SlideShare a Scribd company logo
CIS 500 – Information Systems for Decision-Making
CIS 500 – Information Systems for Decision-Making
Assignment 2: The Presentation
Due Week 10 and worth 200 points
Congratulations. Your proposal for implementing a new IT
project for your organization has been staffed and you are about
to meet with your team for the first time.
Initial impressions are important and you’ll need visuals for
your presentation. Create a slide show (in PowerPoint or similar
software) in which you address the following, in this order:
1. Goals: What is the project and what is the intent of
implementing (what do you hope to accomplish by
implementing the project?).
2. Critical Success Factors: Identify at least 4 different
stakeholders; for each, list at least 2 things that the stakeholder
requires in order to deem the project successful.
3. Acquisition strategy: Should the system be built in-house,
created by a contractor, purchased offthe-shelf and customized,
or leased as a service? Explain your rationale.
Points: 200
Assignment 2: The Presentation
Criteria
UnacceptableBelow 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Goals: What the project hopes to accomplish.
Weight: 10%
(20 points)
Did not communicate what the project hopes to
accomplish
Did not list project goals
Communicated
what the project hopes to accomplish
Did not list project goals
Communicated
what the project hopes to accomplish
Listed the project
goals
Communicated importance of project reaching its
goals
Connected project goals to the organizational strategy
2. Critical Success
Did not identify 4
Identified 4
Identified 4
Identified and
4. Resources: For in-house development, what people/skills are
required and what development lifecycle do you recommend?
Otherwise, identify 3 candidate organizations that can deliver
the system.
5. System functions: In a table format, summarize the types of
users for the system; the business reason(s) each would use the
system; the ways that the system supports each of these needs;
and how this support differs from the current system.
6. Connectivity: Provide a diagram that shows how the system
will connect to the other information systems and what data
flows among them.
7. Security: List the most serious cybersecurity threats and
vulnerabilities of the new system. Suggest strategies to address
them.
8. Mobility: Identify the system’s capabilities for mobile use.
Include a title and summary slide. Use one slide for each of the
8 points above. Include speaker notes or audio narration that
explains each slide more fully.
Grading for this assignment will be based on answer quality,
logic / organization of the paper, and language and writing
skills, using the following rubric.
Factors: Identify at least 4 different stakeholders; for each, list
at least 2 things that stakeholder requires in order to deem the
project successful.
Weight: 10%
(20 points)
stakeholders
Listed things to make project successful, but did not connect
each stakeholder
stakeholders
Listed less than 2 things each stakeholder would require to
deem project successful
stakeholders
Listed 2 things that each stakeholder would require to deem the
project successful
justified the selection of 4 stakeholders
Explained why each stakeholder would be most interested in 2
things to deem project successful
3. Acquisition strategy: Should the system be built in-house,
created by a contractor, purchased off-the-shelf and customized,
or leased as a service? Explain the rationale for your choice.
Weight: 10%
(20 points)
Did not compare acquisition strategies
Did not determine the best strategy for the proposed information
system
Inadequately explained the rationale for choosing the
acquisition strategy
Reasonable comparison of acquisition strategies
Determined best acquisition strategy for the proposed
information system
Somewhat
explained the rationale for choosing the acquisition strategy
Compared various
acquisition strategies
Determined which acquisition strategy would be the best for the
proposed system
Provided rationale for choosing a specific acquisition strategy
Analyzed various acquisition strategies, or presented an
acquisition strategy that was not previously mentioned
Explained why other acquisition strategies would potentially not
work
Discussed cost considerations
4. Resources: For inhouse development, what people/skills are
required and what development lifecycle do you recommend?
Otherwise, identify 3 candidate organizations that can deliver
the system.
Weight: 10%
(20 points)
Inadequately determined
resources needed for the acquisition strategy
Limited
recommendation for
development
lifecycle for inhouse development, or three external
organizations that can deliver the system
Inadequate
justification
Determined
resources needed for the acquisition strategy, but did not justify
reasoning
Recommended a
project
development
lifecycle for inhouse development, or three external
organizations that can deliver the system, but did not
justify why they were chosen
Determined and justified resources needed for chosen
acquisition strategy
Recommended a
project development
lifecycle for inhouse development, or three external
organizations that can deliver the system.
Presented resources not previously considered
Included risk identification and mitigation procedures
Proposed a combination of resources and strategy to organize
stakeholder efforts toward project completion
5. System functions: In a table format, summarize the types of
users for the system; the business
Failed to put in table format
In table format:
Summarized some
In table format:
Summarized the
In table format:
Analyzed user
reason(s) each would use the system; the ways that the system
supports each of these needs; and how this support differs from
the current system.
Weight: 10%
(20 points)
Inadequate summary of users for the system
Limited explanation of why users would use the system
Inadequate description of how system supports users
Inadequate comparison of the proposed system to the old system
of the types of
users for the system
Somewhat explained business reasons for system use
Somewhat described how the system supports users
Reasonable comparison of the proposed system to the old
information system
types of users for the information system
Explained business reasons why each user type would use the
system
Described how the system supports the needs of each user
type
Determined how
this support differs from the current information system
experience and user design considerations
Explained design changes that took place between the old and
new system
Provided rationale for the user types
identified
Discussed how to reach out to user types to test the
system
6. Connectivity: Provide a diagram that shows the other
information systems this one will connect to, and what data
flows among them.
Weight: 10%
(20 points)
Failed to put in diagram format
Inadequate diagram showing your system, hard to follow,
incomplete
Inadequate or hard to follow the data that would flow among
systems, incomplete
In a diagram:
Showed other information systems that your system would
connect to, but hard to follow
Demonstrated what data would flow among systems, but hard to
follow
In a diagram:
Showed other existing information systems that your proposed
system would connect to
Demonstrated what data would flow between your and other
information systems.
In a diagram:
Showed how you selected existing systems that your system
would connect to
Explained how diagram would be updated and maintained based
on changes in the marketplace
7. Security: List the most serious cybersecurity threats and
vulnerabilities of the new system. Suggest strategies to address
them.
Weight: 10%
(20 points)
Inadequate list of cybersecurity threats
Inadequate strategies to address each threat
Reasonable list of cybersecurity
threats, failed to show why they are most serious
Identified strategies to address each
threat
Listed the most serious cybersecurity threats to your new
system
Proposed strategies to address each threat
Proposed how your new system would integrate with Shadow
IT, if at all
Demonstrated strategies for current users to avoid threats
8. Mobility: Identify the system’s capabilities for mobile use.
Weight: 10%
Failed to identify your system’s capabilities for mobile use,
incomplete
Identified your system’s capabilities for mobile use, but not
comprehensive
Identified your system’s capabilities for mobile use
Proposed situations in which mobile use would happen and
situations where its limitations
(20 points)
9. Speaker / Audio Notes: Include speaker notes or audio
narration that explains each slide more fully.
Weight: 10%
(20 points)
Inadequate speaker notes or audio narration, too much
or too little
information on each slide provided
Somewhat detailed speaker notes or audio narration explaining
each slide more fully
Included speaker notes or audio narration explaining
each slide more
fully
Speaker notes or audio narration succinct and direct,
persuasive presentation
Discussed cost considerations, and risk identification &
mitigation
10. Clarity, persuasion, proper communication, writing
mechanics, and formatting requirements.
Weight: 10%
(20 points)
Unclear structure, not persuasive, major grammatical errors
Somewhat clear
structure, limited persuasion, grammatical errors, language too
simple or too wordy
Clear structure, persuasive writing, minor or no grammatical
errors, length and format within requirements, plain language
No grammatical errors, plain language, organized by topic,
references business needs, connects to technical specs,
persuasive
© 2017 Strayer University. All Rights Reserved. This document
contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or
otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
CIS 500 Page 1 of 4
© 2017 Strayer University. All Rights Reserved. This document
contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or
otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
CIS 500 Page 1 of 4
 CIS 500 – Information Systems for Decision-Making   CIS 5.docx

More Related Content

Similar to CIS 500 – Information Systems for Decision-Making CIS 5.docx

The PresentationCongratulations. Your project has been staff.docx
The PresentationCongratulations. Your project has been staff.docxThe PresentationCongratulations. Your project has been staff.docx
The PresentationCongratulations. Your project has been staff.docx
gabrielaj9
 
See AttachmentAssignment 2 The PresentationCongratula.docx
See AttachmentAssignment 2 The PresentationCongratula.docxSee AttachmentAssignment 2 The PresentationCongratula.docx
See AttachmentAssignment 2 The PresentationCongratula.docx
jeffreye3
 
Due Week 10 and worth 200 points Congratulations. Your project has b.docx
Due Week 10 and worth 200 points Congratulations. Your project has b.docxDue Week 10 and worth 200 points Congratulations. Your project has b.docx
Due Week 10 and worth 200 points Congratulations. Your project has b.docx
infantkimber
 
Congratulations. Your project has been staffed and you are about to .docx
Congratulations. Your project has been staffed and you are about to .docxCongratulations. Your project has been staffed and you are about to .docx
Congratulations. Your project has been staffed and you are about to .docx
breaksdayle
 
Assignment 2 The PresentationCongratulations. Your project .docx
Assignment 2 The PresentationCongratulations. Your project .docxAssignment 2 The PresentationCongratulations. Your project .docx
Assignment 2 The PresentationCongratulations. Your project .docx
annrodgerson
 
Systems Analysis and Design 9th Edition Kendall Solutions Manual
Systems Analysis and Design 9th Edition Kendall Solutions ManualSystems Analysis and Design 9th Edition Kendall Solutions Manual
Systems Analysis and Design 9th Edition Kendall Solutions Manual
bijavotyz
 
Assignment 1 The CEO’s Challenge Due Week 3 and worth 150 points .docx
Assignment 1 The CEO’s Challenge Due Week 3 and worth 150 points .docxAssignment 1 The CEO’s Challenge Due Week 3 and worth 150 points .docx
Assignment 1 The CEO’s Challenge Due Week 3 and worth 150 points .docx
deanmtaylor1545
 
Assignment 2 The Presentation Due Week 10 and worth 200 points.docx
Assignment 2 The Presentation Due Week 10 and worth 200 points.docxAssignment 2 The Presentation Due Week 10 and worth 200 points.docx
Assignment 2 The Presentation Due Week 10 and worth 200 points.docx
annrodgerson
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
joshua2345678
 
Assignment 2 The Presentation Due Week 10 and worth 200 points .docx
Assignment 2 The Presentation Due Week 10 and worth 200 points .docxAssignment 2 The Presentation Due Week 10 and worth 200 points .docx
Assignment 2 The Presentation Due Week 10 and worth 200 points .docx
braycarissa250
 
QSO 510 Final Project Guidelines and Rubric Overview .docx
QSO 510 Final Project Guidelines and Rubric  Overview .docxQSO 510 Final Project Guidelines and Rubric  Overview .docx
QSO 510 Final Project Guidelines and Rubric Overview .docx
makdul
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docx
wkyra78
 
IT 510 Milestone Four Guidelines and Rubric You will su
IT 510 Milestone Four Guidelines and Rubric  You will suIT 510 Milestone Four Guidelines and Rubric  You will su
IT 510 Milestone Four Guidelines and Rubric You will su
TatianaMajor22
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx
odiliagilby
 
6. ch 5-understanding requirements
6. ch 5-understanding requirements6. ch 5-understanding requirements
6. ch 5-understanding requirements
Delowar hossain
 
Running Head TOWN GUIDE ANDROID APPLICATION5TOWN GUIDE ANDROI.docx
Running Head TOWN GUIDE ANDROID APPLICATION5TOWN GUIDE ANDROI.docxRunning Head TOWN GUIDE ANDROID APPLICATION5TOWN GUIDE ANDROI.docx
Running Head TOWN GUIDE ANDROID APPLICATION5TOWN GUIDE ANDROI.docx
toltonkendal
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)raszky
 
INTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docxINTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docx
bagotjesusa
 
system development life cycle
system development life cyclesystem development life cycle
system development life cycle
SuhleemAhmd
 

Similar to CIS 500 – Information Systems for Decision-Making CIS 5.docx (20)

The PresentationCongratulations. Your project has been staff.docx
The PresentationCongratulations. Your project has been staff.docxThe PresentationCongratulations. Your project has been staff.docx
The PresentationCongratulations. Your project has been staff.docx
 
See AttachmentAssignment 2 The PresentationCongratula.docx
See AttachmentAssignment 2 The PresentationCongratula.docxSee AttachmentAssignment 2 The PresentationCongratula.docx
See AttachmentAssignment 2 The PresentationCongratula.docx
 
Due Week 10 and worth 200 points Congratulations. Your project has b.docx
Due Week 10 and worth 200 points Congratulations. Your project has b.docxDue Week 10 and worth 200 points Congratulations. Your project has b.docx
Due Week 10 and worth 200 points Congratulations. Your project has b.docx
 
Congratulations. Your project has been staffed and you are about to .docx
Congratulations. Your project has been staffed and you are about to .docxCongratulations. Your project has been staffed and you are about to .docx
Congratulations. Your project has been staffed and you are about to .docx
 
Assignment 2 The PresentationCongratulations. Your project .docx
Assignment 2 The PresentationCongratulations. Your project .docxAssignment 2 The PresentationCongratulations. Your project .docx
Assignment 2 The PresentationCongratulations. Your project .docx
 
Systems Analysis and Design 9th Edition Kendall Solutions Manual
Systems Analysis and Design 9th Edition Kendall Solutions ManualSystems Analysis and Design 9th Edition Kendall Solutions Manual
Systems Analysis and Design 9th Edition Kendall Solutions Manual
 
Assignment 1 The CEO’s Challenge Due Week 3 and worth 150 points .docx
Assignment 1 The CEO’s Challenge Due Week 3 and worth 150 points .docxAssignment 1 The CEO’s Challenge Due Week 3 and worth 150 points .docx
Assignment 1 The CEO’s Challenge Due Week 3 and worth 150 points .docx
 
Assignment 2 The Presentation Due Week 10 and worth 200 points.docx
Assignment 2 The Presentation Due Week 10 and worth 200 points.docxAssignment 2 The Presentation Due Week 10 and worth 200 points.docx
Assignment 2 The Presentation Due Week 10 and worth 200 points.docx
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
 
Assignment 2 The Presentation Due Week 10 and worth 200 points .docx
Assignment 2 The Presentation Due Week 10 and worth 200 points .docxAssignment 2 The Presentation Due Week 10 and worth 200 points .docx
Assignment 2 The Presentation Due Week 10 and worth 200 points .docx
 
QSO 510 Final Project Guidelines and Rubric Overview .docx
QSO 510 Final Project Guidelines and Rubric  Overview .docxQSO 510 Final Project Guidelines and Rubric  Overview .docx
QSO 510 Final Project Guidelines and Rubric Overview .docx
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docx
 
IT 510 Milestone Four Guidelines and Rubric You will su
IT 510 Milestone Four Guidelines and Rubric  You will suIT 510 Milestone Four Guidelines and Rubric  You will su
IT 510 Milestone Four Guidelines and Rubric You will su
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx
 
6. ch 5-understanding requirements
6. ch 5-understanding requirements6. ch 5-understanding requirements
6. ch 5-understanding requirements
 
Running Head TOWN GUIDE ANDROID APPLICATION5TOWN GUIDE ANDROI.docx
Running Head TOWN GUIDE ANDROID APPLICATION5TOWN GUIDE ANDROI.docxRunning Head TOWN GUIDE ANDROID APPLICATION5TOWN GUIDE ANDROI.docx
Running Head TOWN GUIDE ANDROID APPLICATION5TOWN GUIDE ANDROI.docx
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)
 
INTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docxINTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docx
 
system development life cycle
system development life cyclesystem development life cycle
system development life cycle
 
Final
FinalFinal
Final
 

More from aryan532920

According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxAccording to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
aryan532920
 
According to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxAccording to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docx
aryan532920
 
According to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxAccording to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docx
aryan532920
 
According to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docxAccording to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docx
aryan532920
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
aryan532920
 
According to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docxAccording to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docx
aryan532920
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docx
aryan532920
 
According to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docxAccording to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docx
aryan532920
 
According to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxAccording to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docx
aryan532920
 
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxAccording to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
aryan532920
 
According to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docxAccording to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docx
aryan532920
 
According to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docxAccording to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docx
aryan532920
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
aryan532920
 
According to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docxAccording to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docx
aryan532920
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docx
aryan532920
 
According to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docxAccording to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docx
aryan532920
 
According to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docxAccording to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docx
aryan532920
 
According to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docxAccording to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docx
aryan532920
 
According to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docxAccording to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docx
aryan532920
 
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxAccording to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
aryan532920
 

More from aryan532920 (20)

According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxAccording to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docx
 
According to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docxAccording to the text, crime has been part of the human condition si.docx
According to the text, crime has been part of the human condition si.docx
 
According to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docxAccording to Ronald Story and Bruce Laurie, The dozen years between.docx
According to Ronald Story and Bruce Laurie, The dozen years between.docx
 
According to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docxAccording to Kirk (2016), most of your time will be spent work with .docx
According to Kirk (2016), most of your time will be spent work with .docx
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
 
According to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docxAccording to Kirk (2016), most of our time will be spent working.docx
According to Kirk (2016), most of our time will be spent working.docx
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docx
 
According to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docxAccording to Davenport (2014) the organizational value of healthcare.docx
According to Davenport (2014) the organizational value of healthcare.docx
 
According to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxAccording to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docx
 
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxAccording to Gilbert and Troitzsch (2005), Foundations of Simula.docx
According to Gilbert and Troitzsch (2005), Foundations of Simula.docx
 
According to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docxAccording to Klein (2016), using ethical absolutism and ethical .docx
According to Klein (2016), using ethical absolutism and ethical .docx
 
According to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docxAccording to Franks and Smallwood (2013), information has become.docx
According to Franks and Smallwood (2013), information has become.docx
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
 
According to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docxAccording to the authors, privacy and security go hand in hand; and .docx
According to the authors, privacy and security go hand in hand; and .docx
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docx
 
According to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docxAccording to the authors, countries that lag behind the rest of the .docx
According to the authors, countries that lag behind the rest of the .docx
 
According to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docxAccording to Peskin et al. (2013) in our course reader, Studies on .docx
According to Peskin et al. (2013) in our course reader, Studies on .docx
 
According to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docxAccording to Franks and Smallwood (2013), information has become the.docx
According to Franks and Smallwood (2013), information has become the.docx
 
According to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docxAccording to Ang (2011), how is Social Media management differen.docx
According to Ang (2011), how is Social Media management differen.docx
 
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxAccording to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docx
 

Recently uploaded

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 

CIS 500 – Information Systems for Decision-Making CIS 5.docx

  • 1. CIS 500 – Information Systems for Decision-Making CIS 500 – Information Systems for Decision-Making Assignment 2: The Presentation Due Week 10 and worth 200 points Congratulations. Your proposal for implementing a new IT project for your organization has been staffed and you are about to meet with your team for the first time. Initial impressions are important and you’ll need visuals for your presentation. Create a slide show (in PowerPoint or similar software) in which you address the following, in this order: 1. Goals: What is the project and what is the intent of implementing (what do you hope to accomplish by implementing the project?). 2. Critical Success Factors: Identify at least 4 different stakeholders; for each, list at least 2 things that the stakeholder requires in order to deem the project successful. 3. Acquisition strategy: Should the system be built in-house, created by a contractor, purchased offthe-shelf and customized, or leased as a service? Explain your rationale. Points: 200 Assignment 2: The Presentation Criteria UnacceptableBelow 70% F
  • 2. Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Goals: What the project hopes to accomplish. Weight: 10% (20 points) Did not communicate what the project hopes to accomplish Did not list project goals Communicated what the project hopes to accomplish Did not list project goals Communicated what the project hopes to accomplish Listed the project goals Communicated importance of project reaching its goals Connected project goals to the organizational strategy 2. Critical Success Did not identify 4 Identified 4 Identified 4
  • 3. Identified and 4. Resources: For in-house development, what people/skills are required and what development lifecycle do you recommend? Otherwise, identify 3 candidate organizations that can deliver the system. 5. System functions: In a table format, summarize the types of users for the system; the business reason(s) each would use the system; the ways that the system supports each of these needs; and how this support differs from the current system. 6. Connectivity: Provide a diagram that shows how the system will connect to the other information systems and what data flows among them. 7. Security: List the most serious cybersecurity threats and vulnerabilities of the new system. Suggest strategies to address them. 8. Mobility: Identify the system’s capabilities for mobile use. Include a title and summary slide. Use one slide for each of the 8 points above. Include speaker notes or audio narration that explains each slide more fully. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Factors: Identify at least 4 different stakeholders; for each, list at least 2 things that stakeholder requires in order to deem the project successful. Weight: 10% (20 points) stakeholders Listed things to make project successful, but did not connect each stakeholder
  • 4. stakeholders Listed less than 2 things each stakeholder would require to deem project successful stakeholders Listed 2 things that each stakeholder would require to deem the project successful justified the selection of 4 stakeholders Explained why each stakeholder would be most interested in 2 things to deem project successful 3. Acquisition strategy: Should the system be built in-house, created by a contractor, purchased off-the-shelf and customized, or leased as a service? Explain the rationale for your choice. Weight: 10% (20 points) Did not compare acquisition strategies Did not determine the best strategy for the proposed information system Inadequately explained the rationale for choosing the acquisition strategy Reasonable comparison of acquisition strategies Determined best acquisition strategy for the proposed information system Somewhat explained the rationale for choosing the acquisition strategy
  • 5. Compared various acquisition strategies Determined which acquisition strategy would be the best for the proposed system Provided rationale for choosing a specific acquisition strategy Analyzed various acquisition strategies, or presented an acquisition strategy that was not previously mentioned Explained why other acquisition strategies would potentially not work Discussed cost considerations 4. Resources: For inhouse development, what people/skills are required and what development lifecycle do you recommend? Otherwise, identify 3 candidate organizations that can deliver the system. Weight: 10% (20 points) Inadequately determined resources needed for the acquisition strategy Limited recommendation for development lifecycle for inhouse development, or three external organizations that can deliver the system Inadequate justification Determined
  • 6. resources needed for the acquisition strategy, but did not justify reasoning Recommended a project development lifecycle for inhouse development, or three external organizations that can deliver the system, but did not justify why they were chosen Determined and justified resources needed for chosen acquisition strategy Recommended a project development lifecycle for inhouse development, or three external organizations that can deliver the system. Presented resources not previously considered Included risk identification and mitigation procedures Proposed a combination of resources and strategy to organize stakeholder efforts toward project completion 5. System functions: In a table format, summarize the types of users for the system; the business Failed to put in table format In table format: Summarized some In table format:
  • 7. Summarized the In table format: Analyzed user reason(s) each would use the system; the ways that the system supports each of these needs; and how this support differs from the current system. Weight: 10% (20 points) Inadequate summary of users for the system Limited explanation of why users would use the system Inadequate description of how system supports users Inadequate comparison of the proposed system to the old system of the types of users for the system Somewhat explained business reasons for system use Somewhat described how the system supports users Reasonable comparison of the proposed system to the old information system types of users for the information system Explained business reasons why each user type would use the system Described how the system supports the needs of each user type Determined how
  • 8. this support differs from the current information system experience and user design considerations Explained design changes that took place between the old and new system Provided rationale for the user types identified Discussed how to reach out to user types to test the system 6. Connectivity: Provide a diagram that shows the other information systems this one will connect to, and what data flows among them. Weight: 10% (20 points) Failed to put in diagram format Inadequate diagram showing your system, hard to follow, incomplete Inadequate or hard to follow the data that would flow among systems, incomplete In a diagram: Showed other information systems that your system would connect to, but hard to follow Demonstrated what data would flow among systems, but hard to follow In a diagram: Showed other existing information systems that your proposed
  • 9. system would connect to Demonstrated what data would flow between your and other information systems. In a diagram: Showed how you selected existing systems that your system would connect to Explained how diagram would be updated and maintained based on changes in the marketplace 7. Security: List the most serious cybersecurity threats and vulnerabilities of the new system. Suggest strategies to address them. Weight: 10% (20 points) Inadequate list of cybersecurity threats Inadequate strategies to address each threat Reasonable list of cybersecurity threats, failed to show why they are most serious Identified strategies to address each threat Listed the most serious cybersecurity threats to your new system Proposed strategies to address each threat Proposed how your new system would integrate with Shadow IT, if at all Demonstrated strategies for current users to avoid threats
  • 10. 8. Mobility: Identify the system’s capabilities for mobile use. Weight: 10% Failed to identify your system’s capabilities for mobile use, incomplete Identified your system’s capabilities for mobile use, but not comprehensive Identified your system’s capabilities for mobile use Proposed situations in which mobile use would happen and situations where its limitations (20 points) 9. Speaker / Audio Notes: Include speaker notes or audio narration that explains each slide more fully. Weight: 10% (20 points) Inadequate speaker notes or audio narration, too much or too little information on each slide provided Somewhat detailed speaker notes or audio narration explaining each slide more fully Included speaker notes or audio narration explaining each slide more fully Speaker notes or audio narration succinct and direct,
  • 11. persuasive presentation Discussed cost considerations, and risk identification & mitigation 10. Clarity, persuasion, proper communication, writing mechanics, and formatting requirements. Weight: 10% (20 points) Unclear structure, not persuasive, major grammatical errors Somewhat clear structure, limited persuasion, grammatical errors, language too simple or too wordy Clear structure, persuasive writing, minor or no grammatical errors, length and format within requirements, plain language No grammatical errors, plain language, organized by topic, references business needs, connects to technical specs, persuasive © 2017 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 500 Page 1 of 4 © 2017 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 500 Page 1 of 4