Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignment

The first stepis to incorporate the feedback you received on your Stage 3 assignment, making any needed corrections or adjustments.  (If you have not incorporated the feedback from your Stage 1 and Stage 2 assignments, you should do so prior to submitting Stage 4.) For this assignment, you will add Section IV to Sections I, II and III, as outlined below. 

This assignment requires a complete BA&SR document with revisions made as needed based on the Stage 1, 2, and 3 project submissions and feedback.

Note:  This is a specific grading criteria in the rubric.

Section IV of the Business Analysis and System Recommendation will propose an IT solution to meet CIC's organizational strategy and meet its operational needs.  In Section IV, you will also Identify and explain the high-level steps that will need to take place in order to implement the system you have proposed.

Using the case study and the outline and resources listed below, develop your Section IV - System Recommendation.   Approximate lengths for each section are provided as a guideline; be sure to provide all pertinent information.

IV.  System Recommendation

A. Benefits of an Enterprise Solution:  Explain what an enterprise system solution is in general (one paragraph)and how such a system would help CIC (one paragraph).  (Two complete paragraphs in total) Note:  Enterprise solutions are not the same as ERP applications.

B. Proposed IT Solution:There are many Software-as-a-Service (SaaS) HR systems available.   Conduct some research on the web (using the search term "SaaS HR system") and identify a system that will support and improve the hiring process at CIC and that meets the requirements you listed in Section III-Strategic and Operational Outcomes (the Stage 3 Assignment).  Be sure to evaluate potential solutions to align with the needs of CIC.  Identify the vendor and the system you selected and describe the basic functionality of the system. (One paragraph)

C. How the Proposed IT Solution Meets the Requirements:Using the 10 requirements you listed in your Stage 3 assignment (and incorporating any feedback you received), you will now explain how the solution you have chosen fulfills these requirements.

First, insert an introductory opening sentence for this section.Then copy the entries for the 10 requirements you listed in the table in Section III (Stage 3 Assignment) into the Requirements column in the table below.Complete the table by providing the explanations of how the system you selected meets each requirement.   (Provide an introductory sentence and copy the table and insert information within.)

Req.

Number

Requirement

(from Requirements table in Section III)

Explanation of How the Proposed System Meets the Requirement

 

U-1

 

 

U-2

 

 

U-3

 

 

U-4

 

 

UR-1

 

 

SS-1

 

 

SS-2

 

 

SP-1

 

 

SP-2

 

 

SP-3

 

 






D. Implementation Steps:First, insert an introductory opening sentence for this section.Then address each of the 7 implementation areas below by addressing the questions provided and identifying appropriate implementation steps.  (Do not include the questions in your paper.) Label each paragraph with the area being addressed for clarity. (one paragraph for each item)

Implementation Areas:

1. Vendor agreement - What does CIC need to do to be able to start using the system?  How much will it cost to use the system? [This information will come from vendor information located in your web research]

2. Hardware and telecommunications

a. What hardware will CIC need to have to implement the solution? [vendor information]

b. What kind of telecommunications will be needed for the solution, including local connectivity inside CIC and Internet access?

3. Configuration

a. What options does the vendor offer for configuring the off-the-shelf system to CIC's needs?  [vendor information]

b. How will the configuration be done and by whom?

4. Testing - How will CIC test the system to see if it is working properly for its needs?Choose one of the ten requirements in Requirements (Section C) above and explain how this will be tested to ensure it is working properly and the requirement is met.

5. Employee preparation - Identify what CIC will need to doin each of the following areas to prepare the employees (including the hiring managers in the various departments) to use the new system:

a. Leadership (2-3 sentences)

b. Change Management (2-3 sentences)

c. Training (2-3 sentences)

6. Data migration -What existing data would need to be enteredinto the system to get started, and how might this be accomplished?

7. Maintenance - Who will provide updates and corrections to the system?

E. Conclusion:  Close your Business Analysis and System RecommendationReport with a brief summary of the key points including the benefits CIC can expect to gain from this solution and the alignment with strategic objectives.(One well-written paragraph).

NOTE:  This final submission should be a cohesive Business Analysis and Systems Recommendation Report for the CIO of Chesapeake IT Consulting. 

Sections I, II and III should have been updated to reflect substantive feedback received during the grading process.  The formatting should be consistent throughout the document, and the writing should flow well from beginning to end.  Headings, numbering, and footers should be correct for a final submission.  Although you prepared this in stages, the final product should not seem to be piecemeal or disconnected.

Formatting Your Assignment

For academic or business writing, the writer is expected to write in the third person. In third person, the writer avoids the pronouns I, we, my, and ours.

The third person is used to make the writing more objective by taking the individual, the "self," out of the writing. This method is very helpful for effective business writing, a form in which facts, not opinion, drive the tone of the text. Writing in the third person allows the writer to come across as unbiased and thus more informed.

  • Write a complete, well organized paper that includes the four sections of the Business Analysis and System Recommendations (BA&SR) report. Use the recommendations provided in each area for length of response. Content areas should be double spaced; table entries should be single-spaced. It's important to value quality over quantity. Length for Section IV should not exceed six (6) pages in addition to Sections I, II and III.
  • Ensure that each of the tables is preceded by an introductory sentence that explains what is contained in the table, so the reader understands why the table has been included.
  • For Section IV, use at least threeresources with APA formatted citation and reference. One reference must be from the vendor site for the solution you are recommending, one additional external source, and one from the IFSM 300 course content. Course content should be from the class reading content, not the assignment instructions or case study itself. The final document should contain all references from all stages appropriately formatted and alphabetized.
  • Compare your work to the Grading Rubric below to be sure you have met content and quality criteria.
  • Submit your paper as a Word document, or a document that can be read in Word.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92488968

Have any Question?


Related Questions in Management Information System

Part 1 team leadershipas a group review at least four 6

Part 1: Team Leadership As a group, review at least four (6) academically reviewed articles on Team Leadership. Develop power presentation based on the articles. Support your presentation with appropriate references. Use ...

Write 2 page paper that discusses what policies were

Write 2 page paper that discusses what policies were missing in the particular case. Do additional research than what was provided in the text. Use APA format Cite your sources. Understand differences in framework compon ...

Identifying and analyzing vulnerabilities please respond to

"Identifying and Analyzing Vulnerabilities" Please respond to the following: Assess the effectiveness of offering a reward to individuals external to the organization in exchange for them to identify vulnerabilities on a ...

Assessment instructionsfor this assessment you will

Assessment Instructions For this assessment, you will complete your perimeter security strategy. Each organization or company would need to show how their data, assets, and networks are protected. In this assessment, you ...

Need a 200 word with references completed within 1 hour

Need a 200 word with references completed within 1 hour. Only apply if you can do this immediately. Topic: 200 words with references: Describe one unique and specific example of market basket analysis or DNA sequence ana ...

Project title security lapses and data breaches an

Project Title: "Security Lapses and Data Breaches: An Examination of the Failures to Protect Business Data and their Consequences" Instruction of creating the Background: Background information expands upon the key point ...

For each question you are required to write a post 300

For each question you are required to write a post (300 words).You must provide at least two references and the format should be APA Question1: Read at least three (3) academically reviewed articles on Management Informa ...

Provide a background of the organizationhow was the

Provide a background of the organization. How was the organization impacted? What losses did it suffer? Describe the disaster recovery and business continuity that the business had in place? What were the lessons learned ...

Questions q1 explain evolution of internet apa format

Questions : Q1. Explain evolution of internet? (APA format required, Turntin check required. Minimum 250 words essay) Q2. Explain patterns of evolution technology? (APA format required, Turntin check required. Minimum 25 ...

It is an accepted truth that without risk there can be no

It is an accepted truth that without risk there can be no gain. Every individual and organization who wants to succeed must take some risks. Network security and its impact on risk management is not about not taking risk ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As