How the information will be used for system requirements

Assignment Help Computer Network Security
Reference no: EM131021068

Question: The purpose of the Session Long Project is to give you the opportunity to explore the applicability of the Module to your own life, work, and place in space and time, and to experiment with the Module to see how the otherwise academically rigorous presentation of a topic may, with more or less work and/or trauma, become "up close and personal". This is done in a number of different ways-sometimes cumulative papers, sometimes practical hands-on experimentation with a tool of some sort, sometimes reflections on a place of work or life. The common thread is personal application, aimed at demonstrating a cumulative knowledge and understanding of the course''s material.

For this course, you will be working on a single cumulative project. Each Module will involve its further development. The purpose of the project is to let you practice your analysis and development methodology application and to meld the results into a coherent and professional deliverable that demonstrates what you have learned. What you are going to do is dream up and prepare requirements and select a methodology for a new information system application-and the process you go through will mirror, in outline, the steps in the systems development process that you are learning about in this course.

Session Long Project

For Module 1, your assignment is to conceptualize a hypothetical information system project and describe its context and purpose. You can design the project for your own organization, an organization that you or someone you know is familiar with, or even for your own imaginary business. Remember, you need to consider both key aspects of information systems-namely information requirements and development methodology.

If you have difficulties dreaming up such a project, you can go someplace interesting or where you already know the people. Spend maybe a half-hour looking at how information is used there. Identify all of the information resources that people are using. Talk to the people if you can. Where do they get the information they use? How do they use it? What other kinds of information might they find useful? What could they do with it? What kinds of futuristic information services would be useful to them? If you are constrained by location and cannot go to interesting places, you might think of a virtual place such as an online forum, or a portal site, etc., and imagine what information services could be helpful to the users there. You may even email to some of the users to obtain additional information if you would like. Or you can simply think what futuristic information services would be useful and successful to an existing organization.

Once you have already got some ideas, discuss them with your classmates (via discussions for instance), your coworkers, friends, relative, or the folks behind you in the line at Starbucks. Of course, you may also contact the faculty for their initial feedback. If you have difficulties coming up with your own project, your professor can help as well.

Once you''ve got a pretty solid idea about the project you''d like to formulate, please prepare a 2- to 3-page paper describing your hypothetical information system project.

Make sure to include:

what the project is about including bounderies

what information gathering you see as needed to make it work

how the information will be USED for system requirements

what are the key features of the organizational context of the project

why the project is useful

why the project will be successful

SLP Assignment Expectations

Your assignment will be graded according to the MSITM SLP Grading Rubric, which aligns with the following expectations. (To see the rubric, go to Assessments>Rubrics. Click the arrow next to the rubric name and choose Preview.)

LENGTH: 2-3 pages typed and double-spaced

The following items will be assessed in particular:

The degree to which you have carried out the assignment completely, or clarified why you could not and investigated alternatives

Your ability to describe your project clearly and develop your recommendations systematically

Your ability to focus on the overall purposes of the assignment, not just its specific steps

If you use any written references, please cite all your sources properly. General Case and SLP Paper Writing Guidelines

Verified Expert

The solution is discussed about the information system of higher education which covers the boundaries of the higher education, system requirements, key features of the organizational context of the project, useful of project. The solution file contains 1000 words included references.

Reference no: EM131021068

Questions Cloud

Evaluate a learning organization : How can the 6Ds you have learned about in the book help evaluate a learning organization? What is an example of an organization which is not a learning organization?   How does your example fail to meet the characteristics of a learning organization?
Does alfredo have a lower cost of producing pizza than paolo : Their parents have always liked Alfredo best, and they buy two pizza ovens and give both to him. Unfortunately, Paolo must buy his own pizza ovens. Does Alfredo have a lower cost of producing pizza than Paolo does because Alfredo received his pizz..
What way can knowledge of non verbal communication : In what way can knowledge of non verbal communication help your communication with others? How do you communicate nonverbally?
How many shares of starbucks stock were traded on this day : The following table shows information on June 7, 2013 on the stock price of Starbucks Corporation: How much did the price of Starbucks' stock change from the day before? Did the Starbucks' stock price vary much during this day's trading?
How the information will be used for system requirements : How the information will be USED for system requirements - what are the key features of the organizational context of the project - why the project will be successful
Company distills kentucky bourbon : Your company distills Kentucky bourbon. A Canadian competitor is selling "Kentucky bourbon" in Ontario, but its bourbon is made in Canada
Relationship of someland gdp to someland gnp : 1,000,000 people live and work in Someland. Of these 1,000,000 people, half are citizens of Someland. Additionally, there are 10,000 citizens of Someland, who live and work overseas in Finland. All residents and citizens of Someland produce $20,00..
Subject-customer behavior : Social media has been described as the new hybrid element of the promotion mix. When considering marketing and consumption communities and communication within groups,
What is the annual benefit for a person who retires : What is the annual benefit for a person who retires at age 64? At what retirement age does a person receive an annual benefit of $11,600?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Write a report on web security services using xml encryption

Write a report on Web security services using XML Encryption and Signatures. The report must have a title, an abstract, an introduction and at least one section that extensively reviews the literature you have read.

  Nap to reduce security risks

You discover that many of your company's customers have been responsible for introducing viruses and malware into the company network via the Internet

  Contact information for next of kin

The company also keeps information about each driver, such as Social Security number, name, birthdate, and contact information for next of kin. Buses travel to only one state per visit.

  Cracking password management protocols

Identify and describe any obstacles, and explain your solutions for them. Given the access policy, evaluate whether or not Extensible Access Control Markup Language (XACML) could be used to express the contextual attributes.

  Future of internet anonymity services

Discuss what you believe to be the most important lesson you have learnt as a result of these discussions. Explain the impact of this and its application/impact in real life.

  Formulas and charts of the investigation.

Epidemiological data and operational information about outbreaks is dynamic and changes rapidly. I have to develop a comprehensive Event Management System to manage critical information about an outbreak using.

  How does csma-ca in dcf handle media contention

How does CSMA/CA in DCF handle media contention

  Analyze three specific potential malicious attacks

Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization.

  What are critical points in determining intention of sandra

Explain what MBT and Sandra could have done to protect against controversy arising - what can be determined about whether Sandra intended to make Janet a gift of $1,000,000? What are the critical points in determining intention of Sandra?..

  Design a modern network for a private high school

Design a Modern Network for a Private High School. The network is proposed to achieve the above objectives considering the school's following business and technical goals.

  Difference between a private key and a secret key

Explain the difference between a private key and a secret key and describe and explain, at least, seven different physical characteristics

  A digital evidence and computer crime and technology and law

Digital Evidence, Computer Crime, Technology and Law- As digital criminals have become more sophisticated, security-related incidents have become substantially more diverse in nature, and their impact on society is increasingly more destructive.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd