SlideShare a Scribd company logo
1 of 28
Student Number: Sxxxxxxx
Email:
Assignment 3
Due Date: 2 May 2014
Lecturer:
Course Coordinator:
Executive Summary
Cloud computing promises a transformation in the provision of
IT services to businesses and other organisations. Along with
many advantages to the business that include easy scalability
and ubiquitous access to resources, there are many risks that a
business must consider before deploying a cloud solution. These
risks include a loss of control over service restoration in case of
failure and possible security risks due to attack via the Internet.
To mitigate against those risks businesses need to have well-
written contracts, develop strict and easily understood polices
to ensure the appropriate storage of information and have multi-
factor authentication to access sensitive information via the
Internet.
This report considers the situation of GlobDev, who are an Aid
and Development organisation headquartered in Melbourne with
staff in many developing countries. Using recent research, the
report analyses the advantages and disadvantages of Cloud
Computing, associated security risks and mitigation, and
examines using cloud services to enable secure mobile
computing. The report proposes a possible path to the
transformation in the delivery of IT services in GlobDev
through the migration to cloud based services. The report
supports the use of cloud computing through mobile devices
provided to field staff. The engagement in technology through
social media applications and mobile technology should
improve donor engagement and expand GlobDev’s opportunity
for growth by increasing its supporter base.
Table of Contents
1.0 Introduction 4
1.1 Organisational Context 4
1.2 Objective and Methodology 4
1.3 Report Outline 5
2.0 Definitions of Cloud Computing5
3.0 Advantages and Issues with Cloud Computing 6
3.1 Advantages of Cloud Computing 6
3.2 Issues with Cloud Computing 7
4.0 Security Risks in Cloud Computing 7
5.0 Opportunities for growth through Cloud Services 9
6.0 Conclusions 9
7.0 Recommendations 11
8.0 Reference list 13
1.0
Introduction
1.1 Organisational Context
Cloud computing is an increasingly popular method for
delivery of software services and storing data. GlobDev is a not
for profit large organisation, headquartered in Melbourne, that
runs aid and development programs in underdeveloped nations.
The projects are organised by people from developed nations
including Australians who are part of this organisations staff.
National staff in each country are also employed by the
organisation. There are currently 2150 people employed in
Projects across 38 nations with a further 50 people employed in
administration in 10 donor countries plus a further 70 staff in
the head office in Melbourne. Projects and administration costs
are funded through personal and corporate donations along with
contributions from the foreign aid budgets of some G-20 major
economies. The company has a central server located in the
Melbourne Headquarters that is only backed up locally. There
are desktop computers located in donor countries and with each
project. While many of the staff in donor countries have laptop
computers, very few staff working in projects have any sort of
mobile computing device dues to security concerns with having
devices that hold extremely sensitive data that can be easily
accessed if stolen. Maintaining backups of data on desktop
computers in each country is extremely problematic and relies
on adherence by local staff to the organisations IT policies and
procedures. 1.2 Objective and Methodology
GlobDev is investigating Cloud computing to enable staff to
more effectively, efficiently and securely utilise ICT resources
to access, process and distribute information in a timely
manner. One of the major concerns expressed by the governing
board is the security of information if it is stored in locations
not controlled by the organisation. The governing board also see
opportunities to expand its base of donors through more open
connections between staff and donors that a cloud solution
might enable. The objective of this report is to provide a
rationale for employing Cloud Computing services and address
the security concerns of the governing board. The report will
also detail opportunities for using cloud services to widen its
supported base. Information contained in this report has been
primarily sourced from peer-reviewed journals along with
industry publications.1.3 Report Outline
The report will first define the concept of Cloud
Computing services to specify the components of a Cloud
Computing solution. Second, it will detail the advantages and
disadvantages of using cloud-based services. Third, it will
address the security concerns of the governing board along with
strategies to mitigate the risk. Fourth, it will demonstrate clear
improvements in information security that Cloud Computing
offers. Fifth, the opportunities to increase engagement with the
existing donor base and appeal to new donors will be discussed.
The report will conclude with recommendations for proceeding
with Cloud Computing services. 2.0 Definitions of Cloud
Computing
Cloud Computing consists of computing resources hosted
on multiple networked computer servers to provide a seamless
connection to resources (Mell & Grance 2011). This differs
from the server specific model of providing resources where
access is provided through connections to specific servers.
Cloud Computing can be either public, where services are
provided by an organisation to individuals or organisations, or
private, where the services are provided exclusively for the
organisation itself (Mell & Grance 2011). Private clouds can be
hosted by the organisation or hosted by a third party (Mell &
Grance 2011); the important differentiator is exclusivity and not
the location of the services.
Cloud Computing is deployed using three different service
models, Software as a Service (SaaS), Platform as a Service
(PaaS), and Infrastructure as a Service (SaaS). SaaS utilises
some form subscription service to access software. The cloud
provider controls the software and can change the software
without notice to the individual or organisation (Mell & Grance
2011). The software can reside on the provider’s infrastructure,
where it is accessed through an Internet browser or a client
application, or installed on the subscribers’ computer and
updated through a provided mechanism. PaaS is where a
provider allocates resources and an application environment on
which the clients applications are hosted (Mell & Grance 2011).
The client retains control over the applications while the
provider contracts to support the underlying environment. IaaS
is where a cloud provider supplies fundamental computing
resources for a wide variety of computing uses (Mell & Grance
2011). These uses can include storage, printing, and application
environments that are fully controlled by the service subscriber.
Subscribers are not limited to a single service model, but can
choose elements of all three models for provision of a wide
variety of computing services.3.0 Advantages and Issues with
Cloud Computing 3.1 Advantages of Cloud Computing
There are many advantages from changing from a
traditional networked approach to computing resources to a
cloud-based model. Iyer and Henderson (2012) interviewed
seven companies and identified six key benefits. First, managers
were able to better focus on using IT to meet business needs
rather than frequently encountering significant hurdles
leveraging existing IT infrastructure. Second, the modularity in
design of Cloud Computing enables faster deployment of new
services and the ability to reuse existing IT infrastructure for
new services. The modularity enables scalability of services
with correct sizing of infrastructure to meet current needs and
expand as requirements change. Third, cloud services enable
multiple locations access to the same services and resources to
allow seamless collaboration between different parts of a
business. Fourth, cloud based applications are quicker to
develop and upgrade than conventional development models.
Fifth, cloud-based applications tend to have better
interoperability between specialist applications due to a more
standardised application environment. This allows selection of
services from a diverse range of vendors that have high levels
of interoperability. Sixth, cloud services allow the development
of social interaction within client facing applications. This
connection has delivered higher levels of customer satisfaction
in other businesses. Jeon, Yvette and Byungjoo (2012) identify
another key advantage for this organisation in allowing the use
of mobile devices to access resources enabling field staff higher
quality access to information in timelier manner that will
facilitate more effective communication. Cloud computing can
enable a transformation business processes and connections
with field staff and donors. However, there are problems
associated with cloud computing that need to be considered.3.2
Issues with Cloud Computing
Utilising public cloud computing services poses particular
risks to the organisation that must be considered. Tisnovsky
(2010) identifies four risks for businesses. First, the
organisation loses control over the infrastructure on which the
services are hosted. Second, there is a financial incentive for
cloud providers to host a maximum number of services on a
particular piece of infrastructure, which can lead to contention
issues with other organisations. Third, a lack of control over
backup and restore processes can lead to long delays in
restoring vital services. Fourth, the location of storage can be
anywhere in the Internet and the organisations data may be
housed on servers located in countries where the organisations
information may be in conflict with the laws of that country.
Another issue is the resistance of staff in changing to a cloud
based model for accessing services which will necessitate
training of staff to ensure a positive acceptance of the changes
(Wu, Lan & Lee 2013). By far the biggest issue that must be
addressed is security of information that is accessed over the
Internet for both public and private cloud services (Srinivasan
2013). 4.0 Security Risks in Cloud Computing
To ensure security of information in the cloud, Fernandes
et al. (2014) analysed peer reviewed literature and found six key
requirements for a public cloud. First, there must be a method
for identifying the requestor and then authenticating access to
the cloud. Second, the cloud must have a system for controlling
the level of access granted to each individual. Third,
confidentiality of the information must be maintained. Fourth,
audit trails are necessary to ensure the integrity of stored
information. Fifth, information transferred between the
individual’s end computer and the cloud must have a positive
indication that both the cloud and the end computer have
received the information. Sixth, the information must be
available when required by an individual. With a private cloud,
security concerns are less stringent as the organisation retains
much greater control over information, as public sharing is
more difficult (Fernandes et al. 2014). Public dissemination of
information in a private cloud requires individuals to
deliberately choose to act against organisational policies.
Cloud providers have a clear duty to ensure a very high level of
physical security across multiple locations. Each location is
very carefully chosen with many levels of redundancy across
multiple site to ensure very high levels of availability
(Fernandes et al. 2014). Therefore, physical access is much
higher within the cloud providers than exists within the current
data centre of this organisation. As the information in the cloud
would be spread across geographically diverse sites, the
information is far less likely to be lost than if there was a
catastrophic failure at the organisation’s headquarters.
Elasticity in the allocation of resources, in both public cloud
services and a virtual private cloud, is a possible security threat
to the organisation. If the organisation scales down its need for
storage space from a cloud provider, the organisation needs to
ensure that any resources released are properly cleaned up by
the cloud provider. Otherwise another organisation could access
that information (Behl & Behl 2012). The security concerns
surrounding dynamic allocation of resources by cloud providers
is most problematic in SaaS services where storage is provided
along with access to software as companies oversubscribe
storage allocation as it is unlikely all subscribers will use all
allocated storage space (Dou et al. 2013).
Single authentication factors, those that only rely on a password
for access to resources, are a major security threat to an
organisation (Weir et al. 2010). This becomes more problematic
where people use multiple systems that have differing password
requirements. Many people find it difficult to remember
multiple passwords and tend to keep written records of
passwords readily available. To mitigate these risks, password
management systems need to be implemented as part of a cloud
strategy (D'Costa-Alphonso & Lane 2010). For sensitive
information that must be kept confidential, a multiple factor
authentication needs to be incorporated (D'Costa-Alphonso &
Lane 2010). Multiple factor authentication includes biometrics,
access tokens and trusted devices along with a password to
access resources (Sarier 2010; Weir et al. 2010). Security risk
mitigation needs to be incorporated simultaneously with the
implementation of Cloud Computing along with well written
and strict policies and guidelines (Karadsheh 2012). These
policies and guidelines will provide all staff with clear direction
on the most appropriate storage services for the various types of
information they generate and consume. Incorporating well
designed security systems into a cloud solution will enable the
use mobile devices in the organisation. 5.0 Opportunities for
growth through Cloud Services
The biggest opportunity for growth from utilising cloud
services lies in the enabling of high quality communication
between donors and field staff through use of cloud enabled
mobile technology. Tablet computers running on Android, iOS,
OS-X and Windows platforms allow the installation of cloud-
enabled applications that can connect to both public and private
clouds. Android, iOS and OS-X also have the ability to be
remotely locked and erased (Apple 2014; Google 2014).
McAfee (2014) offer a secure public cloud storage solution that
works on Android, OS-X and Windows platforms that uses
biometric authentication to secure information. Equipping staff
working in overseas projects with either Apple Mac laptops or
Android tablets no longer poses a security risk to the
organisation with appropriate cloud solutions. In developing
applications for mobile devices for field staff, applications can
then be developed for current and possible future donors. There
are many benefits for project employees and donors alike with
engaging applications as they increase satisfaction with the
organisation, thereby increasing the likelihood of maintaining
long-term relationships (Hua, Tao & Xihui 2014). 6.0
Conclusions
The research demonstrates that it is possible to utilise
secure cloud computing services that will bring benefits to the
GlobDev organisation. From an infrastructure perspective,
migrating from the current server centric access model will
more allow more responsive scalability of resources which will
reduce both management costs. The costs associated with
having underutilised resources will also be reduced. As cloud
applications are faster to develop and deploy, GlobDev will be
able to design applications that better meet the needs of the
organisation and redesign those applications as business needs
change. As cloud services are ubiquitous and many of
GlobDev’s staff are located in very diverse locations, deploying
cloud services will allow much greater collaboration between
staff working on similar projects. High levels of interoperability
between cloud applications will allow GlobDev to select
applications from different vendors that meet particular needs
of business units and projects while minimising risks of
incompatibility. The social networking elements in cloud
computing could be leveraged to develop a close relationship
between the GlobDev project staff and the donors interested in
those projects. Those close relationships should improve the
morale of field staff and increase satisfaction among donors.
Those relationships will then from a point of difference between
GlobDev and other aid and development organisations, enabling
the organisation to keep donors for significantly longer periods
of time and encourage others to become donors.
GlobDev will need to carefully consider which resources
and information it migrates to a private cloud, which is located
in the head office, which resources and information are
migrated into a virtual private cloud and what public cloud
services could be utilised. This need for a multi-modal approach
is due to there being risks and benefits in each mode where the
needs of the various parts of the organisation need to be
assessed to determine the best fit. Staff training needs would
also need careful consideration to ensure a positive acceptance
of the changes in processes and minimise the reduction in
productivity during migration.
Security remains a major concern with any Internet based
service. Those risks can be minimised through the careful
selection of service providers, the identification of the security
requirements surrounding the various types of information
stored by the organisation and the setting of well written and
clearly specified IT policies relating to document storage. When
selecting service providers, the authentication processes
employed by the providers and their policies in relation to
cleaning up reallocation of resources must be clearly written
into service contracts. This would also maximise the security of
information. Of critical importance to GlobDev is the location
of information stored by a cloud provider to avoid the
possibility of sensitive information creating legal difficulties in
countries in which GlobDev has current and possible future
projects. Multi factor authentication should be a key
requirement in assessing the offering by a cloud provider to
eliminate the risk of compromised passwords allowing
unauthorised access to sensitive information. A password
management system will also be necessary in a multi-modal
solution due to the requirement for authentication for each
resource to avoid staff having to keep a physical record of all
their passwords.
The greatest benefit in moving to a cloud solution lies in
enabling project staff to acquire highly secure mobile
technology. Cloud enabled devices from Apple and those built
on an Android platform offer GlobDev the ability to erase a
device that is lost or stolen. This will give the organisation a
high degree of confidence that sensitive information cannot be
accessed from a lost device and makes it more secure than the
printed information project staff currently carries with them.
Mobile devices will allow project staff to have easy access to
required information and significantly reduce the time they
currently spend in the office attending to administrative matters.
In summary, cloud computing has the ability to transform
GlobDev and it is recommended that cloud services replace the
existing computing information resources. 7.0
Recommendations
Based on the advantages to GlobDev and the available
strategies for mitigating risks to the security of the
organisation, it is recommended that GlobDev start migrating
from its server centric Information Technology resources to a
Cloud Computing solution. The Cloud Computing model would
also allow project staff access to secure mobile devices.
In the first stage of a proposed migration, an audit of all
software would need to be performed to understand which
applications that staff currently use are suitable in a cloud
environment. Those applications that are unsuitable will need to
be researched to discover if suitable replacement applications
are commercially available or if those applications will need to
be written specifically for GlobDev. Cloud specific
commercially available direct replacements of current software,
for example Microsoft Office, should also be investigated to see
if cloud licencing is a more cost effective option than the
current licencing fees.
Simultaneously all existing information will need to be
classified according to its sensitivity and availability
requirements. Such an audit would then provide information
about the modes of Cloud-Computing and the sizing
requirements for each mode of the solution. As the organisation
has some information that is both time critical and security
critical, that information would need to be stored in an on-site
private cloud so that access and recovery is completely
controlled by GlobDev. For information that requires a high
level of security but is not time critical, that information can be
stored in an IaaS solution using a virtual private cloud. The
ensure that the information is not housed on servers that are
located in countries where the information might have negative
consequences, a contract with the supplier of the IaaS solution
must stipulate the location of with the information would be
housed. The contract must also stipulate who in the suppliers’
company has access to GlobDev’s information both in physical
access to the servers and virtual access through the supplier’s
network. There should also be a two-factor authentication
process for access to this information to eliminate the risk of
unauthorised access due to compromised passwords. Dual-factor
authentication should also be implemented where access to the
on-site cloud is via the Internet. Information that is neither
security critical nor time critical could be housed both through a
SaaS solution and the virtual Private Cloud. There would need
to be strict and clearly defined policies surrounding written to
define the categories of information as it is created as to where
it should be located. After writing new policies and procedures
a training plan along with materials for all staff needs to be
developed to ensure minimal loss of productivity during the
transition.
After migration to the cloud is completed, then new social
media applications should be written to engage with donors.
This should increase satisfaction levels with donors and help
maintain long-term relationships with GlobDev.
Simultaneously, project staff should then be offered Android
Tablets or Apple Mac Books depending on their business
requirements. Those devices allow for high security of data
stored on the devices and the ability to remotely wipe them
should they be lost or stolen. While training for field staff
might be difficult, well designed written and multi media
packages should enable project staff to quickly adopt the new
technology. Equipping staff in this way will foster close
connections between project staff and donors that encourages
long-term commitments and fosters the growth of the supporter
base.
Following through with these recommendations will see the
growth of GlobDev and transform the business into a modern,
responsive organisation.
8.0 Reference list
Apple 2014, iCloud: Use lost mode, Apple Inc, viewed 30 April
2014, http://support.apple.com/kb/PH2700
Behl, A & Behl, K 2012, 'An analysis of cloud computing
security issues', Information and Communication Technologies
(WICT), 2012 World Congress on, Oct. 30 2012-Nov. 2 2012.
D'Costa-Alphonso, M-M & Lane, M 2010, 'The adoption of
single sign-on and multifactor authentication in organisations --
A critical evaluation using TOE framework', Issues in Informing
Science & Information Technology, vol. 7, pp. 161-189.
Dou, W, Qi, L, Zhang, X & Chen, J 2013, 'An evaluation
method of outsourcing services for developing an elastic cloud
platform', Journal of Supercomputing, vol. 63, no. 1, pp. 1-23.
Fernandes, D, Soares, L, Gomes, J, Freire, M & Inácio, P 2014,
'Security issues in cloud environments: a survey', International
Journal of Information Security, vol. 13, no. 2, pp. 113-170.
Google 2014, Android Device Manager, viewed 30 April 2014,
https://support.google.com/accounts/answer/3265955?p=android
_device_manager&rd=1
Hua, DAI, Tao, HU & Xihui, Z 2014, 'Continued use of mobile
technology mediated services: a value perspective', Journal of
Computer Information Systems, vol. 54, no. 2, pp. 99-109.
Iyer, B & Henderson, JC 2012, 'Business value from clouds:
Learning from users', MIS Quarterly Executive, vol. 11, no. 1,
pp. 51-60.
Jeon, S, Yvette, EG & Byungjoo, P 2012, 'Next generation
cloud computing issues and solutions', International Journal of
Control & Automation, vol. 5, no. 1, pp. 63-70.
Karadsheh, L 2012, 'Applying security policies and service
level agreement to IaaS service model to enhance security and
transition', Computers & Security, vol. 31, no. 3, pp. 315-326.
McAfee 2014, McAfee Livesafe, McAfee Inc, viewed 30 April
2014 2014,
http://home.mcafee.com/root/landingpage.aspx?lpname=mls_inf
o&affid=0
Mell, P & Grance, T 2011, The NIST Definition of Cloud
Computing, 800-145, National Institute of Standards and
Technology, Gaithersburg, MD, viewed 15 April 2014,
http://csrc.nist.gov/publications/nistpubs/800-145/SP800-
145.pdf.
Sarier, ND 2010, 'Improving the accuracy and storage cost in
biometric remote authentication schemes', Journal of Network
and Computer Applications, vol. 33, pp. 268-274.
Srinivasan, S 2013, 'Is security realistic in cloud computing?',
Journal of International Technology & Information
Management, vol. 22, no. 4, pp. 47-66.
Tisnovsky, R 2010, 'Risks versus value in outsourced cloud
computing', Financial Executive, vol. 26, no. 9, pp. 64-65.
Weir, CS, Douglas, G, Richardson, T & Jack, M 2010, 'Usable
security: User preferences for authentication methods in
eBanking and the effects of experience', Interacting with
Computers, vol. 22, no. 3, pp. 153-164.
Wu, W-W, Lan, LW & Lee, Y-T 2013, 'Factors hindering
acceptance of using cloud services in university: a case study',
Electronic Library, vol. 31, no. 1, pp. 84-98.
Page 2 of 14
Assessment DetailsAssessment item 3—Report
Due date:
11:55 pm AEST, 16 September 2015,Wednesday, Week 9
ASSESSMENT
Weighting:
30%
3
Length:
3000 words +/- 500 words (Note: Failure to submit within this
range will result in a penalty of 5 marks)
Objectives
Please refer to the course profile to see how this assessment
item relates to the course learning outcomes.
This assignment is designed to stimulate critical thinking
outside of the classroom by requiring students to write a formal
academic report. You will need to follow the ARE process
described in chapters 2 and 3 of Your Business Degree2
(prescribedtextbook for) to analyse the assessment task,
research relevant information and evaluate the information you
find. This information should be used to write an academic
report in which you present your findings or outcomes and make
recommendations for future practice Professional writing and
writing reports are described in chapters 4 and 5 of Your
Business Degree2. This assessment task will assess your skills
in critical thinking, researching information, forming an
opinion, academic writing, logical ordering of ideas and your
ability to support your arguments with quotes from
literature.These objectives will be measured by the ‘closeness
of fit’ to meeting the assessment task, assessment requirements
and assessment criteria listed below.
Please note that there is a wealth of material available on the
Libguide website for this course that you should use to help you
gather and evaluate relevant information for writing your report
(http://libguides.library.cqu.edu.au/content.php?pid=322500&si
d=2640638).
Assessment taskStudents are required to write an academic
report as per the format outlined in chapter 5 of the textbook.
The report must follow either the Harvard citation and
referencing guidelines or APA referencing style. Please note
that the prescribed textbook uses APA referencing guidelines
but the School of Engineering and Technology recommends
Harvard style. See also the Referencing Style subsection below.
The report is to be based on the following case study scenario
about Wearable Computers.
The last decade has seen the introduction of wearable
computers. For example, smartwatches are computerised
wristwatches that have screens and functionality that is far
greater than just displaying the time and date. Another example
is Google Glass which is worn like a pair of spectacles. It has a
touch screen and can also be controlled by voice. Wearable
computers have many advantages such as, assisting with health
and fitness. Smartwatches can be used to track physical activity,
sleep patterns and heart rate. Google Glass can be used in
medicine for a range of applications such as assisting surgeons
to record operations on patients and in healthcare to provide
online support from mid-wives for mothers having problems
breast-feeding.
However there are also concerns about privacy and security
with wearable computers. Recently smartwatches have been in
the news because students have used them in exams; see Is it
cheating to wear a smartwatch into an exam?
(http://www.theage.com.au/comment/is-it-cheating-to-wear-a-
smartwatch-into-an-exam-20150609-ghixg1) written by our
Melbourne-based colleague Dr Ritesh Chugh. Google Glass has
been criticised for a range of issues about invading people’s
privacy and secretly recording people; see Google Glass: is it a
threat to our
privacy?(http://www.theguardian.com/technology/2013/mar/06/
google-glass-threat-to-our-privacy).
You are the ICT manager of a university based in Rockhampton.
The Vice-Chancellor has asked you to research wearable
computers in higher education. She is interested in finding out
how wearable computers can be used in learning and teaching.
She is also concerned about any possible negative effects. You
are to write a report to be presented at the next executive
meeting. The report should address:
1. What are wearable computers and how are they currently
being used. You should explore a range of applications of
wearable computers, for example, in areas such as healthcare,
the military and entertainment.
2. Discuss at least three ways that wearable computers could be
used to enhance higher education. In particular the Vice-
Chancellor would like you to explore ways wearable computers
could be used to provide educational opportunities that are not
possible with current stand-alone computers.
3. Assess the advantages and disadvantages of using wearable
computers in higher education. Explore the ethical, social and
legal considerations of students being connected to the Internet
through wearable computers. Examine the privacy and security
concerns of using wearable computers in higher education.
Your report should conclude with recommendations for the
university with respect to the implementation and use of
wearable computers in higher education.
Please note that you will need to make some assumptions about
the university in order to write this report. These assumptions
should be incorporated in the introduction to your report when
you describe the university and outline the problem to be
solved.
Specifically your report should include the following:
1. Title page: student name, student number, email address,
course code, assignment number, assignment due date, academic
referencing style, campus lecturer/tutor, and course coordinator.
Not counted in the word count. Note the title page must indicate
which academic referencing style you have used: APA or
Harvard.
1. Executive summary: should include the purpose of the report,
the problem and how it was investigated, your findings and your
recommendations. Should be approximately 300 words.
Table of Contents: should list the report topics using decimal
notation. Needs to include the main headings and subheadings
with corresponding page numbers, using a format that makes the
hierarchy of topics clear Use MS Word’s ToC auto-generator
rather than manually typing out the ToC. Instructions can be
found here https://support.office.com/en-gb/article/Create-a-
table-of-contents-or-update-a-table-of-contents-eb275189-b93e-
4559-8dd9-c279457bfd72#__create_a_table. Not counted in the
word count.
Introduction: provide a brief description of the organisation, a
concise overview of the problem you have been asked to
research, the objectives to be achieved by writing the report and
how you investigated the problem. Provide an outline of the
sections of the report. Note that you will have to make
assumptions about what type of organisation you are working
for in this case study. Should be approximately 400 words.
Body of the report (use appropriate headings in the body of the
report.): Define key terms you will use in your report, such as
what is meant by ‘wearable computers’. Present your ideas on
the topic and discuss the information you found in your research
that was relevant to the report’s objectives. Provide an analysis
of the information that you gathered. Ensure that you explore
the three points listed in the scenario above. You also need to
discuss the ethical, social and legal aspects surrounding this
issue. In your discussion, examine the issues from a global
perspective as well as from the local perspective (of the
fictional university that is the centre of this report).
Please do NOT use ‘Body of the Report’ as a heading. Create
meaningful headings that reflect the content of your report.
Should be approximately 1200 words.
Conclusion: based on your research and analysis. Explain the
significance of your findings and your discussion. State if your
report has achieved its objectives. Should be approximately 550
words.
Recommendations: (based on your findings) what would your
recommendations be to your Vice-Chancellor in this situation?
Provide some guidelines for the university with respect to the
implementation and use of wearable computers in higher
education. Should be approximately 550 words.
Reference list. Not counted in the word count.
Appendices if necessary. Not counted in the word count.Note:
Additional information regarding this assignment may be placed
on the course website as required. Check the course website at
least once a week for further information relating to the report.
Regular access to the course website is a requirement of this
course.
Assessment Requirements
Your response should be structured as a report (chapter 5 of
textbook), written in accordance with standard academic writing
principles (chapter 4 of textbook). The report must be written
using your own words with any in text citations clearly marked
(see Referencing Style subsection below). You may discuss the
assessment task with other students and the lecturing staff but
you must WRITE the report YOURSELF in your own words.
You will need to conduct research to support your arguments
using AT LEAST NINE references in addition to your set
textbook (that is, a minimum of ten (10) references in your
reference list). At least six (6) of these references should be
from refereed academic journals and books. All sources should
be current i.e. 2010 onwards.
The assignment should demonstrate a logical flow of discussion,
be grammatically correct and free from typographical, spelling
and grammatical errors. It should be prepared in MS-Word (or
equivalent) using 12 point font, 1.5 line spacing and margins of
2.54 cm.
It is highly recommended that you submit your assignment to
the Academic Learning CentreAT LEAST ONE WEEK before
the due date so that it can be checked for spelling and
grammatical errors.Referencing Style
References must be cited (in text) and a reference list provided
in accordance with either the Harvard (author-date) referencing
style or the APA referencing style.
Helpful information on referencing techniques and styles can
also be found on CQU’s referencing webpage:
http://www.cqu.edu.au/student-life/services-and-
facilites/referencing
Marks will be deducted for poor referencing or having less than
ten (10) references or going under or over the word length.
Use quotation marks for direct quotes and you must include the
author, date and page number(s) with the quote as per the
referencing standards.
ALL assignments will be checked for plagiarism (material
copied from other students and/or material copied from other
sources) using TurnItIn. If you are found to have plagiarised
material or if you have used someone else’s words without
appropriate referencing, you will be penalised for plagiarism
which could result in zero marks for the whole assignment. In
some circumstances a more severe penalty may be imposed.
Useful information about academic integrity (avoiding
plagiarism) can be found at:
http://www.cqu.edu.au/student-life/services-and-
facilites/referencingSubmission
To be submitted online through the Moodle course website
assessment block on or before the due date.
Before submitting your assignment you should check it against
the detailed assessment criteria in the following table to ensure
that you have satisfactorily addressed ALL the criteria that will
be used to mark your report.
2
Assessment criteriaThis assessment is criterion referenced
which means your work is assessed against the criteria in the
marking rubric below.
Criteria
Quality
High Distinction
(2.75-3.0 marks)
Distinction
(2.25-2.5 marks)
Credit
(1.75-2 marks)
Pass
(1.25-1.5 marks)
Fail
(0-1 marks)
Executive summary
The executive summary contained:
- a brief description of the purpose of the report
- the definition of the problem and how it was investigated
- a summary of what you found and what you concluded
- your recommendations
The executive summary contained the proper sections but did
not include enough detail.
The executive summary had sections which were too brief or
missing. Did not include enough detail.
The executive summary lacked clarity and has incomplete or
missing sections. It did not clearly explain the problem, how it
was investigated and your recommendations.
Entire sections of the executive summary are missing. There is a
lack of detail and the problem is not well explained.
Table of contents
Lists the report topics using decimal notation. Includes the main
headings and subheadings with corresponding page numbers.
Format makes the hierarchy of topics clear. Auto generated
using MS Word.
A few things missing from the table of contents.
Some things missing from the table of contents
Includes the main headings only.
Table of contents missing.
Introduction
Set the scene for the report; gave some background information
for the topic. Included a brief description of the organisation.
Stated the objectives of the investigation. Include the problem
you are addressing.
Explained the research method used to gather information.
Outlined the sections of the report.
The introduction contained the proper parts but did not include
enough detail.
The introduction had parts which were too brief or missing. Did
not include enough detail.
The introduction lacked clarity and had incomplete or missing
parts. It did not clearly introduce the report.
The introduction was missing or was a repeat of the executive
summary. It did not clearly introduce the report.
Body of report:
Selection and sequencing of subject material; including
evidence.
Selected exact amount of relevant material that supports
argument with no contradictions.
Substantial, logical, & concrete development of ideas.
Arguments were logical and clear.
Assumptions were made explicit.
Key terms were defined.
Details were germane, original, and convincingly interpreted.
Selected large amount of relevant material.
Offered solid development of ideas but less original reasoning.
Assumptions were not always recognised or made explicit.
Contained some appropriate details or examples.
Selected adequate amount of material.
Some development of ideas; not much original reasoning.
Assumptions are not always recognised or made explicit.
Contains some appropriate details or examples.
Selected adequate amount of material not all of it relevant.
Not much development of ideas. Very little original reasoning.
Offered somewhat obvious support that may be too broad.
Details were too general, not interpreted, irrelevant to problem,
or inappropriately repetitive.
Selected too little material or material that is irrelevant.
No development of ideas or original reasoning.
Offered simplistic, undeveloped, or cryptic support for the
ideas.
Inappropriate or off-topic generalisations, faulty assumptions,
errors of fact.
Conclusion
Problem restated clearly, main points and supporting arguments
summarised.
Stated the significance of the findings and that the objectives of
the report had been met.
No new material.
The conclusion contained the proper parts but did not include
enough detail.
No new material.
The conclusion had parts which were too brief or missing. Did
not include enough detail.
May have included some new material.
The conclusion lacked clarity and had incomplete or missing
parts. It did not clearly conclude the report.
May have included some new material.
The conclusion is missing or was a repeat of the executive
summary. It did not clearly conclude the report.
Included new material.
Recommendations
Suggested actions to address the problem.
Actions were clearly based on the findings of the report.
Most suggested actions were relevant to the problem.
Actions were based on the findings of the report.
Suggested actions were somewhat relevant to the problem.
Not all actions were based on the findings of the report.
Suggested some actions. Not all actions were relevant to the
problem.
Not all actions were based on the findings of the report.
Recommendations missing or irrelevant to the problem and/or
did not relate to the findings.
Organisation: of ideas/main points; structure of sentences and
paragraphs.
Organisation fully supported the problem being addressed and
the objectives of report.
Sequence of ideas was effective.
Excellent sentence structure. Well-constructed paragraphs; clear
linkages between paragraphs.
Organisation supported the problem being addressed and the
objectives of report.
Sequence of ideas could be improved.
Good sentence structure. Linkages between paragraphs were
mostly appropriate.
Organisation supported the problem being addressed and the
objectives of report.
Sequence of ideas did not always flow in a logical manner.
Some good sentence structure. Linkages between paragraphs
could be improved. Some brief, undeveloped paragraphs.
Some signs of logical organisation.
May have had abrupt or illogical shifts and ineffective flow of
ideas.
Some awkward sentences; paragraphs not well linked. Paragraph
structure not well integrated; contained extraneous information.
Unclear organisation or organisational plan was inappropriate to
problem being addressed.
Poorly worded sentences. No linkages between paragraphs.
Showed minimal effort or lack of comprehension of the
assignment.
Presentation:
· Title page
· Grammar, punctuation and spelling.
Title page contained all necessary information: student name,
student number, email address, course code, assignment
number, assignment due date, academic referencing style,
campus lecturer/tutor, and course coordinator.
Written expression was clear and correct; evidence of thorough
proof-reading.
Observed professional conventions of written English and report
format.
Grammar excellent; correct use of punctuation; minimal or no
spelling errors.
Title page contained all necessary information.
A few errors in grammar (wrong verb tense, subject-verb
agreement, pronoun agreement, apostrophe errors,
singular/plural errors, article use, preposition use, split
infinitives, etc.). Made occasional problematic word choices or
syntax errors.
Observed professional conventions of written English and report
format; made a few minor or technical errors.
Grammar strong despite occasional lapses; a few spelling or
punctuation errors.
Title page contained all necessary information.
Some distracting grammatical errors (wrong verb tense, subject-
verb agreement, pronoun agreement, apostrophe errors,
singular/plural errors, article use, preposition use, split
infinitives, etc.). Little evidence of proof-reading.
Needed to observe professional conventions of written English
and report format; made numerous errors.
Grammar could be improved; errors in punctuation and spelling.
Some necessary information was missing from the title page.
Some major grammatical or proofreading errors (wrong verb
tense, subject-verb agreement, pronoun agreement, apostrophe
errors, singular/plural errors, article use, preposition use, split
infinitives, sentence fragments, word form errors, etc.).
Needed to observe professional conventions of written English
and report format; made repeated errors.
Frequent errors in grammar, punctuation, and spelling.
Title page missing or missing necessary information.
Numerous grammatical errors which seriously detracted from
understanding the writing.
Evidence of poor planning and/or no serious revision of writing.
Did not meet professional conventions of written English and
report format.
Frequent major errors in grammar, punctuation, and spelling.
References (1): Evidence of research and analysis of the
references.
Thorough research indicated; clear well-thought out analysis
clearly integrated into discussion.
Analysed and evaluated information in great depth.
Used references to support, extend, and inform, but not
substitute writer’s own development of ideas.
Combined material from a variety of sources.
Did not overuse quotes.
Research was generally thorough; analysis was generally well
done; integrated into discussion.
Analysed and evaluated information in considerable depth.
Used references to support, but not substitute writer’s own
development of ideas.
Combined material from a variety of sources.
Did not overuse quotes.
Some evidence of research; basic analysis; some integration
into discussion.
Analysed and evaluated information in reasonable depth, some
description.
Used references to support, but not substitute writer’s own
development of ideas.
Combined material from a few sources.
Did not overuse quotes.
Basic research; weaknesses evident in analysis.
Little evidence of analysis and evaluation of information;
recounted and described. Details were too general, not
interpreted, irrelevant to topic, or inappropriately repetitive.
Used relevant references but lacked in variety of references
and/or the skilful combination of references.
Combined material from a few sources.
Quotations and paraphrases may be too long or not well
integrated into the text.
Little or no evidence of research and analysis of information.
Neglected important references.
Simplistic or undeveloped support for the ideas.
Inappropriate or off-topic generalisations, faulty assumptions,
errors of fact.
Overused quotations or paraphrasing to substitute writer’s own
ideas.
Possibly used source material without acknowledgement.
References (2):
In-text citations and reference list.
At least ten current references.
Thorough referencing. Citations and reference list accurate and
consistent with Harvard style.
At least ten current references
A few inaccuracies with Harvard style for citations and/or
reference list.
All references listed.
At least ten current references
Generally complete. One or two references missing.
Some errors in Harvard style for citations and/or reference list.
At least ten current references
Incomplete reference list. References not cited properly in text.
Errors with Harvard style.
Less than ten references.
Problems with citations.
Inconsistent with Harvard style.
Length
Correct length (2500-3500 words)
Correct length (2500-3500 words)
Correct length (2500-3500 words)
Correct length (2500-3500 words)
Too long (>3500 words) or too short (<2500 words)
Reports in this range will receive a penalty of 5 marks.

More Related Content

Similar to Student Number SxxxxxxxEmail Assignm.docx

Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource ManagementDr. Amarjeet Singh
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
 
Barriers to government cloud adoption
Barriers to government cloud adoptionBarriers to government cloud adoption
Barriers to government cloud adoptionIJMIT JOURNAL
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
Strategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docxStrategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docxsusanschei
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...csandit
 
Survivors guide to the cloud whitepaper
Survivors guide to the cloud whitepaperSurvivors guide to the cloud whitepaper
Survivors guide to the cloud whitepaperOnomi
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
 
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTINGADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTINGijitcs
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingingenioustech
 
Across the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docxAcross the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docxdaniahendric
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computingijceronline
 

Similar to Student Number SxxxxxxxEmail Assignm.docx (20)

Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
 
Barriers to government cloud adoption
Barriers to government cloud adoptionBarriers to government cloud adoption
Barriers to government cloud adoption
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
Strategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docxStrategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docx
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
 
Survivors Guide To The Cloud
Survivors Guide To The CloudSurvivors Guide To The Cloud
Survivors Guide To The Cloud
 
Survivors guide to the cloud whitepaper
Survivors guide to the cloud whitepaperSurvivors guide to the cloud whitepaper
Survivors guide to the cloud whitepaper
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
 
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTINGADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
 
B1802041217
B1802041217B1802041217
B1802041217
 
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
It auditing to assure a secure cloud computing
It auditing to assure a secure cloud computingIt auditing to assure a secure cloud computing
It auditing to assure a secure cloud computing
 
J3602068071
J3602068071J3602068071
J3602068071
 
Across the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docxAcross the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docx
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
 
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
 

More from hanneloremccaffery

 Explain how firms can benefit from forecastingexchange rates .docx
 Explain how firms can benefit from forecastingexchange rates .docx Explain how firms can benefit from forecastingexchange rates .docx
 Explain how firms can benefit from forecastingexchange rates .docxhanneloremccaffery
 
•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docx
•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docx•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docx
•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docxhanneloremccaffery
 
•No less than 4 pages causal argument researched essay •In.docx
•No less than 4 pages causal argument researched essay •In.docx•No less than 4 pages causal argument researched essay •In.docx
•No less than 4 pages causal argument researched essay •In.docxhanneloremccaffery
 
•Focus on two or three things in the Mesopotamian andor Ovids ac.docx
•Focus on two or three things in the Mesopotamian andor Ovids ac.docx•Focus on two or three things in the Mesopotamian andor Ovids ac.docx
•Focus on two or three things in the Mesopotamian andor Ovids ac.docxhanneloremccaffery
 
•Langbein, L. (2012). Public program evaluation A statistical guide.docx
•Langbein, L. (2012). Public program evaluation A statistical guide.docx•Langbein, L. (2012). Public program evaluation A statistical guide.docx
•Langbein, L. (2012). Public program evaluation A statistical guide.docxhanneloremccaffery
 
•Chapter 10 Do you think it is possible for an outsider to accura.docx
•Chapter 10 Do you think it is possible for an outsider to accura.docx•Chapter 10 Do you think it is possible for an outsider to accura.docx
•Chapter 10 Do you think it is possible for an outsider to accura.docxhanneloremccaffery
 
·         Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docx
·         Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docx·         Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docx
·         Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docxhanneloremccaffery
 
·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docx
·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docx·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docx
·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docxhanneloremccaffery
 
·Write a 750- to 1,Write a 750- to 1,200-word paper that.docx
·Write a 750- to 1,Write a 750- to 1,200-word paper that.docx·Write a 750- to 1,Write a 750- to 1,200-word paper that.docx
·Write a 750- to 1,Write a 750- to 1,200-word paper that.docxhanneloremccaffery
 
[Type here]Ok. This school makes me confused. The summary of t.docx
[Type here]Ok. This school makes me confused. The summary of t.docx[Type here]Ok. This school makes me confused. The summary of t.docx
[Type here]Ok. This school makes me confused. The summary of t.docxhanneloremccaffery
 
© 2020 Cengage Learning®. May not be scanned, copied or duplic.docx
© 2020 Cengage Learning®. May not be scanned, copied or duplic.docx© 2020 Cengage Learning®. May not be scanned, copied or duplic.docx
© 2020 Cengage Learning®. May not be scanned, copied or duplic.docxhanneloremccaffery
 
© 2016 Laureate Education, Inc. Page 1 of 3 RWRCOEL Prof.docx
© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx
© 2016 Laureate Education, Inc. Page 1 of 3 RWRCOEL Prof.docxhanneloremccaffery
 
© 2022 Post University, ALL RIGHTS RESERVED Due Date.docx
© 2022 Post University, ALL RIGHTS RESERVED  Due Date.docx© 2022 Post University, ALL RIGHTS RESERVED  Due Date.docx
© 2022 Post University, ALL RIGHTS RESERVED Due Date.docxhanneloremccaffery
 
{DiscriminationGENERAL DISCRIMINATI.docx
{DiscriminationGENERAL DISCRIMINATI.docx{DiscriminationGENERAL DISCRIMINATI.docx
{DiscriminationGENERAL DISCRIMINATI.docxhanneloremccaffery
 
~UEER THEORY AND THE JEWISH QUESTI01 Daniel Boyarin, Da.docx
~UEER THEORY AND THE JEWISH QUESTI01 Daniel Boyarin, Da.docx~UEER THEORY AND THE JEWISH QUESTI01 Daniel Boyarin, Da.docx
~UEER THEORY AND THE JEWISH QUESTI01 Daniel Boyarin, Da.docxhanneloremccaffery
 
© 2017 Cengage Learning. All Rights Reserved.Chapter Twelve.docx
©  2017 Cengage Learning. All Rights Reserved.Chapter Twelve.docx©  2017 Cengage Learning. All Rights Reserved.Chapter Twelve.docx
© 2017 Cengage Learning. All Rights Reserved.Chapter Twelve.docxhanneloremccaffery
 
`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docx
`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docx`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docx
`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docxhanneloremccaffery
 
^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docx
^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docx^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docx
^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docxhanneloremccaffery
 
__MACOSXSujan Poster._CNA320 Poster Presentation rubric.pdf.docx
__MACOSXSujan Poster._CNA320 Poster Presentation rubric.pdf.docx__MACOSXSujan Poster._CNA320 Poster Presentation rubric.pdf.docx
__MACOSXSujan Poster._CNA320 Poster Presentation rubric.pdf.docxhanneloremccaffery
 

More from hanneloremccaffery (20)

 Explain how firms can benefit from forecastingexchange rates .docx
 Explain how firms can benefit from forecastingexchange rates .docx Explain how firms can benefit from forecastingexchange rates .docx
 Explain how firms can benefit from forecastingexchange rates .docx
 
•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docx
•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docx•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docx
•POL201 •Discussions •Week 5 - DiscussionVoter and Voter Tu.docx
 
•No less than 4 pages causal argument researched essay •In.docx
•No less than 4 pages causal argument researched essay •In.docx•No less than 4 pages causal argument researched essay •In.docx
•No less than 4 pages causal argument researched essay •In.docx
 
•Focus on two or three things in the Mesopotamian andor Ovids ac.docx
•Focus on two or three things in the Mesopotamian andor Ovids ac.docx•Focus on two or three things in the Mesopotamian andor Ovids ac.docx
•Focus on two or three things in the Mesopotamian andor Ovids ac.docx
 
•Langbein, L. (2012). Public program evaluation A statistical guide.docx
•Langbein, L. (2012). Public program evaluation A statistical guide.docx•Langbein, L. (2012). Public program evaluation A statistical guide.docx
•Langbein, L. (2012). Public program evaluation A statistical guide.docx
 
•Chapter 10 Do you think it is possible for an outsider to accura.docx
•Chapter 10 Do you think it is possible for an outsider to accura.docx•Chapter 10 Do you think it is possible for an outsider to accura.docx
•Chapter 10 Do you think it is possible for an outsider to accura.docx
 
·         Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docx
·         Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docx·         Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docx
·         Bakit Di gaanong kaganda ang pagturo sa UST sa panahon.docx
 
·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docx
·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docx·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docx
·YOUR INDIVIDUAL PAPER IS ARGUMENTATIVE OR POSITIONAL(Heal.docx
 
·Write a 750- to 1,Write a 750- to 1,200-word paper that.docx
·Write a 750- to 1,Write a 750- to 1,200-word paper that.docx·Write a 750- to 1,Write a 750- to 1,200-word paper that.docx
·Write a 750- to 1,Write a 750- to 1,200-word paper that.docx
 
[Type here]Ok. This school makes me confused. The summary of t.docx
[Type here]Ok. This school makes me confused. The summary of t.docx[Type here]Ok. This school makes me confused. The summary of t.docx
[Type here]Ok. This school makes me confused. The summary of t.docx
 
© 2020 Cengage Learning®. May not be scanned, copied or duplic.docx
© 2020 Cengage Learning®. May not be scanned, copied or duplic.docx© 2020 Cengage Learning®. May not be scanned, copied or duplic.docx
© 2020 Cengage Learning®. May not be scanned, copied or duplic.docx
 
© 2016 Laureate Education, Inc. Page 1 of 3 RWRCOEL Prof.docx
© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx© 2016 Laureate Education, Inc.   Page 1 of 3 RWRCOEL Prof.docx
© 2016 Laureate Education, Inc. Page 1 of 3 RWRCOEL Prof.docx
 
© 2022 Post University, ALL RIGHTS RESERVED Due Date.docx
© 2022 Post University, ALL RIGHTS RESERVED  Due Date.docx© 2022 Post University, ALL RIGHTS RESERVED  Due Date.docx
© 2022 Post University, ALL RIGHTS RESERVED Due Date.docx
 
{DiscriminationGENERAL DISCRIMINATI.docx
{DiscriminationGENERAL DISCRIMINATI.docx{DiscriminationGENERAL DISCRIMINATI.docx
{DiscriminationGENERAL DISCRIMINATI.docx
 
~UEER THEORY AND THE JEWISH QUESTI01 Daniel Boyarin, Da.docx
~UEER THEORY AND THE JEWISH QUESTI01 Daniel Boyarin, Da.docx~UEER THEORY AND THE JEWISH QUESTI01 Daniel Boyarin, Da.docx
~UEER THEORY AND THE JEWISH QUESTI01 Daniel Boyarin, Da.docx
 
© 2017 Cengage Learning. All Rights Reserved.Chapter Twelve.docx
©  2017 Cengage Learning. All Rights Reserved.Chapter Twelve.docx©  2017 Cengage Learning. All Rights Reserved.Chapter Twelve.docx
© 2017 Cengage Learning. All Rights Reserved.Chapter Twelve.docx
 
`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docx
`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docx`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docx
`HISTORY 252AEarly Modern Europe from 1500 to 1815Dr. Burton .docx
 
^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docx
^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docx^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docx
^ Acadumy of Management Journal2001. Vol. 44. No. 2. 219-237.docx
 
`Inclusiveness. The main.docx
`Inclusiveness. The main.docx`Inclusiveness. The main.docx
`Inclusiveness. The main.docx
 
__MACOSXSujan Poster._CNA320 Poster Presentation rubric.pdf.docx
__MACOSXSujan Poster._CNA320 Poster Presentation rubric.pdf.docx__MACOSXSujan Poster._CNA320 Poster Presentation rubric.pdf.docx
__MACOSXSujan Poster._CNA320 Poster Presentation rubric.pdf.docx
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

Student Number SxxxxxxxEmail Assignm.docx

  • 1. Student Number: Sxxxxxxx Email: Assignment 3 Due Date: 2 May 2014 Lecturer: Course Coordinator: Executive Summary Cloud computing promises a transformation in the provision of IT services to businesses and other organisations. Along with many advantages to the business that include easy scalability and ubiquitous access to resources, there are many risks that a business must consider before deploying a cloud solution. These risks include a loss of control over service restoration in case of failure and possible security risks due to attack via the Internet. To mitigate against those risks businesses need to have well- written contracts, develop strict and easily understood polices to ensure the appropriate storage of information and have multi-
  • 2. factor authentication to access sensitive information via the Internet. This report considers the situation of GlobDev, who are an Aid and Development organisation headquartered in Melbourne with staff in many developing countries. Using recent research, the report analyses the advantages and disadvantages of Cloud Computing, associated security risks and mitigation, and examines using cloud services to enable secure mobile computing. The report proposes a possible path to the transformation in the delivery of IT services in GlobDev through the migration to cloud based services. The report supports the use of cloud computing through mobile devices provided to field staff. The engagement in technology through social media applications and mobile technology should improve donor engagement and expand GlobDev’s opportunity for growth by increasing its supporter base. Table of Contents 1.0 Introduction 4 1.1 Organisational Context 4 1.2 Objective and Methodology 4 1.3 Report Outline 5 2.0 Definitions of Cloud Computing5 3.0 Advantages and Issues with Cloud Computing 6 3.1 Advantages of Cloud Computing 6 3.2 Issues with Cloud Computing 7 4.0 Security Risks in Cloud Computing 7 5.0 Opportunities for growth through Cloud Services 9 6.0 Conclusions 9 7.0 Recommendations 11 8.0 Reference list 13 1.0 Introduction 1.1 Organisational Context Cloud computing is an increasingly popular method for
  • 3. delivery of software services and storing data. GlobDev is a not for profit large organisation, headquartered in Melbourne, that runs aid and development programs in underdeveloped nations. The projects are organised by people from developed nations including Australians who are part of this organisations staff. National staff in each country are also employed by the organisation. There are currently 2150 people employed in Projects across 38 nations with a further 50 people employed in administration in 10 donor countries plus a further 70 staff in the head office in Melbourne. Projects and administration costs are funded through personal and corporate donations along with contributions from the foreign aid budgets of some G-20 major economies. The company has a central server located in the Melbourne Headquarters that is only backed up locally. There are desktop computers located in donor countries and with each project. While many of the staff in donor countries have laptop computers, very few staff working in projects have any sort of mobile computing device dues to security concerns with having devices that hold extremely sensitive data that can be easily accessed if stolen. Maintaining backups of data on desktop computers in each country is extremely problematic and relies on adherence by local staff to the organisations IT policies and procedures. 1.2 Objective and Methodology GlobDev is investigating Cloud computing to enable staff to more effectively, efficiently and securely utilise ICT resources to access, process and distribute information in a timely manner. One of the major concerns expressed by the governing board is the security of information if it is stored in locations not controlled by the organisation. The governing board also see opportunities to expand its base of donors through more open connections between staff and donors that a cloud solution might enable. The objective of this report is to provide a rationale for employing Cloud Computing services and address the security concerns of the governing board. The report will also detail opportunities for using cloud services to widen its supported base. Information contained in this report has been
  • 4. primarily sourced from peer-reviewed journals along with industry publications.1.3 Report Outline The report will first define the concept of Cloud Computing services to specify the components of a Cloud Computing solution. Second, it will detail the advantages and disadvantages of using cloud-based services. Third, it will address the security concerns of the governing board along with strategies to mitigate the risk. Fourth, it will demonstrate clear improvements in information security that Cloud Computing offers. Fifth, the opportunities to increase engagement with the existing donor base and appeal to new donors will be discussed. The report will conclude with recommendations for proceeding with Cloud Computing services. 2.0 Definitions of Cloud Computing Cloud Computing consists of computing resources hosted on multiple networked computer servers to provide a seamless connection to resources (Mell & Grance 2011). This differs from the server specific model of providing resources where access is provided through connections to specific servers. Cloud Computing can be either public, where services are provided by an organisation to individuals or organisations, or private, where the services are provided exclusively for the organisation itself (Mell & Grance 2011). Private clouds can be hosted by the organisation or hosted by a third party (Mell & Grance 2011); the important differentiator is exclusivity and not the location of the services. Cloud Computing is deployed using three different service models, Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (SaaS). SaaS utilises some form subscription service to access software. The cloud provider controls the software and can change the software without notice to the individual or organisation (Mell & Grance 2011). The software can reside on the provider’s infrastructure, where it is accessed through an Internet browser or a client application, or installed on the subscribers’ computer and updated through a provided mechanism. PaaS is where a
  • 5. provider allocates resources and an application environment on which the clients applications are hosted (Mell & Grance 2011). The client retains control over the applications while the provider contracts to support the underlying environment. IaaS is where a cloud provider supplies fundamental computing resources for a wide variety of computing uses (Mell & Grance 2011). These uses can include storage, printing, and application environments that are fully controlled by the service subscriber. Subscribers are not limited to a single service model, but can choose elements of all three models for provision of a wide variety of computing services.3.0 Advantages and Issues with Cloud Computing 3.1 Advantages of Cloud Computing There are many advantages from changing from a traditional networked approach to computing resources to a cloud-based model. Iyer and Henderson (2012) interviewed seven companies and identified six key benefits. First, managers were able to better focus on using IT to meet business needs rather than frequently encountering significant hurdles leveraging existing IT infrastructure. Second, the modularity in design of Cloud Computing enables faster deployment of new services and the ability to reuse existing IT infrastructure for new services. The modularity enables scalability of services with correct sizing of infrastructure to meet current needs and expand as requirements change. Third, cloud services enable multiple locations access to the same services and resources to allow seamless collaboration between different parts of a business. Fourth, cloud based applications are quicker to develop and upgrade than conventional development models. Fifth, cloud-based applications tend to have better interoperability between specialist applications due to a more standardised application environment. This allows selection of services from a diverse range of vendors that have high levels of interoperability. Sixth, cloud services allow the development of social interaction within client facing applications. This connection has delivered higher levels of customer satisfaction in other businesses. Jeon, Yvette and Byungjoo (2012) identify
  • 6. another key advantage for this organisation in allowing the use of mobile devices to access resources enabling field staff higher quality access to information in timelier manner that will facilitate more effective communication. Cloud computing can enable a transformation business processes and connections with field staff and donors. However, there are problems associated with cloud computing that need to be considered.3.2 Issues with Cloud Computing Utilising public cloud computing services poses particular risks to the organisation that must be considered. Tisnovsky (2010) identifies four risks for businesses. First, the organisation loses control over the infrastructure on which the services are hosted. Second, there is a financial incentive for cloud providers to host a maximum number of services on a particular piece of infrastructure, which can lead to contention issues with other organisations. Third, a lack of control over backup and restore processes can lead to long delays in restoring vital services. Fourth, the location of storage can be anywhere in the Internet and the organisations data may be housed on servers located in countries where the organisations information may be in conflict with the laws of that country. Another issue is the resistance of staff in changing to a cloud based model for accessing services which will necessitate training of staff to ensure a positive acceptance of the changes (Wu, Lan & Lee 2013). By far the biggest issue that must be addressed is security of information that is accessed over the Internet for both public and private cloud services (Srinivasan 2013). 4.0 Security Risks in Cloud Computing To ensure security of information in the cloud, Fernandes et al. (2014) analysed peer reviewed literature and found six key requirements for a public cloud. First, there must be a method for identifying the requestor and then authenticating access to the cloud. Second, the cloud must have a system for controlling the level of access granted to each individual. Third, confidentiality of the information must be maintained. Fourth, audit trails are necessary to ensure the integrity of stored
  • 7. information. Fifth, information transferred between the individual’s end computer and the cloud must have a positive indication that both the cloud and the end computer have received the information. Sixth, the information must be available when required by an individual. With a private cloud, security concerns are less stringent as the organisation retains much greater control over information, as public sharing is more difficult (Fernandes et al. 2014). Public dissemination of information in a private cloud requires individuals to deliberately choose to act against organisational policies. Cloud providers have a clear duty to ensure a very high level of physical security across multiple locations. Each location is very carefully chosen with many levels of redundancy across multiple site to ensure very high levels of availability (Fernandes et al. 2014). Therefore, physical access is much higher within the cloud providers than exists within the current data centre of this organisation. As the information in the cloud would be spread across geographically diverse sites, the information is far less likely to be lost than if there was a catastrophic failure at the organisation’s headquarters. Elasticity in the allocation of resources, in both public cloud services and a virtual private cloud, is a possible security threat to the organisation. If the organisation scales down its need for storage space from a cloud provider, the organisation needs to ensure that any resources released are properly cleaned up by the cloud provider. Otherwise another organisation could access that information (Behl & Behl 2012). The security concerns surrounding dynamic allocation of resources by cloud providers is most problematic in SaaS services where storage is provided along with access to software as companies oversubscribe storage allocation as it is unlikely all subscribers will use all allocated storage space (Dou et al. 2013). Single authentication factors, those that only rely on a password for access to resources, are a major security threat to an organisation (Weir et al. 2010). This becomes more problematic where people use multiple systems that have differing password
  • 8. requirements. Many people find it difficult to remember multiple passwords and tend to keep written records of passwords readily available. To mitigate these risks, password management systems need to be implemented as part of a cloud strategy (D'Costa-Alphonso & Lane 2010). For sensitive information that must be kept confidential, a multiple factor authentication needs to be incorporated (D'Costa-Alphonso & Lane 2010). Multiple factor authentication includes biometrics, access tokens and trusted devices along with a password to access resources (Sarier 2010; Weir et al. 2010). Security risk mitigation needs to be incorporated simultaneously with the implementation of Cloud Computing along with well written and strict policies and guidelines (Karadsheh 2012). These policies and guidelines will provide all staff with clear direction on the most appropriate storage services for the various types of information they generate and consume. Incorporating well designed security systems into a cloud solution will enable the use mobile devices in the organisation. 5.0 Opportunities for growth through Cloud Services The biggest opportunity for growth from utilising cloud services lies in the enabling of high quality communication between donors and field staff through use of cloud enabled mobile technology. Tablet computers running on Android, iOS, OS-X and Windows platforms allow the installation of cloud- enabled applications that can connect to both public and private clouds. Android, iOS and OS-X also have the ability to be remotely locked and erased (Apple 2014; Google 2014). McAfee (2014) offer a secure public cloud storage solution that works on Android, OS-X and Windows platforms that uses biometric authentication to secure information. Equipping staff working in overseas projects with either Apple Mac laptops or Android tablets no longer poses a security risk to the organisation with appropriate cloud solutions. In developing applications for mobile devices for field staff, applications can then be developed for current and possible future donors. There are many benefits for project employees and donors alike with
  • 9. engaging applications as they increase satisfaction with the organisation, thereby increasing the likelihood of maintaining long-term relationships (Hua, Tao & Xihui 2014). 6.0 Conclusions The research demonstrates that it is possible to utilise secure cloud computing services that will bring benefits to the GlobDev organisation. From an infrastructure perspective, migrating from the current server centric access model will more allow more responsive scalability of resources which will reduce both management costs. The costs associated with having underutilised resources will also be reduced. As cloud applications are faster to develop and deploy, GlobDev will be able to design applications that better meet the needs of the organisation and redesign those applications as business needs change. As cloud services are ubiquitous and many of GlobDev’s staff are located in very diverse locations, deploying cloud services will allow much greater collaboration between staff working on similar projects. High levels of interoperability between cloud applications will allow GlobDev to select applications from different vendors that meet particular needs of business units and projects while minimising risks of incompatibility. The social networking elements in cloud computing could be leveraged to develop a close relationship between the GlobDev project staff and the donors interested in those projects. Those close relationships should improve the morale of field staff and increase satisfaction among donors. Those relationships will then from a point of difference between GlobDev and other aid and development organisations, enabling the organisation to keep donors for significantly longer periods of time and encourage others to become donors. GlobDev will need to carefully consider which resources and information it migrates to a private cloud, which is located in the head office, which resources and information are migrated into a virtual private cloud and what public cloud services could be utilised. This need for a multi-modal approach is due to there being risks and benefits in each mode where the
  • 10. needs of the various parts of the organisation need to be assessed to determine the best fit. Staff training needs would also need careful consideration to ensure a positive acceptance of the changes in processes and minimise the reduction in productivity during migration. Security remains a major concern with any Internet based service. Those risks can be minimised through the careful selection of service providers, the identification of the security requirements surrounding the various types of information stored by the organisation and the setting of well written and clearly specified IT policies relating to document storage. When selecting service providers, the authentication processes employed by the providers and their policies in relation to cleaning up reallocation of resources must be clearly written into service contracts. This would also maximise the security of information. Of critical importance to GlobDev is the location of information stored by a cloud provider to avoid the possibility of sensitive information creating legal difficulties in countries in which GlobDev has current and possible future projects. Multi factor authentication should be a key requirement in assessing the offering by a cloud provider to eliminate the risk of compromised passwords allowing unauthorised access to sensitive information. A password management system will also be necessary in a multi-modal solution due to the requirement for authentication for each resource to avoid staff having to keep a physical record of all their passwords. The greatest benefit in moving to a cloud solution lies in enabling project staff to acquire highly secure mobile technology. Cloud enabled devices from Apple and those built on an Android platform offer GlobDev the ability to erase a device that is lost or stolen. This will give the organisation a high degree of confidence that sensitive information cannot be accessed from a lost device and makes it more secure than the printed information project staff currently carries with them. Mobile devices will allow project staff to have easy access to
  • 11. required information and significantly reduce the time they currently spend in the office attending to administrative matters. In summary, cloud computing has the ability to transform GlobDev and it is recommended that cloud services replace the existing computing information resources. 7.0 Recommendations Based on the advantages to GlobDev and the available strategies for mitigating risks to the security of the organisation, it is recommended that GlobDev start migrating from its server centric Information Technology resources to a Cloud Computing solution. The Cloud Computing model would also allow project staff access to secure mobile devices. In the first stage of a proposed migration, an audit of all software would need to be performed to understand which applications that staff currently use are suitable in a cloud environment. Those applications that are unsuitable will need to be researched to discover if suitable replacement applications are commercially available or if those applications will need to be written specifically for GlobDev. Cloud specific commercially available direct replacements of current software, for example Microsoft Office, should also be investigated to see if cloud licencing is a more cost effective option than the current licencing fees. Simultaneously all existing information will need to be classified according to its sensitivity and availability requirements. Such an audit would then provide information about the modes of Cloud-Computing and the sizing requirements for each mode of the solution. As the organisation has some information that is both time critical and security critical, that information would need to be stored in an on-site private cloud so that access and recovery is completely controlled by GlobDev. For information that requires a high level of security but is not time critical, that information can be stored in an IaaS solution using a virtual private cloud. The ensure that the information is not housed on servers that are located in countries where the information might have negative
  • 12. consequences, a contract with the supplier of the IaaS solution must stipulate the location of with the information would be housed. The contract must also stipulate who in the suppliers’ company has access to GlobDev’s information both in physical access to the servers and virtual access through the supplier’s network. There should also be a two-factor authentication process for access to this information to eliminate the risk of unauthorised access due to compromised passwords. Dual-factor authentication should also be implemented where access to the on-site cloud is via the Internet. Information that is neither security critical nor time critical could be housed both through a SaaS solution and the virtual Private Cloud. There would need to be strict and clearly defined policies surrounding written to define the categories of information as it is created as to where it should be located. After writing new policies and procedures a training plan along with materials for all staff needs to be developed to ensure minimal loss of productivity during the transition. After migration to the cloud is completed, then new social media applications should be written to engage with donors. This should increase satisfaction levels with donors and help maintain long-term relationships with GlobDev. Simultaneously, project staff should then be offered Android Tablets or Apple Mac Books depending on their business requirements. Those devices allow for high security of data stored on the devices and the ability to remotely wipe them should they be lost or stolen. While training for field staff might be difficult, well designed written and multi media packages should enable project staff to quickly adopt the new technology. Equipping staff in this way will foster close connections between project staff and donors that encourages long-term commitments and fosters the growth of the supporter base. Following through with these recommendations will see the growth of GlobDev and transform the business into a modern, responsive organisation.
  • 13. 8.0 Reference list Apple 2014, iCloud: Use lost mode, Apple Inc, viewed 30 April 2014, http://support.apple.com/kb/PH2700 Behl, A & Behl, K 2012, 'An analysis of cloud computing security issues', Information and Communication Technologies (WICT), 2012 World Congress on, Oct. 30 2012-Nov. 2 2012. D'Costa-Alphonso, M-M & Lane, M 2010, 'The adoption of single sign-on and multifactor authentication in organisations -- A critical evaluation using TOE framework', Issues in Informing Science & Information Technology, vol. 7, pp. 161-189. Dou, W, Qi, L, Zhang, X & Chen, J 2013, 'An evaluation method of outsourcing services for developing an elastic cloud platform', Journal of Supercomputing, vol. 63, no. 1, pp. 1-23. Fernandes, D, Soares, L, Gomes, J, Freire, M & Inácio, P 2014, 'Security issues in cloud environments: a survey', International Journal of Information Security, vol. 13, no. 2, pp. 113-170. Google 2014, Android Device Manager, viewed 30 April 2014, https://support.google.com/accounts/answer/3265955?p=android _device_manager&rd=1 Hua, DAI, Tao, HU & Xihui, Z 2014, 'Continued use of mobile technology mediated services: a value perspective', Journal of Computer Information Systems, vol. 54, no. 2, pp. 99-109. Iyer, B & Henderson, JC 2012, 'Business value from clouds: Learning from users', MIS Quarterly Executive, vol. 11, no. 1, pp. 51-60. Jeon, S, Yvette, EG & Byungjoo, P 2012, 'Next generation cloud computing issues and solutions', International Journal of Control & Automation, vol. 5, no. 1, pp. 63-70.
  • 14. Karadsheh, L 2012, 'Applying security policies and service level agreement to IaaS service model to enhance security and transition', Computers & Security, vol. 31, no. 3, pp. 315-326. McAfee 2014, McAfee Livesafe, McAfee Inc, viewed 30 April 2014 2014, http://home.mcafee.com/root/landingpage.aspx?lpname=mls_inf o&affid=0 Mell, P & Grance, T 2011, The NIST Definition of Cloud Computing, 800-145, National Institute of Standards and Technology, Gaithersburg, MD, viewed 15 April 2014, http://csrc.nist.gov/publications/nistpubs/800-145/SP800- 145.pdf. Sarier, ND 2010, 'Improving the accuracy and storage cost in biometric remote authentication schemes', Journal of Network and Computer Applications, vol. 33, pp. 268-274. Srinivasan, S 2013, 'Is security realistic in cloud computing?', Journal of International Technology & Information Management, vol. 22, no. 4, pp. 47-66. Tisnovsky, R 2010, 'Risks versus value in outsourced cloud computing', Financial Executive, vol. 26, no. 9, pp. 64-65. Weir, CS, Douglas, G, Richardson, T & Jack, M 2010, 'Usable security: User preferences for authentication methods in eBanking and the effects of experience', Interacting with Computers, vol. 22, no. 3, pp. 153-164. Wu, W-W, Lan, LW & Lee, Y-T 2013, 'Factors hindering acceptance of using cloud services in university: a case study', Electronic Library, vol. 31, no. 1, pp. 84-98.
  • 15. Page 2 of 14 Assessment DetailsAssessment item 3—Report Due date: 11:55 pm AEST, 16 September 2015,Wednesday, Week 9 ASSESSMENT Weighting: 30% 3 Length: 3000 words +/- 500 words (Note: Failure to submit within this range will result in a penalty of 5 marks) Objectives Please refer to the course profile to see how this assessment item relates to the course learning outcomes. This assignment is designed to stimulate critical thinking outside of the classroom by requiring students to write a formal academic report. You will need to follow the ARE process described in chapters 2 and 3 of Your Business Degree2 (prescribedtextbook for) to analyse the assessment task, research relevant information and evaluate the information you find. This information should be used to write an academic report in which you present your findings or outcomes and make recommendations for future practice Professional writing and writing reports are described in chapters 4 and 5 of Your Business Degree2. This assessment task will assess your skills in critical thinking, researching information, forming an opinion, academic writing, logical ordering of ideas and your ability to support your arguments with quotes from literature.These objectives will be measured by the ‘closeness of fit’ to meeting the assessment task, assessment requirements and assessment criteria listed below.
  • 16. Please note that there is a wealth of material available on the Libguide website for this course that you should use to help you gather and evaluate relevant information for writing your report (http://libguides.library.cqu.edu.au/content.php?pid=322500&si d=2640638). Assessment taskStudents are required to write an academic report as per the format outlined in chapter 5 of the textbook. The report must follow either the Harvard citation and referencing guidelines or APA referencing style. Please note that the prescribed textbook uses APA referencing guidelines but the School of Engineering and Technology recommends Harvard style. See also the Referencing Style subsection below. The report is to be based on the following case study scenario about Wearable Computers. The last decade has seen the introduction of wearable computers. For example, smartwatches are computerised wristwatches that have screens and functionality that is far greater than just displaying the time and date. Another example is Google Glass which is worn like a pair of spectacles. It has a touch screen and can also be controlled by voice. Wearable computers have many advantages such as, assisting with health and fitness. Smartwatches can be used to track physical activity, sleep patterns and heart rate. Google Glass can be used in medicine for a range of applications such as assisting surgeons to record operations on patients and in healthcare to provide online support from mid-wives for mothers having problems breast-feeding. However there are also concerns about privacy and security with wearable computers. Recently smartwatches have been in the news because students have used them in exams; see Is it cheating to wear a smartwatch into an exam? (http://www.theage.com.au/comment/is-it-cheating-to-wear-a- smartwatch-into-an-exam-20150609-ghixg1) written by our Melbourne-based colleague Dr Ritesh Chugh. Google Glass has been criticised for a range of issues about invading people’s
  • 17. privacy and secretly recording people; see Google Glass: is it a threat to our privacy?(http://www.theguardian.com/technology/2013/mar/06/ google-glass-threat-to-our-privacy). You are the ICT manager of a university based in Rockhampton. The Vice-Chancellor has asked you to research wearable computers in higher education. She is interested in finding out how wearable computers can be used in learning and teaching. She is also concerned about any possible negative effects. You are to write a report to be presented at the next executive meeting. The report should address: 1. What are wearable computers and how are they currently being used. You should explore a range of applications of wearable computers, for example, in areas such as healthcare, the military and entertainment. 2. Discuss at least three ways that wearable computers could be used to enhance higher education. In particular the Vice- Chancellor would like you to explore ways wearable computers could be used to provide educational opportunities that are not possible with current stand-alone computers. 3. Assess the advantages and disadvantages of using wearable computers in higher education. Explore the ethical, social and legal considerations of students being connected to the Internet through wearable computers. Examine the privacy and security concerns of using wearable computers in higher education. Your report should conclude with recommendations for the university with respect to the implementation and use of wearable computers in higher education. Please note that you will need to make some assumptions about the university in order to write this report. These assumptions should be incorporated in the introduction to your report when you describe the university and outline the problem to be solved. Specifically your report should include the following: 1. Title page: student name, student number, email address, course code, assignment number, assignment due date, academic
  • 18. referencing style, campus lecturer/tutor, and course coordinator. Not counted in the word count. Note the title page must indicate which academic referencing style you have used: APA or Harvard. 1. Executive summary: should include the purpose of the report, the problem and how it was investigated, your findings and your recommendations. Should be approximately 300 words. Table of Contents: should list the report topics using decimal notation. Needs to include the main headings and subheadings with corresponding page numbers, using a format that makes the hierarchy of topics clear Use MS Word’s ToC auto-generator rather than manually typing out the ToC. Instructions can be found here https://support.office.com/en-gb/article/Create-a- table-of-contents-or-update-a-table-of-contents-eb275189-b93e- 4559-8dd9-c279457bfd72#__create_a_table. Not counted in the word count. Introduction: provide a brief description of the organisation, a concise overview of the problem you have been asked to research, the objectives to be achieved by writing the report and how you investigated the problem. Provide an outline of the sections of the report. Note that you will have to make assumptions about what type of organisation you are working for in this case study. Should be approximately 400 words. Body of the report (use appropriate headings in the body of the report.): Define key terms you will use in your report, such as what is meant by ‘wearable computers’. Present your ideas on the topic and discuss the information you found in your research that was relevant to the report’s objectives. Provide an analysis of the information that you gathered. Ensure that you explore the three points listed in the scenario above. You also need to discuss the ethical, social and legal aspects surrounding this issue. In your discussion, examine the issues from a global perspective as well as from the local perspective (of the fictional university that is the centre of this report). Please do NOT use ‘Body of the Report’ as a heading. Create meaningful headings that reflect the content of your report.
  • 19. Should be approximately 1200 words. Conclusion: based on your research and analysis. Explain the significance of your findings and your discussion. State if your report has achieved its objectives. Should be approximately 550 words. Recommendations: (based on your findings) what would your recommendations be to your Vice-Chancellor in this situation? Provide some guidelines for the university with respect to the implementation and use of wearable computers in higher education. Should be approximately 550 words. Reference list. Not counted in the word count. Appendices if necessary. Not counted in the word count.Note: Additional information regarding this assignment may be placed on the course website as required. Check the course website at least once a week for further information relating to the report. Regular access to the course website is a requirement of this course. Assessment Requirements Your response should be structured as a report (chapter 5 of textbook), written in accordance with standard academic writing principles (chapter 4 of textbook). The report must be written using your own words with any in text citations clearly marked (see Referencing Style subsection below). You may discuss the assessment task with other students and the lecturing staff but you must WRITE the report YOURSELF in your own words. You will need to conduct research to support your arguments using AT LEAST NINE references in addition to your set textbook (that is, a minimum of ten (10) references in your reference list). At least six (6) of these references should be from refereed academic journals and books. All sources should be current i.e. 2010 onwards. The assignment should demonstrate a logical flow of discussion, be grammatically correct and free from typographical, spelling and grammatical errors. It should be prepared in MS-Word (or equivalent) using 12 point font, 1.5 line spacing and margins of
  • 20. 2.54 cm. It is highly recommended that you submit your assignment to the Academic Learning CentreAT LEAST ONE WEEK before the due date so that it can be checked for spelling and grammatical errors.Referencing Style References must be cited (in text) and a reference list provided in accordance with either the Harvard (author-date) referencing style or the APA referencing style. Helpful information on referencing techniques and styles can also be found on CQU’s referencing webpage: http://www.cqu.edu.au/student-life/services-and- facilites/referencing Marks will be deducted for poor referencing or having less than ten (10) references or going under or over the word length. Use quotation marks for direct quotes and you must include the author, date and page number(s) with the quote as per the referencing standards. ALL assignments will be checked for plagiarism (material copied from other students and/or material copied from other sources) using TurnItIn. If you are found to have plagiarised material or if you have used someone else’s words without appropriate referencing, you will be penalised for plagiarism which could result in zero marks for the whole assignment. In some circumstances a more severe penalty may be imposed. Useful information about academic integrity (avoiding plagiarism) can be found at: http://www.cqu.edu.au/student-life/services-and- facilites/referencingSubmission To be submitted online through the Moodle course website assessment block on or before the due date. Before submitting your assignment you should check it against the detailed assessment criteria in the following table to ensure that you have satisfactorily addressed ALL the criteria that will be used to mark your report.
  • 21. 2 Assessment criteriaThis assessment is criterion referenced which means your work is assessed against the criteria in the marking rubric below. Criteria Quality High Distinction (2.75-3.0 marks) Distinction (2.25-2.5 marks) Credit (1.75-2 marks) Pass (1.25-1.5 marks) Fail (0-1 marks) Executive summary The executive summary contained: - a brief description of the purpose of the report - the definition of the problem and how it was investigated - a summary of what you found and what you concluded - your recommendations The executive summary contained the proper sections but did not include enough detail. The executive summary had sections which were too brief or missing. Did not include enough detail. The executive summary lacked clarity and has incomplete or missing sections. It did not clearly explain the problem, how it was investigated and your recommendations. Entire sections of the executive summary are missing. There is a
  • 22. lack of detail and the problem is not well explained. Table of contents Lists the report topics using decimal notation. Includes the main headings and subheadings with corresponding page numbers. Format makes the hierarchy of topics clear. Auto generated using MS Word. A few things missing from the table of contents. Some things missing from the table of contents Includes the main headings only. Table of contents missing. Introduction Set the scene for the report; gave some background information for the topic. Included a brief description of the organisation. Stated the objectives of the investigation. Include the problem you are addressing. Explained the research method used to gather information. Outlined the sections of the report. The introduction contained the proper parts but did not include enough detail. The introduction had parts which were too brief or missing. Did not include enough detail. The introduction lacked clarity and had incomplete or missing parts. It did not clearly introduce the report. The introduction was missing or was a repeat of the executive summary. It did not clearly introduce the report. Body of report: Selection and sequencing of subject material; including evidence. Selected exact amount of relevant material that supports argument with no contradictions. Substantial, logical, & concrete development of ideas. Arguments were logical and clear. Assumptions were made explicit. Key terms were defined. Details were germane, original, and convincingly interpreted. Selected large amount of relevant material.
  • 23. Offered solid development of ideas but less original reasoning. Assumptions were not always recognised or made explicit. Contained some appropriate details or examples. Selected adequate amount of material. Some development of ideas; not much original reasoning. Assumptions are not always recognised or made explicit. Contains some appropriate details or examples. Selected adequate amount of material not all of it relevant. Not much development of ideas. Very little original reasoning. Offered somewhat obvious support that may be too broad. Details were too general, not interpreted, irrelevant to problem, or inappropriately repetitive. Selected too little material or material that is irrelevant. No development of ideas or original reasoning. Offered simplistic, undeveloped, or cryptic support for the ideas. Inappropriate or off-topic generalisations, faulty assumptions, errors of fact. Conclusion Problem restated clearly, main points and supporting arguments summarised. Stated the significance of the findings and that the objectives of the report had been met. No new material. The conclusion contained the proper parts but did not include enough detail. No new material. The conclusion had parts which were too brief or missing. Did not include enough detail. May have included some new material. The conclusion lacked clarity and had incomplete or missing parts. It did not clearly conclude the report. May have included some new material. The conclusion is missing or was a repeat of the executive summary. It did not clearly conclude the report. Included new material.
  • 24. Recommendations Suggested actions to address the problem. Actions were clearly based on the findings of the report. Most suggested actions were relevant to the problem. Actions were based on the findings of the report. Suggested actions were somewhat relevant to the problem. Not all actions were based on the findings of the report. Suggested some actions. Not all actions were relevant to the problem. Not all actions were based on the findings of the report. Recommendations missing or irrelevant to the problem and/or did not relate to the findings. Organisation: of ideas/main points; structure of sentences and paragraphs. Organisation fully supported the problem being addressed and the objectives of report. Sequence of ideas was effective. Excellent sentence structure. Well-constructed paragraphs; clear linkages between paragraphs. Organisation supported the problem being addressed and the objectives of report. Sequence of ideas could be improved. Good sentence structure. Linkages between paragraphs were mostly appropriate. Organisation supported the problem being addressed and the objectives of report. Sequence of ideas did not always flow in a logical manner. Some good sentence structure. Linkages between paragraphs could be improved. Some brief, undeveloped paragraphs. Some signs of logical organisation. May have had abrupt or illogical shifts and ineffective flow of ideas. Some awkward sentences; paragraphs not well linked. Paragraph structure not well integrated; contained extraneous information. Unclear organisation or organisational plan was inappropriate to
  • 25. problem being addressed. Poorly worded sentences. No linkages between paragraphs. Showed minimal effort or lack of comprehension of the assignment. Presentation: · Title page · Grammar, punctuation and spelling. Title page contained all necessary information: student name, student number, email address, course code, assignment number, assignment due date, academic referencing style, campus lecturer/tutor, and course coordinator. Written expression was clear and correct; evidence of thorough proof-reading. Observed professional conventions of written English and report format. Grammar excellent; correct use of punctuation; minimal or no spelling errors. Title page contained all necessary information. A few errors in grammar (wrong verb tense, subject-verb agreement, pronoun agreement, apostrophe errors, singular/plural errors, article use, preposition use, split infinitives, etc.). Made occasional problematic word choices or syntax errors. Observed professional conventions of written English and report format; made a few minor or technical errors. Grammar strong despite occasional lapses; a few spelling or punctuation errors. Title page contained all necessary information. Some distracting grammatical errors (wrong verb tense, subject- verb agreement, pronoun agreement, apostrophe errors, singular/plural errors, article use, preposition use, split infinitives, etc.). Little evidence of proof-reading. Needed to observe professional conventions of written English and report format; made numerous errors. Grammar could be improved; errors in punctuation and spelling. Some necessary information was missing from the title page.
  • 26. Some major grammatical or proofreading errors (wrong verb tense, subject-verb agreement, pronoun agreement, apostrophe errors, singular/plural errors, article use, preposition use, split infinitives, sentence fragments, word form errors, etc.). Needed to observe professional conventions of written English and report format; made repeated errors. Frequent errors in grammar, punctuation, and spelling. Title page missing or missing necessary information. Numerous grammatical errors which seriously detracted from understanding the writing. Evidence of poor planning and/or no serious revision of writing. Did not meet professional conventions of written English and report format. Frequent major errors in grammar, punctuation, and spelling. References (1): Evidence of research and analysis of the references. Thorough research indicated; clear well-thought out analysis clearly integrated into discussion. Analysed and evaluated information in great depth. Used references to support, extend, and inform, but not substitute writer’s own development of ideas. Combined material from a variety of sources. Did not overuse quotes. Research was generally thorough; analysis was generally well done; integrated into discussion. Analysed and evaluated information in considerable depth. Used references to support, but not substitute writer’s own development of ideas. Combined material from a variety of sources. Did not overuse quotes. Some evidence of research; basic analysis; some integration into discussion. Analysed and evaluated information in reasonable depth, some description. Used references to support, but not substitute writer’s own development of ideas.
  • 27. Combined material from a few sources. Did not overuse quotes. Basic research; weaknesses evident in analysis. Little evidence of analysis and evaluation of information; recounted and described. Details were too general, not interpreted, irrelevant to topic, or inappropriately repetitive. Used relevant references but lacked in variety of references and/or the skilful combination of references. Combined material from a few sources. Quotations and paraphrases may be too long or not well integrated into the text. Little or no evidence of research and analysis of information. Neglected important references. Simplistic or undeveloped support for the ideas. Inappropriate or off-topic generalisations, faulty assumptions, errors of fact. Overused quotations or paraphrasing to substitute writer’s own ideas. Possibly used source material without acknowledgement. References (2): In-text citations and reference list. At least ten current references. Thorough referencing. Citations and reference list accurate and consistent with Harvard style. At least ten current references A few inaccuracies with Harvard style for citations and/or reference list. All references listed. At least ten current references Generally complete. One or two references missing. Some errors in Harvard style for citations and/or reference list. At least ten current references Incomplete reference list. References not cited properly in text. Errors with Harvard style.
  • 28. Less than ten references. Problems with citations. Inconsistent with Harvard style. Length Correct length (2500-3500 words) Correct length (2500-3500 words) Correct length (2500-3500 words) Correct length (2500-3500 words) Too long (>3500 words) or too short (<2500 words) Reports in this range will receive a penalty of 5 marks.