Provide details of how the mobile self-service

Assignment Help Management Information Sys
Reference no: EM13764658

Write a ten to fifteen (10-15) page term paper that can help the university achieve its objective. The paper must address the following topics:

Information Gathering

1. Describe the following:
a. The purpose and goals of the mobile self-service.
b. The target audience.
c. The audience needs and wants.
d. The resources that will be required to achieve the desired output.

Design Strategy

2. Describe each of the following.
a. The design of the Website for mobile devices.
b. The interfaces that are applicable to the mobile devices.

3. Design each of the following using Microsoft Visio or any open source wireframing or mockup tool. Note: The graphically depicted solution is not included in the required page length.
a The https://icampus.strayer.edu home page for a mobile device.
b.. The self-service Web page to enroll in your courses using mobile device.

Prototyping

4. Write a proposal to the University including the following:
a. The prototypes that could be created.
b. The type of usability testing to use in determining the design that will provide the best user experience.
c. The type of evaluation methods to use in determining the design that will provide the best user experience.

Implementation

5. Provide details of how the mobile self-service will be implemented on the various mobile devices. Note: Keep in mind that the university already provides a self-service Website for non-mobile students.

Maintenance and Growth

6. Elaborate on the guidelines for how the self-service Website can be kept current as newer mobile devices are being introduced at a rapid rate.

7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13764658

Questions Cloud

Review reading in qualitative research and evaluation method : Review the reading in Qualitative Research and Evaluation Methods and the video segment "Doctoral Research: Ensuring Quality in Doctoral Research."
Write the sql code to perform the tasks : Write the SQL code to perform the tasks requested in each problem. Define a new containing the product number, name, price, and quantity on hand along with the number of orders in which the product appears.
Review reading in qualitative research and evaluation method : Review the reading in Qualitative Research and Evaluation Methods and the video segment "Doctoral Research: Ensuring Quality in Doctoral Research."
Principles and theory of security management : think of some intrusions - the disgruntled mailman flying onto the Capitol lawn on his gyrocopter and remember the couple who crashed a White House function a few years ago?
Provide details of how the mobile self-service : Prototyping, Write a proposal to the University including the following. The prototypes that could be created.The type of usability testing to use in determining the design that will provide the best user experience.
Data and process modeling : The next phase in the project development cycle is to develop a logical model of the system based on the system requirements. The first step is about the "what" step. We need to show what the system will do, without worrying about how it will do..
Detail how the law imposes ethical duties on business : Detail how the law imposes ethical duties on business. Explain and provide critical rationale why you found them interesting
Policy, politics, and global trends problem : Discuss the primary options and/or interventions for the decision maker, including why they are tangible.
Which movement do you see reflected in novel you are reading : Which of these movements do you see reflected in the novel you are reading? Do you see influence of more than one? Give specific cited examples that point to these movements.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Description of integrated marketing

description of integrated marketing communicationsintegrated marketing communications are the practice of developing a

  Describe potential risks to the information

Describe potential risks to the information and the related vulnerabilities within the organization when utilizing web components. How could you mitigate the risk

  Explain about streaming

A technique in which video files downloaded for Internet are buffered, so that the first part of the file will be viewed while the remaining parts

  Technology processes in a companyare there any manual or

technology processes in a companyare there any manual or ineffective processes at your current company that technology

  What competitors might overtake it

In 10 years, will Facebook still be so popular and so dominant? What competitors might overtake it? What are some substitute products for social networking sites such as Facebook

  Physical access controls and logical access controls

Compare and contrast physical access controls and logical access controls. Further explain in what ways both physical and logical access controls are related to implementing a security policy

  Structural organizational change enabled by it

The four kinds of structural organizational change enabled by IT, in order from least to most risky, are and Traditional software development methodologies often fail because

  Non-technical and technical staff relationshow can a

non-technical and technical staff relationshow can a technology manager help to foster good working relationships

  Technology is an important component of the business

technology is an important component of the business environment.describe how technology is changing the competitive

  What do you meant by knowledge management

What do you meant by knowledge management and If you were in charge of developing a knowledge management system in your company, what kinds of things would you take into account?

  Secondary informationresearch must thus be in line with

secondary informationresearch must thus be in line with company goals and aspirations at all times. testing may be good

  Collecting data on individuals into comprehensive

collecting data on individuals into comprehensive databasesin order to protect against terrorists the u.s. government

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd