Loading...

FINAL PROJECT

Open Posted By: ahmad8858 Date: 16/02/2021 High School Assignment Writing

Specifically, the following critical elements must be addressed: 

* Technologies one and two include: big data and knowlegde and social computing*

I. Introduction: In this section, you will briefly introduce the small business from the case scenario, and the problem that it is trying to solve. 

A. Clearly state the problem that the business owner is seeking to solve. Be sure to address the question of what your business ultimately wants to do. 

B. Identify and briefly describe the two technologies from the list provided that you will research in your business systems analysis. 

II. Business Requirements: In this section, you will determine what the business requirements are for solving the stated problem, and establish the criteria that will help form your technology recommendations. You will also articulate why the business owner should undertake the project of integrating new technology. 

A. Explain the objectives of undertaking this project to integrate new technology. In others words, what should the project accomplish, and how does it support the goal of your business? 

B. Provide a project description that explains the purpose of the project. Be sure to address the following: 

i. What does your business need to do to satisfy the objectives? 

ii. What are the desired results at the end of the project? 

iii. Why is it important for your business owner to consider implementing new technology? 

C. State the key technological requirements that will be required of any new technology in order to effectively solve your business’s problem. In other words, what specifically does the technology need to be capable of doing? (These are the technology requirements in the decision matrix.

III. Competitors and Technology: In this section, you will describe two competing companies that operate in the same industry as your business. You will also explain how a company uses the two technologies that you are investigating in order to determine if the technology may be appropriate for your business to use. Remember that a list of competing companies was provided to you in the final project case scenario. 

A. Technology One: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and how it uses this technology to support its business in general. Include specific examples. 

B. Technology Two: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and how it uses this technology to support its business in general. Include specific examples. 

C. Referring to what you learned in your research on the companies above, explain one specific way in which one of the companies is benefitting from technology, and describe the potential benefit to your business if you were to adopt the same approach. 

VI. Basic Security Considerations: In this section, you will briefly explain what the owner of your business must consider in regard to security and privacy if they choose to adopt your recommendations. 

A. Explain the security features your recommended technology solution should have. 

B. Briefly explain what your business should consider in regard to security and privacy as you seek out third-party vendors for the proposed technology. 

C. Briefly describe the internal safeguards that should be put in place in your business to guard against loss or misuse of company data. Provide examples. 

 SECTIONS IV. ( Technology Solutions) and V. (Recommendations) add in work from ITMILESTONE TWO FILE


USE TEMPLATE IN UPLOADED FILES

Category: Business & Management Subjects: Business Law Deadline: 12 Hours Budget: $100 - $150 Pages: 2-3 Pages (Short Assignment)

Attachment 1

1

IT 210 Final Project Guidelines and Rubric

Overview Technology has changed our lives drastically in the past twenty years. For example, consider the rise of mobile devices connected to the internet using wireless communication. We have progressed from shopping solely in brick-and-mortar stores to having the ability to do anything from renting a vacation home to purchasing cupcakes online using a mobile device. To keep up with how consumers communicate, businesses have to incorporate these devices and technologies into their business models to reach customers. Developing appropriate technical solutions to business problems begins with defining, analyzing, and documenting the necessary requirements. For this project, you will play the role of an employee working for a small brick-and-mortar business. Your business is seeking to establish an online presence, but it must first invest in new technology. You will create a business systems analysis to provide the business owner with your recommendations for a technology solution that will support her venture into e-commerce. The project is divided into two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Three and Five. The final product will be submitted in Module Seven. Use the Final Project template document to ensure you have met all requirements before submitting your final draft. In this assignment, you will demonstrate your mastery of the following course outcomes:

 Analyze a business organization for determining the business requirements related to information technology systems

 Articulate the role and function of information systems in business organizations for how they impact business operations

 Recommend appropriate information technology options for effectively supporting business operations

 Recommend basic security considerations related to business information systems for effectively securing company data

Prompt Imagine that you work for the small brick-and-mortar business described in the final project case scenario. The owner of your business wants to focus on generating new revenue through e-commerce, but she knows that this change in operations requires the company to integrate new technology. To gain an understanding of what the business might need for technology, she has asked you to create a business systems analysis. In this analysis, you will clearly introduce the problem that your business is facing. Then, you will determine the business requirements for solving that problem, including the requirements that any new technology needs to meet. Next, you will explain how your competitors are using the two technologies in which you are investing, to determine

2

whether those technologies are appropriate for your business. Finally, you will propose your recommendations for the technology solution that best meets the needs of your business, including what your business owner must consider in regard to security and privacy of company data. Select two of the following technologies to focus on in your business systems analysis paper:

 Big data and knowledge management

 Wireless, mobile computing, and mobile commerce

 Social computing

 Cloud computing

 Business analytics and business intelligence solutions

 Intelligent systems Specifically, the following critical elements must be addressed:

I. Introduction: In this section, you will briefly introduce the small business from the case scenario, and the problem that it is trying to solve. A. Clearly state the problem that the business owner is seeking to solve. Be sure to address the question of what your business ultimately wants to

do. B. Identify and briefly describe the two technologies from the list provided that you will research in your business systems analysis.

II. Business Requirements: In this section, you will determine what the business requirements are for solving the stated problem, and establish the criteria

that will help form your technology recommendations. You will also articulate why the business owner should undertake the project of integrating new technology.

A. Explain the objectives of undertaking this project to integrate new technology. In others words, what should the project accomplish, and how does it support the goal of your business?

B. Provide a project description that explains the purpose of the project. Be sure to address the following: i. What does your business need to do to satisfy the objectives?

ii. What are the desired results at the end of the project? iii. Why is it important for your business owner to consider implementing new technology?

C. State the key technological requirements that will be required of any new technology in order to effectively solve your business’s problem. In other words, what specifically does the technology need to be capable of doing? (These are the technology requirements in the decision matrix.)

3

III. Competitors and Technology: In this section, you will describe two competing companies that operate in the same industry as your business. You will also explain how a company uses the two technologies that you are investigating in order to determine if the technology may be appropriate for your business to use. Remember that a list of competing companies was provided to you in the final project case scenario.

A. Technology One: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and how it uses this technology to support its business in general. Include specific examples.

B. Technology Two: Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and how it uses this technology to support its business in general. Include specific examples.

C. Referring to what you learned in your research on the companies above, explain one specific way in which one of the companies is benefitting from technology, and describe the potential benefit to your business if you were to adopt the same approach.

IV. Technology Solutions: In this section, you will discuss how each of the two technologies meets the technology requirements that you identified in

section II. Use your decision matrix to guide your responses. A. Technology One: Explain how well this technology meets the technology requirements of your business. Be sure to address which technology

requirements the technology meets, and where there are gaps. B. Technology Two: Explain how well this technology meets the technology requirements of your business. Be sure to address which technology

requirements the technology meets, and where there are gaps.

V. Recommendations: In this section, you will recommend the technology solution that you believe is most appropriate for your business based on how well each technology meets your business’s technology requirements.

A. Recommend a technology solution for your business, and defend why that solution is appropriate. You may recommend only one technology or any combination of the two that you investigated.

B. Explain the overall benefit of your recommended technology solution to your business. Consider the following: C. How will it will it enhance efficiency?

i. How will it position your business for future growth as you move online?

VI. Basic Security Considerations: In this section, you will briefly explain what the owner of your business must consider in regard to security and privacy if they choose to adopt your recommendations.

A. Explain the security features your recommended technology solution should have. B. Briefly explain what your business should consider in regard to security and privacy as you seek out third-party vendors for the proposed

technology. C. Briefly describe the internal safeguards that should be put in place in your business to guard against loss or misuse of company data. Provide

examples.

4

Milestones Milestone One: Introduction, Business Requirements, and Competitors and Technology In Module Three, you will submit the first milestone, in which you will develop your problem statement, technology requirements, and suggested technologies for your final project. This milestone will be graded with the Milestone One Rubric. Milestone Two: Technology Solutions and Recommendations In Module Five, you will submit the second milestone, in which you will research competitors and analyze the technologies they are using. This milestone will be graded with the Milestone Two Rubric. Module Seven: Basic Security Considerations Please note you will not engage in Milestone work for Part VI of your final project, Basic Security Considerations. However, you will have an opportunity to work through the information that will inform this part of your project in Module Seven as well as to ask your peers and instructors any questions you have in the topic. At this point you should be able to finish this part of your final project and submit the completed draft with all pieces. Final Submission: Business Systems Analysis In Module Seven, you will submit your final project. It should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded with the Final Project Rubric.

5

Final Project Rubric Guidelines for Submission: Using the Final Project Template, your business systems analysis should be 6–7 pages in length (not including a cover page and references) and written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins.

Critical Elements Exemplary Proficient Needs Improvement Not Evident Value

Introduction: State the Problem

Clearly states the problem that the business owner is seeking to solve (100%)

States the problem that the business owner is seeking to solve, but response is unclear or contains inaccuracies (55%)

Does not state the problem that the business owner is seeking to solve (0%)

5.94

Introduction: Two Technologies

Identifies and briefly describes the two technologies that the student will research in business systems analysis (100%)

Identifies the two technologies that the student will research in business systems analysis, but does not describe them, or description contains inaccuracies (55%)

Does not identify the two technologies that the student will research in business systems analysis (0%)

5.94

Business Requirements:

Objectives

Meets “Proficient” criteria, and explanation demonstrates sophisticated awareness of the project’s objectives (100%)

Explains the objectives of project to integrate new technology (85%)

Explains the objectives of project to integrate new technology, but explanation is cursory or illogical or contains inaccuracies (55%)

Does not explain the objectives of project (0%)

5.94

Business Requirements:

Project Description

Meets “Proficient” criteria, and project description provided demonstrates keen insight into the purpose of the project (100%)

Provides a project description that explains the purpose of the project (85%)

Provides a project description that explains the purpose of the project, but description is illogical, contains inaccuracies, or is missing required components (55%)

Does not provide a project description (0%)

5.94

Business Requirements: Technological Requirements

Meets “Proficient” criteria, and response demonstrates a sophisticated awareness of what the new technology must be capable of doing for the business (100%)

Describes the key technological requirements that will be required of any new technology to effectively solve the business’s problem (85%)

Describes the key technological requirements that will be required of any new technology to effectively solve the business’s problem, but description is missing key requirements or contains inaccuracies (55%)

Does not describe the key technological requirements that will be required of any new technology (0%)

5.94

6

Competitors and Technology:

Technology One

Meets “Proficient” criteria, and explanation demonstrates keen insight into the role and function of the technology in the competing company (100%)

Briefly describes what the selected competing company does and explains how it uses the technology to support its business, and includes specific examples (85%)

Briefly describes what the selected competing company does and explains how it uses the technology to support its business, but does not include specific examples, or examples are inappropriate, or explanation is cursory or contains inaccuracies (55%)

Does not briefly describe what the selected competing company does or explain how it uses the technology to support its business (0%)

5.94

Competitors and Technology:

Technology Two

Meets “Proficient” criteria, and explanation demonstrates keen insight into the role and function of the technology in the competing company (100%)

Briefly describes what the selected competing company does and explains how it uses the technology to support its business, and includes specific examples (85%)

Briefly describes what the selected competing company does and explains how it uses the technology to support its business, but does not include specific examples, or examples are inappropriate, or explanation is cursory or contains inaccuracies (55%)

Does not briefly describe what the selected competing company does or explain how it uses the technology to support its business (0%)

5.94

Competitors and Technology:

Benefitting From Technology

Meets “Proficient” criteria, and description demonstrates keen insight into how the potential technology could provide a benefit to the business (100%)

Explains one specific way in which one of the competing companies is benefitting from technology, and describes the potential benefit to the business from the scenario if they were to adopt the same approach (85%)

Explains one specific way in which one of the competing companies is benefitting from technology, but does not describe the potential benefit to the business from the scenario, or description is cursory or illogical (55%)

Does not explain one specific way in which one of the competing companies is benefitting from technology (0%)

5.94

Technology Solutions:

Technology One

Meets “Proficient” criteria, and explanation demonstrates a sophisticated awareness of how well the technology meets the needs of the business (100%)

Explains how well this technology meets the technology requirements of the business (85%)

Explains how well this technology meets the technology requirements of the business, but explanation contains inaccuracies or is missing required components (55%)

Does not explain how well this technology meets the technology requirements of the business (0%)

5.94

7

Technology Solutions:

Technology Two

Meets “Proficient” criteria, and explanation demonstrates a sophisticated awareness of how well the technology meets the needs of the business (100%)

Explains how well this technology meets the technology requirements of the business (85%)

Explains how well this technology meets the technology requirements of the business, but explanation contains inaccuracies or is missing required components (55%)

Does not explain how well this technology meets the technology requirements of the business (0%)

5.94

Recommendations: Technology

Solution

Meets “Proficient” criteria, and defense demonstrates a complex grasp of how the recommended technology meets needs of the business (100%)

Recommends a technology solution for the business and defends why that solution is appropriate (85%)

Recommends a technology solution for the business, but does not defend why that solution is appropriate, or defense is illogical or contains inaccuracies (55%)

Does not recommend a technology solution for the business (0%)

5.94

Recommendations: Overall Benefit

Meets “Proficient” criteria, and explanation demonstrates keen insight into how the business could benefit from the recommended technology solution (100%)

Explains the overall benefit of the recommended technology solution to the business (85%)

Explains the overall benefit of the recommended technology solution to the business, but explanation is cursory or illogical or contains inaccuracies (55%)

Does not explain the overall benefit of the recommended technology solution to the business (0%)

5.94

Basic Security Considerations:

Security Features

Meets “Proficient” criteria, and description demonstrates a complex grasp of security features necessary for protecting company data (100%)

Describes the basic security features the recommended technology solution should have in order to protect company data (85%)

Describes the basic security features the recommended technology solution should have, but description is cursory or illogical (55%)

Does not describe the basic security features the recommended technology solution should have (0%)

7.92

Basic Security Considerations:

Third-Party Vendors

Meets “Proficient” criteria, and explanation demonstrates a complex grasp of security considerations in regard to potential third-party vendors (100%)

Briefly explains what the business should consider in regard to security and privacy as it seeks out third-party vendors for the proposed technology (85%)

Briefly explains what the business should consider in regard to security and privacy as it seeks out third-party vendors, but explanation is cursory or illogical or contains inaccuracies (55%)

Does not explain what the business should consider in regard to security and privacy as it seeks out third-party vendors for the proposed technology (0%)

7.92

8

Basic Security Considerations:

Internal Safeguards

Meets “Proficient” criteria, and description provides keen insight into what the business can do internally to protect company data (100%)

Briefly describes the internal safeguards that should be put in place in the business to guard against loss or misuse of company data, and provides examples (85%)

Describes the internal safeguards that should be put in place in the business to guard against loss or misuse of company data, but does not provide examples, or description is cursory or illogical (55%)

Does not describe the internal safeguards that should be put in place in the business to guard against loss or misuse of company data (0%)

7.92

Articulation of Response

Submission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to-read format (100%)

Submission has no major errors related to citations, grammar, spelling, syntax, or organization (85%)

Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas (55%)

Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas (0%)

4.96

Total 100%

Attachment 2

IT 210: Business Systems Analysis

[This is an APA-formatted template for the final project: Please be sure to remove ALL of the

example content from this document prior to submission, as it is only there to help and provide

examples. Example content is highlighted and surrounded with brackets within the document.]

IT 210: Business Systems Analysis !2

Contents

Introduction 5

Problem Statement 5

Two Technologies 5

Business Requirements 5

Objectives 5

Project Description 5

Key Technology Requirements 6

Competitors and Technology 6

Technology One [Replace heading with the technology selected (e.g., Social Media)] 6

Technology Two [Replace heading with the technology selected (e.g., Social Media)] 6

Technology Solutions 7

Technology One 7

Technology Two 7

Recommendations 8

Technology Solution 8

Overall Benefit 8

Security Considerations 8

IT 210: Business Systems Analysis !3

Security Features 8

Third-Party Vendors 8

Internal Safeguards 9

References 10

[Footnotes] 11

[Tables] 12

[Figures title:] 13

IT 210: Business Systems Analysis !4

Final Paper

Introduction [Your Introduction must include the following two elements at a minimum]

Problem Statement1

[Clearly state the problem that the business owner is seeking to solve. Be sure to address the

question of what your business ultimately wants to do.]

Two Technologies

[Identify and briefly describe the two technologies, from the list provided, that you will research

in your business systems analysis.]

Business Requirements

Objectives

[Explain the objectives of undertaking this project to integrate new technology. In others words,

what should the project accomplish, and how does it support the goal of your business?]

Project Description

[Provide a project description that explains the purpose of the project. Be sure to address the

following:]

i. What does your business need to do to satisfy the objectives?

ii. What are the desired results at the end of the project?

iii. Why is it important for your business owner to consider implementing new technology?

IT 210: Business Systems Analysis !5

Technology Requirements

[State the key technological requirements that will be required of any new technology in order

to effectively solve your business’s problem. In other words, what specifically does the

technology need to be capable of doing? (These are the technology requirements in the decision

matrix.)]

Competitors and Technology

[In the section below, you will describe two competing companies that operate in the

same industry as your business. You will also explain how a company uses the two technologies

that you are investigating, to determine if the technology may be appropriate for your business to

use. Remember that a list of competing companies was provided to you in the final project case

scenario.]

Technology One [Replace heading with the technology selected (e.g., Social Media)]

[Select one company in the same industry as your own that uses this technology. Briefly

describe what that company does and how it uses this technology to support its business in

general. Include specific examples.]

Technology Two [Replace heading with the technology selected (e.g., Social Media)]

[Select one company in the same industry as your own that uses this technology. Briefly

describe what that company does and how it uses this technology to support its business in

general. Include specific examples.]

IT 210: Business Systems Analysis !6

Technology Benefit

[Referring to what you learned in your research on the companies above, explain one

specific way in which one of the companies is benefitting from technology, and describe the

potential benefit to your business if you were to adopt the same approach.]

Technology Solutions

[In the section below, you will discuss how each of the two technologies meets the

technology requirements that you identified in section II. Use your decision matrix to guide your

responses.]

Technology One

[Explain how well this technology meets the technology requirements of your business.

Be sure to address which technology requirements the technology meets, and where there are

gaps.]

Technology Two

[Explain how well this technology meets the technology requirements of your business.

Be sure to address which technology requirements the technology meets, and where there are

gaps.]

Recommendations

[In the section below, you will recommend the technology solution that you believe is

most appropriate for your business based on how well each technology meets your business’s

technology requirements.]

Technology Solution

IT 210: Business Systems Analysis !7

[Recommend a technology solution for your business, and defend why that solution is

appropriate. You may recommend only one technology or any combination of the two that you

investigated.]

Overall Benefit

[Explain the overall benefit of your recommended technology solution to your business.

Consider the following:]

I. How will it will it enhance efficiency?

II. How will it position your business for future growth as you move online?

Basic Security Considerations

[In the section below, you will briefly explain what the owner of your business must

consider in regard to security and privacy if they choose to adopt your recommendations.]

Security Features

[Explain the security features your recommended technology solution should have.]

Third-Party Vendors

[Briefly explain what your business should consider in regard to security and privacy as

you seek out third-party vendors for the proposed technology.]

Internal Safeguards

[Briefly describe the internal safeguards that should be put in place in your business to

guard against loss or misuse of company data. Provide examples.]

IT 210: Business Systems Analysis !8

[Like all sections of your paper, references start on their own page. The references page

that follows is created using the Citations & Bibliography feature, available on the References

tab. This feature includes a style option that formats your references for APA 6th Edition. You

can also use this feature to add in-text citations that are linked to your source, such as those

shown at the end of this paragraph and the preceding paragraph. To customize a citation, right-

click it and then click Edit Citation.] (Last Name, Year)

IT 210: Business Systems Analysis !9

References

Last Name, F. M. (Year). Article Title. Journal Title, Pages From - To.

Last Name, F. M. (Year). Book Title. City Name: Publisher Name.

IT 210: Business Systems Analysis !10

Footnotes

1[Add footnotes, if any, on their own page following references. For APA formatting

requirements, it’s easy to just type your own footnote references and notes. To format a footnote

reference, select the number and then, on the Home tab, in the Styles gallery, click Footnote

Reference. The body of a footnote, such as this example, uses the Normal text style. (Note: If you

delete this sample footnote, don’t forget to delete its in-text reference as well. That’s at the end of

the sample Heading 2 paragraph on the first page of body content in this template.)]

IT 210: Business Systems Analysis !11

Tables

Table 1

[Table Title]

Note: [Place all tables for your paper in a tables section, following references (and, if applicable,

footnotes). Start a new page for each table, include a table number and table title for each, as

shown on this page. All explanatory text appears in a table note that follows the table, such as

this one. Use the Table/Figure style, available on the Home tab, in the Styles gallery, to get the

spacing between table and note. Tables in APA format can use single or 1.5 line spacing. Include

a heading for every row and column, even if the content seems obvious. A default table style has

been setup for this template that fits APA guidelines. To insert a table, on the Insert tab, click

Table.]

Column

Head

Column Head Column Head Column Head Column Head

Row Head 123 123 123 123

Row Head 456 456 456 456

Row Head 789 789 789 789

Row Head 123 123 123 123

Row Head 456 456 456 456

Row Head 789 789 789 789

IT 210: Business Systems Analysis !12

Figures title:

Figure 1. [Include all figures in their own section, following references (and footnotes and tables,

if applicable). Include a numbered caption for each figure. Use the Table/Figure style for easy

spacing between figure and caption.]

For more information about all elements of APA formatting, please consult the APA Style

Manual, 6th Edition.

  • Introduction [Your Introduction must include the following two elements at a minimum]
    • Problem Statement1
    • Two Technologies
  • Business Requirements
    • Objectives
    • Project Description
    • Technology Requirements
  • Competitors and Technology
    • Technology One [Replace heading with the technology selected (e.g., Social Media)]
    • Technology Two [Replace heading with the technology selected (e.g., Social Media)]
    • Technology Benefit
  • Technology Solutions
    • Technology One
    • Technology Two
  • Recommendations
    • Technology Solution
    • Overall Benefit
  • Basic Security Considerations
    • Security Features
    • Third-Party Vendors
    • Internal Safeguards

Attachment 3

1

Technology Solutions: Technology One

The business objectives that have been identified include incorporating new

technology that will provide online payment processing, order status, managing

inventory, and shipping, enabling cooperation both internally and externally, and

incorporating online shopping. The first technology that will be incorporated to help

the business achieve its goals and objectives is social computing. Social computing is

concerned with the intersection of computational systems and social behavior to

create social contexts and social conventions through the use of technology and

software. Social computing comprises instant messaging, social bookmarking, email,

social networking, and blogs (Riveni et al., 2019).

Social computing promotes the unique sharing of media or content, enhanced

communication and collaboration in the workplace, and control of the business data.

Through social computing, the business will achieve some of its objectives. It will

promote effective and efficient managing of inventory and shipping, order status, and

promoting cooperation both internally and externally. Social computing will also

increase the efficiency and effectiveness of reporting, and it will provide essential

data to the management for enhanced decision making. Moreover, the adoption of

social computing in the business will lead to increased efficiency in the business's

primary functions, which are planning, leading, organizing, and controlling.

Improving the efficiency of such processes will increase business performance, thus

increasing the business's competitiveness in the market.

Technology Solutions: Technology Two

The second technological tool that will be implemented in the business is the

management of big data and knowledge. Big data is the extremely large volume of

2

data sets that may be analyzed computationally to reveal the trends, associations, and

patterns, especially relating to human behavior and interactions. Big data management

is a concept that encompasses the procedures, policies, and technology used in the

collection, governance, storage, administration, organization, and delivery of large

repositories of data. On the other hand, knowledge management is used to collect,

store, sort, categorize, and process data into knowledge (Chierici et al., 2019). That

means that big data and knowledge management entails collecting big data to analyze

the knowledge derived from it.

Big data and knowledge management entail knowing what to capture, adaptation

to changes, determining the business's goals, protecting and securing the data, and

following audit requirements. Big data and knowledge management will be harnessed

to manage the existing brick and mortar processes by proving the necessary reports

from the data collected and analyzed. It will also be used to manage the contacts of

the customers, provide online payment processing, and promote collaboration both

internally and externally by identifying the relevant strategies that need to be

implemented. Big data and knowledge management will also be used to identify

customer behavior insights. That will enable the business to identify the customer

service practices that should be promoted, the goods that should be provided more

often to customers, and effective marketing techniques. Implementing the technology

will enable the business to compete with other larger companies as the technology

will allow the business to be swift and agile in responding to changes.

Recommendations: Technology Solution

To improve the business's competitiveness and enhance its operational efficiency,

I would recommend that the business adopt both social computing and big data and

3

knowledge management. Although the two technologies have some overlapping

advantages, each technology will have its role to play in the business. Therefore, to

ensure optimal productivity and efficiency, both technologies should be adopted.

The business will use social computing to enhance communication and

collaboration both internally and externally. It will also promote a better customer

relationship in the business. That indicates that all the stakeholders' relationships in

the business will be enhanced, thus promoting improved productivity. It will also be

used to achieve the company's objective of moving online.

On the other hand, big data and knowledge management will be used to analyze

the business processes and the data collected to identify the business's trends and

patterns. It will also be used t provide insights into the business operations (Pauleen &

Wang, 2017). That is significant in identifying the business areas that should be

improved. It is also essential in determining the success of the business's strategies

that will be implemented. Therefore, big data and knowledge management will be

used to provide insights into the company's future direction.

Recommendations: Overall Benefit

The company will witness massive growth and development if the two

recommended technologies are implemented. They will enhance efficiency in the

business, thus improving the business operations. Social computing will reduce the

communication barriers in the business. That will promote effective communication,

collaboration, and teamwork in the company. Enhanced communication and

collaboration will improve the company's productivity, thus enhancing efficiency.

Social computing will also be utilized to promote customer relationships. Enhanced

customer relationships will promote the business's productivity and effectiveness, thus

4

enhancing efficiency in the business.

Big data and knowledge management will also be used to enhance efficiency in

the business. Through big data and knowledge management, the business will identify

the business processes and operations that are performing well and those that are

performing poorly. Thus, effective strategies may be formulated to improve poorly

performing processes. That will increase the efficiency of the business processes and

operations. Moreover, big data and knowledge management will be used to develop

customer trends and patterns. Such trends and patterns will be harnessed to determine

the optimal products and services that should be provided to the customers. It will

also identify the best business practices to enhance efficiency and increase

productivity.

With increased efficiency, effectiveness, productivity, improved customer

relations, improved collaboration and communication, the business will be well-

positioned for future growth. The two technologies will be used to streamline the

business operations and ensure that effective strategies to promote business growth

and development have been implemented. Harnessing the two technologies will make

it easier for the business to move online seamlessly. Thus, the two technologies are

effective for the business.

Decision Matrix

Weight Social

Networking

Big data and

knowledge

management

Artificial

Intelligence

Capabilities 20 15 17 15

Advantages 15 15 13 14

5

Features 25 20 25 23

Cost of

implementation

20 15 15 10

Relevance to

business

20 20 20 5

Totals 100 85 90 67

Score 85% 90% 67%

Rank 2 1 3

6

References

Chierici, R., Mazzucchelli, A., Garcia-Perez, A., & Vrontis, D. (2019). Transforming

big data into knowledge: the role of knowledge management

practice. Management Decision.

Pauleen, D. J., & Wang, W. Y. (2017). Does big data mean big knowledge? KM

perspectives on big data and analytics. Journal of Knowledge Management.

Riveni, M., Nguyen, T. D., Aktas, M. S., & Dustdar, S. (2019). Application of

provenance in social computing: A case study. Concurrency and Computation:

Practice and Experience, 31(3), e4894.

Attachment 4

1 Running Head: Project Draft

Introduction

A.

The business owner is trying to solve the problem of the business not being able to reach

a lot of customers easily as compared to its competitors. The small brick and mortar business has

specialized in fashionable handbags, shoes, and clothing. The problem that the owner of a

business is attempting to resolve has been attributed to the store having a basic website that has a

list of fewer products making customers only buy goods that are in the store. Due to that, our

business is aiming at promoting growth with the presence of online and become focused on our

customers. The business needs to modernize the enterprise methods that are used in

incorporating a brick and mortar business with an e-business.

B.

The technologies that the business will use in our research systems analysis are social

computing and the management of big data and knowledge. Social computing is an element of

computer science that entails the intersection of computational systems to create or recreate

social conventions and social contexts through the use of technology and software (Zhang, et al.,

2016). Social computing has various elements such as social bookmarking, social networking

services, instant messaging, email, and blogs. Big data and knowledge management involve the

adaptation to changes, knowing what to capture, following audit regulations, protecting the data,

securing data, and determining the goals of the business.

! 2 Project Draft

Business Requirements

A.

The goals of carrying out this project to incorporate new technology are to provide order

status and online payment processing, managing inventory and shipping, incorporating online

shopping, and enabling cooperation both externally and internally with the employees and

customers. Other objectives include enabling the use of new technology to control the existing

brick and mortar practices such as customer contact, inventory, payments, and sales, providing

reporting, and managing the contacts of customers. Our business currently is experiencing

difficulties in managing the information of customers due to its physical location because it does

not have a reporting tool that can be used in management to make informed decisions.

B.

i.

For the business to satisfy the objectives, the management should ensure that it performs

its primary functions, namely controlling, leading, organizing, and planning. The planning stage

will enhance the creation of the objectives and the ways in which the objectives will be achieved

by making strategic decisions that will set a path for the business. Planning involves using

various techniques such as operational planning, tactical planning, and strategic planning. To

achieve the objectives, organizing plays a key role since it will involve the distribution of

resources and delegation of tasks to the qualified personnel in the business. Leading will require

motivation from the business owner and influencing the behavior of workers to satisfy the

! 3 Project Draft

objectives of the business. The management may use different leadership styles such as

delegating, supporting, coaching, and directing to ensure that every employee works towards

achieving those goals. Controlling will involve evaluating the execution of the plan and making

adjustments that will ensure the objectives are attained through training of employees on how to

use the new technology that will be integrated into the business.

ii.

The anticipated outcomes at the end of the project is the business being able to use the

new technology in managing the existing brick and mortar processes, providing reports of the

business, managing the contacts of customers, promoting collaboration both externally and

internally, and providing online payment processing and order status. It is also the desire of the

business to be able to manage inventory and shipping and incorporate online shopping.

iii.

My business owner needs to consider executing new technology since it has various

advantages such as promoting financial savings, protects sensitive information, provides reliable

storage, encourages collaboration and communication, productivity and automation. Acquiring

the new technology will enable our business to compete with other larger companies since it will

allow the business to be agile and swift in responding to changes. This will also increase

efficiency by reducing human error through various automated processes. Communication in any

business is necessary, and technology will provide resources for quick and effective

communication with the customers across all demographics, thus reducing the costs and time that

would have been taken to travel (Noe, et al., 2017). New technologies like cloud computing will

! 4 Project Draft

offer reliable and easy storage that will protect the business’ valuable records while minimizing

the need for maintaining the server.

C.

The technological requirements that will be required in social computing to solve the

problem of the business are leveraging, enabling, participating, and monitoring. Monitoring

entails locating and tracking blogs and other media of the company. Participating involves

listening to the views and responses of the other users with respect and considering the

sponsoring and advertising on the required sites (Vitak, et al., 2017). Leveraging includes

analyzing what different customers are saying about the products and services to acquire their

potential feedback about them.

Competitors and Technology

A.

Zappos company uses the technology of big data and knowledge management. This

company deals in the sale of various types of using ranging from men's shoes to women's shoes.

The use of big data and knowledge management helps the company to accelerate the delivery of

its products to customers, communicate vital information quickly and more widely, avoid making

similar mistakes twice, reuse documents, ideas, and expertise and enable better and faster

decision making.

B.

! 5 Project Draft

Macy's company uses the technology of social computing. This company deals in the sale

of various accessories such as clothing, watches, jewelry, and shoes. The company uses this

technology to share its products with consumers, keep them up to date on the available products,

and assists the business to gather data and make a brief analysis of their customers.

C.

The Macy’s company is benefiting from technology through acquiring high financial

benefits. This has allowed the company to make more investments with fewer employees, and it

has reduced the payroll costs. If our business could adopt the technology, we could benefit from

automation and productivity. This will enable our business to compete with other large

businesses and help us to adapt to changes quickly and swiftly. It will also increase efficiency

and reduce human error by creating automated processes.

! 6 Project Draft

References

Noe, R. A., Hollenbeck, J. R., Gerhart, B., & Wright, P. M. (2017). Human resource

management: Gaining a competitive advantage. New York, NY: McGraw-Hill Education.

Vitak, J., Proferes, N., Shilton, K., & Ashktorab, Z. (2017). Ethics regulation in social computing

research: Examining the role of institutional review boards. Journal of Empirical

Research on Human Research Ethics, 12(5), 372-382.

Zhang, X., Yi, Z., Yan, Z., Min, G., Wang, W., Elmokashfi, A., ... & Zhang, Y. (2016). Social

computing for mobile big data. Computer, 49(9), 86-90.