Assignment 2: The Presentation Due Week 10 And Worth 625613
Assignment 2: The Presentation Due Week 10 and worth 200 points Congratulations
Create a slide show (in PowerPoint or similar software) addressing the following topics in this order:
- Goals: What the project hopes to accomplish.
- Critical Success Factors: Identify at least 4 different stakeholders; for each, list at least 2 requirements for project success.
- Acquisition strategy: Decide whether the system should be built in-house, developed by a contractor, purchased off-the-shelf and customized, or leased as a service, with rationale.
- Resources: For in-house development, specify the required personnel, skills, and recommended development lifecycle; otherwise, identify 3 candidate organizations capable of delivering the system.
- System functions: Present in a table the types of users, their business reasons for using the system, how the system supports these needs, and how this support differs from the current system.
- Connectivity: Provide a diagram illustrating how the system connects to other information systems and the data flows among them.
- Security: List the most serious cybersecurity threats and vulnerabilities of the new system and suggest strategies to address them.
- Mobility: Describe the system’s capabilities for mobile use.
Include a title slide and a summary slide, with one slide for each of the 8 points above. Use speaker notes or audio narration explaining each slide more fully.
Paper For Above instruction
Developing a comprehensive project presentation requires careful planning, strategic analysis, and clear communication. This paper will systematically address each of the eight designated areas, detailing the goals, stakeholders, acquisition strategy, resources, system functions, connectivity, security, and mobility considerations necessary for an effective system deployment.
Introduction
As organizations incorporate increasingly complex information systems, a clear articulation of project goals and stakeholder needs becomes paramount. The initial presentation sets the tone for project buy-in and clarity. The process involves understanding business objectives, stakeholder requirements, technical solutions, and security and mobility implications.
Goals of the Project
The primary goal of the project is to develop an efficient, scalable, and secure information system that enhances organizational operations. Specifically, the project aims to automate manual processes, improve data accuracy, facilitate real-time data access, and support decision-making at various organizational levels. Achieving integration with existing systems while maintaining user-friendly interfaces is also a key goal.
Critical Success Factors and Stakeholder Requirements
Identifying stakeholders and their success criteria ensures the system meets diverse needs.
- Executive Management: Require high-level dashboards for strategic insights and ROI reporting.
- IT Department: Need system reliability, ease of maintenance, and security oversight.
- End Users: Demand intuitive interfaces, quick response times, and minimal training requirements.
- Customers: Expect seamless online interactions and data privacy assurances.
Each stakeholder's success hinges on specific deliverables, such as system performance, security, or user experience.
Acquisition Strategy and Rationale
Considering cost, timeline, customization needs, and existing capabilities, purchasing an off-the-shelf system and customizing it appears optimal. This approach offers faster deployment, proven stability, and reduced development risks. If unique business processes require significant modifications, a hybrid approach involving in-house adjustments or contracting bespoke development may be considered.
Resources and Development Approach
For in-house development, necessary personnel include project managers, systems analysts, developers skilled in relevant technologies, testers, and support staff. The recommended development lifecycle is the Agile methodology, enabling iterative refinement and stakeholder engagement. Alternatively, selecting three qualified vendors—such as TechSolutions Inc., InnovateSoft Ltd., or CyberSecure Systems—would ensure deployment reliability, quality, and adherence to requirements.
System Functions and User Roles
Type of User Business Reason for Using the System How the System Supports Their Needs Differences from Current System Executives Strategic decision-making and performance monitoring Access to real-time dashboards and reports Enhanced visualization and data integration capabilities Operational Staff Executing daily tasks efficiently Automated workflows and centralized data access Reduced manual data entry and improved process automation IT Support Maintaining system health and security Monitoring dashboards and control interfaces Automated alerts and streamlined management tools Customers Engaging with services online securely User-friendly portals with secure login and personalized interactions More intuitive interfaces and increased privacy measures Connectivity and Data Flow
A diagram illustrating the system's integration points would include connections to enterprise resource planning (ERP), customer relationship management (CRM), and supply chain systems. Data flows include transactional data, customer information, and analytics reports, enabling synchronized operations and informed decision-making across departments.
Security Threats, Vulnerabilities, and Mitigation Strategies
Critical threats include cyberattacks such as ransomware, phishing, and SQL injection; vulnerabilities like weak authentication, unpatched software, and insider threats. Strategies involve implementing multi-factor authentication, regular security audits, encryption, intrusion detection systems, and comprehensive staff security training to mitigate risks.
Mobility Capabilities
The system offers mobile-compatible interfaces accessible via smartphones and tablets. Features include responsive design, secure mobile login, and access to critical information on the go. Mobile capabilities support remote work, field operations, and real-time alerts, enhancing organizational flexibility and responsiveness.
Conclusion
This comprehensive analysis demonstrates a strategic approach to system development and deployment, aiming to meet organizational goals while addressing stakeholder needs, technical requirements, and security challenges. Proper planning and execution will ensure a robust, secure, and user-friendly system that drives organizational success.
References
- Brynjolfsson, E., & McAfee, A. (2014). The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies. W. W. Norton & Company.
- Gordon, L. A., Loeb, M. P., & Zhou, L. (2011). The impact of information security breaches: Was there a business impact? International Journal of Accounting Information Systems, 12(4), 275-294.
- ISO/IEC 27001:2013. Information security management systems — Requirements.
- Kroenke, D. M. (2014). Using MIS. Pearson.
- Laudon, K. C., & Traver, C. G. (2019). E-commerce 2019: Business, Technology, Society. Pearson.
- NIST Special Publication 800-53. Security and Privacy Controls for Information Systems and Organizations.
- Powell, P., & Dent-McDonald, A. (1997). Information technology outsourcing: A strategic review. Communications of the ACM, 40(12), 31-36.
- Rainer, R. K., & Cegielski, R. (2012). Introduction to Information Systems: Enabling and Transforming Business. Wiley.
- Singer, P. W. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
- Stair, R., & Reynolds, G. (2018). Principles of Information Systems. Cengage Learning.