Projects And Selected Coursework
SPRING 2015
MIS 2501 – Enterprise IT Architecture
This course introduces students to the Information Technology Architectures in business. Concepts discussed involved Information Technologies such as computer hardware, software, systems, and networking. This course also aims to identify the management, usage, security, and consumer issues related to computers, operating systems, servers, smartphones, cloud computing, and other new and emerging technologies. Through this course, students explore these different technologies and how they can be used to create business value.
Network Security Assessment
Organizations are more dependent on their IT systems than ever. System outages and cyber threats can have serious financial and operational impacts, and IT-security failures can lead to unauthorized access to a company’s systems. Such unauthorized access can lead to significant legal liabilities as well as the release of confidential information. Bringing down an organization’s IT systems can bring down the organization as a whole, so it is important that organizations take their IT security into account with their risk management procedures.
This was a group assignment I completed with my classmate Amanda Krauth. The purpose of this assignment was to complete an AIG Information Security Self-Assessment for a fictional company. After completing the survey, we analyzed results to address the company’s strongest and weakest points in their IT security controls and create a short presentation.
Flash Research Papers
One of the most important skills a young professional needs to develop is the ability to analyze a situation quickly and efficiently as well as be able to explain it clearly and concisely. The purpose of the Flash Research assignments is to develop this skill in the context of analyzing, understanding, and explaining digital products and services. The intended audience of these papers is a Chief Information Officer with a high-level understanding of different technologies. The purpose of these papers, therefore, is to explain the key capabilities of different technologies and services as well as provide a business case as to why the company should invest in this technology, all in one page or less. The structure of these papers consists of the following three components:
1. The Hook – Explain why the reader (in this case, a CIO) simply must read the rest of the paper!
2. Tech Summary – Discuss the Key Capabilities of this digital product or service and how they can be applied to address business needs.
3. Business Case – What are the costs associated with this technology and how will it benefit the company?