Description
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Excellent! Definitely coming back for more study materials.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
ECPIU Access & Control of Personal Information Privacy & Confidentiality Discussion
In debates regarding access and control of personal information, it is sometimes argued that an appropriate balance needs ...
ECPIU Access & Control of Personal Information Privacy & Confidentiality Discussion
In debates regarding access and control of personal information, it is sometimes argued that an appropriate balance needs to be struck between individuals and organizations: individuals claim that they should be able to control who has access to their information, and organizations, including government and business groups, claim to need that information in order to make appropriate decisions. How can a reasonable resolution be reached that would satisfy both parties? Which personal information is okay to share and which is not? Is there a limit? Should there be a limit?
Be sure to back up your opinions and arguments with some facts and do the research! Your work should be as comprehensive as if you were writing a paper.
CSC 1000 EC Creating a Purchase Request Form Using MS Word Computer Exercise
The purpose of the Technology Software/Hardware Purchase Request Form
is to encourage project planning, and to ensure the ...
CSC 1000 EC Creating a Purchase Request Form Using MS Word Computer Exercise
The purpose of the Technology Software/Hardware Purchase Request Form
is to encourage project planning, and to ensure the appropriate use of
the college’s resources. This form collects information to assist in the
determination of the alignment of the proposed technology with the
College’s curriculum, information, and technology needs. Additionally,
it will assist the user in identifying an accurate cost estimate of the
project or purchase.The College has asked you to design the Technology Software/Hardware Purchase Request Form.Complete the following steps:1. Create a MS Word document and then save it as TechForm.docx. 2. Open the accompanying file Instructions.docx and follow the steps in it.Select the following link to access the instructions.Instructions undefinedAll
Information Technology related purchases will require the use of this
form. In addition to the checks and reviews of the ongoing purchases,
the form will also become part of the IT Projects portfolio. The
Purchase Request Form has 3 parts (at least three pages in total): a
cover page, the request form, and an appendix. This form will be used to
collect the information needed and will be the basis to determine if
the request aligns with College’s technical initiatives and when used
for that purpose, the College’s curriculum.undefinedThe Cover Page
will start with the title of the form, the name of the person
requesting the purchase (YOU) and the date. Next, include the detailed
purpose of the form, who will use the form, and the procedures for
submitting the form (e.g., who the form is submitted to, who to contact
with questions, etc.).undefinedThe Request Form (at least one page long) is a table
consisting of three parts; the heading, the details, and the
signatures. Please format the following items into a table form, which
will be a concise, professionally developed document with all the needed
information provided. You can enter either real or fictitious
information into the form as if you are making a real-world purchase
request. For information that is not applicable to the purchase request,
please write N/A as the entry. undefinedThe form heading section should include the following items:undefinedNameDepartmentOffice #Phone #Type of purchase (hardware/software/service)Type of request (new/renewal/replacement/upgrade)Installation locationProject name and description (if this request is part of a larger project, please provide the project information) Justification (how the hardware/software will be used; why the purchase is needed)Equipment/software costsImplementation/setup costsAnnual fee costsLicensing costsService costsOther costsTotalundefinedThe form detail section should include the following items:undefinedThe form signature section
will contain a 2 column table. column one will contain signatures and
column two will contain the date.Include enough rows for your signature
and any reviewers (as many as you feel are necessary.undefinedThe Appendix Page (at least one page long) will consist of cost estimates. You need to provide quotes from three providers that you found through online searchesundefinedEach estimate may include the following information, depending on the purchase.undefinedHeaders, footers, or themes applied to the form will be a plus.
UOP W2 The Importance of Footprinting in The Ethical Hacking Process Report
Choose an organization to target for passive footprinting.
Conduct reconnaissance of your target organization using ...
UOP W2 The Importance of Footprinting in The Ethical Hacking Process Report
Choose an organization to target for passive footprinting.
Conduct reconnaissance of your target organization using methods and techniques described in Module 2 of Certified Ethical Hacker Version 11. Collect all the public information from your efforts.
Write a 1- to 2-page report summarizing the footprinting information you collected.
Summarize, briefly, the importance of footprinting in the ethical hacking process and how it will be used in penetration testing.
Examine the organization, network, and system information you collected. Describe the results of your examination.
Explain the security posture of the organization. Identify any security vulnerabilities you detected.
CYB 602 Threat Vulnerability And Risk Discussion
FIRST:Select one of the Options below as your primary topic. To help keep track of replies vs. original postings, your Sub ...
CYB 602 Threat Vulnerability And Risk Discussion
FIRST:Select one of the Options below as your primary topic. To help keep track of replies vs. original postings, your Subject line should start with: Lastname – Option [A or B] (e.g. Simpson - Option A).Option AWrite a short summary of threat modeling for your CISO and provide any recommended actions your company should take to implement threat modeling. Assume your company is a Fortune 1000 company located in San Diego and you handle sensitive data including PII, as well as valuable intellectual property.Option BYour CISO is presenting an updated Information Security Plan to the Board of Directors. You are tasked with writing a brief description of three key terms – Threats, Vulnerabilities, and Risks – so that the non-technical directors will be able to understand the differences between them, how they relate to each other, and how each one applies to the security plan. The directors may be non-technical; however, they are business people, so your comments should be in a business context they will understand.
Assignment 2: The Presentation
Assignment 2: The Presentation
Due Week 10 and worth 200 points
Congratulations. Your project has been staffed and you a ...
Assignment 2: The Presentation
Assignment 2: The Presentation
Due Week 10 and worth 200 points
Congratulations. Your project has been staffed and you are about to meet with the team for the first time.
Initial impressions are important and you’ll need visuals for your presentation. Create a slide show (in
PowerPoint or similar software) in which you address the following, in this order:
Goals: What the project hopes to accomplish.
Critical Success Factors: Identify at least 4 different stakeholders; for each, list at least 2 things
that the stakeholder requires in order to deem the project successful.
Acquisition strategy: Should the system be built in-house, created by a contractor, purchased off-
the-shelf and customized, or leased as a service? Explain your rationale.
Resources: For in-house development, what people/skills are required and what development
lifecycle do you recommend? Otherwise, identify 3 candidate organizations that can deliver the
system.
System functions: In a table format, summarize the types of users for the system; the business
reason(s) each would use the system; the ways that the system supports each of these needs;
and how this support differs from the current system.
Connectivity: Provide a diagram that shows how the system will connect to the other information
systems and what data flows among them.
Security: List the most serious cybersecurity threats and vulnerabilities of the new system.
Suggest strategies to address them.
Mobility: Identify the system’s capabilities for mobile use.
Include a title and summary slide. Use one slide for each of the 8 points above. Include speaker notes or
audio narration that explains each slide more fully.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and
language and writing skills, using the following rubric.
Points: 200
Assignment 2: The Presentation
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Goals: What the
project hopes to
accomplish.
Weight: 10%
(20 points)
Did not
communicate what
the project hopes to
accomplish
Did not list project
goals
Communicated
what the project
hopes to
accomplish
Did not list project
goals
Communicated
what the project
hopes to
accomplish
Listed the project
goals
Communicated
importance of
project reaching its
goals
Connected project
goals to the
organizational
strategy
2. Critical Success
Did not identify 4
Identified 4
Identified 4
Identified and
© 2017 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Page 1 of 4
CIS 500 – Information Systems for Decision-Making
Factors: Identify at least
4 different stakeholders;
for each, list at least 2
things that stakeholder
requires in order to deem
the project successful.
Weight: 10%
(20 points)
stakeholders
Listed things to
make project
successful, but did
not connect each
stakeholder
stakeholders
Listed less than 2
things each
stakeholder would
require to deem
project successful
stakeholders
Listed 2 things that
each stakeholder
would require to
deem the project
successful
justified the
selection of 4
stakeholders
Explained why each
stakeholder would
be most interested
in 2 things to deem
project successful
3. Acquisition strategy:
Should the system be
built in-house, created by
a contractor, purchased
off-the-shelf and
customized, or leased as
a service? Explain the
rationale for your choice.
Weight: 10%
(20 points)
Did not compare
acquisition
strategies
Did not determine
the best strategy for
the proposed
information system
Inadequately
explained the
rationale for
choosing the
acquisition strategy
Reasonable
comparison of
acquisition
strategies
Determined best
acquisition strategy
for the proposed
information system
Somewhat
explained the
rationale for
choosing the
acquisition strategy
Compared various
acquisition
strategies
Determined which
acquisition strategy
would be the best
for the proposed
system
Provided rationale
for choosing a
specific acquisition
strategy
Analyzed various
acquisition
strategies, or
presented an
acquisition strategy
that was not
previously
mentioned
Explained why
other acquisition
strategies would
potentially not work
Discussed cost
considerations
4. Resources: For in-
house development,
what people/skills are
required and what
development lifecycle do
you recommend?
Otherwise, identify 3
candidate organizations
that can deliver the
system.
Weight: 10%
(20 points)
Inadequately
determined
resources needed
for the acquisition
strategy
Limited
recommendation for
development
lifecycle for in-
house
development, or
three external
organizations that
can deliver the
system
Inadequate
justification
Determined
resources needed
for the acquisition
strategy, but did not
justify reasoning
Recommended a
project
development
lifecycle for in-
house
development, or
three external
organizations that
can deliver the
system, but did not
justify why they
were chosen
Determined and
justified resources
needed for chosen
acquisition strategy
Recommended a
project
development
lifecycle for in-
house
development, or
three external
organizations that
can deliver the
system.
Presented
resources not
previously
considered
Included risk
identification and
mitigation
procedures
Proposed a
combination of
resources and
strategy to organize
stakeholder efforts
toward project
completion
5. System functions: In a
table format, summarize
the types of users for the
system; the business
Failed to put in
table format
In table format:
Summarized some
In table format:
Summarized the
In table format:
Analyzed user
© 2017 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Page 2 of 4
CIS 500 – Information Systems for Decision-Making
reason(s) each would
use the system; the ways
that the system supports
each of these needs; and
how this support differs
from the current system.
Weight: 10%
(20 points)
Inadequate
summary of users
for the system
Limited explanation
of why users would
use the system
Inadequate
description of how
system supports
users
Inadequate
comparison of the
proposed system to
the old system
of the types of
users for the
system
Somewhat
explained business
reasons for system
use
Somewhat
described how the
system supports
users
Reasonable
comparison of the
proposed system to
the old information
system
types of users for
the information
system
Explained business
reasons why each
user type would use
the system
Described how the
system supports the
needs of each user
type
Determined how
this support differs
from the current
information system
experience and
user design
considerations
Explained design
changes that took
place between the
old and new system
Provided rationale
for the user types
identified
Discussed how to
reach out to user
types to test the
system
6. Connectivity: Provide a
diagram that shows the
other information
systems this one will
connect to, and what
data flows among them.
Weight: 10%
(20 points)
Failed to put in
diagram format
Inadequate diagram
showing your
system, hard to
follow, incomplete
Inadequate or hard
to follow the data
that would flow
among systems,
incomplete
In a diagram:
Showed other
information systems
that your system
would connect to,
but hard to follow
Demonstrated what
data would flow
among systems, but
hard to follow
In a diagram:
Showed other
existing information
systems that your
proposed system
would connect to
Demonstrated what
data would flow
between your and
other information
systems.
In a diagram:
Showed how you
selected existing
systems that your
system would
connect to
Explained how
diagram would be
updated and
maintained based
on changes in the
marketplace
7. Security: List the most
serious cybersecurity
threats and vulnerabilities
of the new system.
Suggest strategies to
address them.
Weight: 10%
(20 points)
Inadequate list of
cybersecurity
threats
Inadequate
strategies to
address each threat
Reasonable list of
cybersecurity
threats, failed to
show why they are
most serious
Identified strategies
to address each
threat
Listed the most
serious
cybersecurity
threats to your new
system
Proposed strategies
to address each
threat
Proposed how your
new system would
integrate with
Shadow IT, if at all
Demonstrated
strategies for
current users to
avoid threats
8. Mobility: Identify the
system’s capabilities for
mobile use.
Weight: 10%
Failed to identify
your system’s
capabilities for
mobile use,
incomplete
Identified your
system’s
capabilities for
mobile use, but not
comprehensive
Identified your
system’s
capabilities for
mobile use
Proposed situations
in which mobile use
would happen and
situations where its
limitations
© 2017 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Page 3 of 4
CIS 500 – Information Systems for Decision-Making
(20 points)
9. Speaker / Audio
Notes: Include speaker
notes or audio narration
that explains each slide
more fully.
Weight: 10%
(20 points)
Inadequate speaker
notes or audio
narration, too much
or too little
information on each
slide provided
Somewhat detailed
speaker notes or
audio narration
explaining each
slide more fully
Included speaker
notes or audio
narration explaining
each slide more
fully
Speaker notes or
audio narration
succinct and direct,
persuasive
presentation
Discussed cost
considerations, and
risk identification &
mitigation
10. Clarity, persuasion,
proper communication,
writing mechanics, and
formatting requirements.
Weight: 10%
(20 points)
Unclear structure,
not persuasive,
major grammatical
errors
Somewhat clear
structure, limited
persuasion,
grammatical errors,
language too simple
or too wordy
Clear structure,
persuasive writing,
minor or no
grammatical errors,
length and format
within requirements,
plain language
No grammatical
errors, plain
language,
organized by topic,
references business
needs, connects to
technical specs,
persuasive
Similar Content
CSUG Cyber Security Essay
Consider the risk to “integrity of customer and financial data files on system” from “corruption of these files due ...
Benefits of Virtualization Software Benefits of Virtualization Software Discussion
Q: Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, o...
I want it to be done in 4 hours
Screen Shot 2015-06-10 at 1.06.18 PM.png ( Page 1 )Screen Shot 2015-06-10 at 1.06.57 PM.png Continue Page (1)Sc...
SQL Server Assignment, homework help
1. Discuss the difference between the use of views and Transact-SQL statements GRANT, DENY, and REVOKE in relation t...
IT2100 York University Facebook Mobile Ad Problem Article Discussion
Mobile phones have transformed our lives. By allowing instant access to information, online purchases, a camera, and socia...
ITS836 Chapter 12 Endgame or Putting It All Together Discussion Paper 7
Chapter 12 The Endgame, or Putting It All TogetherDiscussion #7Please describe two common deliverables from analytics proj...
Discussion 6 And 7 Replies
1. Communication is an essential aspect of our daily lives and all activities that we do revolve around it. Communication ...
How To Give A Robot A Job Review
Robots have taken over some of the humans’ tasks due to technological advances. Like humans serving clients, robots also...
Application Of Data Analytics Bi And Dss And Ibm Watson S Activities
Application of Data Analytics, BI, and DSS and IBM Watson's Activities Application of Data Analytics, BI, and DSS and IBM ...
Related Tags
Book Guides
Les Miserables
by Victor Hugo
Their Eyes Were Watching God
by Zora Neale Hurston
The Prince
by Niccolò Machiavelli
The 48 Laws of Power
by Robert Greene
The Restless Wave
by John McCain
Little Fires Everywhere
by Celeste Ng
The Color Purple
by Alice Walker
The House of the Seven Gables
by Nathaniel Hawthorne
The Visible Filth
by Nathan Ballingrud
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
ECPIU Access & Control of Personal Information Privacy & Confidentiality Discussion
In debates regarding access and control of personal information, it is sometimes argued that an appropriate balance needs ...
ECPIU Access & Control of Personal Information Privacy & Confidentiality Discussion
In debates regarding access and control of personal information, it is sometimes argued that an appropriate balance needs to be struck between individuals and organizations: individuals claim that they should be able to control who has access to their information, and organizations, including government and business groups, claim to need that information in order to make appropriate decisions. How can a reasonable resolution be reached that would satisfy both parties? Which personal information is okay to share and which is not? Is there a limit? Should there be a limit?
Be sure to back up your opinions and arguments with some facts and do the research! Your work should be as comprehensive as if you were writing a paper.
CSC 1000 EC Creating a Purchase Request Form Using MS Word Computer Exercise
The purpose of the Technology Software/Hardware Purchase Request Form
is to encourage project planning, and to ensure the ...
CSC 1000 EC Creating a Purchase Request Form Using MS Word Computer Exercise
The purpose of the Technology Software/Hardware Purchase Request Form
is to encourage project planning, and to ensure the appropriate use of
the college’s resources. This form collects information to assist in the
determination of the alignment of the proposed technology with the
College’s curriculum, information, and technology needs. Additionally,
it will assist the user in identifying an accurate cost estimate of the
project or purchase.The College has asked you to design the Technology Software/Hardware Purchase Request Form.Complete the following steps:1. Create a MS Word document and then save it as TechForm.docx. 2. Open the accompanying file Instructions.docx and follow the steps in it.Select the following link to access the instructions.Instructions undefinedAll
Information Technology related purchases will require the use of this
form. In addition to the checks and reviews of the ongoing purchases,
the form will also become part of the IT Projects portfolio. The
Purchase Request Form has 3 parts (at least three pages in total): a
cover page, the request form, and an appendix. This form will be used to
collect the information needed and will be the basis to determine if
the request aligns with College’s technical initiatives and when used
for that purpose, the College’s curriculum.undefinedThe Cover Page
will start with the title of the form, the name of the person
requesting the purchase (YOU) and the date. Next, include the detailed
purpose of the form, who will use the form, and the procedures for
submitting the form (e.g., who the form is submitted to, who to contact
with questions, etc.).undefinedThe Request Form (at least one page long) is a table
consisting of three parts; the heading, the details, and the
signatures. Please format the following items into a table form, which
will be a concise, professionally developed document with all the needed
information provided. You can enter either real or fictitious
information into the form as if you are making a real-world purchase
request. For information that is not applicable to the purchase request,
please write N/A as the entry. undefinedThe form heading section should include the following items:undefinedNameDepartmentOffice #Phone #Type of purchase (hardware/software/service)Type of request (new/renewal/replacement/upgrade)Installation locationProject name and description (if this request is part of a larger project, please provide the project information) Justification (how the hardware/software will be used; why the purchase is needed)Equipment/software costsImplementation/setup costsAnnual fee costsLicensing costsService costsOther costsTotalundefinedThe form detail section should include the following items:undefinedThe form signature section
will contain a 2 column table. column one will contain signatures and
column two will contain the date.Include enough rows for your signature
and any reviewers (as many as you feel are necessary.undefinedThe Appendix Page (at least one page long) will consist of cost estimates. You need to provide quotes from three providers that you found through online searchesundefinedEach estimate may include the following information, depending on the purchase.undefinedHeaders, footers, or themes applied to the form will be a plus.
UOP W2 The Importance of Footprinting in The Ethical Hacking Process Report
Choose an organization to target for passive footprinting.
Conduct reconnaissance of your target organization using ...
UOP W2 The Importance of Footprinting in The Ethical Hacking Process Report
Choose an organization to target for passive footprinting.
Conduct reconnaissance of your target organization using methods and techniques described in Module 2 of Certified Ethical Hacker Version 11. Collect all the public information from your efforts.
Write a 1- to 2-page report summarizing the footprinting information you collected.
Summarize, briefly, the importance of footprinting in the ethical hacking process and how it will be used in penetration testing.
Examine the organization, network, and system information you collected. Describe the results of your examination.
Explain the security posture of the organization. Identify any security vulnerabilities you detected.
CYB 602 Threat Vulnerability And Risk Discussion
FIRST:Select one of the Options below as your primary topic. To help keep track of replies vs. original postings, your Sub ...
CYB 602 Threat Vulnerability And Risk Discussion
FIRST:Select one of the Options below as your primary topic. To help keep track of replies vs. original postings, your Subject line should start with: Lastname – Option [A or B] (e.g. Simpson - Option A).Option AWrite a short summary of threat modeling for your CISO and provide any recommended actions your company should take to implement threat modeling. Assume your company is a Fortune 1000 company located in San Diego and you handle sensitive data including PII, as well as valuable intellectual property.Option BYour CISO is presenting an updated Information Security Plan to the Board of Directors. You are tasked with writing a brief description of three key terms – Threats, Vulnerabilities, and Risks – so that the non-technical directors will be able to understand the differences between them, how they relate to each other, and how each one applies to the security plan. The directors may be non-technical; however, they are business people, so your comments should be in a business context they will understand.
Assignment 2: The Presentation
Assignment 2: The Presentation
Due Week 10 and worth 200 points
Congratulations. Your project has been staffed and you a ...
Assignment 2: The Presentation
Assignment 2: The Presentation
Due Week 10 and worth 200 points
Congratulations. Your project has been staffed and you are about to meet with the team for the first time.
Initial impressions are important and you’ll need visuals for your presentation. Create a slide show (in
PowerPoint or similar software) in which you address the following, in this order:
Goals: What the project hopes to accomplish.
Critical Success Factors: Identify at least 4 different stakeholders; for each, list at least 2 things
that the stakeholder requires in order to deem the project successful.
Acquisition strategy: Should the system be built in-house, created by a contractor, purchased off-
the-shelf and customized, or leased as a service? Explain your rationale.
Resources: For in-house development, what people/skills are required and what development
lifecycle do you recommend? Otherwise, identify 3 candidate organizations that can deliver the
system.
System functions: In a table format, summarize the types of users for the system; the business
reason(s) each would use the system; the ways that the system supports each of these needs;
and how this support differs from the current system.
Connectivity: Provide a diagram that shows how the system will connect to the other information
systems and what data flows among them.
Security: List the most serious cybersecurity threats and vulnerabilities of the new system.
Suggest strategies to address them.
Mobility: Identify the system’s capabilities for mobile use.
Include a title and summary slide. Use one slide for each of the 8 points above. Include speaker notes or
audio narration that explains each slide more fully.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and
language and writing skills, using the following rubric.
Points: 200
Assignment 2: The Presentation
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Goals: What the
project hopes to
accomplish.
Weight: 10%
(20 points)
Did not
communicate what
the project hopes to
accomplish
Did not list project
goals
Communicated
what the project
hopes to
accomplish
Did not list project
goals
Communicated
what the project
hopes to
accomplish
Listed the project
goals
Communicated
importance of
project reaching its
goals
Connected project
goals to the
organizational
strategy
2. Critical Success
Did not identify 4
Identified 4
Identified 4
Identified and
© 2017 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Page 1 of 4
CIS 500 – Information Systems for Decision-Making
Factors: Identify at least
4 different stakeholders;
for each, list at least 2
things that stakeholder
requires in order to deem
the project successful.
Weight: 10%
(20 points)
stakeholders
Listed things to
make project
successful, but did
not connect each
stakeholder
stakeholders
Listed less than 2
things each
stakeholder would
require to deem
project successful
stakeholders
Listed 2 things that
each stakeholder
would require to
deem the project
successful
justified the
selection of 4
stakeholders
Explained why each
stakeholder would
be most interested
in 2 things to deem
project successful
3. Acquisition strategy:
Should the system be
built in-house, created by
a contractor, purchased
off-the-shelf and
customized, or leased as
a service? Explain the
rationale for your choice.
Weight: 10%
(20 points)
Did not compare
acquisition
strategies
Did not determine
the best strategy for
the proposed
information system
Inadequately
explained the
rationale for
choosing the
acquisition strategy
Reasonable
comparison of
acquisition
strategies
Determined best
acquisition strategy
for the proposed
information system
Somewhat
explained the
rationale for
choosing the
acquisition strategy
Compared various
acquisition
strategies
Determined which
acquisition strategy
would be the best
for the proposed
system
Provided rationale
for choosing a
specific acquisition
strategy
Analyzed various
acquisition
strategies, or
presented an
acquisition strategy
that was not
previously
mentioned
Explained why
other acquisition
strategies would
potentially not work
Discussed cost
considerations
4. Resources: For in-
house development,
what people/skills are
required and what
development lifecycle do
you recommend?
Otherwise, identify 3
candidate organizations
that can deliver the
system.
Weight: 10%
(20 points)
Inadequately
determined
resources needed
for the acquisition
strategy
Limited
recommendation for
development
lifecycle for in-
house
development, or
three external
organizations that
can deliver the
system
Inadequate
justification
Determined
resources needed
for the acquisition
strategy, but did not
justify reasoning
Recommended a
project
development
lifecycle for in-
house
development, or
three external
organizations that
can deliver the
system, but did not
justify why they
were chosen
Determined and
justified resources
needed for chosen
acquisition strategy
Recommended a
project
development
lifecycle for in-
house
development, or
three external
organizations that
can deliver the
system.
Presented
resources not
previously
considered
Included risk
identification and
mitigation
procedures
Proposed a
combination of
resources and
strategy to organize
stakeholder efforts
toward project
completion
5. System functions: In a
table format, summarize
the types of users for the
system; the business
Failed to put in
table format
In table format:
Summarized some
In table format:
Summarized the
In table format:
Analyzed user
© 2017 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Page 2 of 4
CIS 500 – Information Systems for Decision-Making
reason(s) each would
use the system; the ways
that the system supports
each of these needs; and
how this support differs
from the current system.
Weight: 10%
(20 points)
Inadequate
summary of users
for the system
Limited explanation
of why users would
use the system
Inadequate
description of how
system supports
users
Inadequate
comparison of the
proposed system to
the old system
of the types of
users for the
system
Somewhat
explained business
reasons for system
use
Somewhat
described how the
system supports
users
Reasonable
comparison of the
proposed system to
the old information
system
types of users for
the information
system
Explained business
reasons why each
user type would use
the system
Described how the
system supports the
needs of each user
type
Determined how
this support differs
from the current
information system
experience and
user design
considerations
Explained design
changes that took
place between the
old and new system
Provided rationale
for the user types
identified
Discussed how to
reach out to user
types to test the
system
6. Connectivity: Provide a
diagram that shows the
other information
systems this one will
connect to, and what
data flows among them.
Weight: 10%
(20 points)
Failed to put in
diagram format
Inadequate diagram
showing your
system, hard to
follow, incomplete
Inadequate or hard
to follow the data
that would flow
among systems,
incomplete
In a diagram:
Showed other
information systems
that your system
would connect to,
but hard to follow
Demonstrated what
data would flow
among systems, but
hard to follow
In a diagram:
Showed other
existing information
systems that your
proposed system
would connect to
Demonstrated what
data would flow
between your and
other information
systems.
In a diagram:
Showed how you
selected existing
systems that your
system would
connect to
Explained how
diagram would be
updated and
maintained based
on changes in the
marketplace
7. Security: List the most
serious cybersecurity
threats and vulnerabilities
of the new system.
Suggest strategies to
address them.
Weight: 10%
(20 points)
Inadequate list of
cybersecurity
threats
Inadequate
strategies to
address each threat
Reasonable list of
cybersecurity
threats, failed to
show why they are
most serious
Identified strategies
to address each
threat
Listed the most
serious
cybersecurity
threats to your new
system
Proposed strategies
to address each
threat
Proposed how your
new system would
integrate with
Shadow IT, if at all
Demonstrated
strategies for
current users to
avoid threats
8. Mobility: Identify the
system’s capabilities for
mobile use.
Weight: 10%
Failed to identify
your system’s
capabilities for
mobile use,
incomplete
Identified your
system’s
capabilities for
mobile use, but not
comprehensive
Identified your
system’s
capabilities for
mobile use
Proposed situations
in which mobile use
would happen and
situations where its
limitations
© 2017 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Page 3 of 4
CIS 500 – Information Systems for Decision-Making
(20 points)
9. Speaker / Audio
Notes: Include speaker
notes or audio narration
that explains each slide
more fully.
Weight: 10%
(20 points)
Inadequate speaker
notes or audio
narration, too much
or too little
information on each
slide provided
Somewhat detailed
speaker notes or
audio narration
explaining each
slide more fully
Included speaker
notes or audio
narration explaining
each slide more
fully
Speaker notes or
audio narration
succinct and direct,
persuasive
presentation
Discussed cost
considerations, and
risk identification &
mitigation
10. Clarity, persuasion,
proper communication,
writing mechanics, and
formatting requirements.
Weight: 10%
(20 points)
Unclear structure,
not persuasive,
major grammatical
errors
Somewhat clear
structure, limited
persuasion,
grammatical errors,
language too simple
or too wordy
Clear structure,
persuasive writing,
minor or no
grammatical errors,
length and format
within requirements,
plain language
No grammatical
errors, plain
language,
organized by topic,
references business
needs, connects to
technical specs,
persuasive
Earn money selling
your Study Documents