1. Project Deliverable 6: Project Plan
    Due Week 10 and worth 250 points

    This assignment consists of three (4) sections: a written project plan, revised business requirements document, project plan PowerPoint presentation, and a finalized project plan. You must submit the four (4) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

    While taking all business and project parameters into consideration, make quality assumptions to support the following requirements.

    Section 1: Written Project Plan

    You are now in the final stage of the project plan development. All previous documentation should be combined into one document that will serve as the statement of work for the project. Your goal is to have the project approved by the executive team. The project plan should be very detailed, which is designed to accomplish the monumental task of implementation; however, the executive team is only interested in a 30-minute summation. Therefore, you also must create a compelling executive summary that is supported by your detail that convinces the executive team that they should move forward with your solution.

    1. Develop a thirty to forty (30-40) page project plan in which you:
    • Write a five to ten (5-10) page executive summary that provides a high-level technical overview of your project in which you:
      • Describe the scope of the project and control measures.
      • Describe the goals and objectives of the project.
      • Include a high-level overview of all project deliverables.
      • Give a detailed, realistically estimated cost analysis of the entire project, including human capital.
      • Relate the value of the project plan solution to the competitive advantage that information technology will afford your organization.
      • Recommend solution providers who can assist with development and implementation.
    • Combine all previous documentation for Project Deliverables 1-5 in which you:
      • Provide all aspects of the information technology implementation into the project plan.
      • Revise the documentation based on feedback from the earlier evaluation of your deliverable.
    • Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
    • Section 1 of this assignment must follow these formatting requirements:
    • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
    • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
    • Include charts or diagrams created in MS Visio or Dia as an appendix of the project plan. All references to these diagrams must be included in the body of the project plan.                              
    • Section 2: Revised Business Requirements Document
    1. Document all revisions made to the written project plan in the Document Control section of the business requirements document from Project Deliverable 2: Business Requirement. Note: This documentation must outline the revisions made to the previous deliverables required in Section 1: Written Project Plan.
    2. Section 3: Project Plan PowerPoint Presentation

      Additional to your detailed executive summary you must present your findings to the executive team and the venture capital group that along with the executive summary will convince the group that your solution is optimal.

    3. Create a ten to fifteen (10-15) slide PowerPoint presentation in which you:
    • Illustrate the concepts from your executive summary in Section 1 of this assignment.
    • Create bulleted speaking notes for your presentation to the executive board in the Notes section of the PowerPoint. Note: You may create or assume any fictitious names, data, or scenarios that have not been established in this assignment for a realistic flow of communication.
    • Use a professional technically written style to graphically convey the information.
    • Section 4: Finalized Project Plan

      Use Microsoft project to:

    1. Finalize your project plan from Project Deliverable 5: Infrastructure and Security to include all necessary changes in assumptions, tasks, and / or subtasks.
    2. The specific course learning outcomes associated with this assignment are:
    • Develop information systems-related activities to maximize the business value within and outside the organization.
    • Demonstrate an understanding of existing and emerging information technologies, the functions of IS, and its impact on the organizational operations.
    • Evaluate the issues and challenges associated with information systems integration.
    • Use technology and information resources to research issues in information systems.
    • Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.
    • Click here to view the grading rubric.
       
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Is this the question you were looking for? Place your Order Here

Term Paper: Using Agile Project Management to Implement a Complex Marketing Campaign System 
Due Week 10 and worth 200 points

This assignment consists of two (2) sections: a written project plan, and a project plan that is created through the use of MS Project. You must submit the two (2) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Imagine you are the project manager for a critical project for an organization. The organization wants to implement a state of the art real-time marketing campaign system. This system has many components.  

  • First, it has to get data from its front-end systems via the middle-ware component. 
  • Second, it has its own database system that stores the shopping history, credit information, billing address and shipping address, and so on. 
  • Third, it has a marketing rules engine that needs to be customized for various campaigns. 
  • Finally, it has an analytical platform that leverages data warehouse and analytics tools, such as SAS to test marketing strategies and assess campaign effectiveness. 

In addition, your company already has some stand-alone applications supporting marketing campaigns and analytics. Due to this project, your executives want IT to retire the legacy applications as part of the project. Although your executives plan to have this new system in production in twelve (12) to fourteen (14) months, they want to see the results as soon as possible, so they can enable more business capabilities, such as real-time decisions for up-selling and cross-selling. The executives also want to save costs by using offshore resources even though your organization does not currently have experience with this. Other troubles with the organization include problems controlling the scope of projects and inexperience to initiatives of this size. To further complicate the situation, you are aware that some of the business executives have had bad experiences with IT delivery in the past and you heard numerous complains about IT projects being late without meeting project expectations.  

Section 1: Written Project Plan  

1.  Write a ten to fifteen (10-15) page paper in which you: a. Suggest an Agile project management framework to the sponsors and justify why the framework you suggested is best suited for this project. 
b. Develop a release plan through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. 
c. Explain how to use Agile methods to scale the release plan you developed for retiring the legacy applications. 
d. Explain how to use Agile methods to establish the scope for the project and determine the methods to control the scope to ensure the business values will be delivered. 
e. Choose at least two (2) Agile techniques to monitor this project and explain the reasons why you chose those two (2) techniques.
f. Suggest Agile strategies to develop product vision and product architecture. 
g. Create a diagram to show the overall systems architecture through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
h. Determine the roles of the Agile project team in this project and determine the coaching methods to build a high-performance team. 
i. Determine the Agile techniques to manage conflicts and facilitate collaboration throughout the project. Provide examples to support your response.
j. Explain how to set the right expectation with the business.
k. Take a position on whether or not offshore resources should be used in this project and explain why or why not. 
l. Speculate on the ethical challenges in this project and explain how to resolve them. 
m. Identify the key differences and speculate on the consequences if managing / governing the same project with a traditional waterfall project management approach instead of using Agile strategies. 
n. Suggest the Agile methods to control the quality of work among the project team. 
o. Explain how to encourage more innovative ways to accomplish this project.  
p. Explain how to use Agile methods to handle the documentation in this project that would satisfy both short-term project needs and long-term maintenance needs. 
q. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Section 1 of your assignment must follow these formatting requirements: 

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. 
  • Include charts or diagrams created in Visio or Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

Section 2: Project Plan Use Microsoft project to: 

2.  Develop the project plan. The project plan should: a. Record all tasks, subtasks, resources, and time related to the project.
b. Outline the planning, analysis, design, and implementation phases.

The specific course learning outcomes associated with this assignment are: 

  • Describe Agile project management methods and phases. 
  • Describe Agile governance methods for organizational use. 
  • Explain the leadership values in Agile environments. 
  • Compare and contrast Agile methods with traditional project management techniques.
  • Summarize the iterative qualities for Agile project success. 
  • Explain the challenges and opportunities of an Agile project leader. 
  • Explain the role of teams in Agile settings. 
  • Analyze the phases of the Agile Delivery Framework.
  • Discuss release planning attributes in Agile environments.
  • Discuss methods of measuring the performance and quality of Agile projects.
  • Develop an Agile deployment plan that addresses and solves a proposed business problem. 
  • Evaluate the ethical concerns inherent in Agile project management techniques. 
  • Use technology and information resources to research issues in Agile project management.
  • Write clearly and concisely about Agile project management topics using proper writing mechanics and technical style conventions.

Is this the question you were looking for? Place your Order Here

 

Module 4 SLP, we return our focus from the specifics of information technologies and the formulation of ideal strategies to the wider world of real corporate behavior. Our emphasis now shifts to the actual implementation of information technologies and the sociotechnical dynamics that implementation not infrequently founders upon. No technical solution—however brilliantly designed or competently backstopped or elegantly integrated with other corporate plans—is any better than its implementation at the lowest levels of the system to which it is addressed. All too frequently, plans and solutions are developed in a vacuum apart from the context within which they are to be deployed and used. It is hard to overestimate the quantity of corporate resources that have been squandered on poor IT implementations over the years—to say that it would exceed the GNP of many third world countries would probably not be an exaggeration. Implementation is by no means an all-or-nothing proposition; even though the full measure of system changes may not be as successful as desired, there can often be positive local results, particularly if the implementation process is oriented toward learning as well as doing, or even more so, doing unto others. The one sure way to implementation failure is to assume that all knowledge resides in IT management—or even in management generally. Success is inevitably based on user involvement in varying degrees, generally more rather than less.

All modules in the course draw on everything that you have learned in the program; however, this module most specifically draws on your courses in computer-human interaction, systems development, and project management as well as on your general introductory courses. Implementation is a drawn-out process requiring effective collaboration among many different kinds of specialists and generalists, extended over time and across space, and requiring explicit attention to both the social and technical systems of the organizational units affected. Above all, implementation must be sensitive to feedback, resilient enough to deal with changing circumstances, personnel, and goals, and focused much more on the users than on the technologists. Effective implementation always embraces the fundamental sociotechnical criterion of "incompletion"—that is, the idea that no change process is ever "finished" as such, but that change is an ever-flowing river in which one set of adjustments is merely the prelude to another set. Sociotechnical life in organizations is a soap opera, not a novel. There is never a "happily ever after," just an ever-evolving and constantly reconfiguring cast of players and problems. Sometimes things get better; sometimes they get worse—but they will always be different.

Videos of Interest… Something to Think About…

Andrew McAfee discusses an array of revolutionary technologies that are replacing routine jobs with machines that can speak, understand, translate, and hear. McAfee believes that this kind of innovation will lead to creating new jobs that involve more than enhancing creativity. He refers to this cycle of innovation as “The New Machine Age.” Think in terms how technology-driven changes could impact the ERP implementation for Aux Bons Soins’ case study below.

TED Ideas Worth Spreading. (2012, September). Andrew McAfee: Are droids taking our jobs? Retrieved from http://www.ted.com/talks/andrew_mcafee_are_droids_taking_our_jobs.html

For the last assignment, we will be introducing a new case, the real-world story of an ERP implementation for Aux Bons Soins. This case details the rather frustrating experiences that the company encountered in trying to implement an integrated management system after an acquisition and merger, and the range of circumstances that affected the process. Not every implementation is this sticky, but in varying ways most partake of greater or lesser parts of this experience. Please note that there is nothing particularly pathological about the experience described here, despite the frustrations experienced. There are no great villains, but neither are there any great heroes; implementation seldom turns up either. This may seem a rather inconclusive note on which to conclude both this course and your IT management program, but it is how things are. For better or worse, this is what real IT management is all about—the good, the bad, the ugly, and above all the reasonably acceptable. Over the next decades, the profession is likely to evolve far beyond any ways that can be reasonably forecast today; after all, 20 years ago there was not any such thing as the Internet, and today's information environment was ranked science fiction. You are entering the profession at a most exciting and dynamic time; always remember how much you do not know, but also remember that you do know how to learn.

Please read the following parts of the case:

Bernier, C., Roy, V., & Brunelle, E. (2006) An ERP Story: Background (A). International Journal of Case Studies in Management. 4(1):March.

Bernier, C., Roy, V., & Brunelle, E. (2006) An ERP Story: Troubles Ahead (C). International Journal of Case Studies in Management. 4(1):March.

Bernier, C., Roy, V., & Brunelle, E. (2006) An ERP Story: Epilogue (D). International Journal of Case Studies in Management. 4(1):March.

Use information from the course background readings as well as any good quality resource you can find. Please cite all sources and provide a reference list (use APA format) at the end of your paper.

Your answer to the following will be assessed:

  • What were the main causes of the difficulties with the project at Aux Bons Soins?
  • What were the key elements that led to the success of the project at Aux Bons Soins?

Is this the question you were looking for? Place your Order Here

Term Paper: Contacts System DevelopingDue Week 10 and worth 200 points
This assignment consists of two (2) sections: a written project plan, and a project plan that is created through the use of MS Project. You must submit the two (2) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
Imagine that you are a software architect manager working in a midsized company that has over fifty (50) stores in eight (8) states in U.S. The sales department has all the suppliers’ and the VIP customers' contact information in various places including emails, social media sites, phones, and so on. With the increasing number of contacts due to your company's rapid growth, the sales department found that it is difficult to manage the contacts in an efficient manner. You are asked to develop an application that would allow the sales department’s employees to consolidate all of these contacts into a central location. Additionally, you are in charge of developing this system from the beginning to the end.   
Assume that you have eighteen (18) months to complete this project from the beginning to deployment.  Your team consists of ten (10) members with diversified backgrounds.
After the planning phase, the stakeholders of this project want an additional feature added that allows the sales department’s employees to export the contacts from the application you developed into various different file formats.
Section 1: Written Project Plan 1. Write a eight to ten (8-10) page paper in which you:

a. Describe the contact system you are developing including:

i. Functionalities of the application
ii. The scope of users
iii. The platform(s) that it will be developed on
iv. The operating system(s) it will be run on
v. The software(s) and tools required for the development
vi. The software(s) and techniques required for the users  
b. Determine and explain the architectural style of the application. c. Create a graphical representation of the architecture design of this application through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.d. Draw a UML diagram to demonstrate the system's functionality through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.e. Explain how the nonfunctional properties work within the system.f. Identify the security features that will be included in this system and explain how those security features work to protect the user and the business.g. Determine the roles of the team for developing the application from architecting the system to software support and explain how these roles work with each other. Describe each position including required skills, working experience, and salary information.h. Determine the development platform used to build this application on and analyze why the platform was selected over other available platforms.i. Distribute the tasks and subtasks related to the development process over multiple geographic locations of your company. j. Create an effective change management process to handle the stakeholders' request for the additional feature after the planning phase is complete, such as the handling of an additional field or the ability to perform wildcard searches. Justify your answer. k. Propose a software testing solution for this application that addresses both functional and nonfunctional requirements. l. Explain how the software will be deployed and speculate on how future updates of the system will be applied.m. Recommend methods to control the quality of work. n. Recommend methods to close the project.o. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Section 1 of your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

Section 2: Project Plan Use Microsoft project to:2. Develop a project plan. The project plan must:

a. Record all tasks, subtasks, resources, and time related to the project.b. Outline the planning, analysis, design, and implementation phases.c. Identify the key milestones of this project.

The specific course learning outcomes associated with this assignment are:

  • Describe collaborative techniques among distributed development teams and systems.
  • Compare and contrast software build tools.
  • Describe and design a deployment approach to systems architecture. 
  • Create an effective change management process to address and solve a proposed business problem.
  • Describe, develop, and implement software testing strategies and plans.
  • Outline test plans for nonfunctional requirements.
  • Use technology and information resources to research issues in the delivery of software solutions.
  • Write clearly and concisely about topics associated to software architecture techniques using proper writing mechanics and technical style conventions.

Is this the question you were looking for? Place your Order Here

  5Lab Assignment: Lab Three ReportAssignment Task: Submit to complete this assignment

To complete this assignment, review the prompt and grading rubric in the Lab Three Guidelines and Rubric document. Use the Lab Report Template to structure your lab report. When you have finished your work, submit the assignment here for grading and instructor feedback.

This assignment requires you to use CYBRScore.                                         

                                    Lab Report Template 

Complete each of the critical elements in your lab and submit this report to your instructor for grading in your course. Be sure to keep the lab reports that you complete and review, along with any feedback provided by your instructor, as they will help you create a quality submission for your final project. Review the individual lab guidelines and rubric documents for more information on these assignments.

You may complete the report in a separate Word document. If you choose to use a separate document, include all the questions asked in the guidelines and rubric document for that lab, as well as the accompanying screenshot. Your completed report should reflect the information below. Add additional question numbers with accompanying description and screenshot as needed to match the total number of questions required on a given lab guidelines and rubric document.s

1. Lab Number and Name: 

2. Brief Summary of Lab:

· What did you do in the lab?

· How did it work?

· What did you look for/find?

3. Specific Practices or Resources:

· Briefly describe the specific practices or resources that were most important in terms of supporting the investigation and maintaining evidentiary integrity in this lab. For example:

a. Chain of custody practices

b. Digital forensic tools

c. Incident response tactics

4. Best Practices:

· Briefly describe best practices or resources necessary in terms of next steps in this lab scenario. 

5. Screenshots:

· Include screenshots that support items 3 and 4 in your briefing.

Ensure your entire report is appropriate to your internal audience, employing brevity and consumable language (in this lab, your audience will be your teammates/company attorneys/executive team).

                        Lab Three Guidelines and Rubric 

       Creating a Baseline Using the Windows Forensic Toolchest 

Overview: You will be completing several labs throughout this course. The purpose of these labs is twofold:

  The experience will provide you with valuable opportunities to “walk a mile” in the shoes of a forensic practitioner performing basic forensic tasks. Gaining this type of experience is necessary in managing and relating to the individuals and teams with whom you will interact with in the field. 

 Practice the communication and writing skills you will need to employ in both pieces of your final project. 

It is important to note that these activities are important to your final project but do not share the same scenario as your final project. They are practice opportunities that focus on a specific but smaller set of topics and skills. You will complete a lab “briefing” paper and submit it to your instructor for grading. A template of this brief is provided for you. 

Scenario: Please be aware that the instructions given inside of Lab Three refer to a separate scenario, not the one that we will be addressing in class. Use our classroom scenario to focus your learning in the lab.

 In the previous lab, Lab Two, you were given the following scenario: While working for ACME Construction Company, you have been tasked with an investigation of a Windows 8 hard drive. You have been told that your company suspects a high-level employee of a policy violation. It is believed that Drew Patrick wrongfully copied sensitive corporate documents containing valuable intellectual property (IP) to his personal computer. Further, there is reason to believe that he may have then provided the documents to a competitor. Due to the value of the IP, the investigation has moved from a simple incident response to a forensic investigation. 

In Lab Two, you finished creating and verifying an image for use in the forensic lab. Lab Three will have you tasked with a different part of the investigation. Wily miscreants will often attempt to cover their tracks. One supposedly clever way of doing this is to create a separate login account and use that account to perform all their evil deeds. Any decent investigator will analyze all the accounts, their creation dates, privileges, and activities in an effort to rule out the idea of evidence being planted by another or any attempt to cover one's tracks. 

Windows Forensic Toolchest (WFT) is often used on Windows computers to quickly and easily gather many details concerning the operating system and related functions. An investigator can use WFT to run a scripted set of commands that will allow them to easily identify many properties such as logins (successful or failed), network shares, groups and accounts, and many others. Proper documentation of these settings and characteristics will help to weaken the “it was not me” argument. 

 In your lab, be sure to document the following for your final project: 

1. Internet protocol (IP) address of the computer at the time of the examination (IPCONFIG) 

2. List of user accounts on the suspect machine (NET USER) 

3. List of users who have logged on locally (LOGINS – ALL) 

4. The shared directories on the network, which may aid in passing data outside of the company-controlled environment (NET SHARE) 

5. The security logs and their details will be used in the log analysis lab. You can take a quick look at them here so you know what to expect during the following lab. (EVENT LOGS – SECURITY LOG) 

as usual sensitive information will be communicated to you directly.Thank you

Is this the question you were looking for? Place your Order Here

Term Paper: TopBike

Due Week 10 and worth 230 points

This assignment consists of two (3) sections: analysis and design document, a requirements document, and a project plan that is created through the use of MS Project. You must submit the three (3) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Read the article titled “TopBike” and complete this assignment located here:  Week 10 Term Paper – Top Bike.PDF   <——THIS IS ATTACHED SCREENSHOTS AT THE BOTTOM!!!!!!!

Imagine that you, a systems architect leading a consulting team, are asked to perform a systems analysis and design to help TopBike implement a software system that can improve their profits and save costs.  
 

Section 1: Analysis and Design Document

  1. Write a ten to twelve (10-12) page paper in which you:     
    1. Identify the business problems that TopBike has.
    2. Determine the analysis technique for this project and explain why.  
    3. Determine the methodology for this project and explain why.
    4. Identify the roles (i.e., system analyst, developer) for the team and explain their responsibilities.
    5. Explain how to conduct requirements gathering sessions and determine the tools to use.
    6. Create the functional model, structural model, and behavioral model with class diagrams through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
    7. Create a design document with a data management layer.
    8. Draw a physical architecture diagram for the final solution through the use of graphical tools in Microsoft Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. .
    9. Explain the human-interface design considerations.
    10. Explain the steps for developing test cases and describe how they help the overall project.
    11. Determine the change management process and post implementation strategy for the project and product. 
    12. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 2: Requirements Document

  1. Create a requirements document that includes:     
    • Functional and nonfunctional requirements for TopBike.
    • Nonfunctional requirements for TopBike.
    • Use cases and their descriptions.

Section 1 and 2 of this assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

Section 3: Project Plan

Use Microsoft project to:

  1. Develop the project plan. The project plan must:
  • Record all tasks, subtasks, resources, and time related to the project.
  • Outline the planning, analysis, design, and implementation phases.
  • Identify the key milestones of your project.

The specific course learning outcomes associated with this assignment are:

  • Explain and apply object-oriented analysis techniques.
  • Compare and contrast different roles needed in systems analysis and design.
  • Compare and contrast requirements gathering among traditional and iterative project methods.
  • Procure, document, and scope IT project requirements with use cases.
  • Describe object-oriented modeling, structural modeling, and behavioral modeling.
  • Develop class diagram based on business scenarios.
  • Create a business requirements document that conforms to the Unified Modeling Language standard.
  • Apply the project requirements steps of eliciting, analyzing, documenting, and testing to address and solve a proposed business problem.
  • Determine the steps and principles of design modeling with UML.
  • Describe how societal mores and social media impact the design of human-computer interactions.
  • Describe the impact of contemporary computing architecture to the physical architecture design.
  • Describe how to gather nonfunctional requirements and its importance for overall IT project success.
  • Explain the importance of change management and post-implementation support and how they impact business and overall enterprise.
  • Describe and design test cases that uncover software bugs.
  • Develop a business requirements document that addresses and solves a proposed business problem.
  • Use technology and information resources to research issues in procuring and designing project requirements.
  • Write clearly and concisely about project requirements and design topics using proper writing mechanics and technical style conventions.

Is this the question you were looking for? Place your Order Here

 

The  Strayer Oracle Server may be used to test and compile the SQL Queries  developed for this assignment. Your instructor will provide you with  login credentials to a Strayer University maintained Oracle server.

Imagine  that you have been hired as the database administrator for a local  department store. The department store has recently expanded by opening  five (5) stores within your local region. They have also launched a  series of marketing campaigns to attract new customers and increase  sales. For your hired role, you will be responsible for creating and  maintaining an enterprise-wide database system that will hold the sales  and inventory data for the organization. The designed database will help  operations in supporting its new business marketing strategy. Using the  concepts presented throughout the course, you will develop a plan to  create this database and establish a design that aligns with the product  sales initiatives of the organization.

Write a twelve to fifteen (12-15) page paper in which you:

  1. Identify the potential sales and department store transactions that can be stored within the database.
  2. Design  a database solution and the potential business rules that could be used  to house the sales transactions of the department store. 
  3. Evaluate  all relationships of each entity within your database solution using  the Crow’s Foot notation. Include all data elements, entities,  relationships (such as 1:M, 1:1, M:N), and cardinalities for the  department store database in your diagram. Note: The graphically depicted solution is not included in the required page length.
  4. Research  the Internet for best practices of how retail stores use databases for  retaining customers and increasing sales and complete the following:
    1. Justify how Big Data tools could be used for forecasting sales and inventory of the department store.
    2. Propose  two (2) SQL Stored Procedures that use SQL functions to help sales  associates perform explanatory or predictive analytics.
    3. Give  your opinion on which of the two (2) ways you proposed in Question four  (4) b provide greater value to expanding their business within the  region.
    4. Provide a copy of your working SQL code as part of the paper.
  5. Research the Internet for database vendors that provide cloud computing services and complete the following:
    1. Estimate  the types of costs involved or the pricing structure required when  implementing a cloud-hosted solution for a database. 
    2. Analyze security considerations and pricing of the different cloud implementation types.
    3. Rank  the cloud services options of Software as a Service, Platform as a  Service and Infrastructure as a Service in terms of functionality,  mobility, and ability to provide distributed transaction concurrency.  Compare how these cloud-based services fit within an environment where  users are mobile. Determine the technical provisions that would be  required to ensure data integrity.
  6. Evaluate  whether the use of a distributed DBMS structure is appropriate and  identify the optimization techniques that should be factored in to  enhance the operations of the database in your design.
  7. Provide  at least two (2) examples of how lost updates and uncommitted data may  occur, keeping in mind that five (5) stores will be generating  transactions.
  8. Determine  the concurrency control factors that can be used to ensure valid  execution of transactions within the current multiuser environment.
  9. Research  the Internet for backup and restoration recovery solutions and database  security threats that could be applicable to the department store. Upon  your research, complete the following:
    1. Suggest  at least two (2) options that could be made available to provide  disaster management functions for the database system within the retail  environment.
    2. Assess  the types of security threats that may exist when managing the  department store database and suggest measure(s) that can be performed  to minimize these threats that are particular to retail.
  10. Use at least six (6) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be  typed, double spaced, using Times New Roman font (size 12), with  one-inch margins on all sides; citations and references must follow APA  or school-specific format. Check with your professor for any additional  instructions.
  • Include  a cover page containing the title of the assignment, the student’s  name, the professor’s name, the course title, and the date. The cover  page and the reference page are not included in the required assignment  page length.
  • Include  charts or diagrams created in any chart or drawing tool with which you  are familiar. The completed diagrams / charts must be imported into the  Word document before the paper is submitted.

Is this the question you were looking for? Place your Order Here

DUE 12/23  8 P.M EST

BE ON TIME AND ORIGINAL WORK!

PLEASE DON'T ASK FOR ASSIGNMENT IF YOU'RE UNSURE HOW TO COMPLETE THE WORK..

PLEASE READ DIRECTION

DATA ATTACHED AND TEMPLATE THAT YOU MUST FOLLOW

 

Quantitative Reasoning and Analysis, you constructed basic contingency (crosstab) tables. You might be surprised to learn that you can estimate a simple logistic regression model, with a categorical predictor, using the descriptive values presented in the crosstab table.

In this assignment, you use Microsoft Excel to construct a specialized tool that creates basic logistic regression models given a crosstab/contingency table. As if that were not useful enough, this Excel tool is not specialized—you can use it given any crosstab/contingency tables you encounter in research. In the field of statistical research, this is just about as exciting as you can get!

To prepare

  • Review the sections in the Osborne text that present a template for constructing an Excel worksheet.
  • Review the video in the Learning Resources, in which Dr. Matt Jones explains how to harness the power of Excel using contingency tables.
  • Think about the types of variables that are useful for crosstab tables.

The Assignment

Using one of the datasets provided, select two variables that allow you to construct a 2×2 contingency table. Use SPSS to run the initial crosstab table, using any two variables that you think are appropriate. Then, use Excel to construct a table in which you report:

  • Conditional probabilities
  • Conditional odds
  • Logits
  • Odds ratios
  • Relative risk
  • Slope

Be sure to apply the template from the Osborne text.. Be sure to use formulas and cell references in Excel so that the spreadsheet you create can be used as a tool for calculating similar values for other datasets (ATTACHED)

Once you have created the tool, write a 1- to 2-paragraph summary in APA format interpreting your results. Submit both your Excel file and your summary to complete this assignment.

Note from Teacher (READ CAREFULLY)

  

You need to attach two documents to the submission area for the Week 4 assignment (the gradebook will allow you to submit both documents–I cannot grade without both):

1.  The filled out excel file. (You do not need any interpretation of this document)

2.  The completed stats assignment template (the same template you have used for every other stats assignment in the course).  The information in the stats assignment template needs to be taken from the logistic regression analysis you need to do in SPSS. (You need to run a regular logistic regression analysis is SPSS to complete this.).

From the original Week 4 announcement:

Directions for the Stats Assignment template: For the stats assignment template you will not be using the Excel file for your results (however, you do need to attach the Excel document when submitting your assignment).  You will be conducting a complete logistic regression analysis in SPSS and reporting those results in your stats assignment template.

Logistic Regression Example

Research Question:  How do coping ability and stress levels from teaching predict burnout in lecturers?

Null Hypothesis (H0):  There is no statistically significant predictive relationship between coping ability, stress from teaching, and burnout in lecturers.

Alternative Hypothesis (HA):  There is a statistically significant predictive relationship between coping ability, the stress from teaching, and burnout in lecturers.

Independent Variables (IVS):

Coping style: 1-100, the higher the score the better able to cope

Stress from teaching: 1-100, the higher the score the higher the indicated stress level

Dependent Variable:

Burnout:  1-100, the higher the score the higher indicated burnout

Results

A logistic regression was conducted to determine the predictive relationship and odds ratio between coping style, stress from teaching, and burnout in lecturers. Coping style (p=.004) and stress from teaching (p=.04) were both related to burnout at a statistically significant levels. A lecturer who reported better coping (each increase of score of 1) was .87 times more likely (less likely as <1) to experience burnout (exp(b)= .87). A lecturer who reported more stress (each increase of score of 1) from teaching was 1.97 times more likely to experience burnout (exp(b)=1.968). Therefore, the null hypothesis would be rejected and the alternative hypothesis accepted.

Use the following stats template for the assignment:
 

Be sure to include your data output with your analysis.  ***You need to submit 1) the Excel file and 2) your stats template filled out.  You can submit both documents to the gradebook (it will accept both in the same submission). Please note that I cannot grade until I have both documents.***

Is this the question you were looking for? Place your Order Here

 Please no plagiarism

The  Strayer Oracle Server may be used to test and compile the SQL Queries  developed for this assignment. Your instructor will provide you with  login credentials to a Strayer University maintained Oracle server.

Imagine  that you have been hired as the database administrator for a local  department store. The department store has recently expanded by opening  five (5) stores within your local region. They have also launched a  series of marketing campaigns to attract new customers and increase  sales. For your hired role, you will be responsible for creating and  maintaining an enterprise-wide database system that will hold the sales  and inventory data for the organization. The designed database will help  operations in supporting its new business marketing strategy. Using the  concepts presented throughout the course, you will develop a plan to  create this database and establish a design that aligns with the product  sales initiatives of the organization.

Write a twelve to fifteen (12-15) page paper in which you:

  1. Identify the potential sales and department store transactions that can be stored within the database.
  2. Design  a database solution and the potential business rules that could be used  to house the sales transactions of the department store. 
  3. Evaluate  all relationships of each entity within your database solution using  the Crow’s Foot notation. Include all data elements, entities,  relationships (such as 1:M, 1:1, M:N), and cardinalities for the  department store database in your diagram. Note: The graphically depicted solution is not included in the required page length.
  4. Research  the Internet for best practices of how retail stores use databases for  retaining customers and increasing sales and complete the following:
    1. Justify how Big Data tools could be used for forecasting sales and inventory of the department store.
    2. Propose  two (2) SQL Stored Procedures that use SQL functions to help sales  associates perform explanatory or predictive analytics.
    3. Give  your opinion on which of the two (2) ways you proposed in Question four  (4) b provide greater value to expanding their business within the  region.
    4. Provide a copy of your working SQL code as part of the paper.
  5. Research the Internet for database vendors that provide cloud computing services and complete the following:
    1. Estimate  the types of costs involved or the pricing structure required when  implementing a cloud-hosted solution for a database. 
    2. Analyze security considerations and pricing of the different cloud implementation types.
    3. Rank  the cloud services options of Software as a Service, Platform as a  Service and Infrastructure as a Service in terms of functionality,  mobility, and ability to provide distributed transaction concurrency.  Compare how these cloud-based services fit within an environment where  users are mobile. Determine the technical provisions that would be  required to ensure data integrity.
  6. Evaluate  whether the use of a distributed DBMS structure is appropriate and  identify the optimization techniques that should be factored in to  enhance the operations of the database in your design.
  7. Provide  at least two (2) examples of how lost updates and uncommitted data may  occur, keeping in mind that five (5) stores will be generating  transactions.
  8. Determine  the concurrency control factors that can be used to ensure valid  execution of transactions within the current multiuser environment.
  9. Research  the Internet for backup and restoration recovery solutions and database  security threats that could be applicable to the department store. Upon  your research, complete the following:
    1. Suggest  at least two (2) options that could be made available to provide  disaster management functions for the database system within the retail  environment.
    2. Assess  the types of security threats that may exist when managing the  department store database and suggest measure(s) that can be performed  to minimize these threats that are particular to retail.
  10. Use at least six (6) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Is this the question you were looking for? Place your Order Here

 

The security consulting firm that you work for has been awarded a contract to implement a new IT Security Infrastructure to secure the Information Technology data assets of a local government agency.  This agency has many remote workers that are in the field and need to connect back to the agency’s system servers. The remote workers use a wireless network infrastructure to connect their electronic pads to servers located within the local government’s facility. The remote workers have needs to access property records, cite zoning violations electronically, and validate building permits. The public demand to expand IT services has grown faster than its ability to provide an adequately secured infrastructure. In fact, this government entity was previously featured on the news for having minimal security controls and methods for accessing property tax information of citizens. The inadequate security allowed many construction trade businesses to illegally access property records and zoning violations. Your role in this project is to enhance and optimize the security mechanisms for accessing these systems.

Write a four to five (4-5) page paper in which you:

1. Create an information flow diagram, using Visio or Dia, which:
     a. Illustrates how remote users will securely connect to the government agency’s network.  
     b. Illustrates the patch of network devices that data packets must travel to get from server to remote user’s device and back to 

         server.
         Note: The graphically depicted solution is not included in the required page length.

2. Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private     information. In this list:
    a. Propose at least two (2) vendor brands per each device and the associate costs required to procure these items.
    b. Identify the functionality each device serves and the expected benefits the government agency should experience upon the         successful installation of this equipment.

3. Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures    available within the network in which you:
    a. Describe the risks associated with not fulfilling the activities outlined within your maintenance plan.
    b. Indicate specific activities, personnel / resources required, and frequency of execution.

4. Recommend at least four (4) physical security measures that could be developed to ensure the electronic perimeter of electronic     assets.

5. Recommend at least two (2) physical security vendors that could achieve the four (4) security measures you identified. Justify your
    recommendations with your response.

6. Evaluate and consider activities that the Human Resources Department could perform in order to complement and instill security     from within the organization. Provide a rationale with your response.

7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality     resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or one of its equivalents such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge.
  • Describe best practices in cybersecurity.
  • Describe system, application, network, and telecommunications security policies and response.
  • Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies.
  • Use technology and information resources to research issues in cybersecurity.
  • Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills. Click here to access the rubric for this assignment. 

Is this the question you were looking for? Place your Order Here