Trident ITM301 all cases and SLPS


Assignment Overview

Every company has, to a greater or lesser extent, an information subsystem — that is, a means by which it gathers data, interprets it, and makes it available to employees through a distribution system. Whether we are talking about marketing information, cost projections, accounting results, or internal quality reports, every company depends on knowledge to support its planning, decision making, and control.

So how does knowledge fit into the picture? The emergence of the field called knowledge management in the last 10 years or so has highlighted some key propositions:

  • All organizations are storehouses of knowledge that operate in information-rich environments made up of people and things both inside and outside the organization itself
  • Organizations organize, interpret, and evaluate this information to solve organizational problems
  • Knowledge is the primary mechanism for processing and utilizing information
  • People’s brains are the key knowledge resource of any organization
  • Codified knowledge stored in books, audio and video tapes, and computer systems can be an important knowledge resource as well
  • There are organizational processes and strategies generally and IT management processes and strategies in particular that can significantly enhance the ability of organizations to use their knowledge resources to solve organizational problems effectively

Several of these themes will come up again in later modules in this course. But by way of introduction to the subject, let’s take a look at some views of how knowledge works (these are the REQUIRED readings):

  1. Leonard, D., & Swap, W. (2005). The Knowledge Coach. HBS Working Knowledge. Retrieved from:
  2. Levinson, M. (2007). Knowledge Management Definition and Solutions. Retrieved from:
  3. Wiig, K.M. (N.D.) On The Management of Knowledge. The Wiig Group. Retrieved from

Case Assignment

For this case assignment (1) read through the three articles then (2) select any one IS theory listed at: and read about that theory in-depth, then (3) write a 3-4 page essay that discusses how data, information and knowledge are applicable in the context of that theory, or vise-versa. Be sure your discussion demonstrates that you understand the meanings and differences between data, information and knowledge. In your discussion give a real-world example of data, knowledge and information in the context of your theory and provide some commentary on that scenario as to what was done right, what could be better to achieve a better outcome.


The purpose of the Session Long Project in Trident University classes is to give you the opportunity to explore the applicability of the Module to your own life, work, and place in space and time, and to experiment with the Module to see how the otherwise academically rigorous presentation of a topic may, with more or less work and/or trauma, become “up close and personal”. This is done in a number of different ways — sometimes cumulative papers, sometimes practical hands-on experimentation with a tool of some sort, sometimes reflections on a place of work or life. The common thread is personal application, aimed at demonstrating a cumulative knowledge and understanding of the course’s material.

For this module, the Project will take the form of encounters with online Internet-based resources of various forms but with the purpose of identifying different types of information systems that are being used in the real world.

Here you can find information about the different types of information systems available out there.

Introduction to Information Systems. Retrieved from and

After reading the definitions and browsing these web sites PC Magazine,, for real applications of information systems, do the following:

Please write a 2-3 page paper, structured as follows (please use these headings):

  • Define an information system and types of information systems
  • Provide three examples of information systems used in real life (from your experience or from the sites you visited) and tell us what type of information systems they (for example, an information system used by a cashier in a grocery store is a transaction processing system because it registers all the transactions).
  • How this is related to the learning objectives of this module?


Assignment Overview

In this case we investigate the technology-related decision making in organizations.

  • We start by introducing the objective of governance specific to the information technology function and services.
  • Next, we offer to you the fundamental battle in technology management—the constant tug-of-war between centralization and decentralization.
  • We then provide several examples of how real-world organizations have reconciled their choices in how to structure themselves.
  • Next, we present an overview of decision making processes and some of the methods for making decisions.
  • Finally, we present insight into the complexity of real-world choices highlight the politics of information

Before writing-up the essay for this case, read and review the following documents (we recommend in this same order):

  1. Objective of IT governance:
  2. Centralization versus Decentralization:
  3. Different models / Roundtable discussion:
  4. IT Governance Structure for a public child-welfare agency:
  5. University of South Florida IT Governance Structure:
  6. Overview of Decision Making:
  7. Main methods of business decision-making:

Case Assignment

Write a 4-5 page essay describing the IT governance structure and decision-making processes in your organization. Include a discussion on the strengths and weaknesses of your organization’s circumstances and present and justify one specific improvement you would make to either the structure or a process; be sure to apply the concepts and use the terminology provided in the readings.


One of the most critical problems faced by the information technology department in virtually every organization is how to provide effective help to end-users facing problems with the technology. The help desk is the point at which every frustration, every concern, and every mistake known to humanity is brought for resolution. Typically staffed by lower-level and often new personnel, help desks often have a reputation for minimal service and buck-passing. It shouldn’t be this way, and doesn’t have to be; there’s a lot of information out there about how to effectively manage and coordinate help services, and a great deal of information about how important is to do so. But like many aspects of IT, this knowledge doesn’t always make it into the field in many organizations.

A while ago, TechRepublic ran a series on how to set up and manage help desks. You can read the series here:

  1. “Setting up a successful help desk–physical considerations” ( and
  2. “Try these efficiency strategies when setting up a successful help desk” (

For this SLP you are expected to evaluate in a 2-3 page paper, the best strategies for a successful help desk within an organization. Identify three (3) best practices and provide some examples on how and why those strategies are important. Because this is a SLP, you are expected to discuss the topic with practical approach. Do you have experiences that you can describe about user support (as a user or as an IT person)? why were they good or bad? what suggestions do you have?


Assignment Overview

The case for this module intends to ensure that you can: (a) describe the general structure of a computer network, (b) present some typical procedures for securing and maintaining networks, and (c) identify the links between the technological components and the overall sociotechnical framework of the firm.

Before writing-up this case, read and review the following documents (we recommend reading in this same order):

  1. Network Structure:
  2. Breeding, M. (2013). Designing and Building the Best Small Office Network From the Ground Up. Network Computing. Available at
  3. CISCO (2010). Internetworking Technology Handbook. Retrieved from
  4. Network Structure Design:
  5. Paquet, C. (2013). Network Security Concepts and Policies. CISCO Press. Section on Security Policies. Available at
  6. Ten steps to securing Networks:
  7. Sociotechnical systems in the 21st century:
  8. Sociotechnical knowledge creation and storage in organizations:

Case Assignment

Now, imagine you are starting a new business; you are opening a medium-sized food store in your hometown. (if a food store does not suit you, then any similar-sized business is fine for this assignment.) Specifically, you now must design the technology and networking architecture for your business.

For this case, write a 4-5 page description and justification for the technology and network architecture you decide upon and design. Be sure to articulate the structure, your procedure for securing and maintaining the network, and discuss and rationalize the sociotechnical linkages that you design between your organization and the technology.


This assignment is different from the previous ones. This time, you’re going to create your own web content. For this assignment, you are to try to create your own wiki and focus on discovering and understanding benefits of this contemporary content delivery tool.

This reading will give you some ideas of the use of wikis within organizations:

  1. Grace, P. L. (2009). Wikis as a knowledge management tool. Journal of Knowledge Management, 13(4), 64-74. Retrieved from
  2. One popular site that allows you to create your own personal wiki is: Other similar sites are listed here:

If for some reason you cannot create your own wiki, you can also look for existing wiki sites for evaluation. Here you have a nice list of them:


Then write a 2-3 page paper, structured as follows (use these headings):

  • What is a wiki and how can be useful for an organization?
  • Select ONE of the products that allows you to create a wiki and describe it in detail.
  • Identify ONE organizational goal that would be supported by this wiki.
  • What features would you offer in the wiki to support that organizational goal?
  • How this is related to the learning objectives of this module?


Assignment Overview

Everyday sales items purchased online like soaps, juices, shampoos etc. have almost doubled between the year 2006 and 2010 and it is expected that these figures will keep doubling by 2014. Few years back, e-commerce was not expected to be what is now. It is clear that all bueinesses need to provide online services sooner or later to remain in the market. The same is true for mobile commerce.

In order to identify what businesses need to do to start their online presence, go over the background readings and any other elective readings you find useful.

When you have read the articles listed in the background material and any other relevant reading you could find, imagine that you want take advantage of the Internet and communication technologies for your business.

“Tools and strategies needed to follow in order to implement electronic and mobile commerce in businesses”

Case Assignment

For this case, write a 4-5 page description of the steps businesses need to follow to create an online presence, the required skills and tools and the opportunities and challenges of electronic and mobile commerce.


In this assignment you will evaluate real examples of electronic and mobile commerce that have changed your experience as a consumer. Filling out this table should be easier if you relate to the different industries as a “consumer”.

Please fill out the rows of this table making it a document of 2-3 pages. The first row is just an example of the exercise.

Industry Brief description of the E-commerce and/or M-Commerce model in the industry Website Examples
Education and Training Continuing education is costly and just keeping up-to-date with advances often requires taking training courses and traveling to conferences. In the last 5 years continuing education in many fields has been moving online faster. It is estimated that by 2016 over 50 percent of doctors for example, will be building their skills through online learning. Companies such as Cisco save millions by moving training to the Internet. Fully online accreddited PhD granting university:

  • Auto
  • Etertaiment
  • Financial
  • Retail
  • Travel
  • Any other Industry

Write a conclusion paragraph about how these websites have changed your consumer behavior.


Assignment Overview

Taking care of information falls to those who own the information to develop ethical guidelines about how to manage it. Treating sensitive corporate information as a valuable resource is good management. Building a corporate culture based on ethical principles that employees can understand and implement is responsible management. Organizations should develop written policies establishing employee guidelines, procedures, and organizational rules for information.

Epolicies typically include: Ethical computer use policy, Information privacy policy, Acceptable use policy, email privacy policy, Internet use policy, and Anti-spam policy.

Case Assignment

In this assignment you are expected to read the required readings listed in the background material and at least one other elective reading.

When you complete the readings, write a 4-5 pages paper addressing the topic:

In your paper, be sure to include:

  • What are security policies or e-policies?
  • Explain three security policies that you would primarily recommend to an organization to have and why?
  • How security policies should be implemented in organizations?


In this assignment you are expected to fill out the following table in a 2-3 page document:

Security Threat Description of the security threat and its impact to organizations. Provide an example. What can organizations do to keep their information secure from each threat? Make sure you discuss both: technology tools (software or hardware) as well as the organizational strategies (policies, leadership, training, etc.).

Computer Virus

  • Description:
  • Impact:
  • Example of a Computer Virus:
  • Technology (software, hardware):
  • Organizational strategies (policies, leadership, training, etc.)
  • Adware
  • Spyware
  • Trojan
  • Sniffer
  • Any other threat

NOTE – All Assignments Expectations

Your assignment will be graded following these expectations:

  • Precision: the questions asked are answered.
  • Clarity: Your answers are clear and show your good understanding of the topic.
  • Breadth and depth: The scope covered in your paper is directly related to the questions of the assignment and the learning objectives of the module.
  • Critical thinking: It is important to read the “required readings” posted in the background material plus others you find relevant. Your paper should include important concepts from these readings and incorporate YOUR reactions and examples that illustrate your reflective judgment and good understanding of the concepts.

NOTE – All SLP Assignments Expectations

Your assignment will be graded following these expectations:

  • Precision: the questions asked are answered.
  • Clarity: Your answers are clear and show your good understanding of the topic.
  • Breadth and depth: The scope covered in your paper is directly related to the questions of the assignment and the learning objectives of the module.
  • Your paper meets the page requirements not counting the cover page or the references pages.

Get help in any of you Trident ITM301 assignment at an affordable price. 

Need a Professional Writer to Work on Your Assignments? We will deliver Unique and Quality Work. Good Grade Guarantee!!

Order Unique Answer Now