Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

case study


ISEC 655 Case Study – An Analysis of the Secom Case

Please review “Secom – Managing Security in a Risky World.” It details the decision environment related to cybersecurity and in many ways illustrates the struggle between security and operations that has been discussed in your texts.

This assignment is due Feb. 25, 2024 by 11:59 p.m. – No Exceptions; late submission will receive an automatic 20% deduction in the grade.

For this paper, I would like you to read the case completely and answer the following using the materials in the case study, the textbook, videos, PowerPoint files, and any other resources that I have provided in this class in order to justify your answers:

A. Discuss the organization.

a. What business is it in?

b. What are its strengths and weaknesses?

c. What are their opportunities?

d. Who are their customers and what do they have to do to satisfy them?

B. Discuss the issue and decision factors.

a. What is the decision to be made in the case?

b. What facts are relevant to a solution? How are the relevant to the problem?

c. What are the decision criteria?

C. Discuss the alternative solutions.

a. What are the alternative solutions?

b. What is your evaluation of each alternative given the decision criteria? What are the pros and cons of each? (Back this up with some metrics, analytics, justifications from case, etc.)

c. Which solution do you think is best, and why? (Again, make a case here using facts!)

D. Describe the implementation of your solution.

a. What would your plan of action be to implement the solution? (Answer this by outlining your plan into who, what, where, when, why, and how.)

b. What do you think the results will be and why? (One last time, you have to make a case for this using facts and research.)

Your paper should consist of

six
sections:

1. Executive Summary (A very brief summary of sections 2-5)

2. Introduction (Addresses A above)

3. Problem Description (Addresses B above)

4. Alternative Solutions (Addresses C above)

5. Solution Implementation (Addresses D above)

6. Conclusion (Summarizes sections 2-5 in more detail)

Some points of clarification.

· There is no minimum or maximum page count. The paper should be as long as it needs to be in order to fully address the sections above. However, I do expect that papers will not go over 12 to 15 pages. Of course, you can use less.

· Times New Roman, 12 pt. font, 1” margins, double-spaced.

· APA formatting for all references in text and for the reference section, as well as throughout the entire paper (see posted formatting requirements in Announcements in Canvas).

· Be smart with how you construct your paper with respect to headings. If you give me six level one headings, it will make it much more difficult for me to discern if you have addressed each area. Instead, use the six level one headings (for each of the

six
sections), and answer each question using a level two heading dedicated to the issue that you are addressing.

· There are case analysis and writing resources for you in the resources section. Please make use of them.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Computer Science 2 Assignments

Operational Excellence Week 2 Assignment Information Systems for Business and Beyond Questions: · Chapter 3 – study questions 1-8, Exercise 2, 4 & 5 Information Technology and Organizational Learning Assignment: Chapter 3 – Complete the two essay assignments noted below:  · Review the strategic integration section.  Note what strategic integration is and how

Discussion 3: generative adversarial nets

  Generative adversarial nets are mentioned in 2014 by Ian Goodfellow et al.  Why is generative adversarial network a key turning point in the history of generative modeling? Why is the field of image generation important? 

Week 3 – Linear Regression & Business Decision Making

attached file.  An asset management company must replace the manager of its two signature mutual funds, who is about to retire. Two candidates have been short-listed. The management team is divided and cannot decide which of the two candidates would make the better mutual fund manager. The retiring manager presents

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

IT 202

5/15/24, 10:59 AM Assignment Information 1/3 IT 202 Project One Milestone Guidelines and Rubric Overview For the purposes of this assignment, imagine that you are a systems architect at a medium-sized publishing company with 130 employees. The company primarily publishes books, both in print and online. It also produces other

Assessments

Perimeter defense techniques Evaluate the types of assessments, select one that you might use, and explain why it is important. Of the top eight areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

Week 2 understanding on Python.

PDF for reference purpose other file is requirement Python Installation & Examples Atif Farid Mohammad PhD 1. Open any Browser 2. Go to 3. Click at Download button 4. Go to your Download Folder (In both Windows and Mac) a. In Windows you will have the file: Anaconda3-2022.05-Windows-x86_64.exe b. Double

Computer Science Assignments

Operational Excellence Week 2 Assignment information Systems for Business and Beyond Questions · Chapter 2 – study questions 1-10, Exercise 2      Information Technology and Organizational Learning Questions · Chapter 2 – Note why the IT organizational structure is an important concept to understand.  Also, note the role of

Computer Science IT project assignment

Pg. 01 Project I Project Deadline: Sunday 12/5/2024 @ 23:59 [Total Mark is 14] Introduction to Database IT244 College of Computing and Informatics Project Instructions · You can work on this project as a group (minimum 2 and maximum 3 students). Each group member must submit the project individually with

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

coding

Assignment 6 Due Saturday 11:59 pm (Week 14) Part 1 (50 points) We will explore the Marvel Network Universe. The dataset which you will find in Blackboard consists of the hero’s networks. For this dataset, you will need to ask yourself 3 questions (i.e which superhero knows more superheroes?) ,

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

How hackers get info

Identify at least two ways in which hackers gather information about companies. What can companies do to limit this access, specifically to the ways you have identified? Which type of information can be gathered with enumeration? How and why should companies protect themselves against enumeration attempts?