Identify the business problems that topbike has


Term Paper Assignment

Paper 1: TopBike

This assignment consists of two sections: analysis and design document, a requirements document, and a project plan that is created through the use of MS Project. You must submit the three sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Read the article titled "TopBike" and complete this assignment.

Imagine that you, a systems architect leading a consulting team, are asked to perform a systems analysis and design to help TopBike implement a software system that can improve their profits and save costs.

Section 1: Analysis and Design Document

Write a ten to twelve page paper in which you:

1. Identify the business problems that TopBike has.

2. Determine the analysis technique for this project and explain why.

3. Determine the methodology for this project and explain why.

4. Identify the roles (i.e., system analyst, developer) for the team and explain their responsibilities.

5. Explain how to conduct requirements gathering sessions and determine the tools to use.

6. Create the functional model, structural model, and behavioral model with class diagrams through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

7. Create a design document with a data management layer.

8. Draw a physical architecture diagram for the final solution through the use of graphical tools in Microsoft Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. .

9. Explain the human-interface design considerations.

10. Explain the steps for developing test cases and describe how they help the overall project.

11. Determine the change management process and post implementation strategy for the project and product.

Section 2: Requirements Document

Create a requirements document that includes:

o Functional and nonfunctional requirements for TopBike.
o Nonfunctional requirements for TopBike.
o Use cases and their descriptions.

Section 3: Project Plan

Use Microsoft project to:

Develop the project plan. The project plan must:

• Record all tasks, subtasks, resources, and time related to the project.
• Outline the planning, analysis, design, and implementation phases.
• Identify the key milestones of your project.

The specific course learning outcomes associated with this assignment are:

• Explain and apply object-oriented analysis techniques.

• Compare and contrast different roles needed in systems analysis and design.

• Compare and contrast requirements gathering among traditional and iterative project methods.

• Procure, document, and scope IT project requirements with use cases.

• Describe object-oriented modeling, structural modeling, and behavioral modeling.

• Develop class diagram based on business scenarios.

• Create a business requirements document that conforms to the Unified Modeling Language standard.

• Apply the project requirements steps of eliciting, analyzing, documenting, and testing to address and solve a proposed business problem.

• Determine the steps and principles of design modeling with UML.

• Describe how societal mores and social media impact the design of human-computer interactions.

• Describe the impact of contemporary computing architecture to the physical architecture design.

• Describe how to gather nonfunctional requirements and its importance for overall IT project success.

• Explain the importance of change management and post-implementation support and how they impact business and overall enterprise.

• Describe and design test cases that uncover software bugs.

• Develop a business requirements document that addresses and solves a proposed business problem.

• Use technology and information resources to research issues in procuring and designing project requirements.

• Write clearly and concisely about project requirements and design topics using proper writing mechanics and technical style conventions.

Paper 2: Information Security Governance

Information security management and governance are not simply implemented tasks within organizations. An information security governance program is a program that must be thoroughly planned, include senior-level management involvement and guidance, be implemented throughout the organization, and be updated and maintained. The International Organization for Standards (ISO) and the International Electrotechnical Commission (IEC) has created information security governance standards. Review the information security governance information provided by ISACA.

Write a paper in which you:

1. Define the information security governance and management tasks that senior management needs to address.

2. Describe the outcomes and the items that will be delivered to the organization through the information security program.

3. Develop a list of at least five best practices for implementing and managing an information security governance program within an organization.

4. Develop a checklist of items that needs to be addressed by senior management, including priorities and needed resources.

The specific course learning outcomes associated with this assignment are:

• Examine the principles requiring governance of information within organizations.

• Use technology and information resources to research legal issues in information security.

• Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

Paper 3: Security Regulation Compliance

This assignment consists of two sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for.

In the day-to-day operations of information security, security professionals often focus the majority of their time dealing with employee access issues, implementing security methods and measures, and other day-to-day tasks. They often neglect legal issues that affect information security. As a result, organizations often violate security-related regulations and often have to pay heavy fines for their non-compliance. Thus, as a Chief Information Officer in a government agency, you realize the need to educate for senior leadership on some of the primary regulatory requirements, and you realize the need to ensure that the employees in the agency are aware of these regulatory requirements as well.

Section 1: Written Paper

Write a six to eight page paper in which you:

a. Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including:

i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law

b. Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.

c. Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements.

Section 2: PowerPoint Presentation

Create an eight to ten slide security awareness PowerPoint presentation that will be presented to the agency's employees, in which you:

a. Include an overview of regulatory requirements and employee responsibilities, covering:

i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law

Your PowerPoint presentation must follow these formatting requirements:

• Include a title slide, six to eight (6-8) main body slides, and a conclusion slide.

The specific course learning outcomes associated with this assignment are:

• Explain the concept of privacy and its legal protections.

• Describe legal compliance laws addressing public and private institutions.

• Analyze intellectual property laws.

• Examine the principles requiring governance of information within organizations.

• Use technology and information resources to research legal issues in information security.

• Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

Discussions 1: "Designing Tests"

• Imagine that you work as a systems analyst for a midsized company. Explain your roles and responsibilities in designing and performing various testing for object-oriented systems and uncovering software bugs.

Discussions 2: "Culture Issues"

• Use google or bing to research organizational culture. Review articles or publications that describe how organizational culture influences project management. Next, identify at least three organizational culture characteristics that influence project management success rates and explain how each characteristic influences project management.

Discussions 3: "Risk Assessment and Incident Response Teams"

Your medium-sized company has recently expanded funding for the IT department and is adding dedicated specialists to "Risk Assessment" and "Incident Response" teams. You're helping with the organization of the new structure. What kind of certifications and education are you going to be looking for when assigning existing team members and new hires to these teams? How are you going to describe their jobs to them? Should these teams work together, or be independent of one another? Why? What should be the first projects each should undertake in your opinion, based on this week's study?

Discussions 4: "Computer Forensics Process"

The computer forensics investigative process includes five steps: Identification, Preservation, Collection, Examination, and Presentation. When a breach has occurred in a medium to large-sized company, cybersecurity experts, and sometimes forensics specialists will investigate using this process. In a small company, it's likely that the IT staff will have multiple roles, but what do you think about the larger companies? Should the experts who do penetration testing or maintain the security defenses be involved in the forensics investigation after a breach? What are some pros and cons you can see in having a lot of people examining the breach?

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Attachment:- Term-Paper-TopBike.rar

Solution Preview :

Prepared by a verified Expert
Computer Engineering: Identify the business problems that topbike has
Reference No:- TGS02992377

Now Priced at $190 (50% Discount)

Recommended (95%)

Rated (4.7/5)