Project #12651 - Technology management

Cite any sources you used to support your argument using the APA format for in text citations and references.

 

Discussion # 4

 

Your work as a management information consultant has led you to a long-term project working on a custom decision support system software application. Use the library, course materials, and other credible sources to research the following approaches to the software development process:

 

•prototyping

 

•rapid application development

 

•object-oriented analysis and design

 

•business process engineering

 

Write 4–6 paragraphs that briefly explain your understanding of each of the approaches. Which approach do you think you would attempt for this project? Why? Explain the benefits of the approach in providing support to your answer.

 

Suggestions for Responding to Peers Posts

 

•Review a peer’s response who selected a different approach than the one that you chose. Compare and contrast the benefits of the approaches that each of you selected. What similarities or differences exist?

 

•Consider the draw backs to the approaches that either of you selected.

 

•What strategies would you suggest to ensure the success of the approach your peer has selected?

 

In your own words, post a response to the Discussion Board and

 

Discussion board 5

 

Assume that you have been asked to consult for a company that has branch offices in four continents. You have implemented a management information system that will enable its managers to exchange information about various company activities in the areas of marketing, sales, HR, finance, and administration. As part of the implementation process, you are required to make a recommendation on the types of security measures that should be taken with implementation of this system.  

 

Write 4–6 paragraphs responding to the following questions:

 

What are some of the potential security threats to managing information related to these activities across multiple locations?

 

What strategies or tools could be used to minimize these types of threats upon implementing a system in this situation?

Subject Business
Due By (Pacific Time) 09/18/2013 08:42 pm
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy