7-3 Final Project Submission: Business Systems Analysis Assignment

Task: Submit to complete this assignmentIn your final project, you will propose recommendations for the technology solution that best meets the needs of your business, including what your business owner must consider in regard to the security and privacy of company data.Additionally, you will incorporate the feedback you received on Milestone One and Milestone Two.To complete this assignment, review the Final Project Template and Final Project Guidelines And Rubric documents.IT 210 Final Project Guidelines and RubricOverviewTechnology has changed our lives drastically in the past twenty years. For example, consider the rise of mobile devices connected to the internet using wirelesscommunication. We have progressed from shopping solely in brick-and-mortar stores to having the ability to do anything from renting a vacation home topurchasing cupcakes online using a mobile device. To keep up with how consumers communicate, businesses have to incorporate these devices andtechnologies into their business models to reach customers. Developing appropriate technical solutions to business problems begins with defining, analyzing,and documenting the necessary requirements.For this project, you will play the role of an employee working for a small brick-and-mortar business. Your business is seeking to establish an online presence, butit must first invest in new technology. You will create a business systems analysis to provide the business owner with your recommendations for a technologysolution that will support her venture into e-commerce.The project is divided into two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality finalsubmissions. These milestones will be submitted in Modules Three and Five. The final product will be submitted in Module Seven. Use the Final Projecttemplate document to ensure you have met all requirements before submitting your final draft.In this assignment, you will demonstrate your mastery of the following course outcomes: Analyze a business organization for determining the business requirements related to information technology systems Articulate the role and function of information systems in business organizations for how they impact business operations Recommend appropriate information technology options for effectively supporting business operations Recommend basic security considerations related to business information systems for effectively securing company dataPromptImagine that you work for the small brick-and-mortar business described in the final project case scenario. The owner of your business wants to focus ongenerating new revenue through e-commerce, but she knows that this change in operations requires the company to integrate new technology. To gain anunderstanding of what the business might need for technology, she has asked you to create a business systems analysis. In this analysis, you will clearlyintroduce the problem that your business is facing. Then, you will determine the business requirements for solving that problem, including the requirementsthat any new technology needs to meet. Next, you will explain how your competitors are using the two technologies in which you are investing, to determine2whether those technologies are appropriate for your business. Finally, you will propose your recommendations for the technology solution that best meets theneeds of your business, including what your business owner must consider in regard to security and privacy of company data.Select two of the following technologies to focus on in your business systems analysis paper: Big data and knowledge management Wireless, mobile computing, and mobile commerce Social computing Cloud computing Business analytics and business intelligence solutions Intelligent systemsSpecifically, the following critical elements must be addressed:I. Introduction: In this section, you will briefly introduce the small business from the case scenario, and the problem that it is trying to solve.A. Clearly state the problem that the business owner is seeking to solve. Be sure to address the question of what your business ultimately wants todo.B. Identify and briefly describe the two technologies from the list provided that you will research in your business systems analysis.II. Business Requirements: In this section, you will determine what the business requirements are for solving the stated problem, and establish the criteriathat will help form your technology recommendations. You will also articulate why the business owner should undertake the project of integrating newtechnology.A. Explain the objectives of undertaking this project to integrate new technology. In others words, what should the project accomplish, and howdoes it support the goal of your business?B. Provide a project description that explains the purpose of the project. Be sure to address the following:i. What does your business need to do to satisfy the objectives?ii. What are the desired results at the end of the project?iii. Why is it important for your business owner to consider implementing new technology?C. State the key technological requirements that will be required of any new technology in order to effectively solve your business’s problem. Inother words, what specifically does the technology need to be capable of doing? (These are the technology requirements in the decision matrix.)3III. Competitors and Technology: In this section, you will describe two competing companies that operate in the same industry as your business. You willalso explain how a company uses the two technologies that you are investigating in order to determine if the technology may be appropriate for yourbusiness to use. Remember that a list of competing companies was provided to you in the final project case scenario.A. Technology One: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does andhow it uses this technology to support its business in general. Include specific examples.B. Technology Two: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does andhow it uses this technology to support its business in general. Include specific examples.C. Referring to what you learned in your research on the companies above, explain one specific way in which one of the companies is benefittingfrom technology, and describe the potential benefit to your business if you were to adopt the same approach.IV. Technology Solutions: In this section, you will discuss how each of the two technologies meets the technology requirements that you identified insection II. Use your decision matrix to guide your responses.A. Technology One: Explain how well this technology meets the technology requirements of your business. Be sure to address which technologyrequirements the technology meets, and where there are gaps.B. Technology Two: Explain how well this technology meets the technology requirements of your business. Be sure to address which technologyrequirements the technology meets, and where there are gaps.V. Recommendations: In this section, you will recommend the technology solution that you believe is most appropriate for your business based on howwell each technology meets your business’s technology requirements.A. Recommend a technology solution for your business, and defend why that solution is appropriate. You may recommend only one technology orany combination of the two that you investigated.B. Explain the overall benefit of your recommended technology solution to your business. Consider the following:C. How will it will it enhance efficiency?i. How will it position your business for future growth as you move online?VI. Basic Security Considerations: In this section, you will briefly explain what the owner of your business must consider in regard to security and privacy ifthey choose to adopt your recommendations.A. Explain the security features your recommended technology solution should have.B. Briefly explain what your business should consider in regard to security and privacy as you seek out third-party vendors for the proposedtechnology.C. Briefly describe the internal safeguards that should be put in place in your business to guard against loss or misuse of company data. Provideexamples.4MilestonesMilestone One: Introduction, Business Requirements, and Competitors and TechnologyIn Module Three, you will submit the first milestone, in which you will develop your problem statement, technology requirements, and suggested technologiesfor your final project. This milestone will be graded with the Milestone One Rubric.Milestone Two: Technology Solutions and RecommendationsIn Module Five, you will submit the second milestone, in which you will research competitors and analyze the technologies they are using. This milestone will begraded with the Milestone Two Rubric.Module Seven: Basic Security ConsiderationsPlease note you will not engage in Milestone work for Part VI of your final project, Basic Security Considerations. However, you will have an opportunity to workthrough the information that will inform this part of your project in Module Seven as well as to ask your peers and instructors any questions you have in thetopic. At this point you should be able to finish this part of your final project and submit the completed draft with all pieces.Final Submission: Business Systems AnalysisIn Module Seven, you will submit your final project. It should be a complete, polished artifact containing all of the critical elements of the final product. It shouldreflect the incorporation of feedback gained throughout the course. This submission will be graded with the Final Project Rubric.5Final Project RubricGuidelines for Submission: Using the Final Project Template, your business systems analysis should be 6–7 pages in length (not including a cover page andreferences) and written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins.Critical Elements Exemplary Proficient Needs Improvement Not Evident ValueIntroduction: Statethe ProblemClearly states the problem thatthe business owner is seekingto solve (100%)States the problem that thebusiness owner is seeking tosolve, but response is unclearor contains inaccuracies (55%)Does not state the problemthat the business owner isseeking to solve (0%)5.94Introduction: TwoTechnologiesIdentifies and briefly describesthe two technologies that thestudent will research inbusiness systems analysis(100%)Identifies the two technologiesthat the student will researchin business systems analysis,but does not describe them, ordescription containsinaccuracies (55%)Does not identify the twotechnologies that the studentwill research in businesssystems analysis (0%)5.94BusinessRequirements:ObjectivesMeets “Proficient” criteria,and explanationdemonstrates sophisticatedawareness of the project’sobjectives (100%)Explains the objectives ofproject to integrate newtechnology (85%)Explains the objectives ofproject to integrate newtechnology, but explanation iscursory or illogical or containsinaccuracies (55%)Does not explain the objectivesof project (0%)5.94BusinessRequirements:Project DescriptionMeets “Proficient” criteria,and project descriptionprovided demonstrates keeninsight into the purpose ofthe project (100%)Provides a project descriptionthat explains the purpose ofthe project (85%)Provides a project descriptionthat explains the purpose ofthe project, but description isillogical, contains inaccuracies,or is missing requiredcomponents (55%)Does not provide a projectdescription (0%)5.94BusinessRequirements:TechnologicalRequirementsMeets “Proficient” criteria,and response demonstrates asophisticated awareness ofwhat the new technologymust be capable of doing forthe business (100%)Describes the key technologicalrequirements that will berequired of any newtechnology to effectively solvethe business’s problem (85%)Describes the key technologicalrequirements that will berequired of any newtechnology to effectively solvethe business’s problem, butdescription is missing keyrequirements or containsinaccuracies (55%)Does not describe the keytechnological requirementsthat will be required of anynew technology (0%)5.946Competitors andTechnology:Technology OneMeets “Proficient” criteria,and explanationdemonstrates keen insightinto the role and function ofthe technology in thecompeting company (100%)Briefly describes what theselected competing companydoes and explains how it usesthe technology to support itsbusiness, and includes specificexamples (85%)Briefly describes what theselected competing companydoes and explains how it usesthe technology to support itsbusiness, but does not includespecific examples, or examplesare inappropriate, orexplanation is cursory orcontains inaccuracies (55%)Does not briefly describe whatthe selected competingcompany does or explain howit uses the technology tosupport its business (0%)5.94Competitors andTechnology:Technology TwoMeets “Proficient” criteria,and explanationdemonstrates keen insightinto the role and function ofthe technology in thecompeting company (100%)Briefly describes what theselected competing companydoes and explains how it usesthe technology to support itsbusiness, and includes specificexamples (85%)Briefly describes what theselected competing companydoes and explains how it usesthe technology to support itsbusiness, but does not includespecific examples, or examplesare inappropriate, orexplanation is cursory orcontains inaccuracies (55%)Does not briefly describe whatthe selected competingcompany does or explain howit uses the technology tosupport its business (0%)5.94Competitors andTechnology:Benefitting FromTechnologyMeets “Proficient” criteria,and descriptiondemonstrates keen insightinto how the potentialtechnology could provide abenefit to the business(100%)Explains one specific way inwhich one of the competingcompanies is benefitting fromtechnology, and describes thepotential benefit to thebusiness from the scenario ifthey were to adopt the sameapproach (85%)Explains one specific way inwhich one of the competingcompanies is benefitting fromtechnology, but does notdescribe the potential benefitto the business from thescenario, or description iscursory or illogical (55%)Does not explain one specificway in which one of thecompeting companies isbenefitting from technology(0%)5.94TechnologySolutions:Technology OneMeets “Proficient” criteria,and explanationdemonstrates a sophisticatedawareness of how well thetechnology meets the needsof the business (100%)Explains how well thistechnology meets thetechnology requirements ofthe business (85%)Explains how well thistechnology meets thetechnology requirements ofthe business, but explanationcontains inaccuracies or ismissing required components(55%)Does not explain how well thistechnology meets thetechnology requirements ofthe business (0%)5.947TechnologySolutions:Technology TwoMeets “Proficient” criteria,and explanationdemonstrates a sophisticatedawareness of how well thetechnology meets the needsof the business (100%)Explains how well thistechnology meets thetechnology requirements ofthe business (85%)Explains how well thistechnology meets thetechnology requirements ofthe business, but explanationcontains inaccuracies or ismissing required components(55%)Does not explain how well thistechnology meets thetechnology requirements ofthe business (0%)5.94Recommendations:TechnologySolutionMeets “Proficient” criteria,and defense demonstrates acomplex grasp of how therecommended technologymeets needs of the business(100%)Recommends a technologysolution for the business anddefends why that solution isappropriate (85%)Recommends a technologysolution for the business, butdoes not defend why thatsolution is appropriate, ordefense is illogical or containsinaccuracies (55%)Does not recommend atechnology solution for thebusiness (0%)5.94Recommendations:Overall BenefitMeets “Proficient” criteria,and explanationdemonstrates keen insightinto how the business couldbenefit from therecommended technologysolution (100%)Explains the overall benefit ofthe recommended technologysolution to the business (85%)Explains the overall benefit ofthe recommended technologysolution to the business, butexplanation is cursory orillogical or containsinaccuracies (55%)Does not explain the overallbenefit of the recommendedtechnology solution to thebusiness (0%)5.94Basic SecurityConsiderations:Security FeaturesMeets “Proficient” criteria,and descriptiondemonstrates a complexgrasp of security featuresnecessary for protectingcompany data (100%)Describes the basic securityfeatures the recommendedtechnology solution shouldhave in order to protectcompany data (85%)Describes the basic securityfeatures the recommendedtechnology solution shouldhave, but description is cursoryor illogical (55%)Does not describe the basicsecurity features therecommended technologysolution should have (0%)7.92Basic SecurityConsiderations:Third-PartyVendorsMeets “Proficient” criteria,and explanationdemonstrates a complexgrasp of securityconsiderations in regard topotential third-party vendors(100%)Briefly explains what thebusiness should consider inregard to security and privacyas it seeks out third-partyvendors for the proposedtechnology (85%)Briefly explains what thebusiness should consider inregard to security and privacyas it seeks out third-partyvendors, but explanation iscursory or illogical or containsinaccuracies (55%)Does not explain what thebusiness should consider inregard to security and privacyas it seeks out third-partyvendors for the proposedtechnology (0%)7.928Basic SecurityConsiderations:Internal SafeguardsMeets “Proficient” criteria,and description provideskeen insight into what thebusiness can do internally toprotect company data(100%)Briefly describes the internalsafeguards that should be putin place in the business toguard against loss or misuse ofcompany data, and providesexamples (85%)Describes the internalsafeguards that should be putin place in the business toguard against loss or misuse ofcompany data, but does notprovide examples, ordescription is cursory orillogical (55%)Does not describe the internalsafeguards that should be putin place in the business toguard against loss or misuse ofcompany data (0%)7.92Articulation ofResponseSubmission is free of errorsrelated to citations,grammar, spelling, syntax,and organization and ispresented in a professionaland easy-to-read format(100%)Submission has no majorerrors related to citations,grammar, spelling, syntax, ororganization (85%)Submission has major errorsrelated to citations, grammar,spelling, syntax, ororganization that negativelyimpact readability andarticulation of main ideas(55%)Submission has critical errorsrelated to citations, grammar,spelling, syntax, ororganization that preventunderstanding of ideas (0%)4.96Total 100%

Don't use plagiarized sources. Get Your Custom Essay on
7-3 Final Project Submission: Business Systems Analysis Assignment
Just from $13/Page
Order Essay
Calculator

Calculate the price of your paper

Total price:$26
Our features

We've got everything to become your favourite writing service

Need a better grade?
We've got you covered.

Order your paper