SlideShare a Scribd company logo
1 of 12
CIS 500 – Information Systems for Decision-Making
CIS 500 – Information Systems for Decision-Making
Assignment 2: The Presentation
Due Week 10 and worth 200 points
Congratulations. Your proposal for implementing a new IT
project for your organization has been staffed and you are about
to meet with your team for the first time.
Initial impressions are important and you’ll need visuals for
your presentation. Create a slide show (in PowerPoint or similar
software) in which you address the following, in this order:
1. Goals: What is the project and what is the intent of
implementing (what do you hope to accomplish by
implementing the project?).
2. Critical Success Factors: Identify at least 4 different
stakeholders; for each, list at least 2 things that the stakeholder
requires in order to deem the project successful.
3. Acquisition strategy: Should the system be built in-house,
created by a contractor, purchased offthe-shelf and customized,
or leased as a service? Explain your rationale.
Points: 200
Assignment 2: The Presentation
Criteria
UnacceptableBelow 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Goals: What the project hopes to accomplish.
Weight: 10%
(20 points)
Did not communicate what the project hopes to
accomplish
Did not list project goals
Communicated
what the project hopes to accomplish
Did not list project goals
Communicated
what the project hopes to accomplish
Listed the project
goals
Communicated importance of project reaching its
goals
Connected project goals to the organizational strategy
2. Critical Success
Did not identify 4
Identified 4
Identified 4
Identified and
4. Resources: For in-house development, what people/skills are
required and what development lifecycle do you recommend?
Otherwise, identify 3 candidate organizations that can deliver
the system.
5. System functions: In a table format, summarize the types of
users for the system; the business reason(s) each would use the
system; the ways that the system supports each of these needs;
and how this support differs from the current system.
6. Connectivity: Provide a diagram that shows how the system
will connect to the other information systems and what data
flows among them.
7. Security: List the most serious cybersecurity threats and
vulnerabilities of the new system. Suggest strategies to address
them.
8. Mobility: Identify the system’s capabilities for mobile use.
Include a title and summary slide. Use one slide for each of the
8 points above. Include speaker notes or audio narration that
explains each slide more fully.
Grading for this assignment will be based on answer quality,
logic / organization of the paper, and language and writing
skills, using the following rubric.
Factors: Identify at least 4 different stakeholders; for each, list
at least 2 things that stakeholder requires in order to deem the
project successful.
Weight: 10%
(20 points)
stakeholders
Listed things to make project successful, but did not connect
each stakeholder
stakeholders
Listed less than 2 things each stakeholder would require to
deem project successful
stakeholders
Listed 2 things that each stakeholder would require to deem the
project successful
justified the selection of 4 stakeholders
Explained why each stakeholder would be most interested in 2
things to deem project successful
3. Acquisition strategy: Should the system be built in-house,
created by a contractor, purchased off-the-shelf and customized,
or leased as a service? Explain the rationale for your choice.
Weight: 10%
(20 points)
Did not compare acquisition strategies
Did not determine the best strategy for the proposed information
system
Inadequately explained the rationale for choosing the
acquisition strategy
Reasonable comparison of acquisition strategies
Determined best acquisition strategy for the proposed
information system
Somewhat
explained the rationale for choosing the acquisition strategy
Compared various
acquisition strategies
Determined which acquisition strategy would be the best for the
proposed system
Provided rationale for choosing a specific acquisition strategy
Analyzed various acquisition strategies, or presented an
acquisition strategy that was not previously mentioned
Explained why other acquisition strategies would potentially not
work
Discussed cost considerations
4. Resources: For inhouse development, what people/skills are
required and what development lifecycle do you recommend?
Otherwise, identify 3 candidate organizations that can deliver
the system.
Weight: 10%
(20 points)
Inadequately determined
resources needed for the acquisition strategy
Limited
recommendation for
development
lifecycle for inhouse development, or three external
organizations that can deliver the system
Inadequate
justification
Determined
resources needed for the acquisition strategy, but did not justify
reasoning
Recommended a
project
development
lifecycle for inhouse development, or three external
organizations that can deliver the system, but did not
justify why they were chosen
Determined and justified resources needed for chosen
acquisition strategy
Recommended a
project development
lifecycle for inhouse development, or three external
organizations that can deliver the system.
Presented resources not previously considered
Included risk identification and mitigation procedures
Proposed a combination of resources and strategy to organize
stakeholder efforts toward project completion
5. System functions: In a table format, summarize the types of
users for the system; the business
Failed to put in table format
In table format:
Summarized some
In table format:
Summarized the
In table format:
Analyzed user
reason(s) each would use the system; the ways that the system
supports each of these needs; and how this support differs from
the current system.
Weight: 10%
(20 points)
Inadequate summary of users for the system
Limited explanation of why users would use the system
Inadequate description of how system supports users
Inadequate comparison of the proposed system to the old system
of the types of
users for the system
Somewhat explained business reasons for system use
Somewhat described how the system supports users
Reasonable comparison of the proposed system to the old
information system
types of users for the information system
Explained business reasons why each user type would use the
system
Described how the system supports the needs of each user
type
Determined how
this support differs from the current information system
experience and user design considerations
Explained design changes that took place between the old and
new system
Provided rationale for the user types
identified
Discussed how to reach out to user types to test the
system
6. Connectivity: Provide a diagram that shows the other
information systems this one will connect to, and what data
flows among them.
Weight: 10%
(20 points)
Failed to put in diagram format
Inadequate diagram showing your system, hard to follow,
incomplete
Inadequate or hard to follow the data that would flow among
systems, incomplete
In a diagram:
Showed other information systems that your system would
connect to, but hard to follow
Demonstrated what data would flow among systems, but hard to
follow
In a diagram:
Showed other existing information systems that your proposed
system would connect to
Demonstrated what data would flow between your and other
information systems.
In a diagram:
Showed how you selected existing systems that your system
would connect to
Explained how diagram would be updated and maintained based
on changes in the marketplace
7. Security: List the most serious cybersecurity threats and
vulnerabilities of the new system. Suggest strategies to address
them.
Weight: 10%
(20 points)
Inadequate list of cybersecurity threats
Inadequate strategies to address each threat
Reasonable list of cybersecurity
threats, failed to show why they are most serious
Identified strategies to address each
threat
Listed the most serious cybersecurity threats to your new
system
Proposed strategies to address each threat
Proposed how your new system would integrate with Shadow
IT, if at all
Demonstrated strategies for current users to avoid threats
8. Mobility: Identify the system’s capabilities for mobile use.
Weight: 10%
Failed to identify your system’s capabilities for mobile use,
incomplete
Identified your system’s capabilities for mobile use, but not
comprehensive
Identified your system’s capabilities for mobile use
Proposed situations in which mobile use would happen and
situations where its limitations
(20 points)
9. Speaker / Audio Notes: Include speaker notes or audio
narration that explains each slide more fully.
Weight: 10%
(20 points)
Inadequate speaker notes or audio narration, too much
or too little
information on each slide provided
Somewhat detailed speaker notes or audio narration explaining
each slide more fully
Included speaker notes or audio narration explaining
each slide more
fully
Speaker notes or audio narration succinct and direct,
persuasive presentation
Discussed cost considerations, and risk identification &
mitigation
10. Clarity, persuasion, proper communication, writing
mechanics, and formatting requirements.
Weight: 10%
(20 points)
Unclear structure, not persuasive, major grammatical errors
Somewhat clear
structure, limited persuasion, grammatical errors, language too
simple or too wordy
Clear structure, persuasive writing, minor or no grammatical
errors, length and format within requirements, plain language
No grammatical errors, plain language, organized by topic,
references business needs, connects to technical specs,
persuasive
© 2017 Strayer University. All Rights Reserved. This document
contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or
otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
CIS 500 Page 1 of 4
© 2017 Strayer University. All Rights Reserved. This document
contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or
otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
CIS 500 Page 1 of 4
 CIS 500 – Information Systems for Decision-Making   CIS 5.docx

More Related Content

Similar to CIS 500 – Information Systems for Decision-Making CIS 5.docx

The PresentationCongratulations. Your project has been staff.docx
The PresentationCongratulations. Your project has been staff.docxThe PresentationCongratulations. Your project has been staff.docx
The PresentationCongratulations. Your project has been staff.docx
gabrielaj9
 
See AttachmentAssignment 2 The PresentationCongratula.docx
See AttachmentAssignment 2 The PresentationCongratula.docxSee AttachmentAssignment 2 The PresentationCongratula.docx
See AttachmentAssignment 2 The PresentationCongratula.docx
jeffreye3
 
Due Week 10 and worth 200 points Congratulations. Your project has b.docx
Due Week 10 and worth 200 points Congratulations. Your project has b.docxDue Week 10 and worth 200 points Congratulations. Your project has b.docx
Due Week 10 and worth 200 points Congratulations. Your project has b.docx
infantkimber
 
Congratulations. Your project has been staffed and you are about to .docx
Congratulations. Your project has been staffed and you are about to .docxCongratulations. Your project has been staffed and you are about to .docx
Congratulations. Your project has been staffed and you are about to .docx
breaksdayle
 
Assignment 2 The PresentationCongratulations. Your project .docx
Assignment 2 The PresentationCongratulations. Your project .docxAssignment 2 The PresentationCongratulations. Your project .docx
Assignment 2 The PresentationCongratulations. Your project .docx
annrodgerson
 
Assignment 1 The CEO’s Challenge Due Week 3 and worth 150 points .docx
Assignment 1 The CEO’s Challenge Due Week 3 and worth 150 points .docxAssignment 1 The CEO’s Challenge Due Week 3 and worth 150 points .docx
Assignment 1 The CEO’s Challenge Due Week 3 and worth 150 points .docx
deanmtaylor1545
 
Assignment 2 The Presentation Due Week 10 and worth 200 points.docx
Assignment 2 The Presentation Due Week 10 and worth 200 points.docxAssignment 2 The Presentation Due Week 10 and worth 200 points.docx
Assignment 2 The Presentation Due Week 10 and worth 200 points.docx
annrodgerson
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
joshua2345678
 
Assignment 2 The Presentation Due Week 10 and worth 200 points .docx
Assignment 2 The Presentation Due Week 10 and worth 200 points .docxAssignment 2 The Presentation Due Week 10 and worth 200 points .docx
Assignment 2 The Presentation Due Week 10 and worth 200 points .docx
braycarissa250
 
QSO 510 Final Project Guidelines and Rubric Overview .docx
QSO 510 Final Project Guidelines and Rubric  Overview .docxQSO 510 Final Project Guidelines and Rubric  Overview .docx
QSO 510 Final Project Guidelines and Rubric Overview .docx
makdul
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docx
wkyra78
 
IT 510 Milestone Four Guidelines and Rubric You will su
IT 510 Milestone Four Guidelines and Rubric  You will suIT 510 Milestone Four Guidelines and Rubric  You will su
IT 510 Milestone Four Guidelines and Rubric You will su
TatianaMajor22
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx
odiliagilby
 
Running Head TOWN GUIDE ANDROID APPLICATION5TOWN GUIDE ANDROI.docx
Running Head TOWN GUIDE ANDROID APPLICATION5TOWN GUIDE ANDROI.docxRunning Head TOWN GUIDE ANDROID APPLICATION5TOWN GUIDE ANDROI.docx
Running Head TOWN GUIDE ANDROID APPLICATION5TOWN GUIDE ANDROI.docx
toltonkendal
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)
raszky
 
INTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docxINTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docx
bagotjesusa
 

Similar to CIS 500 – Information Systems for Decision-Making CIS 5.docx (20)

The PresentationCongratulations. Your project has been staff.docx
The PresentationCongratulations. Your project has been staff.docxThe PresentationCongratulations. Your project has been staff.docx
The PresentationCongratulations. Your project has been staff.docx
 
See AttachmentAssignment 2 The PresentationCongratula.docx
See AttachmentAssignment 2 The PresentationCongratula.docxSee AttachmentAssignment 2 The PresentationCongratula.docx
See AttachmentAssignment 2 The PresentationCongratula.docx
 
Due Week 10 and worth 200 points Congratulations. Your project has b.docx
Due Week 10 and worth 200 points Congratulations. Your project has b.docxDue Week 10 and worth 200 points Congratulations. Your project has b.docx
Due Week 10 and worth 200 points Congratulations. Your project has b.docx
 
Congratulations. Your project has been staffed and you are about to .docx
Congratulations. Your project has been staffed and you are about to .docxCongratulations. Your project has been staffed and you are about to .docx
Congratulations. Your project has been staffed and you are about to .docx
 
Assignment 2 The PresentationCongratulations. Your project .docx
Assignment 2 The PresentationCongratulations. Your project .docxAssignment 2 The PresentationCongratulations. Your project .docx
Assignment 2 The PresentationCongratulations. Your project .docx
 
Systems Analysis and Design 9th Edition Kendall Solutions Manual
Systems Analysis and Design 9th Edition Kendall Solutions ManualSystems Analysis and Design 9th Edition Kendall Solutions Manual
Systems Analysis and Design 9th Edition Kendall Solutions Manual
 
Assignment 1 The CEO’s Challenge Due Week 3 and worth 150 points .docx
Assignment 1 The CEO’s Challenge Due Week 3 and worth 150 points .docxAssignment 1 The CEO’s Challenge Due Week 3 and worth 150 points .docx
Assignment 1 The CEO’s Challenge Due Week 3 and worth 150 points .docx
 
Assignment 2 The Presentation Due Week 10 and worth 200 points.docx
Assignment 2 The Presentation Due Week 10 and worth 200 points.docxAssignment 2 The Presentation Due Week 10 and worth 200 points.docx
Assignment 2 The Presentation Due Week 10 and worth 200 points.docx
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
 
Assignment 2 The Presentation Due Week 10 and worth 200 points .docx
Assignment 2 The Presentation Due Week 10 and worth 200 points .docxAssignment 2 The Presentation Due Week 10 and worth 200 points .docx
Assignment 2 The Presentation Due Week 10 and worth 200 points .docx
 
QSO 510 Final Project Guidelines and Rubric Overview .docx
QSO 510 Final Project Guidelines and Rubric  Overview .docxQSO 510 Final Project Guidelines and Rubric  Overview .docx
QSO 510 Final Project Guidelines and Rubric Overview .docx
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docx
 
IT 510 Milestone Four Guidelines and Rubric You will su
IT 510 Milestone Four Guidelines and Rubric  You will suIT 510 Milestone Four Guidelines and Rubric  You will su
IT 510 Milestone Four Guidelines and Rubric You will su
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx
 
6. ch 5-understanding requirements
6. ch 5-understanding requirements6. ch 5-understanding requirements
6. ch 5-understanding requirements
 
Running Head TOWN GUIDE ANDROID APPLICATION5TOWN GUIDE ANDROI.docx
Running Head TOWN GUIDE ANDROID APPLICATION5TOWN GUIDE ANDROI.docxRunning Head TOWN GUIDE ANDROID APPLICATION5TOWN GUIDE ANDROI.docx
Running Head TOWN GUIDE ANDROID APPLICATION5TOWN GUIDE ANDROI.docx
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)
 
INTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docxINTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docx
 
system development life cycle
system development life cyclesystem development life cycle
system development life cycle
 
Final
FinalFinal
Final
 

More from aryan532920

According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxAccording to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
aryan532920
 
According to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxAccording to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docx
aryan532920
 
According to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxAccording to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docx
aryan532920
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
aryan532920
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
aryan532920
 

More from aryan532920 (20)

According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxAccording to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
 
According to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxAccording to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docx
 
According to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxAccording to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docx
 
According to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docxAccording to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docx
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
 
According to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docxAccording to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docx
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docx
 
According to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docxAccording to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docx
 
According to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxAccording to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docx
 
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxAccording to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
 
According to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docxAccording to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docx
 
According to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docxAccording to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docx
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
 
According to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docxAccording to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docx
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docx
 
According to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docxAccording to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docx
 
According to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docxAccording to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docx
 
According to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docxAccording to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docx
 
According to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docxAccording to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docx
 
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxAccording to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 

Recently uploaded (20)

Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 

CIS 500 – Information Systems for Decision-Making CIS 5.docx

  • 1. CIS 500 – Information Systems for Decision-Making CIS 500 – Information Systems for Decision-Making Assignment 2: The Presentation Due Week 10 and worth 200 points Congratulations. Your proposal for implementing a new IT project for your organization has been staffed and you are about to meet with your team for the first time. Initial impressions are important and you’ll need visuals for your presentation. Create a slide show (in PowerPoint or similar software) in which you address the following, in this order: 1. Goals: What is the project and what is the intent of implementing (what do you hope to accomplish by implementing the project?). 2. Critical Success Factors: Identify at least 4 different stakeholders; for each, list at least 2 things that the stakeholder requires in order to deem the project successful. 3. Acquisition strategy: Should the system be built in-house, created by a contractor, purchased offthe-shelf and customized, or leased as a service? Explain your rationale. Points: 200 Assignment 2: The Presentation Criteria UnacceptableBelow 70% F
  • 2. Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Goals: What the project hopes to accomplish. Weight: 10% (20 points) Did not communicate what the project hopes to accomplish Did not list project goals Communicated what the project hopes to accomplish Did not list project goals Communicated what the project hopes to accomplish Listed the project goals Communicated importance of project reaching its goals Connected project goals to the organizational strategy 2. Critical Success Did not identify 4 Identified 4 Identified 4
  • 3. Identified and 4. Resources: For in-house development, what people/skills are required and what development lifecycle do you recommend? Otherwise, identify 3 candidate organizations that can deliver the system. 5. System functions: In a table format, summarize the types of users for the system; the business reason(s) each would use the system; the ways that the system supports each of these needs; and how this support differs from the current system. 6. Connectivity: Provide a diagram that shows how the system will connect to the other information systems and what data flows among them. 7. Security: List the most serious cybersecurity threats and vulnerabilities of the new system. Suggest strategies to address them. 8. Mobility: Identify the system’s capabilities for mobile use. Include a title and summary slide. Use one slide for each of the 8 points above. Include speaker notes or audio narration that explains each slide more fully. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Factors: Identify at least 4 different stakeholders; for each, list at least 2 things that stakeholder requires in order to deem the project successful. Weight: 10% (20 points) stakeholders Listed things to make project successful, but did not connect each stakeholder
  • 4. stakeholders Listed less than 2 things each stakeholder would require to deem project successful stakeholders Listed 2 things that each stakeholder would require to deem the project successful justified the selection of 4 stakeholders Explained why each stakeholder would be most interested in 2 things to deem project successful 3. Acquisition strategy: Should the system be built in-house, created by a contractor, purchased off-the-shelf and customized, or leased as a service? Explain the rationale for your choice. Weight: 10% (20 points) Did not compare acquisition strategies Did not determine the best strategy for the proposed information system Inadequately explained the rationale for choosing the acquisition strategy Reasonable comparison of acquisition strategies Determined best acquisition strategy for the proposed information system Somewhat explained the rationale for choosing the acquisition strategy
  • 5. Compared various acquisition strategies Determined which acquisition strategy would be the best for the proposed system Provided rationale for choosing a specific acquisition strategy Analyzed various acquisition strategies, or presented an acquisition strategy that was not previously mentioned Explained why other acquisition strategies would potentially not work Discussed cost considerations 4. Resources: For inhouse development, what people/skills are required and what development lifecycle do you recommend? Otherwise, identify 3 candidate organizations that can deliver the system. Weight: 10% (20 points) Inadequately determined resources needed for the acquisition strategy Limited recommendation for development lifecycle for inhouse development, or three external organizations that can deliver the system Inadequate justification Determined
  • 6. resources needed for the acquisition strategy, but did not justify reasoning Recommended a project development lifecycle for inhouse development, or three external organizations that can deliver the system, but did not justify why they were chosen Determined and justified resources needed for chosen acquisition strategy Recommended a project development lifecycle for inhouse development, or three external organizations that can deliver the system. Presented resources not previously considered Included risk identification and mitigation procedures Proposed a combination of resources and strategy to organize stakeholder efforts toward project completion 5. System functions: In a table format, summarize the types of users for the system; the business Failed to put in table format In table format: Summarized some In table format:
  • 7. Summarized the In table format: Analyzed user reason(s) each would use the system; the ways that the system supports each of these needs; and how this support differs from the current system. Weight: 10% (20 points) Inadequate summary of users for the system Limited explanation of why users would use the system Inadequate description of how system supports users Inadequate comparison of the proposed system to the old system of the types of users for the system Somewhat explained business reasons for system use Somewhat described how the system supports users Reasonable comparison of the proposed system to the old information system types of users for the information system Explained business reasons why each user type would use the system Described how the system supports the needs of each user type Determined how
  • 8. this support differs from the current information system experience and user design considerations Explained design changes that took place between the old and new system Provided rationale for the user types identified Discussed how to reach out to user types to test the system 6. Connectivity: Provide a diagram that shows the other information systems this one will connect to, and what data flows among them. Weight: 10% (20 points) Failed to put in diagram format Inadequate diagram showing your system, hard to follow, incomplete Inadequate or hard to follow the data that would flow among systems, incomplete In a diagram: Showed other information systems that your system would connect to, but hard to follow Demonstrated what data would flow among systems, but hard to follow In a diagram: Showed other existing information systems that your proposed
  • 9. system would connect to Demonstrated what data would flow between your and other information systems. In a diagram: Showed how you selected existing systems that your system would connect to Explained how diagram would be updated and maintained based on changes in the marketplace 7. Security: List the most serious cybersecurity threats and vulnerabilities of the new system. Suggest strategies to address them. Weight: 10% (20 points) Inadequate list of cybersecurity threats Inadequate strategies to address each threat Reasonable list of cybersecurity threats, failed to show why they are most serious Identified strategies to address each threat Listed the most serious cybersecurity threats to your new system Proposed strategies to address each threat Proposed how your new system would integrate with Shadow IT, if at all Demonstrated strategies for current users to avoid threats
  • 10. 8. Mobility: Identify the system’s capabilities for mobile use. Weight: 10% Failed to identify your system’s capabilities for mobile use, incomplete Identified your system’s capabilities for mobile use, but not comprehensive Identified your system’s capabilities for mobile use Proposed situations in which mobile use would happen and situations where its limitations (20 points) 9. Speaker / Audio Notes: Include speaker notes or audio narration that explains each slide more fully. Weight: 10% (20 points) Inadequate speaker notes or audio narration, too much or too little information on each slide provided Somewhat detailed speaker notes or audio narration explaining each slide more fully Included speaker notes or audio narration explaining each slide more fully Speaker notes or audio narration succinct and direct,
  • 11. persuasive presentation Discussed cost considerations, and risk identification & mitigation 10. Clarity, persuasion, proper communication, writing mechanics, and formatting requirements. Weight: 10% (20 points) Unclear structure, not persuasive, major grammatical errors Somewhat clear structure, limited persuasion, grammatical errors, language too simple or too wordy Clear structure, persuasive writing, minor or no grammatical errors, length and format within requirements, plain language No grammatical errors, plain language, organized by topic, references business needs, connects to technical specs, persuasive © 2017 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 500 Page 1 of 4 © 2017 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 500 Page 1 of 4