Assignment 2: The Presentation Due Week 10 And Worth 200 Poi

Assignment 2 The Presentation Due Week 10 And Worth 200 Pointscongrat

Create a slide show (in PowerPoint or similar software) that addresses the following points in order, with speaker notes or audio narration for each slide:

  1. Goals: What the project hopes to accomplish.
  2. Critical Success Factors: Identify at least four stakeholders; for each, list at least two requirements for the project's success.
  3. Acquisition strategy: Decide whether to build the system in-house, via a contractor, purchase off-the-shelf and customize, or lease as a service, with an explanation of your rationale.
  4. Resources: For in-house development, specify the required personnel, skills, and recommended lifecycle; if outsourcing, identify three candidate organizations capable of delivering the system.
  5. System functions: Summarize in a table the types of users, the business reasons for using the system, how the system supports these needs, and differences from the current system.
  6. Connectivity: Provide a diagram illustrating how the system connects to other information systems and the data flows involved.
  7. Security: List the primary cybersecurity threats and vulnerabilities, and propose strategies to address them.
  8. Mobility: Describe the system's mobile capabilities, including a title and summary slide.

Each of the eight points should be covered on a separate slide with speaker notes or narration explaining each point in detail.

Paper For Above instruction

The development and implementation of a new information system is a complex and strategic endeavor that requires careful planning and comprehensive analysis. A structured presentation addressing the key factors involved—from goals to security—is essential for aligning stakeholders, clarifying objectives, and guiding decision-making. This essay elaborates on each of the specified points for a project presentation, emphasizing their importance in the successful deployment of an information system.

Goals of the Project

The primary goal of the project is to develop an information system that enhances organizational efficiency, improves data accuracy, and provides scalable, secure, and accessible information management solutions. The system aims to streamline business processes, facilitate decision-making, and support organizational growth. Specific aims include centralizing data storage, enabling real-time access, and integrating various business functions through a cohesive platform.

Critical Success Factors

Identifying critical stakeholders and understanding their success criteria are vital components of project planning. Key stakeholders typically include executive leadership, IT staff, end-users (such as operational personnel), and external partners or vendors. Each stakeholder group has unique requirements for the project’s success:

  • Executive Leadership: They require a system that aligns with strategic goals, offers ROI, and provides executive-level reporting and analytics.
  • IT Department: Emphasis is on system security, scalability, maintainability, and ease of integration with existing infrastructure.
  • End-Users: They need intuitive interfaces, reliable access, and functionalities tailored to their operational needs.
  • Vendors or Contractors: They require clear specifications, timely communication, and contractual agreements that define deliverables and support.

Meeting these diverse requirements ensures all stakeholders perceive the project as successful, fostering buy-in and facilitating smooth implementation.

Acquisition Strategy

The decision between building, contracting, purchasing off-the-shelf, or leasing involves evaluating cost, time-to-deploy, customization needs, and strategic fit. For this project, a hybrid approach of purchasing a scalable, off-the-shelf solution and customizing it to organizational needs might be optimal. Off-the-shelf solutions are often cost-effective, reduce implementation time, and are backed by vendor support. Customization ensures the system fits specific workflows, while vendor support offers ongoing maintenance and updates. This approach balances efficiency with flexibility, reducing risks associated with building a system from scratch and aligning with industry best practices.

Resources

If opting for in-house development, the project requires a team with skills in software engineering, database management, cybersecurity, and project management. The recommended lifecycle would be the Agile model, promoting iterative development, stakeholder feedback, and adaptability to changing needs. Alternatively, when selecting external vendors, three reputable organizations capable of delivering such systems could include:

  • Accenture
  • IBM
  • Cognizant

These vendors offer extensive experience in enterprise system implementation, cloud services, and custom solutions, making them suitable candidates for delivering a comprehensive system.

System Functions

User Type Business Reason for Use Support Provided by System Differences from Current System
Management Monitoring performance, generating reports Real-time dashboards, analytics tools Enhanced visualization, quicker data access
Operational Staff Executing daily tasks, data entry User-friendly interfaces, mobile access Automation of routine processes, mobile support
IT Department System maintenance, security oversight Admin portals, security configuration tools Centralized control, automated updates

Connectivity

A detailed diagram would illustrate how the new system interfaces with existing ERP, CRM, and data warehouses. Data flows include real-time transaction updates to and from these systems, synchronization processes, and data aggregation points. Such connectivity ensures data consistency, reduces manual entry, and facilitates seamless information sharing across departments.

Security

The most critical cybersecurity threats include data breaches, malware, insider threats, and denial-of-service attacks. Vulnerabilities may stem from weak access controls, unpatched software, or insufficient encryption. Strategies to mitigate these risks involve implementing multi-factor authentication, regular security audits, encryption protocols, and staff training on security best practices. Additionally, deploying intrusion detection systems and maintaining comprehensive backup processes are essential.

Mobility

The system’s mobile capabilities support remote and on-the-go access via dedicated apps or mobile-optimized web interfaces. Features include secure login, role-based access, notifications, and data entry/update functionalities. These allow users to perform core tasks from their smartphones or tablets, enhancing flexibility and responsiveness, especially for field personnel or management teams who require real-time data access beyond office environments.

Conclusion

Developing a comprehensive presentation that covers system goals, success factors, strategy, resources, functions, connectivity, security, and mobility prepares the project team to communicate effectively with stakeholders. Such a well-structured approach promotes clarity, aligns expectations, and ensures that the system designed will meet organizational needs while minimizing risks. Proper planning and stakeholder engagement, supported by detailed visual aids and narration, are fundamental to the project's success.

References

  • Janssen, M., Wimmer, M. A., & Deljoo, A. (2015). Policy Practice and Digital Science. Springer.
  • Toohey, T. J. (2014). Understanding Privacy and Data Protection. Thomson Reuters.
  • Laudon, K. C., & Traver, C. G. (2021). E-commerce 2021: Business, Technology, Society. Pearson.
  • O'Brien, J. A., & Marakas, G. M. (2019). Management Information Systems. McGraw-Hill Education.
  • Stair, R., & Reynolds, G. (2020). Principles of Information Systems. Cengage Learning.
  • Turban, E., Volonino, L., & Wood, G. (2018). Information Technology for Management. Wiley.
  • Shoemaker, S. (2014). Cybersecurity Strategies. Journal of Information Security.
  • Rainer, R. K., & Prince, B. (2019). Introduction to Information Systems. Wiley.
  • Shaw, M. J. (2020). Building Effective Business-IT Alignment. MIS Quarterly.
  • Chen, H., Chiang, R., & Storey, V. C. (2012). Business Intelligence and Analytics. MIS Quarterly.