IFSM 370 Information Technology
Attribute | Full points | Partial points | No points | Possible Points | |
The business problem | The business problem is defined and discussed in sufficient depth to set the stage for the proposed solution, and demonstrates critical thinking and understanding of the course concepts. | The business problem is partially defined and/or discussed; it may not adequately set the stage for the proposed solution and/or may not demonstrate critical thinking and understanding of course concepts. | The business problem is not defined. | 1 | |
Proposed technology solution | The proposed technology solution appropriately addresses the business scenario/problem, and demonstrates understanding of course concepts, analysis, and critical thinking. | The proposed technology solution somewhat addresses the business scenario/problem; it may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking. | No technology solution is proposed. | 3 | |
Proposed processes and policies | Processes and policies relevant to the proposed solution are presented; work demonstrates understanding of course concepts, analysis, and critical thinking. | The processes and policies somewhat address the business scenario/problem; work may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking. | No proposed processes or policies are presented. | 2 | |
Business and managerial impacts and risks | Impact and risks relevant to the proposed solution and the business strategy are presented from a managerial perspective; work demonstrates understanding of course concepts, analysis, and critical thinking. | Impact and risks are somewhat relevant to the proposed solution and/or the business strategy; they may or may not be presented from a managerial perspective; and they may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking. | No impact or risks are presented. | 1 | |
Cybersecurity challenges and risks identified | Cybersecurity challenges and risks of the proposed solution are appropriately identified; work demonstrates understanding of course concepts, analysis, and critical thinking. | Cybersecurity challenges and risks of the proposed solution are partially identified and/or explained; work may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking. | Cybersecurity challenges and risks are not included, or do not apply to the proposed solution. | 2 | |
Mitigation strategies | Appropriate mitigation strategies are provided and thoroughly explained. All risks of the proposed solution are addressed. | Mitigation strategies are somewhat appropriate and/or partially explained. They may only partially address the risks of the proposed solution. | No mitigation strategies are provided. | 1 | |
External research | More than two sources other than the assigned readings and course materials are incorporated and used effectively. | One or two sources other than the assigned readings and course materials, but they are not properly incorporated or used and/or are not effective or appropriate. | No external research is incorporated. | 1 | |
Document format | The document reflects effective organization and correct sentence structure, grammar, and spelling; it is presented in a professional format; and references are appropriately incorporated and cited, using APA style. | The document is not well-organized, and/or contains grammar and/or spelling errors; and/or it does not follow APA style for references and citations. | The document is extremely poorly written and does not convey the information. | 1 | |
Total Points: | 12 |