+1(978)310-4246 credencewriters@gmail.com
  

Description

IT 210 Final Project Guidelines and Rubric
Overview
Technology has changed our lives drastically in the past twenty years. For example, consider the rise of mobile devices connected to the internet using wireless
communication. We have progressed from shopping solely in brick-and-mortar stores to having the ability to do anything from renting a vacation home to
purchasing cupcakes online using a mobile device. To keep up with how consumers communicate, businesses have to incorporate these devices and
technologies into their business models to reach customers. Developing appropriate technical solutions to business problems begins with defining, analyzing,
and documenting the necessary requirements.
For this project, you will play the role of an employee working for a small brick-and-mortar business. Your business is seeking to establish an online presence, but
it must first invest in new technology. You will create a business systems analysis to provide the business owner with your recommendations for a technology
solution that will support her venture into e-commerce.
The project is divided into two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Modules Three and Five. The final product will be submitted in Module Seven. Use the Final Project
template document to ensure you have met all requirements before submitting your final draft.
In this assignment, you will demonstrate your mastery of the following course outcomes:
ï‚·
ï‚·
ï‚·
ï‚·
Analyze a business organization for determining the business requirements related to information technology systems
Articulate the role and function of information systems in business organizations for how they impact business operations
Recommend appropriate information technology options for effectively supporting business operations
Recommend basic security considerations related to business information systems for effectively securing company data
Prompt
Imagine that you work for the small brick-and-mortar business described in the final project case scenario. The owner of your business wants to focus on
generating new revenue through e-commerce, but she knows that this change in operations requires the company to integrate new technology. To gain an
understanding of what the business might need for technology, she has asked you to create a business systems analysis. In this analysis, you will clearly
introduce the problem that your business is facing. Then, you will determine the business requirements for solving that problem, including the requirements
that any new technology needs to meet. Next, you will explain how your competitors are using the two technologies in which you are investing, to determine
1
whether those technologies are appropriate for your business. Finally, you will propose your recommendations for the technology solution that best meets the
needs of your business, including what your business owner must consider in regard to security and privacy of company data.
Select two of the following technologies to focus on in your business systems analysis paper:
ï‚·
ï‚·
ï‚·
ï‚·
ï‚·
ï‚·
Big data and knowledge management
Wireless, mobile computing, and mobile commerce
Social computing
Cloud computing
Business analytics and business intelligence solutions
Intelligent systems
Specifically, the following critical elements must be addressed:
I.
Introduction: In this section, you will briefly introduce the small business from the case scenario, and the problem that it is trying to solve.
A. Clearly state the problem that the business owner is seeking to solve. Be sure to address the question of what your business ultimately wants to
do.
B. Identify and briefly describe the two technologies from the list provided that you will research in your business systems analysis.
II.
Business Requirements: In this section, you will determine what the business requirements are for solving the stated problem, and establish the criteria
that will help form your technology recommendations. You will also articulate why the business owner should undertake the project of integrating new
technology.
A. Explain the objectives of undertaking this project to integrate new technology. In others words, what should the project accomplish, and how
does it support the goal of your business?
B. Provide a project description that explains the purpose of the project. Be sure to address the following:
i.
What does your business need to do to satisfy the objectives?
ii.
What are the desired results at the end of the project?
iii.
Why is it important for your business owner to consider implementing new technology?
C. State the key technological requirements that will be required of any new technology in order to effectively solve your business’s problem. In
other words, what specifically does the technology need to be capable of doing? (These are the technology requirements in the decision matrix.)
2
III.
Competitors and Technology: In this section, you will describe two competing companies that operate in the same industry as your business. You will
also explain how a company uses the two technologies that you are investigating in order to determine if the technology may be appropriate for your
business to use. Remember that a list of competing companies was provided to you in the final project case scenario.
A. Technology One: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and
how it uses this technology to support its business in general. Include specific examples.
B. Technology Two: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and
how it uses this technology to support its business in general. Include specific examples.
C. Referring to what you learned in your research on the companies above, explain one specific way in which one of the companies is benefitting
from technology, and describe the potential benefit to your business if you were to adopt the same approach.
IV.
Technology Solutions: In this section, you will discuss how each of the two technologies meets the technology requirements that you identified in
section II. Use your decision matrix to guide your responses.
A. Technology One: Explain how well this technology meets the technology requirements of your business. Be sure to address which technology
requirements the technology meets, and where there are gaps.
B. Technology Two: Explain how well this technology meets the technology requirements of your business. Be sure to address which technology
requirements the technology meets, and where there are gaps.
V.
Recommendations: In this section, you will recommend the technology solution that you believe is most appropriate for your business based on how
well each technology meets your business’s technology requirements.
A. Recommend a technology solution for your business, and defend why that solution is appropriate. You may recommend only one technology or
any combination of the two that you investigated.
B. Explain the overall benefit of your recommended technology solution to your business. Consider the following:
C. How will it will it enhance efficiency?
i.
How will it position your business for future growth as you move online?
VI.
Basic Security Considerations: In this section, you will briefly explain what the owner of your business must consider in regard to security and privacy if
they choose to adopt your recommendations.
A. Explain the security features your recommended technology solution should have.
B. Briefly explain what your business should consider in regard to security and privacy as you seek out third-party vendors for the proposed
technology.
C. Briefly describe the internal safeguards that should be put in place in your business to guard against loss or misuse of company data. Provide
examples.
3
Milestones
Milestone One: Introduction, Business Requirements, and Competitors and Technology
In Module Three, you will submit the first milestone, in which you will develop your problem statement, technology requirements, and suggested technologies
for your final project. This milestone will be graded with the Milestone One Rubric.
Milestone Two: Technology Solutions and Recommendations
In Module Five, you will submit the second milestone, in which you will research competitors and analyze the technologies they are using. This milestone will be
graded with the Milestone Two Rubric.
Module Seven: Basic Security Considerations
Please note you will not engage in Milestone work for Part VI of your final project, Basic Security Considerations. However, you will have an opportunity to work
through the information that will inform this part of your project in Module Seven as well as to ask your peers and instructors any questions you have in the
topic. At this point you should be able to finish this part of your final project and submit the completed draft with all pieces.
Final Submission: Business Systems Analysis
In Module Seven, you will submit your final project. It should be a complete, polished artifact containing all of the critical elements of the final product. It should
reflect the incorporation of feedback gained throughout the course. This submission will be graded with the Final Project Rubric.
4
Final Project Rubric
Guidelines for Submission: Using the Final Project Template, your business systems analysis should be 6–7 pages in length (not including a cover page and
references) and written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins.
Critical Elements
Introduction: State
the Problem
Exemplary
Introduction: Two
Technologies
Business
Requirements:
Objectives
Business
Requirements:
Project Description
Business
Requirements:
Technological
Requirements
Proficient
Clearly states the problem that
the business owner is seeking
to solve (100%)
Identifies and briefly describes
the two technologies that the
student will research in
business systems analysis
(100%)
Meets “Proficient” criteria,
and explanation
demonstrates sophisticated
awareness of the project’s
objectives (100%)
Meets “Proficient” criteria,
and project description
provided demonstrates keen
insight into the purpose of
the project (100%)
Explains the objectives of
project to integrate new
technology (85%)
Meets “Proficient” criteria,
and response demonstrates a
sophisticated awareness of
what the new technology
must be capable of doing for
the business (100%)
Describes the key technological
requirements that will be
required of any new
technology to effectively solve
the business’s problem (85%)
Provides a project description
that explains the purpose of
the project (85%)
5
Needs Improvement
States the problem that the
business owner is seeking to
solve, but response is unclear
or contains inaccuracies (55%)
Identifies the two technologies
that the student will research
in business systems analysis,
but does not describe them, or
description contains
inaccuracies (55%)
Explains the objectives of
project to integrate new
technology, but explanation is
cursory or illogical or contains
inaccuracies (55%)
Provides a project description
that explains the purpose of
the project, but description is
illogical, contains inaccuracies,
or is missing required
components (55%)
Describes the key technological
requirements that will be
required of any new
technology to effectively solve
the business’s problem, but
description is missing key
requirements or contains
inaccuracies (55%)
Not Evident
Does not state the problem
that the business owner is
seeking to solve (0%)
Value
5.94
Does not identify the two
technologies that the student
will research in business
systems analysis (0%)
5.94
Does not explain the objectives
of project (0%)
5.94
Does not provide a project
description (0%)
5.94
Does not describe the key
technological requirements
that will be required of any
new technology (0%)
5.94
Competitors and
Technology:
Technology One
Meets “Proficient” criteria,
and explanation
demonstrates keen insight
into the role and function of
the technology in the
competing company (100%)
Briefly describes what the
selected competing company
does and explains how it uses
the technology to support its
business, and includes specific
examples (85%)
Competitors and
Technology:
Technology Two
Meets “Proficient” criteria,
and explanation
demonstrates keen insight
into the role and function of
the technology in the
competing company (100%)
Briefly describes what the
selected competing company
does and explains how it uses
the technology to support its
business, and includes specific
examples (85%)
Competitors and
Technology:
Benefitting From
Technology
Meets “Proficient” criteria,
and description
demonstrates keen insight
into how the potential
technology could provide a
benefit to the business
(100%)
Technology
Solutions:
Technology One
Meets “Proficient” criteria,
and explanation
demonstrates a sophisticated
awareness of how well the
technology meets the needs
of the business (100%)
Explains one specific way in
which one of the competing
companies is benefitting from
technology, and describes the
potential benefit to the
business from the scenario if
they were to adopt the same
approach (85%)
Explains how well this
technology meets the
technology requirements of
the business (85%)
6
Briefly describes what the
selected competing company
does and explains how it uses
the technology to support its
business, but does not include
specific examples, or examples
are inappropriate, or
explanation is cursory or
contains inaccuracies (55%)
Briefly describes what the
selected competing company
does and explains how it uses
the technology to support its
business, but does not include
specific examples, or examples
are inappropriate, or
explanation is cursory or
contains inaccuracies (55%)
Explains one specific way in
which one of the competing
companies is benefitting from
technology, but does not
describe the potential benefit
to the business from the
scenario, or description is
cursory or illogical (55%)
Explains how well this
technology meets the
technology requirements of
the business, but explanation
contains inaccuracies or is
missing required components
(55%)
Does not briefly describe what
the selected competing
company does or explain how
it uses the technology to
support its business (0%)
5.94
Does not briefly describe what
the selected competing
company does or explain how
it uses the technology to
support its business (0%)
5.94
Does not explain one specific
way in which one of the
competing companies is
benefitting from technology
(0%)
5.94
Does not explain how well this
technology meets the
technology requirements of
the business (0%)
5.94
Technology
Solutions:
Technology Two
Meets “Proficient” criteria,
and explanation
demonstrates a sophisticated
awareness of how well the
technology meets the needs
of the business (100%)
Explains how well this
technology meets the
technology requirements of
the business (85%)
Recommendations:
Technology
Solution
Meets “Proficient” criteria,
and defense demonstrates a
complex grasp of how the
recommended technology
meets needs of the business
(100%)
Meets “Proficient” criteria,
and explanation
demonstrates keen insight
into how the business could
benefit from the
recommended technology
solution (100%)
Meets “Proficient” criteria,
and description
demonstrates a complex
grasp of security features
necessary for protecting
company data (100%)
Meets “Proficient” criteria,
and explanation
demonstrates a complex
grasp of security
considerations in regard to
potential third-party vendors
(100%)
Recommends a technology
solution for the business and
defends why that solution is
appropriate (85%)
Recommendations:
Overall Benefit
Basic Security
Considerations:
Security Features
Basic Security
Considerations:
Third-Party
Vendors
Explains how well this
technology meets the
technology requirements of
the business, but explanation
contains inaccuracies or is
missing required components
(55%)
Recommends a technology
solution for the business, but
does not defend why that
solution is appropriate, or
defense is illogical or contains
inaccuracies (55%)
Explains the overall benefit of
the recommended technology
solution to the business, but
explanation is cursory or
illogical or contains
inaccuracies (55%)
Does not explain how well this
technology meets the
technology requirements of
the business (0%)
5.94
Does not recommend a
technology solution for the
business (0%)
5.94
Does not explain the overall
benefit of the recommended
technology solution to the
business (0%)
5.94
Describes the basic security
features the recommended
technology solution should
have in order to protect
company data (85%)
Describes the basic security
features the recommended
technology solution should
have, but description is cursory
or illogical (55%)
Does not describe the basic
security features the
recommended technology
solution should have (0%)
7.92
Briefly explains what the
business should consider in
regard to security and privacy
as it seeks out third-party
vendors for the proposed
technology (85%)
Briefly explains what the
business should consider in
regard to security and privacy
as it seeks out third-party
vendors, but explanation is
cursory or illogical or contains
inaccuracies (55%)
Does not explain what the
business should consider in
regard to security and privacy
as it seeks out third-party
vendors for the proposed
technology (0%)
7.92
Explains the overall benefit of
the recommended technology
solution to the business (85%)
7
Basic Security
Considerations:
Internal Safeguards
Meets “Proficient” criteria,
and description provides
keen insight into what the
business can do internally to
protect company data
(100%)
Briefly describes the internal
safeguards that should be put
in place in the business to
guard against loss or misuse of
company data, and provides
examples (85%)
Articulation of
Response
Submission is free of errors
related to citations,
grammar, spelling, syntax,
and organization and is
presented in a professional
and easy-to-read format
(100%)
Submission has no major
errors related to citations,
grammar, spelling, syntax, or
organization (85%)
Describes the internal
safeguards that should be put
in place in the business to
guard against loss or misuse of
company data, but does not
provide examples, or
description is cursory or
illogical (55%)
Submission has major errors
related to citations, grammar,
spelling, syntax, or
organization that negatively
impact readability and
articulation of main ideas
(55%)
Does not describe the internal
safeguards that should be put
in place in the business to
guard against loss or misuse of
company data (0%)
7.92
Submission has critical errors
related to citations, grammar,
spelling, syntax, or
organization that prevent
understanding of ideas (0%)
4.96
Total
8
100%
IT 210: Business Systems Analysis
[This is an APA-formatted template for the final project: Please be sure to remove ALL of the
example content from this document prior to submission, as it is only there to help and provide
examples. Example content is highlighted and surrounded with brackets within the document.]
IT 210: Business Systems Analysis
2
Contents
Introduction
5
Problem Statement
5
Two Technologies
5
Business Requirements
5
Objectives
5
Project Description
5
Key Technology Requirements
6
Competitors and Technology
6
Technology One [Replace heading with the technology selected (e.g., Social Media)]
6
Technology Two [Replace heading with the technology selected (e.g., Social Media)]
6
Technology Solutions
7
Technology One
7
Technology Two
7
Recommendations
8
Technology Solution
8
Overall Benefit
8
Security Considerations
Security Features
8
8
IT 210: Business Systems Analysis
3
Third-Party Vendors
8
Internal Safeguards
9
References
10
[Footnotes]
11
[Tables]
12
[Figures title:]
13
IT 210: Business Systems Analysis
4
Final Paper
Introduction [Your Introduction must include the following two elements at a minimum]
Problem Statement1
[Clearly state the problem that the business owner is seeking to solve. Be sure to address the
question of what your business ultimately wants to do.]
Two Technologies
[Identify and briefly describe the two technologies, from the list provided, that you will research
in your business systems analysis.]
Business Requirements
Objectives
[Explain the objectives of undertaking this project to integrate new technology. In others words,
what should the project accomplish, and how does it support the goal of your business?]
Project Description
[Provide a project description that explains the purpose of the project. Be sure to address the
following:]
i.
What does your business need to do to satisfy the objectives?
ii.
What are the desired results at the end of the project?
iii.
Why is it important for your business owner to consider implementing new technology?
IT 210: Business Systems Analysis
5
Technology Requirements
[State the key technological requirements that will be required of any new technology in order
to effectively solve your business’s problem. In other words, what specifically does the
technology need to be capable of doing? (These are the technology requirements in the decision
matrix.)]
Competitors and Technology
[In the section below, you will describe two competing companies that operate in the
same industry as your business. You will also explain how a company uses the two technologies
that you are investigating, to determine if the technology may be appropriate for your business to
use. Remember that a list of competing companies was provided to you in the final project case
scenario.]
Technology One [Replace heading with the technology selected (e.g., Social Media)]
[Select one company in the same industry as your own that uses this technology. Briefly
describe what that company does and how it uses this technology to support its business in
general. Include specific examples.]
Technology Two [Replace heading with the technology selected (e.g., Social Media)]
[Select one company in the same industry as your own that uses this technology. Briefly
describe what that company does and how it uses this technology to support its business in
general. Include specific examples.]
Technology Benefit
IT 210: Business Systems Analysis
6
[Referring to what you learned in your research on the companies above, explain one
specific way in which one of the companies is benefitting from technology, and describe the
potential benefit to your business if you were to adopt the same approach.]
Technology Solutions
[In the section below, you will discuss how each of the two technologies meets the
technology requirements that you identified in section II. Use your decision matrix to guide your
responses.]
Technology One
[Explain how well this technology meets the technology requirements of your business.
Be sure to address which technology requirements the technology meets, and where there are
gaps.]
Technology Two
[Explain how well this technology meets the technology requirements of your business.
Be sure to address which technology requirements the technology meets, and where there are
gaps.]
Recommendations
[In the section below, you will recommend the technology solution that you believe is
most appropriate for your business based on how well each technology meets your business’s
technology requirements.]
Technology Solution
[Recommend a technology solution for your business, and defend why that solution is
appropriate. You may recommend only one technology or any combination of the two that you
investigated.]
IT 210: Business Systems Analysis
7
Overall Benefit
[Explain the overall benefit of your recommended technology solution to your business.
Consider the following:]
I.
II.
How will it will it enhance efficiency?
How will it position your business for future growth as you move online?
Basic Security Considerations
[In the section below, you will briefly explain what the owner of your business must
consider in regard to security and privacy if they choose to adopt your recommendations.]
Security Features
[Explain the security features your recommended technology solution should have.]
Third-Party Vendors
[Briefly explain what your business should consider in regard to security and privacy as
you seek out third-party vendors for the proposed technology.]
Internal Safeguards
[Briefly describe the internal safeguards that should be put in place in your business to
guard against loss or misuse of company data. Provide examples.]
[Like all sections of your paper, references start on their own page. The references page
that follows is created using the Citations & Bibliography feature, available on the References
tab. This feature includes a style option that formats your references for APA 6th Edition. You
can also use this feature to add in-text citations that are linked to your source, such as those
IT 210: Business Systems Analysis
8
shown at the end of this paragraph and the preceding paragraph. To customize a citation, rightclick it and then click Edit Citation.] (Last Name, Year)
IT 210: Business Systems Analysis
9
References
Last Name, F. M. (Year). Article Title. Journal Title, Pages From – To.
Last Name, F. M. (Year). Book Title. City Name: Publisher Name.
IT 210: Business Systems Analysis
10
Footnotes
1
[Add footnotes, if any, on their own page following references. For APA formatting
requirements, it’s easy to just type your own footnote references and notes. To format a footnote
reference, select the number and then, on the Home tab, in the Styles gallery, click Footnote
Reference. The body of a footnote, such as this example, uses the Normal text style. (Note: If you
delete this sample footnote, don’t forget to delete its in-text reference as well. That’s at the end of
the sample Heading 2 paragraph on the first page of body content in this template.)]
IT 210: Business Systems Analysis
11
Tables
Table 1
[Table Title]
Column Head
Row Head
Row Head
Row Head
Row Head
Row Head
Row Head
Column Head
123
456
789
123
456
789
Column Head
123
456
789
123
456
789
Column Head
123
456
789
123
456
789
Column Head
123
456
789
123
456
789
Note: [Place all tables for your paper in a tables section, following references (and, if applicable,
footnotes). Start a new page for each table, include a table number and table title for each, as
shown on this page. All explanatory text appears in a table note that follows the table, such as
this one. Use the Table/Figure style, available on the Home tab, in the Styles gallery, to get the
spacing between table and note. Tables in APA format can use single or 1.5 line spacing. Include
a heading for every row and column, even if the content seems obvious. A default table style has
been setup for this template that fits APA guidelines. To insert a table, on the Insert tab, click
Table.]
IT 210: Business Systems Analysis
12
Figures title:
Figure 1. [Include all figures in their own section, following references (and footnotes and
tables, if applicable). Include a numbered caption for each figure. Use the Table/Figure style for
easy spacing between figure and caption.]
For more information about all elements of APA formatting, please consult the APA Style
Manual, 6th Edition.

Purchase answer to see full
attachment

  
error: Content is protected !!