Computer technology and the networked organization


    Click here to get an A+ paper at a Discount

    Computer technology and the networked organization

    Assignment Overview

    The case for this module intends to ensure that you can: (a) describe the general structure of a computer network, (b) present some typical procedures for securing and maintaining networks, and (c) identify the links between the technological components and the overall sociotechnical framework of the firm.

    Before writing-up this case, read and review the following documents (we recommend reading in this same order):
    1.Network Structure: http://www.pcmech.com/article/network-structure/
    2.Breeding, M. (2013). Designing and Building the Best Small Office Network From the Ground Up. Network Computing. Available at http://www.networkcomputing.com/netdesign/soho1.html
    1.CISCO (2010). Internetworking Technology Handbook. Retrieved from http://docwiki.cisco.com/wiki/Internetworking_Technology_Handbook
    2.Network Structure Design: http://www.geeksnerds.co.uk/it-support/computer-network/
    3.Paquet, C. (2013). Network Security Concepts and Policies. CISCO Press. Section on Security Policies. Available at http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3
    4.Ten steps to securing Networks: http://howto.techworld.com/security/1862/ten-steps-to-secure-networking/
    5.Sociotechnical systems in the 21st century: http://www.bayswaterinst.org/storage/Sociotechnical%20systems%20theory%20in%20the%2021st%20Century.pdf
    6.Sociotechnical knowledge creation and storage in organizations: http://www.iriboffice.com/LinkClick.aspx?fileticket=6n0yNKnHr5A%3D&tabid=245&mid=636

    Case Assignment

    Now, imagine you are starting a new business; you are opening a medium-sized food store in your hometown. (if a food store does not suit you, then any similar-sized business is fine for this assignment.) Specifically, you now must design the technology and networking architecture for your business.

    For this case, write a 4-5 page description and justification for the technology and network architecture you decide upon and design. Be sure to articulate the structure, your procedure for securing and maintaining the network, and discuss and rationalize the sociotechnical linkages that you design between your organization and the technology.

    Need a Professional Writer to Work on this Paper and Give you Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

    Assignment Expectations

    Your assignment will be graded following these expectations:
    •Precision: the questions asked are answered.
    •Clarity: Your answers are clear and show your good understanding of the topic.
    •Breadth and depth: The scope covered in your paper is directly related to the questions of the assignment and the learning objectives of the module.
    •Critical thinking: It is important to read the “required readings” posted in the background material plus others you find relevant. Your paper should include important concepts from these readings and incorporate YOUR reactions and examples that illustrate your reflective judgment and good understanding of the concepts.
    •Your paper is well written and the references are properly cited and listed (refer to TUI guidelines http://support.trident.edu/files/Well-Written-Paper.pdf)
    •Your paper meets the page requirements not counting the cover page or the references pages.

    When your paper is done, send it in.

    Privacy Policy | Contact

    Module 3 – Background

    Computer technology and the networked organization

    Required Reading

    Breeding, M. (2013). Designing and Building the Best Small Office Network From the Ground Up. Network Computing. Available at http://www.networkcomputing.com/netdesign/soho1.html

    Network Structure: http://www.pcmech.com/article/network-structure/

    CISCO (2010). Internetworking Technology Handbook. Retrieved from http://docwiki.cisco.com/wiki/Internetworking_Technology_Handbook

    Securing your network with Policies and Procedures: http://www.brighthub.com/computing/smb-security/articles/4776.aspx

    Ten steps to securing Networks: http://howto.techworld.com/security/1862/ten-steps-to-secure-networking/

    Sociotechnical systems in the 21st century: http://www.bayswaterinst.org/storage/Sociotechnical%20systems%20theory%20in%20the%2021st%20Century.pdf

    Sociotechnical knowledge creation and storage in organizations: http://www.iriboffice.com/LinkClick.aspx?fileticket=6n0yNKnHr5A%3D&tabid=245&mid=636

    Optional Reading

    Finney, R. (1999) The Politics of Information and Projects. ITMWEB White Paper. Retrieved 2010, from http://www.itmweb.com/essay008.htm

    Schuman, E. (2005) The CIO Who Admitted Too Much. CIOInsight. Retrieved 2010, from http://www.cioinsight.com/article2/0,1540,1852559,00.asp

    Strassmann, P.A. (n/a) The Politics of Information Management: Policy Guidelines. Information Economics Press. Retrieved 2010, from http://www.infoeconomics.com/info-politics.php.

    Strassmann, P.A. (2005) Check: How to Verify if You are Important. CIOInsight . July 8, 2005. Retrieved October 15, 2007, from http://www.cioinsight.com/article2/0,1540,1849919,00.asp

    Gulledge, T.R. and Haszko, R.A. (N.D.) The Information Technology Enabled Organization: A Major Social Transformation in the U.S.A. George Mason University. Retrieved 2010, from http://www.unesco.org/most/gulled.htm

    Optional Supplemental Materials

    Click the link for Optional Supplemental Materials.

    Privacy Policy | Contact

    Need a Professional Writer to Work on this Paper and Give you Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

    Click here to get an A+ paper at a Discount


    Order This Paper Now

                                                                                                                                      Order Now