DQ1 michael

 

reply to the students’ response and not the question  in 150 words minimum and provide 1 reference. Respond to the students response as though you are talking to them, use name 

question

     What is learning? How do you best learn? Websites that contain scientific instruments are preferred. 

Student response

 

Learning is commonly defined as a behavioral change in a person; it can be determined by assessing the behavioral change or an altered behavioral outcome of a situation or incident (Andrew B. Barron, 2015). When a person faces or encounters a condition that causes a change in their behavior or thought process, this is considered learning. Learning can take place informal settings such as a classroom or a job office or through informal means such as being taught by a colleague at work or informal group setting. In a business setting, the goal of learning is for employees to master the knowledge, skills, and behaviors emphasized in human resource development programs and to apply them to their day-to-day activities (Kumpikaite, 2008). People learn and process information through different ways, such as visually, which is seeing the material in a book or on a class board.  The next style is an auditory learner, this is when a person learns through hearing the information being spoken, the following type is kinesthetic learning this is a hands-on approach when the student is physically manipulating an object such as building an engine or baking a cake they learning by doing the steps to accomplish the process (Anumeha Bhagat, 2015). According to Bhagat, the best style of learning is to avoid depending on a single style; additionally, studies have also shown that the most effective learners can adapt to the style which the learning situation requires (Anumeha Bhagat, 2015). 

My learning style is a combination of visual and kinesthetic; when I can read the information or see what the task is that I am supposed to be doing along with being able to put my hands on or work through the problem, the information for myself is retained better. 

Respectfully,

Michael

 References:

Andrew B. Barron, E. A. (2015). Embracing multiple definitions of learning. Papers in the Biological Sciences.

Anumeha Bhagat, R. V. (2015). Students awareness of learning styles and their perceptions to a mixed method approach for learning. US National Library of Medicine National Institutes of Health.

Kumpikaite, V. (2008). Human resource development in learning organization. Journal of Business Economics and Management.

plus size evening dresses

When we leave our university, the students will take some photos to leave the good memory, it is also a pretty scenery, then next we will have a brief description about the university graduation dresses.

The graduation dresses are becoming very popular in the European, at first the students who pass the exam would wear the evening dresses uk, they could wear the dresses like this to attend the graduation party, this is the ceremony at that time, then if you want to get more knowledge about other, you could pass the exam step by step.

At first time, people would wear the long grown to attend the plus size evening dresses, then at times, it will be very cold, they could wear the long dresses, and dress is the same as the missionaries, colors are brown and black, so the next graduation dresses are like that, when we are going to leave the university, we could wear the evening wear, in some big ceremony, we have to wear the graduation dresses.

Next the colors are becoming more and more, there is not only the black and gray, the different level will have different graduation dresses, at that time, the styles of dresses are becoming more and more, headscarves and robes are separated, it is no longer attached to the wear on the head, it has become a single decoration, some times later, the hat is popular, people put the scarf as a shawl from back to droop, by this time had bachelor’s hat, round and square, or there are decorated on the middle of the hat, hat with tassel, now appears more delicate.

With the development of society, our beauty has changed, the semi formal dresses have also changed with the development of society, from the fabric and colors, we could feel that the style of the graduation dresses are becoming more and more, the shape of the hat is changing, some people have suggested to the shape of the hat to make the shape of a book, so more symbolic, scroll breath.

Network Security Plan document shell

 

Note: The selected organization must have a need for network security as part of its operations. Therefore, you may feel free to identify a hypothetical organization that meets the requirements. Any necessary assumptions may be made to fulfill the requirements of the organization selection.

 

The project deliverables are the following:

Submission of the proposed organization to the instructor for approval

Network Security Plan document shell

Use Word

Title Page

Course number and name

Project name

Student name

Date

Table of Contents (TOC)

Auto generated TOC

Separate page

Maximum of 3 levels deep

Before submitting your project, update the fields of the TOC so it is up-to-date.

Section Headings (Create each heading on a new page with TBD as the content, except for sections listed under New Content).

Project Outline

Overview of Network and Existing Security

Provide an overview of the existing network architecture, including the following:

·         Description of the network

·         The topology

·         Protocols allowed

·         Connectivity methods

·         Network equipment

·         Number of routers, switches, and any other network equipment, such as VPN concentrators, proxies, etc.

·         A summary of the current security devices in use on the network

Risk Assessment Section

Conduct an inventory of devices within the chosen organization’s network using appropriate tools.

Provide a summary of the number of desktops, laptops, network printers, and servers.

·         Identify key assets.

·         Assets also include records and sensitive information that requires special protection.

Prioritize each asset or group of assets, and assign a value to each.

Create a subsection that will identify and describe the risks within the environment.

·         Do not forget natural disasters.

·         Include the likelihood that the risk could occur.

Security Architecture Plan

Identify and select appropriate technologies to protect against the risks that were identified, and provide an explanation as to why the technology was chosen.

Describe where you plan to place these technologies within the network and why.

·         The plan should cover all layers of the OSI model.

Identify additional software that will be required to monitor the network and protect key assets.

Identify any security controls that need to be implemented to assist in mitigating risks.

Mitigate all of the risks that were identified during the assessment phase.

Security Policies

·         Identify what written polices need to be created for your organization.

·         For each policy, you will address how you plan to monitor the policy.

·         For each policy, you will provide what you feel the appropriate punishment should be for violators. These punishments must be able to be enforceable, not just a threat.

·         For each policy, you will identify a timetable for when each policy should be reviewed and updated and who will do the review.

·         The second task this week is to prepare for how you would handle an incident. It is best to have a thorough, rehearsed plan to be prepared for a potential incident. This will help to limit the damage and it will help recovery afterward. You will create an Incident Response section of 2–3 pages that includes the actions that need to occur when an incident is in progress.

The following are the second task’s deliverables:

Incident Response Section

Identify the process of how your organization will identify an incident.

Identify the process for classifying the incident.

·         What are the criteria for each classification within the organization?

Identify what the response will be for each classification identified.

Identify a general plan to recover from the incident.

Identify a process for evaluating the incident response plan after each incident has been mitigated.

Implementation Plan

·         Develop a plan to implement the security controls and policies that you identified in previous sections.

·         Develop a plan to implement new security devices and modify existing security devices that are required to monitor the network and the polices that were created or updated.

·         Describe how these controls, policies, and security devices have addressed the key security areas of confidentiality, integrity, authentication, authorization, and nonrepudiation cryptographic services.

Network Security Plan

·         Revise the entire document, and make any necessary changes and improvements.

·         Ensure that the final version is sufficiently detailed to allow the organization to confidently move forward with the implementation of the security controls and devices based upon your recommendations.

·         Previous instructor feedback should be addressed with appropriate changes.

Network Security Plan

 

This course has been composed of a series of Individual Project assignments that have contributed to a Key Assignment submission at the end of the course. Each week, you have completed a part of a network security plan. The full Key Assignment should include the following tasks:

 

Overview of Network and Existing Security

Select an organization as the target for the analysis.

Provide an overview of the organization’s existing network architecture.

The overview will include description of the network, the topology, protocols allowed, connectivity methods and network equipment, number of routers, switches, and any other network equipment, such as VPN concentrators, proxies, etc.

Provide a summary of the current security devices currently in use on the network.

List the type of device, the vendor, and give a brief description of how the device is used.

Risk Assessment

Conduct an inventory of the devices within your network. Provide a summary of the number of desktops, laptops, network printers, and servers.

Identify key assets

Assets also include records and sensitive information that requires special protection.

Prioritize each asset or group of assets, and assign a value to each.

Identify and describe the risks within your environment.

Do not forget natural disasters.

Determine the likelihood that the risk could occur.

Identify the tools and methodology that you would use to conduct the risk assessment.

Security Architecture Plan

Based upon the risk assessment and your analysis, create an action plan to mitigate the risks that you have identified.

Identify and select appropriate technologies to protect the network and the organization’s information, and explain why you chose each technology.

Describe where you plan to place these technologies in the network, and explain why.

The plan should cover all layers of the OSI model.

Identify additional software that will be required to monitor the network and protect key assets.

Identify security controls that need to be implemented to assist in mitigating risks.

Security Policies

Create the Key Assignment first draft for peer review.

Continue the development of the plan.

Create a fourth section in the plan to list all of the policies you would have for your organization and a brief description of what each policy will contain.

Each policy will address how you plan to monitor the policy and what the appropriate punishments should be for violators.

Provide a timetable for when these policies should be reviewed and updated.

Continue development of the Network Security Plan with an Incident Response Plan of 2–3 pages.

Include the actions that need to occur when an incident is in progress.

Include how your organization will identify and classify incidents, what the response will be, and the plan to recover.

Implementation and Incident Response

Analyze previous submissions, and make changes as necessary to the final paper.

Submit a detailed implementation plan of 4–5 pages that will describe your proposed solution for the implementation of the Network Security Plan for the organization.

This is the last and final section of the Key Assignment and should bring together all aspects of the implementation in one cohesive paper.

Revise the previous sections so that the entire plan flows and has a strong introduction and conclusion.

 

 

Assignment 4::Project Deliverable 4: Analytics, Interfaces, and Cloud Technology

 

Project Deliverable 4: Analytics, Interfaces, and Cloud Technology

This assignment consists of two (2) sections: a design document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Large companies have been using the power of business analytics for quite a while now. Your company desires to get in on the action; company executives believe that using advanced data analysis will enable the company to make smarter decisions and improve business performance. Business analytics gives companies the ability to look at past realizations and performance as well as set up new expectations and performance goals. Analytics-as-a-Service is a new delivery model that uses cloud technology to provide business insights without enormous infrastructure enhancements. The executive team has heard great things about analytics and cloud technology but is apprehensive because they are unfamiliar with the look and feel of the technology. The executive team is interested in your recommendations and eagerly awaiting your forward-thinking viewpoint. 

Section 1: Design Document

1.     Write a four to six (4-6) page design document in which you:      

 

·         Support the need for the use of analytics and cloud technology within this company.

·         Create a workflow diagram to illustrate how analytics and cloud technology could align with the company’s business processes. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.

·         Create three to five (3-5) screen layouts that illustrate the interface that organizational users will utilize. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.

·         Give one (1) recommendation for solution providers that could help your company secure a firm advantage by using analytics and cloud technology. 

Your assignment must follow these formatting requirements:

·         Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

·         Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

·         Include charts or diagrams created in MS Visio or Dia as an appendix of the design document. All references to these diagrams must be included in the body of the design document.

Term Paper 10-15 pages

Term Paper: Mobile Computing and Social Networks
Due Week 10 and worth 200 points
There are thousands of iPhone Apps, iPad Apps, and Android Apps that have been developed to perform a myriad of tasks and processes. Initially, most of these applications were games intended to be played on mobile devices. The popularity of these applications led businesses to ponder whether some of their business process applications that run on desktop platforms and the Web could be redesigned to run on mobile devices. The answer was a resounding yes! For example, Nationwide developed the Nationwide® Mobile, a free iPhone App that allows its insurance policyholders to file a claim on the spot when an accident occurs. The application can snap pictures of the accident and attach them to the claim data and upload the claim information to a server. This reduces the length of time to process a claim filed this way. Nationwide competitors have followed suit and developed iPhone, iPad, and Android applications of their own. Policyholders can receive messages via Facebook or Twitter. Other business processes that have been reengineered as a result of mobile computing include Quick Response (QR) codes which have replaced one-dimensional bar codes. They are read using mobile devices, accepting credit card payments from an iPhone, iPad or Android device, depositing checks using an iPhone without visiting a bank, and many more. Write a ten to fifteen (10-15) page term paper in which you:

  • Assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system.
  • Evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications.
  • Examine the challenges of developing applications that run on mobile devices because of the small screen size.
  • Describe the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android.
  • Mobile applications require high availability because end users need to have continuous access to IT and IS systems.
  • Discuss ways of providing high availability.
  • Mobile devices are subjected to hacking at a higher rate than non-mobile devices. Discuss methods of making mobile devices more secure.
  • Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Explain how the components of an information technology system interrelate in an organizational context.
  • Describe the use of network management, Web, wireless, and mobility technologies.
  • Describe and identify the uses of business process management and systems development.
  • Use technology and information resources to research issues in information systems and technology.
  • Write clearly and concisely about topics related to information systems for decision making using proper writing mechanics and technical style conventions.

ISFM-300 Case Study, Stage 2: Business Process Analysis and Functional Requirements

Overview of Business Process Analysis and Functional Requirements for UMUC Haircuts

For your Case Study Stage 1 assignment, you performed a Five Forces Analysis and justified Myra’s chosen strategy for competitive advantage and the business process that she would like to improve through the application of technology.

In the Stage 2 assignment, you will identify the inputs, processing, and outputs of Myra’s selected business process.  Those inputs, processing, and outputs form the functional (business) requirements for an IT system to improve the process. 

The first step in identifying the functional or business requirements for an information system is to develop the high level requirements that establish the scope of the system.  Myra has selected the Customer and Employee Scheduling Process for improvement using an IT solution, and together you have identified the following high level requirements.  The system must:

·         Allow employees to enter their availability and desired days/times to work

·         Allow Myra to review the employee requests and develop a schedule

·         Make the schedule available to employees to review their final work schedule

·         Make the employee schedule available for staff to enter customer appointments

·         Allow Myra and the staff to enter customer appointments

·         Keep track of customer appointments, including stylist and service performed

·         Accommodate changes in the employee schedules and customer appointments, and update the schedule accordingly

·         Accommodate changes in the customer information stored in the system

·         Provide management reports to Myra showing employee workload, customers served, customer contact information, busy times/days, etc.

For this assignment, you will focus on the customer appointment portion of the overall process. The high level requirements are not detailed enough to be used as the functional or business requirements.  More detailed requirements are developed using a variety of tools and methods.  One such tool is a process model.  The process model shows the steps in the customer appointment process.  In a process model, rectangles are used to illustrate process steps and diamonds are used where decisions, or choices, are made.  You need to be aware that there are other aspects of the process to be considered, as shown in the high level requirements above.  The points at which these additional steps intersect with the customer appointment process are shown in the process model with a circle.

Customer Appointment Process Model:  The Customer Appointment Process model is separately provided as an Excel file, labeled “Stage 2 Customer Appointment Process Model.”

Assignment: UMUC Haircuts Stage 2:  Using the Customer Appointment Process Model, create a document that includes:

I.            Introduction

At the top of your paper, show the strategy for competitive advantage that Myra selected and the business process she has chosen to improve, using the following format (no additional explanation is required):

Generic Strategy for Competitive Advantage:    xxxxxxx (just name the strategy)

Business Process to Be Improved:    xxxxxxxxx (just name the process)

II.          Table of Functional (Business) Requirements

Copy the table below into your paper.  Using the Customer Appointment Process Model provided complete the table of requirements for an IT system, for each of the numbered process steps, that includes:

·         the inputs to the process – include specific items of information or data elements (for example, customer name) entered into the system as part of the process step

·         processing or actions that the system takes (for example, check calendar to let person know if UMUC Haircuts is open at the specified time)

·         outputs of the process – include specific items of information or data elements (for example, appointment date) that the system will display or print out for the user to see

Note:  This is not about what the employee or customer is doing but specifically about data into the system (input), the system does something with that data (process) to deliver the end result (output)

There are 7 numbered steps in the Appointment Process itself.  In addition, there are two other processes that are needed (numbered 8 and 9), but are beyond the scope of the appointment process:  a process for entering the time needed and costs for the various styling services – here you’re building a database or table for reference in future transactions; and the payment process that collects customer payments and updates the database accordingly.  For these two processes, you should also identify the input needed for the system, what the system is to do with that input (process) and what output the system will need to create or display either immediately or later.

The responses that you enter into the table for each requirement must be aligned to the specific business process to be improved and the data it uses, and it must be appropriate to the UMUC Haircuts business.

Note:  Processes are actions that the system will take and should include action verbs.  Inputs and outputs are not actions, but are data or information.  If you need to use action words (verbs) to describe the input or output, they should be kept to a minimum and put in parentheses.

 

 

Table of Functional (Business) Requirements

Steps in the Appointment Process

 

Process Step

Step from Customer Appointment Process Model

(insert information from numbered step

Input

Information/data item(s) entered into the system as part of this step

Process

Processing oraction the system must perform for this step

Output

Information/data item(s)/record created, or displayed, or printed out for the user in this step

1

 

 

 

 

2

 

 

 

 

3

 

 

 

 

4

 

 

 

 

5

 

 

 

 

6

 

 

 

 

7

 

 

 

 

8

 

 

 

 

9

 

 

 

 

 

EXAMPLE Using the Employee Scheduling Process

The example below demonstrates what is required for the assignment, using the Employee Scheduling Process, which is shown in a circle in the Customer Appointment Process Model.  The process model for this example is separately provided as an Excel file named “Stage 2 Example – Scheduling Process Model.”  The entries in the table correspond with the numbered process steps in the model.

Table of Functional (Business) Requirements

Steps in the Employee Scheduling Process

 

Process Step

Step from Customer Appointment Process Model

(insert information from numbered step

Input

Information/data item(s) entered into the system as part of this step

Process

Processing oraction the system must perform for this step

Output

Information/ data item(s)/record created, or displayed, or printed out for the user in this step

1

Employee logs into the System

 

User ID and password

Verify user id and password against security database

“Welcome” screen or “Invalid User ID and Password” message

2

Employee reviews customer appointments

 

Employee name, dates

Locate and present appointment dates for the employee

Appointment dates for employee

3

Employee enter dates/times available for work

 

Dates and times available for work (employee name entered in step 2)

Record dates and times employee is available for work

Confirmation that dates and times have been saved

Formatting:  

For academic writing, the writer is expected to write in the third person. In third person, the writer avoids the pronouns I, we, my, and our. The third person is used to make the writing more objective by taking the individual, the “self,” out of the writing. This method is very helpful for academic writing, a form in which facts, not opinion, drive the tone of the text. Writing in the third person allows the writer to come across as unbiased and thus more informed.

 

DQ2-2 larnell

 

reply to the students’ response and not the question  in 150 words minimum and provide 1 reference. Respond to the students response as though you are talking to them, use name 

question

      Pick one of Bob Pike’s Laws and comment on it (research his website). . 

Student response

 

One of the major laws of learning by Bob Pike is that learning does not occur unless behavior changes. This is based on the definition of learning by Taylor and Hamdy (2013) that learning is about acquiring new knowledge and skills that will impact one’s behavior. It is therefore notable that the effectiveness of training is based on what the trainees do with what they have learned. As explained by Young (2012), the training will not be successful if the learners do not change their behavior based on the acquired knowledge. For instance, when training employees to change their working styles, the training program would be effective only if they leave their old ways and adapt their new working strategies. It will be a waste of time if employees use the learned skills only during the training program and get back to their old ways immediately after the training.

            As noted by Taylor and Hamdy (2013), for learning to occur, skill practice is very important during training sessions. If the trainers are expected to do things differently, they should be provided with many opportunities so as to be comfortable when accepting new knowledge in a non-threatening environment. This is an indication that learners should have successful experiences to use techniques and information learned in class so as to increase the probability of applying them on the job. With adequate practice, the newly learned knowledge becomes the norm. Additionally, when provided with practical experiences, learners will understand how to apply the learned knowledge and skills in their jobs and thus would be encouraged to use them to improve their efficiency and effectiveness (Stahl & Davis, 2011). This way, learning will have occurred because it would be clear that it has impacted behavior. When training employees, learning will occur if what they are taught is applied in their jobs.     

References

Stahl, S. M., & Davis, R. L. (2011). Best practice in medical teaching. Cambridge: Cambridge University Press.

Taylor, D. C. M., & Hamdy, H. (2013). Adult learning theories: Implications for learning and teaching in medical education: AMEE Guide No. 83. Medical Teacher, 35(11), e1561-e1572.

Young, E. B. (2012). Positioning in the context of adult learning and participation: An interpretive biographical study. SAGE Open, 1, 1-13.

ISFM-300 Case Study, Stage 3 IT Requirements

Before you begin this assignment, be sure you:

1.    Have completed all previously assigned readings, particularly those assigned in Weeks 3 and 4 of the class.

2.    Re-read the “UMUC Haircuts Case Study” and the Stage 1 & 2 assignments, and review the “Walmart Example.”

3.    Review Instructor feedback from previous assignment submissions.

Text Box: Purpose of this Assignment  This assignment gives you the opportunity to apply your knowledge of the course concepts to develop IT requirements for a technology solution. This assignment specifically addresses the following course outcomes to enable you to:  • analyze internal and external business processes to identify information systems requirements  • identify and plan IT solutions that meet business objectives 

 

 

 

 

 

 

Overview of IT Requirements for a System to Improve the Process at UMUC Haircuts

For your Case Study Stage 1 assignment, you performed a Five Forces Analysis and justified Myra’s chosen strategy for competitive advantage and the business process that she would like to improve through the application of technology.

For your Stage 2 assignment, you identified the inputs, processing, and outputs of Myra’s selected business process.  Those inputs, processing, and outputs form the functional (business) requirements for an IT system to improve the process. 

In Stage 3, you will define the IT requirements by evaluating their applicability and importance in a new system to be implemented to improve the identified business process for UMUC Haircuts.  The requirements that are identified as relevant to the business process will form the IT (technical) requirements for a system.  In evaluating and selecting an IT system, both the functional (business) requirements and the IT requirements need to be considered.  The areas that need to be considered in developing the IT requirements are listed below in the Table of IT Requirements.  Depending on the specific process being improved and the data it uses, the areas listed will vary in both relevance and importance.  For example, in a system to handle applications for Social Security, security and privacy are extremely important; but for a system to list what movies are being shown, privacy is not applicable at all. Your analysis must relate to the process Myra seeks to improve.  

When both the functional (business) and technical (IT) requirements are identified, the system requirements are complete enough that you can then begin looking for a specific solution to meet the needs of UMUC Haircuts.  Researching and finding an appropriate system to improve the process at UMUC Haircuts will be done in Stage 4.

Analysis of IT Requirements:

·         IT Requirement:  The areas to be considered are listed in the table.  Be sure to research each term to ensure understanding as to whether and how it would apply to the UMUC Haircuts process being improved and the data it uses.  A table of sources of the definitions of the requirements is provided below to assist you.  Be sure you use a definition that applies to IT and this assignment, and not a generic definition of the term.

·         Rankings: High/Medium/Low Importance or Relevance or Not Applicable (N/A):  You will rank each requirement as to how important or relevant it is to the process being improved and the data it uses.  Each will be ranked as High, Medium or Low, or Not Applicable to the process and its data.

·         Explanation of Ranking:  Using the definition of the term you researched and the ranking you selected, provide an explanation and tell how this requirement applies to the UMUC Haircuts process and the data it uses, or why it does not apply.  All requirements must be ranked and a thorough explanation that demonstrates understanding of the topic must be provided.  Please note that even N/A items require an explanation.  A minimum of three good sentences should be used for each explanation. 

The responses that you enter into the table for each requirement must be aligned to the specific business process to be improved and the data it uses, and must be appropriate to the UMUC Haircuts business.  Be sure to consider the type of data (inputs and outputs – from Stage 2) that the system will handle as you determine the applicability and importance of each consideration.  If a requirement is not relevant to the process, mark it “N/A.”  Remember to provide a thorough explanation for every item under consideration, including those marked N/A.

Do not try to create a reason if there is none, but carefully analyze each requirement and determine whether it applies and how.  Explanations must provide enough information to convey the reasoning behind the ranking and to demonstrate that you understand the requirement.  DO NOT copy definitions into the table; use your own words to explain the terms. 

 

Example:  If the process to be improved is the method for customers to use to pay for their haircuts or salon visits, then for the requirement of Usability, the following might be entered.  Note the thorough explanation of the ranking that demonstrates an understanding of usability.

Requirement

 

High/Medium/Low Importance or Relevance or Not Applicable (N/A)

Explanation for Ranking

Usability

High

Since the customers will use a system to make their payments, it must be easy to understand and easy to use.  It would be inappropriate to require any training for customers.  If it is too complicated, customers will not use it. In addition, front desk staff should be able to easily learn the system without extensive training.  That is an entry level job with frequent turnover.so having a system that is intuitive and easy to navigate is critical.

 

 

 

 

 

 

Course Resources (for Weeks 1-5)

Where to find the definitions of IT Requirements

 

Usability

System Quality Attributes  (Week3)

Maintainability

System Quality Attributes  (Week3)

Scalability 

System Quality Attributes  (Week3)

Reliability 

System Quality Attributes  (Week3)

Availability

System Quality Attributes  (Week3)

Performance

System Quality Attributes  (Week3)

Security

System Quality Attributes  (Week3)

Data Accuracy

Characteristics of Data Quality (Week 4)

Data Completeness

Characteristics of Data Quality (Week 4)

Authentication

Chapter 6 (Week 4)

Enterprise Systems (ERP, CRM, SCM) 

Chapter 3 (Week 3), various Week 5 readings

Networks

Chapter 5 (Week 3) 

Database

Chapter 4 (Week 4)

Data Warehouse

Chapter 4 (Week 4)

Data Mining

Chapter 4 (Week 4)

Business Intelligence

Chapter 4 (Week 4)

Decision Support System

Chapter 7 (Week 1)

Business-to-Business eCommerce

Various readings (Week 2)

Business-to-Consumer eCommerce

Various readings (Week 2)

 

Assignment: UMUC Haircuts Stage 3:  Create a document that includes:

I.             Introduction

At the top of your paper, show the generic strategy for competitive advantage that Myra selected and the business process she has chosen to improve (see the Stage 1 assignment), using the following format:

 

Generic Strategy for Competitive Advantage:    xxxxxxx (just name the strategy)

Business Process to Be Improved:    xxxxxxxxx (just name the process)

II.           Table of IT Requirements

·         Copy the table below into your paper.

·         Rank each requirement as High, Medium or Low in Importance/Relevance or Not Applicable (N/A) to a system to improve the process,

·         Explain each ranking, as described in the table, including explanations for N/A.

·         Definitions of the IT requirements are listed in Course Resources table above.

 

 

IT Requirement

 

Importance/
Relevance

High,
Medium,
Low, or

Not Applicable (N/A)

Explanation for Ranking

(Write a minimum of 3 good sentences for each; both the process to be improved and the case study should be mentioned in each explanation; the data used in the process should be included in the explanation where applicable.)

1

Usability

 

 

2

Maintainability

 

 

3

Scalability

 

 

4

Reliability/ Availability

 

 

5

Extensibility

 

 

6

Portability

 

 

7

Security

 

 

8

Data Accuracy

 

 

9

Data Completeness

 

 

10

Authentication

 

 

11

Enterprise Systems (ERP, CRM, SCM)

 

 

12

Networks

 

 

13

Database

 

 

14

Data Warehouse

 

 

15

Data Mining

 

 

16

Business Intelligence

 

 

17

Decision Support System

 

 

18

Business-to-Business eCommerce

 

 

19

Business-to-Consumer eCommerce

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Formatting: 

 

For academic writing, the writer is expected to write in the third person. In third person, the writer avoids the pronouns I, we, my, and our. The third person is used to make the writing more objective by taking the individual, the “self,” out of the writing. This method is very helpful for academic writing, a form in which facts, not opinion, drive the tone of the text. Writing in the third person allows the writer to come across as unbiased and thus more informed.

 

·         Submit one document that includes the Table of Requirements.

·         Table entries should be single spaced.

·         Use APA formatted citations and references for any external sources used.

·         Include a title page, and a reference page if references are included.

·         Compare your final work to the rubric to be sure you have met content and quality criteria. 

·         Submit your paper as a Word document, or a document that can be read in Word. 

·         Your submission should include your last name first  in the filename:     Lastname_firstname_Stage _3

Case Study for IST 7100

1.How effective is the partnership between IT and the business at Hefty Hardware? Identify the shortcomings of both IT and the business.

2. Create a written plan for how IT and the business can work collaboratively to deliver the Savvy Store program successfully.

Both answers to the questions should be well written and well thought out. This should be two- three well written paragraphs for each question. Please submit the aforementioned assignment as ONE document.To help keep the various reporting and relationship roles straight, I have attached the organization chart.  

[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves/> <w:TrackFormatting/> <w:PunctuationKerning/> <w:ValidateAgainstSchemas/> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF/> <w:LidThemeOther>EN-US</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables/> <w:SnapToGridInCell/> <w:WrapTextWithPunct/> <w:UseAsianBreakRules/> <w:DontGrowAutofit/> <w:SplitPgBreakAndParaMark/> <w:DontVertAlignCellWithSp/> <w:DontBreakConstrainedForcedTables/> <w:DontVertAlignInTxbx/> <w:Word11KerningPairs/> <w:CachedColBalance/> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> <m:mathPr> <m:mathFont m:val=”Cambria Math”/> <m:brkBin m:val=”before”/> <m:brkBinSub m:val=”--“/> <m:smallFrac m:val=”off”/> <m:dispDef/> <m:lMargin m:val=”0″/> <m:rMargin m:val=”0″/> <m:defJc m:val=”centerGroup”/> <m:wrapIndent m:val=”1440″/> <m:intLim m:val=”subSup”/> <m:naryLim m:val=”undOvr”/> </m:mathPr></w:WordDocument> </xml><![endif]

[if gte mso 9]><xml> <w:LatentStyles DefLockedState=”false” DefUnhideWhenUsed=”true” DefSemiHidden=”true” DefQFormat=”false” DefPriority=”99″ LatentStyleCount=”267″> <w:LsdException Locked=”false” Priority=”0″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Normal”/> <w:LsdException Locked=”false” Priority=”9″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”heading 1″/> <w:LsdException Locked=”false” Priority=”9″ QFormat=”true” Name=”heading 2″/> <w:LsdException Locked=”false” Priority=”9″ QFormat=”true” Name=”heading 3″/> <w:LsdException Locked=”false” Priority=”9″ QFormat=”true” Name=”heading 4″/> <w:LsdException Locked=”false” Priority=”9″ QFormat=”true” Name=”heading 5″/> <w:LsdException Locked=”false” Priority=”9″ QFormat=”true” Name=”heading 6″/> <w:LsdException Locked=”false” Priority=”9″ QFormat=”true” Name=”heading 7″/> <w:LsdException Locked=”false” Priority=”9″ QFormat=”true” Name=”heading 8″/> <w:LsdException Locked=”false” Priority=”9″ QFormat=”true” Name=”heading 9″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 1″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 2″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 3″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 4″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 5″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 6″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 7″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 8″/> <w:LsdException Locked=”false” Priority=”39″ Name=”toc 9″/> <w:LsdException Locked=”false” Priority=”35″ QFormat=”true” Name=”caption”/> <w:LsdException Locked=”false” Priority=”10″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Title”/> <w:LsdException Locked=”false” Priority=”1″ Name=”Default Paragraph Font”/> <w:LsdException Locked=”false” Priority=”11″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Subtitle”/> <w:LsdException Locked=”false” Priority=”22″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Strong”/> <w:LsdException Locked=”false” Priority=”20″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Emphasis”/> <w:LsdException Locked=”false” Priority=”59″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Table Grid”/> <w:LsdException Locked=”false” UnhideWhenUsed=”false” Name=”Placeholder Text”/> <w:LsdException Locked=”false” Priority=”1″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”No Spacing”/> <w:LsdException Locked=”false” Priority=”60″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Shading”/> <w:LsdException Locked=”false” Priority=”61″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light List”/> <w:LsdException Locked=”false” Priority=”62″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Grid”/> <w:LsdException Locked=”false” Priority=”63″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 1″/> <w:LsdException Locked=”false” Priority=”64″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 2″/> <w:LsdException Locked=”false” Priority=”65″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 1″/> <w:LsdException Locked=”false” Priority=”66″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 2″/> <w:LsdException Locked=”false” Priority=”67″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 1″/> <w:LsdException Locked=”false” Priority=”68″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 2″/> <w:LsdException Locked=”false” Priority=”69″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 3″/> <w:LsdException Locked=”false” Priority=”70″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Dark List”/> <w:LsdException Locked=”false” Priority=”71″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Shading”/> <w:LsdException Locked=”false” Priority=”72″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful List”/> <w:LsdException Locked=”false” Priority=”73″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Grid”/> <w:LsdException Locked=”false” Priority=”60″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Shading Accent 1″/> <w:LsdException Locked=”false” Priority=”61″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light List Accent 1″/> <w:LsdException Locked=”false” Priority=”62″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Grid Accent 1″/> <w:LsdException Locked=”false” Priority=”63″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 1 Accent 1″/> <w:LsdException Locked=”false” Priority=”64″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 2 Accent 1″/> <w:LsdException Locked=”false” Priority=”65″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 1 Accent 1″/> <w:LsdException Locked=”false” UnhideWhenUsed=”false” Name=”Revision”/> <w:LsdException Locked=”false” Priority=”34″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”List Paragraph”/> <w:LsdException Locked=”false” Priority=”29″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Quote”/> <w:LsdException Locked=”false” Priority=”30″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Intense Quote”/> <w:LsdException Locked=”false” Priority=”66″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 2 Accent 1″/> <w:LsdException Locked=”false” Priority=”67″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 1 Accent 1″/> <w:LsdException Locked=”false” Priority=”68″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 2 Accent 1″/> <w:LsdException Locked=”false” Priority=”69″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 3 Accent 1″/> <w:LsdException Locked=”false” Priority=”70″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Dark List Accent 1″/> <w:LsdException Locked=”false” Priority=”71″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Shading Accent 1″/> <w:LsdException Locked=”false” Priority=”72″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful List Accent 1″/> <w:LsdException Locked=”false” Priority=”73″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Grid Accent 1″/> <w:LsdException Locked=”false” Priority=”60″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Shading Accent 2″/> <w:LsdException Locked=”false” Priority=”61″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light List Accent 2″/> <w:LsdException Locked=”false” Priority=”62″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Grid Accent 2″/> <w:LsdException Locked=”false” Priority=”63″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 1 Accent 2″/> <w:LsdException Locked=”false” Priority=”64″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 2 Accent 2″/> <w:LsdException Locked=”false” Priority=”65″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 1 Accent 2″/> <w:LsdException Locked=”false” Priority=”66″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 2 Accent 2″/> <w:LsdException Locked=”false” Priority=”67″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 1 Accent 2″/> <w:LsdException Locked=”false” Priority=”68″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 2 Accent 2″/> <w:LsdException Locked=”false” Priority=”69″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 3 Accent 2″/> <w:LsdException Locked=”false” Priority=”70″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Dark List Accent 2″/> <w:LsdException Locked=”false” Priority=”71″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Shading Accent 2″/> <w:LsdException Locked=”false” Priority=”72″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful List Accent 2″/> <w:LsdException Locked=”false” Priority=”73″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Grid Accent 2″/> <w:LsdException Locked=”false” Priority=”60″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Shading Accent 3″/> <w:LsdException Locked=”false” Priority=”61″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light List Accent 3″/> <w:LsdException Locked=”false” Priority=”62″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Grid Accent 3″/> <w:LsdException Locked=”false” Priority=”63″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 1 Accent 3″/> <w:LsdException Locked=”false” Priority=”64″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 2 Accent 3″/> <w:LsdException Locked=”false” Priority=”65″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 1 Accent 3″/> <w:LsdException Locked=”false” Priority=”66″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 2 Accent 3″/> <w:LsdException Locked=”false” Priority=”67″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 1 Accent 3″/> <w:LsdException Locked=”false” Priority=”68″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 2 Accent 3″/> <w:LsdException Locked=”false” Priority=”69″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 3 Accent 3″/> <w:LsdException Locked=”false” Priority=”70″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Dark List Accent 3″/> <w:LsdException Locked=”false” Priority=”71″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Shading Accent 3″/> <w:LsdException Locked=”false” Priority=”72″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful List Accent 3″/> <w:LsdException Locked=”false” Priority=”73″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Grid Accent 3″/> <w:LsdException Locked=”false” Priority=”60″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Shading Accent 4″/> <w:LsdException Locked=”false” Priority=”61″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light List Accent 4″/> <w:LsdException Locked=”false” Priority=”62″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Grid Accent 4″/> <w:LsdException Locked=”false” Priority=”63″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 1 Accent 4″/> <w:LsdException Locked=”false” Priority=”64″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 2 Accent 4″/> <w:LsdException Locked=”false” Priority=”65″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 1 Accent 4″/> <w:LsdException Locked=”false” Priority=”66″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 2 Accent 4″/> <w:LsdException Locked=”false” Priority=”67″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 1 Accent 4″/> <w:LsdException Locked=”false” Priority=”68″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 2 Accent 4″/> <w:LsdException Locked=”false” Priority=”69″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 3 Accent 4″/> <w:LsdException Locked=”false” Priority=”70″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Dark List Accent 4″/> <w:LsdException Locked=”false” Priority=”71″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Shading Accent 4″/> <w:LsdException Locked=”false” Priority=”72″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful List Accent 4″/> <w:LsdException Locked=”false” Priority=”73″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Grid Accent 4″/> <w:LsdException Locked=”false” Priority=”60″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Shading Accent 5″/> <w:LsdException Locked=”false” Priority=”61″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light List Accent 5″/> <w:LsdException Locked=”false” Priority=”62″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Grid Accent 5″/> <w:LsdException Locked=”false” Priority=”63″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 1 Accent 5″/> <w:LsdException Locked=”false” Priority=”64″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 2 Accent 5″/> <w:LsdException Locked=”false” Priority=”65″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 1 Accent 5″/> <w:LsdException Locked=”false” Priority=”66″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 2 Accent 5″/> <w:LsdException Locked=”false” Priority=”67″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 1 Accent 5″/> <w:LsdException Locked=”false” Priority=”68″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 2 Accent 5″/> <w:LsdException Locked=”false” Priority=”69″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 3 Accent 5″/> <w:LsdException Locked=”false” Priority=”70″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Dark List Accent 5″/> <w:LsdException Locked=”false” Priority=”71″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Shading Accent 5″/> <w:LsdException Locked=”false” Priority=”72″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful List Accent 5″/> <w:LsdException Locked=”false” Priority=”73″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Grid Accent 5″/> <w:LsdException Locked=”false” Priority=”60″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Shading Accent 6″/> <w:LsdException Locked=”false” Priority=”61″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light List Accent 6″/> <w:LsdException Locked=”false” Priority=”62″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Light Grid Accent 6″/> <w:LsdException Locked=”false” Priority=”63″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 1 Accent 6″/> <w:LsdException Locked=”false” Priority=”64″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Shading 2 Accent 6″/> <w:LsdException Locked=”false” Priority=”65″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 1 Accent 6″/> <w:LsdException Locked=”false” Priority=”66″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium List 2 Accent 6″/> <w:LsdException Locked=”false” Priority=”67″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 1 Accent 6″/> <w:LsdException Locked=”false” Priority=”68″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 2 Accent 6″/> <w:LsdException Locked=”false” Priority=”69″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Medium Grid 3 Accent 6″/> <w:LsdException Locked=”false” Priority=”70″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Dark List Accent 6″/> <w:LsdException Locked=”false” Priority=”71″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Shading Accent 6″/> <w:LsdException Locked=”false” Priority=”72″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful List Accent 6″/> <w:LsdException Locked=”false” Priority=”73″ SemiHidden=”false” UnhideWhenUsed=”false” Name=”Colorful Grid Accent 6″/> <w:LsdException Locked=”false” Priority=”19″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Subtle Emphasis”/> <w:LsdException Locked=”false” Priority=”21″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Intense Emphasis”/> <w:LsdException Locked=”false” Priority=”31″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Subtle Reference”/> <w:LsdException Locked=”false” Priority=”32″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Intense Reference”/> <w:LsdException Locked=”false” Priority=”33″ SemiHidden=”false” UnhideWhenUsed=”false” QFormat=”true” Name=”Book Title”/> <w:LsdException Locked=”false” Priority=”37″ Name=”Bibliography”/> <w:LsdException Locked=”false” Priority=”39″ QFormat=”true” Name=”TOC Heading”/> </w:LatentStyles> </xml><![endif][if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:””; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:”Calibri”,”sans-serif”; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} </style> <![endif]

Please follow this rubric for the case study.

 

Criteria to meet:

 

Organization – strive for well developed paragraphs, smooth transitions between paragraphs, ideas focused on a central theme.

 

Development – strive for Ideas focused on a central theme, all ideas are clearly presented.

 

Conventions – strive for no errors in sentence structure (capitalization, grammar, presentation and general structure.) APA Style – strive for correct cover page, in text citations, format and reference page have no errors.Please see grading rubric titled “case study” under the Rubric/ Grading Criteria. 

business case


A Business Case Definition:  Documentation detailing the requirements to move an idea from conceptualization to project initiation.

For this assignment, I want you to compare and contrast a Business Case and a Business Plan.   Include definitions and applications.   Also please explore business case templates. The above definition of a business case is mine, if you would like to offer a different definition as part of your assignment, please do so, but of course you will defend it therein. There are examples of Business Case Templates located in the readings for this course. There are also some links provided. Please review other web sites of relevance and indicate those you use.

I want you to submit to me in three weeks maximum a paper on the above and stating why the details in the business case template are there and how this represents the corpus of data that would be submitted to obtain funding and project approval to get a project started. The paper should be from 5 to 7 pages in length.  Select a business case template that you like. Tell me why you selected that business case template and how it is associated with the(technological and/or business drivers) problem that you selected for your Business Case Research paper.

I want you to reference at least three different business case templates and select the one you believe to be the best. Include the one or URL for it, with your paper. You should reference the others that you evaluated to come to your conclusion.

This is the first of two projects; the second is identified in week four assignments. Yes you can look now if you want to it should be there.

Please reference the rubric in the rubrics/criteria section for grading expectations.

Summary:

Select an industry of interest. Identify and describe some of the problems affecting the industry where business systems may be used.  

Identify the reasons (technological and / or business drivers) behind the problems. 

Select at least one problem area and research different systems solutions (3 options) or technologies currently available or under development that may help solve the problem. 

Evaluate the options in relationship to the problem and identify which option you determine would be the best fit.  (A-2, C-2)

Please do not submit research paper for the following: Electronic Health Records (HER), Radio Frequency Identification (RFID) and Transportation Tracking System.

Submit a SWOT analysis for your business case research paper. This should help you with clarifying the problem statement for your business case research paper and address priorities.

Use the link associated with this assignment to make your submissions.

The SWOT analysis can be prepared with Word or with PowerPoint. The title must identify the company and the industry.  There should be a minimum of 4 items in each area.

 

Refer to the textbook for additional information in preparing a SWOT analysis.  You may refer to this in your business case research paper, as this may be included in your appendix.