How would you use the stages of the systems development


1. How would you use the stages of the Systems Development Life Cycle (SDLC) to help Drewmobile Incorporated automate its currently manual "Submit Official Travel Requests & Vouchers Online" business task/activity? (see Chapter 13). Please craft a well-written and fluid essay exam response to address this question. Moreover, please use examples to illustrate your answer.

2. When Tony Stark, CEO of Stark Industries, travels to other countries, he follows a routine that seems straight from a secret agent movie. He leaves his smart-phone and laptop at home. Instead he brings loaner devices, which he erases before he leaves the U.S. and wipes clean the minute he returns. While traveling, he disables Bluetooth and Wi- Fi and never lets his phone out of his sight.

While in meetings, he not only turns off his phone, but also removes the battery for fear his microphone could be turned on remotely. Mr. Tony Stark connects to the Internet only through an encrypted, password-protected channel. He never types in a pass-word directly, but copies and pastes his password from a USB thumb drive. By not typing his password, he eliminates the risk of having it stolen if key-logging software got installed on his device.

Many travelers might consider Tony Stark's method too inconvenient. Clearly, his electronically clean methods are time consuming and expensive. By way of a well written and fluid essay exam response, please address the below questions:

a) Is there a tradeoff between cybersecurity and convenience? Explain.

b) Create a list and explain the best cybersecurity practices for travelers based on Tony Stark's methods

3. You have just been promoted to Chief of IT Security for Drew-mobile Incorporated. You just learned that our organization will be merging with another automotive company which has a history of detrimental breaches due to poor security management. Please craft a well-written and fluid essay exam response to address the below four (4) questions:

a. What are the key IT-security areas of focus?

b. What strategies and technologies you would consider in the transition?

c. Discuss non-technical considerations as well.

d. Please present your answer in the form of a well crafted essay response.

4. Please explain to me, via a well crafted essay response, why Drewmobile Incorporated, a medium-size company with 8,000 employees, should or shouldn't consider out-sourcing and/or offshoring of our Information Systems Management & Information Technology Management functions?

a. Such a decision & essay exam response should include:

i. the state of the American economy,

ii. operational challenges associated with both courses of action,

iii. considerations from a deontological ethics perspective

iv. as well as what's in the best interest for the corporation from a sustainability perspective and the greater community (Stockholder Theory, Stakeholder Theory, and Social Contract Theory).

5. Please describe to me, via a well crafted essay response, how Business Intelligence, specifically the "Circle of B.I." as it was explained in class, affects the SDLC and the levels of Decision Making (to include information requirements and types of decisions).

Attachment:- REWRITE Paper.rar

Request for Solution File

Ask an Expert for Answer!!
Management Information Sys: How would you use the stages of the systems development
Reference No:- TGS02730736

Expected delivery within 24 Hours