Information infrastructure and systems

Assignment Help Basic Computer Science
Reference no: EM132852382

Information Infrastructure and Systems

Your task for the final project is to research in the South University Online Library and on the Internet to identify a case study of your choice with a pertinent information system application.

Some examples could be: a health care organization, such as a health care insurance company, a major hospital, or medical laboratory; an academic institution, such as a university or a professional institute; a commerce and transportation center, for example a major airport, or maritime port; a transportation carrier, such as an airline company, a railroad company, or even a car transportation service; a network service provider, such as a telecommunications service carrier/provider, an Internet and voice digital service provider, or a cloud service provider; a major media organization, such as television network, or a multimedia service operator; an industry firm that manufactures products, such as a computer products manufacturer, a car manufacturer, or a hardware manufacturer; a major retailer, for example a food retailer, a home maintenance retailer, or clothes outlet; an entertainment complex, such as a hotel, a vacation resort, or a large recreation and entertainment complex; a financial institution, for example a banking system, a credit card service, or an investment trading service.

The above are examples to guide you with your research, but you are not limited to these areas. It is important that you arrive at your own case study based on your personal interests, and that it is well suited for an information systems analysis. Some criteria that you should consider in arriving at your case study are listed below:

Your case study may be based on an actual company or organization, using facts from research, or it could be based on a fictional company or organization that you entirely define yourself as a hypothetical case with your own assumptions.

Your case study must require an underlying information system as an essential element for its operation.

The information system must be reasonably complex. One way to determine whether an information system is reasonably complex is to think in terms of entities and relationships that you will need to model. Even without knowing exactly how the data model will look, having some early notion of how many entities and relationships you should expect to model the information in your case will give you an appreciation for your case's complexity. A reasonable complexity would be at least ten entities and ten relationships.

At some point in your research you must be able to think in terms of use cases for your information system. Think of use cases as transactions that different end users will invoke when interacting with your information system. At the time you select your research area and define your case study, you need not know exactly the use cases you will be working with, but you should have some appreciation for the types of scenarios that you will explore as you progress with your project.

Finally, you must submit your area of study to the professor via e-mail and have your professor's approval that you may go ahead with your selection.

Once you have selected your study area and case, and have received approval from your professor, you may proceed to the next steps described below. Create a report that focuses on the IS used to support the operation of your organization in your case study and answer the following questions.

What events trigger the flow of information in and out of your system?

What tracking mechanisms are in place?

What technologies are being used for tracking the underlying events?

What is the information infrastructure for handling the information flow?

Diagrammatically represent the flow of information between your organization and adjacent entities (for example, these could be suppliers, customers, support organizations, government agencies, or partnering organizations).

What security mechanisms are in place for obtaining information on events pertaining to your case study?

What security mechanisms are in place in the organization? Who handles violations of organizational policies? What is the range of their responsibilities? Who do these officers respond to? Which office oversees the operations of the business for your organization?

What are brokers? What types of precautions are taken in order to establish minimum trust with brokers?

Which standard organizations or governmental agencies oversee the operation of your organization?

Reference no: EM132852382

Questions Cloud

What is the Impact of Technology on Teaching and Learning : Topic - What is the Impact of Technology on Teaching and Learning (k-12). Focus on 21st Century Students, 21st Technology, Teachers' resistance
Investigate quality control issues at burlington factory : Caption: Bonnie needs you to investigate some quality control issues at the Burlington factory.
Find the proportion of students with the score : 1. Assume the IQ scores of the students at UNC has a normal distribution with the mean of 100 and standard deviation of 15.
Radio frequencies : What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies?
Information infrastructure and systems : What events trigger the flow of information in and out of your system? What is the information infrastructure for handling the information flow?
SEHS4610 Engineering Management Assignment : SEHS4610 Engineering Management Assignment Help and Solution, The Hong Kong Polytechnic University - Assessment Writing Service
Literature review regarding forensic implications : Conduct a literature review regarding the forensic implications of new uses for email and mobile devices.
Penetration testing : Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities.
Find the five number summary for the age observations : Find the five number summary for the following age observations: 35, 45, 40, 20, 25, 41, 55, 62, 18, 22, 25, 40

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Development of critical thinking

There is one individual assignment. As all items, it is graded based on the development of critical thinking, analysis, and support for points. You are to prepare a brief paper, but recommended length is about two - three single-spaced (four to si..

  What security or networking mechanisms

What security or networking mechanisms would you use to protect any Intranet servers you had? Why and how would that mechanism offer protection?

  What are the products of the reaction

Which will react with H+ when A small amount of aqueous HCl is added? What are the products of the reaction?

  Entrepreneurship and production concerns

Consider in the response the functions of business, entrepreneurship and production concerns. Be sure to define these areas and how they fit the company.

  Create a fraction struct that has a numerator

Create a fraction struct that has a numerator and a denominator. Make an overloaded operator + for the struct that can add two fractions and return a fraction result. Make a overloaded

  Apple is an environmentally friendly tech company

Apple is an environmentally friendly tech company. Is this statement true or false? Why? Explain?

  How the tree will expand and what the final tree will look

how the tree will expand and what the final tree will look like.

  Changes between ipv4 and ipv6

Research some of the changes between IPv4 and IPv6, and discuss some of the reasons for the changes.

  What are the most important IT security issues

What are the most important IT security issues facing companies today? Have these changed in the last 5 years, and will they continue to change?

  Algorithm that constructs an nfsm from a regular expression

Describe an algorithm that constructs an NFSM from a regular expression r and accepts a string w if w contains a string denoted by r that begins anywhere in w.

  Suppose that the canadian dollar exchanges

Suppose that the Canadian dollar exchanges for 1.01 US dollars and also for 0.77 Euro. A US dollar exchanges for how many Euro?

  What is a constructor

What is a constructor? Give its properties. How do we declare/ define it? Can they be overloaded?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd