How enterprise architecture and enterprise systems influence

Assignment Help Management Information Sys
Reference no: EM132130850

Enterprise Architecture Framework Research Paper Assignment

Purpose of this Assignment

This assignment gives you the opportunity to apply your research skills, analysis, and critical thinking skills to describe one of the enterprise architecture (EA) frameworks. This will provide you an opportunity to gain an in-depth understanding of one of the frameworks commonly used.

This assignment specifically addresses the following course outcomes:

• describe enterprise architecture (EA), the appropriate application of EA frameworks, and an overall ongoing EA program

• analyze and examine how enterprise architecture and enterprise systems influence, support, and enable an organization's ability to contribute to strategic decision making and to respond and adapt to the business environment

Assignment

Select one of the enterprise architecture frameworks listed below:

• Zachman Framework

• The Open Group Architecture Framework (TOGAF)

• Federal Enterprise Architecture Framework (FEAF)

• DoD Architecture Framework (DODAF)

• Treasury Enterprise Architecture Framework (TEAF)

Research and write a paper that describes the chosen framework. Your description should include

• Framework's purpose, scope, principles, and the kinds of structures it uses, as appropriate to the framework. Ensure that you adequately cover these four attributes.

• Explain the framework's strengths and weaknesses.

• Findmore than two examplesof organizations that have used the framework and briefly discuss them. (NOTE: More than two examples are required to receive all possible points; see Grading Rubric below.) Apply critical thinking, especially when describing the structure and its strengths and weaknesses.

It is highly suggested that you provide a graphic or image that explains the structure of the model you have chosen. It is not required, but highly recommended to provide additional context as it would contribute to an understanding of the framework.

Your paper will be graded on both the accuracy and completeness of your description.

Your paper should be 3-5 pages in length.

Reference no: EM132130850

Questions Cloud

Create an introduction for group project : Brainfood has contracted PM Incorporated (PM Inc.) to upgrade their information technology (IT) infrastructure following their relocation to a larger facility.
Analyze how knowledge of the spi will help you : Analyze how knowledge of the SPI will help you as a project manager in controlling the project and ensuring that it is completed within the scheduled target.
Why state governments have data security breach notification : Relate state government data security breach notification laws to individual privacy. Why state governments have data security breach notification law.
Define at least two risks to this project : A critical factor is that your company handles secure information for its clients. All employees must pass very detailed background and security clearances.
How enterprise architecture and enterprise systems influence : Describe enterprise architecture (EA), the appropriate application of EA frameworks, and an overall ongoing EA program.
Differences over the effectiveness of budgeting : AYB225 Management Accounting - Determine whether T&K Solutions should drop or continue the bookkeeping service - Write an email to Terry and Kerry stating
Percentile of all 20 year old men heights : Suppose that the height (x), in inches of a 20 year old man is a normal random variable with a mean of 70 inches and standard deviation of 5.102 inches.
What is the shortest wait time : What is the shortest wait time that would still be in the worst 20% of wait times?
Find the probability that the diameter of a selected : Find the probability that the diameter of a selected bearing is greater than 3 inches. (Round your answer to 2 decimals) Please show your work.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Illustrate the problems that arise when the building block

Illustrate the problems that arise when the building block and design patterns are not fully understood and the impacts on a SOA environment.

  How would they notify the department of homeland security

What do you feel are the most important elements of a successful change management process?

  Construct a query to show the expected payment date

Your organization is looking to submit its database design documentation to an evaluation team in order to meet Sarbanes-Oxley (SOX) compliance.

  Describe the golden rules of interface design

Suggest two (2) changes for each interface to achieve a more user-friendly design and justify your suggestion.

  Ip basic concepts

Suppose that you work for a company that has been using IPv4 in each of its networks.

  Identify and read the privacy policy or agreement

Discuss items that surprised you and items that relate to the content of this lesson (for example, look at the Required Reading TRUSTe white paper.)

  What trends seem to apply to your technology

Can you compare the technology to a similar historic example? Will investment and adoption patterns be similar? What trends seem to apply to your technology?

  What aspects of ethical relativism do you identify

What aspects of ethical relativism do you identify and agree with? What aspects do you disagree with? Give a personal example that illustrates your stance on ethical relativism, describing how you made a moral decision in an ethical dilemma. Inc..

  Approaches of the organization for solving the problems

Provide a background of the organization and fully describe six components of the organization's supply chain. Examine the potential problems related to each of the components described and explain the approaches of the organization for solving th..

  Why you think the listed exceptions are permissible

Write a brief summary listing the exceptions and explaining why you think the listed exceptions are permissible.

  How are information systems involved

Describe briefly the history of your chosen topic. How are information systems involved? Why is it important? How and why is it an IT/IS topic?

  Describe five policies that can help ward off these types

Differentiate between a security policy and an acceptable use policy. Be sure to provide examples of what each might contain.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd