then you must submit a PowerPoint presentation with embedded autoplaying audio through EASE.

If you do not wish for your video in YouTube to be publically available then you may use options of YouTube such as having your video in a closed group. You are responsible for ensuring the link to your YouTube video will work for the person marking your assignment - you should ask someone to test it.

As a guide, if using PowerPoint your presentation should comprise no more than 15 slides, should be developed and structured according to the following:

  • The presentation should be made up of :

­   An introduction: your FIRST slide should show the title of your presentation and details of the author(s); the SECOND slide should provide the agenda i.e. outline ofyour presentation; the THIRD slide should clearly state the purpose of your presentation and what you want to achieve from it.

­   A body: contains the results and findings from Part 1, 2 and 3.

­   A conclusion: recapsthe main points andsummarises your recommendations.

­   Lessons learned: Two slides highlighting lessons learned from conducting this project.

  • The LAST slide should contain a "List of references". There should be at least 8 references (including those from Internet sources) and they should be listed according to the Harvard referencing convention as described in Chapter 2 (referencing) of the Communication Skills Handbook 3ed.
  • Insert Excel tables and charts and suitable graphicsat appropriate places in your presentation to reinforce your argument.
  • Search theInternet for information and guidance on how to produce an effective PowerPoint presentation, including the slide design and layout.
  • Ensure that your PowerPoint file does not exceed the specified size indicated in EASEotherwise you would not be able to upload your work.

Reference no: EM13189314

Questions Cloud

Network of trade routes called the silk roads : What ways did the network of trade routes called the silk roads make life during the classical era a significantly different from life in the preclassical world? Consider all the different effects and the various cultures involved.
Find the maclaurin polynomial : Find the Maclaurin polynomial Tn.x/ (for a general n) for the function f .x/ D 2x.
Discuss the importance for comparative analysis : Can you do me a favor to explain the meaning of "Discuss the importance for comparative analysis?"  For example, I chose a word:"Westminster model". I can identify it: The British system of parliamentary sovereignty, prime ministerial government, and..
How the disaster of costa concordia off the coast of italy : In the cruise industry, one third of reservations are booked from january to march. Explain and diagrammatically show how the disaster of the costa concordia off the coast of italy will affect the market for cruises.
How byod is utilised and its associated risks : Conduct an Internet search to gather relevant background information of BYOD - how BYOD is utilised and its associated risks
Determine what the first equation should be : How does the author determine what the first equation should be? What about the second equation? How are these examples similar? How are they different?
What is the volume of the solid generated by rotating : What is the volume of the solid generated by rotating about the x -axis the plane region bounded by y = - x 2, y = 0, x = - 1, and x = 1?
The standard costs and actual costs for factory overhead : The standard costs and actual costs for factory overhead for the manufacture of 2,500 units of actual production are as follows:
An organization''s short-term investment options : An organization's short-term investment options for idle cash includes what four areas? List and provide thier characteristics.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Business problems arise in a multitude

Business problems arise in a multitude of ways inside an organization; sometimes, they stem from the need or desire to do something completely new, sometimes they stem from the need or desire to improve an existing operation.

  Write a program that will continuously prompt the user grade

Write a program that will continuously prompt the user for a grade (in the range of 0 to 100) until a sentinel value of 999 is entered. The program will then display the average of all grades entered, formatted to 1 decimal place. Assume the grades a..

  Information security problem or issue in organisation

Illustrate how the work breakdown structure would identify and plan an information security problem or issue in the organisation.

  Communication links on the telephone network

The time delay of a long-distance call can be determined by multiplying a small fixed constant by the number of communication links on the telephone network between the caller and callee. Suppose the telephone network of a company named RT&T is a fre..

  Benefits of measures used to protect operating systems

Describe relative benefits and disadvantages of at least three different measures used to protect operating systems.

  Analyze the benefits and drawbacks of the common criteria

"'Recall that criteria creep' is the process of refining evaluation requirements as the industry gains experience with them, making the evaluation criteria something of a moving target. (See Section 21.2.4.2.)

  Diagnos application which has changed from original state

How does third-party plug-ins change process of diagnosing and troubleshooting errors within application? What steps would you take in diagnosing the application which has been changed from its original state?

  Probability of heavy- normal and light snowfalls

Brenda evaluates the probability of heavy, normal, and light snowfalls as 0.25, 0.6, and 0.15, respectively. So what must be size of the order you would suggest to Brenda? Justify why.

  What percentage of total cpu time is spent keeping clock

What percentage of the total CPU time is spent maintaining a clock that is accurate to a resolution of one millisecond?

  Explaining origins or genesis of wireless networking

Explain origins/genesis of wireless networking.

  What is the difference between coupling and cohesion

What is the difference between coupling and cohesion? Which should be minimized and which should be maximized and what complications are imposed if one tries to implement a dynamic list using a traditional homogeneous array?

  Instruction cycle and finding contents of registers

Go over instruction cycle and find out contents of registers PC, AR, DR, AC, and IR for each of seven memory-reference instructions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd