Overview This is the second of a series of five sequential assignments (the course project) in which you continue to act as the Chief Technology O
Overview
This is the second of a series of five sequential assignments (the course project) in which you continue to act as the Chief Technology Officer (CTO) of a hypothetical, e-commerce start-up company of your design.
You have been tasked with delivering an information technology project plan in anticipation of the company relocating to a new facility. In the first course deliverable, you created a project plan inception document and supporting Gantt chart (ATTACHED). This deliverable spelled out the company’s background information and business and provided an overview of the company’s information system infrastructure.
In this second course project deliverable, you are responsible for developing the business requirements to be incorporated into the information systems design you are creating.
Procuring quality business requirements is a critical step when designing quality information systems. Completing a quality requirements document captures user needs and expectations to facilitate the proper design of the company’s infrastructure and information systems.
This assignment consists of two parts:
Part 1: Business Requirements
You will develop a 5–7-page business requirements document for your hypothetical e-commerce company as part of the overall information systems project plan you are creating. Using the Business Requirements Template [DOCX], you will speculate on the company’s current and future requirements. Your assumptions need to be carefully considered and realistic.
Instructions
Business Requirements
Using the Business Requirements Template, you are to write a 5–7-page business requirements document for your hypothetical e-commerce company in which you:
- Describe the functional business requirements (scope) and scope control.
- Describe non-functional business requirements, such as governance, risk, and compliance.
- Describe technical requirements to integrate various e-commerce infrastructure components.
- Identify potential risks, constraints, and assumptions.
- Use three sources to support your writing.
- Choose sources that are credible, relevant, and appropriate.
- Cite each source listed on your source page at least one time within your assignment.
- Access the library or review library guides for help with research, writing, and citation
|
CIS498 |
Business Requirements Template
Note:
· Answer the questions identified on each section of the template.
· This document contains instructions, questions, and prompts that should be replaced with your own content. Be sure to delete all such text from each section and replace them with your own work before submitting your assignment. (These notes should also be deleted.)
Project Overview (one-half to 1 page)
(Replace this section with your Project Overview before submitting your assignment.) Address these questions in your Project Overview:
· At a high-level, what is this project all about?
· What business problem(s) will this project solve?
· What are the project’s three to five major goals?
· What is IT’s role in this project?
Functional Business Requirements (Scope) and Scope Control (2–3 pages)
(Replace this section with your Functional Business Requirements and Scope Control sections before submitting your assignment.) This project’s scope includes a number of areas. Select those areas that apply to your particular hypothetical e-commerce company and project. For each area you select, describe the scope and one or more strategies to incorporate the area into the overall project:
Area |
Scope |
Incorporation Strategies |
Applications |
To meet the target production date, only these applications will be implemented: |
|
Sites |
These sites are considered part of the implementation: |
|
Process Re-engineering |
Re-engineering will: |
|
Customization |
Customizations will be limited to: |
|
Interfaces |
Interfaces included are: |
|
Architecture |
Application and technical architecture will: |
|
Conversion |
Only the following data and volume will be considered for conversion: |
|
Testing |
Testing will include only: |
|
Funding |
Project funding is limited to: |
|
Training |
Training will be: |
|
Education |
Education will include: |
|
Other |
||
Other |
Scope Control
Change control will manage changes to the scope identified in this document. Any changes affecting project costs and timelines require business owner approval.
Non-functional Business Requirements (Governance, Risk, Compliance) (1 page)
Governance
(Delete this question once you have written your section answering it.) What are the 3–5 most important non-functional business requirements related to governance?
Non-functional business requirements related to governance include:
Risk
(Delete this question once you have written your section answering it.) What are the 3–5 most important non-functional business requirements related to risk?
Non-functional business requirements related to risk include:
Compliance
(Delete this question once you have written your section answering it.) What are the 3–5 most important non-functional business requirements related to compliance?
Non-functional business requirements related to compliance include:
Other
(Delete this question once you have written your section answering it.) What other non-functional business requirements apply to your particular e-commerce company and project?
Technical Requirements for Integration of E-commerce Components (1 page)
(Delete this question once you have written your section answering it.) What are the 3–5 most critical technical requirements necessary to integrate e-commerce components?
Potential Risks, Constraints, and Assumptions (1 page)
Risks
· (Delete this question once you have written your section answering it.)What are the 3–5 most significant risks that could affect the project’s progression and completion?
· (Delete this question once you have written your section answering it.) For each risk, what strategies could be employed to prevent or mitigate the risk?
Risk |
Preventative/Mitigating Strategies |
Risk #1 |
|
Risk #2 |
|
Risk #3 |
|
Risk #4 |
|
Risk #5 |
Constraints
(Delete this question once you have written your section answering it.) What are the 3–5 most significant constraints that pertain to this project?
These constraints have been identified:
Assumptions
(Delete this question once you have written your section answering it.) What are the 3–5 most significant assumptions relating to this project’s scope, objectives, and approach?
The most significant assumptions related to defining this project scope, objectives, and approach scope include:
© 2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.
Page 1 of 4
,
Project Plan Inception 2
Project Plan Inception 2
Project Plan Inception
CIS498
April 15, 2022
Company description
Ed2Go is an eCommerce company in the education industry that offers unique services and products to target customers worldwide. To help low-income students gain access to higher education, Ed2Go provides innovative services. In order to achieve this strategic objective, a web-based platform must be created and developed so that the target population can access the services. This entails making the product as user-friendly as possible and including all necessary information for the intended audience. The product's flexibility to adapt to client needs is a critical area. Ed2Go's goal is to provide a one-stop-shop of information and resources for high school students looking to attend college. This includes information about schools and other higher education institutions, financial aid, and other forms of guidance.
Business type
The company focuses on providing educational services and other services that support education. The company's primary focus is higher learning education, one of the areas in education that are least prioritized in enhancing efficiency and convenience for students to access education. One of the services provided by the company includes lectures and tutorials from lecturers and other experts in different fields. This enables the student to access the learning materials from the comfort of their smartphones or computer systems. The second type of education service provided by the company includes mentor services. This is a result of the vast market gap where many students get confused about the courses to take in higher education institutions, with some ending up choosing courses only to drop out after a few years of learning. In ensuring the problem is addressed, the company offers a platform where a student can engage with a mentor who interacts with the student through the platform and assist the student in making more informed and better decisions. In addition, the services offered by the company include scholarships and links to sponsorships. This service serves more as a social responsibility than a profitable service. The service was created following increased concerns that many students across the world never manage to join the learning institutions of their dreams due to insufficient funds. Also, there are high net worth people with a will to assist needy students, but they lack a link to access the students. This is the gap filled by Ed2Go, where students can apply for available scholarships, and the company to vet the teachers.
Customers
There are three types of customers targeted by the company, all involved in the education sector. The first classification of customers includes students in higher learning institutions such as colleges and universities. These students need learning materials such as tutorials and notes on various subjects and courses learned in higher learning institutions. The second class of customers is mentors. These individuals have excelled in various professions and careers and can guide students. In qualifying for this class of customers, there is a form filled out by the target customer to verify their credibility as a mentor. This is done to enhance the company's ethical standards and ensure the students are guaranteed genuine information. The third class of customers is the sponsors as individuals or organizations that provide scholarships to needy or less privileged students.
Demographics
The company has segmented customers based on income level and interest psychographics. In terms of income, the company focuses on low and middle-class customers. These customers are price-sensitive and prefer purchasing a service or product that offers the lowest price but is worth quality features and offers. This classification fits the students who purchase lecture materials and tutorials from the company and students who apply for scholarships using the eCommerce platform. There are also high-income customers in terms of individuals and organizations. This is used in describing the sponsors and high net worth individuals who provide scholarships through the company (1).
Elements of eCommerce information system infrastructure
Several technologies go into electronic commerce, such as mobile commerce, e-funds transfer, supply chain management, online transaction processing, EDI, inventory management systems, and automated data collection. The World Wide Web is often used at some point in the transaction's life cycle, but it may also include email, mobile devices, social networks, and telephones in modern electronic commerce. E-commerce is widely regarded as the sales part of e-business. Financial and payment parts of a commercial transaction are also part of this process. This is one of the most efficient and successful ways to conduct business and communicate within a company. It is a strategy for entering a new market without having a physical presence there.
Firewalls are another essential part of online business or eCommerce. Firewalls are commonly used to protect network nodes from incoming and outgoing data traffic and specialized applications. To shield the network from external attacks, firewalls employ various technologies, including software, hardware, and cloud services. In order to prevent malicious traffic and data packets from passing through, a firewall must be in place. Using specified security rules, firewalls examine incoming traffic to identify a suspect or unsecured traffic and block it from entering the network. A computer's ports, where information is actually shared with external devices, are protected by security measures (1).
Encryption software is another part of the infrastructure of an e-commerce information system. If you want to keep your digital information safe from prying eyes, you will need encryption software. In addition to protecting digital information stored on computers, cryptography is also used to protect information transmitted via the Internet. Encryption software is available from a variety of sources. A cipher is used to transform the original content into ciphertext, which is then decrypted. To classify this sort of software, the encryption utilized is a good starting point. Both asymmetric and public key ciphers are under the umbrella term "ciphers,". They can be further broken down into two subcategories. Public key or symmetric key encryption can be used for encryption software. Software encryption can also be classified according to the goal it serves. Based on this technique, it is possible to categorize software encryption into "data in transit" and "data at rest". Asymmetric key ciphers are typically used for data in transit and asymmetric key ciphers for data at rest. Block ciphers and stream ciphers are subsets of symmetric key ciphers. stream ciphers are often used to encrypt real-time communications, such as audio or video information, by encrypting plaintext one bit or byte at a time. Plaintext encryption is achieved by decrypting the encrypted data using a keystream generator's output. In the storage stack, encryption can be applied at many levels. It is possible to configure encryption at the disk layer, on a partition of a disk, on a volume that is made up of disks and partitions, in user space applications like databases and other programs that run on the host operating system (2).
When a digital signature is applied to a digital message or document, it creates a unique virtual fingerprint that can be used to identify the sender and protect sensitive information. Emails have a digital signature that includes the content of the message. Compared to other electronic signatures, digital signatures offer much higher levels of security. Proof that a digital communication or document has not been altered after it was signed is how digital signatures functions. Digital signatures accomplish this by encrypting the message or document with the sender's private key and then creating a unique hash. The created hash is specific to the document or content, and any tampering with it results in a new hash. The message or document is signed digitally and transmitted to the receiver upon completion. The recipient then uses the sender's public key to decrypt the sender's hash and decrypts the message or digital document on their own. In order to verify the authenticity of a message or digital document, a recipient generates a unique hash and compares it to the hash generated by the sender (3).
In implementing an efficient information system infrastructure, nine tasks or applications will be made, with each task taking a distinct amount of time. The entire process of developing the eCommerce information system infrastructure and launching various programs is estimated to take one year. Launching the programs can be done through a simulation or cloud process.
Application/Task |
Interpretation |
App 1 |
Creating, launching, and evaluating mobile commerce. |
App 2 |
Developing, launching, and testing the electronic transfer of funds system. |
App 3 |
Developing, launching, and testing electronic data interchange. |
App 4 |
Developing a framework for electronic transaction processing. |
App 5 |
Developing internet marketing interventions and evaluating the effectiveness. |
Sources
1. Batra, S., & Arora, A. (2020). Adoption of eCommerce in MSME sector. PalArch's Journal of Archaeology of Egypt/Egyptology, 17(9), 5701-5710.
2. Li, J., Zhang, J., Qu, F., & Zhao, Y. (2018). The Influencing Factors Model of Cross-Border Ecommerce Development: A Theoretical Analysis. In Wuhan International Conference on e-Business. Association For Information Systems.
3. Nik Mahmud, N. N. A., & Othman, A. A. (2020). Effectiveness of e-commerce infrastructure towards purchase intention among STML students in UUM. In Symposium on Technology Management and Logistics (STML Go Green) 2019: Operations Management, Volume 1 (Vol. 1, No. 30, pp. 103-105). Universiti Utara Malaysia.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.