Overview Technology has changed our lives drastically in the past twenty years. For example, consider the rise of mobile devices connected to the internet using wireless communication. We have progressed from shopping solely in brick-and-mortar stores to having the ability to do anything from renting a vacation home to purchasing cupcakes online using a mobile device. To keep up with how consumers communicate, businesses have to incorporate these devices and technologies into their business models to reach customers. Developing appropriate technical solutions to business problems begins with defining, analyzing, and documenting the necessary requirements. For this project, you will play the role of an employee working for a small brick-and-mortar business. Your business is seeking to establish an online presence, but it must first invest in new technology. You will create a business systems analysis to provide the business owner with your recommendations for a technology solution that will support her venture into e-commerce. The project is divided into two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Three and Five. The final product will be submitted in Module Seven. Use the Final Project template document as a guide to ensure you have met all requirements before submitting your final draft. In this assignment, you will demonstrate your mastery of the following course outcomes:
Analyze a business organization for determining the business requirements related to information technology systems
Articulate the role and function of information systems in business organizations for how they impact business operations
Recommend appropriate information technology options for effectively supporting business operations
Recommend basic security considerations related to business information systems for effectively securing company data
Prompt Imagine that you work for the small brick-and-mortar business described in the final project case scenario. The owner of your business wants to focus on generating new revenue through e-commerce, but she knows that this change in operations requires the company to integrate new technology. To gain an understanding of what the business might need for technology, she has asked you to create a business systems analysis. In this analysis, you will clearly introduce the problem that your business is facing. Then, you will determine the business requirements for solving that problem, including the requirements that any new technology needs to meet. Next, you will explain how your competitors are using the two technologies in which you are investing, to determine
http://snhu-media.snhu.edu/files/course_repository/undergraduate/it/it210/it210_final_project_template.docx
http://snhu-media.snhu.edu/files/course_repository/undergraduate/it/it210/it210_final_project_template.docx
http://snhu-media.snhu.edu/files/course_repository/undergraduate/it/it210/it210_final_project_case_scenario.pdf
2
whether those technologies are appropriate for your business. Finally, you will propose your recommendations for the technology solution that best meets the needs of your business, including what your business owner must consider in regard to security and privacy of company data. Select two of the following technologies to focus on in your business systems analysis paper:
Big data and knowledge management
Wireless, mobile computing, and mobile commerce
Social computing
Cloud computing
Business analytics and business intelligence solutions
Intelligent systems Specifically, the following critical elements must be addressed:
I. Introduction: In this section, you will briefly introduce the small business from the case scenario, and the problem that it is trying to solve. A. Clearly state the problem that the business owner is seeking to solve. Be sure to address the question of what your business ultimately wants to
do. B. Identify and briefly describe the two technologies from the list provided that you will research in your business systems analysis.
II. Business Requirements: In this section, you will determine what the business requirements are for solving the stated problem, and establish the criteria
that will help form your technology recommendations. You will also articulate why the business owner should undertake the project of integrating new technology.
A. Explain the objectives of undertaking this project to integrate new technology. In others words, what should the project accomplish, and how does it support the goal of your business?
B. Provide a project description that explains the purpose of the project. Be sure to address the following: i. What does your business need to do to satisfy the objectives?
ii. What are the desired results at the end of the project? iii. Why is it important for your business owner to consider implementing new technology?
C. State the key technological requirements that will be required of any new technology in order to effectively solve your business’s problem. In other words, what specifically does the technology need to be capable of doing? (These are the technology requirements in the decision matrix.)
3
III. Competitors and Technology: In this section, you will describe two competing companies that operate in the same industry as your business. You will also explain how a company uses the two technologies that you are investigating in order to determine if the technology may be appropriate for your business to use. Remember that a list of competing companies was provided to you in the final project case scenario.
A. Technology One: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and how it uses this technology to support its business in general. Include specific examples.
B. Technology Two: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and how it uses this technology to support its business in general. Include specific examples.
C. Referring to what you learned in your research on the companies above, explain one specific way in which one of the companies is benefitting from technology, and describe the potential benefit to your business if you were to adopt the same approach.
IV. Technology Solutions: In this section, you will discuss how each of the two technologies meets the technology requirements that you identified in
section II. Use your decision matrix to guide your responses. A. Technology One: Explain how well this technology meets the technology requirements of your business. Be sure to address which technology
requirements the technology meets, and where there are gaps. B. Technology Two: Explain how well this technology meets the technology requirements of your business. Be sure to address which technology
requirements the technology meets, and where there are gaps.
V. Recommendations: In this section, you will recommend the technology solution that you believe is most appropriate for your business based on how well each technology meets your business’s technology requirements.
A. Recommend a technology solution for your business, and defend why that solution is appropriate. You may recommend only one technology or any combination of the two that you investigated.
B. Explain the overall benefit of your recommended technology solution to your business. Consider the following: C. How will it will it enhance efficiency?
i. How will it position your business for future growth as you move online?
VI. Basic Security Considerations: In this section, you will briefly explain what the owner of your business must consider in regard to security and privacy if they choose to adopt your recommendations.
A. Explain the security features your recommended technology solution should have. B. Briefly explain what your business should consider in regard to security and privacy as you seek out third-party vendors for the proposed
technology. C. Briefly describe the internal safeguards that should be put in place in your business to guard against loss or misuse of company data. Provide
examples.
4
Milestones Milestone One: Introduction, Business Requirements, and Competitors and Technology In Module Three, you will submit the first milestone, in which you will develop your problem statement, technology requirements, and suggested technologies for your final project. This milestone will be graded with the Milestone One Rubric. Milestone Two: Technology Solutions and Recommendations In Module Five, you will submit the second milestone, in which you will research competitors and analyze the technologies they are using. This milestone will be graded with the Milestone Two Rubric. Module Seven: Basic Security Considerations Note that you will not engage in milestone work for section VI of your final project, basic security considerations. However, you will have an opportunity to work through the information that will inform this part of your project in Module Seven, and to ask your peers and instructor any questions you have about the topic. At this point, you should be able to finish this part of your final project and submit the completed draft with all pieces. Final Submission: Business Systems Analysis In Module Seven, you will submit your final project. It should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded with the Final Project Rubric.
Final Project Rubric Guidelines for Submission: Your business systems analysis should be 6–7 pages in length (not including a cover page and references) and written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins. Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions.
Critical Elements Exemplary Proficient Needs Improvement Not Evident Value
Introduction: State the Problem
Clearly states the problem that the business owner is seeking to solve (100%)
States the problem that the business owner is seeking to solve, but response is unclear or contains inaccuracies (55%)
Does not state the problem that the business owner is seeking to solve (0%)
5.94
http://snhu-media.snhu.edu/files/production_documentation/formatting/rubric_feedback_instructions_student.pdf
5
Introduction: Two Technologies
Identifies and briefly describes the two technologies that the student will research in business systems analysis (100%)
Identifies the two technologies that the student will research in business systems analysis, but does not describe them, or description contains inaccuracies (55%)
Does not identify the two technologies that the student will research in business systems analysis (0%)
5.94
Business Requirements:
Objectives
Meets “Proficient” criteria, and explanation demonstrates sophisticated awareness of the project’s objectives (100%)
Explains the objectives of project to integrate new technology (85%)
Explains the objectives of project to integrate new technology, but explanation is cursory or illogical or contains inaccuracies (55%)
Does not explain the objectives of project (0%)
5.94
Business Requirements:
Project Description
Meets “Proficient” criteria, and project description provided demonstrates keen insight into the purpose of the project (100%)
Provides a project description that explains the purpose of the project (85%)
Provides a project description that explains the purpose of the project, but description is illogical, contains inaccuracies, or is missing required components (55%)
Does not provide a project description (0%)
5.94
Business Requirements: Technological Requirements
Meets “Proficient” criteria, and response demonstrates a sophisticated awareness of what the new technology must be capable of doing for the business (100%)
Describes the key technological requirements that will be required of any new technology to effectively solve the business’s problem (85%)
Describes the key technological requirements that will be required of any new technology to effectively solve the business’s problem, but description is missing key requirements or contains inaccuracies (55%)
Does not describe the key technological requirements that will be required of any new technology (0%)
5.94
Competitors and Technology:
Technology One
Meets “Proficient” criteria, and explanation demonstrates keen insight into the role and function of the technology in the competing company (100%)
Briefly describes what the selected competing company does and explains how it uses the technology to support its business, and includes specific examples (85%)
Briefly describes what the selected competing company does and explains how it uses the technology to support its business, but does not include specific examples, or examples are inappropriate, or explanation is cursory or contains inaccuracies (55%)
Does not briefly describe what the selected competing company does or explain how it uses the technology to support its business (0%)
5.94
6
Competitors and Technology:
Technology Two
Meets “Proficient” criteria, and explanation demonstrates keen insight into the role and function of the technology in the competing company (100%)
Briefly describes what the selected competing company does and explains how it uses the technology to support its business, and includes specific examples (85%)
Briefly describes what the selected competing company does and explains how it uses the technology to support its business, but does not include specific examples, or examples are inappropriate, or explanation is cursory or contains inaccuracies (55%)
Does not briefly describe what the selected competing company does or explain how it uses the technology to support its business (0%)
5.94
Competitors and Technology:
Benefitting From Technology
Meets “Proficient” criteria, and description demonstrates keen insight into how the potential technology could provide a benefit to the business (100%)
Explains one specific way in which one of the competing companies is benefitting from technology, and describes the potential benefit to the business from the scenario if they were to adopt the same approach (85%)
Explains one specific way in which one of the competing companies is benefitting from technology, but does not describe the potential benefit to the business from the scenario, or description is cursory or illogical (55%)
Does not explain one specific way in which one of the competing companies is benefitting from technology (0%)
5.94
Technology Solutions:
Technology One
Meets “Proficient” criteria, and explanation demonstrates a sophisticated awareness of how well the technology meets the needs of the business (100%)
Explains how well this technology meets the technology requirements of the business (85%)
Explains how well this technology meets the technology requirements of the business, but explanation contains inaccuracies or is missing required components (55%)
Does not explain how well this technology meets the technology requirements of the business (0%)
5.94
Technology Solutions:
Technology Two
Meets “Proficient” criteria, and explanation demonstrates a sophisticated awareness of how well the technology meets the needs of the business (100%)
Explains how well this technology meets the technology requirements of the business (85%)
Explains how well this technology meets the technology requirements of the business, but explanation contains inaccuracies or is missing required components (55%)
Does not explain how well this technology meets the technology requirements of the business (0%)
5.94
7
Recommendations: Technology
Solution
Meets “Proficient” criteria, and defense demonstrates a complex grasp of how the recommended technology meets needs of the business (100%)
Recommends a technology solution for the business and defends why that solution is appropriate (85%)
Recommends a technology solution for the business, but does not defend why that solution is appropriate, or defense is illogical or contains inaccuracies (55%)
Does not recommend a technology solution for the business (0%)
5.94
Recommendations: Overall Benefit
Meets “Proficient” criteria, and explanation demonstrates keen insight into how the business could benefit from the recommended technology solution (100%)
Explains the overall benefit of the recommended technology solution to the business (85%)
Explains the overall benefit of the recommended technology solution to the business, but explanation is cursory or illogical or contains inaccuracies (55%)
Does not explain the overall benefit of the recommended technology solution to the business (0%)
5.94
Basic Security Considerations:
Security Features
Meets “Proficient” criteria, and description demonstrates a complex grasp of security features necessary for protecting company data (100%)
Describes the basic security features the recommended technology solution should have in order to protect company data (85%)
Describes the basic security features the recommended technology solution should have, but description is cursory or illogical (55%)
Does not describe the basic security features the recommended technology solution should have (0%)
7.92
Basic Security Considerations:
Third-Party Vendors
Meets “Proficient” criteria, and explanation demonstrates a complex grasp of security considerations in regard to potential third-party vendors (100%)
Briefly explains what the business should consider in regard to security and privacy as it seeks out third-party vendors for the proposed technology (85%)
Briefly explains what the business should consider in regard to security and privacy as it seeks out third-party vendors, but explanation is cursory or illogical or contains inaccuracies (55%)
Does not explain what the business should consider in regard to security and privacy as it seeks out third-party vendors for the proposed technology (0%)
7.92
Basic Security Considerations:
Internal Safeguards
Meets “Proficient” criteria, and description provides keen insight into what the business can do internally to protect company data (100%)
Briefly describes the internal safeguards that should be put in place in the business to guard against loss or misuse of company data, and provides examples (85%)
Describes the internal safeguards that should be put in place in the business to guard against loss or misuse of company data, but does not provide examples, or description is cursory or illogical (55%)
Does not describe the internal safeguards that should be put in place in the business to guard against loss or misuse of company data (0%)
7.92
8
Articulation of Response
Submission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to-read format (100%)
Submission has no major errors related to citations, grammar, spelling, syntax, or organization (85%)
Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas (55%)
Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas (0%)
4.96
Total 100%