Develop your evaluation study plan

Assignment Help Management Information Sys
Reference no: EM132190077

Technology Evaluation Study Plan - Detailed Assignment Description

Choose one of the student-written Technology Selection papers from the list posted by your instructor in the Week 7 conference.

Read your chosen Technology Selection paper to learn more about the selected technology. Next, consider what type of formal evaluation study could be used to learn more about this technology and how it is likely to interact with people, processes, and technologies.

Then, design a formal evaluation study which could be used to obtain more information about one or more of the following:

o characteristics (features and capabilities) of the technology

o interactions among technologies, people, environments, and processes (use cases or scenarios)

o risks or vulnerabilities associated with adoption of this technology

o costs and benefits associated with adoption of this technology

Choose Your Evaluation Method

Your evaluation study design must use one of the following:

o Case Study

o Delphi Study (panel of subject matter experts)

o Quasi-Experiment (e.g. penetration testing or pilot testing in a controlled environment)

o Pilot Implementation (in a demonstration environment)

See theTechnology Evaluation Methods module in the Week 2 conference for detailed descriptions of each of these types of evaluation methods.

Design Your Study

Identify the specific questions that your formal evaluation study will address. These questions must be security-focused (review the Pillars of Information Security and Pillars of Information Assurance for ideas).

Your design should include a description of the specific security issues which will be tested or security capabilities which will be evaluated. Use standard terminology when writing about security issues (see the rubric).

Develop Your Evaluation Study Plan

Use your study design to prepare a high-level plan for your evaluation study. Your plan must include the following:

o Introduction

description of the emerging technology and justification for including it in an evaluation study

o Research Question(s)

These must be security focused. Use the Five Pillars of Information Assurance and / or the Five Pillars of Information Security.

Use "how" or "what" questions (writing good "why" questions is beyond the scope of this course).

Examples

What vulnerabilities exist that could be attacked to compromise confidentiality?

How could an attacker compromise availability?

For each research question, provide a brief description of a scenario or use case which could be used to answer the question. Your description should be one paragraph (no longer).

o Methods

high level design of the study (focus upon the evaluation model and your research questions)

description of how the technology will be incorporated or used in the study (including specific security issues which will be tested or security capabilities which will be evaluated)

notional system or network architecture diagram showing the pilot test environment (only if you are doing a pilot study)

o Limitations or Special Considerations

any special considerations or security concerns which must be addressed (e.g. "clean room," test data sanitization, or isolation environment to prevent the pilot study from causing harm to operational systems)

o Timeline of Events (Notional)

 A notional timeline (expressed in days or months after start date) for your study

Notional Timeline of Events

The notional timeline of events (stated in days or months after start) that provides an estimate of how long you expect your evaluation study to take. For a Delphi Method study, your study could take as little as a day or two.

For a Delphi Method Study, include the number of "rounds" and how long each round will be (the time allotted for experts to consider information and reply back with their opinion on the questions or issues).For a case study, quasi-experimental, or pilot implementation design, your study may span several months; in this case, divide your timeline into phases (setup, testing, reporting).

Cost Estimate Is Not Required

Normally, an evaluation study plan will include a cost estimate. For this course, we will NOT be including cost elements in our evaluation study plans as the information required to developthese items is not readily available to students. If you wish to address this area of a study plan, limit your discussion to a brief listing of the cost elements (people, technologies, facilities) and state that a cost estimate will be provided separately.

Document Your Plan

Your Technology Evaluation Study Plan should be at least three pages in length but no more than tenpages (excluding the title page and references page).

This should be a high level design that can be read quickly. Your study plan must contain the five major sections defined above and comply with the formatting guidance provided by your instructor.

Reference no: EM132190077

Questions Cloud

Confidence interval for the true average amount : Construct a 99% confidence interval for the true average amount customer spend when this new feature is added to the incentive program.
Write a paper using given terms : The following terms are taken from a combination of the lecture notes, lectures, and assigned reading. Choose one of the terms below on the midterm.
Value of the test statistics : Translate this problem into a statistical hypothesis-testing problem and carry out the test. Be sure to give the null hypothesis and alternative hypothesis
Confidence level without using any past data : What would the population size need to be within 3 percentage points with a 95% confidence level without using any past data?
Develop your evaluation study plan : Identify the specific questions that your formal evaluation study will address. Develop Your Evaluation Study Plan.
Discuss about the catholic church : The Catholic Church deemed Luther a "protestant." Soon after, Europe became divided along confessional and territorial lines.
Explain scenario with the qa team conflict and resolution : As a java developer explain one scenario with the QA team conflict and resolution, with 4 slides, Neither textbooks nor Wikipedia can be used as references.
Benefits and disadvantages of the rfid system : A description of administrative procedures - human and process changes; any Changes in Organization policies or enhancements to include training requirements.
What did this person or event contribute : Finally, tell me why each term was significant or important. Think of it this way; "why do we care?" "why did we study this person, event, movement, etc."

Reviews

Write a Review

Management Information Sys Questions & Answers

  Decide how your organization should house its backups

Decide how your organization should house its backups. Your organization has approximately 10TB of data, and you need to decide if your organization should have on-site or offsite tape storage.

  Research article on emerging enterprise network applications

Research at least two articles on the topic of emerging enterprise network applications. Write a brief synthesis and summary of the two articles.

  What are the steps of the information processing cycle

CGS1030- What are the steps of the Information Processing Cycle? What are common components inside the system unit? Mention Some types of storage devices. What are the Categories of Computers?

  Is password sharing an acceptable behavior

Is Password Sharing an Acceptable Behavior? Write a 1- to 2-page paper discussing whether you agree or don't agree with him.

  Describe the different organizational structures

Discuss at least two (two) different roles that project managers can play in organizational leadership.

  Business process management

In this writing assignment, you will explore how organizations use business process management (BPM). Write a one-page (250-word) paper explaining how organizations use business process management (BPM). Be sure to use at least one specific example f..

  Discuss about the hd-dvd versus blu-ray

In recent times, HD-DVD and Blu-ray were competing technology formats for creating and watching movies on DVDs. Neither was compatible with the other. Eventually, Blu-ray won the competition. Use the Internet to research the competition between th..

  What are the responsibility of the systems analysts

How would you describe a programmer's primary responsibilities and contribution to the quality of the finished product? What are the responsibility of the systems analysts when training users

  Briefly scan the files and familiarize yourself with data

Use SAP analytics tools to analyze dataabout all of you and Make a analytic report to tell a story of your analysis with information visualization

  It-based systems and operational and financial risks-

it-based systems and operational and financial risks- discuss at least three to five advantages and disadvantages of

  Discuss a brief history of decision support systems

A Brief History of Decision Support Systems by D.J. Power (Editor, DSSRe-sources.com) describes the history of decision support systems.Historical Overview of Decision Support Systems (DSS) provides an overview of decision support systems.

  Explain the major cyber governance issues

Explain the major cyber governance issues in an organization and, because of those issues, examine how organizations develop communication protocols

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd