What are the security issues that should be addressed

Assignment Help Computer Network Security
Reference no: EM131114104

Online golf shop

Overview

For the final project in this course, you are being asked to apply the concepts learned throughout the course to assist a small business owner in improving his business through the use of technology. Milestone One will be the first step in creating your report and recommendations to the business owner. The objective of this milestone is to further explore course concepts and incorporate additional perspectives and source material to analyze real world scenarios. Leverage both the textbook and external sources to complete the internship assignment.

Prompt

Harrison Kirby runs a local golf course with a shop of around 150 products. He wants to have a website that will facilitate e-business for his golf course. He wants online scheduling of tee times (including coordination of group play), online shopping, and social network integration. One difficulty of moving a small business from a traditional retail store to an online store is channel complications. Everything must be reconsidered. For example, how will he communicate with his customers? How will they find product information? How will he accept orders? How will he manage payments and shipping? These questions and many more have kept Kirby from making the e-commerce plunge.

Below you will find a letter from Kirby explaining what he would like you to do:

Dear Intern,

I have an interesting project for you. I am interested in an online presence for my golf shop. Specifically, I want to offer a few (less than 150) products online for in-store pickup or delivery. I would also like online scheduling of tee times.

I want you to research the web for companies that provide this type of product. Ultimately, you may recommend a combination of providers to accomplish all that I am trying to do. For example, your final recommendation may include a web hosting solution, logistics provider, and a CRM (Customer Relationship Management) tool. Or, perhaps you will find a product that can be customized to provide all the functionality in one piece.

Keep in mind that my shop is a small business, and I do not have resources to manage a complicated system. I need something that is fairly easy to implement, use, and manage. I have heard of online, cloud, as-a-service platforms that do not require local hardware. I think that this type of setup would be most useful to me, but I have no idea what type of software I should use to support my business.

Overview

The final project for this course is the creation of a research paper based on Internship Activities from the text.

The final paper should demonstrate an understanding of the materials in this course, as well as the implications of new knowledge gained.The 3-4-page paper should integrate new learning into thetarget company example and internship work.It may include explanations and examples from previous cases and activities.

The purpose of the final paper is for you to synthesize the learning achieved in this course by describing your understanding and application of knowledge in the area of business systems and the critical thinking process that has evolved.For this assignment you should choose any two of the concepts discussed throughout the course and integrate your research onthese concepts into your case proposal for thetarget company.

The project is divided into two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Four and Six.The final submission will occur inModule Seven.

Prompt

In this final case study, you will synthesize the concepts learned throughout the coursebased on a series of Internship Activities that are thefirst two milestones.Through the two assignments outlined in Milestones One and Two, you will recommend solutions to Harrison Kirby, while also incorporating additional perspectives and source material to analyze real world scenarios and provide him with options to consider as part of his strategy to increase revenue and influence customer interactions and experiences in his small business. You will leverage both the textbook and external sources to complete the final project.

From the milestone assignments, you will find that Kirby is interested in improving his business through the use of technology.As you learned in the first two cases you worked for Kirby, he isfocused on revenue through e-commerce and customer experience through intelligent systems incorporated with his web presence. Take the opportunity to provide Kirby with some other technology opportunities to consider that would support his business venture in e-commerce and intelligent systems. Within your final paper, choose two of the concepts below drawn from course readings.Provide detail and an explanation for each concept, which will demonstrate how each can be leveraged to support business growth and/or create a streamlined operation for Kirby. Make sure to leverage sound examples, products, and references where appropriate to further substantiate your findings.

Course Concepts:

• Big data andknowledge management
• Wireless, mobile computing, and mobile commerce
• Social computing
• Cloud computing
• Business analytics and business intelligence solutions

Your final product should answer this question: How will technology position Harrison Kirby's business for future growth and forthe enhancement of both customer alignment and efficiency?

Specifically, the following critical elements must be addressed:

1. Case Synthesis

a) What is the purpose in Harrison Kirby asking you to collect this data and how will it impact his business?Start the assignment with 2-3 paragraphs providing adescription of Kirby's business and the industry in which he operates.In this type of contemporary business organization, what is the central role that IT is playing for Harrison Kirby?

b) Find a complementary or competing company in the same industry as Mr. Kirby's.Take time to research the company and provide supported evidence to communicate how IT may be playing a strategic role for that company in order to maintain or gain a competitive advantage.

2. Security and Ethics

a) What are the security or control issues that should be addressed as part of the technology selection process for Kirby's business?

b) Propose how you would address ethics or information security issues as part of the technology selection process for Kirby's business.

3. Findings and Recommendations

a) As the technical liaison for Kirby, you are providing him with critical information that he will use in making decisions on expanding the use of technology to improve his practice.It is important that you write your response with conviction through well-developed recommendations based on sound reasoning and evidence.

b) Include an embedded Excel objectinyour final Word document submission that includes a matrix of technical options that Kirby should consider in his decision making process.The Excel file should include the columns below in an example based on cloud computing.Make sure that you communicate to Mr. Kirby the challenges he should expect to face when introducing new technology into his business.

Technology Concept

Product/Service Name

Product/Service Name

Solution Type

Solution Type

Solution Type

Cloud Computing

Amazon AWS

https://aws.amazon.com/

Storage - Amazon EBS

30GB Free

Business continuity
Due to the sensitive nature of transaction and customer data for Kirby, he should consider a backup/storage solution where he can quickly recover from a potential catastrophe and retain customers to minimize loss and get back to business quickly.

 

c) Comment and provide examples of how Mr. Kirby can use this new technology to make better management decisions for his business in the future.

Articulation of Response

• Always include a title page with your name, the date, the course name/number, the title of the assignment or paper, and the revision (if applicable).

• In the body of the paper, use headings and sub-headings. Do not jump from subject to subject without providing some type of heading beforehand.

• Use correct grammar and punctuation. Capitalize the first word of a sentence.

• Make the presentation as professional as possible. Think, "If someone were to look at this paper, what would they think?" Sloppy papers may have correct answers, but they still leave an overall "messy" feeling when read.

• Make sure you understand how to cite reference material within the text of your submission (e.g.,according to John, "citing in text is a key concept in this course"[Doe, 2013]).

Reference no: EM131114104

Questions Cloud

Explain advantages of promoting social tolerance : Using a child development theory of your choice, explain the advantages and disadvantages of promoting social tolerance among children under the age of 10.
Determining the company stock today : Schiiller Corp will pay a $2.94 per share dividend next year, The company pledges to increase its dividend by 4.5 percent per year, indefinitely, If you require a return of 12 percent on your investment, how much will you pay for the company's sto..
Question regarding the value of the bond today : Two years ago, you bought a fifteen year bond at its face value of $1,000. The coupon rate on this bond is 9%, payable annually. Today (just after receiving the second annual coupon payment), the current yield on the bond is 7.5%. What is the valu..
What is the npv of the project : What is the NPV of the project? Round your answer to the nearest cent. What is the NPV of the project? Round your answer to the nearest cent.
What are the security issues that should be addressed : What are the security or control issues that should be addressed as part of the technology selection process for Kirby's business? Propose how you would address ethics or information security issues as part of the technology selection process..
Propose an alternate way of doing research : Can you propose an alternate way of doing research on willing human subjects which would protect the dignity of the individually and at the same time yield the necessary information we need to advance medical science?
Component cost of debt : The firm recently paid a dividend of $2 per share on its common stock, and investors expect the dividend to grow indefinitely at a constant rate of 10 percent per year.  Assume the firm has sufficient retained earnings to fund the equity portion o..
Determination of the appropriate crime prevention strategy : A determination of the appropriate crime prevention strategy for the jurisdiction based on this analysis. A review of academic literature and studies on the various crime prevention programs to address the needs of the community
Compute cost of goods sold assuming periodic inventory : Compute cost of goods sold assuming periodic inventory procedures and inventory priced at FIFO.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is cyber security and what are some of its key concept

What is cyber security, and what are some of its key concepts? What are the most significant threats to your data, and what are some of the root causes of those threats

  Question about program consistency

Please provide an example of a event where consistency has caused too many problems? Is there a program you have used in your own work environment where consistency has caused problems?

  When deciding on the proper architecture to run an

the data that organizations gather about their users can vary between strictly commercial information what books did

  Major information security threats

Assignment: Write a 3-to 4-page paper on at least three major information security threats that a specific organization you choose faces today

  Explain prudent policy to protect datafrom corruption-theft

The opposing require to protect this data (from corruption and theft) which typically means controlling access to much/all of the data? What policy is prudent here?

  Personal and business-related cybersecurity scenarios

Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios - Describe the mission of each, and examine and compare details of each stated privacy policy.

  Primary steps to database design

We explored the 2-primary steps to database design - conceptual design and physical design. We discussed importance of having representatives from all key stakeholders in conceptual design to ensure accuracy of the design.

  Define end-user access controls

Use the Web to conduct research on User Domain Security Policy and Access Management. Write a report which describes and differentiates the following: End-User Access Controls, Administrator Access Controls

  Define security technique that aims to expose flaws

Fuzzing" is a security technique that aims to expose flaws in error handling by providing invalid, random, or unexpected data as inputs to computer systems. Here "system" is used generically, and should be read as "function call, program, or shell..

  Nowadays the internet has been very broadly used as a means

nowadays the internet has been very widely used as a means of receiving and processing lots of information which are

  Security threats to mobile devices and counter measures

Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarify vague areas and research questions.

  Relationship between infrastructure and security

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company. Present the rationale for the logical and physical topographical layout of the planned network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd