Illustrate interface that organizational users will utilize

Assignment Help Computer Network Security
Reference no: EM131175137

Information Systems Paper

Project Deliverable: Analytics, Interfaces, and Cloud Technology

This assignment consists of two sections: a design document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Large companies have been using the power of business analytics for quite a while now. Your company desires to get in on the action; company executives believe that using advanced data analysis will enable the company to make smarter decisions and improve business performance. Business analytics gives companies the ability to look at past realizations and performance as well as set up new expectations and performance goals. Analytics-as-a-Service is a new delivery model that uses cloud technology to provide business insights without enormous infrastructure enhancements. The executive team has heard great things about analytics and cloud technology but is apprehensive because they are unfamiliar with the look and feel of the technology. The executive team is interested in your recommendations and eagerly awaiting your forward-thinking viewpoint.

Section 1: Design Document

1. Write a four to six page design document in which you:

• Support the need for the use of analytics and cloud technology within this company.

• Create a workflow diagram to illustrate how analytics and cloud technology could align with the company's business processes. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.

• Create three to five screen layouts that illustrate the interface that organizational users will utilize. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.

• Give one recommendation for solution providers that could help your company secure a firm advantage by using analytics and cloud technology.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in MS Visio or Dia as an appendix of the design document. All references to these diagrams must be included in the body of the design document.

Section 2: Revised Project Plan

Use Microsoft Project to:

2. Update the project plan fromProject Deliverable 3: Database and Data Warehousing Design, with three to five new project tasks each consisting of five to ten sub-tasks.

The specific course learning outcomes associated with this assignment are:

• Demonstrate an understanding of existing and emerging information technologies, the functions of IS, and its impact on the organizational operations.

• Evaluate an organization through the lens of non-IT senior management in deciding how information systems enable core and supportive business processes as well as those that interface with suppliers and customers.

• Use technology and information resources to research issues in information systems.

• Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.

Reference no: EM131175137

Questions Cloud

Determine the following statements : Atmospheric pressure is about 80 kPa (absolute). Water pressure at the base of a water tower is 600 kPa (gauge).
Explain how unions human resources management personnel : Assess the following statement, "Workers in the modern workplaces of America are well protected and well supported." Explain whether you agree or disagree with this statement, based on what you now know about government interventions, unions, HRM,..
Difference between recirculating and noncirculating : What is the difference between recirculating and noncirculating hot water systems, and where would the circulating system most likely be used?
Research environment management issues : 1. Research environment management issues for the workplace and state why these issues should be taken into consideration when planning and managing an organisation operations.
Illustrate interface that organizational users will utilize : Create three to five screen layouts that illustrate the interface that organizational users will utilize. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.
How change in income affect the familys emergency fund needs : The Hernandez family is experiencing some financial pressures, even though the couple has a combined income of $66,000.- How will this change in income affect the family's emergency fund needs?
What types of accommodations might be requested for group : There are other groups that are also protected by the ADA. Does the law protect each of the groups listed below? What types of accommodations might be requested for each group?
Levels of conceptualizing leadership : Pick any one of these levels of conceptualizing leadership and argue that it is the most important and useful for defining, describing and explaining leadership: intra-individual, dyadic, group, OR organizational.
Which will pay her r1 million at the end of each year : Jia has just won a R20 million lottery, which will pay her R1 million at the end of each year for 20 years.- . What will you tell her?

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is the correct command syntax to force gpo settings

What is the correct command syntax to force GPO settings? Why is it important to set a strict password policy as part of your security template?

  Perspective of current hot topics in information security

Build an understanding and perspective of current hot topics in Information Security and build generic skills including

  What is data mining and why is it considered controversial

What exactly is "cyber ethics" How is it different from and similar to computer ethics information ethics and Internet ethics and Identify and describe some key aspects of each of the four phases in the evolution of cyber ethics as a field of app..

  Dos attackers use zombies to attack victims

Why do you think DoS attackers use zombies to attack victims instead of sending attack packets directly to victims? Come up with two reasons.

  Describe the crypto dilemma

AcmeStore is interviewing candidates for the position of Chief Information Officer (CIO). They are asking candidates to describe briefly how they would satisfy AcmeStore's requirements as stated above. How would a successful candidate respond?

  Incremental evaluation of a system

TCB subsets are said to leverage purely hierarchical domains ordered by privilege and explain the relation between these domains and protection rings.

  Selecting a programming language to develop secure software

The personnel manager asks you to follow up with a short paper to her briefly going over the topics you discussed. She would like the document as a memo, highlighting the subject areas you thought worthy enough to bring to her attention during the di..

  Increment value in one cell in excel

Discuss how to increment value in one cell in Excel if another cell is populated. or example, I have cell A that has values such as 1, 2, 3, 4 etc...

  What paperwork will be needed to reach eal7 certification

Essay Question:Secure software certification. Your present company (assignment#2) is at EAL4. You are the new program manager on this effort and your job is to bring your present software secure package to EAL7.

  Various methods of implementing rsa

Technical Guidelines: Study various methods of implementing RSA, a public-key cryptographic algorithm. Write time functions to help you conduct timing measurements for RSA.

  How does the event relate to issues addressed in cyber

Find a Cybersecurity-related current event, activity, or development in the news, briefly summarize the event and reflect on its significance, How does the event relate to issues addressed in cyber

  Describe two potential computer ethics issues associated

Describe two potential computer ethics issues associated with holding computers hostage. Propose two methods that computer users could use to prevent this type of attack.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd