Prepare a high-level plan for your evaluation study

Assignment Help Management Information Sys
Reference no: EM132249273

Technology Evaluation Study Plan - Detailed Assignment Description

Choose one of the student-written Technology Selection papers from the list posted by your instructor in the Week 7 conference.

Read your chosen Technology Selection paper to learn more about the selected technology. Next, consider what type of formal evaluation study could be used to learn more about this technology and how it is likely to interact with people, processes, and technologies. Then, design a formal evaluation study which could be used to obtain more information about one or more of the following:

o characteristics (features and capabilities) of the technology

o interactions among technologies, people, environments, and processes (use cases or scenarios)

o risks or vulnerabilities associated with adoption of this technology

o costs and benefits associated with adoption of this technology

Choose Your Evaluation Method

Your evaluation study design must use one of the following:

o Case Study

o Delphi Study (panel of subject matter experts)

o Quasi-Experiment (e.g. penetration testing or pilot testing in a controlled environment)

o Pilot Implementation (in a demonstration environment)

See theTechnology Evaluation Methods module in the Week 2 conference for detailed descriptions of each of these types of evaluation methods.

Design Your Study

Identify the specific questions that your formal evaluation study will address. These questions must be security-focused (review the Pillars of Information Security and Pillars of Information Assurance for ideas). Your design should include a description of the specific security issues which will be tested or security capabilities which will be evaluated. Use standard terminology when writing about security issues (see the rubric).

Develop Your Evaluation Study Plan

Use your study design to prepare a high-level plan for your evaluation study. Your plan must include the following:

o Introduction

description of the emerging technology and justification for including it in an evaluation study

o Research Question(s)

These must be security focused. Use the Five Pillars of Information Assurance and / or the Five Pillars of Information Security.

Use "how" or "what" questions (writing good "why" questions is beyond the scope of this course).

Examples

What vulnerabilities exist that could be attacked to compromise confidentiality?

How could an attacker compromise availability?

For each research question, provide a brief description of a scenario or use case which could be used to answer the question. Your description should be one paragraph (no longer).

o Methods

high level design of the study (focus upon the evaluation model and your research questions)

description of how the technology will be incorporated or used in the study (including specific security issues which will be tested or security capabilities which will be evaluated)

notional system or network architecture diagram showing the pilot test environment (only if you are doing a pilot study)

o Limitations or Special Considerations

any special considerations or security concerns which must be addressed (e.g. "clean room," test data sanitization, or isolation environment to prevent the pilot study from causing harm to operational systems)

o Timeline of Events (Notional)

A notional timeline (expressed in days or months after start date) for your study

Notional Timeline of Events

The notional timeline of events (stated in days or months after start) that provides an estimate of how long you expect your evaluation study to take. For a Delphi Method study, your study could take as little as a day or two. For a Delphi Method Study, include the number of "rounds" and how long each round will be (the time allotted for experts to consider information and reply back with their opinion on the questions or issues).For a case study, quasi-experimental, or pilot implementation design, your study may span several months; in this case, divide your timeline into phases (setup, testing, reporting).

Cost Estimate Is Not Required

Normally, an evaluation study plan will include a cost estimate. For this course, we will NOT be including cost elements in our evaluation study plans as the information required to developthese items is not readily available to students. If you wish to address this area of a study plan, limit your discussion to a brief listing of the cost elements (people, technologies, facilities) and state that a cost estimate will be provided separately.

Document Your Plan

Your Technology Evaluation Study Plan should be at least three pages in length but no more than ten pages (excluding the title page and references page). This should be a high level design that can be read quickly. Your study plan must contain the five major sections defined above and comply with the formatting guidance provided by your instructor.

Reference no: EM132249273

Questions Cloud

Evaluate alternatives to the company self-hosting the site : The Web architecture should describe and justify operating system choices (i.e., Linux, Apache, MYSQL, PHP, Windows, IIS, SQL, etc.).
What types of it applications might it consider : Describe the strategy a healthcare organization can use to lower its cost of care. What types of IT applications could they use to help them achieve this goal?
Create a table differentiating the bell la padula model : Create a table in Microsoft Word differentiating the Bell La Padula model, the Denning Information Flow model, Rushby's model, the Biba model.
What biblical principle can you think of that could decrease : If you cannot think of a single principle, then what biblical principle would you identify as guiding your responsibilities as a network security manager?
Prepare a high-level plan for your evaluation study : Consider what type of formal evaluation study could be used to learn more about this technology and how it is likely to interact with people.
Develop predictive models that find cartographic variables : The goal of this competition is to allow you to develop predictive models that can determine, given 54 cartographic variables
How would granting access to this impact their business : Companies like Google, Apple, Microsoft, Twitter, Amazon and Facebook offer up free services to customers all across the globe.
Discuss project management tools : Discuss project management tools that will help you accomplish this task and conduct a risk analysis of what can go wrong.
Demonstrate a connection to your current work environment : If you are not currently working, share how this could be applied to an employment opportunity in your field of study.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Functional silos are not appropriate for todays organization

Why do you think functional silos are not appropriate for today's organization? Discuss your answer from organizational and technical perspectives.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Describe the functions the system should perform

Nontrivial: The selected project should be large enough to allow reasonable exercise of the system analysis and design process.

  Preparing an adequate data model

Using specialization hierarchies can provide an efficient application development structure. Justify the use of surrogate primary keys for a database design. Provide an example to support your response.

  Define the sdlc model and methodology

Select a System/Software Development Life Cycle (SDLC) model and methodology then apply this model and methodology to a project using the Information Technology (IT) specialization you wrote about in your Week 1 paper. Be sure to define the SDLC ..

  Systems context diagramdefine the term system give an

systems context diagramdefine the term system. give an example of a business system and create a context diagram to

  Why open-source software will soon dominate

Why open-source software will (or will not) soon dominate the field of database management tools.

  Recommendation for improving supply chain and qualitytwo

recommendation for improving supply chain and qualitytwo days before you are scheduled to complete your work on this

  Describe the seven critical characteristics of information

Describe the seven critical characteristics of information. How are they used in the study of computer security? What is risk appetite? Explain why risk appetite differs for every organization.

  Information systems- sql serversusing the online library

information systems- sql serversusing the online library the internet and all course materials locate information about

  Discuss how to access team productivity

What conditions need to be in place for teams to excel and why? Suggestion ways to design teamwork so that threats to performance is minimized.

  Repeat the process until the code successfully validates

Using http://validator.w3.org/#validate_by_upload, validate and correct the errors in the provided HTML file.Repeat the process until the code successfully validates

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd