Prerequisite: XXX XXX

Total Page:16

File Type:pdf, Size:1020Kb

Prerequisite: XXX XXX

CIS 590 – Directed Research Project

(Prerequisite: To be taken last or next to last)

COURSE DESCRIPTION This course is an integrative capstone course for the Master of Science in Information Systems program. Students will examine and solve real world projects and problems and apply project management techniques to create practical solutions. The course takes an integrative and senior management approach to address the integration of a broad range of technologies inclusive of databases, security, networking, computer infrastructure and human computer interaction.

INSTRUCTIONAL MATERIALS Required Resources

Lane, D. (2011). The chief information officer's body of knowledge. Hoboken, New Jersey: John Wiley & Sons, Inc.

Stenzel, J. (2011). CIO best practices (2nd ed.). Hoboken, New Jersey: John Wiley & Sons, Inc.

Microsoft Office, Microsoft Visio, and Microsoft Project or their equivalents such as OpenOffice, Dia, and Open Project are required. Tutorials for Microsoft Office 2010 can be found on Microsoft’s support site, located at http://office.microsoft.com/en-us/support/training-FX101782702.aspx.

Supplemental Resources

Association for Computing Machinery Website. (2012). General format. Retrieved from http://www.acm.org/

National Security Agency – Central Security Service Website. (2009). General format. Retrieved from http://www.nsa.gov/

The Committee on National Security Systems Website. General format. Retrieved from http://www.cnss.gov/

COURSE LEARNING OUTCOMES 1. Describe the integrative functions and activities within the information systems area, including the role of the CIO and technologies managed within the organization. 2. Evaluate how information technology (IT) is aligned with the strategy of the organization, and how to make appropriate choices about architecture in relationship to overall organization goals. 3. Explain how to develop reasoned responses to the major forces shaping the role of IT in organizations competing in a global economy. 4. Describe the methods and best practices in implementing process change in IT organizations. 5. Describe the role and methods of technology-induced process improvement in organizations. 6. Develop an integrative technology project plan to address and solve a proposed business problem. 7. Explain the competitive advantage that information technology affords organizations. 8. Summarize economic factors of information systems at the enterprise level. 9. Describe the ethical role of IT within organizational, social, and environmental settings. 10. Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations.

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 1 of 32 CIS 590 – Directed Research Project

11. Use technology and information resources to research issues in information systems. 12. Write clearly and concisely about leadership issues and strategic insight of the Information systems domain using proper writing mechanics and technical style conventions.

WEEKLY COURSE SCHEDULE The standard requirement for a 4.5 credit hour course is for students to spend 13.5 hours in weekly work. This includes preparation, activities, and evaluation regardless of delivery mode.

Week Preparation, Activities, and Evaluation Points

1 Preparation April 7 -  Reading(s), from CIO Best Practices 13 o Chapter 1: Freedom with Fences: Robert Stephens Discusses CIO Leadership and IT Innovation  Reading(s), from The Chief Information Officer’s Body of Knowledge o Chapter 1: Collaboration and Teamwork o Chapter 18: Managing Project Quality o Chapter 20: Compliance o Chapter 22: Balancing IT’s Workload Activities  Discussions 20 Evaluation  None 2 Preparation April 14  Reading(s), from CIO Best Practices - 20 o Chapter 2: Why Does IT Behave the Way It Does?  Reading(s), from The Chief Information Officer’s Body of Knowledge o Chapter 8: Strategic Alignment o Chapter 24: Information Technology Portfolio Management Activities  Discussions 20 Evaluation 120  Project Deliverable 1: Project Plan Inception 3 Preparation April 21  Reading(s), from CIO Best Practices - 27 o Chapter 3: Cloud Computing and the New Economics of Business  Reading(s), from The Chief Information Officer’s Body of Knowledge o Chapter 11: A New Paradigm for Managing a Suite of Business Processes Inexpensively o Chapter 15: Requirements o Chapter 26: From Vision to Reality: Implementing Information Security Activities 20 © 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 2 of 32 CIS 590 – Directed Research Project

 Discussions Evaluation  None 4 Preparation April 28  Reading(s), from The Chief Information Officer’s Body of Knowledge – May 4 o Chapter 12: Information Technology Portfolio Management o Chapter 16: Project Risk Management o Chapter 17: Project Cost Estimation o Chapter 27: Business Continuity Planning Activities 20  Discussions Evaluation 120  Project Deliverable 2: Business Requirements 5 Preparation May 5 -  Reading(s), from CIO Best Practices 11 o Chapter 4: Leading with Green: Expanding the CIOS’s Role in Eco-Efficient Information Technology Adoption  Reading(s), from The Chief Information Officer’s Body of Knowledge o Chapter 13: A Beginner’s Guide to the Software Development Life Cycle o Chapter 19: Project Reviews Activities  Discussions 20 Evaluation  None 6 Preparation May 12  Reading(s), from CIO Best Practices – 18 o Chapter 5: Sustainability, Technology, and Economic Pragmatism: A View into the Future  Reading(s), from The Chief Information Officer’s Body of Knowledge o Chapter 14: Office of the CIO Activities  Discussions 20 Evaluation  Project Deliverable 3: Database and Data Warehousing Design 120 7 Preparation May 19 -  Reading(s), from The Chief Information Officer’s Body of Knowledge 25 o Chapter 10: Competitive Applications of Technology o Chapter 28: Overcoming the “Computer Guy” Stigma: A Perspective on Why Being Involved In Your Web Strategy Matters Activities

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 3 of 32 CIS 590 – Directed Research Project

 Discussions 20

Evaluation 120  Project Deliverable 4: Cloud Technology and Virtualization 8 Preparation May 26  Reading(s), from The Chief Information Officer’s Body of Knowledge – June 1 o Chapter 9: Developing an IT Strategy o Chapter 23: Outsourcing and Offshoring Activities  Discussions 20 Evaluation  Project Deliverable 5: Network Infrastructure and Security 120 9 Preparation June 2 -  Reading(s), from CIO Best Practices 8 o Chapter 6: How to Measure and Manage Customer Value and Customer Profitability  Reading(s), from The Chief Information Officer’s Body of Knowledge o Chapter 21: Service Management  e-Activity o Research the Web for IT and business alignment topics surrounding the Information Technology Infrastructure Library (ITIL). A good starting point would be the ITIL Website located at http://www.itil-officialsite.com/home/home.aspx. Be prepared to discuss. Activities 20  Discussions Evaluation  None 10 Preparation June 9 -  Reading(s), from CIO Best Practices 15 o Chapter 7: Evolution of Networks into Networking  Reading(s), from The Chief Information Officer’s Body of Knowledge o Chapter 25: Strategic Information Security Management Activities  Discussions 20 Evaluation  Project Deliverable 6: Final Project Plan 200 11 Preparation June 16  Reading(s): None – 22 Activities  Discussions

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 4 of 32 CIS 590 – Directed Research Project

Evaluation  None

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 5 of 32 CIS 590 – Directed Research Project

GRADING SCALE – GRADUATE

% of Assignment Total Points Grade Project Deliverable 1: Project Plan Inception 120 12% Project Deliverable 2: Business Requirements 120 12% Project Deliverable 3: Database and Data Warehousing Design 120 12% Project Deliverable 4: Cloud Technology and Virtualization 120 12% Project Deliverable 5: Network Infrastructure and Security 120 12% Project Deliverable 6: Final Project Plan 200 20% Faculty Note: This deliverable is comprehensive in nature requiring revisions to all previous deliverables. The completed project will be due in Week 10. Participation (20 discussions worth 10 points apiece) 200 20% Note: Week 11 discussions are not graded. Totals 1,000 100%

Points Percentage Grade 900 – 1,000 90% – 100% A 800 – 899 80% – 89% B 700 – 799 70% – 79% C Below 700 Below 70% F

Writing Assignments The objective of the School of Information Systems’ writing assignments is to promote attitudes and skills that will improve a student’s ability to communicate in writing, develop research skills and documentation techniques, and encourage critical analysis of data and conclusions specific to the course learning outcomes in the information systems and technology domain.

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 6 of 32 CIS 590 – Assignments and Rubrics

Capstone Project Overview The purpose of this capstone project is for students to assume a senior management approach and apply project management techniques to create an integrative information technology solution to address organizational issues in order to satisfy an executive team and venture capital group. Students will critically assess existing information systems infrastructures, emerging technologies, and how enabling technologies affect organizational strategy. Deliverables 1 through 6 focus on preparing students toward the final capstone project. Skills, experience, and knowledge gained through the completion of prerequisite courses will be used throughout each deliverable. The project contents to be addressed are as follows:

1. Project Deliverable 1: Project Plan Inception. In this deliverable, you will create a project introduction that includes background information of the company, the type of business that the company is involved in, and a description of the integrative information systems that the company should have to support the business. You will also be asked to create a project plan to record tasks, subtasks, and resources, and identify the schedule of the project. Additionally, the plan will outline the planning, analysis, design, and implementation phases of your project. Submission Requirements . Project Introduction (MS Word) . Project Plan (MS Project)

2. Project Deliverable 2: Business Requirements. In this deliverable, you will create an original business requirements document for the project plan using the template provided. You will be asked to describe the detailed project including the scope, possible risks, constraints, assumptions, integration with other systems and infrastructure, and relevant terms that will be used throughout the project. You will also need to update the project plan. Submission Requirements . Business Requirements Document (MS Word) . Project Plan (MS Project)

3. Project Deliverable 3: Database and Data Warehousing Design. In this deliverable, you will create a database schema that supports the company’s business and processes, explain and support the database schema, create database tables, normalize the database tables, create an Entity-Relationship (E-R) Diagram, and create a Data Flow Diagram (DFD). You will also be asked to create sample queries that will support the organizational reporting needs, and screen layouts that illustrate the interface that organizational users will utilize. You will need to update the project plan. Submission Requirements . Design Document (MS Word) . Revised Project Plan (MS Project)

4. Project Deliverable 4: Cloud Technology and Virtualization. In this deliverable, you will support the need for the use of cloud technology and virtualization within your company, speculate on expected cost savings in hardware infrastructure, speculate on the possible reductions of human capital that can be realized from implementing cloud and virtualization technologies, create a diagram to illustrate how cloud and virtualization technology could align with the company’s business processes and assist with attainment of organizational goals, provide a compelling recommendation for solution providers and partners that could help your company secure a firm competitive advantage by using cloud and virtualization technologies, and update the project plan.

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 7 of 32 CIS 590 – Assignments and Rubrics

Submission Requirements . Design Document (MS Word) . Revised Project Plan (MS Project)

5. Project Deliverable 4: Network Infrastructure and Security. In this deliverable, you will design a logical and physical topographical layout of the network, illustrate the possible placement of servers, explain rationale for the logical and physical topographical layout of the planned network, create and describe the comprehensive security policy for the organization, and update the project plan. Submission Requirements . Infrastructure Document (MS Word) . Revised Project Plan (MS Project)

6. Final Project: Final Project Plan. In the final project, you will provide a high-level technical overview of the project. This includes the five (5) previous deliverables with revisions surrounding instructor feedback. All documentation will be recorded on the business requirements document revised from an earlier submission in this course. Additionally, you will submit the final project plan and create a comprehensive PowerPoint presentation for the executive team and the venture capital group. The PowerPoint presentation, along with the executive summary, will convince the group that your solution is optimal. Submission Requirements . Written Project Plan (MS Word) . Revised Business Requirements Document (MS Word) . Project Plan PowerPoint Presentation (MS PowerPoint) . Finalized Project Plan (MS Project)

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 8 of 32 CIS 590 – Assignments and Rubrics

Project Deliverable 1: Project Plan Inception Due Week 2 and worth 120 points

This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

You are currently the Chief Information Officer (CIO) for an innovative Internet-based company with gross revenues of more than $35 million dollars per year. During an executive leadership meeting, you were told that your company will be merging with a multinational company of equal size and you will be responsible for developing a project plan to strategically integrate all systems, including databases and infrastructure. The Chief Executive Officer has given you sixty (60) days to deliver an information technology project plan in anticipation of the company merger. Your company will be expanding from one (1) floor to three (3) floors within six (6) months. Since this merger will be bringing two (2) fairly equal- sized companies together under one roof, the infrastructure must be redesigned to accommodate the increased needs. Your company currently uses operational systems and relational databases but desires to expand into data warehousing. All information technology (hardware and software) must be redesigned to meet organizational needs. The solution should be implemented in either a hosted solution, on-site solution, or a hybrid model. The CEO is expecting you to integrate different technologies from different solution providers and incorporate industry best practices in connection with the development of technological systems. In addition, the CEO is extremely interested in cloud technologies and virtualization but is leery of security issues; however, the CEO is sure that you will implement proper security protocols. The company currently consists of twenty five (25) employees but is expected to increase to sixty five (65) employees when the merger is complete.

Section 1: Project Introduction 1. Write a four to six (4-6) page project introduction that documents the current state of the organization prior to any development or enhancements, takes into account all the information given above, and includes the following: a. Background information of the company. b. Details regarding the type of business activities that the company is involved in. c. Speculation on outsourcing and offshoring opportunities. d. A description of the current information systems that the company has to support the business. The description should include an overview of the following: i. operational systems, databases, and data warehousing. ii. cloud technology and virtualization. iii. network infrastructure and security. e. The use of at least two (2) quality resources in this assignment.

Your assignment must follow these formatting requirements:  Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.  Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 9 of 32 CIS 590 – Assignments and Rubrics

Section 2: Project Plan Use Microsoft Project to: 2. Create a project plan (summary and detailed) template. The project plan should: a. Record all tasks, subtasks, resources, and time related to the project. b. Outline the planning, analysis, design, and implementation phases. c. Develop in accordance with the SDLC.

The specific course learning outcomes associated with this assignment are:  Describe the integrative functions and activities within the information systems area, including the role of the CIO and technologies managed within the organization.  Use technology and information resources to research issues in information systems.  Write clearly and concisely about leadership issues and strategic insight of the Information systems domain using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Points: 120 Project Deliverable 1: Project Plan Inception

Criteria Unacceptable Fair Proficient Exemplary Below 70% F 70-79% C 80-89% B 90-100% A Section 1: Project Introduction 1a. Include background Did not submit or Partially included Satisfactorily included Thoroughly included information of the incompletely included background background information ofbackground company. background informationinformation of the the company. information of the Weight: 10% of the company. company. company. 1b. Include details Did not submit or Partially included Satisfactorily included Thoroughly included regarding the type of incompletely included details regarding the details regarding the type details regarding the business that the details regarding the type of business that of business that the type of business that company is engaged in. type of business that the company is company is engaged in. the company is Weight: 10% the company is engaged in. engaged in. engaged in. 1c. Include speculation Did not submit or Partially included Satisfactorily included Thoroughly included on outsourcing and incompletely included speculation on speculation on speculation on offshoring opportunities. speculation on outsourcing and outsourcing and outsourcing and Weight: 20% outsourcing and offshoring offshoring opportunities. offshoring offshoring opportunities. opportunities. opportunities. 1di. Include a Did not submit or Partially included a Satisfactorily included a Thoroughly included description of the incompletely included adescription of the description of the a description of the information systems that description of the information systems information systems that information systems the company currently information systems that the company the company currently that the company has to support the that the company currently has to has to support the currently has to business, including currently has to supportsupport the business, including support the business, operational systems, the business, including business, including operational systems, including operational databases, and data operational systems, operational systems, databases, and data systems, databases, warehousing. databases, and data databases, and data warehousing. and data Weight: 5% warehousing. warehousing. warehousing.

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 10 of 32 CIS 590 – Assignments and Rubrics

1dii. Include a Did not submit or Partially included a Satisfactorily included a Thoroughly included description of the incompletely included adescription of the description of the a description of the information systems that description of the information systems information systems that information systems the company currently information systems that the company the company currently that the company has to support the that the company currently has to has to support the currently has to business, including currently has to supportsupport the business, including cloud support the business, cloud technology and the business, including business, including technology and including cloud virtualization. cloud technology and cloud technology andvirtualization. technology and Weight: 5% virtualization. virtualization. virtualization. 1diii. Include a Did not submit or Partially included a Satisfactorily included a Thoroughly included description of the incompletely included adescription of the description of the a description of the information systems that description of the information systems information systems that information systems the company currently information systems that the company the company currently that the company has to support the that the company currently has to has to support the currently has to business, including currently has to supportsupport the business, including support the business, network infrastructure the business, including business, including network infrastructure andincluding network and security. network infrastructure network security. infrastructure and Weight: 5% and security. infrastructure and security. security. 1e. 2 references No references providedDoes not meet the Meets number of required Exceeds number of Weight: 5% required number of references; all references required references; references; some high quality choices. all references high references poor quality choices. quality choices. Section 2: Project Plan 2a. Create a project Did not submit or Partially created a Satisfactorily created a Thoroughly created a plan (summary and incompletely created a project plan project plan (summary project plan detailed) using Microsoft project plan (summary (summary and and detailed) using (summary and Office Project, recording and detailed) using detailed) using Microsoft Office Project, detailed) using all tasks, subtasks, Microsoft Office Microsoft Office recording all tasks, Microsoft Office resources, and time Project, recording all Project, recording all subtasks, resources, and Project, recording all related to the project. tasks, subtasks, tasks, subtasks, time related to the project.tasks, subtasks, Weight: 10% resources, and time resources, and time resources, and time related to the project. related to the project. related to the project. 2b. Create a project Did not submit or Partially created a Satisfactorily created a Thoroughly created a plan (summary and incompletely created a project plan project plan (summary project plan detailed) using Microsoft project plan (summary (summary and and detailed) using (summary and Office Project, outlining and detailed) using detailed) using Microsoft Office Project, detailed) using the planning, analysis, Microsoft Office Microsoft Office outlining the planning, Microsoft Office design, and Project, outlining the Project, outlining the analysis, design, and Project, outlining the implementation phases. planning, analysis, planning, analysis, implementation phases. planning, analysis, Weight: 10% design, and design, and design, and implementation implementation implementation phases. phases. phases. 2c. Create a project plan Did not submit or Partially created a Satisfactorily created a Thoroughly created a (summary and detailed) incompletely created a project plan project plan (summary project plan using Microsoft Office project plan (summary (summary and and detailed) using (summary and Project developed in and detailed) using detailed) using Microsoft Office Project detailed) using accordance with the Microsoft Office Project Microsoft Office developed in accordance Microsoft Office SDLC. developed in Project developed in with the SDLC. Project developed in Weight: 10% accordance with the accordance with the accordance with the SDLC. SDLC. SDLC. 3. Clarity, writing More than 6 errors 5-6 errors present 3-4 errors present 0-2 errors present mechanics, and present formatting requirements Weight: 10% © 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 11 of 32 CIS 590 – Assignments and Rubrics

Project Deliverable 2: Business Requirements Due Week 4 and worth 120 points

This assignment consists of two (2) sections: a business requirements document and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Documenting the existing IT network and system is an important first step, but you, the CIO, know that capturing the needed changes can be critical to your success as an executive. You know that procuring and documenting quality business requirements is an important step toward the design of quality information systems. Completion of a quality requirements document allows user needs and expectations to be captured, so that infrastructure and information systems can be designed properly. Using the requirements document provided in the course shell as a part of the requirements gathering process, you are to assess the needs of the company as it prepares to become a multinational organization. You must consider current and future trends and requirements; however, assumptions should be realistic and carefully considered. The needs of the organization should be documented. Later deliverables will focus on specifics of all requirements.

Section 1: Business Requirements Document 1. Write a four to six (4-6) page original business requirements document for the project plan using the template provided. Note: The template can be found in the Student Center of the online course shell. a. Describe the project needs, including the following: i. Describe the scope and analyze how to control the scope. ii. Speculate and give justifications for how to control scope. iii. Identify possible risks, constraints, and assumptions. iv. Describe the needed integration with other systems and infrastructure. Note: Database and Data Warehousing, Cloud Technology and Virtualization, and Network Infrastructure and Security. v. Assess the human capital that may be needed to complete the project, ensuring that necessary skill sets are identified. vi. Speculate on possible outsourcing or offshoring needs that may be required to accomplish project. vii. Define relevant terms that will be used throughout the project. viii. Include cost projections for staffing, infrastructure, and other resources. b. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:  Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.  Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Section 2: Revised Project Plan Use Microsoft Project to: © 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 12 of 32 CIS 590 – Assignments and Rubrics

2. Update the project plan (summary and detail) template, from Project Deliverable 1: Project Plan Inception, with three to five (3-5) new project tasks, each consisting of five to ten (5-10) subtasks.

The specific course learning outcomes associated with this assignment are:  Describe the integrative functions and activities within the information systems area, including the role of the CIO and technologies managed within the organization.  Evaluate how information technology (IT) is aligned with the strategy of the organization, and how to make appropriate choices about architecture in relationship to overall organization goals.  Use technology and information resources to research issues in information systems.  Write clearly and concisely about leadership issues and strategic insight of the Information systems domain using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Points: 120 Project Deliverable 2: Business Requirements

Criteria Unacceptable Fair Proficient Exemplary Below 70% F 70-79% C 80-89% B 90-100% A Section 1: Business Requirements Document 1ai. Describe the scope Did not submit or Partially described and Satisfactorily Thoroughly described and analyze how to incompletely described analyzed how to described and and analyzed how to control the scope. and analyzed how to control the scope. analyzed how to control the scope. Weight: 10% control the scope. control the scope. 1aii. Speculate and give Did not submit or Partially speculated Satisfactorily Thoroughly speculated justifications for how to incompletely and gave justifications speculated and gave and gave justifications control scope. speculated and gave for how to control justifications for how for how to control Weight: 10% justifications for how to scope. to control scope. scope. control scope. 1aiii. Identify possible Did not submit or Partially identified Satisfactorily identifiedThoroughly identified risks, constraints, and incompletely identified possible risks, possible risks, possible risks, assumptions. possible risks, constraints, and constraints, and constraints, and Weight: 10% constraints, and assumptions. assumptions. assumptions. assumptions. 1aiv. Describe the Did not submit or Partially described the Satisfactorily Thoroughly described needed integration with incompletely described needed integration with described the needed the needed integration other systems and the needed integration other systems and integration with other with other systems infrastructure. with other systems and infrastructure. systems and and infrastructure. Weight: 10% infrastructure. infrastructure. 1av. Assess the human Did not submit or Partially assessed the Satisfactorily Thoroughly assessed capital that may be incompletely assessed human capital that may assessed the human the human capital that needed to complete the the human capital that be needed to complete capital that may be may be needed to project, ensuring that may be needed to the project, ensuring needed to complete complete the project, necessary skill sets are complete the project, that necessary skill the project, ensuring ensuring that identified. ensuring that sets are identified. that necessary skill necessary skill sets Weight: 10% necessary skill sets are sets are identified. are identified. identified. 1avi. Speculate on Did not submit or Partially speculated on Satisfactorily Thoroughly speculated possible outsourcing or incompletely possible outsourcing or speculated on on possible offshoring needs that speculated on possible offshoring needs that possible outsourcing outsourcing or may be required to outsourcing or may be required to or offshoring needs offshoring needs that accomplish project. offshoring needs that accomplish project. that may be required may be required to © 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 13 of 32 CIS 590 – Assignments and Rubrics

Weight: 10% may be required to to accomplish project. accomplish project. accomplish project. 1avii. Define relevant Did not submit or Partially defined Satisfactorily defined Thoroughly defined terms that will be used incompletely defined relevant terms that will relevant terms that willrelevant terms that will throughout the project. relevant terms that will be used throughout the be used throughout be used throughout Weight: 10% be used throughout the project. the project. the project. project. 1aviii. Include cost Did not submit or Partially included cost Satisfactorily included Thoroughly included projections for staffing, incompletely included projections for staffing, cost projections for cost projections for infrastructure, and other cost projections for infrastructure, and staffing, infrastructure,staffing, infrastructure, resources. staffing, infrastructure, other resources. and other resources. and other resources. Weight: 10% and other resources. 1b. 2 references No references providedDoes not meet the Meets number of Exceeds number of Weight: 5% required number of required references; required references; references; some all references high all references high references poor quality quality choices. quality choices. choices. Section 2: Revised Project Plan 2. Update the project Did not submit or Partially updated the Satisfactorily updated Thoroughly updated plan from Project incompletely updated project plan from the project plan from the project plan from Deliverable 1: Project the project plan from Project Deliverable 1: Project Deliverable 1: Project Deliverable 1: Plan Inception, with Project Deliverable 1: Project Plan Inception, Project Plan Project Plan Inception, three to five (3-5) new Project Plan Inception, with three to five (3-5) Inception, with three with three to five (3-5) project tasks, each with three to five (3-5) new project tasks, eachto five (3-5) new new project tasks, consisting of five to ten new project tasks, eachconsisting of five to ten project tasks, each each consisting of five (5-10) subtasks. consisting of five to ten (5-10) subtasks. consisting of five to to ten (5-10) subtasks. Weight: 5% (5-10) subtasks. ten (5-10) subtasks. 3. Clarity, writing More than 6 errors 5-6 errors present 3-4 errors present 0-2 errors present mechanics, and present formatting requirements Weight: 10%

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 14 of 32 CIS 590 – Assignments and Rubrics

Project Deliverable 3: Database and Data Warehousing Design Due Week 6 and worth 120 points

This assignment consists of two (2) sections: a design document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

One of the main functions of any business is to transform data into information. The use of relational databases and data warehousing has gained recognition as a standard for organizations. A quality database design makes the flow of data seamless. The database schema is the foundation of the relational database. The schema defines the tables, fields, relationships, views, indexes, and other elements. The schema should be created by envisioning the business, processes, and workflow of the company. Since your company is an innovative Internet-based company, movement toward data warehousing seems to be one of the most viable options to give your company a competitive advantage; however, these concepts must be explained to the executive board in a manner to garner support.

Section 1: Design Document 1. Write a six to ten (6-10) page design document in which you: a. Support the need for the use of relational databases and data warehousing. From a management standpoint, it may be important to show the efficiencies that can be gained for executive oversight. b. Create a database schema that supports the company’s business and processes. Explain and support the database schema with relevant arguments that support the rationale for the structure. Note: The minimum requirement for the schema should entail the tables, fields, relationships, views, and indexes. c. Identify and create database tables with appropriate field-naming conventions. Then, identify primary keys and foreign keys, and explain how referential integrity will be achieved. Normalize the database tables to third normal form (3NF). d. Identify and create an Entity-Relationship (E-R) Diagram relating the tables of the database schema through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix. Explain your rationale behind the design of the E-R Diagram. e. Identify and create a Data Flow Diagram (DFD) relating the tables of your database schema through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix. Explain the rationale behind the design of your DFD. f. Illustrate the flow of data including both inputs and outputs for the use of a data warehouse. The diagram should map data between source systems, operational systems, data warehouses and specified data marts. Note: The graphically depicted solution is not included in the required page length.

Your assignment must follow these formatting requirements:  Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 15 of 32 CIS 590 – Assignments and Rubrics

 Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.  Include charts or diagrams created in MS Visio or Dia as an appendix of the design document. All references to these diagrams must be included in the body of the design document.

Section 2: Revised Project Plan Use Microsoft Project to: 2. Update the project plan (summary and detail) template, from Project Deliverable 2: Business Requirements, with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks.

The specific course learning outcomes associated with this assignment are:  Describe the methods and best practices in implementing process change in IT organizations.  Describe the role and methods of technology-induced process improvement in organizations.  Use technology and information resources to research issues in information systems.  Write clearly and concisely about leadership issues and strategic insight of the Information systems domain using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Points: 120 Project Deliverable 3: Database and Data Warehousing Design

Criteria Unacceptable Fair Proficient Exemplary Below 70% F 70-79% C 80-89% B 90-100% A Section 1: Design Document 1a. Support the need for Did not submit or Partially supported Satisfactorily Thoroughly supported the use of relational incompletely supported the need for the use supported the need the need for the use of databases and data the need for the use of of relational for the use of relational databases warehousing. relational databases databases and data relational databases and data warehousing. Weight: 15% and data warehousing. warehousing. and data warehousing. 1b. Create a database Did not submit or Partially created a Satisfactorily created Thoroughly created a schema that supports the incompletely created a database schema a database schema database schema that company’s business and database schema that that supports the that supports the supports the processes. Explain and supports the company’s business company’s business company’s business support the database company’s business and processes. and processes. and processes. schema with relevant and processes. Did not Partially explained Satisfactorily Thoroughly explained arguments that support submit or incompletely and supported the explained and and supported the the rationale for the explained and database schema supported the database schema with structure. supported the with relevant database schema withrelevant arguments Weight: 15% database schema with arguments that relevant arguments that support the relevant arguments support the rationale that support the rationale for the that support the for the structure. rationale for the structure. rationale for the structure. structure. 1c. Identify and create Did not submit or Partially identified Satisfactorily identifiedThoroughly identified database tables with incompletely identified and created and created database and created database appropriate field-naming and created database database tables tables within tables within conventions. Then, tables within within appropriate appropriate field- appropriate field- identify primary keys and appropriate field- field-naming naming conventions. naming conventions. © 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 16 of 32 CIS 590 – Assignments and Rubrics foreign keys, and explain naming conventions. conventions. PartiallySatisfactorily identifiedThoroughly identified how referential integrity Did not submit or identified primary primary keys and primary keys and will be achieved. incompletely identified keys and foreign foreign keys, and foreign keys, and Normalize the database primary keys and keys, and partially satisfactorily thoroughly explained tables to third normal form foreign keys, and did explained how explained how how referential (3NF). not submit or referential integrity referential integrity willintegrity will be Weight: 10% incompletely explained will be achieved. be achieved. achieved. Thoroughly how referential integrity Partially normalized Satisfactorily normalized the will be achieved. Did the database tables normalized the database tables to not submit or to third normal form database tables to third normal form incompletely (3NF). third normal form (3NF). normalized the (3NF). database tables to third normal form (3NF). 1d. Identify and create an Did not submit or Partially identified Satisfactorily identifiedThoroughly identified Entity-Relationship (E-R) incompletely identified and created an and created an Entity- and created an Entity- Diagram relating the and created an Entity- Entity-Relationship Relationship (E-R) Relationship (E-R) tables of the database Relationship (E-R) (E-R) Diagram Diagram relating the Diagram relating the schema through the use of Diagram relating the relating the tables of tables of the database tables of the database graphical tools in Microsoft tables of the database the database schema through the schema through the Visio or an open source schema through the schema through the use of graphical tools use of graphical tools alternative such as Dia. use of graphical tools use of graphical toolsin Microsoft Visio or in Microsoft Visio or an Explain the rationale in Microsoft Visio or an in Microsoft Visio or an open source open source behind the design of your open source alternativean open source alternative such as alternative such as E-R Diagram. such as Dia. Did not alternative such as Dia. Satisfactorily Dia. Thoroughly Weight: 15% submit or incompletely Dia. Partially explained the explained the rationale explained the rationale explained the rationale behind the behind the design of behind the design of rationale behind the design of your E-R your E-R Diagram. your E-R Diagram. design of your E-R Diagram. Diagram. 1e. Identify and create a Did not submit or Partially identified Satisfactorily identifiedThoroughly identified Data Flow Diagram (DFD) incompletely identified and created a Data and created a Data and created a Data relating the tables of the and created a Data Flow Diagram (DFD) Flow Diagram (DFD) Flow Diagram (DFD) database schema through Flow Diagram (DFD) relating the tables of relating the tables of relating the tables of the use of graphical tools relating the tables of the database the database schema the database schema in Microsoft Visio or an the database schema schema through the through the use of through the use of open source alternative through the use of use of graphical toolsgraphical tools in graphical tools in such as Dia. graphical tools in in Microsoft Visio or Microsoft Visio or an Microsoft Visio or an Weight: 15% Microsoft Visio or an an open source open source open source open source alternativealternative such as alternative such as alternative such as such as Dia. Dia. Dia. Dia. 1f. Illustrate the flow of Did not submit or Partially illustrated Satisfactorily Thoroughly illustrated data including both inputs incompletely illustrated the flow of data illustrated the flow of the flow of data and outputs for the use of the flow of data including both inputs data including both including both inputs a data warehouse. The including both inputs and outputs for the inputs and outputs for and outputs for the diagram must map data and outputs for the use use of a data the use of a data use of a data between source systems, of a data warehouse. warehouse. Partially warehouse. warehouse. data warehouses, and Did not submit or mapped data Satisfactorily mapped Thoroughly mapped specified data marts. incompletely mapped between source data between source data between source Weight: 15% data between source systems, data systems, data systems, data systems, data warehouses, and warehouses, and warehouses, and warehouses, and specified data marts. specified data marts. specified data marts. specified data marts. Section 2: Revised Project Plan 2. Update the project plan Did not submit or Partially updated the Satisfactorily updated Thoroughly updated from Project Deliverable 2: incompletely updated project plan from the project plan from the project plan from Business Requirements, the project plan from Project Deliverable Project Deliverable 2: Project Deliverable 2:

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 17 of 32 CIS 590 – Assignments and Rubrics with three to five (3-5) new Project Deliverable 2: 2: Business Business Business project tasks each Business Requirements, with Requirements, with Requirements, with consisting of five to ten (5- Requirements, with three to five (3-5) three to five (3-5) new three to five (3-5) new 10) subtasks. three to five (3-5) new new project tasks project tasks each project tasks each Weight: 5% project tasks each each consisting of consisting of five to consisting of five to consisting of five to ten five to ten (5-10) ten (5-10) subtasks. ten (5-10) subtasks. (5-10) subtasks. subtasks. 3. Clarity, writing More than 6 errors 5-6 errors present 3-4 errors present 0-2 errors present mechanics, and formatting present requirements Weight: 10%

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 18 of 32 CIS 590 – Assignments and Rubrics

Project Deliverable 4: Cloud Technology and Virtualization Due Week 7 and worth 120 points

With the merger of your company with a multinational company, you have come to realize that progressive solutions are necessary to defray some of the associated information technology costs. Company executives believe that using cloud technology and virtualization is becoming the standard for companies that are engaged in Internet-based technologies. Your company is on the verge of global marketing and competition; therefore, your company needs to make smarter decisions and improve global business performance. Cloud technology and virtualization are believed to provide business insights without enormous infrastructure enhancements. The executive board is aware of the profound benefits of cloud technology and virtualization but is apprehensive because they are unfamiliar with the look and feel of the technology. The executive team is interested in your recommendations and eagerly waiting for your forward-thinking viewpoint.

Section 1: Design Document 1. Write a four to six (4-6) page design document in which you: a. Support the need for the use of cloud technology and virtualization within the company. b. Assess expected cost savings in hardware infrastructure. c. Determine the possible reductions of human capital that can be realized from implementing cloud and virtualization technologies. d. Create a diagram through the use of Microsoft Visio or an open source alternative such as Dia to illustrate how cloud and virtualization technology could align with the company’s business processes and assist with attainment of organizational goals. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix. e. Provide a compelling recommendation for solution providers and partners that could help the company secure a firm competitive advantage by using cloud and virtualization technologies.

Your assignment must follow these formatting requirements:  Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.  Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.  Include charts or diagrams created in MS Visio or Dia as an appendix of the design document. All references to these diagrams must be included in the body of the design document.

Section 2: Revised Project Plan Use Microsoft Project to: 2. Update the project plan (summary and detail) template, from Project Deliverable 3: Database and Data Warehousing Design, with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks.

The specific course learning outcomes associated with this assignment are:  Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations. © 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 19 of 32 CIS 590 – Assignments and Rubrics

 Explain how to develop reasoned responses to the major forces shaping the role of IT in organizations competing in a global economy.  Use technology and information resources to research issues in information systems.  Write clearly and concisely about leadership issues and strategic insight of the Information systems domain using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Points: 120 Project Deliverable 4: Cloud Technology and Virtualization

Criteria Unacceptable Fair Proficient Exemplary Below 70% F 70-79% C 80-89% B 90-100% A Section 1: Design Document 1a. Support the need for Did not submit or Partially supported theSatisfactorily Thoroughly supported the use of cloud incompletely supported need for the use of supported the need the need for the use of technology and the need for the use of cloud technology and for the use of cloud cloud technology and virtualization within the cloud technology and virtualization within technology and virtualization within the company. virtualization within the the company. virtualization within company. Weight: 20% company. the company. 1b. Assess expected cost Did not submit or Partially assessed Satisfactorily Thoroughly assessed savings in hardware incompletely assessed expected cost savings assessed expected expected cost savings infrastructure. expected cost savings in hardware cost savings in in hardware Weight: 20% in hardware infrastructure. hardware infrastructure. infrastructure. infrastructure. 1c. Determine the Did not submit or Partially determined Satisfactorily Thoroughly determined possible reductions of incompletely the possible determined the the possible reductions human capital that can determined the reductions of human possible reductions of human capital that be realized from possible reductions of capital that can be of human capital that can be realized from implementing cloud and human capital that can realized from can be realized from implementing cloud and virtualization be realized from implementing cloud implementing cloud virtualization technologies. implementing cloud and virtualization and virtualization technologies. Weight: 15% and virtualization technologies. technologies. technologies. 1d. Create a diagram Did not submit or Partially created a Satisfactorily created Thoroughly created a through the use of incompletely created a diagram through the a diagram through diagram through the Microsoft Visio or an diagram through the use of Microsoft Visio the use of Microsoft use of Microsoft Visio open source alternative use of Microsoft Visio or an open source Visio or an open or an open source such as Dia to illustrate or an open source alternative such as source alternative alternative such as Dia how cloud and alternative such as Dia Dia to illustrate how such as Dia to to illustrate how cloud virtualization technology to illustrate how cloud cloud and illustrate how cloud and virtualization could align with the and virtualization virtualization and virtualization technology could align company’s business technology could align technology could aligntechnology could with the company’s processes and assist with with the company’s with the company’s align with the business processes attainment of business processes business processes company’s business and assist with organizational goals. and assist with and assist with processes and assist attainment of Weight: 15% attainment of attainment of with attainment of organizational goals. organizational goals. organizational goals. organizational goals. 1e. Provide a compelling Did not submit or Partially provided a Satisfactorily Thoroughly provided a recommendation for incompletely provided compelling provided a compelling solution providers and a compelling recommendation for compelling recommendation for partners that could help recommendation for solution providers and recommendation for solution providers and the company secure a solution providers and partners that could solution providers partners that could help firm competitive partners that could helphelp the company and partners that the company secure a

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 20 of 32 CIS 590 – Assignments and Rubrics advantage by using cloud the company secure a secure a firm could help the firm competitive and virtualization firm competitive competitive company secure a advantage by using technologies. advantage by using advantage by using firm competitive cloud and virtualization Weight: 15% cloud and virtualization cloud and advantage by using technologies. technologies. virtualization cloud and technologies. virtualization technologies. Section 2: Revised Project Plan 2. Update the project Did not submit or Partially updated the Satisfactorily Thoroughly updated the plan from Project incompletely updated project plan from updated the project project plan from Deliverable 3: Database the project plan from Project Deliverable 3: plan from Project Project Deliverable 3: and Data Warehousing Project Deliverable 3: Database and Data Deliverable 3: Database and Data Design, with three to five Database and Data Warehousing Design, Database and Data Warehousing Design, (3-5) new project tasks Warehousing Design, with three to five (3-5) Warehousing with three to five (3-5) each consisting of five to with three to five (3-5) new project tasks Design, with three to new project tasks each ten (5-10) subtasks. new project tasks each each consisting of five five (3-5) new project consisting of five to ten Weight: 5% consisting of five to ten to ten (5-10) subtasks.tasks each (5-10) subtasks. (5-10) subtasks. consisting of five to ten (5-10) subtasks. 3. Clarity, writing More than 6 errors 5-6 errors present 3-4 errors present 0-2 errors present mechanics, and present formatting requirements Weight: 10%

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 21 of 32 CIS 590 – Assignments and Rubrics

Project Deliverable 5: Network Infrastructure and Security Due Week 8 and worth 120 points

This assignment consists of two (2) sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

With the parameters set forth at the onset of the project, present the infrastructure and security policy that will support the expected development and growth of the organization. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. Since the company will be merging with a multinational company, virtualization and cloud technology should be taken into consideration. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy.

Section 1: Infrastructure Document 1. Write a five to ten (5-10) page infrastructure document in which you: a. Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology. b. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Explain the rationale for the logical and physical topographical layout of the planned network. Note: The graphically depicted solution is not included in the required page length. c. Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration. d. Create and describe a comprehensive security policy for the company that will: i. Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information. ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Your assignment must follow these formatting requirements:  Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.  Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.  Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 22 of 32 CIS 590 – Assignments and Rubrics

Section 2: Revised Project Plan Use Microsoft Project to: 2. Update the project plan (summary and detail) template, from Project Deliverable 4: Cloud Technology and Virtualization, with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks.

The specific course learning outcomes associated with this assignment are:  Describe the methods and best practices in implementing process change in IT organizations.  Describe the role and methods of technology-induced process improvement in organizations.  Use technology and information resources to research issues in information systems.  Write clearly and concisely about leadership issues and strategic insight of the Information systems domain using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Points: 120 Project Deliverable 5: Network Infrastructure and Security

Criteria Unacceptable Fair Proficient Exemplary Below 70% F 70-79% C 80-89% B 90-100% A Section 1: Infrastructure Document 1a. Identify possible Did not submit or Partially identified Satisfactorily identified Thoroughly identified network infrastructure incompletely identified possible network possible network possible network vulnerabilities. Address possible network infrastructure infrastructure infrastructure network vulnerabilities with infrastructure vulnerabilities. vulnerabilities. vulnerabilities. the appropriate security vulnerabilities. Did not Partially addressed Satisfactorily Thoroughly addressed measures. Ensure that submit or incompletelynetwork addressed network network vulnerabilities consideration is given to addressed network vulnerabilities with vulnerabilities with the with the appropriate virtualization and cloud vulnerabilities with the the appropriate appropriate security security measures. technology. appropriate security security measures. measures. Thoroughly ensured Weight: 20% measures. Did not Partially ensured thatSatisfactorily ensured that consideration is submit or incompletelyconsideration is that consideration is given to virtualization ensured that given to virtualization given to virtualization and cloud technology. consideration is given and cloud and cloud technology. to virtualization and technology. cloud technology. 1b. Design a logical and Did not submit or Partially designed a Satisfactorily designed Thoroughly designed physical topographical incompletely designedlogical and physical a logical and physical a logical and physical layout of the planned a logical and physical topographical layout topographical layout of topographical layout of network through the use of topographical layout of the planned the planned network the planned network graphical tools in Microsoft of the planned network through the through the use of through the use of Word or Visio, or an open network through the use of graphical toolsgraphical tools in graphical tools in source alternative such as use of graphical tools in Microsoft Word or Microsoft Word or Microsoft Word or Dia. Explain the rationale in Microsoft Word or Visio, or an open Visio, or an open Visio, or an open for the logical and physical Visio, or an open source alternative source alternative such source alternative topographical layout of the source alternative such as Dia. Partially as Dia. Satisfactorily such as Dia. planned network. such as Dia. Did not explained the explained the rationale Thoroughly explained Weight: 20% submit or incompletelyrationale for the for the logical and the rationale for the explained the logical and physical physical topographical logical and physical rationale for the topographical layout layout of the planned topographical layout of logical and physical of the planned network. the planned network. topographical layout network. of the planned © 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 23 of 32 CIS 590 – Assignments and Rubrics

network. 1c. Illustrate the possible Did not submit or Partially illustrated Satisfactorily illustrated Thoroughly illustrated placement of servers, incompletely the possible the possible placement the possible including access paths to illustrated the possibleplacement of of servers, including placement of servers, the Internet and firewalls. placement of servers, servers, including access paths to the including access paths Weight: 15% including access access paths to the Internet and firewalls. to the Internet and paths to the Internet Internet and firewalls. and firewalls. firewalls. 1di. Create and describe a Did not submit or Partially created and Satisfactorily created Thoroughly created comprehensive security incompletely created described a and described a and described a policy for the company and described a comprehensive comprehensive comprehensive that will protect the comprehensive security policy for thesecurity policy for the security policy for the company infrastructure security policy for the company that will company that will company that will and assets by applying the company that will protect the company protect the company protect the company principals of CIA. protect the company infrastructure and infrastructure and infrastructure and Weight: 15% infrastructure and assets by applying assets by applying the assets by applying the assets by applying thethe principals of CIA. principals of CIA. principals of CIA. principals of CIA. 1dii. Create and describe Did not submit or Partially created and Satisfactorily created Thoroughly created a comprehensive security incompletely created described a and described a and described a policy for the company and described a comprehensive comprehensive comprehensive that will address ethical comprehensive security policy for thesecurity policy for the security policy for the aspects related to security policy for the company that will company that will company that will employee behavior, company that will address ethical address ethical aspectsaddress ethical contractors, password address ethical aspects related to related to employee aspects related to usage, and access to aspects related to employee behavior, behavior, contractors, employee behavior, networked resources and employee behavior, contractors, password usage, and contractors, password information. contractors, password password usage, access to networked usage, and access to Weight: 15% usage, and access to and access to resources and networked resources networked resources networked resources information. and information. and information. and information. Section 2: Revised Project Plan 2. Update the project plan Did not submit or Partially updated the Satisfactorily updated Thoroughly updated from Project Deliverable 4: incompletely updatedproject plan from the project plan from the project plan from Cloud Technology and the project plan from Project Deliverable Project Deliverable 4: Project Deliverable 4: Virtualization, with three to Project Deliverable 4: Cloud Technology Cloud Technology and Cloud Technology and five (3-5) new project tasks 4: Cloud Technology and Virtualization, Virtualization, with Virtualization, with each consisting of five to and Virtualization, with three to five (3- three to five (3-5) new three to five (3-5) new ten (5-10) subtasks. with three to five (3- 5) new project tasks project tasks each project tasks each Weight: 5% 5) new project tasks each consisting of consisting of five to ten consisting of five to each consisting of five to ten (5-10) (5-10) subtasks. ten (5-10) subtasks. five to ten (5-10) subtasks. subtasks. 3. Clarity, writing More than 6 errors 5-6 errors present 3-4 errors present 0-2 errors present mechanics, and formatting present requirements Weight: 10%

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 24 of 32 CIS 590 – Assignments and Rubrics

Project Deliverable 6: Final Project Plan Due Week 10 and worth 200 points

This assignment consists of four (4) sections: a written project plan, a revised business requirements document, a project plan PowerPoint presentation, and the finalized project plan. You must submit the four (4) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

While taking all business and project parameters into consideration, make quality assumptions to support the following requirements.

Section 1: Written Project Plan You are now in the final stage of the project plan development. All previous documentation should be combined into one (1) document that will serve as the statement of work for the project. Your goal is to have the project approved by the executive team. The project plan should be very detailed, which is appropriate to accomplish the monumental task of implementation; however, the executive team is only interested in a thirty (30) minute summation. Therefore, you also must create a compelling executive summary that is supported by your detail that convinces the executive team that it should move forward with your solution. 1. Develop a thirty to forty (30-40) page project plan in which you: a. Write a five to ten (5-10) page executive summary in which you provide a high-level technical overview of your project where you address the following: i. Describe the scope of the project and control measures. ii. Describe the goals and objectives of the project. iii. Give a detailed, realistically estimated cost analysis of the entire project, including technical resources (human capital) that may be needed to complete the project. iv. Relate the value of the project plan solution to the competitive advantage that information technology will afford the organization. v. Provide all aspects of the information technology implementation into the project plan. vi. Recommend solution providers who can assist with development and implementation. Include a cost analysis of at least three (3) providers. b. Combine all previous documentation for Project Deliverables 1-5 in which you: i. Provide all aspects of the information technology implementation into the project plan. ii. Revise the documentation based on feedback from the earlier evaluation of the deliverable. c. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:  Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 25 of 32 CIS 590 – Assignments and Rubrics

 Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.  Include charts or diagrams created in MS Visio and MS Project as appendix of the Word document. Make reference of these files in the body of the Word document.

Section 2: Revised Business Requirements Document 2. Document all revisions made to the written project plan in the Document Control section of the business requirements document from Project Deliverable 2: Business Requirements. Note: This documentation must outline the revisions made to the previous deliverables required in Section 1: Written Project Plan.

Section 3: Project Plan PowerPoint Presentation Additional to your detailed executive summary you must present your findings to the executive team and the venture capital group that along with the executive summary will convince the group that your solution is optimal. 3. Create a ten to fifteen (10-15) slide PowerPoint presentation in which you: a. Illustrate the concepts from the executive summary in Section 1 of this assignment. b. Create bulleted speaking notes for your presentation to the executive board in the Notes section of the PowerPoint. Note: You may create or assume any fictitious names, data, or scenarios that have not been established in this assignment for a realistic flow of communication. c. Use a professional technically written style to graphically convey the information.

Section 4: Finalized Project Plan Use Microsoft project to: 4. Finalize your project plan from Project Deliverable 5: Network Infrastructure and Security to include all necessary changes in assumptions, tasks, and / or subtasks.

The specific course learning outcomes associated with this assignment are:  Describe the methods and best practices in implementing process change in IT organizations.  Describe the role and methods of technology-induced process improvement in organizations.  Develop an integrative technology project plan to address and solve a proposed business problem.  Use technology and information resources to research issues in information systems.  Write clearly and concisely about leadership issues and strategic insight of the Information systems domain using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Points: 200 Project Deliverable 6: Final Project Plan

Criteria Unacceptable Fair Proficient Exemplary Below 70% F 70-79% C 80-89% B 90-100% A Section 1: Written Project Plan 1ai. Describe the scope of Did not submit or Partially described the Satisfactorily described Thoroughly described the project and control incompletely scope of the project the scope of the projectthe scope of the © 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 26 of 32 CIS 590 – Assignments and Rubrics measures. described the scope and control measures.and control measures. project and control Weight: 5% of the project and measures. control measures. 1aii. Describe the goals Did not submit or Partially described the Satisfactorily described Thoroughly described and objectives of the incompletely goals and objectives the goals and the goals and project. described the goals of the project. objectives of the objectives of the Weight: 5% and objectives of the project. project. project. 1aii. Give a detailed, Did not submit or Partially gave a Satisfactorily gave a Thoroughly gave a realistically estimated cost incompletely gave a detailed, realistically detailed, realistically detailed, realistically analysis of the entire detailed, realistically estimated cost estimated cost analysis estimated cost project, including human estimated cost analysis of the entire of the entire project, analysis of the entire capital. analysis of the entire project, including including human project, including Weight: 10% project, including human capital. capital. human capital. human capital. 1aiv. Relate the value of Did not submit or Partially related the Satisfactorily related Thoroughly related the the project plan solution to incompletely related value of the project the value of the project value of the project the competitive advantage the value of the plan solution to the plan solution to the plan solution to the that information project plan solution competitive competitive advantage competitive advantage technology will afford the to the competitive advantage that that information that information organization. advantage that information technology will afford technology will afford Weight: 5% information technology will afford the organization. the organization. technology will afford the organization. the organization. 1av. Provide all aspects of Did not submit or Partially provided all Satisfactorily provided Thoroughly provided the information technology incompletely aspects of the all aspects of the all aspects of the implementation into the provided all aspects information information technology information technology project plan. of the information technology implementation into the implementation into Weight: 5% technology implementation into project plan. the project plan. implementation into the project plan. the project plan. 1avi. Recommend solution Did not submit or Partially Satisfactorily Thoroughly providers who can assist incompletely recommended recommended solution recommended solution with development and recommended solution providers whoproviders who can providers who can implementation. solution providers can assist with assist with assist with Weight: 10% who can assist with development and development and development and development and implementation. implementation. implementation. implementation. 1bi. Combine all previous Did not submit or Partially all previous Satisfactorily all Thoroughly all documentation for Project incompletely documentation for previous previous Deliverables 1-5 in which combined all Project Deliverables documentation for documentation for you provide all aspects of previous 1-5 in which you Project Deliverables 1- Project Deliverables 1- the information technology documentation for provide all aspects of 5 in which you provide 5 in which you provide implementation into the Project Deliverables the information all aspects of the all aspects of the project plan. 1-5 in which you technology information technology information technology Weight: 5% provide all aspects ofimplementation into implementation into the implementation into the information the project plan. project plan. the project plan. technology implementation into the project plan. 1bii. Combine all previous Did not submit or Partially all previous Satisfactorily all Thoroughly all documentation for Project incompletely documentation for previous previous Deliverables 1-5 in which combined all Project Deliverables documentation for documentation for you revise the previous 1-5 in which you Project Deliverables 1- Project Deliverables 1- documentation based on documentation for revise the 5 in which you revise 5 in which you revise feedback from the earlier Project Deliverables documentation based the documentation the documentation

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 27 of 32 CIS 590 – Assignments and Rubrics evaluation of the 1-5 in which you on feedback from the based on feedback based on feedback deliverable. revise the earlier evaluation of from the earlier from the earlier Weight: 5% documentation the deliverable. evaluation of the evaluation of the based on feedback deliverable. deliverable. from the earlier evaluation of the deliverable. 1c. 5 references No references Does not meet the Meets number of Exceeds number of Weight: 5% provided required number of required references; all required references; references; some references high quality all references high references poor choices. quality choices. quality choices. Section 2: Revised Business Requirements Document 2. Document all revisions Did not submit or Partially documented Satisfactorily Thoroughly made to the written project incompletely all revisions made to documented all documented all plan in the Document documented all the written project revisions made to the revisions made to the Control section of the revisions made to plan in the Document written project plan in written project plan in business requirements the written project Control section of the the Document Control the Document Control document from Project plan in the Documentbusiness section of the business section of the Deliverable 2: Business Control section of therequirements requirements business requirements Requirements. business document from document from Project document from Project Weight: 5% requirements Project Deliverable 2: Deliverable 2: BusinessDeliverable 2: document from Business Requirements. Business Project Deliverable Requirements. Requirements. 2: Business Requirements. Section 3: Project Plan PowerPoint Presentation 3a. Create a ten to fifteen Did not submit or Partially created a ten Satisfactorily created a Thoroughly created a (10-15) slide PowerPoint incompletely created to fifteen (10-15) slide ten to fifteen (10-15) ten to fifteen (10-15) presentation in which you a ten to fifteen (ten PowerPoint slide PowerPoint slide PowerPoint illustrate the concepts to fifteen (10-15)) presentation in which presentation in which presentation in which from the executive slide PowerPoint you illustrated the you illustrated the you illustrated the summary in Section 1 of presentation in whichconcepts from the concepts from the concepts from the this assignment. you illustrated the executive summary in executive summary in executive summary in Section 1 of this Section 1 of this Section 1 of this Weight: 5% concepts from the executive summary assignment. assignment. assignment. in Section 1 of this assignment. 3b. Create a ten to fifteen Did not submit or Partially created a ten Satisfactorily created a Thoroughly created a (10-15) slide PowerPoint incompletely created to fifteen (10-15) slide ten to fifteen (10-15) ten to fifteen (10-15) presentation in which you a ten to fifteen (10- PowerPoint slide PowerPoint slide PowerPoint create bulleted speaking 15) slide PowerPoint presentation in which presentation in which presentation in which notes for your presentation in whichyou created bulleted you created bulleted you created bulleted presentation to the you created bulleted speaking notes for speaking notes for yourspeaking notes for executive board in the speaking notes for your presentation to presentation to the your presentation to Notes section of the your presentation to the executive board in executive board in the the executive board in PowerPoint. the executive board the Notes section of Notes section of the the Notes section of Weight: 5% in the Notes section the PowerPoint. PowerPoint. the PowerPoint. of the PowerPoint. 3c. Create a ten to fifteen Did not submit or Partially created a ten Satisfactorily created a Thoroughly created a (10-15) slide PowerPoint incompletely created to fifteen (10-15) slide ten to fifteen (10-15) ten to fifteen (10-15) presentation in which you a ten to fifteen (10- PowerPoint slide PowerPoint slide PowerPoint use a professional 15) slide PowerPoint presentation in which presentation in which presentation in which technically written style to presentation in whichyou used a you used a you used a graphically convey the you used a professional professional technically professional information. professional technically written written style to technically written © 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 28 of 32 CIS 590 – Assignments and Rubrics

Weight: 5% technically written style to graphically graphically convey the style to graphically style to graphically convey the information. convey the convey the information. information. information. Section 4: Finalized Project Plan 4. Finalize your project Did not submit or Partially finalized your Satisfactorily finalized Thoroughly finalized plan from Project incompletely project plan from your project plan from your project plan from Deliverable 5: Network finalized your project Project Deliverable 5: Project Deliverable 5: Project Deliverable 5: Infrastructure and Security plan from Project Network Infrastructure Network Infrastructure Network Infrastructure to include all necessary Deliverable 5: and Security to and Security to include and Security to include changes in assumptions, Network include all necessary all necessary changes all necessary changes tasks, and / or subtasks. Infrastructure and changes in in assumptions, tasks, in assumptions, tasks, Weight: 15% Security to include allassumptions, tasks, and / or subtasks. and / or subtasks. necessary changes and / or subtasks. in assumptions, tasks, and / or subtasks. 5. Clarity, writing More than 6 errors 5-6 errors present 3-4 errors present 0-2 errors present mechanics, and formatting present requirements Weight: 10%

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 29 of 32 CIS 590 – Student Notes

Weekly Course Schedule The purpose of the course schedule is to give you, at a glance, the required preparation, activities, and evaluation components of your course. For more information about your course, whether on-ground or online, access your online course shell. The expectations for a 4.5 credit hour course are for students to spend 13.5 hours in weekly work. This time estimate includes preparation, activities, and evaluation regardless of the delivery mode.

Instructional Materials In order to be fully prepared, obtain a copy of the required textbooks and other instructional materials prior to the first day of class. When available, Strayer University provides a link to the first three (3) chapters of your textbook(s) in eBook format. Check your online course shell for availability. Review the online course shell or check with your professor to determine whether Internet-based assignments and activities are used in this course. Strayer students are encouraged to purchase their course materials through our designated Strayer Bookstore. http://www.strayerbookstore.com If a lab is required for the course, the Strayer Bookstore is the only vendor that sells the correct registration code so that Strayer students may access labs successfully.

Kaltura Video Sessions Instructors will record video or screen capture sessions using Kaltura in Weeks 2 and 4. Your instructor may also provide these sessions on a weekly basis to act as student tutorials on the following applicable procedures:  Running and navigating the software or labs that will be used in this course  Demonstrating the use of relevant programming languages and tools through screen capture and live navigation.  Logging into the lab environments and running a sample lab required in this course (if labs are required)  Demonstrating the downloading and installing of software to a student’s computer (if necessary) or using the software already installed in the Strayer University campus labs  Locating or finding files and other student materials that may be required to use in assignments  Submitting assignments in Blackboard You are strongly advised to use the material provided by faculty in these sessions. Online and Ground instructors will post the Kaltura video recorded sessions to the Instructor Insights folder within the weekly tabs of the online course shell (Blackboard).

Study Buddy Wiki The School of Information Systems and Technology provides Study Buddy Wikis for nine (9) course categories which include: Homeland Security, Computer Security, Programming, Database Management, Web Design, Software Engineering, Networking, Capstone, and Infrastructure. You will be provided a direct link to the courses aligned within your program to post questions, search for answers, add helpful tips, and to assist other students. You should post to the Study Buddy Wiki board that corresponds to the course(s) you are currently taking. Assigned faculty will be monitoring to assist as needed.

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 30 of 32 CIS 590 – Student Notes

Discussions To earn full credit in an online threaded discussion, students must have one original post and a minimum of one other post per discussion thread. Please note: Material in the online class will be made available on the previous Thursday. As it is always possible that students could lose their work due to unforeseen circumstances, it is a best practice to routinely save a working draft in a separate file before posting in the course discussion area.

Professors hold discussions during class time for on-ground students. Check with your professor if any additional discussion participation is required in the online course shell outside of class hours.

Tests Tests (quizzes, midterm and final exams, essay exams, lab tests, etc.) are available for student access and completion through the online course shell. Check the online course shell to determine how you are expected to take the tests.  Online students are to complete the test by Monday 9:00 a.m. Details regarding due dates are posted in the Blackboard Calendar tool.  On-ground students are to complete the tests after the material is covered and before the next class session.

Assignments A standardized performance grading rubric is a tool your professor will use to evaluate your written assignments. Review the rubric before submitting assignments that have grading rubrics associated with them to ensure you have met the performance criteria stated on the rubric. Grades are based on individual effort. There is no group grading; however, working in groups in the online or on-ground classroom is acceptable. Assignments for online students are always submitted through the online course shell. On-ground professors will inform students on how to submit assignments, whether in paper format or through the online course shell.

Association for Computing Machinery (ACM) Digital Library The ACM Digital Library is a complete collection of all of ACM’s publications, including ACM journals, conference proceedings, magazines, newsletters, and multimedia titles. The ACM Digital Library contains the largest and most complete full-text archive of articles on computing available today, consisting of: 2.0+ Million Pages of full-text articles , 20,000 New full-text articles added each year, 40+ High Impact Journals , 270+ Conference Proceedings Titles, 9 Magazines (including the flagship Communications of the ACM), 43 Special Interest Groups contributing content. You are encouraged to search the ACM Digital Library for full-text articles for your writing assignments and Term Papers refereed referenced material. For more information on the ACM Digital Library please watch the video located in the Student Center tab of the online course shell (Blackboard). To access the ACM Digital Library: Students: 1. Login to iCampus: http://icampus.strayer.edu 2. Click on Student Services 3. Click on Learning Resource Center 4. Click on Databases

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 31 of 32 CIS 590 – Student Notes

5. Scroll down to Information Systems/Computing 6. Click on ACM Digital Library

Resources The Resource Center navigation button in the online course shell contains helpful links. Strayer University Library Resources are available here as well as other important information. You should review this area to find resources and answers to common questions. Technical support is available for the following:  For technical questions, please contact Strayer Online Technical Support by logging in to your iCampus account at https://icampus.strayer.edu/login and submitting a case under “Student Center,” then “Submit Help Ticket.” If you are unable to log in to your iCampus account, please contact Technical Support via phone at (877) 642-2999.

 For concerns with your class, please access the Solution Center by logging in to your iCampus account at https://icampus.strayer.edu/login and submitting a case under “Student Center,” then “Submit Help Ticket.” If you are unable to log in to your iCampus account, please contact the IT Help Desk at (866) 610-8123 or at mailto:[email protected]. TurnItIn.com is an optional online tool to assess the originality of student written work. Check with your professor for access and use instructions. The Strayer Policies link on the navigation bar in the online course shell contains academic policies. It is important that students be aware of these policies.

© 2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 590 Student Version 1134 (1159 1-15-2013) Final Page 32 of 32

Recommended publications