Prepare preliminary report for australian federal government

Assignment Help Computer Network Security
Reference no: EM132279102 , Length: word count:2000

Task 1

Case Study: Connected Government

Connected government enables governments to connect seamlessly across functions, agencies and jurisdictions to deliver effective and efficient services to citizens and businesses.

Assignment Task

You are to prepare a preliminary report for the Australian Federal Government describing the benefits of intelligent enterprise design and Enterprise Information Architecture Reference Architecture (EIA RA) for developing a national E-Government system.

The intended audience for this report are government officials who may have knowledge of the government operations but limited computing knowledge.

Your report should follow the following template:

Executive Summary

Table of Contents

Table of Figures

1.0 Introduction

Intelligent Enterprise Design
Discuss the business vision for the future intelligent E-Government system. Use two example functions from the "Focus Area" in (Week 1) Information Analysis Evolution discussion file to explain the benefits of evolving from "Historical Reporting" to "Anticipate and Shape".
Function 1
Function 2

3.0 Enterprise Information Architecture Reference Architecture
Discuss the benefits an EIA RA approach can provide to guide development of an E- Government system. This discussion should expand on at least three of the identified benefits and should include at least one diagram providing an overview of the proposed system.

4.0 Conclusion & Recommendations References

Report Format

Your report should be around 2,000 words and it would be best to be no longer than 2,500 words long.

The report MUST be formatted using the following guidelines:
• Title Page - Must not contain headers, footers, or page numbering. Include your name as the report's author.
• Header - Report title
• Footer - your name and the page number
• Paragraph text - 12 point Calibri single line spacing
• Headings - Arial in an appropriate type size
• Margins - 2.5cm on all margins
• Page numbering
• Executive summary to the last page of Table of Figures to use roman numerals (i, ii, iii, iv)
• Introduction and onwards to use conventional numerals (1, 2, 3, 4) starting at page 1 from the introduction.
• The report is to be created as a single Microsoft Word document (version 2007 or later). No other format is acceptable and doing so will result in the deduction of marks.

Referencing

The report is to include (at least 5) appropriate references and these references should follow the Harvard method of referencing. Note that ALL references should be from journal articles, conference papers, technical papers or a recognized expert in the field. DO NOT use Wikipedia as a reference. The use of unqualified references will result in the deduction of marks.

Assignment Advice

1. The task of developing an EIA for E-Government would in practice would take a team of IT professionals hundreds of hours to complete. It is acknowledged that your time is constrained to several weeks and approx. 20 hrs work on this assignment, and as such this assignment is not so much about completing it but seeing how far you get.

2. Whole text books have been dedicated to the topic of EIA RA, thus in your discussion of EIA RA you will need firstly to be succinct, and secondly to be selective in describing aspects of EIA RA significant to an E-Government system.

3. It is not expected that you become an expert in E-Government, but it is expected that you demonstrate your research into the field as it pertains to EIA.

4. As this is a master's level course, you will be graded on your ability to put forward an argument supported by scholarly articles. Simply regurgitating the text book is not sufficient.

5. There is no correct answer and it is expected that students' answers will vary greatly, thus there is little chance of accidental plagiarism.

6. Ensure that you clearly understand the requirements for the assignment - what must be done and what are the deliverables.

7. If you do not understand any of the assignment requirements - Please ASK your tutor.

8. Each time you work on any aspect of the assignment reread the assignment requirements to ensure that what is required is clearly understood.

Attachment:- Data and System Integration.rar

Reference no: EM132279102

Questions Cloud

Which laws have been approved in your selected country : Which laws have been approved in your selected country to protect women against domestic violence?
Currency fluctuation : Currency Fluctuation. Who has the best currency exchange rate between them and the U.S?
Scenarios best exemplifies groupthink : Which of the following scenarios best exemplifies groupthink?
Define the most important element of a marketing plan : What do you believe is the most important element of a marketing plan? Provide your rationale for this statement. Provide three reasons why a company should.
Prepare preliminary report for australian federal government : ICT705 Data and System Integration - University of the Sunshine Coast - prepare a preliminary report for the Australian Federal Government describing
Measure the effectiveness of marketing videos : What are some of the key metrics that are used to measure the effectiveness of marketing videos?
About the five stages of group and team development : How might you have helped the group work through that stage differently based upon what you know now about the five stages of group and team development?
Store owner with the intention of using it to charge goods : An employee stole a credit card from the store owner with the intention of using it to charge goods.
What are the legal implications-record keeping requirements : What are the legal implications/record keeping requirements that were not met by Adam?

Reviews

len2279102

4/10/2019 2:38:09 AM

The report is to include (at least 5) appropriate references and these references should follow the Harvard method of referencing. Note that ALL references should be from journal articles, conference papers, technical papers or a recognized expert in the field. DO NOT use Wikipedia as a reference. The use of unqualified references will result in the deduction of marks.

len2279102

4/10/2019 2:37:49 AM

Late submission will be penalised according to the policy in the course outline. Please note Saturday and Sunday are included in the count of days late. Requests for an extension to an assignment MUST be made to the course coordinator prior to the date of submission and requests made on the day of submission or after the submission date will only be considered in exceptional circumstances. Assignment submission extensions will only be made using the official University guidelines.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd