Development of a new information system

Assignment Help Computer Network Security
Reference no: EM13846479

Willowbrook School

Willowbrook School is a small private school that has retained your services as a systems analyst to assist in the development of a new information system for the school's administrative needs.

Background

After an initial conversation with Victoria and Kathy, the school's administrators, they have decided that pursuing the possibility of an information system is a good idea. Michelle, the administrative assistant, in particular is feeling the strain of the increased workload associated with the rapid growth in the student population. The system that she has been using, of spreadsheets and word processing documents, worked well when enrollments were smaller, but now the amount of time spent copying information from one place to another is daunting, and the possibility of errors is increasing. An information system is necessary to cope with the growing administrative workload. After your meeting you developed a business profile, organization model, business process model, and began to identify information and processes for Willowbrook School's new information system.

Based on your initial conversation and the work that you prepared, you begin planning to conduct a preliminary investigation. You call Victoria and discuss with her the strategic plan for the school including its mission and vision. You explain to her that planning IT systems and projects requires a similar approach to strategic planning as the school likely took when it initially created its mission, vision, and strategic plan. She begins to ask you questions about the next steps for developing the information system. You tell Victoria that you will put together a memo for detailing the need for strategic planning and describing the stages of preliminary systems investigations.

Tasks

  1. Write a memo to Victoria detailing the need for strategic planning and describing the stages of preliminary systems investigations. Make sure the memo contains the proper formal heading and formatting. It should also include two sections. The first should define strategic planning and how Willowbrook School would benefit. The second section details the six stages that you will go through in the preliminary systems investigation.
  2. You need more information about the proposed system for your plan and need to conduct fact-finding. Make a list of people whom you might want to interview. Also, suggest other fact-finding techniques you should consider.
  3. Consider the internal and external factors that affect information systems. Which factors, in your opinion, will have the greatest impact on the system proposed for the school? Explain your answer.
  4. At the conclusion of the preliminary investigation, you will deliver a written summary of the results and deliver a brief presentation to Willowbrook School's administration and probably its executive board. Prepare a list of recommendations that will help make your written and oral communications more effective. Put your list in priority order, starting with what you consider to be the most important suggestions. Before you complete this task, you should review Part A of the Systems Analyst's Toolkit, which provides suggestions for oral and written presentations.

Reference no: EM13846479

Questions Cloud

Preexisting arrays and functions : You are given a java file HW2.java with preexisting arrays and functions. Do not modify the main function or other functions names .Each function are given a certain implementation which you need to complete.
How can software be applied as a project-planning tool? : How can software be applied as a project-planning tool?
How can transformational experience influence you as leader : How can a transformational experience influence you as a leader and manager and what skills can you acquire from a transformational experience or critical incident?
Brief summary of the movie : Please watch the following movie and provide a one page report on it. The report should include a brief summary of the movie, if you could relate in any way and what could be gained about addiction or recovery from that movie
Development of a new information system : Willowbrook School is a small private school that has retained your services as a systems analyst to assist in the development of a new information system for the school's administrative needs.
Describe the ethical issues you may encounter : Write a 1,050- to-1,400 word paper that includes the following: Include what therapeutic approach you would apply in this case, and explain why you chose it. Describe the ethical issues you may encounter, as well as how you intend to approach them
Develop a simulation model to help analyze : Develop a simulation model to help analyze and investigate the problem.
Address of the router that computer : 1. Your boss wants to know the address of the router that his computer is using. What do you tell him?
Critique of leadership concepts and models : Reflective Portfolio, composed of your reflections on your learning and thinking throughout this module. In this Unit, prepare for this element of your Final Project by writing a second Reflective Journal entry.

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  The discussion board is part of the core of online

the discussion board is part of the core of online learning. classroom discussion in an online environment requires

  Disadvantages of your remote access solution

Describe the advantages and disadvantages of your remote access solution. Describe the network protocols that will be used on your suggested network.

  Securing of computer forensics evidence

Securing of Computer Forensics Evidence

  How network security be customized for risks management

If not, how can one of these network security best practices be customized to requrements or risks present in the organization? How are risks to particular organization discovered or established?

  Guidance provided by department of health and human services

Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements

  What is the definition of privacy as it relates to

1introduction to the management of information security?2.which trend in it has eliminated the we have technology

  Implement encryption and decryption of the vigenere cipher

Implement both encryption AND decryption of the Vigenere cipher with 26 English letters and 1 space character

  Explain your method of attack and operation of the law

Explain your method of attack and operation within reasonable parameters of the law. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.

  Paper on entropy as it pertains to cryptography

Turn in a 3 page paper on Entropy as it pertains to Cryptography. The paper must discuss the relationship of Entropy to the likelihood that an attack can be successful, the formula for computing Entropy

  Cyber terrorism & information warfare

Risk Management, IT Related Risks, Radio Frequency Identification (RFID), Easy listing of special programs,  Social Engineering

  How is your firewall implementation

Imagine you have installed and configured firewalls in all of the right places within your organization's network. Like any other organization, you try to stay current by deploying the latest and greatest in firewall technology.

  Root certificate authority and an intermediate ca

Is a cryptographic hash function/digest considered encryption - explain three vulnerabilities from the latest Open Web Application Security Project (OWASP).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd