Problem Based Learning

 

The Context of the Problem

Large technology projects, whether the development of new technologies or upgrading current systems or software applications, can be costly. In larger organizations, a million-dollar (or more) project is not unusual. Once a project is rolled out to production, it is important to evaluate the performance of the project. This is generally a comparison of the anticipated benefits used in making the decision to move forward with the project versus the actual performance of the systems of software once in use. Various methods may be used to evaluate the performance; however, it is important to develop a broad set of standards for making an assessment of the systems or software.

The Problem

Your organization has made a very large investment in the purchase of infrastructure or development of an in-house software application. As examples, the network infrastructure has had a hardware refresh, business analysis data tools have been implemented, or a new customer resource management software tool has been implemented. Your team must assess the performance of the newly launched technology. You will be providing the various stakeholders (user community, project managers, and senior leadership) with the plan to be used for conducting the performance assessment, including the process of collecting performance data, analysis methods, and an explanation of the appropriateness of the methods to be used (the data may be concocted or gathered from a representative system).

As you work through the problem, be sure to focus on reaching these learning outcomes:

  1. Optimize organizational processes using data analysis.
  2. Assess the potential of various software to enhance organizational performance.
  3. Evaluate applications for the potential to improve collaboration, sharing, and lowering cost.
  4. Manage application development to lower cost and improve quality and customer satisfaction.
  5. Maximize the return on organizational technology investments.
  6. Develop application policies and procedures consistent with the Virtuous Business Model.
  7. Assess the challenges, technologies, and system approach issues in developing and deploying applications.

 

Deliverable: 

 

The Research Plan

Now that your team has developed your Evaluation Framework, it’s almost time to test your solution. First, your team will create a research plan that compares your solution to existing test cases for organizations in similar sectors. Focus on how these use cases measure performance characteristics of technical and behavioral attributes associated with a technology investment made on behalf of an organization.

The plan should address in detail the following information:

  • A detailed description of the measurement framework, including stakeholder perspectives and data sources
  • How each measurement may affect the overall performance evaluation
  • When post-implementation evaluations should be performed
  • How change management should be addressed
  • Format used to report the results of data analysis

Your research plan will guide the test of your solution.

Testing the Solution

Use your team’s network to find at least two stakeholders in IT implementation. Set up an interview and ask them about a prior IT implementation.

Be sure to ask the following questions:

  • Did the investment accomplish the organizational goal it was meant to?
  • How did you arrive at that answer?
  • What user experience feedback did you receive?
  • Was that goal clearly articulated and understood by all stakeholders?
  • How long after implementation did you make the assessment?
  • What did you learn about the difference between cost and value when it comes to a major investment?

Come prepared with a short summary of your Evaluation Framework. Ask your stakeholder for feedback on your Evaluation Framework. After your conversation, report back on where your plan was met with criticism or approval.

Communicate with your instructor if you are having difficulty identifying stakeholders for the interviews.

The Results

Testing the solution will yield results. In this course, the results of your test will be qualitative interviews that yield categories of user confidence in the Evaluation Framework you’re proposing. The method of reporting will need to be determined in advance of data collection to ensure each reporting member of the team returns usable performance results

Instructions for Deliverable

  1. As a team, determine how you will present your test results.
  2. To conduct the test, maximize your interview time.
  3. After your interview, describe how a team would use the Evaluation Framework to test the performance of an investment. Analyze the plan for any weaknesses: Does it provide the solution(s) needed?
  4. Present the results of your test as organized information. Provide a brief summary of the action steps needed to strengthen your solution. Clearly indicate team members’ contributions.
  5. One person from the team must submit the deliverable per the schedule outlined in your Team PBL.

We are team of 2. 

Attaching file for evaluation plan.

Assignment 2(Week2)

 

Complete the following assignment in one MS word document:

Chapter 2 – discussion question #1 & exercises 4, 5, and 15(limit to one page of analysis for question 15)

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).

Article Review- Human Computer Interactions

 Big Data has undoubtedly played a role in the way business is conducted. For many industries, when a product is created, especially a Website, mobile application, or enterprise system, there is a desire to understand how data is presented in the environment. Data has in fact become a usability measurement whether it is under the scope of information, system, or service quality.For this assignment, you’ll find ONE SCHOLARLY ARTICLE that discusses data in the context of a usability evaluation. Your article should review data from the perspective of an industry vertical (i.e., healthcare, education, supply chain, etc.).You’ll submit a three-page synopsis of the article that answers the following questions: 

  1. Article Title
  2. Article Subject Area
  3. Type of Data Set Used/Evaluated
  4. Synopsis of Article
  5. Three business takeaways on how data impacts the industry in respect to usability
  6. Source Citation

Virtualization

  

Virtualization offers organizations these benefits:

· Savings on infrastructure and support costs. 

· Fast recovery of information systems in the event of an equipment mishap.

· New opportunities for disaster recovery and business continuity.

Virtual Business in Global Marketing

  1. Read content resources. As your company is considering outsourcing manufacturing of parts and/or completed products to a low-cost country, the consumption of raw materials will be a part of your global supply chain. Review these two links about exploitation of natural resources, Jamaica CHM (https://jamaicachm.org.jm/BHS/exploitation2.htm) and Iberdrola (https://www.iberdrola.com/sustainability/overexploitation-of-natural-resources), consider the types of natural resources that production processes for your company’s manufacturing may consume, and answer the key questions below.
  2. Write an initial response to the following key question(s) or prompt(s):
    1. What are the types of natural resources that will be consumed in the production of your company’s parts and/or products?
    2. Are the products you mentioned in question one commonly exploited in low-cost countries?
    3. How would you recommend to your Board of Directors to mitigate possible negative consequences to the supply of those natural resources?
  3. Support your statements with evidence from the required studies and your research. Cite and reference your sources in APA style.

4. Batson and Neff define distributive justice as justice that emerges from questions regarding the distribution of wealth. This involves management’s responsibility to key stakeholders such as labor and civil governments: local, state, and national. With labor, this involves pay and benefits, and with governments, it addresses paying taxes, obeying laws and ordinance, and respecting community well-being at large.

Need inline and external three references with at least 100 words on each point

access control and authentication

 

Create a short paper on comparing the following access control models: Mandatory Access Control (MAC), Discretionary Access Control (DAC), or Role or Rule Based Access Control (RBAC). 

The requirements for your paper are:

  • Explain the differences between the three models.
  • Describe the impact of each model on an organization including how technical controls or Access Control Lists (ACLs) will prohibit or restrict access to users within the organization.
  • APA formatted including title page, reference page, and in-text citations.
  • Length of 2-3 pages, excuding the title and reference pages.
  • Minimum of 2 scholarly resources.

Discussion Board: Project Risk

In two to three paragraphs, how is project risk analyzed and why does it need to be managed? 

Use examples from personal experience, the readings, or your own research to justify your answers. 

Cite all sources. 

Discussion: Biometrics and Global Identity Part 2

The convenience and availability of cloud services has seen a dramatic increase in business functionality being shifted from local servers to the cloud. Even our biometrics may be stored in the cloud.Assume your employer has signed up with a global authentication provider that stores user fingerprints in the users’ global identity accounts. Users can then use their biometric fingerprint from the cloud service to access websites rather than storing the fingerprint locally on their mobile device or computer.In theory, if an attacker gains access to your fingerprints (whether stored locally or in the cloud), they could compromise any of your online accounts that accept your fingerprints.Answer the following question(s):

  1. Is the storage of biometric data safer locally or in the cloud? Why?
  2. If an attacker has your fingerprints, could multifactor authentication (MFA) still prevent the attacker from gaining access to your accounts? Why or why not?

Fully address the questions in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students’ views.Initial post should be at least 350 words in length. Each reply post should be at least 150 words in length.

2 Case Study

Case Study 2.1

Case Study:

You have just been hired to perform digital investigations and forensics analysis for a company. You find that no policies, processes, or procedures are currently in place. Conduct research to find information, and then create a policy and process document (3 to 4 pages in length) to provide the structure necessary for your lab environment. Be sure to cite your online sources and follow APA formatting.

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • At least two peer reviewed sources that are properly cited and referenced
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.