IT 210 Milestone 3 Final

1

IT 210 Final Project Guidelines and Rubric

Overview
Technology has changed our lives drastically in the past twenty years. For example, consider the rise of mobile devices connected to the internet using wireless
communication. We have progressed from shopping solely in brick-and-mortar stores to having the ability to do anything from renting a vacation home to
purchasing cupcakes online using a mobile device. To keep up with how consumers communicate, businesses have to incorporate these devices and
technologies into their business models to reach customers. Developing appropriate technical solutions to business problems begins with defining, analyzing,
and documenting the necessary requirements.

For this project, you will play the role of an employee working for a small brick-and-mortar business. Your business is seeking to establish an online presence, but
it must first invest in new technology. You will create a business systems analysis to provide the business owner with your recommendations for a technology
solution that will support her venture into e-commerce.

The project is divided into two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Modules Three and Five. The final product will be submitted in Module Seven. Use the Final Project
template document to ensure you have met all requirements before submitting your final draft.

In this assignment, you will demonstrate your mastery of the following course outcomes:

 Analyze a business organization for determining the business requirements related to information technology systems

 Articulate the role and function of information systems in business organizations for how they impact business operations

 Recommend appropriate information technology options for effectively supporting business operations

 Recommend basic security considerations related to business information systems for effectively securing company data

Prompt
Imagine that you work for the small brick-and-mortar business described in the final project case scenario. The owner of your business wants to focus on
generating new revenue through e-commerce, but she knows that this change in operations requires the company to integrate new technology. To gain an
understanding of what the business might need for technology, she has asked you to create a business systems analysis. In this analysis, you will clearly
introduce the problem that your business is facing. Then, you will determine the business requirements for solving that problem, including the requirements
that any new technology needs to meet. Next, you will explain how your competitors are using the two technologies in which you are investing, to determine

http://snhu-media.snhu.edu/files/course_repository/undergraduate/it/it210/it210_final_project_case_scenario.pdf

2

whether those technologies are appropriate for your business. Finally, you will propose your recommendations for the technology solution that best meets the
needs of your business, including what your business owner must consider in regard to security and privacy of company data.

Select two of the following technologies to focus on in your business systems analysis paper:

 Big data and knowledge management

 Wireless, mobile computing, and mobile commerce

 Social computing

 Cloud computing

 analytics and business intelligence solutions

 Intelligent systems

Specifically, the following critical elements must be addressed:

I. Introduction: In this section, you will briefly introduce the small business from the case scenario, and the problem that it is trying to solve.
A. Clearly state the problem that the business owner is seeking to solve. Be sure to address the question of what your business ultimately wants to

do.
B. Identify and briefly describe the two technologies from the list provided that you will research in your business systems analysis.

II. Requirements: In this section, you will determine what the business requirements are for solving the stated problem, and establish the criteria

that will help form your technology recommendations. You will also articulate why the business owner should undertake the project of integrating new
technology.

A. Explain the objectives of undertaking this project to integrate new technology. In others words, what should the project accomplish, and how
does it support the goal of your business?

B. Provide a project description that explains the purpose of the project. Be sure to address the following:
i. What does your business need to do to satisfy the objectives?

ii. What are the desired results at the end of the project?
iii. Why is it important for your business owner to consider implementing new technology?

C. State the key technological requirements that will be required of any new technology in order to effectively solve your business’s problem. In
other words, what specifically does the technology need to be capable of doing? (These are the technology requirements in the decision matrix.)

3

III. Competitors and Technology: In this section, you will describe two competing companies that operate in the same industry as your business. You will
also explain how a company uses the two technologies that you are investigating in order to determine if the technology may be appropriate for your
business to use. Remember that a list of competing companies was provided to you in the final project case scenario.

A. Technology One: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and
how it uses this technology to support its business in general. Include specific examples.

B. Technology Two: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and
how it uses this technology to support its business in general. Include specific examples.

C. Referring to what you learned in your research on the companies above, explain one specific way in which one of the companies is benefitting
from technology, and describe the potential benefit to your business if you were to adopt the same approach.

IV. Technology Solutions: In this section, you will discuss how each of the two technologies meets the technology requirements that you identified in

section II. Use your decision matrix to guide your responses.
A. Technology One: Explain how well this technology meets the technology requirements of your business. Be sure to address which technology

requirements the technology meets, and where there are gaps.
B. Technology Two: Explain how well this technology meets the technology requirements of your business. Be sure to address which technology

requirements the technology meets, and where there are gaps.

V. Recommendations: In this section, you will recommend the technology solution that you believe is most appropriate for your business based on how
well each technology meets your business’s technology requirements.

A. Recommend a technology solution for your business, and defend why that solution is appropriate. You may recommend only one technology or
any combination of the two that you investigated.

B. Explain the overall benefit of your recommended technology solution to your business. Consider the following:
C. How will it will it enhance efficiency?

i. How will it position your business for future growth as you move online?

VI. Basic Security Considerations: In this section, you will briefly explain what the owner of your business must consider in regard to security and privacy if
they choose to adopt your recommendations.

A. Explain the security features your recommended technology solution should have.
B. Briefly explain what your business should consider in regard to security and privacy as you seek out third-party vendors for the proposed

technology.
C. Briefly describe the internal safeguards that should be put in place in your business to guard against loss or misuse of company data. Provide

examples.

4

Milestones
Milestone One: Introduction, Requirements, and Competitors and Technology
In Module Three, you will submit the first milestone, in which you will develop your problem statement, technology requirements, and suggested technologies
for your final project. This milestone will be graded with the Milestone One Rubric.

Milestone Two: Technology Solutions and Recommendations
In Module Five, you will submit the second milestone, in which you will research competitors and analyze the technologies they are using. This milestone will be
graded with the Milestone Two Rubric.

Module Seven: Basic Security Considerations
Please note you will not engage in Milestone work for Part VI of your final project, Basic Security Considerations. However, you will have an opportunity to work
through the information that will inform this part of your project in Module Seven as well as to ask your peers and instructors any questions you have in the
topic. At this point you should be able to finish this part of your final project and submit the completed draft with all pieces.

Final Submission: Systems Analysis
In Module Seven, you will submit your final project. It should be a complete, polished artifact containing all of the critical elements of the final product. It should
reflect the incorporation of feedback gained throughout the course. This submission will be graded with the Final Project Rubric.

5

Final Project Rubric
Guidelines for Submission: Using the Final Project Template, your business systems analysis should be 6–7 pages in length (not including a cover page and
references) and written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins.

Critical Elements Exemplary Proficient Needs Improvement Not Evident Value

Introduction: State
the Problem

Clearly states the problem that
the business owner is seeking
to solve (100%)

States the problem that the
business owner is seeking to
solve, but response is unclear
or contains inaccuracies (55%)

Does not state the problem
that the business owner is
seeking to solve (0%)

5.94

Introduction: Two
Technologies

Identifies and briefly describes
the two technologies that the
student will research in
business systems analysis
(100%)

Identifies the two technologies
that the student will research
in business systems analysis,
but does not describe them, or
description contains
inaccuracies (55%)

Does not identify the two
technologies that the student
will research in business
systems analysis (0%)

5.94

Requirements:

Objectives

Meets “Proficient” criteria,
and explanation
demonstrates sophisticated
awareness of the project’s
objectives (100%)

Explains the objectives of
project to integrate new
technology (85%)

Explains the objectives of
project to integrate new
technology, but explanation is
cursory or illogical or contains
inaccuracies (55%)

Does not explain the objectives
of project (0%)

5.94

Requirements:

Project Description

Meets “Proficient” criteria,
and project description
provided demonstrates keen
insight into the purpose of
the project (100%)

Provides a project description
that explains the purpose of
the project (85%)

Provides a project description
that explains the purpose of
the project, but description is
illogical, contains inaccuracies,
or is missing required
components (55%)

Does not provide a project
description (0%)

5.94

Requirements:
Technological
Requirements

Meets “Proficient” criteria,
and response demonstrates a
sophisticated awareness of
what the new technology
must be capable of doing for
the business (100%)

Describes the key technological
requirements that will be
required of any new
technology to effectively solve
the business’s problem (85%)

Describes the key technological
requirements that will be
required of any new
technology to effectively solve
the business’s problem, but
description is missing key
requirements or contains
inaccuracies (55%)

Does not describe the key
technological requirements
that will be required of any
new technology (0%)

5.94

6

Competitors and
Technology:

Technology One

Meets “Proficient” criteria,
and explanation
demonstrates keen insight
into the role and function of
the technology in the
competing company (100%)

Briefly describes what the
selected competing company
does and explains how it uses
the technology to support its
business, and includes specific
examples (85%)

Briefly describes what the
selected competing company
does and explains how it uses
the technology to support its
business, but does not include
specific examples, or examples
are inappropriate, or
explanation is cursory or
contains inaccuracies (55%)

Does not briefly describe what
the selected competing
company does or explain how
it uses the technology to
support its business (0%)

5.94

Competitors and
Technology:

Technology Two

Meets “Proficient” criteria,
and explanation
demonstrates keen insight
into the role and function of
the technology in the
competing company (100%)

Briefly describes what the
selected competing company
does and explains how it uses
the technology to support its
business, and includes specific
examples (85%)

Briefly describes what the
selected competing company
does and explains how it uses
the technology to support its
business, but does not include
specific examples, or examples
are inappropriate, or
explanation is cursory or
contains inaccuracies (55%)

Does not briefly describe what
the selected competing
company does or explain how
it uses the technology to
support its business (0%)

5.94

Competitors and
Technology:

Benefitting From
Technology

Meets “Proficient” criteria,
and description
demonstrates keen insight
into how the potential
technology could provide a
benefit to the business
(100%)

Explains one specific way in
which one of the competing
companies is benefitting from
technology, and describes the
potential benefit to the
business from the scenario if
they were to adopt the same
approach (85%)

Explains one specific way in
which one of the competing
companies is benefitting from
technology, but does not
describe the potential benefit
to the business from the
scenario, or description is
cursory or illogical (55%)

Does not explain one specific
way in which one of the
competing companies is
benefitting from technology
(0%)

5.94

Technology
Solutions:

Technology One

Meets “Proficient” criteria,
and explanation
demonstrates a sophisticated
awareness of how well the
technology meets the needs
of the business (100%)

Explains how well this
technology meets the
technology requirements of
the business (85%)

Explains how well this
technology meets the
technology requirements of
the business, but explanation
contains inaccuracies or is
missing required components
(55%)

Does not explain how well this
technology meets the
technology requirements of
the business (0%)

5.94

7

Technology
Solutions:

Technology Two

Meets “Proficient” criteria,
and explanation
demonstrates a sophisticated
awareness of how well the
technology meets the needs
of the business (100%)

Explains how well this
technology meets the
technology requirements of
the business (85%)

Explains how well this
technology meets the
technology requirements of
the business, but explanation
contains inaccuracies or is
missing required components
(55%)

Does not explain how well this
technology meets the
technology requirements of
the business (0%)

5.94

Recommendations:
Technology

Solution

Meets “Proficient” criteria,
and defense demonstrates a
complex grasp of how the
recommended technology
meets needs of the business
(100%)

Recommends a technology
solution for the business and
defends why that solution is
appropriate (85%)

Recommends a technology
solution for the business, but
does not defend why that
solution is appropriate, or
defense is illogical or contains
inaccuracies (55%)

Does not recommend a
technology solution for the
business (0%)

5.94

Recommendations:
Overall Benefit

Meets “Proficient” criteria,
and explanation
demonstrates keen insight
into how the business could
benefit from the
recommended technology
solution (100%)

Explains the overall benefit of
the recommended technology
solution to the business (85%)

Explains the overall benefit of
the recommended technology
solution to the business, but
explanation is cursory or
illogical or contains
inaccuracies (55%)

Does not explain the overall
benefit of the recommended
technology solution to the
business (0%)

5.94

Basic Security
Considerations:

Security Features

Meets “Proficient” criteria,
and description
demonstrates a complex
grasp of security features
necessary for protecting
company data (100%)

Describes the basic security
features the recommended
technology solution should
have in order to protect
company data (85%)

Describes the basic security
features the recommended
technology solution should
have, but description is cursory
or illogical (55%)

Does not describe the basic
security features the
recommended technology
solution should have (0%)

7.92

Basic Security
Considerations:

Third-Party
Vendors

Meets “Proficient” criteria,
and explanation
demonstrates a complex
grasp of security
considerations in regard to
potential third-party vendors
(100%)

Briefly explains what the
business should consider in
regard to security and privacy
as it seeks out third-party
vendors for the proposed
technology (85%)

Briefly explains what the
business should consider in
regard to security and privacy
as it seeks out third-party
vendors, but explanation is
cursory or illogical or contains
inaccuracies (55%)

Does not explain what the
business should consider in
regard to security and privacy
as it seeks out third-party
vendors for the proposed
technology (0%)

7.92

8

Basic Security
Considerations:

Internal Safeguards

Meets “Proficient” criteria,
and description provides
keen insight into what the
business can do internally to
protect company data
(100%)

Briefly describes the internal
safeguards that should be put
in place in the business to
guard against loss or misuse of
company data, and provides
examples (85%)

Describes the internal
safeguards that should be put
in place in the business to
guard against loss or misuse of
company data, but does not
provide examples, or
description is cursory or
illogical (55%)

Does not describe the internal
safeguards that should be put
in place in the business to
guard against loss or misuse of
company data (0%)

7.92

Articulation of
Response

Submission is free of errors
related to citations,
grammar, spelling, syntax,
and organization and is
presented in a professional
and easy-to-read format
(100%)

Submission has no major
errors related to citations,
grammar, spelling, syntax, or
organization (85%)

Submission has major errors
related to citations, grammar,
spelling, syntax, or
organization that negatively
impact readability and
articulation of main ideas
(55%)

Submission has critical errors
related to citations, grammar,
spelling, syntax, or
organization that prevent
understanding of ideas (0%)

4.96

Total 100%

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Open chat
1
You can contact our live agent via WhatsApp! Via + 1 929 473-0077

Feel free to ask questions, clarifications, or discounts available when placing an order.

Order your essay today and save 20% with the discount code GURUH