Discussion 1: Brittany
The concept of inhaling focuses on how we as people receive information ( Stewart 2012). Inhaling has a lot to do with what we receive, and our perception of it. When inhaling information, though it may be from our perception does not mean that it is always accurate. Stewart explains in his text that while someone may be inhaling information, it is still easy to communicate ineffectively (Stewart 2012). When inhaling information and having poor perception you can make communicating with people very uneasy. You could end up making impulsive, decisions, stereotyping, or making assumptions that could hurt or easily offend someone. Through reading the text it shows that mindful listening can be the solution to having poor perception ( Stewart 2012 ). Exhaling relates to how us a people relays information in the communication process (Stewart 2012). In the readings it states that exhaling is an important part oh having healthy communication skills. Being able to express your opinion, emotions, and thoughts, is what balances out communication. With out exhaling communication would be one sided. To have good interpersonal communication skills you have to be able to utilize both skills and at the same time. You have to be mindful to what someone is saying to you, but also be able to express your thoughts about that situation. These two concepts further our understanding of interpersonal communication from the beginning chapters because it shows us how a person grows over time with their communication skills.When you think about how in the earlier chapters it says our identity comes from our social interactions experiences, apart of those social interactions is inhaling informations, and learning to exhale your thoughts, and feelings on something but having mutual respect for each other when communicating. Exhaling is our self expression, which is the part of our identity that communicate who we are from our own perception and not what other people say or think. Listening plays an important role in the inhaling process because not listening to what a person is saying will corrupt your perception of the information that you are receiving, which in can lead to you not exhaling with a reasonable mind. Instead you will probably be exhaling with an emotional mind which causes impulsive, and judgemental decisions.
References
Stewart, J. (2012). Bridges Not Walls. New York: Mc-Graw-Hill.
Discussion 2: Vincent
We are reminded Per Stewart (2012) “that we’re using the metaphor of inhaling and exhaling to explain the receptive and expressive parts of communication…. The first point to remember is that there’s much more to inhaling than the passive reception of incoming messages. Inhaling combines the two active, interpretive processes of perceiving and listening….” (pg.163) Sometimes we take in information in a specific way, it doesn’t necessary mean that our understanding of the information is correct.
In the process while someon.
Discussion 1 BrittanyThe concept of inhaling focuses on how we .docx
1. Discussion 1: Brittany
The concept of inhaling focuses on how we as people
receive information ( Stewart 2012). Inhaling has a lot to do
with what we receive, and our perception of it. When inhaling
information, though it may be from our perception does not
mean that it is always accurate. Stewart explains in his text that
while someone may be inhaling information, it is still easy to
communicate ineffectively (Stewart 2012). When inhaling
information and having poor perception you can make
communicating with people very uneasy. You could end up
making impulsive, decisions, stereotyping, or making
assumptions that could hurt or easily offend someone. Through
reading the text it shows that mindful listening can be the
solution to having poor perception ( Stewart 2012 ). Exhaling
relates to how us a people relays information in the
communication process (Stewart 2012). In the readings it states
that exhaling is an important part oh having
healthy communication skills. Being able to express your
opinion, emotions, and thoughts, is what balances out
communication. With out exhaling communication would be one
sided. To have good interpersonal communication skills you
have to be able to utilize both skills and at the same time. You
have to be mindful to what someone is saying to you, but also
be able to express your thoughts about that situation. These two
concepts further our understanding of interpersonal
communication from the beginning chapters because it shows us
how a person grows over time with their communication
skills.When you think about how in the earlier chapters it says
our identity comes from our social interactions experiences,
apart of those social interactions is inhaling informations, and
learning to exhale your thoughts, and feelings on something but
having mutual respect for each other when communicating.
Exhaling is our self expression, which is the part of our identity
that communicate who we are from our own perception and not
2. what other people say or think. Listening plays an important
role in the inhaling process because not listening to what a
person is saying will corrupt your perception of the information
that you are receiving, which in can lead to you not exhaling
with a reasonable mind. Instead you will probably be exhaling
with an emotional mind which causes
impulsive, and judgemental decisions.
References
Stewart, J. (2012). Bridges Not Walls. New York: Mc-Graw-
Hill.
Discussion 2: Vincent
We are reminded Per Stewart (2012) “that we’re using the
metaphor of inhaling and exhaling to explain the receptive and
expressive parts of communication…. The first point to
remember is that there’s much more to inhaling than the passive
reception of incoming messages. Inhaling combines the two
active, interpretive processes of perceiving and listening….”
(pg.163) Sometimes we take in information in a specific way, it
doesn’t necessary mean that our understanding of the
information is correct.
In the process while someone maybe inhaling information, at a
point it can be very easy for that individual to be unsuccessful,
especially if the discernments are miscalculating or widespread
(Stewart, 2012). In the reading, Stewart describes how “a
student might come late to class and the instructor might think,
“That student is lazy (p.171). This would describe an imprecise
inhaling per (Stewart, 2012) “in conjunction with poor
perception, can breed attribution forming (p. 171), stereotyping
(p. 172), fast thinking (p. 174), making snap judgments (p.
175), making attributional errors (p. 175), and more (Steward,
3. 2012). With erroneous assumptions, can impact the
effectiveness of communicating and become offensive to the
speaker and could cause the receiver to draw back and shut
down.
Exhaling demonstrates and gives us the example the we should
communicate information to individuals effectively (Stewart,
2012). Exhaling is a very import part to interpersonal
communication and is key to the development. Stewart (2012)
you are open with other persons when you disclose yourself to
them, sharing your ideas, feelings, and reactions to the present
situation, and letting other people know who you are as a
person. (319 words)
Reference:
Stewart, J. (2012). Bridges not walls: A book about
interpersonal communication (11th Ed.).
New York, NY: McGraw-Hill
Running Head: FAL16-6WS1-ONP-ISM3015-06
1
FAL16-6WS1-ONP-ISM3015-06
40
Management Information Systems
4. Heather Hale
Rasmussen College
Author Note:
This paper is being submitted on October 10, 2016, for Scott
McCullock’s B351/ISM3015 Section 06 Management Of
Information Systems Course.
Safeway is an organization that is focused on ensuring that they
know better on how they can provide quality products and
services to their customers. By so doing the organization can
make sure that they increase and cultivate more on their
customer loyalty while creating more outlets. It is an
organization that makes sure that they deliver the products on
time and also that it takes the least time possible for the
deliveries.
The organization is also focused on being more accessible such
that it can be an online organization and also brick and mortar
organization. Being able to accomplish this will ensure that they
increase on their competitive advantage such that they are
focused on the larger scale within the market. They want to be
able to make sure that all their clients worldwide can be able to
access their products in no time and have a 1-hour delivery
period.
It will be much easier for their customers since they will know
when to expect their products and also when to order the
products. In return, it will give the customers freedom of being
able to order the products when they want. The organization is
5. focused on having a satisfied customer such that the client can
shop either with their history. That is, they can store the
shopping history of the customer in the database, therefore
being able to know what the customer likes or shops most.
On the other hand, the shop by history option will ensure that
the customer saves time looking up on their most frequent
purchases. More so, this gesture makes sure that the client is
more contented with their services and also that they can rely on
the organization to know what is right for them. Likewise, there
is the shop by aisle option, here, the client is provided with a
simplified category of all the products that the organization
sells.
It makes sure that for a new customer, they can be able to base
their product under the specified categories be it the baby care
section or even the personal attention and health section. By
having these categories available to the customer, they make it
way much easier to make a decision (Oz, 2002). Also, the
arrangement of the information is way much appealing such that
they have a single category and also by the side, another
category with picture representations, therefore, showing the
customer what it is that a particular category stands for.
Furthermore, there is a shop by recipe option whereby the client
is taken through the most common dishes available and how
they can make them. Apart from getting to know how they can
make them, the customer is provided with all the ingredients
necessary for cooking the meal, therefore, increasing the
knowledge of their customers. In most instances, you will find
that the customer does not know the required ingredients for a
certain meal, therefore, necessitating for them to have to look
online for what is needed.
In some of the websites where the client might end up, they will
not have all the ingredients or even the proper names for these
ingredients. The Safeway site eradicates these errors by making
sure that whatever their customer is for is available and also
that they will know how to make the proper meal. Amongst
6. what is included in their shop by recipe category is the main
dishes, the salads, the sides, the desserts, the appetizers and
finally the beverages.
The availability of all this information makes it easier for the
client to prepare a full meal with all that is provided. The
organization like any other offers promotions to their
customers. That is, they have a dedicated area within their
website whereby they have provided all this information. That
is, the online savings sector. In this area, there are the promo
deals options whereby they conduct promotions frequently and a
few lucky customers are awarded.
On the other hand, there are the club card specials whereby the
customers have the stores card with which they earn points for
every purchase made. These card specials improve their
customer participation since no one would want to be left out
and also increases their morale (Laudon & Laudon, 2000).
Likewise, on the online savings sector, the organization has
made sure that they have the buy one get one free offers. These
offers are ideal for those who want to save big on their expenses
and also those who buy many products at once.
One can be able to utilize these offers to have a larger supply of
goods thus saving the time spent on shopping and also the
amount paid on the same. In the same category also, there are
the free delivery options whereby with a certain promotion or
savings deal, the client can be awarded a free delivery with the
purchase. The organization carries out these promotions to make
sure that they keep their customers busy and also that their
customers will be more interactive with them.
The management information systems will be of great help to
such an organization since they will ensure that their customer’s
data is safely stored within the organizations systems. On the
other hand, more time will be saved with the online call centers
therefore freeing more employees (Lucey, 2005). That is, the
employees will be dedicated to helping the customers since
most of the information required is properly displayed on their
website. Management information systems will ensure that the
7. organization will have a competitive advantage within the
market therefore bringing about growth of the organization.
References
Laudon, K. C., & Laudon, J. P. (2000). Management
information systems : organization and technology in the
networked enterprise. Upper Saddle River, NJ: Prentice Hall.
Lucey, T. (2005). Management information systems. London:
Thomson Learning.
Oz, E. (2002). Management information systems. Boston, MA:
Course Technology.
Module 2
The company has the chance of building an online presence by
ensuring that when a customer opens their website, there is a
way that they realize that, and there is a person that is there to
ask them the service that they want. This service would ensure
that customers can access the company’s staff at the time that
they need them. The company can also ensure that their
products are placed on the website to ensure that customers can
view all of their products online so that they can feel the
company’s products while still online. The company needs to
ensure that it has updated its current products online so that
customers can view current items that suit their needs and
desires. The website needs to be appealing so as to ensure that
customers are attracted to continue liking at what the company
offers. There is a need for the website to be detailed so that
customers can find all of the information that they want. The
company can build more of an online presence by ensuring that
customers are well served in a manner that they become
satisfied with the services that are being provided. Building an
online presence requires that the company be there to address
customer concerns such that they can be ready to answer all
questions that are asked by concerned customers. Every
individual in the world need to access the and be in a position
8. to do some transactions comfortably/
Safeway is a company that has an appealing website. The
website is favorable due to its unique features. The website has
a section where customers can save their money online, and this
is an interesting feature since customers can save money up to
the amount that will be enough for them to purchase the item
that they desire. The website also has a short cut whereby one
can shop by history in that one can purchase the same item that
one had bought at a previous time since when a customer opens
the website there are suggestions to what can be offered to
them. The website has the section where customers can order
the items that they want, and there is free delivery for such
goods. The company has a feature where it has advertised free
promotion of its products such that when one purchases an item,
there is a chance for them to enter the draw for amazing prices
to be won.
There are also some features that customers can find to be
unappealing. Such features include terms and conditions that are
stated at the bottom of the company’s website. The cartoon that
is placed in advertising its grocery goods is not appealing since
in other company’s real people are used for this purpose since
they reflect the reality of what goes on in such companies.
Web presence for a company is very important especially to
firms like the Safeway who are involved in the sale of various
products to the customers. I would recommend the company to
post offers on a weekly basis so as for the customers to become
attracted and visit the stores. Including offers to the website of
the company will ensure that people have become attracted to
the firm for caring for their needs. The offers posted should be
accompanied by amazing discounts. The company must ensure
that the discounts on the items offered do not have an effect on
the overall profitability of the company.
The other data that should be captured on the website so as to
boost the sales is the identity of the social media accounts
belonging to the firm. Most of the company especially in the
retailing stores use this approach as means of boosting the
9. sales. A population of the users spends most of their time on the
social media sites. Therefore, labeling the sites at the
company’s website ensure that it has reached many people who
will, as a result, attract more to come and shop from the
company. The company must ensure that all exclusive deals are
posted on these accounts.
The other data that should be captured to assists in boosting the
sales is the performance of the firm in the stocks market. Most
of the people tend to ignore that fact. However, most of the user
have knowledge regarding the stocks. Therefore, posting
information related to the same will ensure that they have
increased their interest in the company and come to shop at the
firm. Similarly, the data on the financial performance of the
company should be included. Contact details are very important
for ensuring that customers have contacted whenever they have
issues. The other data that might boost the sales of the company
is writing about the Corporate Social Responsibility activities
that they are undertaking. This information gives the shoppers
that the firm cares about the society and this may, as a result,
boost the total sales in the company.
Adding the company-sponsored blog to the website be important
will boost the sales that are obtained by the company. The blog
included in the website will have a wide outreach because most
of the people are interested in gaining knowledge from blogs.
The sponsored blog will attract users to view information
presented by the firm regarding offers and deals among other
things. The addition of the blog will benefit the company from
targeting which results from the search engine optimization.
The blog in the website will improve the traffic to the website,
and it might bring the website to the mostly searched. The blog
sponsored by the company are cost effective and cheap to run
compared to the benefits derived from its presence. The blog
will serve as a great resource to the users.
10. References
https://shop.safeway.com/ecom/home
Module 3
Safeway is a company that has a good website. However, there
are many possible risks top the store's security system. These
risks are very real since other big companies have suffered
these security challenges resulting in huge losses regarding
their reputation, loss of data, their money and other losses.
The threats that this company can face include employees,
threats, malicious activities, ignorance, outside attackers and
others. Malicious attackers are people who delete or alter a
company’s information for the purpose of revenge.
There are different kinds of risk to the store’s security system
which include human errors, system glitches, and malicious or
criminal attacks. According to a recent survey is that most of
the risk to the store’s security system are caused by human
errors even though they are not as expensive as those caused by
malicious and criminal attacks. Human errors can include a
situation where sensitive information is delivered to a wrong
person through email or fax. It also occurs where mistakenly
one makes a company’s information available on the website or
the web server. Human error also occurs when one loses or
inadequately disposes of data which includes paper records.
Human error can also occur when one loses an unencrypted
computer, mobile phone or other storage devices such as USB
key. The loss of such information caused by human error can
trigger breach response requirements which are applicable under
the law.
11. The legal impact when the information is seen by anyone can be
similar to that of theft. The threats of human error are that
hackers and thieves can use such information to do unauthorized
outflow of data, or they can compromise the networks causes
large losses. Every company is vulnerable to human errors
which can be harmful and it is the responsibility of the
organization to mitigate the risks by training employees,
implementing access control and implementing data handling
policies.
System glitches is another type of data breach, and it is usually
a sudden, unanticipated and impermanent malfunction in a
computer system or network. System glitches can be in the
form of software failures that provide pathways to be lost,
corrupted or destroyed. It also includes problems in the
application of software of firmware patches as well as updates.
It also includes inadvertent data dumps, authentication failures,
data recovery failures as well as programming errors (Oz,
2014).
System glitches are mainly technological, and they can have
various shortfalls such as outdated software or hardware that are
liable to crashing, insufficient staffing to do monitoring and
other functions.
The other kind of data breach is malicious or criminal attacks.
This kind of breach is caused hackers as well as thieves who are
constantly devising new methods of overcoming security
defenses. This kind of attacks are smaller compared to human
error, but they are too costly to an organization. The list of
hacks and attacks is long and includes such things as physical
theft or loss, outbreaks on web applications, misappropriation
of privileges by rogue workers or other insiders, cyber
extortion, payment card skimmers and others.
A virus is another kind of data breach which is a program that
inserts its executable code into other applications without the
consent of the individual being affected. Viruses tend to corrupt
and destroy data on host computers and can cause the computer
or even the entire network to become unusable until such a time
12. the virus is destroyed. Viruses can reach a computer from other
infected computers through h various mediums such as CD,
DVD or even through a network. Such viruses include file
viruses, script viruses, boot viruses as well as macro viruses.
This data breach is so severe as it leads to exposing personal
information which is embarrassing and costly to an
organization.
Worms is another kind of data breach, and it occupies itself
across a network. The worm can promulgate itself through the
distribution of copies of itself through networks and the
Internet, email communications, or by operating system security
bugs. Worms can carry extra malware such as backdoor
programs. Worms can result in great damage, and they can be
employed to jam communication channels using DoS attack. A
warm can cause large damages as it spreads through the internet
in minutes.
The security policies that need to be implemented include
computer security. Every user needs to have a password which
must have a minimum of eight characters that have letters,
numbers as well as symbols. The computer system
administrators need to ensure that they monitor and control
access systems to ensure that the systems are protected. System
administrators need to ensure that they prevent unauthorized
people from gaining access to a computer network. Servers
need to be kept in a secure room that has limited access to
authorized people only. There are different tools that can be
implemented to ensure the computer network is safeguarded.
Employee passwords can never be stored on a computer that has
access to the internet since hackers can take advantage of these
data to hack the system and do some major harm. Further,
computer security policies need to cover emergencies that occur
due to detection of viruses or security breaches that occur
outside the organization. The security goals include making sure
that the company's systems are safeguarded such that the
company will be free from these threats. The security strategies
that need to be implemented include Social engineering,
13. Various hacking tools, Viruses, Mail bombing, Trojan horses,
worms, Packet replay, Packet modification, IP spoofing, and
Password cracking strategies (Kim, 2016).
There are potential legal and ethical issues that could face the
company. The company can be sued due to these security
policies if they are against the laws and regulations regarding
computer security. The company could also face ethical issues
if it does things that are unethical while formulating and
implementing these policies.
References
Kim, D. &. (2016). Fundamentals of information systems
security.
Oz, E. (2014). Management information systems.
Module 4
The Balanced Scorecard
14. Perspective
Objective
KPI
Target
Finance
The company aims at being a market leader in regards to its
website
43% market control
80%
The company wants to increase market share through the use of
its website
Market share
+15% greater than the five years
The company also intends to reduce overall costs of production
30% reduction in costs.
50%
Customer
outstanding customer service
70% prompt in replying to feedback and other queries
Immediate
Customer retention
60% retention
80% for the next one year
The company needs to make sure that there is constant supply of
goods to the market through its website
70% efficiency in supply
100%
Process
Consistency in quality
a smaller amount than 10% goods returned due to defects
less than 5%
15. diminish inventory turnover
6% turnover
3%
quick to adjust to any alterations in technology
pretty quick
immediate
Learning & Growth
Employee contentment
Survey index
90%
A center of merit quality in training and nurturing the website
experts
15 new apprentice this year
60 trainees each year
To be a great company in terms of its use of the internet and its
website
53 % new computers and devices this year
80%
An balanced scorecard is a framework that is utilized as a part
of key arranging and in administration by different associations
including a not-for-profit association, government and
numerous others. An balanced scorecard adjusts business
conduct to the vision and in addition the system of the
association. It enhances inward and also outer interchanges and
investigate association execution neighboring vital objectives.
The point of this paper is to make an baalanced scorecard and to
clarify its significance in as a measure for assessing execution
and strategizing for achievement.
The organization to be utilized is Safeway and the its site that is
sought in the market. There is different significance of the
baalanced scorecard which incorporates estimation of execution,
increment in immaterial resources and additionally actualizing a
16. methodology. The conventional budgetary measures have been
ended up being incapable since it neglects to mirror the
environment that encompasses today's business. It additionally
neglects to advance long haul thinking which is perilous to an
association.
The baalanced scorecard surveys execution from four
interrelated methodologies: money related, inward business
procedures, and learning and development and in addition a
client. With the improvement of representative learning, inside
business forms show signs of improvement. This pattern creates
better items and administrations; hence, propelled consumer
loyalty and more prominent piece of the overall industry is
achieved, which is replicated in budgetary measures.
As per Niven (2013), the baalanced scorecard helps with
starting four administration forms that identify with fleeting and
in addition long haul activities. The underlying stride helps in
interpreting the vision and the technique for equipped strides.
The accompanying stride includes conveying the operational
terms to the diverse divisions of an association. The other stride
would be that of business arranging. This procedure helps
supervisors to choose the most fitting option that will help the
association accomplish its objectives. Criticism together with
learning helps chiefs to adjust to things that could change which
guarantee that the association makes due for quite a while.
The Business Process Perspective
This perspective insinuates internal business shapes.
Estimations considering this perspective allow the boss to know
how well their business is running, and whether its things and
organizations fit in with customer necessities (the mission).
These estimations must be purposely made by the people who
know these systems most by and by; with our one of kind
missions, these are not something that can be made by outside
counsels.
The Customer Perspective
This hypothesis has exhibited an extending affirmation of the
hugeness of customer focus and purchaser unwaveringness in
17. any business. These are driving markers: if customers are not
satisfied, they will, at last, find diverse providers that will
address their issues. Poor execution from this perspective is
along these lines the principle pointer of future rot, in spite of
the way that the present cash related picture may look
extraordinary.
In making estimations for satisfaction, customers should be
dismembered similarly as sorts of customers and the sorts of
methodology for which we are giving a thing or organization to
those customer packs.
The Financial Perspective
Kaplan and Norton don't slight the standard necessity for money
related data. Propitious and exact financing data will constantly
be a need, and directors will do whatever critical to give it.
Frankly, often there is all that anybody could require dealing
with and treatment of cash related data. With the execution of a
corporate database, it is assumed that a more prominent measure
of the taking care of can be thought and mechanized.
Regardless, the truth of the matter is that the present
complement on financials prompts the "unequal" condition
concerning diverse perspectives. There is perhaps need to join
additional budgetary related data, for instance, peril assessment
and cash sparing favorable position data, in this class.
The Learning and Growth Perspective
This perspective consolidates specialist preparing and corporate
social perspectives related to both individual and corporate self-
change. In a learning pro affiliation, people - the fundamental
vault of data - are the standard resource. In the present climate
of quick, creative change, it is getting the opportunity to be
basic for data workers to be in a constant learning mode.
Estimations can be established to guide boss in focusing get
ready stores where they can help the most. In any case, learning
and improvement constitute the urgent foundation for
accomplishment of any worker data affiliation (Niven, 2013).
18. References
Nair, M. (2011). Essentials of balanced scorecard. Hoboken,
N.J: John Wiley & Sons.
Niven, P. R. (2013). Balanced scorecard step-by-step:
Maximizing performance and maintaining results. Hoboken,
N.J: Wiley.
Module 5
Request for Proposal (RFP)
Company Background
Safeway is a company that was established in 1915. It is a
supermarket that has an American origin. The company deals
with retail or grocery products. Safeway operations are
concentrated mainly in the central and western US. The
company has many subsidiaries all over the world.
Project Description
Safeway is a company that is looking to establish a website that
will be useful in selling its products and also in providing
various services for its customers. The website lacks various
features that are essential for a website to have and there is
need for a good website to be developed. The website needs to
be appealing so as to ensure that customers are attracted to
continue liking at what the company offers. There is a need for
the website to be detailed so that customers can find all of the
information that they want. The company can build more of an
online presence by ensuring that customers are well served in a
manner that they become satisfied with the services that are
being provided. Building an online presence requires that the
company be there to address customer concerns such that they
can be ready to answer all questions that are asked by concerned
customers. Every individual in the world need to access the and
be in a position to do some transactions comfortably. The
objective of having such a website is to increase sales and also
to address the needs of various customers.
Design Requirements
19. the company requires a website that has a sponsored blog to the
website since it will help in boosting the sales that are obtained
by the company. The website also needs to show performance
of the firm in the stocks market. This feature will help many
investors to be in a position to invest with this firm as a result
of viewing its performance. The other data that should be
captured on the website so as to boost the sales is the identity of
the social media accounts belonging to the firm. Most of the
company especially in the retailing stores use this approach as
means of boosting the sales. Including offers to the website of
the company will ensure that people have become attracted to
the firm for caring for their needs. The design also needs to be
in such a way that the company portrays its products in the
website so that customers can view the products are offered in
this company.
Technical and Infrastructure Requirements
the company welcomes bid from qualified professionals in this
area. The individuals need to have an experience in web design
so that they can be helpful in helping the company achieve its
goals. The suppliers need to be knowledgeable in this area top
ensure that the company benefits from their services of creating
and maintaining
Functional Requirements
The company requires that there be a catalog that can be
utilized by the users of the website so that they can realize
where they need to click to find what. The company will also be
aware of the features that have been placed and the ones that are
missing.
Estimated Project Duration
the completion of this project is expected to be after two
months. The company wants to use this website in doing
business. Since the website is an easy procedure, the company
expects to use the website from January 2017.
Assumptions and Agreements
The company expects that the suppliers only submit a single bid
20. and if there is a violation of this requirement there will be an
automatic. Any supplier that does not conform those the rules
and regulations will be dismissed. Suppliers that will be
demanding a price that is too high will not be considered.
Submission Information
the deadline for submitting applications is 30th November
20616. Applications need to be send to the company’s office so
that an assessment can be done for the qualified supplier
Additional Information or Clarification
There are various people from the marketing department as well
as from the technical department that will ask questions to
clarify on other information that is required. The following
emails can be used
[email protected] safeway.com
[email protected]
these two websites will assist the suppliers to deal with the
right people. Anyone with questions or comments can ask these
people.
Basis for Award of Contract
A contract will be awarded to the supplier that meets all of the
evaluation criteria
Supplier
The evaluating criteria that will be employed is
Supplier skills and competence
Experience
The ability to assisting company’s team in an effective manner.
Anticipated Selection Schedule
The selection process will be from now to the 30th of
September
Module 6
An executive summary
Website security is a fundamental aspect of every business as
the need to protect critical information has become a necessary
aspect in the modern world. Many small businesses have also
not been left behind in trying to implement strategies aimed at
21. protecting their websites. Most of the companies that have
found it imperative to have fundamental security plans for their
websites are those that operate by websites and computer
systems. When such websites fail to operate, businesses can
incur unprecedented losses as they may not be in a position to
effectively sell the products as and when required. Customers
may also not be in a position to access the websites and make
orders for their products. Any website that is malfunctioning
may imply that is has been hacked and can be detrimental to the
business as well as the customers. The business records may
also be lost when a database has been lost. Besides, the
employees’ productivity can simultaneously be affected by the
issues related to the websites and virus laden computers.
Such issues related to websites should be avoided by all means
as they can have serious impacts on the businesses. It is
important for the businesses to implement plans aimed at
mitigating the problems associated with the websites. For the
quality functionality of the business, proper plans should be
made to ensure that websites are secure and safe for everyone
and that cases of intrusion have been minimized significantly.
Most of the security issues related to the websites are caused by
hacking by intruders. Most of the hackers use the automated
scripts that they use to render the internet m less useful.
However, all the issues related to the websites are preventable
through proper security plans. The security plan is necessary for
minimizing the vulnerabilities associated with the websites.
Therefore, this discussion will primarily provide an overview of
the website security plans of Safeway Grocery Store. Doing so
will be of great help in the introduction of the security plan, the
strategy of the plan, deliverables and also test cases.
An introduction to the plan
As the need to have secure websites for businesses grow, it has
become necessary to have formulated plans in place so as to
enhance security. When websites have been secured, businesses
can gain profits and save most of the resources necessary for
business growth. The web security of Safeway Groceries is
22. important to protect it from being invaded by hackers. The
security plan for the company’s website will consist of the
following steps.
Updating the software
The company’s software will always be updated to
mitigate any intrusion by the hackers and unwanted users. In
most cases, the website is kept secure when all the loopholes
that can be used by hackers have adequately been sealed. The
IT department will have to determine if the kind of software
that is in use whether it is a managed hosting solution or the
third-party software so as to take the necessary ensure in
securing he web. When the company uses hosting solution to
the website, it would be necessary for it to seek guidance from
the hosting company (Cobb, 2005). However, as is the case with
Safeway Company, it uses the third party software, which will
be effective to use the Content Management System such as
Word Press to detect any issues with the website when logins
have been made.
Minimizing error messages
The plan will also consider the amount of information given
away as error messages to the website users. It will be
necessary also to consider the correct languages to use on the
website to discuss the failure of the website when trying to
login. The comp-any will use language that is simple and
generic such as ‘’ incorrect username’’. It is important for the
companies to have a limit to the information given away to the
web users. The error messages will be minimized since when
web attackers use forced usernames and passwords to gain entry
into the websites, and the error message is given away, they can
use it to gain access to other fields (Administration, 2016).
A web security plans strategy
The company’s website security plan strategy will eventually
involve strategies that seek to minimize the level of attack by
hackers and other users. It will involve an installation of the
web filtering products. The web filtering products are essential
23. in the provision of the security intelligence systems that
monitor the level of threats that the website faces. The
company will consider having a platform whereby the
information on the threats facing the websites can effectively be
shared with all the users in the information department (Kim,
2016). Such consideration will be effective since the company
will be well-prepared to respond to the threats that the website
is exposed to. This is for the reason that such data on the
information can easily help the users to easily notice any
threats. Furthermore, the company will effectively assess all the
elements associated with the website and its sources such as the
Java Scripts. Such critical undertaking will effectively be
instrumental in minimizing malicious attacks on the website.
The company will also ascertain that its websites have been
coded to minimize attacks. Issues such as the Cross-site
Scripting and Script Site Forgeries are mostly common for the
websites that have not observed key coding procedures for the
websites. Coding is a proven method that complicates the
methods that attackers use to gain access to the websites. The
company, despite the fact that it is still growing, will dedicate
most of its resources to ensure that the coding procedures have
been put in place. The company will also communicate all the
procedure to the Information Technology department, as a way
of equipping them with the vital information related to the
coding practices. Application of coding is an effective aspect
of protecting websites as it is less costly that provides complete
solutions to the problems associated with websites. Coding has
100% success rate of preventing criminals from attacking the
websites. It is a strategy will provide a significant solution to
the company’s web, by ensuring that all the risks have been
kept at bay (Harwood, 2011).
Another policy that the company considers effective is the
application of authentic passwords. Such passwords should
have a minimum of at least 8 characters with symbols as well as
numbers to increase security measures. The server and websites
should have strong passwords so as to maximize the level of
24. security for the users’ accounts.
The company’s system administrators should skillfully prevent
any unauthorized people or users from accessing the computer
network. Servers should also operate from a secure room that
bars unauthorized people from gaining access. Employee
passwords should never be stored on a computer that has access
to the internet since hackers can take advantage of data
provided to try and hack the system. The security goals of the
company will be to ensure that the systems are safeguarded to
minimize the threats posed to the company’s website. The
security strategies that need to be implemented include Social
engineering, various hacking tools, Viruses, Mail bombing,
Trojan horses, worms, Packet replay, Packet modification, IP
spoofing, and Password cracking strategies (Administration,
2016).
Deliverables.
Content security policy
Safeway Company will be able to use the language policy so as
to have a policy that is necessary and fit for a website resource.
The policy provides the required guidelines on what the
functions of the website will be. In so doing, the level of
attacks on the company website may be minimized drastically
and keeping the attackers at bay. The content security policy is
essential in detecting the methods that can be used by the
attackers to interfere with the web security through unauthentic
codes. When an attacker uses a code and succeeds to perform an
action, the website may be compromised, and there is no reverse
to such an occurrence (Cobb, 2005). Through this policy, the
server can easily tell the client about the actions which are
acceptable and those who are not through the use of whitelists.
Web regulations at the entry point
The company will have policies that permit various web
applications to have entry points necessitated by the policy
manifest. Web applications have been vulnerable to the XSS/
XSRF because the web design is not formulated such that it can
prevent malicious applications. The entry points are mostly the
25. main factors that expose the web applications to vulnerability.
The bookmarked pages which are found in the browser also
allow for attacks when they have breakages. Therefore, the
boundaries around web applications lead to security issues to
the websites. At Safeway Company, plans are underway to have
a strategy of managing the points of entry through the web
application. The better way to succeed is through having EPR
provided to the client so as to make the policy be a success. The
company is also prohibiting deep-linking of the web
applications for the reasons which are not related to security
(Oz, 2014).
Insecure requests upgrade
The application is mostly used to improve the insecure requests
to more secure before they are utilized in the web. The
company, therefore, will be upgrading the HTTP to HTTPS, in a
bid to ensure that users can only use secure links that do not
make the company vulnerable to web attacks. By upgrading the
links, the comoany6 will also be in a position to transfers
various sites to the HTTPS without altering from changing links
and references to scripts or even images.
Test cases
The company will conduct test cases to establish that the web
security plans have significantly been enhanced. It will conduct
a case to ascertain the correct and incorrect passwords to make
sure that they are not less than 8 characters and that they are not
the same as the user names.
Confirmations will also be made in regards to ensuring that any
person who tries to gain access to the website has been barred
through locking them out. It is a common occurrence for
intruders to access the site platforms using the wrong
credentials to log in. Such occurrences the company has been
incisive in minimizing them (Harwood, 2011).
Another case that Safe Way Company will consider is if the
necessary information about passwords, Credit Card numbers
and also the Identity card numbers are concealed from outside
26. users and attackers. The mechanism to ensure that they
encrypted in a format that cannot be easily understood by non-
users will be enhanced. Also, when typing in the information in
the computer, every set will be required to ensure that it is not
displayed in the input boxes.
References
Administration. (2016, November). Firewall. Retrieved from
The Web Security Strategy for Your Organization:
http://www.firewall.cx/general-topics-reviews/security-
articles/268-web-security-strategy.html
Cobb, M. (2005). TechTarget. Retrieved from How to develop
an effective application security strategy:
http://searchsecurity.techtarget.com/answer/How-to-develop-an-
effective-application-security-strategy
Harwood, M. (2011). jblearning. Retrieved from Security
Strategies in Web Applications and Social Networking:
http://www.jblearning.com/catalog/9780763791957/
Kim, D. &. (2016). Fundamentals of information systems
security.
Oz, E. (2014). Management information systems.
Module 01 Course Project – Business Description and
Components
Total Points Possible
27. 100
Insufficient/Not Evident
Progressing
Competent
Exemplary
Earned Points
Provided a description of the company
Explain the company’s purpose, mission, and structure
(20 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate
(6-11 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(12-15 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(16-20 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
19
Describe the organization’s system in terms of inputs,
processes, and outputs (20 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate.
(6-11 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(12-15 pts.)
Question is mostly addressed; Content meets criteria with
28. minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations
(16-20 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
18
Describe how the company is organized, its people, and
technology features; also, the importance of an MIS system to
the company (20 Max Point Value).
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate.
(6-11 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(12-15 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations
(16-20 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
18
Paper meets minimum 3 page length requirement. Included an
APA formatted title page
(10 Max Point Value)
(0-2pts.)
Paper not submitted. No title page submitted.
(3-6pts.)
Paper is less than 1page long and/ or no APA title page
provided.
(7-8 pts.)
Paper is less than 3 pages long, but at least 2 and/or no APA
29. title page provided.
(9-10 pts.)
Paper is a minimum of 3 pages long. APA formatted title page
provided
9
Demonstrates effective usage of English grammar and
mechanics. (10 Max Point Value)
(0pts.)
More than 10 errors in English grammar and mechanics
observed.
(3-6pts.)
6-10 errors in English grammar and mechanics.
(7-8 pts.)
3-5 errors in English grammar and mechanics.
(9-10 pts.)
0-2 errors in English grammar and mechanics.
9
Transferrable Skills
Communication: Used proper tone in paper. Spoke from a
“consultant” point of view. Kept in mind that audience was the
Leadership Team for the online grocery store (5 Max Point
Value)
(0pts.)
Did not use proper tone and did not structure paper according to
proper audience.
(__1-2_pts.)
Used proper tone somewhat, but paper wasn’t fully structured
properly with audience in mind.
(__3-4_pts.)
Used proper tone mostly. Paper mostly structured properly
according to stated audience.
(_5_pts.)
Used proper tone. Paper structured properly according to stated
audience.
5
Information Literacy: Included a minimum of 2 credible sources
30. for research, with 1 being an academic source, such as a book or
an academic scholarly journal (10 Max Point Value).
(0pts.)
No sources were submitted
(3-6pts.)
Less than 2sources and/or sources are not credible. Missing
1scholarly sources
(7-8 pts.)
2 credible sources were submitted, but 1 was not a scholarly
source
(9-10 pts.)
Included a minimum of 2 credible sources for research, with 1
being an academic source, such as a book or an academic
scholarly journal
9
Information Literacy: Use APA documentation style to cite
sources. (5 Max Point Value)
(0pts.)
No elements of APA formatting used.
(__1-2_pts.) Some elements of APA formatting used.
(__3-4_pts.)
Most elements of APA formatting used.
(_5_pts.)
All required elements of APA formatting are used.
4
Module 02 Project – Strengthening Web Presence
Total Points Possible
100
Insufficient/Not Evident
Progressing
31. Competent
Exemplary
Earned Points
Discussed how the company would build more of an online
presence
(15 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate
(6-10 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(11-13 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(14-15 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
14
Discuss how the business would benefit from adding a
company-sponsored blog to their website (20 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate.
(6-11 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(12-15 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations
(16-20 pts.)
Question is fully and accurately addressed. Content meets or
32. exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
19
Paper meets minimum 3 page length requirement. Included an
APA formatted title page
(5 Max Point Value)
(0pts.)
Paper not submitted. No title page submitted.
(1-2pts.)
Paper is less than 1page long and/ or no APA title page
provided.
(3-4pts.)
Paper is less than 3 pages long, but at least 2 and/or no APA
title page provided.
(5 pts.)
Paper is a minimum of 3 pages long. APA formatted title page
provided
4
Demonstrates effective usage of English grammar and
mechanics. (5 Max Point Value)
(0pts.)
More than 10 errors in English grammar and mechanics
observed.
(1-2pts.)
6-10 errors in English grammar and mechanics.
(3-4 pts.)
3-5 errors in English grammar and mechanics.
(5 pts.)
0-2 errors in English grammar and mechanics.
4
Transferrable Skills
Communication: Used proper tone in paper. Spoke from a
“consultant” point of view. Kept in mind that audience was the
Leadership Team for the online grocery store (5 Max Point
Value)
33. (0pts.)
Did not use proper tone and did not structure paper according to
proper audience.
(__1-2_pts.)
Used proper tone somewhat, but paper wasn’t fully structured
properly with audience in mind.
(__3-4_pts.)
Used proper tone mostly. Paper mostly structured properly
according to stated audience.
(_5_pts.)
Used proper tone. Paper structured properly according to stated
audience.
4
Digital Fluency: Analysis of their website. What was favorable
about their website? What are some of their website attributes
that customers may find unappealing? (20 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate.
(6-11 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(12-15 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations
(16-20 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
20
Digital Fluency: Recommendations for data that they should
capture to help with their online conversions (sales) and why.
(20 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate.
34. (6-11 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(12-15 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations
(16-20 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
20
Information Literacy: Included a minimum of 2 credible sources
for research, with 1 being an academic source, such as a book or
an academic scholarly journal (5 Max Point Value).
(0pts.)
No sources were submitted
(1-2pts.)
Less than 2sources and/or sources are not credible. Missing
1scholarly sources
(3-4 pts.)
2 credible sources were submitted, but 1 was not a scholarly
source
(5 pts.)
Included a minimum of 2 credible sources for research, with 1
being an academic source, such as a book or an academic
scholarly journal
5
35. Information Literacy: Use APA documentation style to cite
sources. (5 Max Point Value)
(0pts.)
No elements of APA formatting used.
(__1-2_pts.) Some elements of APA formatting used.
(__3-4_pts.)
Most elements of APA formatting used.
(_5_pts.)
All required elements of APA formatting are used.
4
Module 03 Project – Securing Information Systems
Total Points Possible
100
Insufficient/Not Evident
Progressing
Competent
Exemplary
Earned Points
Describe some of the possible risks to the store’s security
system (20 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate.
(6-11 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(12-15 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations
(16-20 pts.)
Question is fully and accurately addressed. Content meets or
36. exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
20
Draft a security policy that addresses the risks, identifies
security goals, and discusses strategies for achieving those
goals. (25 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate.
(6-13pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(14-20 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations
(21-25 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
25
Paper meets minimum 3 page length requirement. Included an
APA formatted title page
(10 Max Point Value)
(0-2pts.)
Paper not submitted. No title page submitted.
(3-6pts.)
Paper is less than 1page long and/ or no APA title page
provided.
(7-8 pts.)
Paper is less than 3 pages long, but at least 2 and/or no APA
title page provided.
(9-10 pts.)
Paper is a minimum of 3 pages long. APA formatted title page
provided
37. 10
Demonstrates effective usage of English grammar and
mechanics. (10 Max Point Value)
(0pts.)
More than 10 errors in English grammar and mechanics
observed.
(3-6pts.)
6-10 errors in English grammar and mechanics.
(7-8 pts.)
3-5 errors in English grammar and mechanics.
(9-10 pts.)
0-2 errors in English grammar and mechanics.
10
Transferrable Skills
Communication: Used proper tone in paper. Spoke from a
“consultant” point of view. Kept in mind that audience was the
Leadership Team for the online grocery store (10 Max Point
Value)
(0pts.)
Did not use proper tone and did not structure paper according to
proper audience.
(__3-6_pts.)
Used proper tone somewhat, but paper wasn’t fully structured
properly with audience in mind.
(__7-8_pts.)
Used proper tone mostly. Paper mostly structured properly
according to stated audience.
(_9-10_pts.)
Used proper tone. Paper structured properly according to stated
audience.
10
Ethics and Professionalism: Discuss some of the ethical and
potential legal issues for the company and how the security
measures that you’ve outlined will help to minimize those
issues (20 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
38. extremely inaccurate.
(6-11 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(12-15 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations
(16-20 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
20
Module 04 Course Project – Business Description and
Components
Total Points Possible
100
Insufficient/Not Evident
Progressing
Competent
Exemplary
Earned Points
Describe how the balanced scorecard with help management to
identify information requirements. (30 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate
(6-18pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(19-25 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
39. through appropriate examples and explanations.
(26-30 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
29
Paper meets minimum 3 page length requirement. Included an
APA formatted title page
(10 Max Point Value)
(0-2pts.)
Paper not submitted. No title page submitted.
(3-6pts.)
Paper is less than 1page long and/ or no APA title page
provided.
(7-8 pts.)
Paper is less than 3 pages long, but at least 2 and/or no APA
title page provided.
(9-10 pts.)
Paper is a minimum of 3 pages long. APA formatted title page
provided
10
Demonstrates effective usage of English grammar and
mechanics. (10 Max Point Value)
(0pts.)
More than 10 errors in English grammar and mechanics
observed.
(3-6pts.)
6-10 errors in English grammar and mechanics.
(7-8 pts.)
3-5 errors in English grammar and mechanics.
(9-10 pts.)
0-2 errors in English grammar and mechanics.
10
Transferrable Skills
Communication: Used proper tone in paper. Spoke from a
40. “consultant” point of view. Kept in mind that audience was the
Leadership Team for the online grocery store (5 Max Point
Value)
(0pts.)
Did not use proper tone and did not structure paper according to
proper audience.
(__1-2_pts.)
Used proper tone somewhat, but paper wasn’t fully structured
properly with audience in mind.
(__3-4_pts.)
Used proper tone mostly. Paper mostly structured properly
according to stated audience.
(_5_pts.)
Used proper tone. Paper structured properly according to stated
audience.
5
Digital Fluency:
Discuss the IS system would recommend for management to use
to obtain this information for each scorecard component and
provided rationale for recommendations (30 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate
(6-18pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(19-25 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(26-30 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
29
Information Literacy: Included a minimum of 2 credible sources
for research, with 1 being an academic source, such as a book or
41. an academic scholarly journal (10 Max Point Value).
(0pts.)
No sources were submitted
(3-6pts.)
Less than 2sources and/or sources are not credible. Missing
1scholarly sources
(7-8 pts.)
2 credible sources were submitted, but 1 was not a scholarly
source
(9-10 pts.)
Included a minimum of 2 credible sources for research, with 1
being an academic source, such as a book or an academic
scholarly journal
10
Information Literacy: Use APA documentation style to cite
sources. (5 Max Point Value)
(0pts.)
No elements of APA formatting used.
(__1-2_pts.) Some elements of APA formatting used.
(__3-4_pts.)
Most elements of APA formatting used.
(_5_pts.)
All required elements of APA formatting are used.
5
Module 05 Course Project - Beginning Phase
Total Points Possible
100
Insufficient/Not Evident
Progressing
Competent
42. Exemplary
Earned Points
Demonstrates effective usage of English grammar and
mechanics. (10 Max Point Value)
(0-2 pts.)
More than 10 errors in English grammar and mechanics
observed.
(3-6pts.)
6-10 errors in English grammar and mechanics.
(7-8 pts.)
3-5 errors in English grammar and mechanics.
(9-10 pts.)
0-2 errors in English grammar and mechanics.
10
Transferrable Skills
Digital Fluency:
Create a new folder called “LastName FirstName Project 1” (10
Max Point Value)
(0-2 pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(3-6pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(7-8 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(9-10 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
10
Digital Fluency:
Saved the file to your hard drive. (10 Max Point Value)
43. (0-2pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(3-6pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(7-8 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(9-10 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
10
Digital Fluency:
Add all the required tags (What are they again?)
Title your RFP page: Your Name Project Proposal 1 (15 Max
Point Value)
(0-3pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(4-8pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(9-12 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(13-15pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
14
Digital Fluency:
In the <body>, add 2 headings. Title the first heading: “My
44. Proposal” and the second: “My Research” (10 Max Point
Value).
(0-2pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(3-6pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(7-8 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(9-10 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
10
Digital Fluency:
Separated the headings with a horizontal rule. (10 Max Point
Value).
(0-2pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(3-6pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(7-8 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(9-10 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
10
Digital Fluency:
45. Typed up as much content that will allow you to put together an
RFP for a grocery delivery website. (15 Max Point Value).
(0-3pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(4-8pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(9-12 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(13-15pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
15
Digital Fluency:
Find a picture of project management (use google images),
download it into your project 1 folder, and add it to the “My
Proposal” section of your web page. (10 Max Point Value).
(0-2pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(3-6pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(7-8 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(9-10 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
10
46. Digital Fluency:
Added at least 3 resources to the “My Research” section of your
page. al (10 Max Point Value).
(0-2pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(3-6pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(7-8 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(9-10 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
10
Module 06 Course Project - Website Security Test Plan
Total Points Possible
100
Insufficient/Not Evident
Progressing
Competent
Exemplary
Earned Points
Provided an executive summary (10 Max Point Value)
(0-2pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(3-6pts.)
47. Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(7-8 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(9-10 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
Provided a plan introduction (10Max Point Value)
(0-2pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(3-6pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(7-8 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(9-10 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
Included a web security plan strategy (15 Max Point Value).
(0-3pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(4-8pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(9-12 pts.)
Question is mostly addressed; Content meets criteria with
48. minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(13-15pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
Included deliverables (15 Max Point Value)
(0-3pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(4-8pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(9-12 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(13-15pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
Included test cases
(15 Max Point Value)
(0-3pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(4-8pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(9-12 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(13-15pts.)
49. Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
Paper meets minimum 6 page length requirement. Included an
APA formatted title page
(10 Max Point Value)
(0-2pts.)
Paper not submitted. No title page submitted.
(3-6pts.)
Paper is less than 3pages long and/ or no APA title page
provided.
(7-8 pts.)
Paper is less than 5 pages long, but at least 4 and/or no APA
title page provided.
(9-10 pts.)
Paper is a minimum of 6 pages long. APA formatted title page
provided
Demonstrates effective usage of English grammar and
mechanics. (10 Max Point Value)
(0pts.)
More than 10 errors in English grammar and mechanics
observed.
(3-6pts.)
6-10 errors in English grammar and mechanics.
(7-8 pts.)
3-5 errors in English grammar and mechanics.
(9-10 pts.)
0-2 errors in English grammar and mechanics.
Transferrable Skills
Information Literacy: Included a minimum of 5credible sources
for research, with 2 being an academic source, such as a book or
an academic scholarly journal (10 Max Point Value).
50. (0pts.)
No sources were submitted
(3-6pts.)
Less than 5 sources and/or sources are not credible. Missing 2
scholarly sources
(7-8 pts.)
5 credible sources were submitted, but 2 were not a scholarly
sources
(9-10 pts.)
Included a minimum of 5 credible sources for research, with 1
being an academic source, such as a book or an academic
scholarly journal
Information Literacy: Use APA documentation style to cite
sources. Used in-text citations (5 Max Point Value)
(0pts.)
No elements of APA formatting used.
(__1-2_pts.) Some elements of APA formatting used.
(__3-4_pts.)
Most elements of APA formatting used.
(_5_pts.)
All required elements of APA formatting are used.
51. Ethics & Professional Responsibility
Defining “Ethics & Professional Responsibility”
Ethics and professional responsibility can be defined and
applied in many ways based on a
person’s own values and experiences. Often these terms refer to
our behavior or decision-
making that impacts a larger community. We often derive our
ethical standards and beliefs
from our cultural norms and what we see in society ("Ethics &
Professional Responsibility,"
n.d.).
The Society of Human Resources Managers (n.d) defines
ethics of the workplace as “the values an organization
demonstrates in its goals, policies and practices” (p.1). SHRM
further describes ethical values as the core of the workplace
culture where “ethics encompass work, play, family,
education, community, politics, war, and worship” (SHRM
Foundation’s Effective Practice, n.d.). Each individual’s values
will be influenced by these factors and further influence the
environment of his or her
workplace.
Value of “Ethics & Professional Responsibility” to the
Workplace
and/or Student’s Career
As employees, our values may be categorized in different ways:
organizational,
professional, and personal values. A positive culture, one where
ethical values are
52. integrated, enriches the workplace experience for all
stakeholders (SHRM Foundation’s
Effective Practice, n.d.).While our basis for ethics is ingrained
from societal values, people
will also see and respond to situations quite differently from
each other. Recognizing that
individuals have different reactions will help one another
respect unique differences and “not
view them as somehow wrong” when variances occur (King &
Skakoon, 2010). For example,
meeting deadlines is perceived differently by individuals, to
some it may be considered
simply wrong and unacceptable to not meet the deadline, while
others may not view it as
significant. The reaction to a missed deadline will vary among
peers.
Demonstrating the “Ethics & Professional Responsibility” skill
The results of employees with strong ethical skills can be seen
across the business through
outcomes such as positive workplace environment, productivity,
and teamwork. “Businesses
that have ethical workplace cultures outperform their
competitors and peers in all the
categories that matter, but especially in stock price growth.”
(SHRM Foundation’s Effective
Practice, n.d., p.1) Further, on an individual level, ethical
employees outperform their peers
over time. While unethical decisions made may not impact a
person in the short-term,
reputations build over time and can impact promotional
opportunities and career options.
Individually, the result of ethical behavior is found in our
personal core values and principles
53. and through our professionalism on the job. With strong ethical
and professional
responsibility ingrained, we do not rely on feedback from
others, rather we build “the
capacity to sustain ourselves and move forward even in the
absence of support and
validation from others” (Froman, 2010 p. 61). Building ethical
skills allows for decision-
making processes to become intuitive and can occur more
efficiently.
Workplace Consequences when lacking the “Ethics &
Professional
Responsibility” skill
Organizations need employees who anticipate and adapt to
change and difficult decisions.
The SHRM Foundation’s Effective Practice (n.d.) suggests,
“Ethically engaged, internally
motivated employees learn and adapt faster than ethically
disengaged, externally motivated
workers. With ethical clarity comes trust, which can ease the
tension of difficult workplace
situations” (p.4). While ethics may be full of gray areas, the
ability to think critically
supports the mission of thriving organizations ("Ethics &
Professional Responsibility," n.d.).
Employees who are engaged will feel empowered to strive to
reach ethical standards and
serve customers and co-workers in a positive way.
Further Development of the “Ethics & Professional
Responsibility”
54. skill
Brian Tracy (2012) suggests a process to build the skills related
to professional
responsibility with three steps for growth. First, “accept
complete responsibility for yourself”
and next, that only you can change your situation and finally,
“set clear goals with time
lines” and results will follow (p. 4). These steps can help guide
individuals to developing
ethical skills by avoiding blame and taking an active part in
responding with ethical values in
mind.
Even the best employees can continue their development in the
skill of ethics and
professional responsibility. New situations create new
opportunities for growth. The SHRM
Foundation’s Effective Practice (n.d) considers “ethical learning
happens when people
discuss and debate their values” (p.3). Clarifying our beliefs by
sharing them begins the
process of internally debating the issue. Further, by listening
and sharing ideas with others,
we can hear reactions to our ideas and grow in our respect for
other values.
55. References
Ethics & professional responsibility. (n.d.). Retrieved August 5,
2014, from Online Academic
Guides website: http://guides.rasmussen.edu/ethics
Froman, L. (2010). Positive psychology in the workplace.
Journal Of Adult Development, 17(2),
59-69. http://dx.doi.org/10.1007/s10804-009-9080-0
King, W.J., & Skakoon, J.G. (2010). The unwritten laws of
engineering. Mechanical
Engineering, 132(12), 43-47.
SHRM foundation’s effective practice guidelines series: shaping
an ethical workplace culture.
(n.d.). Retrieved from SHRM Foundation website:
http://www.shrm.org/about/foundation/products/Documents/9-
13%20Ethics%20EPG%20FINAL.pdf
Tracy, B. (2012). The power of self-confidence. Hoboken, NJ:
John Wiley & Sons.
Digital Fluency
56. WHAT DOES DIGITAL FLUENCY MEAN?
Rasmussen College defines Digital Fluency as
“effectively employing and understanding digital tools
to express ideas in appropriate contexts" (“Digital
Fluency,” 2014, para.1). This skill involves a continual
effort to ethically interpret information, uncover the
context and content, synthesize the new knowledge,
and clearly communicate it to an audience who is
immersed in a digitally connected world.
Dictionary.com defines fluent as “able to speak or
write smoothly, easily, or readily” (2014, para 2). People have
communicated through
writing and reading for generations, so being fluent is not a new
concept. What is relatively
new is the introduction of technology which evolves fluency
further. The Internet allows vast
amounts of information to be available to anyone with access to
a digital device. This
limitless access to information requires a different skillset in
order to separate information
from hearsay. Additionally, the web encourages more
collaboration among a variety of
partners. Let’s take Wikipedia for instance. It is generated by
the users (or volunteers) from
around the world, and the content is constantly vetted by the
contributors. The ability to
appropriately utilize Wikipedia with an awareness of its
strengths (i.e., open and
transparent content), weaknesses (content possibly written by
amateurs), and differences
with paper-based references requires digital fluency.
The difference between print and digital technology is that
digital technology is interactive,
57. immediate, and fluid. Our job as digital citizens is then to
translate our current capacities to
understand printed materials and prepare for digital fluency that
will still require us to
process and critically apply information.
WHAT IS THE VALUE OF THE DIGITAL FLUENCY SKILL
TO THE WORKPLACE AND/OR
YOUR CAREER?
The 21st Century Information Fluency Project (2014) states that
“at home, at school, and in
the workplace, digital information is beginning to rival print as
the primary format for
information” (para. 5). Only a small fraction of new
information created today appears in
print format. For that reason, the ability to locate, evaluate, and
ethically use that
information is fast becoming a skill as essential as traditional
print literacy has been. In the
new digital world, information enriches our lives, personally,
socially, and economically.
Those without the skills to use digital information will become
increasingly disadvantaged at
home, at school, and in the workplace (The 21st Century
Information Fluency Project,2014,
para. 1). What does this mean to you as you launch your career?
According to iStart
(2014), increasing computer competency by just 20 minutes a
day adds up to 1.7 hours a
Figure 2. An image of the differences between digital fluency
and digital literacy. Taken from: The Digital Frontline image.
(2011). The Digital Frontline. Retrieved from
http://thedigitalfrontline.com/2012/06/12/digital-literacy-
dont-let-them-learn-it-on-the-streets/ Copyright 2011
58. week in gained productivity. This results in an annual savings
of $1,820 per employee.
Improving digital fluency isn’t only about saving money; it is
also about greater
productivity, or knowing how to work smarter and not harder.
For example, inefficient
processing of the flood of incoming emails slows down other
tasks. Learning to use email
software such as Microsoft Outlook to filter out junk email
makes it easy to search for the
right email you need to access to get the job done. Collectively
developing digital fluency in
the workplace is a sure way to succeed as an organization.
WHAT ARE THE CONSEQUENCES TO YOUR CAREER OR
WORKPLACE IF THE DIGITAL
FLUENCY SKILL IS LACKING? HOW IS THE DIGITAL
FLUENCY SKILL DEMONSTRATED?
Literacy and fluency shape our ability to use technology to
achieve a desired outcome. As an
information consumer, this applies to our ability to use
available digital resources to gather
information that we intend to communicate, and it applies to our
ability to use digital
technologies to have the intended positive effect on people and
situations. Note that a
literate person is perfectly capable of using such resources. He
or she knows how to use
them and what to do with them, but the outcome is less likely to
match the intention. It is
not until that person reaches a level of fluency, however, that he
59. or she is comfortable
with using the resources to achieve the desired outcome. He or
she can even appreciate
why the resources being used are appropriate and likely to have
the desired outcome at all
(Christian, 2011). Lack of digital fluency will lead to poor
research and shallow analysis of
the information to be processed.
Digital fluency can be demonstrated in a workplace in a few
ways. One example is how you
interact with your colleagues online, such as personal email or
discussion forums. Virginia
Shea (1994), the author of Netiquette, defines it as “network
etiquette, the do's and don'ts
of online communication” (p. 20). She outlines ten rules and
reminders of Netiquette in her
book. Some of the rules include:
• Rule 1: Remember the human
o Remember that behind every screen is a human being with
independent
thoughts and feelings. It is easy to misunderstand or be rude to
others when
you are not interacting with them in person. Before clicking
send or post, ask
yourself: Would you say it to the person's face?
• Rule 2: Adhere to the same standards of behavior that you
follow in "real life"
o This rule is a reminder that the ethical standards and laws that
govern our
society extend to cyberspace as well. This includes harassment
and bullying,
60. copyright regulations, and privacy.
• Rule 8: Respect other people's privacy
o The Internet is an open forum. Remember not to share
information about
others that could get them -- or yourself -- into trouble, both
personally and
professionally (Shea, p.33).
Mastery of rules such as these make employees dependable,
trustworthy, and productive.
WHAT CAN STUDENTS DO NOW TO FURTHER DEVELOP
THIS TRANSFERABLE SKILL?
Students can take advantage of many opportunities Rasmussen
College offers to develop
digital fluency skills. On campus, there is a computer lab with
the latest software to learn
and practice your skills. Online, there are Online Academic
Guides available
(http://guides.rasmussen.edu) at Rasmussen College’s website
(Rasmussen College
Website, 2014a 2014b) to help you learn how to research topics.
The librarians are always
available to answer any questions you have. Outside of
Rasmussen College, your local
library may offer a digital studio where, for example, you can
learn to compose music on
your computer. Computer programming is another avenue to
develop digital fluency.
61. Mitchel Resnick at the Massachusetts Institute of Technology
(MIT) argues that “coding is
the new literacy. To thrive in tomorrow’s society, young people
must learn to design, create
and express themselves with digital technologies” (The
Berkman Center for Internet &
Society, 2014, para. 3). Scratch language developed at MIT
teaches anyone to think
creatively and use logic – both skills indispensable in the new
digital world. The key is to
embrace technology to build confidence in your ability to use
technology.
http://guides.rasmussen.edu/
References
62. Christian. (2011, February 5). The difference between digital
literacy and digital fluency.
Retrieved from http://www.socialens.com/blog/2011/02/05/the-
difference-between-
digital-literacy-and-digital-fluency/
Fluent [Def. 2]. (2014). Retrieved from
http://www.dictionary.com
Rasmussen College Website. (2014a). Digital fluency. Retrieved
from
http://guides.rasmussen.edu/digital
iStart. (2014). Digital literacy: Getting your workplace up to
speed. Retrieved from
http://www.istart.co.nz/index/HM20/AL213/AR214189
Rasmussen College Website. (2014b). Home. Retrieved from
http://guides.rasmussen.edu/
Resources. (2014, July). Retrieved August 13, 2014, from
Resources website:
http://guides.rasmussen.edu/digital2
Shea, V. (1994). Netiquette. (Online ed., pp. 32-45). San
Francisco: Albion Books. Albion
Books.
21st Century Information Literacy. (2014, January 7). Why is
DIF important? Retrieved from
63. http://21cif.com/resources/difcore/dif_faqs.htm#important
The Berkman Center for Internet & Society. (2014, July 10).
21st century literacy: New initiative
makes the case that learning to code is for everyone. Retrieved
from
http://cyber.law.harvard.edu/node/9222
The Digital Frontline image. (2011). The Digital Frontline.
Retrieved from
http://thedigitalfrontline.com/2012/06/12/digital-literacy-dont-
let-them-learn-it-on-the-
streets/
INFORMATION LITERACY
WHAT DOES IT MEAN?
According to the Association of College & Research Libraries
(ACRL), information literacy is
“the set of integrated abilities encompassing the reflective
discovery of information, the
understanding of how information is produced and valued, and
the use of information in
creating new knowledge and participating ethically in
communities of learning” (Framework
for Information Literacy for Higher Education, 2015, para. 6) It
64. is a survival skill for the Age
of Information.Information literacy also provides a foundation
for lifelong learning, and is
essential to responding effectively in the ever-changing
academic
and workplace environment. . It is common to all disciplines, to
all
learning environments, and to all levels of education. In fact,
businesses actively search for employees who are able to gather
information quickly, evaluate, analyze, and present realistic
solutions
based on the information gathered (Owusu-Ansah, 2007).
Individuals who are ‘information literate’ are empowered to
make
sound arguments, appreciate different perspectives, and search
for
opportunities for personal and professional improvement. The
High-
Level Colloquium on Information Literacy and Lifelong
Learning
(UNESCO, 2005) proposes that information literacy is “a
prerequisite
for participating effectively in the Information Society and is
part of
the basic human right of lifelong learning” (p. 30).
An information literate individual is able to meet several
performance indicators, and the
first one is being able to determine the extent of information
needed. Before gathering
research even begins, part of the information literacy process
involves being able to define
the information needed, understanding what type of information
is needed, and determining
exactly how much information is needed.
65. After determining the information needed, next the information
literate individual will be
able to find and access the needed information effectively and
efficiently.
Determining the best way to retrieve information and what
search systems will be most
effective and efficient are signs of information literacy.
Information literacy is more than
knowing how to use technology to gather facts and figures.
Individuals can be information
literate regardless of access to a specific type of technology or
device. Technology is the
vehicle for access to online and physical library systems on
campus, at home, at work, or
even at the local coffee shop. This open access to resources is
critical to writing a paper,
collaborating on a team project, or even locating directions to
the nearest gas station.
The next step in the information literacy process is being able
to critically evaluate
information and its sources. Is the information that has been
gathered valid and relevant?
This step is increasingly important as we now depend almost
solely on technology to help us
find information. Constant changes in technology require the
ability to navigate through
multiple types of sources online quickly and easily; however,
not all information gathered
from the internet is appropriate or reliable. The International
Federation of Library
Associations and Institutions (2012), delves into the need for
66. individuals to understand how
to avoid using generic, but readily-available search engines like
Google as a primary source
of information. Although Google can provide answers to the
radio announcer’s trivia
question of the day, it is not the best source for identifying all
of the possible side effects to
the drug the neonatologist just prescribed an infant patient.
The ability to evaluate information with a critical eye is often
challenging and multi-
dimensional. It is not always easy to locate answers to
important questions in just one
attempt as effective search strategies are often complex.
Individuals who are ‘information
literate’ are able to locate information from a variety of
appropriate sources, and revise
search strategies if information gathered is irrelevant, biased, or
insignificant. Information
literacy does go beyond a finite skill set to the notion that
allows the individual to gain a
new view of a subject landscape move through a “liminal”
space, an uncomfortable,
challenging transition, and emerge with transformed
perspective.
After evaluating the information gathered, the next step is to
incorporate the selected
information into one’s knowledge base and use information
effectively to accomplish a
specific purpose. Information gathered might simply be for
personal growth, or it could be
for academic tasks and professional development. Lifelong
learning is at the center of
information literacy. Lifelong learners recognize that learning
happens every day and
67. adding new knowledge to our ‘wheelhouses’ provides growth
and development both
personally and professionally.
The final step in the information literacy process is to
understand the economic, legal, and
social issues surrounding the use of information, and access and
use information ethically
and legally. This involves more than plagiarism and also
encompasses freedom of speech,
privacy, intellectual property, fair use, and much more. Using
information ethically also
extends outside of the academic world. Corporations have
compliance and legal
departments directly responsible for the application of rules and
regulations by employees
and the organization itself. Economic and legal penalties can be
imposed if an individual,
organization or institution has not followed proper guidelines in
crediting original authors,
editors, or groups with acknowledgment of their original work
WHAT IS THE VALUE OF INFORMATION LITERACY IN
ONE’S CAREER?
HOW IS THIS TRANSFERABLE SKILL DEMONSTRATED?
Proficiency of information literacy equips individuals with the
strategies to be independent,
critical thinkers. Being information literate is an important
skill for any career. In the
health and human services fields, information literacy is
essential to understanding
documentation, records, charts and treatments to guarantee care,
accuracy in diagnosis,
treatment plans and patient instructions. According to
UNESCO (2005), Dr. Phil Candy
68. stresses that information literacy is crucial for health care
workers to provide ethical,
responsible services to patients and collaboration across sectors,
including “education, care
providers, insurance companies, libraries, publishers and
pharmaceutical companies” (p.55).
Dr. Candy also emphasizes a need for evidence-based decision
making in healthcare to
provide patients with the best options for therapies and
pharmacological interventions
(UNESCO, 2005).
In the criminal justice and related fields, information literacy is
imperative to recognizing
the application of laws, statutes and the legal system, and
ensuring that justice is applied
fairly and consistently. As a law enforcement detective, it is
essential to understand how to
investigate a ‘cold-case’ by collection of evidence, research of
previous cases, witness
testimony review and analysis of similar criminal reports in
adjacent jurisdictions. A suspect
would not be held accountable for his or her actions if the
detective relies on unreliable
information gathered from a generic internet search on “How to
pursue a homicide suspect.”
Additionally, in fields of business, information literacy is
crucial to team collaboration and
successful project management. All members of the team need
to be able to gather
relevant information quickly and evaluate source materials for
bias and appropriate business
69. application. Creating an innovative solution or new product
often requires understanding of
patent processes, cost analysis and knowledge of previous
attempts by competitors.
WHAT ARE THE CONSEQUENCES IF INFORMATION
LITERACY IS
LACKING?
Competition for jobs is often a reality in many fields, and
college graduates need to be
prepared to prove their worth during the interview process.
Unfortunately, without
successful tools in information literacy, candidates may be
overlooked for jobs despite solid
transcripts and work experience. Imagine a graduate with a 3.5
GPA, externship
experience, and glowing letters of recommendation interviewing
for a coveted position with
a Fortune 500 company. The interview is going well, and the
graduate is able to answer all
of the questions about skills for the job impeccably. The
interviewer then asks, “How would
you lead a team to find a solution to our company’s current
problem with…?” Without the
ability to explain the information literacy process succinctly,
the graduate may lose out on a
dream job.
In a recent study from Project Information Literacy (Head,
2014), college students were
more likely to use Google as a search engine and preferred
“online forums, blogs, webinars,
MOOCs, YouTube, and face-to-face conversations” for
information sources (p.4). By
avoiding opportunities to perform scholarly research using
70. appropriate methods, students
are unable to practice the strategies needed to be ‘information
literate’ upon graduation.
According to Owusu-Ansah (2007), individuals must also
understand how “copyright,
intellectual property and plagiarism” are critical factors in
information literacy skill
development (p.417). Information literacy is essential for
employees to produce ethically
and legally compliant products and services. When individuals
are not cognizant of the
ramifications of failure to comply with copyright laws and
plagiarism rules, the result can be
disastrous. Consider the following scenarios:
A. An employee creates a presentation to the Board of Directors
of the company and
includes an online video from a Grammy-winning artist. The
emotion and passion of
the video, music and lyrics fit perfectly into the presentation
and the reaction from
the board is overwhelmingly positive. The company agrees to
sign a contract with
an outside vendor for $1 million provided the music is included
in the marketing
campaign. Unfortunately, the employee did not understand
Creative Commons
licensing and assumes it is not a big deal to gain permission
from the artist. The
original artist files a lawsuit against the company for violation
of copyright, the
company loses the $1 million contract, and the employee is
fired.
71. B. A Nursing student is in the final quarter before graduation
and has already accepted
a position at a prestigious local hospital in a preferred
department. The job offer is
contingent on a diploma in hand by the end of the quarter. The
student has an A in
the externship course and the final project is due at the end of
the next week. The
student has been working 40+ hours at a local pharmacy, caring
for an elderly
parent and managing a household. A classmate suggests that the
student save time
by copying a section from a blog she found online. The student
likes the information
but is not sure how to properly cite the information. She adds
the content anyway to
“get the job done.” The instructor checks all students’
reference citations, locates
the plagiarized portion and gives the student an F in the course
for violating the
college’s Academic Integrity policy. The student loses the job
at the hospital and
must retake the course the following quarter and adjust her
student loan to pay for
the course a second time.
WHAT CAN A STUDENT DO NOW TO FURTHER DEVELOP
THIS SKILL?
Students can develop information literacy skills through
practice and application in
researching and retrieving information in each course at
Rasmussen. Knowing resources
and creating habits of inquiry establish a foundation for
72. success. The High-Level Colloquium
on Information Literacy and Lifelong Learning (UNESCO,
2005) created a model, titled
“Empowering 8,” to describe the process by which students
develop through stages when
applying information literacy to new situations (p. 31-2).
1. Identify a personal need for information to solve a problem;
2. Explore the problem, and develop a search strategy by posing
important questions
that need attention;
3. Select the sources from which information can be obtained:
print, electronic, or
human;
4. Organize, sort, analyze, and evaluate the information to apply
it to the specific
problem;
5. Create by synthesis one’s own answer based on the facts
available, and be
prepared to justify the decision
6. Present the new knowledge, understanding, or resolution
using a medium that is
practical for the audience
7. Assess the success of the activity in terms of content
investigated, the skills
learned, and the product’s applicability through personal,
teacher, and peer feedback
and evaluations.