You are the cio of a successful accounting firm with

Assignment Help Computer Engineering
Reference no: EM13380152

You are the CIO of a successful accounting firm with offices in cities across the nation.  You recently attended a technology seminar on BYOD (Bring Your Own Device).   It occurred to you that this would offer potential benefits to your organisation and would be well-received by staff.

At the seminar you learnt there were many issues to consider, policies to be developed or modified, and new investments to be made to manage a BYOD environment. These included upgrading your ICT Data Security System to accommodate BYOD to protect clients' and your firm's data; this needs to synchronise and ensure the integrity of data on servers and end-user devices.

You plan to present your vision for BYOD to your CEO, Board and executives. You are required to research the background for a project to implement and manage BYOD, use Microsoft Excel to model a business plan, perform sensitivity analysis to validate assumptions, and create a presentation to seek funding and authorisation from senior management to implement and manage BYOD.

As Board members and executives are dispersed across the nation you plan to use YouTube for your presentation.

Activity A: Journal

Prepare a journal which records your activities and progress related to completing this assignment. In date order, clearly list the following:

? Date of research activity/discussion

? Topic researched or discussed

? Time duration

? Brief description of research activity/discussion.

Submit this journal as a separate report. Your journal must provide all these activity details to be awarded marks.

A sample of the journal will be provided in the StudyDesk.

Activity B: Presentation to Senior Management

NOTE: If you are unfamiliar with the business caseand sensitivity analysis concepts you should make an effort to read appropriate material, including those from the Internet, to learn about them.

Before you commence this assignment ensure you have completed Hands-on MIS Project # 1 to 5 in Appendix S.1 in the Study Book.  These exercises are designed to familiarise you with the software, techniques and methods used inthe assignment.

 Part 1: Researchthe background for the BYOD project

Conduct an Internet search to gather relevant background information of BYOD.   In particular, you should address the following:

1. How BYOD is utilised and its associated risks

2. Experiences of other companies

3. Advantages and disadvantages

4. The infrastructure required, and

5. Best-practice for how BYOD should be managed.

Part 2: Develop the Excel model of the business case

Once you have completed Part 1, develop a spread-sheet model of your business costs. Some of the materials provided in the MIS Projects may help you to come up with a simple modelling. For the purpose of modelling, assume a discount rateof 10 percent. Your business model should include the following analysis to ascertain the financial viability of the project:

1. Payback period

2. Net present value (NPV)

3. Internal rate of return (IRR), and

4. Profitability index

 HINTS: To obtain the payback period you would first need to calculate the cumulative net cash flow.  Use the NPV and IRR functions provided in Microsoft Excel. You may need to search the Internet for information if you are not familiar with how to use these functions.

Interpret your results.  Use the note in MIS Project #4 - Capital Budgeting Methods for Information System Investmentsto guide you.

 Part 3: Perform a sensitivity analysis for the business case

Using theresults you obtained inPart 2 as the base case, conduct a sensitivity analysis to examine the impact of the criticalcost and benefit variableson the viability of theBYOD project. Provide three specific scenarios of consideration. You must clearly specify the basis of the three scenarios i.e. which critical cost variables they are examining in the sensitivity analysis

Carefully analyse your results and make appropriate recommendations to the company's senior management as to how the critical cost variables should be managed to ensure that the BYOD project is both viable and sustainable in the long term.

Part 4: Create apresentation to senior management

4.1 Consolidate and cross-analyse your results and findings from Part 1, 2 and 3.  Then prepare a presentation to the company's senior management to seek their financial support and authorisation to embark on the project.

All projects must submit a recorded audio/visual Presentation of their project. Examples for type of presentation:

1. MP4 video of live or Skype presentation or

2. MP4 video ofPowerPoint presentation or

3. Powerpoint presentation.

YouTube is the preferred mode for submission; if you are in a country that does not have access to YouTube or there are other issues preventing you from posting to YouTube then you must submit a PowerPoint presentation with embedded autoplaying audio through EASE.

If you do not wish for your video in YouTube to be publically available then you may use options of YouTube such as having your video in a closed group. You are responsible for ensuring the link to your YouTube video will work for the person marking your assignment - you should ask someone to test it.

As a guide, if using PowerPoint your presentation should comprise no more than 15 slides, should be developed and structured according to the following:

  • The presentation should be made up of :

­   An introduction: your FIRST slide should show the title of your presentation and details of the author(s); the SECOND slide should provide the agenda i.e. outline ofyour presentation; the THIRD slide should clearly state the purpose of your presentation and what you want to achieve from it.

­   A body: contains the results and findings from Part 1, 2 and 3.

­   A conclusion: recapsthe main points andsummarises your recommendations.

­   Lessons learned: Two slides highlighting lessons learned from conducting this project.

  • The LAST slide should contain a "List of references". There should be at least 8 references (including those from Internet sources) and they should be listed according to the Harvard referencing convention as described in Chapter 2 (referencing) of the Communication Skills Handbook 3ed.
  • Insert Excel tables and charts and suitable graphicsat appropriate places in your presentation to reinforce your argument.
  • Search theInternet for information and guidance on how to produce an effective PowerPoint presentation, including the slide design and layout.
  • Ensure that your PowerPoint file does not exceed the specified size indicated in EASEotherwise you would not be able to upload your work.

Reference no: EM13380152

Questions Cloud

1 what is the output of the following c programsnbspinclude : 1. what is the output of the following c programs?nbspinclude ltiostreamgtusing namespace stdint mainnbspnbspnbsp cout
1a describe the high level steps involved for decryption : 1.a describe the high level steps involved for decryption using a feistel cipher.b modify the pseudo code provided in
Have to write a small program that prompts the user to : have to write a small program that prompts the user to enter a temperature in degrees fahrenheit and then prints a
What kind of measurement scales ratio interval etc : what kind of measurement scales ratio interval etc. characterizes the following software measuresi. number of lines of
You are the cio of a successful accounting firm with : you are the cio of a successful accounting firm with offices in cities across the nation.nbsp you recently attended a
Submit your programs by email the program should have as : submit your programs by email. the program should have as many comments as necessary. the top comments should explain
You must have at least these entities region factory : you must have at least these entities region factory employee department training class. you should use the attributes
Question 1a bubble sort in ascending order1 pseudo : question 1a bubble sort in ascending order.1. pseudo codefunction bubblesortimport array export arrayfor pass not 0 to
Question 1you are required to create a detailed analysis : question 1you are required to create a detailed analysis for each of the following array-based sorting algorithmsa

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain the gui and command line utilities

throughout Phase One of this project, your job is to set up the Windows Server 2003 and train two of the management staff on its operation.

  Give the trade-off between the two technologies

Cite two examples of a circuit switch and packet switch environment. Base one instance on a circuit switch and the other on a packet switch. Describe the trade-off between the two technologies and the reason why packet switching is more appropriat..

  Contain what database applications are used

Analyzing the usage of databases in your organization. contain what database applications are used We use Oracle. Conclude by proposing improvements. For large organizations, restrict the scope of the paper to the department in which you work. I w..

  Work out the matrix dimension n automatically

Write down a C++ program that uses class Matrix for dealing with the square matrices (n x n tables of integers). The class constructor has to create a dynamic nxn matrix for n passed as a parameter.

  Define how each type compromises a system

define how each type compromises a system. How can these different types of malware be stopped.

  Why computer''s activities is handling failure

why computer's activities is handling failure.

  Question 1 consider the functions f g and h all defined on

question 1 consider the functions f g and h all defined on the set 0 1 2 3 ... 12i write down the values of ghf8 and

  Sql query to determine lowest, highest, average salary

Let's assume that we wanted to determine the lowest, highest, average and total number of the salaries by department in company. What SQL query would provide us this.

  Imagine you are an experienced dos programmer

suppose you are an experienced DOS programmer and you want to write UNIX shell scripts using DOS commands

  Draw the binary tree that allocations create

Listing the nodes in the order of their visit for an LNR (inorder) scan.

  Launching the radical innovation

Assume you wish to launch the radical innovation. You have the working prototype and have begun to test the early adopter market.

  Write down a statement to create a view

Write down a satement to add a check constraint to the above defined table that guarantees that values entered in the inspection small date field are not older than today, meaning from now on. According to new requirements from your business analys..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd