How byod is utilised and its associated risks

Assignment Help Basic Computer Science
Reference no: EM13189314

You are the CIO of a successful accounting firm with offices in cities across the nation.  You recently attended a technology seminar on BYOD (Bring Your Own Device).   It occurred to you that this would offer potential benefits to your organisation and would be well-received by staff.

At the seminar you learnt there were many issues to consider, policies to be developed or modified, and new investments to be made to manage a BYOD environment. These included upgrading your ICT Data Security System to accommodate BYOD to protect clients' and your firm's data; this needs to synchronise and ensure the integrity of data on servers and end-user devices.

You plan to present your vision for BYOD to your CEO, Board and executives. You are required to research the background for a project to implement and manage BYOD, use Microsoft Excel to model a business plan, perform sensitivity analysis to validate assumptions, and create a presentation to seek funding and authorisation from senior management to implement and manage BYOD.

As Board members and executives are dispersed across the nation you plan to use YouTube for your presentation.

Activity A: Journal

Prepare a journal which records your activities and progress related to completing this assignment. In date order, clearly list the following:

? Date of research activity/discussion

? Topic researched or discussed

? Time duration

? Brief description of research activity/discussion.

Submit this journal as a separate report. Your journal must provide all these activity details to be awarded marks.

A sample of the journal will be provided in the StudyDesk.

Activity B: Presentation to Senior Management

NOTE: If you are unfamiliar with the business caseand sensitivity analysis concepts you should make an effort to read appropriate material, including those from the Internet, to learn about them.

Before you commence this assignment ensure you have completed Hands-on MIS Project # 1 to 5 in Appendix S.1 in the Study Book.  These exercises are designed to familiarise you with the software, techniques and methods used inthe assignment.

 Part 1: Researchthe background for the BYOD project

Conduct an Internet search to gather relevant background information of BYOD.   In particular, you should address the following:

1. How BYOD is utilised and its associated risks

2. Experiences of other companies

3. Advantages and disadvantages

4. The infrastructure required, and

5. Best-practice for how BYOD should be managed.

Part 2: Develop the Excel model of the business case

Once you have completed Part 1, develop a spread-sheet model of your business costs. Some of the materials provided in the MIS Projects may help you to come up with a simple modelling. For the purpose of modelling, assume a discount rateof 10 percent. Your business model should include the following analysis to ascertain the financial viability of the project:

1. Payback period

2. Net present value (NPV)

3. Internal rate of return (IRR), and

4. Profitability index

 HINTS: To obtain the payback period you would first need to calculate the cumulative net cash flow.  Use the NPV and IRR functions provided in Microsoft Excel. You may need to search the Internet for information if you are not familiar with how to use these functions.

Interpret your results.  Use the note in MIS Project #4 - Capital Budgeting Methods for Information System Investmentsto guide you.

 Part 3: Perform a sensitivity analysis for the business case

Using theresults you obtained inPart 2 as the base case, conduct a sensitivity analysis to examine the impact of the criticalcost and benefit variableson the viability of theBYOD project. Provide three specific scenarios of consideration. You must clearly specify the basis of the three scenarios i.e. which critical cost variables they are examining in the sensitivity analysis

Carefully analyse your results and make appropriate recommendations to the company's senior management as to how the critical cost variables should be managed to ensure that the BYOD project is both viable and sustainable in the long term.

Part 4: Create apresentation to senior management

4.1 Consolidate and cross-analyse your results and findings from Part 1, 2 and 3.  Then prepare a presentation to the company's senior management to seek their financial support and authorisation to embark on the project.

All projects must submit a recorded audio/visual Presentation of their project. Examples for type of presentation:

1. MP4 video of live or Skype presentation or

2. MP4 video ofPowerPoint presentation or

3. Powerpoint presentation.

YouTube is the preferred mode for submission; if you are in a country that does not have access to YouTube or there are other issues preventing you from posting to YouTube then you must submit a PowerPoint presentation with embedded autoplaying audio through EASE.

If you do not wish for your video in YouTube to be publically available then you may use options of YouTube such as having your video in a closed group. You are responsible for ensuring the link to your YouTube video will work for the person marking your assignment - you should ask someone to test it.

As a guide, if using PowerPoint your presentation should comprise no more than 15 slides, should be developed and structured according to the following:

  • The presentation should be made up of :

­   An introduction: your FIRST slide should show the title of your presentation and details of the author(s); the SECOND slide should provide the agenda i.e. outline ofyour presentation; the THIRD slide should clearly state the purpose of your presentation and what you want to achieve from it.

­   A body: contains the results and findings from Part 1, 2 and 3.

­   A conclusion: recapsthe main points andsummarises your recommendations.

­   Lessons learned: Two slides highlighting lessons learned from conducting this project.

  • The LAST slide should contain a "List of references". There should be at least 8 references (including those from Internet sources) and they should be listed according to the Harvard referencing convention as described in Chapter 2 (referencing) of the Communication Skills Handbook 3ed.
  • Insert Excel tables and charts and suitable graphicsat appropriate places in your presentation to reinforce your argument.
  • Search theInternet for information and guidance on how to produce an effective PowerPoint presentation, including the slide design and layout.
  • Ensure that your PowerPoint file does not exceed the specified size indicated in EASEotherwise you would not be able to upload your work.

Reference no: EM13189314

Questions Cloud

Network of trade routes called the silk roads : What ways did the network of trade routes called the silk roads make life during the classical era a significantly different from life in the preclassical world? Consider all the different effects and the various cultures involved.
Find the maclaurin polynomial : Find the Maclaurin polynomial Tn.x/ (for a general n) for the function f .x/ D 2x.
Discuss the importance for comparative analysis : Can you do me a favor to explain the meaning of "Discuss the importance for comparative analysis?"  For example, I chose a word:"Westminster model". I can identify it: The British system of parliamentary sovereignty, prime ministerial government, and..
How the disaster of costa concordia off the coast of italy : In the cruise industry, one third of reservations are booked from january to march. Explain and diagrammatically show how the disaster of the costa concordia off the coast of italy will affect the market for cruises.
How byod is utilised and its associated risks : Conduct an Internet search to gather relevant background information of BYOD - how BYOD is utilised and its associated risks
Determine what the first equation should be : How does the author determine what the first equation should be? What about the second equation? How are these examples similar? How are they different?
What is the volume of the solid generated by rotating : What is the volume of the solid generated by rotating about the x -axis the plane region bounded by y = - x 2, y = 0, x = - 1, and x = 1?
The standard costs and actual costs for factory overhead : The standard costs and actual costs for factory overhead for the manufacture of 2,500 units of actual production are as follows:
An organization''s short-term investment options : An organization's short-term investment options for idle cash includes what four areas? List and provide thier characteristics.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Websites be required to adhere to section standards

what is the purpose then? Do you think that all websites should be required to adhere to Section 508 standards? Why or why not?

  Modify the addressing properties of workstations

Is ther a way you could modify the addressing properties of the workstations at each small office remotely, without having to visit those offices? Why or Why not?

  Explain effects of fiscal policies on economy-s production

Explain effects of fiscal policies on economy's production and employment. How do changes in government spending and taxes positively or negatively influence economy's production and employment?

  Write subroutine in marie assembly that multiplies two value

Write a subtoutine in MARIE assembly that multiplies two values where the arguments for this subroutine are two pointers (each pointer pointing to a value). The routube, multiply (a,b), performs *a x *b where a's value is the address storing the valu..

  Marie program that will input a variable

To develop a MARIE program that will input a variable number of user entered Decimal whole number grades, validating each one (0-100) in a subroutine

  Write a program to prompt the user to enter a postfix expres

Write a program to prompt the user to enter a postfix expression. When the user presses enter, the stack based method for constructing expression trees will be executed

  Find a recurrence relation for the number

Find a recurrence relation for the number of bit strings that contain the string 01 . what are the initial condition , and how many bit strings of length seven contain the string 01. please explain it fully step by step to better undestand

  Method named printgrid

Write a method named printGrid that accepts two integer parameters rows and cols. The output is a comma-separated grid of numbers where the first parameter (rows) represents the number of rows of the grid and the second parameter (cols) represents th..

  Each cycle in an instruction cycle

Suppose each cycle in an instruction cycle takes an average of 5 clock cycles. Determine the number of clock cycles needed to process 10 instructions without and with a pipeline

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Performance of receiver-initiated load sharing algorithm

Predict the performance of receiver-initiated load sharing algorithm when entire system workload is generated at only a few nodes in the system instead of equally.

  Using the expand, guess, and verify method find closed

Using the expand, guess, and verify method find closed form solutions for the following recurrence relations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd