Information Technology Assignment: Florida Aspire, ITIL, and Security

Verified

Added on  2020/05/08

|4
|701
|84
Homework Assignment
AI Summary
This IT assignment comprehensively addresses several key topics within information technology, including installation and data conversion strategies, ICT policies and information security, ITIL change management, and post-implementation review. The assignment begins with an analysis of the Florida Aspire Project's production conversion strategy, emphasizing the cutover plan's effectiveness in managing people, data, processes, and technology. It then delves into the privacy risks associated with platforms like Turnitin and Blackboard, highlighting the importance of data security and encryption. The ITIL change management section examines the Goldstein VCF case, focusing on security issue management and the role of enterprise architecture. Finally, the post-implementation review explores the Queensland health payroll system, evaluating accountability, contingency plans, and the potential for system improvements. References to relevant academic sources are included to support the analysis.
Document Page
Running head: INFORMATION TECHNOLOGY
Information Technology
Name of the Student:
Name of the University:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
INFORMATION TECHNOLOGY
Topic 8- Installation and data conversion
1. Florida Aspire Case
a. Kind of production conversion strategy
In the Florida Aspire Project, deployment and cutover strategy is used for replacement of
their financial management system, cash management system and other financial systems. The
cutover of production is transferring of Aspire project solutions from the project team to the state
of activities (Laudon and Laudon 2016). The end of production cutover process is initiation of
application support per go live and then ongoing support.
b. Choice of selection
It is a good choice for the project as this strategy has covered the cutover categories such
as people, data, process of cutover as well as technology. The cutover plan provides the project
tasks with respective timing along with sequencing of necessary go live.
Topic 9: ICT policies and information security
1. Privacy risks of turnitin and blackboards
The privacy risks are that any third party person can get password and username of the
students, staffs and curtin those have accounts. Using it, they can access to the submitted papers
along with personal information into the database. When the submitted paper is in hand of any
unauthorized user, then they can use it for negative intention or hamper the career of the student.
If the same paper is uploaded into another student’s portal, then it will be a life risk of them.
Document Page
2
INFORMATION TECHNOLOGY
Encryption techniques should be used by the users to keep all the sensitive data secured (Safa et
al. 2013). The password of the student’s blackboard should be shared with anyone.
Topic 10: ITIL change management
1. Goldstein VCF reading
In order to reduce and manage of the security issues into the VCF case, the bugs are fixed
with help of the team of Depew to create investigation of the project scenarios which take of
various cases from closing and testing on VCF. FBI should create of enterprise architecture in
order to guide the development of the IT system. There is used of markup language into the ACS
system to check for the performance of network and develop of training program. VCF pointed
to take of security measures to keep case management system more secured (Ewerstein and
Jansson 2016). It includes of KPI and public key infrastructure with system digital certificates to
verity and authenticates the validity of third party.
Topic 11: Post implementation review
1. Queensland health payroll reading
In order to improve into the future payroll system of the Queensland heath, there is
included of line of accountability as well as contingency plans to deal with unexpected issues. It
provides with efficient pay process to the customers. In order to mitigate the issues of the payroll
system, there is consideration of simplified award structure and pay rules required. Payroll
system can foster growth with development of the Queensland health. At the time of tracking the
business records of the payroll system ultimate the assets of the business (Kirk et al. 2016). It
also controls of the organizational health related data of the patients.
Document Page
3
INFORMATION TECHNOLOGY
References
Ewerstein, Anders, and Markus Jansson. 2016. Management method for Change Management in
ERP systems.
Kirk, M. Alexis, Caitlin Kelley, Nicholas Yankey, Sarah A. Birken, Brenton Abadie, and Laura
Damschroder. 2016. A systematic review of the use of the Consolidated Framework for
Implementation Research." Implementation Science 11, no. 72 (1).
Laudon, Kenneth C., and Jane P. Laudon. 2016. Management information system. Pearson
Education India.
Safa, Nader Sohrabi, Rossouw Von Solms, and Steven Furnell. 2013. Information security policy
compliance model in organizations. computers & security 56 (2016): 70-82.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]