Project Proposal and Plan Value: 10% Length: 1250 words (5-6 pages) Task WHAT TO DO: Follow the Study Schedule and work with the Topics in Interact as they provide a "scaffold" for your learning in...

1 answer below »


Project Proposal and Plan



Value:10%



Length:1250 words (5-6 pages)




Task



WHAT TO DO:



  1. Follow the Study Schedule and work with the Topics in Interact as they provide a "scaffold" for your learning in this subject.

  2. Develop a detailed CapstoneProject Proposal and Planusing project management software (as listed in the Study Schedule) and the skills you have acquired from IT Project Management to develop a project plan with aWork Breakdown Structure(WBS), milestones andGantt chart. These tools may help.


    1. MicrosoftProject Pro (http://office.microsoft.com/en-au/project/);

    2. Open source tools like GanttProject (http://www.ganttproject.biz/);

    3. OpenProj(http://sourceforge.net/projects/openproj/)

    4. OpenProject (https://www.openproject.org/about).

    5. ProjectLibre (http://www.projectlibre.org/)


  3. Begin using the 'project blog' as a tool beyond theweekly progress reportsfor your chosen emerging technology topic:


    1. The blog helps you to "think by writing" and also store your notes, project files and links in a cloud-based service.

    2. Consider sharing the site with your peers as a way to tell a story and harness each others knowledge.


  4. The blog is ideallyupdated each weekwith 3 or 4 entries for documenting your project notes and as the foundation for editing and writing the Capstone Project Report. An ideal blog entry will have around 50-150 words (150-600 words a week).



Rationale



This assessment task will assess the following learning outcome/s:



  • be able to interpret and evaluate an overview of recent trends in emerging technologies and innovation.

  • be able to perform literature searches and critically analyse the literature in the chosen topic.


TheCapstone Topic Project Planallows for a broad range of project areas like systems administration, database systems, IT security, mobile technology etc. Often the project has a sponsor and is linked to your interest or workplace needs. The proposal has aresearch component(Assessment Item 3 Annotated Bibliography) so in some cases you may need to find a supervisor willing to accept you as a candidate.


TheLearning Outcomesbeing assessed in this item include how you interpret and evaluate an overview of recent trends in emerging technologies and innovation and begin to plan, execute, record and present your research and project work as a capstone experience.


YourCapstone Project Proposal and Planwill be evaluated with aseries of questionsthat you can use as aChecklist:



  • Is the capstone topic area appropriate?

  • Has the Project Blog been setup?

  • Has there been sufficient justification of the choice of the topic?

  • Is there enough scope for a sufficiently deep/complex analysis?

  • Is the scope appropriate for what might be reasonably expected in the capstone project subject?

  • Is the methodology proposed clear?

  • Are the deliverables clearly set out?

  • Are the deliverables sufficiently complex to justify a pass in this activity?

  • Is it likely that the proposed activities can be reasonably carried out?

  • Is it likely that the student will have access to the necessary resources to do a satisfactory job?

  • Is the time line proposed realistic?



Marking criteria and standards









Capstone Project Proposal and Plan Assessment Criteria 10% (100 marks)

















































Criteria




HD




DI




CR




PS



Choose a capstone project topic and identify the information needed to fill knowledge gaps stated by others.



10.00



Project Proposal and Plan demonstrates that an evaluation of recent trends in emerging technologies and the identification of the knowledge gap has led to an appropriate and detailed topic selection.



8.50 to 10.00



Project Proposal and Plan demonstrates that an evaluation of recent trends in emerging technologies and the identification of the knowledge gap has led to an appropriate topic selection.



7.50 to 8.49



Project Proposal and Plan demonstrates that an evaluation of recent trends in emerging technologies but the identification of the knowledge gap was not clear in the topic selection.



6.50 to 7.49



Project Proposal and Plan demonstrates a rationale that is not clear and the project has no clear identification of the knowledge gap or recommendations by any sponsor or supervisor.



5.00 to 6.49



Project scope, methodology, presentation and project management tools and techniques used



30.00



Proposal is well written with no grammatical or spelling errors has evidence that is has been reviewed at least once. Project Scope, Methodology and all project management tools and techniques are included, such as timeline, WBS, Gantt chart, All sections in the proposal and plan are clearly set our for the reader.

25.50 to 30.00



Proposal is well written with only a few grammatical or spelling errors and has evidence that is has been reviewed at least once. Project Scope, Methodology and all project management tools and techniques are mostly included, such as timeline, WBS, Gantt chart, The proposal and plan overall are clearly set our for the reader.



22.50 to 25.49



Proposal is well written with several grammatical or spelling errors but have no evidence that is has been reviewed. Project Scope, Methodology and all project management tools and techniques are mostly included, such as timeline, WBS, Gantt chart, Most sections in the proposal and plan are clearly set our for the reader.



19.50 to 22.49



Proposal is not well written with many grammatical or spelling errors and no evidence that is has been reviewed. Project Scope, Methodology and a project management tool was used, but not all techniques are complete such the timeline, WBS or Gantt chart, Further refinement of the proposal and plan are expected.

15.00 to 19.49



Practicality of the resources, a realistic timeline and the deliverables in the proposed solution.



20.00



Proposed solution demonstrates full understanding of real-world constraints and the timeline in WBS and Gantt chart specifies due dates for required deliverables. Materials list is reasonable, given resources. Proposal clearly links the problem to the proposed solution.



17.00 to 20.00



Proposed solution demonstrates a good understanding of real-world constraints and the timeline in WBS and Gantt chart specifies most due dates for required deliverables. Materials list is mostly reasonable, given resources. Proposal does link to the problem to the proposed solution.



15.00 to 16.99



Proposed solution demonstrates a poor understanding of real-world constraints and the timeline in WBS and Gantt chart is brief and only specifies some of the due dates for required deliverables. Materials list is lacking details, given resources. Proposal makes very little connection between the proposed solution and the problem.



13.00 to 14.99



Proposed solution is too general or incomplete in places and demonstrates a lack of understanding of real-world constraints. The WBS and Gantt chart are too generic or missing and only specify some of the due dates for required deliverables. Materials list is not given. Proposal makes no connection between the proposed solution and the problem.



10.00 to 12.99



Synthesize and apply information and data to different contexts to facilitate critical thinking, planning, problem solving and decision-making, understanding of the problem and consideration of users.



30.00



Identifies strengths and weaknesses in own thinking: recognizes personal assumptions, values and perspectives, compares to others’, and evaluates them in the context of alternate points of view.



25.50 to 30.00



Identifies strengths and weaknesses in own thinking: recognizes personal assumptions, values and perspectives, compares to others’, with some comparisons of alternate points of view.



22.50 to 25.49



Identifies some personal assumptions, values, and perspectives;
recognizes some assumptions, values and perspectives of others; shallow comparisons of alternate points of view.



19.50 to 22.



Identifies some personal assumptions, values, and perspectives;
does not consider alternate points of view.



15.00 to 19.49








Timeliness and completion of project proposal and plan.

10.00



All required elements of the project proposal and plan are completed and produced on time.

8.50 to 10.00



Most of required elements of the project proposal and plan are produced on time.

7.50 to 8.49



Only a few required elements of the proposal and plan are completed and produced on time.

6.50 to 7.49



Not allrequired elements of the project proposal and plan are completed or produced on time.

5.00 to 6.49







Presentation



Project Plan Sample Format

(subject to change or modified to include systems development projects)




  1. Title: Emerging Technology and Innovation Topic


    1. Project Blog ( Web address provided)

    2. Weekly Progress Reports Plan (In class, Discussion Board or Project Blog entries)



  2. Rationale


    1. Problem domain

    2. Purpose and justification



  3. Supervisor Approval


  4. Research Questions


  5. Conceptual or Theoretical Framework


  6. Methodology


    1. Analysis of sources of information (EndNote, APA Referencing Style)

    2. Research method(s)

    3. Data collection or systems design methods

    4. Ethical Issues

    5. Compliance Requirements (Workplace, Industry or Government regulations)



  7. Project Plan


    1. Deliverables (
      Annotated Bibliography, Journal Paper and Poster Presentation
      .)

    2. Work breakdown structure (WBS)

    3. Risk Analysis

    4. Duration

    5. Gantt chart



  8. References


  9. Appendix(if required)


Answered Same DayMar 20, 2021ITC571Charles Sturt University

Answer To: Project Proposal and Plan Value: 10% Length: 1250 words (5-6 pages) Task WHAT TO DO: Follow the...

Ahmedali answered on Mar 23 2021
142 Votes
Security Challenges in Big Data
Security Challenges in Big Data
Title
Security Challenges in Big Data
Introduction
Big Data is a technology that has enabled the business organizations to manage their massive data and information sets. The management and storage of the data sets has been simplified with the
involvement of Big Data. However, there are security issues that are associated with Big Data in terms of network security attacks, malware attacks, data breaches etc.
The need of the research is due to these security challenges and their associated impacts. The security challenges can have impacts, such as issues with information and network availability, legal obligations, reduced customer engagement & satisfaction levels, poor reputation of the organization in the market, and several others. The research will provide the methods that can be used to deal with these security challenges (Clarke, 2015).
The primary motivation for the research is to eliminate the security challenges so that the protection of the data sets is ensured. The associated benefits that will result with the enhanced security and privacy of the data sets, such as better reputation of the organization in the market, increased customer engagement & base also form the motivation for the research (Tankard, 2012).
The research is significant as the frequency of the security attacks on Big Data has increased over the past few years. It has become essential to control these attacks so that the business organizations and the end-users can make correct use of the data. Also, the research will provide the security controls that shall be applied and these controls will make sure that the privacy and confidentiality of the information is maintained (Lafuente, 2015).
The aim and objective of the research is to research and analyse the security challenges associated with Big Data and perform the root cause analysis to determine the primary & secondary threat agents involved and the security controls that can be applied to treat the risks.
Material & Methods
The existing problem will be solved by exploring and suggesting the security controls and tools that can be used to prevent and avoid the security risks. There are different forms of security challenges that are currently associated with Big Data. These security challenges and issues can be resolved using a wide range of controls under the categories as physical security controls, technical security controls, logical security controls, etc. The details of these controls under different scenarios will be presented through the research.
The methodology that will be used for the research purpose will be qualitative method to explore the research area. The security challenges associated with Big Data are dynamic in nature. The mechanism used by the attackers and the types of the security risks involved may change over time. The qualitative research method will explore the factors and agents associated with the Big Data security issues (Quinn, 2018). The primary step will be the planning of the research and the research estimates, data source identification, and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here