Work Must Be On Time: Original Instructor Will Be

Work Must Be Ontime Work Must Be Original Instructor Will Be Using

Work must be on time. Work must be original (Instructor will be using TURNITIN.com to check the papers). Work must be untraceable and cannot be found on any website. Work must be done correctly and according to the requirements below. Please place the requirement above the section in the paper that it answers.

Project Deliverable 1: Project Plan Inception

This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files, naming each according to the section it covers. Assume all necessary assumptions needed for completion. You are a newly appointed Chief Information Officer (CIO) of a $25 million data collection and analysis company operating for less than two years, expected to grow by 60% over 18 months. The company currently collects data via web analytics and operational systems to support marketing and business decisions. Your task is to develop a comprehensive IT project plan to support this growth, including redesigning hardware and software infrastructure. The solution may be hosted, on-site, or hybrid.

The CEO has tasked you with integrating different technologies from various partners, incorporating industry best practices, and ensuring cost-effective solutions. While interested in cloud computing and SaaS, the CEO is concerned about security risks, which should be addressed through proper security protocols. The company has 20 employees, including four dedicated IT staff, and will expand from one to three floors within six months.

Section 1: Project Introduction

Write a 4-6 page project introduction that details the current state of the organization, including:

  • Background information of the company
  • Details of the company's business operations
  • Current outsourcing and offshoring activities
  • Skilled information systems personnel and responsibilities
  • Types of data collected by the company
  • Description of existing information systems supporting the business, including:
  • Operational Systems and Databases
  • Analytics and Interfaces
  • Infrastructure and Security

Include at least two quality resources from credible sources, excluding Wikipedia or similar websites. Format the paper according to APA guidelines, using double spacing, Times New Roman font size 12, and one-inch margins. Include a cover page with the title, your name, professor’s name, course, and date, which are not part of the page count.

Section 2: Project Plan

Using Microsoft Project, create a detailed project plan that includes:

  • All tasks, subtasks, resources, and timeframes
  • Phases of planning, analysis, design, and implementation
  • Alignment with the systems development life cycle (SDLC)

This plan should serve as a comprehensive roadmap for the project’s execution, integrating the objectives to support organizational growth and technology infrastructure redesign. Incorporate best practices, industry standards, and resource management principles to demonstrate thorough planning and technical competence.

Paper For Above instruction

The current state of the organization indicates a burgeoning enterprise at the nascent stage of technological development, necessitating a strategic overhaul to accommodate rapid growth. As a data-centric company with a relatively small yet skilled team, the organization’s core activities revolve around data collection via web analytics and operational systems, providing a foundation for strategic decision-making in marketing and operations. However, the existing infrastructure is limited, comprising basic hardware and software configurations insufficient for expanding operations from one to three floors within six months.

Background information highlights a company that has been operational for less than two years with an initial revenue of $25 million. Its business model relies heavily on the aggregation and analysis of data to optimize marketing campaigns and operational efficiencies. Currently, the company’s outsourced activities include the management of certain data processing and cloud services, although these are minimal due to the company’s early stage. Offshoring is limited but might expand as the organization scales, offering opportunities for cost savings and access to specialized expertise.

The existing IT personnel are a small team of four professionals, including the CIO, responsible for maintaining hardware, software, and security protocols. Their roles involve network management, database administration, software support, and cybersecurity, with a need for expanded expertise in cloud and SaaS integration. Their skill set includes knowledge of database management, network security, system administration, and application support, highlighting the need for ongoing training and talent acquisition in cloud services and emerging technologies.

The organization mainly collects data from Web analytics platforms such as Google Analytics, social media metrics, and operational data from internal systems (e.g., sales, customer relations). This data supports marketing strategies, operational improvements, and customer segmentation efforts. The data types include structured databases for customer records, operational logs, unstructured data such as user interactions, and analytics reports generated from web and app data. These data assets require secure storage, efficient retrieval, and effective analysis capabilities to support decision-making.

Currently, the company's information systems include basic operational databases, supported by on-premises servers and cloud-based services. The systems handle data storage, processing, and analysis but lack scalability and integration. Infrastructure comprises standard networking gear, limited security controls, and minimal redundancy. Security measures include firewalls, basic encryption, and access controls, but lack comprehensive threat detection or disaster recovery strategies.

To support scaling, the organization must evolve its operational systems into robust, scalable architectures, incorporating updated databases, analytics interfaces, and secure infrastructure. An emphasis on cloud computing and SaaS must be balanced with rigorous security protocols. Best practices from industry standards like ISO/IEC 27001 and NIST Cybersecurity Framework should guide the security enhancements. A hybrid model, combining on-site hardware and cloud solutions, offers flexibility and control, aligning with the CEO’s preferences and security concerns.

The project plan will outline phased activities—from initial planning and requirements analysis to detailed design, implementation, and testing—following the SDLC model. Tasks include infrastructure assessment, vendor selection, system design, resource allocation, and security protocols implementation. The plan will also detail timelines, milestones, and resource responsibilities, ensuring that the organizational expansion and technological upgrade are synchronized and efficient. Incorporating project management best practices, risk mitigation strategies, and stakeholder communication plans will facilitate successful deployment and future scalability.

References

  • ISO/IEC 27001 Information Security Management Systems. (2013). International Organization for Standardization.
  • NIST Cybersecurity Framework. (2018). National Institute of Standards and Technology.
  • Laudon, K. C., & Laudon, J. P. (2020). Management Information Systems: Managing the Digital Firm. Pearson.
  • Stair, R., & Reynolds, G. (2019). Principles of Information Systems. Cengage Learning.
  • O'Brien, J. A., & Marakas, G. M. (2011). Management Information Systems. McGraw-Hill Education.
  • Chen, H., Chiang, R., & Storey, V. (2012). Business Intelligence and Analytics: From Big Data to Big Impact. MIS Quarterly, 36(4), 1165-1188.
  • Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud Computing—The Business Perspective. Decision Support Systems, 51(1), 176–189.
  • Gartner. (2022). Top Strategic Technology Trends. Gartner Research.
  • Armbrust, M., Fox, A., Griffith, R., et al. (2010). A View of Cloud Computing. Communications of the ACM, 53(4), 50-58.
  • Westerman, G., Bonnet, D., & McAfee, A. (2014). Leading Digital: Turning Technology into Business Transformation. Harvard Business Review Press.