Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Must be 8-10 pages, single spacedConsider a small online business with the following assets:18 staff members80 customers12 workstations3 serversOne public LAN and one private LANOne physical...

1 answer below »



Purpose


To experience developing an organized system from scratch. To experience working with a group to develop a full organizing system including the use of taxonomies and/or controlled vocabularies as well as encoding of metadata.


Description


You will need to work with a group for this project. Please identify two to three individuals with whom you can work on this project. You will need to share your collaborative document with me.


Develop an organizing system to organize material on a website for a resource collection of your choice. Here are a few resource schemas you may consider using:



  1. Recipe [https://schema.org/RecipeLinks to an external site.

    ]

  2. Music Recording [https://schema.org/MusicRecordingLinks to an external site.

    ]

  3. Drug [https://schema.org/DrugLinks to an external site.

    ]

  4. Video Game [https://schema.org/VideoGameLinks to an external site.

    ]

  5. Vehicle [https://schema.org/VehicleLinks to an external site.

    ]

  6. Dublin Core (General Purpose) [https://www.dublincore.org/specifications/dublin-core/dcmi-terms/Links to an external site.

    ]


Alternatively, you may choose your own topic and use the Dublin Core Schema and Omeka to set up your organized system. Your organizing system should include the selection of appropriate elements from the schema, the development of a basic taxonomy, and the selection or development of appropriate controlled vocabularies for names of persons and organizations (even when not specifically required in the schema), as well as appropriate controlled vocabulary formatting, for dates, languages and identifiers where required or recommended by the schema.


Your completed project should include:



  • a front page listing the members of the group

  • a discussion of the design decisions you must make for this system to be efficient and effective.


You will develop a demo to show how your system would work in practice. While your demonstration does not need to be a fully working website or model, you should include a working faceted taxonomy and metadata encodings corresponding to at least three (3) of your created metadata records. You may use paper mockups or slides to demonstrate how the system would work.


You may use an existing digital library tool such as Omeka, code a demo yourself in HTML, use a website builder, or create a slide presentation/video showing how your system would work.


Your project must include the following:


1) a page discussing design decisions [This should include answering the questions posed herehttps://berkeley.pressbooks.pub/tdo4p/chapter/design-decisions-in-organizing-systems-introduction/Links to an external site.

]


2) a minimum of 10 metadata records for your selected resources formatted according to the example shown in the table below (your metadata record should use a minimum of 8 elements/properties) [skill learned in Assignment 3]:







































































Metadata Element

Value

Content/Vocabulary Standard for Formatting


dc.title



The Discipline of Organizing: 4thProfessional Edition






dc.creator



Glushko, Robert J.



LCNAF




dc.subject



Information organization.



LCSH




dc.description



This textbook takes a multi-disciplinary approach to the field of information organization.






dc.publisher



Glushko, Robert J.






dc.contributor








dc.date



XXXXXXXXXX



W3CDTF




dc.type



Text



DCMI-Type




dc.format



application/pdf



IMT




dc.identifier



XXXXXXXXXX






dc.source



https://berkeley.pressbooks.pub/tdo4p/






dc.language



en



ISO 639-2




NB. Since you will be using schema.org your property/element names will not be the same as shown in the table, since that uses Dublin Core


3) validated metadata encoding in rdf/xml or json for three (3) of your metadata records [See Week 11 Module]


4) the identification and use of established controlled vocabularies for names of persons and organizations (Seehttps://en.wikipedia.org/wiki/Authority_controlLinks to an external site.

) and for all elements where a content standard is recommended or required for a property by the schema eg. language, date. [See Week 5 module]


5) the set of interactions you will enable on your site (these can be built into the system or you can demonstrate how you would like it to work) [Seehttps://berkeley.pressbooks.pub/tdo4p/chapter/designing-resource-based-interactions/Links to an external site.

],


5) a hierarchical taxonomy that will support organization of your resources and at least three facets to enable filtering of the search results. [skill learned in Assignment 4 and Week 10 module]


6) demo/overview of how your website would look with enabled taxonomy and results displayed


NOTE:


It is recommended that you work with at least one other person on this project. Because it is very important to experience issues involving lack of consensus for taxonomy or controlled vocabulary development during this project. A student who would prefer to work alone must reach out to me for agreement first and must also write an additional short paper which will compare their system to a similar system for a similar experience.



Submission Components:



  1. Submit a single pdf document or presentation which combines these elements of your organized system. You may present the document as slides (with or without voice) as you desire.Do not use Prezi or any similar tool.


    1. one page discussing design decisions


    2. 10 metadata records


    3. 3 validated encoded metadata records (rdf/xml, json)


    4. mock ups of interactions showing how they are enabled


    5. full faceted taxonomy that organizes resources and supports search and browse


    6. demo/overview of how your website would look with enabled taxonomy and results displayed


    7. final page providing summary of the work done, decisions made, challenges, disagreements and resolutions, and any final thoughts. (Include a link to your collaborative document on this final page, be sure permissions are set appropriately for me to view this document)




  2. Students who are working alone should add an additional document, 400 words, comparing their system to an existing system on a similar topic/with a similar function. If you work in a group, you will have the chance to discuss issues of compromise and consensus that a solo project will miss. Comparing your system to an existing system will still allow you to experience and discuss some of these issues.


Group Sign Up


Group membership is a self enroll, you will not be randomly assigned. Do the following:



  • Please identify the Final Project Group Sets and self-sign up with one of the available groups. Instructions for self-sign up may be foundat this linkLinks to an external site.

    . (If you choose to work alone, please contact me for permission and so that I might set up Canvas to accept your work.)

  • Create a collaborative document (Microsoft Word or Google Docs) in which you will all be working and share that file with me.

  • Please use one page of the collaborative document to outline tasks and how you will be dividing those tasks between group members.

  • Please add a notation if a group member fails to complete their assigned and agreed on tasks.







Rubric





Final Project Rubric




























































Final Project Rubric

Criteria Ratings Pts




This criterion is linked to a Learning Outcome

Discussion of Design Decisions
Project has one page with a discussion of design decisions.


















2pts

Full Marks

Design decisions include all the organizing questions along with appropriate answers and considerations for each.








1pts

Partial Marks

Some elements of design decisions were not discussed or more thorough discussion is needed in elements mentioned.








0pts

No Marks

No discussion of design decisions present or discussion is lacking to the point where meaningful assessment is impossible.






2pts






This criterion is linked to a Learning Outcome

Metadata Records
Project includes the required amount of metadata records


















3
to >2.0
pts

Full Marks

10 or more metadata records provided








2
to >0.0
pts

Partial Marks

Less than 10 metadata records provided.








0pts

No Marks

No sample records provided.






3pts






This criterion is linked to a Learning Outcome

Schema
Appropriate schema applied to records


















2pts

Full Marks

Excellent use of chosen metadata schema.








1pts

Partial Marks

Some issues with your schema (not a schema, schema not well described, schema not well implemented)








0pts

No Marks

No schema used.






2pts






This criterion is linked to a Learning Outcome

Controlled Vocabulary
Excellent selection and use of controlled vocabulary for value and formatting of schema properties.


















2pts

Full Marks

Excellent description of controlled vocabulary and correct application to properties shown across the organizing system.








1pts

Partial Marks

Reasonable description of selection and use of vocabularies however some properties that should have used a controlled vocabulary do not or formatting rules for the content standard are ignored or not applied correctly.








0pts

No Marks

No controlled vocabulary used or no explanation of why it was chosen or how applied.






2pts






This criterion is linked to a Learning Outcome

Encoded Records
Project includes the required amount of metadata records


















3
to >2.0
pts

Full Marks

3 or more encoded metadata records in json or xml








2
to >0.0
pts

Partial Marks

Less than 3 encoded records or serious problems noted - such as invalid xml or json








0pts

No Marks

No encoded metadata records submitted.






3pts






This criterion is linked to a Learning Outcome

Taxonomy
Taxonomy Design and Diagram


















3
to >2.0
pts

Full Marks

Full faceted taxonomy that organizes resources and supports search and browse, excellent taxonomy diagram and identification of taxonomy levels, categories and facets.








2
to >0.0
pts

Partial Marks

Good start. However, your taxonomy diagram needed more layers/ no facets mentioned which would help to refine search supported by the taxonomy/ diagram is confusing and hard to follow








0pts

No Marks

No taxonomy presented.






3pts






This criterion is linked to a Learning Outcome

Demo System with Interactions
Demo/Wireframe demonstrating interactions.


















4
to >3.0
pts

Full Marks

Excellent Demo. Demo is interactive or clearly provides sufficient evidence through screenshots/images to indicate how interactions would take place. [Example: search, sort, filter, rate, comment, popular, etc]








3
to >0.0
pts

Partial Marks

Good demo. Demo provides a good description of how the system would work but could be enhanced with additional screenshots or explanations.








0pts

No Marks

No demo/wireframe provided.






4pts






This criterion is linked to a Learning Outcome

Final Summary Report Page
Report describing the system (including this page and first page, as well as others in document should be 800 words).
If you worked alone, there should be an individual 400 page report comparing your system to another system.


















5
to >3.0
pts

Full Marks

Excellent report which describes the process of designing your system and implementing the demo system.








3
to >0.0
pts

Partial Marks

Good report which describes the process of designing your system, however more detail would be invaluable.








0pts

No Marks

Report Missing






5pts






This criterion is linked to a Learning Outcome

Formatting
Appropriate style used (APA, MLA). Name of authors listed and references included. Grammar and Spelling appropriate.


















1pts

Full Marks

Format follows standard style guidelines, author names and references supplied. Correct grammar and spelling used. Excellent writing and communication of concepts.








0.5pts

Partial Marks

Some issues with style, grammar, or spelling.








0pts

No Marks

Answer is hard to understand due to writing style. The Writing Center (http://www4.uwm.edu/writingcenter/) can provide assistance with writing.






1pts



Answered 4 days After Mar 02, 2024

Solution

Shubham answered on Mar 06 2024
15 Votes
Introduction
In the online businesses, the need for implementing robust security measures is important. The assignment describes about security considerations for small online business that includes 18 staff members, 80 customers, 12 workstations, 3 servers, a public LAN, a private LAN, a physical location, several databases and a web platform. It is important to understand intricacies of assets that are important for development of effective security policy. It includes addressing unique challenges that a
ives in digital environment. The assets of small online business require understanding the critical need for development of comprehensive security policy. The policy is considered for protecting confidential information, maintaining customer trust and ensuring uninte
upted business operations. In order to handle cyber threats, it requires development of well-crafted security policy. It includes considering precautionary measure that includes proactive strategy to fortify business against potential risks and vulnerabilities. The section describes the importance of adopting security policy as indispensable element in overarching strategy for success of company and resilience in digital era.
Understanding the Business Environment
Asset Inventory:
In the development of a reliable security policy, this is requiring to have comprehensive understanding of assets of small online business that is essential. It includes following is detailed asset inventory:
· Staff Members (18): Identification of roles, access levels and nature of data that are required to be handled.
· Customers (80): Categorization on based on transaction frequency, account privileges and sensitive information access.
· Workstations (12): Handles individual units, their locations and purposes in the business operations.
· Servers (3): Specify functions of each server like hosting databases, managing web platforms and handling communication services (Zhao, Song and Li, 2021).
· LANs (Public and Private): Define architecture, access controls and segmentation between public and private networks.
· Physical Location: Detailing the security measures in place like surveillance, access controls and emergency protocols.
· Databases: Listing the types of databases, information stores and access levels for staff and systems.
· Web Platform: Identify functionalities, user interfaces and potential vulnerabilities.
It includes considering detailed asset inventory that provides foundation for ensuring security measures. This requires describing unique characteristics of each asset for ensuring more targeted and effective security policy.
Threat Assessment
· Cyber Threats: It includes identifying potential risks like malware, phishing attacks, data
eaches and denial-of-service attacks that could compromise digital assets.
· Physical Security Risks: Assessing the vulnerabilities of physical location including
eak-ins, theft and damage to equipment and infrastructure.
· Internal Threats: It includes recognizing possibility of insider threats that can be intentional and unintentional including unauthorized access, data mishandling and employee negligence.
This requires conducting comprehensive threat assessment that allows for ensuring understanding of the potential risks that can be faced by the business. The information becomes important and this can help in ensuring implementation of security policy that addresses specific vulnerabilities and safeguards. It can help in addressing diverse range of threats for ensuring holistic approach to the security posture of business.
Defining Security Objectives
Confidentiality, Integrity, and Availability (CIA) Triad:
It is important for the business for provide foundation for development of robust security policy. It includes adopting principles of Confidentiality, Integrity and Availability (CIA) Triad. Confidentiality will ensure that sensitive information remains protected from unauthorized access (Wang et al. 2021). This will help in maintaining trust of both staff members and customers. Integrity focuses on accuracy and reliability of data that will help in staying safe against unauthorized modifications and tampering. Availability ensures that business assets like workstations, servers and web platform that are required to be consistently accessed by authorized users for preventing disruptions to operations.
Business-specific Security Goals:
This requires recognizing unique nature of small online business that will help in development of security objectives to align with specific needs and challenges. In implementation of confidentiality, the goal is to ensure security of customer and staff information that are stored in databases. It includes implementing robust access controls and encryption measures. Integrity objectives ensures accuracy of customer data and transaction records that will help in preventing unauthorized alterations that could compromise trust. Availability goals focus on minimizing downtime and ensuring continuous access to the web platform for that is required for staff and customers. This involves implementing redundancy measures for servers, regular maintenance of workstations and contingency plans for potential disruptions (Li, Chen and Ariann, 2019). In the business operation in the digital space, this requires focusing on securing public and private LANs to mitigate risk of unauthorized access and potential cyber threats. Business-specific security goals address human element that helps in acknowledging that staff members play important role in maintaining security. This includes ongoing training programs to enhance awareness of security best practices. It includes recognizing and mitigating social engineering threats and ensuring implementation of culture of security consciousness among employees. It is important to follow security objectives to unique aspects of small online business. It ensures that the security policy has generic framework. It also ensures that it includes dynamic and effective strategy that directly addresses distinct vulnerabilities and requirements of business.
Top of Form
Network Security
Public and Private LAN Security Measures:
This will help in securing public and private Local Area Networks that will help in securing digital infrastructure of small online business. The use of public LAN includes robust measures like firewalls, intrusion detection systems and encryption protocols that will be implemented (Han et al. 2019). Firewalls act like a first line of defence, monitoring and controlling incoming and outgoing network traffic. Intrusion detection systems provide real-time monitoring that will help in alerting system administrators to potential security threats. Encryption ensures that data transmitted over public LAN that remains confidential and tamper-resistant. This will help in adding extra layer of protection against unauthorized access. The private LAN includes internal network that will also benefit from firewalls and encryption. Firewalls help filter incoming and outgoing traffic that will help in preventing unauthorized access to sensitive information. Encryption of internal communications can help in additional ba
ier against potential threats in the organization. It includes regular monitoring and updates of security measures that will be enforced to adapt to evolving cyber threats.
Server Security:
The security of servers is important because it stores and manages vital business data. It ensures server security and provides with comprehensive set of guidelines that will be established. Regular software updates and patches will be implemented promptly that is required for addressing potential vulnerabilities. Access controls will be enforced for ensuring that only authorized personnel have access to sensitive data and system configurations. It includes use of monitoring tools will be used for tracking server activities and identify anomalies that may indicate security
each. This also includes use of robust backup and recovery strategy that will be implemented for mitigating impact of potential data...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Looking For Homework Help? Get Help From Best Experts!

Copy and Paste Your Assignment Here