Identifying Your Company and Your Role
Question
Overview
You have accepted a job from the chief information officer at a small business with 30 employees. The company moved into a new building last year and quickly expanded. The CEO has asked the CIO to serve as executive stakeholder of the project steering committee, which is headed by the lead project manager of the PMO that the company is contracting with.
For this activity, you will establish the fictional company, executives, and team members that you will refer to.
What is the name of this e-commerce company? (Do not choose a real company.) What is the fictional name of the CEO, and what is the fictional name of the CIO? (You can use a friend or family member if you want, or some celebrity or fictional character.)
In 1–2 paragraphs, describe what kind of business your fictional company is in. Do they sell a product? A service? A new government (non-political, please) agency? A nonprofit or charity, perhaps? The one stipulation is that they must conduct business online, and they must be growing.
Finally, choose one of the following roles on the team. Pick one that is closest to your concentration you have studied. For example, software engineering would be closest to software development, forensic investigation would be closest to cybersecurity. If you have any questions on how to answer this, reach out to your instructor. Which of the following is your major (concentration) closest to?
Software Development.
Networking.
IT Project Management.
Data Analytics.
Data Management.
Cybersecurity (yes, this is the correct spelling).
Now that you have identified your area of expertise based on the concentration you have studied, you will need to identify the members of your team. You will take the place of one of the members, so put your name in where it belongs; the other roles can have fictional names assigned to them.
Cybersecurity Specialist:
Networking Specialist:
Data Management Specialist:
IT Project Manager (Assistant to the Project Manager):
Software Development Team Lead:
Please use the template and expand this paper with all details
Solution
Identifying Your Company and Your Role
The company is in the business of selling software. They sell a software product, an application that allows users to input information, and then the application will output the results. Anyone can use the application, but small businesses primarily use it. The company has been around for a while, and they have been growing consistently. Their main products are cloud-based applications, which means they are not limited to one location like other companies (Martini et al., 2018r). This makes it easier for them to provide more services to their customers without moving their office whenever they need to expand their business.
Mountain Tech Motion also sells software that helps people manage their finances better. This includes budgeting, tracking expenses, and credit cards (Camacho et al., 2021). These programs benefit small businesses because they do not have the resources necessary to do all these things themselves; instead, they rely on outside help or even hire an accountant if necessary. They sell these products through a website called “MyMountainTech,” where customers can order them online and have them shipped directly to their homes or office. The company also provides training for people who want to learn how to use their software program to take advantage of all its features. Mountain Tech Motion has other services like web design and development and marketing services (like social media management).
The Cybersecurity Specialist role is a newly created position in this company. The Cybersecurity Specialist will be responsible for managing the cybersecurity program for the company. My role as a Cybersecurity Specialist in the above company is to ensure that the company's security is at the highest level. This is done by performing regular audits on the entire network and systems and penetration tests (Tüzün et al., 2019). I am also responsible for ensuring that all employees know best practices regarding cyber security. The Cybersecurity Specialist will also need to write policies and procedures for the company's network to define how users can use the web.
Roles and assigned team members:
Cybersecurity Specialist:...................
Networking Specialist: Jack Oliver
Data Management Specialist: Mark Khan
IT Project Manager: Ngwisa Jacob
Software Development Team Lead: Deven Cheng
References
Camacho, M. C., Álvarez, F., Collazos, C. A., Leger, P., Bermúdez, J. D., & Hurtado, J. A. (2021). A collaborative method for scoping software product lines: a case study in a small software company. Applied Sciences, 11(15), 6820.
Martini, A., Fontana, F. A., Biaggi, A., & Roveda, R. (2018, September). Identifying and prioritizing architectural debt through architectural smells: a case study in a large software company. In European conference on software architecture (pp. 320-335). Springer, Cham.
Tüzün, E., Tekinerdogan, B., Macit, Y., & İnce, K. (2019). Adopting integrated application lifecycle management within a large-scale software company: An action research approach. Journal of Systems and Software, 149, 63-82.
About Author
Tough Essay Due? Hire Tough Essay Writers!
We have subject matter experts ready 24/7 to tackle your specific tasks and deliver them ON TIME, ready to hand in. Our writers have advanced degrees, and they know exactly what’s required to get you the best possible grade.
Find the right expert among 500+
We hire Gradewriters writers from different fields, thoroughly check their credentials, and put them through trials.
View all writers