...i [pic] RISK ANALYSIS Project or System Name U.S. Department of Housing and Urban Development Month, Year Revision Sheet |Release No. |Date |Revision Description | |Rev. 0 |1/31/00 |SEO&PMD Risk Analysis | |Rev. 1 |5/1/00 |Risk Analysis Template and Checklist | |Rev. 2 |6/14/00 |Minor changes per Office of Administration | |Rev. 3 |4/12/02 |Conversion to WORD 2000 Format | | | | | | | | | | | | | | |Risk Analysis Authorization | | ...
Words: 1892 - Pages: 8
...Kudler Fine Foods Kudler Fine Foods (KFF) is looking to develop a system to track customer purchases in order to identify purchasing behavior patterns. They hope to use the information gathered to refine the company's processes and offerings to best satisfy the needs of their valued customers. Management has decided to approach this initiative is through the implementation of a frequent shopper program. Traditional programs of this sort would not begin to satisfy the sophisticated senses of Kudler's elite customer base; as a result, a decision has been made to partner with a loyalty points program that will provide rewards points to customers that can be redeemed for high-end gifts and upgrades. System Requirements Gathering During the initial stage of development, it is imperative to gather enough information to be able to accurately describe the system requirements. The first step is to determine the scope of the project based upon the objective outlined in the request. The next step would be to identify those that have a vested interest in the proposed new system. Once this information is known the project can be divided into modules and tasks can be assigned. Scope The deliverable for this project is to create a business/systems requirement document for the development of the frequent shopper program system to track the purchases of individual customers. The project should make use of the existing system when possible and develop enhancements, where necessary, to provide...
Words: 4906 - Pages: 20
...We will combine old vintage records with the option of hooking your listening device up to a hub where you can transfer audio files from our large database of records. You will also have the ability to access the files of other customers while in the store, listen to what they are listening to and transfer with one another, all in all creating a one of a kind customer/user experience. The name of the business will be DigiBox!! Proposal As a small business we will need to incorporate certain information systems so we can optimize capital growth, establish a smoothly run more efficient workplace, and execute processes better than our competitors. Over the past decade business information management has gone through a significant change that allows small business owners to operate at a corporate capacity in more ways than one with software that is designed for people who have limited knowledge with IT systems. There are several different types of information systems, yet not all of them would be applicable to the type of business we are looking to run. I therefore propose we focus on and...
Words: 1078 - Pages: 5
...* The program shall initially collect customer information at registration, including * Full Name * Address * The program may initially collect additional information, including * Telephone Number * Email * Information shall be collectable by written card, POS system input, or online registration * The program shall Identify each customer with a unique identifier * The program shall identify reward point values for every purchasable item * The program shall tie into the POS system to associate a customer to a purchase at checkout time * The program shall store, in a centralized location, itemized purchase information at each checkout for analysis purposes * The program shall allow customers to provide one of * Their unique identifier * A coded piece of equipment (such as a bar-coded card) * Sufficient information to tie to a unique identifier (e.g. full name and address) * The program shall associate rewards points to potential reward items or services (as selected in partnership agreements) * The program shall include an online component by which a customer may * Check their points accumulated * View potential rewards * Claim rewards based on their current points value * Update or add profile information * View privacy policy information * The program’s online component shall support major web browsers * Internet Explorer * Firefox *...
Words: 300 - Pages: 2
...Green Systems, Inc. Mobile sales tablet proposal Charles Brooks, Willy Almazan, Nathan Gass, Christian Hawkins, Matthew Chau University of Phoenix CIS/207 11/06/2012 The Mobile sales tablet by Green Systems Inc is an amazing solution to the retail experience. By putting the mobility in employees’ hands to walk around and spend the entire experience with the customer it creates more of a bond that that customer will remember the next time they want to purchase. Employees can look up a multitude of things with the mobile devices and save time from having to do price checks, stock checks, and looking for product information. Employees are freed up to do other tasks they might not have been able to accomplish if they were stuck to a register. And the devices have many more applications for use than just that. Mobile device payment offers a way to inexpensively change the way your business develops. By removing the costly register systems and switching everything over to mobile units you free up space in the store that otherwise would have been taken up by registers, lines, and “in a hurry” Customers. Now we go to them. They don’t have to come to us. We bring not only our own knowledge in our heads, but so much more. With a few other additions to this system we can change the way retail is done. Not a moment is wasted to build an excellent customer relationship that keeps that customer coming back every time. Welcome to The Mobile Sales Tablet. In This proposal we will be discussing...
Words: 3820 - Pages: 16
...study is shown below and follows Kahuna Cleaning Supply and is related to chapters 2 & 4 of the text. If you choose this option, a different case study will be provided for chapter 3. Read through the case study for chapter 2 that you have selected (Eden Bay or Kahuna Cleaning Supply) and complete the tasks, using Word to write your answers. When you are finished, submit your Word file to this dropbox. Be sure to submit your Word file by the due date. . ********************************************************************** Case Study - Kahuna Cleaning Supply Background Kahuna Cleaning Supply is a family-run business based in New Haven, Connecticut. The cleaning company specializes in commercial cleaning supplies and business support products for commercial, industrial, and institutional clients in New England and Eastern New York. Kahuna Cleaning Supply originated in response to the growth of the cities of Bridgeport and New Haven from the suburban spread from New York City. The business has grown to fourteen warehouse locations, each with several delivery trucks depending on the volume of sales at each location. With the stagnant population growth in Connecticut since 1980, Kahuna Cleaning Supply made a concerted effort to expand their market into other areas in the region, first in Connecticut, and then in the broader New England region. The early efforts included increased advertising and an increase in the sales force, with an...
Words: 1807 - Pages: 8
...countermeasures in the information systems environment. Required Source Information and Tools ------------------------------------------------- Web References: Links to Web references are subject to change without prior notice. These links were last verified on June 12, 2014. To complete the project, you will need the following: 1. Access to the Internet to perform research for the project * Microsoft Windows How-To, including: * Optimize Windows for Better Performance: http://windows.microsoft.com/en-us/windows/optimize-windows-better-performance - optimize-windows-better-performance=windows-7 * Monitor Attempts to Access and Change Settings On Your Computer / To Turn On Auditing: http://windows.microsoft.com/en-us/windows7/monitor-attempts-to-access-and-change-settings-on-your-computer * What Information Appears in Event Logs? http://windows.microsoft.com/en-us/windows/what-information-event-logs-event-viewer - 1TC=windows-7 2. Course textbook Learning Objectives and Outcomes You will: * Explain how to assess risks, threats, and vulnerabilities * Evaluate potential outcomes of a malware attack and exposure of confidential information * Evaluate information systems security countermeasures * Explain how system hardening relates to a company’s IT security policy framework * Analyze the purposes of system hardening * Analyze security events * Evaluate information systems security activities in...
Words: 1575 - Pages: 7
...behaviors. Course Outcomes This assignment enables the student to meet the following course outcomes: CO #1 Assess whether nutritional intake provides basic nutrients for optimal health and wellness. (PO #1, PO #2) CO #2 Describe nutritional needs for optimal health and wellness throughout the life span. (PO #1, PO #2) CO #3 Discuss the psychological, sociological, economical, and cultural implications of food on nutritional status. (PO #1, PO #2) CO #4 Describe evidence-based interventions and modifications in nutrition therapy that can positively influence the outcome of disease and illness. (PO #1, PO #8) Due Date Refer to Course Calendar for campus requirements. Online will submit by Sunday, Unit 7 11:59 pm MT. Total Points Possible: 100 Requirements 1. Create a concept map document based on the food and activity journal throughout the course using www.chooseMyPlate.gov. The discussion questions in units 1, 3, 5, & 7 will provide you with questions on what aspect of diet to focus on. You are not being graded on your personal habits; you are being graded on your understanding how good personal choices lead to optimal health benefits. 2. In the “Assignment” page of Unit 1, locate the document that is listed as “Concept map.” Use this document to develop a complete concept map and discussion based on your overall diet from your personal diet journal. 3. You will need to...
Words: 1481 - Pages: 6
...Record of Changes Arkansas Emergency Operations Plan Cyber Incident Support Annex |Date of Change and Initials |Location and Nature of Change | |9/17/2010- JRC |Minor editing corrections throughout document. | |10/1/09 JC |Pg 3: reworded first sentence to clear up confusion. | Cyber Incident Support Annex Coordinating Agency: Arkansas Department of Information Systems (DIS) Support Agencies: Office of the Governor Arkansas Department of Emergency Management Multi-State Information Sharing and Analysis Center (MS-ISAC) Cooperating Public Organizations: All Arkansas agencies, boards and commissions Institutions of Higher Education Public Schools (K – 12) Authorities and References Act 751 of 2007 National Response Framework (NRF) National Incident Management System (NIMS) Introduction Purpose The Cyber Incident Support Annex discusses policies, organizations, actions, and responsibilities for a coordinated approach to prepare for, respond to, and recover from cyber-related incidents impacting critical state government and educational processes. Scope This appendix describes the framework for state cyber incident response coordination among state and local government, institutions of higher...
Words: 1011 - Pages: 5
...Critical Information Systems Lance Kaea Carson BSA 310 May 15, 2011 Rich Harrell Critical Information Systems An Information System is an organizations framework for efficiency, productivity, and functionality. It “is a collection of hardware, software, data, people and procedures that are designed to generate and disseminate information and data that supports the activities of an organization” (International Graduate, 2011). Kudler Fine Foods is an organization specializing in providing domestic and imported sustenance to consumers. This paper clarifies an information system critical to their business process and examines how this system has an effect on the organization’s intricate structure. Information Systems Information systems used by organizations often follow a “traditional hierarchical structure” (Turban & Volonino, 2010. p.42). The structure commonly consists of seven functional types (1) Personal and Productivity Systems, (2) Transaction Processing Systems, (3) Functional and Management Information Systems, (4) Enterprise Systems, (5) Inter-organizational Systems, (6) Global Systems, and (7) Special Systems. Each category plays an essential role in the overall function of an organization when utilized. The development of an application program is used to execute or support a specific organization task or business process through the use of that information system. Although system types and applications can be independent of each other, most...
Words: 830 - Pages: 4
...process for a major procurement such as a Contracting Writing system is to determine the requirements of the procurement. Engelbeck( 2002), states “It is a fundamental policy that all government requirements are based on a need that is tied to a mission.” FAR 7.105 lists the requirements of a written acquisition plan and states, in part: “Introduce the plan by a brief statement of need. Summarize the technical and contractual history of the acquisition. Discuss feasible acquisition alternatives, the impact of prior acquisitions on those alternatives, and any related in-house effort.” In this case, the need is to improve an existing capability within the Department of Agriculture, since they already write proposals and contract to support agency needs. The technical history of the acquisition would consist of information about how the need was identified and why the procurement is needed. For example, perhaps a review of the contracting system at the Department of Agriculture suggested that overall contracting costs could be reduced by automating the proposal and contract writing function. The statement of need would also contain information about any alternatives considered and explain why this acquisition was selected to fill the need. Since the Department of Agriculture is currently writing contracts and proposals, the acquisition team can review the system being used currently and use the information gathered as a framework for developing the requirements for this...
Words: 1189 - Pages: 5
...CHAPTER 2: LOGISTICS AND INFORMATION TECHNOLOGY 2-1. In what ways can information be helpful in logistics and supply-chain management? There are a number of ways in which information can be helpful in logistics and supply-chain management. These include, but are not limited to, greater knowledge and visibility across the supply chain, which makes it possible to replace inventory with information; greater awareness of customer demand via point-of-sale data, which can help improve planning and reduce variability in the supply chain; better coordination of manufacturing, marketing, and distribution through enterprise resource planning systems; streamlined order processing and reduced lead times enabled by coordinated logistics information systems. 2-2. Name the six general types of information systems, and give one logistics application for each one that you’ve named. One type is office automation systems, and a logistics application could be spreadsheets that calculate optimal order quantities. A second is communication systems; one logistics example is voice-based order picking. Transaction processing systems are a third general type, with point-of-sale systems being a logistics application. Management and executive information systems are a fourth general type of information systems; a logistics application involves logistics information systems. A fifth general type of information system is decision support systems, with warehouse management systems being a logistics-related...
Words: 1901 - Pages: 8
...to launch a shopper rewards program. These types of systems are very common in most grocery store chains around the world offering discounts on in store products, however KFF is determined to cater to the demographic of their shoppers by taking this program a step further. The system specific to KFF needs includes a reward points system designed to provide the customer exclusive offers on both in store products and with third party partners. This system will be designed to store customer data while providing reward points to be used for purchases both in-store and with third party partners. Reward points will be redeemable for fine foods, first class airline upgrade, high end gifts, and other items and bonuses of that nature. Points will be rewarded in increments based on money spent on purchases within the store in which the customer provides a reward card or number to reference (phone #) during checkout process. Since this system will be collecting customers’ personal information, it is imperative that potential issues are addressed prior to the implementation of this system. In order to open a rewards account a customer will need to provide personal data such as phone numbers, and home/email addresses. Due to the sensitivity of this data and the protection of the customer in mind, considerations need to be made making the customer aware of the intended use of this data. It will be important that the information regarding the use of this data is clearly stated on...
Words: 802 - Pages: 4
...significantly within the last two years and the current Excel system, excel, cannot keep up with all data. In order to improve the efficiency of the current information systems used in Party Plates, the antiquated system needs to be upgraded to a much more efficient system such as Microsoft Access. The upgrade will benefit the company in terms of better data tracking and the ability of producingto produce useful reports in relation to customer sales. Microsoft Access is a database software that allows a user to manipulate large amounts of data. Unlike Excel, Access can hold more than 65 thousand records, which can be converted and viewed in various forms depending on what is needed. Microsoft Access offers two main benefits, its user friendly friendliness and its ability to hold large amounts of data without sacrificing performance. Microsoft Access functions in different ways that tie together …what? . Tables are used to store data from which queries can pull information from and perform calculations against the data. Forms can be used to enter information into tables. Reports will allow the information to be displayed in a printer-ready format. The reports can also be exported to other Microsoft Office programs, such as Excel or Word. Finally, macros allow for the automation of database tasks. Modules are an area for advanced programming language within the database. The last sentence does not support the topic - Refer to grammar guide for details on how to avoid...
Words: 1402 - Pages: 6
...countermeasures in the information systems environment. Required Source Information and Tools To complete the project, you will need the following: 1. Access to the Internet to perform research for the project * Microsoft Windows How-To, including: * Optimize Windows for Better Performance: http://windows.microsoft.com/en-us/windows/optimize-windows-better-performance - optimize-windows-better-performance=windows-7 * http://windows.microsoft.com/en-us/windows-8/improve-performance-optimizing-hard-drive 8.1 * http://www.makeuseof.com/tag/7-quick-tips-hacks-optimize-windows-10-experience/ win 10 * Monitor Attempts to Access and Change Settings On Your Computer / To Turn On Auditing: http://windows.microsoft.com/en-us/windows7/monitor-attempts-to-access-and-change-settings-on-your-computer * What Information Appears in Event Logs? http://windows.microsoft.com/en-us/windows/what-information-event-logs-event-viewer - 1TC=windows-7 2. Course textbook Learning Objectives and Outcomes You will: * Explain how to assess risks, threats, and vulnerabilities * Evaluate potential outcomes of a malware attack and exposure of confidential information * Evaluate information systems security countermeasures * Explain how system hardening relates to a company’s IT security policy framework * Analyze the purposes of system hardening * Analyze security events * Evaluate information systems security activities...
Words: 665 - Pages: 3