IFSM 370 Information Technology

Attribute

Full points

Partial points

No points

Possible Points

The business problem

The business problem is defined and discussed in sufficient depth to set the stage for the proposed solution, and demonstrates critical thinking and understanding of the course concepts.

The business problem is partially defined and/or discussed; it may not adequately set the stage for the proposed solution and/or may not demonstrate critical thinking and understanding of course concepts.

The business problem is not defined.

1

Proposed technology solution

The proposed technology solution appropriately addresses the business scenario/problem, and demonstrates understanding of course concepts, analysis, and critical thinking.

The proposed technology solution somewhat addresses the business scenario/problem; it may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking.

No technology solution is proposed.

3

Proposed processes and policies

Processes and policies relevant to the proposed solution are presented; work demonstrates understanding of course concepts, analysis, and critical thinking.

The processes and policies somewhat address the business scenario/problem; work may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking.

No proposed processes or policies are presented.

2

Business and managerial impacts and risks

Impact and risks relevant to the proposed solution and the business strategy are presented from a managerial perspective; work demonstrates understanding of course concepts, analysis, and critical thinking.

Impact and risks are somewhat relevant to the proposed solution and/or the business strategy; they may or may not be presented from a managerial perspective; and they may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking.

No impact or risks are presented.

1

Cybersecurity challenges and risks identified

Cybersecurity challenges and risks of the proposed solution are appropriately identified; work demonstrates understanding of course concepts, analysis, and critical thinking.

Cybersecurity challenges and risks of the proposed solution are partially identified and/or explained; work may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking.

Cybersecurity challenges and risks are not included, or do not apply to the proposed solution.

2

Mitigation strategies

Appropriate mitigation strategies are provided and thoroughly explained. All risks of the proposed solution are addressed.

Mitigation strategies are somewhat appropriate and/or partially explained. They may only partially address the risks of the proposed solution.

No mitigation strategies are provided.

1

External research

More than two sources other than the assigned readings and course materials are incorporated and used effectively.

One or two sources other than the assigned readings and course materials, but they are not properly incorporated or used and/or are not effective or appropriate.

No external research is incorporated.

1

Document format

The document reflects effective organization and correct sentence structure, grammar, and spelling; it is presented in a professional format; and references are appropriately incorporated and cited, using APA style.

The document is not well-organized, and/or contains grammar and/or spelling errors; and/or it does not follow APA style for references and citations.

The document is extremely poorly written and does not convey the information.

1

Total Points:

12