Social and organisational context of digital engineering

Assignment Help Management Information Sys
Reference no: EM132594496

CTEC5808 Legal, Ethical and Professional Practice and Research Methods - De Montfort University

Learning outcome 1: Explain, evaluate and apply the legal, social and organisational context of digital engineering, systems management, cyber security and digital forensics.

Learning outcome 2: State, select, apply and evaluate a range of security management theories and strategies in the planning, management and auditing of a cyber security provision.

Learning outcome 3: Explain, evaluate and apply a range of research methods, theories, tools and procedures.

Learning outcome 4: Critically evaluate organisational theory within the cyber security domain.

Learning outcome 5: Synthesis, analyse and evaluation literature relating to a given topic in verbal and written format.

Business Proposal

You are required to develop a business proposal in the fields of Cyber Security or Digital Forensics; the business proposal must demonstrate novelty, cost effectiveness and knowledge generation. You must clearly articulate the impact of the proposal, how it would satisfy customer demand based upon your market research findings and fit within your organizational context.

The objective of this coursework is to demonstrate your ability to synthesize and critically analyze ethical, regulatory, legal and technological phenomena in development of an operational business proposal in the field of Cyber Security or Digital Forensics. Technical and non-technical risks and related contingency plans should be addressed through consideration of risk management and secure systems architecture. The development of the business proposal will be informed by an appropriate research methodology with justification for the choice of methodology. One of the methodologies selected should be critical.

In addition, you will create a research plan, usually in the form of a chart that clearly identifies development stages of your business proposal. You should give clear indication of the required time envisaged to complete each stage and short argumentation why this time is suitable for the specific tasks.

The Viva
You should demonstrate oratorical, synthesis and analytical ability through development and delivery of a power point presentation explaining your business case underpinning your business proposal, its rationale and impact in the fields of Cyber Security or Digital Forensics. The viva will take 15 minutes for presentation and 5 minutes for questions posed by your examiner. The date of the viva will be soon after submission of the Business Plan; dates of individual vivas will be advised.

Attachment:- Coursework Specifications.rar

Reference no: EM132594496

Questions Cloud

How does one go about picking whihc is best for situation : How does one go about picking whihc is best for our situation? There are three types of agencies involved with advertising: the full-service agency
Discuss entrepreneurial flair : Discusses Entrepreneurial flair. Why is this important for startups? Are the ways of incorporating this in longstanding traditional companies?
How family and gender issues impact communication : Describe how family, culture, and gender issues impact communication. Consider your proposed approach to interviewing clients from your selected group.
Business organizations and securities : Evaluate three forms of business organizations including advantages and disadvantages related to the business the ladies plan to operate.
Social and organisational context of digital engineering : Explain, evaluate and apply the legal, social and organisational context of digital engineering, systems management, cyber security and digital forensics
What are the various historical-cultural influences : Evaluate each of these events according to its significance in history and culture. Place the date, a brief description, or even a video clip of the historical
Compute the cost assigned to ending inventory : Compute the cost assigned to ending inventory using (a) FIFO, (b) LIFO, (c) weighted average, and (d) specific identification
Discuss how the life cycle of the firm affects its access : Discuss how the life cycle of the firm affects its access to capital markets and its choice of financing vehicles. Compare and contrast the advantages
Describe a possible termination process for client : Describe a possible termination process for your client/consumer recommending ways to maintain change including preparing for a possible relapse

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are the types of risks to trusted networks

What are the types of risks to trusted networks that must be mitigated by security professionals with the goal of securing internal information assets?

  Discuss the employed competitive advantage

Written Assignment: Choose a Part 121 air carrier(such as American, Delta, Southwest, etc.) and provide data that shows how that enterprise has successfully.

  What does it mean to map the consumption chain

What does it mean to map the consumption chain? What does it mean to "hire" a product to do a "job" for you? Is this a useful perspective? Why or why not?

  Describe some risks that you or your team encountered

Looking back at your current or former job, describe some risks that you or your team encountered. Were there positive or negative risks?

  Identification of the concerns regarding data and network

Description of the new types of knowledge the HB Company will be able to obtain through the addition of mobile ordering

  Read the article and answer the below question

read the article and answer the below question : Per the Daniel Benjamin article in your readings.

  Create a stakeholder management strategy

Create a Stakeholder Register and Stakeholder Management Strategy for the project, focusing on members who are not on the project team.

  Technology in business changes and challengeswhat changes

technology in business changes and challengeswhat changes have you experienced in your job role recently as a result of

  Should the government be able to place digital video cameras

Should the government be able to place digital video cameras on every street corner and use facial recognition software to monitor your movements? Why or why not?

  Discuss the purposes of multi-site content library

Conduct research using the internet and discuss the purposes of multi-site content library and the advantages to having a multi-site content library.

  Describe one task where it would be suitable to use a script

Describe one task where it would be suitable / efficient to use a script and another task where it might not be. Provide a rationale for your response.

  Critically fundamental principles of information systems

Critically analyse the theory, concepts and models of operations and information management and demonstrate an understanding of the strategic importance of information management in global organisations - Evaluate critically the fundamental princip..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd