Case study: a successful strategic IT system
Course Project Assignment:
Students should research the literature and interview people who are involved in projects at their workplace if possible. Students should prepare a comprehensive paper of at least 20 pages (APA format) on their findings. The paper should propose a fictional company, then students should incorporate their findings from their interview and research and justify a business case for the use of the technology.
Students will develop their projects in phases:
Proposal/Outline (due in Week 2)
Annotated Bibliography (due in Week 4)
Project Draft (due in Week 6)
Final Project (due in Week 8)
Each phase of the project is worth a certain amount of the students final grade in the course. See the Syllabus for the exact weight of each project phase in the final course grade.
Suggested Topics (students may suggest their own):
Advertising on the Web: options and trends
Search engine optimization, use and strategies
Security issues, problems and solutions in organizational IT systems
Legal and technical problems and solutions in medical IT systems
Security on the Internet: problems and solutions
Facilitation of collaborative work using IT systems
Using virtual reality in businesses
A case study: a successful strategic IT system
A case study: a failed IT development project
Customer privacy issues
Challenges and solutions using social media
RFID: trends and challenges
I have done part of the assignment where I looked up possible sources, but that can be adjusted. Here is the list of sources:
Sweeney, R. (2010). Achieving service-oriented architecture applying an enterprise architecture approach. Hoboken, NJ: Wiley.
Lientz, B. (2010). Breakthrough strategic IT and process planning. Hackensack, NJ: World Scientific.
Erwin, K. (2014). Communicating the new how to make the complex, unfamiliar or still-fuzzy understandable to others. Hoboken, NJ: John Wiley & Sons, Inc.
Kirk, A. (2012). Data Visualization a successful design process. Birmingham: Packt Pub.
Jacobs, J. (2014). Data-Driven Security Analysis, Visualization and Dashboards. City: Wiley.
Axelrod, C. (2013). Engineering safe and secure software systems. Boston: Artech House.
Woody, A. (2013). Enterprise Security a Data-Centric Approach to Securing the Enterprise. Birmingham: Packt Pub.
McQuiggan, J. & Sapp, A. (2014). Implement, improve and expand your statewide longitudinal data system : creating a culture of data in education. Hoboken, N.J: Wiley.
Langer, A. & Yorks, L. (2013). Strategic IT : best practices for managers and executives. Hoboken, New Jersey: John Wiley & Sons, Inc.
Here are additional instructions provided by the instructor regarding sources:
This week the draft of your assignment is due. Please remember there is a good rule of thumb that you should have at least 4 references per page for a good research paper. That is not to say that an article cannot be used as a reference in more than one page. For example, suppose you had a 4 page paper with 6 total references, page 1 could have references to A, C, B, E, page 2 to F, D, A, C, etc. Remember, all facts that are not common knowledge should be supported by references.