Describe the implementation of your solution

Assignment Help Management Information Sys
Reference no: EM131453222

Term Paper Assignment- An Analysis of the Secom Case

Description

Secom - Managing Security in a Risky World is one of your required texts. It details the decision environment related to cybersecurity and in many ways illustrates the struggle between security and operations that has been discussed in your texts.

For this paper, I would like for you to read the case completely and answer the following using the materials in the case, the text and lectures, and the resources that I have provided to justify your answers:

1. Discuss the organization.

a. What business is it in?
b. What are its strengths and weaknesses?
c. What are their opportunites?
d. Who are their customers and what do they have to do to satisfy them?

2. Discuss the issue and decision factors.

a. What is the decision to be made in the case?
b. What facts are relevant to a solution? How are the relevant to the problem?
c. What are the decision criteria?

3. Discuss the alternative solutions.

a. What are the alternative solutions?
b. What is your evaluation of each alternative given the decision criteria? What are the pros and cons of each? (Back this up with some metrics, analytics, justifications from case, etc.)
c. Which solution do you think is best? Why? (Again, make a case here using facts!)

4. Describe the implementation of your solution.

a. What would your plan of action be to implement the solution? (Answer this by outlining your plan into who, what, where, when, why, and how.)
b. What do you think the results will be? Why? (One last time, you have to make a case for this using facts and research.)

So your paper should consist of five sections:

1. Executive Summary (Very brief summary of sections 2-5)
2. Introduction (Addresses Section 1 above)
3. Problem Description (Addresses Section 2 above)
4. Alternative Solutions (Addresses Section 3 above)
5. Solution Implementation (Addresses Section 4 above)
6. Conclusion (Summarizes sections 2-5 in more detail)

Some points of clarification.

1. There is no minimum or maximum page count. You are in graduate school. The paper should be as long as it needs to be for you to fully address sections above.

2. Times New Roman, 12 pt. font, 1" margins, double spaced.

3. APA formatting for all references in text and for the reference section (see the references section if you need help here.)

4. Be smart with how you construct your paper with respect to headings. If you give me 6 level one headings, it will make it much more difficult for me to discern whether or not you have addressed each area. Instead use the 6 level one headings, and answer each question within a level 2 heading dedicated to the issue that you are addressing.

5. There are case analysis and writing resources for you in the resources section.

Article: Secom: Managing Information Security in a Risky World by F. WARREN MCFARLAN, ROBERT D. AUSTIN, JUNKO USUBA and MASAKO EGAWA.

Reference no: EM131453222

Questions Cloud

Troubleshooting an ospf network : 1. Name one troubleshooting command you would use when troubleshooting an OSPF network. Explain what the command does and what field in particular.
Idle code and results and demonstrate : You can use the Snipping tools or screen print (ctrl + Print Screen) to show the IDLE code and results and demonstrate that your program executed correctly.
Define the line uptime efficiency : Solve Problem, except use the lower-bound approach in your analysis, in which the part is removed every time a breakdown COCCUS.
Should ab be held liable for simply stating what third party : Should ABC be held liable for simply stating what third parties - specifically critics of this type of food issue - might have called this unlabeled beef.
Describe the implementation of your solution : Discuss the issue and decision factors. Describe the implementation of your solution. What fact are relevant to a solution? How are the relevant to the problem?
Describe how you would handle any of the teenage status : In a list you make in your report specifically identify the status offense laws that are being violated by each of the underage teenage violators
Which back-end data sources : Which back-end data sources are supported by JDBC, ADO.NET, and PHP? Which are not covered? How is the gap handled by each technology so that web applications.
Determine the current line efficiency and production rate : the proposal is to divide the line into three stages, that is, with two storage buffers located between stations 10 and 11 and between stations 20 and 21.
Access and read what constitutes the crime of stalking : Access and read What Constitutes the Crime of Stalking? After reading, please address the items below: Provide a brief overview of the handout.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd