Identifying Your Company and Your Role

Posted on: 1st June 2023

Question

Overview

You have accepted a job from the chief information officer at a small business with 30 employees. The company moved into a new building last year and quickly expanded. The CEO has asked the CIO to serve as executive stakeholder of the project steering committee, which is headed by the lead project manager of the PMO that the company is contracting with.
For this activity, you will establish the fictional company, executives, and team members that you will refer to.

What is the name of this e-commerce company? (Do not choose a real company.) What is the fictional name of the CEO, and what is the fictional name of the CIO? (You can use a friend or family member if you want, or some celebrity or fictional character.)
In 1–2 paragraphs, describe what kind of business your fictional company is in. Do they sell a product? A service? A new government (non-political, please) agency? A nonprofit or charity, perhaps? The one stipulation is that they must conduct business online, and they must be growing.
Finally, choose one of the following roles on the team. Pick one that is closest to your concentration you have studied. For example, software engineering would be closest to software development, forensic investigation would be closest to cybersecurity. If you have any questions on how to answer this, reach out to your instructor. Which of the following is your major (concentration) closest to?
Software Development.
Networking.
IT Project Management.
Data Analytics.
Data Management.
Cybersecurity (yes, this is the correct spelling).
Now that you have identified your area of expertise based on the concentration you have studied, you will need to identify the members of your team. You will take the place of one of the members, so put your name in where it belongs; the other roles can have fictional names assigned to them.
Cybersecurity Specialist:
Networking Specialist:
Data Management Specialist:
IT Project Manager (Assistant to the Project Manager):
Software Development Team Lead:
Please use the template and expand this paper with all details

image description Top level essay Service Our professional unemployed professors are waiting for your signal to offer you the best academic writing service you so deserve.
illustration of a woman populating a checklist.

Solution

Identifying Your Company and Your Role

The company is in the business of selling software. They sell a software product, an application that allows users to input information, and then the application will output the results. Anyone can use the application, but small businesses primarily use it. The company has been around for a while, and they have been growing consistently. Their main products are cloud-based applications, which means they are not limited to one location like other companies (Martini et al., 2018r). This makes it easier for them to provide more services to their customers without moving their office whenever they need to expand their business.

Mountain Tech Motion also sells software that helps people manage their finances better. This includes budgeting, tracking expenses, and credit cards (Camacho et al., 2021). These programs benefit small businesses because they do not have the resources necessary to do all these things themselves; instead, they rely on outside help or even hire an accountant if necessary. They sell these products through a website called “MyMountainTech,” where customers can order them online and have them shipped directly to their homes or office. The company also provides training for people who want to learn how to use their software program to take advantage of all its features. Mountain Tech Motion has other services like web design and development and marketing services (like social media management).

The Cybersecurity Specialist role is a newly created position in this company. The Cybersecurity Specialist will be responsible for managing the cybersecurity program for the company.  My role as a Cybersecurity Specialist in the above company is to ensure that the company's security is at the highest level. This is done by performing regular audits on the entire network and systems and penetration tests (Tüzün et al., 2019). I am also responsible for ensuring that all employees know best practices regarding cyber security. The Cybersecurity Specialist will also need to write policies and procedures for the company's network to define how users can use the web.

Roles and assigned team members:
Cybersecurity Specialist:...................

Networking Specialist: Jack Oliver

Data Management Specialist: Mark Khan

IT Project Manager: Ngwisa Jacob

Software Development Team Lead: Deven Cheng

References

Camacho, M. C., Álvarez, F., Collazos, C. A., Leger, P., Bermúdez, J. D., & Hurtado, J. A. (2021). A collaborative method for scoping software product lines: a case study in a small software company. Applied Sciences, 11(15), 6820.

Martini, A., Fontana, F. A., Biaggi, A., & Roveda, R. (2018, September). Identifying and prioritizing architectural debt through architectural smells: a case study in a large software company. In European conference on software architecture (pp. 320-335). Springer, Cham.

Tüzün, E., Tekinerdogan, B., Macit, Y., & İnce, K. (2019). Adopting integrated application lifecycle management within a large-scale software company: An action research approach. Journal of Systems and Software, 149, 63-82.

Prof. Jordan

Prof. Jordan

1539 reviews | 0 orders
  • Do you need help with an
    online class, essay or assignment?

  • Find the right expert among 500+

    We hire Gradewriters writers from different fields, thoroughly check their credentials, and put them through trials.

    View all writers

Tough Essay Due? Hire Tough Essay Writers!

We have subject matter experts ready 24/7 to tackle your specific tasks and deliver them ON TIME, ready to hand in. Our writers have advanced degrees, and they know exactly what’s required to get you the best possible grade.

Profile picture of ProfWriter

ProfWriter

5

( Reviews)

Staff Level Intermediate

Total orders 0

Competences
Philosophy
English
Archaeology
Profile picture of ProfWriter1

ProfWriter1

5

( Reviews)

Staff Level Intermediate

Total orders 0

Competences
Astronomy
Agriculture
Military sciences
Profile picture of Revaz Pataradze

Revaz Pataradze

5

( Reviews)

Staff Level Elite

Total orders 0

Competences
History
Sociology
Health sciences and medicine
Profile picture of Pro. Nicole

Pro. Nicole

5

( Reviews)

Staff Level Advanced

Total orders 0

Competences
Human Resources (HR)
Macro & Micro economics
Management
Profile picture of Nicole Ashton

Nicole Ashton

5

( Reviews)

Staff Level Advanced

Total orders 0

Competences
English
Archaeology
Gender & Sexual Studies
Profile picture of Prof. Jordan

Prof. Jordan

5

( Reviews)

Staff Level Elite

Total orders 0

Competences
English
Linguistics
Gender & Sexual Studies
Profile picture of Andrea Gibson

Andrea Gibson

5

( Reviews)

Staff Level Elite

Total orders 0

Competences
Linguistics
Archaeology
Sociology
Profile picture of Hanna preston

Hanna preston

5

( Reviews)

Staff Level Advanced

Total orders 0

Competences
English
Archaeology
Political Science
Profile picture of Gilbert Rights

Gilbert Rights

5

( Reviews)

Staff Level Elite

Total orders 0

Competences
English
Business
Marketing
Profile picture of Dr. Payne

Dr. Payne

5

( Reviews)

Staff Level Advanced

Total orders 0

Competences
Linguistics
Gender & Sexual Studies
Business
View all writers

Find the right expert among 500+

We hire Gradewriters writers from different fields, thoroughly check their credentials, and put them through trials.

View all writers