How would you use the stages of the sdlc

Assignment Help Management Information Sys
Reference no: EM131935264

1. How would you use the stages of the Systems Development Life Cycle (SDLC) to help Drewmobile Incorporated automate its currently manual "Submit Official Travel Requests & Vouchers Online" business task/activity? (see Chapter 13). Please craft a well-written and fluid essay exam response to address this question. Moreover, please use examples to illustrate your answer.

2. When Tony Stark, CEO of Stark Industries, travels to other countries, he follows a routine that seems straight from a secret agent movie. He leaves his smart-phone and laptop at home. Instead he brings loaner devices, which he erases before he leaves the U.S. and wipes clean the minute he returns. While traveling, he disables Bluetooth and Wi- Fi and never lets his phone out of his sight.

While in meetings, he not only turns off his phone, but also removes the battery for fear his microphone could be turned on remotely. Mr. Tony Stark connects to the Internet only through an encrypted, password-protected channel. He never types in a pass-word directly, but copies and pastes his password from a USB thumb drive. By not typing his password, he eliminates the risk of having it stolen if key-logging software got installed on his device.

Many travelers might consider Tony Stark's method too inconvenient. Clearly, his electronically clean methods are time consuming and expensive. By way of a well written and fluid essay exam response, please address the below questions:

a) Is there a tradeoff between cybersecurity and convenience? Explain.

b) Create a list and explain the best cybersecurity practices for travelers based on Tony Stark's methods

3. You have just been promoted to Chief of IT Security for Drew-mobile Incorporated. You just learned that our organization will be merging with another automotive company which has a history of detrimental breaches due to poor security management. Please craft a well-written and fluid essay exam response to address the below four (4) questions:

a. What are the key IT-security areas of focus?

b. What strategies and technologies you would consider in the transition?

c. Discuss non-technical considerations as well.

d. Please present your answer in the form of a well crafted essay response.

4. Please explain to me, via a well crafted essay response, why Drewmobile Incorporated, a medium-size company with 8,000 employees, should or shouldn't consider out-sourcing and/or offshoring of our Information Systems Management & Information Technology Management functions?

a. Such a decision & essay exam response should include:

i. the state of the American economy,

ii. operational challenges associated with both courses of action,

iii. considerations from a deontological ethics perspective

iv. as well as what's in the best interest for the corporation from a sustainability perspective and the greater community (Stockholder Theory, Stakeholder Theory, and Social Contract Theory).

5. Please describe to me, via a well crafted essay response, how Business Intelligence, specifically the "Circle of B.I." as it was explained in class, affects the SDLC and the levels of Decision Making (to include information requirements and types of decisions).

Attachment:- REWRITE Paper.rar

Reference no: EM131935264

Questions Cloud

Calculate estimates of ap and mp : Calculate estimates of average products (AP) and marginal products (MP) when the firm employs 20 workers.
Lessen symptoms harming a patient : In effect, is a doctor who prescribes a sugar pill (even if it works) to lessen symptoms harming a patient? What do you think of the use of the placebo?
List different types of training : List the advantages and disadvantages of each. Is one type of training better than the others? Why or why not?
Discuss the importance of educators : The importance of educators understanding the circumstances, causes, and effects of self-harming behavior so they can respond quickly and effectively.
How would you use the stages of the sdlc : How would you use the stages of the Systems Development Life Cycle (SDLC) to help Drewmobile Incorporated automate its currently manual.
Identify a moral issue in the local community : First, identify a moral issue in your LOCAL community. You may find this in a number of ways, including direct experience in your local community.
Essay on major themes in mark gospel : Religious Studies: Task: Essay on Major themes in Mark's Gospel. Your response should be a minimum of six pages in length.
Textbook and study for an exams in psychology : Think about the process used to read your textbook and study for an exams in psychology.
Confronting clearly wrong behavior : What would be the challenges (based on the lectures) of confronting clearly wrong behavior/ "sin" in the life of your client if you were working in a secular

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss the mass media impacts

Discuss the mass media impacts that are related to your chosen product and the advertising campaign. Examine the campaign from at least 2 theories, research approaches, or perspectives.

  Assistance on supply chain management paper

Requesting assistance on Supply Chain Management Paper - Background: elucidate the current situation and context - tell about the campaign and what it was supposed to do and why you were assigned and Strategy

  Principle of good faith

Principle of good faith - Under what conditions will Wilson prevail against the store if the store tries to recover the computer from him?

  Pick one of your favorite websites and find its ip address

Your friend is having a hard time studying TCP/IP addressing for the exam. Pick one of your favorite websites and find its IP address (you can open the command prompt in your computer and ping the website URL to get the IP address), then analyze t..

  Systems planning development implementation what are

systems planning development implementation what are different types of designs?system design includes determining the

  Overview of disaster recovery or it service continuity

An introduction or overview of disaster recovery / IT Service Continuity which provides definitions and addresses the reasons why cybersecurity should be specifically addressedin the company's DR/BCP strategies and plans

  Identify the primary benefits of byod in organizations

Analyze in detail the major risks surrounding BYOD, and analyze the security controls and technologies that are currently available and being utilized to manage these risks.

  Research credit scoring variables in loan-delinq-train data

Research credit scoring variables in the loan-delinq-train data set to determine key factors influencing the likelihood that a customer will forfeit on a loan and become a loan delinquency. This will provide you with a business understanding of th..

  Identify different organizational risk at different levels

Choose any Multinational Corporate with different organizational risks at different levels with different context (Internal & External).

  How digital media has been use to influence business process

Students are required to identify news stories which demonstrate how digital media has been used to influence or has changed core business processes within organizations or for individuals.

  Discuss about the allstate claim prediction challenge

Risk varies widely from customer to customer, and a deep understanding of different risk factors helps predict the likelihood and cost of insurance claims.

  Payment methods offered by the companies

Create a table summarizing the different payment methods offered by the companies you visited

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd