Imagine you are starting a new business; you are ing a medium-sized food store in your hometown. My home town food
store is called Giant Food. (if a food store does not suit you, then any similar-sized business is fine for this
assignment.) Specifically, you now must design the technology and networking architecture for your business.
For this case, write a 4-5 page description and justification for the technology and network architecture you decide
upon and design. Be sure to articulate the structure, your procedure for securing and maintaining the network, and
discuss and rationalize the sociotechnical linkages that you design between your organization and the technology.
1.Network Structure: http://www.pcmech.com/article/network-structure/
2.Breeding, M. (2013). Designing and Building the Best Small Office Network From the Ground Up. Network Computing.
Available at
1.CISCO (2010). Internetworking Technology Handbook. Retrieved from
http://docwiki.cisco.com/wiki/Internetworking_Technology_Handbook
2.Network Structure Design: http://www.geeksnerds.co.uk/it-support/computer-network/
3.Paquet, C. (2013). Network Security Concepts and Policies. CISCO Press. Section on Security Policies. Available at
http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3
4.Ten steps to securing Networks: http://howto.techworld.com/security/1862/ten-steps-to-secure-networking/
5.Sociotechnical systems in the 21st century:
http://www.bayswaterinst.org/storage/Sociotechnical%20systems%20theory%20in%20the%2021st%20Century.pdf
6.Sociotechnical knowledge creation and storage in organizations:
Required Reading
Breeding, M. (2013). Designing and Building the Best Small Office Network From the Ground Up. Network Computing.
Available at
Network Structure: http://www.pcmech.com/article/network-structure/
CISCO (2010). Internetworking Technology Handbook. Retrieved from
http://docwiki.cisco.com/wiki/Internetworking_Technology_Handbook
Securing your network with Policies and Procedures:
Ten steps to securing Networks: http://howto.techworld.com/security/1862/ten-steps-to-secure-networking/
Sociotechnical systems in the 21st century:
http://www.bayswaterinst.org/storage/Sociotechnical%20systems%20theory%20in%20the%2021st%20Century.pdf
Socio-Technical Systems. (2014). Socio-Technical systems engineering handbook. Large Scale Complex IT Systems. Retrieved
from http://archive.cs.st-andrews.ac.uk/STSE-Handbook/SocioTechSystems/
Optional Reading
Finney, R. (1999) The Politics of Information and Projects. ITMWEB White Paper. Retrieved 2010, from
Schuman, E. (2005) The CIO Who Admitted Too Much. CIOInsight. Retrieved 2010, from
http://www.cioinsight.com/article2/0,1540,1852559,00.asp
Strassmann, P.A. (n/a) The Politics of Information Management: Policy Guidelines. Information Economics Press. Retrieved
2010, from http://www.infoeconomics.com/info-politics.php.
Strassmann, P.A. (2005) Check: How to Verify if You are Important. CIOInsight . July 8, 2005. Retrieved October 15,
2007, from http://www.cioinsight.com/article2/0,1540,1849919,00.asp
Gulledge, T.R. and Haszko, R.A. (N.D.) The Information Technology Enabled Organization: A Major Social Transformation in
the U.S.A. George Mason University. Retrieved 2010, from http://www.unesco.org/most/gulled.htm