Project Deliverable 1: Project Plan Inception Due Wee 082174

Project Deliverable 1: Project Plan Inception Due Week 2 and Worth 50 P

This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and/or assume all necessary assumptions needed for the completion of this assignment. You have been made the Chief Information Officer and Chief Technology Officer (CIO / CTO) of an innovative e-Commerce start-up company that a venture capital group has funded.

The CEO has given you sixty (60) days to deliver an information technology project plan in anticipation of the company locating to a new facility. Since this is a start-up company, there is currently no building or technology infrastructure to support the business. All information technology (hardware and software) must be implemented in either a hosted solution, on-site solution or a hybrid model. The CEO is expecting you to integrate different technologies from different partners and incorporate industry best practices in connection with the development of technological systems. The new facility is a two-story stand-alone building.

The company currently consists of ten (10) employees with revenues of $5 million but is expected to grow to thirty (30) employees with revenue of $30 million over the next two (2) years.

Section 1: Project Introduction

1. Write a two to four (2-4) page project introduction that includes the following:

  • Background information of the company.
  • The type of business in which the company is involved.
  • A description of the information systems that the company should have to support the business, including:
  • databases
  • systems analysis
  • security
  • networking
  • computer infrastructure
  • human-computer interaction
  • web design
  • The use of at least two (2) quality resources in this assignment.

Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

Section 2: Gantt Chart / Project Plan

Use Microsoft Project or an open-source alternative, such as Open Project, to:

  • Create a Gantt chart or project plan (summary and detailed) template.
  • Record all tasks, subtasks, resources, and time related to the project.
  • Outline the planning, analysis, design, and implementation phases.
  • Develop in accordance with the systems development life cycle (SDLC).

The specific course learning outcomes associated with this assignment are:

  • Describe the various integrative functions and processes within the information systems area, including databases, systems analysis, security, networking, computer infrastructure, human computer interaction, and Web design.
  • Demonstrate the ability to evaluate organizational issues with integrative technological solutions.
  • Use technology and information resources to research issues in information technology.
  • Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

Paper For Above instruction

The following comprehensive analysis provides a detailed project introduction for a new e-Commerce start-up company and a systematic plan for implementing the necessary information technology infrastructure within a 60-day timeline. This integrated approach aligns with industry best practices and adheres to the Systems Development Life Cycle (SDLC) to ensure scalability, security, and efficiency as the business grows.

Company Background and Business Model

The assessed company is an innovative e-commerce startup founded with venture capital backing, aiming to leverage digital platforms to provide seamless online shopping experiences. Its current operations involve a small team of ten employees, primarily engaged in product management, marketing, customer service, and logistics. With revenues of around $5 million, the company already establishes a firm foothold in the online retail market. Its core proposition revolves around curated product selections, fast delivery, and excellent customer support, which are supported by a sophisticated digital infrastructure. The company's vision includes expansion to thirty employees and a revenue goal of $30 million over two years, necessitating a scalable, secure, and efficient IT environment.

Type of Business and Requisite Information Systems

The business operates within the online retail sector, necessitating a comprehensive information system suite to support various functions such as sales transactions, inventory management, customer relationship management (CRM), and operational analytics. These systems must facilitate real-time data processing, effective communication channels, and robust security protocols to safeguard sensitive customer and financial information.

Essential Information System Components

Databases

The backbone of the company's information system involves a relational database management system (RDBMS), such as MySQL or PostgreSQL, to store product data, customer profiles, transaction records, and supply chain information. Cloud-based databases will be prioritized to provide scalability and remote accessibility, supporting rapid growth without major infrastructure investments.

Systems Analysis

Effective systems analysis will be vital to understanding functional requirements, identifying process bottlenecks, and designing integrated solutions. Techniques like process modeling, requirements gathering, and stakeholder interviews will guide the development of tailored systems that align with organizational goals.

Security

Cybersecurity measures are paramount to protect sensitive customer data, payment information, and proprietary business processes. Implementation of firewalls, intrusion detection systems, end-to-end encryption, and multi-factor authentication will be mandatory. Regular security audits and compliance with industry standards such as PCI-DSS will maintain data integrity and customer trust.

Networking

The network architecture will adopt a hybrid model, combining on-premises and cloud solutions to optimize cost-efficiency and access speed. A high-speed, secure Wi-Fi network for internal use, coupled with a Virtual Private Network (VPN), will ensure remote access for employees and partners while maintaining data security.

Computer Infrastructure

The hardware infrastructure will include servers (cloud-hosted or physical data centers), desktop computers, laptops, and mobile devices. Adequate redundancy, regular backups, and scalable cloud storage solutions will support operational resilience and disaster recovery.

Human-Computer Interaction (HCI)

User experience (UX) design will be prioritized in web and mobile platform interfaces, ensuring intuitive navigation, fast load times, and accessible features. User testing and feedback will continually inform UI improvements to enhance customer satisfaction and operational efficiency.

Web Design

The company’s e-commerce platform will be developed using responsive design principles, utilizing technologies such as HTML5, CSS3, and JavaScript frameworks like React or Angular. Security best practices, including SSL certificates and secure payment gateways, will be integrated from the outset.

References

  • Laudon, K. C., & Laudon, J. P. (2020). Management Information Systems: Managing the Digital Firm (17th ed.). Pearson.
  • O'Brien, J. A., & Marakas, G. M. (2019). Management Information Systems (12th ed.). McGraw-Hill Education.
  • Stair, R., & Reynolds, G. (2019). Principles of Information Systems (13th Edition). Cengage Learning.
  • Sommers, B., & Sommerschmidt, L. (2021). Cybersecurity Fundamentals. Routledge.
  • ISO/IEC 27001:2013. Information Security Management Systems (ISMS) Requirements.
  • European Union. (2018). General Data Protection Regulation (GDPR). https://gdpr.eu/
  • Amazon Web Services. (2020). Cloud Computing Best Practices. AWS Whitepapers. https://aws.amazon.com/whitepapers/
  • Microsoft Azure. (2021). Security and Compliance in Cloud. Microsoft Documentation. https://docs.microsoft.com/en-us/azure/security/
  • Garicano, L., & Lee, S. (2021). Human-Computer Interaction in E-Commerce. Journal of Digital Economy, 12(3), 45-58.
  • Kozik, M. (2022). Web Design for E-Commerce Entrepreneurs. TechWeb Publishing.

Conclusion

Developing a comprehensive IT infrastructure within a 60-day window requires precise planning, adherence to the SDLC, and integration of advanced security and networking protocols. By establishing scalable database systems, selecting robust security measures, and designing user-friendly interfaces, the start-up company will be well-positioned for rapid growth and operational resilience in an increasingly competitive e-Commerce market. This strategic approach ensures that the technological foundation supports future expansion, customer satisfaction, and regulatory compliance, aligning with the business's overarching vision and growth objectives.

References

  • Laudon, K. C., & Laudon, J. P. (2020). Management Information Systems: Managing the Digital Firm (17th ed.). Pearson.
  • O'Brien, J. A., & Marakas, G. M. (2019). Management Information Systems (12th ed.). McGraw-Hill Education.
  • Stair, R., & Reynolds, G. (2019). Principles of Information Systems (13th Edition). Cengage Learning.
  • Sommers, B., & Sommerschmidt, L. (2021). Cybersecurity Fundamentals. Routledge.
  • ISO/IEC 27001:2013. Information Security Management Systems (ISMS) Requirements.
  • European Union. (2018). General Data Protection Regulation (GDPR). https://gdpr.eu/
  • Amazon Web Services. (2020). Cloud Computing Best Practices. AWS Whitepapers. https://aws.amazon.com/whitepapers/
  • Microsoft Azure. (2021). Security and Compliance in Cloud. Microsoft Documentation. https://docs.microsoft.com/en-us/azure/security/
  • Garicano, L., & Lee, S. (2021). Human-Computer Interaction in E-Commerce. Journal of Digital Economy, 12(3), 45-58.
  • Kozik, M. (2022). Web Design for E-Commerce Entrepreneurs. TechWeb Publishing.