What must be done to protect the system

Assignment Help Management Information Sys
Reference no: EM131726959

Question:

Imagine that you are a security professional who has been assigned to a Joint Application Development (JAD) team responsible for developing the business requirements for a new Customer Relationship Management (CRM) information system.

You are preparing some notes for the JAD meeting. You know that CRMs can be useful for improving how customers interact with businesses, but CRMs can also be used to collect massive amounts of customer information that may be personal identification information. You want to ensure that the JAD team understands that system requirements drive how the information system and its information must be protected.

Write a 700- to 1,050-word paper explaining to the JAD team how business requirements affect how the system will be used.

Identify two internal threats and two external threats to the new CRM and what must be done to protect the system.

Format your assignment consistent with APA guidelines.

Verified Expert

The work is in 750 words where the focus is on how the jad development works with the customer relation management. The standards are set with properly managing the crm and the threats related to the JAD

Reference no: EM131726959

Questions Cloud

Create a mission and vision statement for your organization : Create a mission and vision statement for your organization. Determine three specific strategic goals that align with the ideals in those two statements.
American entrepreneurs have in the global marketplace : What are multiple specific advantages and disadvantages that American entrepreneurs have in the global marketplace?
Cultural understanding in global business : When East and West Meet: An Essay on the importance of cultural understanding in global Business Patrice and Education
Discuss heard in federal court as opposed to state court : Do you think we need both federal and state courts. What is the difference between the two
What must be done to protect the system : Identify two internal threats and two external threats to the new CRM and what must be done to protect the system - usiness requirements for a new Customer
Define and apply legal terminology to employment issues : Define and apply legal terminology to employment issues. Analyze legal cases and legal concepts in written and oral presentations.
Linear regression and anova models : Demonstrate what Microsoft® Excel® statistical tools are needed to produce a linear regression and ANOVA models?
Type of facilitating agency in market channels : Why do you think 3PLs have e become such an important type of facilitating agency in market channels? Do you expect this trend to continue?
Prepare an income statement for a segment : Prepare an income statement for a segment using the contribution margin format; determine effect of elimination of segment on company income

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd