How the information will be used for system requirements

Assignment Help Computer Network Security
Reference no: EM131021068

Question: The purpose of the Session Long Project is to give you the opportunity to explore the applicability of the Module to your own life, work, and place in space and time, and to experiment with the Module to see how the otherwise academically rigorous presentation of a topic may, with more or less work and/or trauma, become "up close and personal". This is done in a number of different ways-sometimes cumulative papers, sometimes practical hands-on experimentation with a tool of some sort, sometimes reflections on a place of work or life. The common thread is personal application, aimed at demonstrating a cumulative knowledge and understanding of the course''s material.

For this course, you will be working on a single cumulative project. Each Module will involve its further development. The purpose of the project is to let you practice your analysis and development methodology application and to meld the results into a coherent and professional deliverable that demonstrates what you have learned. What you are going to do is dream up and prepare requirements and select a methodology for a new information system application-and the process you go through will mirror, in outline, the steps in the systems development process that you are learning about in this course.

Session Long Project

For Module 1, your assignment is to conceptualize a hypothetical information system project and describe its context and purpose. You can design the project for your own organization, an organization that you or someone you know is familiar with, or even for your own imaginary business. Remember, you need to consider both key aspects of information systems-namely information requirements and development methodology.

If you have difficulties dreaming up such a project, you can go someplace interesting or where you already know the people. Spend maybe a half-hour looking at how information is used there. Identify all of the information resources that people are using. Talk to the people if you can. Where do they get the information they use? How do they use it? What other kinds of information might they find useful? What could they do with it? What kinds of futuristic information services would be useful to them? If you are constrained by location and cannot go to interesting places, you might think of a virtual place such as an online forum, or a portal site, etc., and imagine what information services could be helpful to the users there. You may even email to some of the users to obtain additional information if you would like. Or you can simply think what futuristic information services would be useful and successful to an existing organization.

Once you have already got some ideas, discuss them with your classmates (via discussions for instance), your coworkers, friends, relative, or the folks behind you in the line at Starbucks. Of course, you may also contact the faculty for their initial feedback. If you have difficulties coming up with your own project, your professor can help as well.

Once you''ve got a pretty solid idea about the project you''d like to formulate, please prepare a 2- to 3-page paper describing your hypothetical information system project.

Make sure to include:

what the project is about including bounderies

what information gathering you see as needed to make it work

how the information will be USED for system requirements

what are the key features of the organizational context of the project

why the project is useful

why the project will be successful

SLP Assignment Expectations

Your assignment will be graded according to the MSITM SLP Grading Rubric, which aligns with the following expectations. (To see the rubric, go to Assessments>Rubrics. Click the arrow next to the rubric name and choose Preview.)

LENGTH: 2-3 pages typed and double-spaced

The following items will be assessed in particular:

The degree to which you have carried out the assignment completely, or clarified why you could not and investigated alternatives

Your ability to describe your project clearly and develop your recommendations systematically

Your ability to focus on the overall purposes of the assignment, not just its specific steps

If you use any written references, please cite all your sources properly. General Case and SLP Paper Writing Guidelines

Verified Expert

The solution is discussed about the information system of higher education which covers the boundaries of the higher education, system requirements, key features of the organizational context of the project, useful of project. The solution file contains 1000 words included references.

Reference no: EM131021068

Questions Cloud

Evaluate a learning organization : How can the 6Ds you have learned about in the book help evaluate a learning organization? What is an example of an organization which is not a learning organization?   How does your example fail to meet the characteristics of a learning organization?
Does alfredo have a lower cost of producing pizza than paolo : Their parents have always liked Alfredo best, and they buy two pizza ovens and give both to him. Unfortunately, Paolo must buy his own pizza ovens. Does Alfredo have a lower cost of producing pizza than Paolo does because Alfredo received his pizz..
What way can knowledge of non verbal communication : In what way can knowledge of non verbal communication help your communication with others? How do you communicate nonverbally?
How many shares of starbucks stock were traded on this day : The following table shows information on June 7, 2013 on the stock price of Starbucks Corporation: How much did the price of Starbucks' stock change from the day before? Did the Starbucks' stock price vary much during this day's trading?
How the information will be used for system requirements : How the information will be USED for system requirements - what are the key features of the organizational context of the project - why the project will be successful
Company distills kentucky bourbon : Your company distills Kentucky bourbon. A Canadian competitor is selling "Kentucky bourbon" in Ontario, but its bourbon is made in Canada
Relationship of someland gdp to someland gnp : 1,000,000 people live and work in Someland. Of these 1,000,000 people, half are citizens of Someland. Additionally, there are 10,000 citizens of Someland, who live and work overseas in Finland. All residents and citizens of Someland produce $20,00..
Subject-customer behavior : Social media has been described as the new hybrid element of the promotion mix. When considering marketing and consumption communities and communication within groups,
What is the annual benefit for a person who retires : What is the annual benefit for a person who retires at age 64? At what retirement age does a person receive an annual benefit of $11,600?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Analysis of a small publishing company

A small magazine publisher wishes to determine the best combination of 2-possible magazines to print for the month of July. Backyard magazine, which he has published for years, is a contant seller.

  Describe the properties and usage of digital signatures

Describe the properties and usage of digital signatures. Evaluate digital signatures based on their legal ability to stand up in court

  Describe the security features available on a platform

Describe the security features available on a platform of your choice (for example, Linux/Android/Mac OS X/Windows/Apache/Java/Perl), to mitigate a specific type of attack (for example, adware/malware/SQL injection/spoofing/tampering).

  Write an essay about the privacy on the internet

Write an essay about the Privacy on the Internet. Narrow the big topics down to a specific research question and clearly state what it is in the introduction.

  Describe a malware attack that causes the victim

Describe a malware attack that causes the victim to receive physical advertisements and describe an instance of a file that contain evidence of its own integrity and authenticity.

  Network design paper

Network Design Paper

  For a typical network environment

For a typical network environment (that includes an Internet-facing Website, a human resources database and application, and development workstations that contain copyrighted material), describe some typical devices or assets and vulnerabilities that..

  Describe some typical devices or assets

For a typical network environment (that includes an Internet-facing Website, a human resources database and application, and development workstations that contain copyrighted material), describe some typical devices or assets and vulnerabilities that..

  Paper on certification & accreditation for it systems

Write a 5 page paper on Certification & Accreditation for IT Systems (Network Plus, Security Plus, SSAA's, DAA's, ATO's, etc.)

  How the user master record in sap plays an important role

Discuss how the user master record in SAP plays an important role in ensuring assignment of appropriate rights, activity groups / roles and authorisations for individual users.

  Information systems security policy

From the e-Activity, discuss how the National Security Telecommunications and Information Systems Security Policy (NSTISSP) national policies facilitate the confidentiality, integrity, authentication, and non-repudiation of computing security

  What is access control

What is Access Control? What is SSO and what are some of parts and types of Access Control?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd