Business Systems Analysis

Final Project Guidelines and Rubric

Getting Custom Writing Service with any of your academic assignments is easy. Simply click here.


Overview
Technology has changed our lives drastically in the past twenty years. For example, consider the rise of mobile devices connected to the internet using wireless
communication. We have progressed from shopping solely in brick-and-mortar stores to having the ability to do anything from renting a vacation home to
purchasing cupcakes online using a mobile device. To keep up with how consumers communicate, businesses have to incorporate these devices and
technologies into their business models to reach customers. Developing appropriate technical solutions to business problems begins with defining, analyzing,
and documenting the necessary requirements.
For this project, you will play the role of an employee working for a small brick-and-mortar business. Your business is seeking to establish an online presence, but
it must first invest in new technology. You will create a business systems analysis to provide the business owner with your recommendations for a technology
solution that will support her venture into e-commerce.
The project is divided into
two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in
Modules Three and Five. The final product will be submitted in Module Seven. Use the Final Project
template
document as a guide to ensure you have met all requirements before submitting your final draft.
In this assignment, you will demonstrate your mastery of the following course outcomes:
Analyze a business organization for determining the business requirements related to information technology systems
Articulate the role and function of information systems in business organizations for how they impact business operations
Recommend appropriate information technology options for effectively supporting business operations
Recommend basic security considerations related to business information systems for effectively securing company data
Prompt
Imagine that you work for the small brick-and-mortar business described in the final project case scenario. The owner of your business wants to focus on
generating new revenue through e-commerce, but she knows that this change in operations requires the company to integrate new technology. To gain an
understanding of what the business might need for technology, she has asked you to create a business systems analysis. In this analysis, you will clearly
introduce the problem that your business is facing. Then, you will determine the business requirements for solving that problem, including the requirements
that any new technology needs to meet. Next, you will explain how your competitors are using the two technologies in which you are investing, to determine

2
whether those technologies are appropriate for your business. Finally, you will propose your recommendations for the technology solution that best meets the
needs of your business, including what your business owner must consider in regard to security and privacy of company data.
S
elect two of the following technologies to focus on in your business systems analysis paper:
Big data and knowledge management
Wireless, mobile computing, and mobile commerce
Social computing
Cloud computing
Business analytics and business intelligence solutions
Intelligent systems


Specifically, the following
critical elements must be addressed:


I.
Introduction:

In this section, you will briefly introduce the small business from the case scenario, and the problem that it is trying to solve.
A. Clearly
state the problem that the business owner is seeking to solve. Be sure to address the question of what your business ultimately wants to
do.
B. Identify and briefly describe the two
technologies from the list provided that you will research in your business systems analysis.


II.
Business Requirements:

In this section, you will determine what the business requirements are for solving the stated problem, and establish the criteria
that will help form your technology recommendations. You will also articulate why the business owner should undertake the project of integrating new
technology.
A. Explain the
objectives of undertaking this project to integrate new technology. In others words, what should the project accomplish, and how
does it support the goal of your business?
B. Provide a
project description that explains the purpose of the project. Be sure to address the following:
i. What does your business need to do to satisfy the objectives?
ii. What are the desired results at the end of the project?
iii. Why is it important for your business owner to consider implementing new technology?
C. State the key
technological requirements that will be required of any new technology in order to effectively solve your business’s problem. In
other words, what specifically does the technology need to be capable of doing? (
These are the technology requirements in the decision matrix.)
3


III.
Competitors and Technology:

In this section, you will describe two competing companies that operate in the same industry as your business. You will
also explain how a company uses the two technologies that you are investigating in order to determine if the technology may be appropriate for your
business to use. Remember that a list of competing companies was provided to you in the final project case scenario.
A.
Technology One: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and
how it uses this technology to support its business in general. Include specific examples.
B.
Technology Two: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and
how it uses this technology to support its business in general. Include specific examples.
C. Referring to what you learned in your research on the companies above, explain one specific way in which one of the companies is
benefitting
from technology
, and describe the potential benefit to your business if you were to adopt the same approach.


IV.
Technology Solutions:

In this section, you will discuss how each of the two technologies meets the technology requirements that you identified in
section II. Use your decision matrix to guide your responses.
A.
Technology One: Explain how well this technology meets the technology requirements of your business. Be sure to address which technology
requirements the technology meets, and where there are gaps.
B.
Technology Two: Explain how well this technology meets the technology requirements of your business. Be sure to address which technology
requirements the technology meets, and where there are gaps.
V.
Recommendations: In this section, you will recommend the technology solution that you believe is most appropriate for your business based on how
well each technology meets your business’s technology requirements.
A. Recommend a
technology solution for your business, and defend why that solution is appropriate. You may recommend only one technology or
any combination of the two that you investigated.
B. Explain the
overall benefit of your recommended technology solution to your business. Consider the following:
C. How will it will it enhance efficiency?
i. How will it position your business for future growth as you move online?
VI.
Basic Security Considerations: In this section, you will briefly explain what the owner of your business must consider in regard to security and privacy if
they choose to adopt your recommendations.
A. Explain the
security features your recommended technology solution should have.
B. Briefly explain what your business should consider in regard to security and privacy as you seek out
third-party vendors for the proposed
technology.
C. Briefly describe the i
nternal safeguards that should be put in place in your business to guard against loss or misuse of company data. Provide
examples.

4


Milestones


Milestone One: Introduction, Business Requirements, and Competitors and Technology
In Module Three, you will submit the first milestone, in which you will develop your problem statement, technology requirements, and suggested technologies
for your final project.
This milestone will be graded with the Milestone One Rubric.


Milestone Two: Technology Solutions and Recommendations


In Module Five, you will submit the second milestone, in which you will research competitors and analyze the technologies they are using. This milestone will be
graded with the Milestone Two Rubric.


Module Seven: Basic Security Considerations


Note that you will not engage in milestone work for section VI of your final project, basic security considerations. However, you will have an opportunity to work
through the information that will inform this part of your project in Module Seven, and to ask your peers and instructor any questions you have about the topic.
At this point, you should be able to finish this part of your final project and submit the completed draft with all pieces.


Final Submission:
Business Systems Analysis


In Module Seven, you will submit your final project. It should be a complete, polished artifact containing all of the critical elements of the final product. It should
reflect the incorporation of feedback gained throughout the course.
This submission will be graded with the Final Project Rubric.

Getting Custom Writing Service with any of your academic assignments is easy. Simply click here.


Final Project Rubric


Guidelines for Submission: Your business systems analysis should be 6–7 pages in length (not including a cover page and references) and written in APA format.
Use double spacing, 12-point Times New Roman font, and one-inch margins.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information,
review
these instructions.

Critical Elements Exemplary Proficient Needs Improvement Not Evident Value
Introduction: State
the Problem
Clearly states the problem that
the business owner is seeking
to solve (100%)
States the problem that the
business owner is seeking to
solve, but response is unclear
or contains inaccuracies (55%)
Does not state the problem
that the business owner is
seeking to solve (0%)
5.94

5

Introduction: Two
Technologies
Identifies and briefly describes
the two technologies that the
student will research in
business systems analysis
(100%)
Identifies the two technologies
that the student will research
in business systems analysis,
but does not describe them, or
description contains
inaccuracies (55%)
Does not identify the two
technologies that the student
will research in business
systems analysis (0%)
5.94
Business
Requirements:
Objectives
Meets “Proficient” criteria,
and explanation
demonstrates sophisticated
awareness of the project’s
objectives (100%)
Explains the objectives of
project to integrate new
technology (85%)
Explains the objectives of
project to integrate new
technology, but explanation is
cursory or illogical or contains
inaccuracies (55%)
Does not explain the objectives
of project (0%)
5.94
Business
Requirements:
Project Description
Meets “Proficient” criteria,
and project description
provided demonstrates keen
insight into the purpose of
the project (100%)
Provides a project description
that explains the purpose of
the project (85%)
Provides a project description
that explains the purpose of
the project, but description is
illogical, contains inaccuracies,
or is missing required
components (55%)
Does not provide a project
description (0%)
5.94
Business
Requirements:
Technological
Requirements
Meets “Proficient” criteria,
and response demonstrates a
sophisticated awareness of
what the new technology
must be capable of doing for
the business (100%)
Describes the key technological
requirements that will be
required of any new
technology to effectively solve
the business’s problem (85%)
Describes the key technological
requirements that will be
required of any new
technology to effectively solve
the business’s problem, but
description is missing key
requirements or contains
inaccuracies (55%)
Does not describe the key
technological requirements
that will be required of any
new technology (0%)
5.94
Competitors and
Technology:
Technology One
Meets “Proficient” criteria,
and explanation
demonstrates keen insight
into the role and function of
the technology in the
competing company (100%)
Briefly describes what the
selected competing company
does and explains how it uses
the technology to support its
business, and includes specific
examples (85%)
Briefly describes what the
selected competing company
does and explains how it uses
the technology to support its
business, but does not include
specific examples, or examples
are inappropriate, or
explanation is cursory or
contains inaccuracies (55%)
Does not briefly describe what
the selected competing
company does or explain how
it uses the technology to
support its business (0%)
5.94

6

Competitors and
Technology:
Technology Two
Meets “Proficient” criteria,
and explanation
demonstrates keen insight
into the role and function of
the technology in the
competing company (100%)
Briefly describes what the
selected competing company
does and explains how it uses
the technology to support its
business, and includes specific
examples (85%)
Briefly describes what the
selected competing company
does and explains how it uses
the technology to support its
business, but does not include
specific examples, or examples
are inappropriate, or
explanation is cursory or
contains inaccuracies (55%)
Does not briefly describe what
the selected competing
company does or explain how
it uses the technology to
support its business (0%)
5.94
Competitors and
Technology:
Benefitting From
Technology
Meets “Proficient” criteria,
and description
demonstrates keen insight
into how the potential
technology could provide a
benefit to the business
(100%)
Explains one specific way in
which one of the competing
companies is benefitting from
technology, and describes the
potential benefit to the
business from the scenario if
they were to adopt the same
approach (85%)
Explains one specific way in
which one of the competing
companies is benefitting from
technology, but does not
describe the potential benefit
to the business from the
scenario, or description is
cursory or illogical (55%)
Does not explain one specific
way in which one of the
competing companies is
benefitting from technology
(0%)
5.94
Technology
Solutions:
Technology One
Meets “Proficient” criteria,
and explanation
demonstrates a sophisticated
awareness of how well the
technology meets the needs
of the business (100%)
Explains how well this
technology meets the
technology requirements of
the business (85%)
Explains how well this
technology meets the
technology requirements of
the business, but explanation
contains inaccuracies or is
missing required components
(55%)
Does not explain how well this
technology meets the
technology requirements of
the business (0%)
5.94
Technology
Solutions:
Technology Two
Meets “Proficient” criteria,
and explanation
demonstrates a sophisticated
awareness of how well the
technology meets the needs
of the business (100%)
Explains how well this
technology meets the
technology requirements of
the business (85%)
Explains how well this
technology meets the
technology requirements of
the business, but explanation
contains inaccuracies or is
missing required components
(55%)
Does not explain how well this
technology meets the
technology requirements of
the business (0%)
5.94

7

Recommendations:
Technology
Solution
Meets “Proficient” criteria,
and defense demonstrates a
complex grasp of how the
recommended technology
meets needs of the business
(100%)
Recommends a technology
solution for the business and
defends why that solution is
appropriate (85%)
Recommends a technology
solution for the business, but
does not defend why that
solution is appropriate, or
defense is illogical or contains
inaccuracies (55%)
Does not recommend a
technology solution for the
business (0%)
5.94
Recommendations:
Overall Benefit
Meets “Proficient” criteria,
and explanation
demonstrates keen insight
into how the business could
benefit from the
recommended technology
solution (100%)
Explains the overall benefit of
the recommended technology
solution to the business (85%)
Explains the overall benefit of
the recommended technology
solution to the business, but
explanation is cursory or
illogical or contains
inaccuracies (55%)
Does not explain the overall
benefit of the recommended
technology solution to the
business (0%)
5.94
Basic Security
Considerations:
Security Features
Meets “Proficient” criteria,
and description
demonstrates a complex
grasp of security features
necessary for protecting
company data (100%)
Describes the basic security
features the recommended
technology solution should
have in order to protect
company data (85%)
Describes the basic security
features the recommended
technology solution should
have, but description is cursory
or illogical (55%)
Does not describe the basic
security features the
recommended technology
solution should have (0%)
7.92
Basic Security
Considerations:
Third-Party
Vendors
Meets “Proficient” criteria,
and explanation
demonstrates a complex
grasp of security
considerations in regard to
potential third-party vendors
(100%)
Briefly explains what the
business should consider in
regard to security and privacy
as it seeks out third-party
vendors for the proposed
technology (85%)
Briefly explains what the
business should consider in
regard to security and privacy
as it seeks out third-party
vendors, but explanation is
cursory or illogical or contains
inaccuracies (55%)
Does not explain what the
business should consider in
regard to security and privacy
as it seeks out third-party
vendors for the proposed
technology (0%)
7.92
Basic Security
Considerations:
Internal Safeguards
Meets “Proficient” criteria,
and description provides
keen insight into what the
business can do internally to
protect company data
(100%)
Briefly describes the internal
safeguards that should be put
in place in the business to
guard against loss or misuse of
company data, and provides
examples (85%)
Describes the internal
safeguards that should be put
in place in the business to
guard against loss or misuse of
company data, but does not
provide examples, or
description is cursory or
illogical (55%)
Does not describe the internal
safeguards that should be put
in place in the business to
guard against loss or misuse of
company data (0%)
7.92

8

Articulation of
Response
Submission is free of errors
related to citations,
grammar, spelling, syntax,
and organization and is
presented in a professional
and easy-to-read format
(100%)
Submission has no major
errors related to citations,
grammar, spelling, syntax, or
organization (85%)
Submission has major errors
related to citations, grammar,
spelling, syntax, or
organization that negatively
impact readability and
articulation of main ideas
(55%)
Submission has critical errors
related to citations, grammar,
spelling, syntax, or
organization that prevent
understanding of ideas (0%)
4.96
Total 100%

Getting Custom Writing Service with any of your academic assignments is easy. Simply click here.

 

Originally posted 2017-08-17 14:03:17.

Spread The Word

Leave a Reply

Your email address will not be published. Required fields are marked *