HI5019 Strategic Information Systems for Business and Enterprise

HOLMES INSTITUTE
FACULTY OF
HIGHER EDUCATION

HI5019 Strategic Information Systems for Business and Enterprise Group Assignment

Assessment Details and Submission Guidelines
TrimesterT1 2020
Unit CodeHI5019
Unit TitleStrategic Information Systems for Business and Enterprise
Assessment TypeGroup assignment
Assessment TitleCyber Security Case Studies
Purpose of the
assessment (with ULO
Mapping)
Students are required to:
 Evaluate systems development methodologies and the role of accountants in
system development projects (ULO 3)
 Appraise the risks inherent in computer-based systems/ERP, including the role
of ethics and the various internal control processes that need to be in place
(ULO 4)
 Critically evaluate the range of cultural, security, privacy and ethical issues
facing individuals and organisations as a result of information systems (ULO 5)
Weight30% of the total assessments
Total Marks30
Word limitNot more than 3,500 words
Due DateWeek 10, Friday 5:00 pm (AEST)
Submission
Guidelines
 This assignment is to be completed by a group of 2 – 4 students.
 Students must report the names and student IDs for all group members to the
lecturer of their class by e-mail before the end of week 8.
 All work must be submitted on Blackboard by the due date along with a completed
Assignment Cover Page.
 The assignment must be in MS Word format, no spacing, 12-pt Arial font and 2 cm
margins on all four sides of your page with appropriate section headings and page
numbers.
 Reference sources must be cited in the text of the report, and listed appropriately
at the end in a reference list using Harvard referencing style.

Page 2 of 6
HI5019 Strategic Information Systems for Business and Enterprise Group Assignment
Assignment Specifications
Purpose
This assignment aims at developing your group’s understanding of latest cyber security issues and
their impacts on business operations. Your group is required to critically evaluate three recent cyber
security case studies and their lessons to business organisations.
Required
Your group is required to conduct a literature search and select three (3) cyber security case studies
that are published between 2014 – 2019. Based on the selected case studies, your group is required
to prepare a written report to cover the following points:
 Description of case company in each case
o General information of the company
o Key business processes of the company
 Cyber security issues covered in each case
o Key cyber security issues identified in each case
o Risks associated with the issues
o Impacts of the issues on case company
 Lessons learnt from each case
o Actions reported in each case to address the identified issues
o Outcomes of the reported actions
o Proposed actions other than the reported ones that could be taken to address the
issues
o Suggestions for preventing the issues in future
Assignment Structure
The report should include the following components:




Assignment cover page clearly stating your name and student number
A table of contents
A brief introduction or overview of what the report is about.
Body of the report with sections to answer the above issues and with appropriate section
headings
Conclusion
List of references

The report should be grounded on relevant literature and all references must be properly cited and included
in the reference list.
Page 3 of 6
HI5019 Strategic Information Systems for Business and Enterprise Group Assignment
Marking criteria

Marking criteriaWeighting
General information of case companies2%
Key business processes of case companies2%
Key cyber security issues identified in each case4%
Risks associated with the identified cyber security issues3%
Impacts of the identified cyber security issues3%
Actions reported to address the identified issues4%
Outcomes of the reported actions4%
Proposed actions other than the reported ones for addressing the issues2%
Suggestions for preventing the issues in future2%
Presentation2%
Research quality2%
TOTAL Weight30%

Page 4 of 6
HI5019 Strategic Information Systems for Business and Enterprise Group Assignment
Marking Rubric

ExcellentVery GoodGoodSatisfactoryUnsatisfactory
General
Information of
case companies
/2
Provide clear,
concise and
accurate
information of
case companies.
Provide
complete and
accurate
information of
case companies.
Provide accurate
information of
case companies.
Provide
information of
case companies
that is mostly
accurate.
Fail to provide
accurate
information of
case companies.
Key business
processes of
case companies
/2
Identify all key
business
processes of
case companies.
Identify most key
business process
of case
companies.
Identify most key
business
processes of
case companies
with minor
errors.
Identify some
business
processes of
case companies
with errors
and/or
omissions.
Fail to identify
any key business
process of case
companies.
Key cyber
security issues
identified in each
case
/4
Identify all key
cyber security
issues identified
in the cases.
Identify most key
cyber security
issues identified
in the cases.
Identify most key
cyber security
issues identified
in the cases with
minor errors.
Identify some
key cyber
security issues
identified in the
cases with errors
and/or
omissions.
Fail to identify
any key cyber
security issue
identified in the
cases.
Risks associated
with the
identified cyber
security issues
/3
Present an
excellent
discussion on
risks associated
with the
identified cyber
security issues.
Present a very
good discussion
on risks
associated with
the identified
cyber security
issues.
Present a good
discussion on
risks associated
with the
identified cyber
security issues
with minor
errors and/or
omissions.
Present a
reasonable
discussion on
risks associated
with the
identified cyber
security issues
with errors
and/or
omissions.
Fail to present a
proper
discussion on
risks associated
with the
identified cyber
security issues.
Impacts of the
identified cyber
security issues
/3
Present an
excellent
discussion on
impacts of the
identified cyber
security issues.
Present a very
good discussion
on impacts of
the identified
cyber security
issues.
Present a good
discussion on
impacts of the
identified cyber
security issues
minor errors
and/or
omissions.
Present a
reasonable
discussion on
impacts of the
identified cyber
security issues
with errors
and/or
omissions.
Fail to present a
proper
discussion on
impacts of the
identified cyber
security issues.
Actions reported
to address the
identified issues
/4
Identify all
reported actions
for addressing
the identified
issues.
Identify most
reported actions
for addressing
the identified
issues.
Identify most
reported actions
for addressing
the identified
issues with
minor errors.
Identify some
reported actions
for addressing
the identified
issues with
errors and/or
omissions.
Fail to identify
any reported
action for
addressing the
identified issues.

Page 5 of 6
HI5019 Strategic Information Systems for Business and Enterprise Group Assignment

Outcomes of the
reported actions
/4
Present an
excellent
discussion on
outcomes of the
reported actions.
Present a very
good discussion
on outcomes of
the reported
actions.
Present a good
discussion on
outcomes of the
reported actions
with minor
errors and/or
omissions.
Present a
reasonable
discussion on
outcomes of the
reported actions
with errors
and/or
omissions.
Fail to present a
proper
discussion on
outcomes of the
reported actions.
Proposed actions
other than the
reported ones
for addressing
the issues
/2
Propose
practical and
effective actions
based on strong
arguments.
Propose
practical and
effective actions
based on good
arguments.
Propose sound
actions based on
reasonably good
arguments.
Proposed sound
actions with
errors and
omissions based
on valid
arguments.
Fail to propose
proper actions
or back the
proposed
actions with
valid argument..
Suggestions for
preventing the
issues in future
/2
Present an
excellent
discussion on
suggestions for
preventing the
issues in future.
Present a very
good discussion
on suggestions
for preventing
the issues in
future.
Present a good
discussion on
suggestions for
preventing the
issues in future
with minor
errors and/or
omissions.
Present a
reasonable
discussion on
suggestions for
preventing the
issues in future
with errors
and/or
omissions.
Fail to present a
proper
discussion on
suggestions for
preventing the
issues in future.
Presentation
/2
Report included
all elements and
was very well
presented.
Writing flowed
clearly and
sections were
linked very
effectively.
Referencing was
exemplary.
English was used
very effectively
and was error
free.
Report included
all elements and
was well
presented.
Writing flowed
clearly and
sections were
linked
effectively.
Referencing was
of a high
standard.
English was used
effectively with
very few errors
present.
Report included
all elements and
was generally
presented
appropriately.
Writing mostly
flowed well and
sections were
linked.
Referencing was
in accordance
with guidelines.
English was used
effectively with
few errors
present.
Report included
most elements
and was
adequately
presented.
Writing
sometimes did
not flow clearly
leaving the
paper to seem
disjointed in
areas.
Referencing was
somewhat in
accordance with
guidelines. Basic
English was used
with some
errors present.
Report lacked
some elements
and was poorly
presented.
Writing often
did not flow
clearly leaving
the paper to
seem somewhat
disjointed.
Referencing was
not entirely in
accordance with
relevant
guidelines. Basic
English was used
with errors
present.

Page 6 of 6
HI5019 Strategic Information Systems for Business and Enterprise Group Assignment

Research Quality
/2
An extensive
amount of high
quality evidence
from peer
reviewed journal
articles and
other sources
was included
and used
effectively to
support
discussion.
A broad range of
quality peer
reviewed journal
references and
other sources
was included
and used
effectively to
support
discussion.
An adequate
range of peer
reviewed journal
references was
included and
used to support
discussion.
An adequate
range of peer
reviewed journal
references was
included and
used to a basic
extent to
support
discussion.
Little or no peer
reviewed journal
references were
included and
these were
rarely used to
support
discussion
effectively.

Leave a Reply

Your email address will not be published. Required fields are marked *