ITBUSINESSREQUIREMENTSANDSWOTANALYSIS.edited.edited x
Running head: IT BUSINESS REQUIREMENTS AND SWOT ANALYSIS 1
IT BUSINESS REQUIREMENTS AND SWOT ANALYSIS 3
Title:
Student’s Name:
Professor’s Name:
Institution’s Name:
Date:
Step 1: Define the IT Business Requirements
Various IT requirements are noted to be related to Data storage whereby the security procedures and the rules are very important in having the systems and the information protected from any unauthorized access, modification, disruption, and many more. They include data protection whereby the encryption of the data is very important, whereby it helps in the transforming of the intelligible data into unintelligible which have been categorized into the functional and the nonfunctional requirements. Data protection would be achieved by the use of the security technologies such as firewalls installation, having configuration settings, and also intrusion detection systems (Alimonti, 2021).
Functional requirements.
IT functional requirements can be described as an elaborated description of the services that specific application software can provide to a business. It often describes a software system along with its components. Such functions can be data manipulation, calculation as well as other specific functionality which stipulates what function a software system will possibly perform. The primary functional requirements are;
a. Audit trails.
It entails a step-by-step assessment of trade details and financial transactions to provide more information about the original source. Audit as a functional requirement, audit trails is used in assessing the systems, applications and transactions being done such systems. This helps business entities limit security violations and even application flaws.
b. Separation of the duties and the data.
Separation of the duties and the data is a building block for internal controls for an organization. It is one of the most important functional requirements deals with duties delegation and segmentation. It helps in data management and aspect that enhance the sustainability of risk management along with threats minimization in business. Data separation involves the storing of the data in the environment either by the use of the software. It helps minimize potential disruptions and compromise of the workflow associated with data use. (Eckhardt et al., 2016).
Nonfunctional requirements.
Nonfunctional requirements are defined as specifications of the system attributes that serve as constraints on the program’s design that promote system useability and effectiveness(Ruwart, 2018). These include;
a. Speed.
This requirement dictates how fast an application within a system responds to specific commands(Eckhardt et al., 2016). It helps to assess the capability of a system to manage and perhaps increase workload when users simultaneously utilize different applications.
b. Security.
This is a critical aspect of nonfunctional requirements that aims at protecting data. Security features included in systems and applications include firewalls that are used to minimize the chances of unauthorized access of sensitive data(Eckhardt et al., 2016).
c. Compatibility.
This is one of the nonfunctional requirements whose essence is to assess how well different applications can run on a system. It allows systems users with different OS to utilize the same application on the said operating systems. In order for application users to determine and perhaps confirm system compatibility, it is highly recommended to read product descriptions and specifications(Ruwart, 2018).
SWOT Analysis
First, articulate each of these areas for the SWOT analysis: Identify the key strengths (advantages) of adopting cloud computing.
Cloud computing adoption is noted to be having the benefits of having data availability, cost-saving in terms of the expenses have been much reduced, collaboration effect and thus higher performance efficiency, there is also much flexibility, and also that it has much wide scalability(Ruwart, 2018).
Identify the major weaknesses (disadvantages) of adopting cloud computing.
There are various weaknesses of adopting cloud computing that include technical-related issues, having much network connection dependency whereby there is needed a stable network at all times, limited features problems, loss of control and many more (Ruwart, 2018).
Are there any opportunities that cloud computing enables the organization to take advantage of?
Yes, many opportunities are there which an organization benefits from the cloud computing from which it would take advantage from that would include the reduced cost in the IT services whereby by moving to cloud computing there is reduced time delays, energy consumption, and also no wage bills being incurred on staff’s payments. Another opportunity is the collaboration efficiency whereby there would be more sharing and communication whereby cloud computing model which would make the whole process easier. There is also the opportunity of having automation of the updates which happen on the IT requirements on the service, which would be based on the computer processing power and the upgrading of the servers (Ruwart, 2018).
What are the threats that an organization considering adopting cloud computing needs to consider? Next, evaluate how to achieve the following outcomes to add to the SWOT analysis: How can you use strengths to take advantage of opportunities?
The opportunities include using the location and the student relations in having to attract the international and the domestic students in schools. Also, it would be used in the seeking of the various business conferences, thus having to increase the visibility of the academic quality, and also having the developing of the investment banking and the developing of investments on the various unique programs which would be offered by institutions. Other ways would include the content creation services opportunities staking advantage, and the self-directed learning activities being benefited much from (50MINUTES, 2015).
How can you overcome weaknesses to take advantage of opportunities?
Having to understand the weaknesses would help on understanding the point advantage would be taken from and thus making one much more prepared of the weaknesses and having to working on them and thus having the positive reaction toward the weakness. There can also be done hiring of the skills which one notices that he/she is lacking and thus able to remain competitive at all times. Other ways would include having guidance from an expert which one trusts, being prepared all times on having to learn from eth weakness which one has, and ensuring that one remains just good enough all times (Decision Aid Publishing, 2019).
How can you use strengths to avoid threats?
The strengths would be used in having the avoidance of the threats by having the use of the most known unique locations which are having the attraction of the high-profile faculties thus having the promotion of the various local industries. Also, it can be achieved by having the user of the unique curriculum which would be much better at addressing the relations of the students and thus having a cost-effective education, which is competitive and has more of the tuition dependence (50MINUTES, 2015).
How can you minimize weaknesses and avoid threats?
The weakness and the threats would be minimized by having the observing of the time factor, having the maintenance of the focus all times as this would help on having the threat having no probability of happening at all times. Having to improve on the weakness which has been identified would help in sealing the gaps identified and thus having the advantage being taken on the opportunities and no threats would happen to take place (Decision Aid Publishing, 2019).
References
50MINUTES. (2015). The SWOT analysis: A key tool for developing your business strategy. 50 Minutes.
Alimonti, R. (2021). Digital markets and implications for competition policy: Evidence from recent economic analysis. Economic Analysis in EU Competition Policy, 112-145.
https://doi.org/10.4337/9781800370197.00014
Decision Aid Publishing. (2019). SWOT analysis logbook: Special notebook for SWOT analysis.
Eckhardt, J., Vogelsang, A., & Fernández, D. M. (2016). Are “non-functional” requirements really non-functional? Proceedings of the 38th International Conference on Software Engineering.
https://doi.org/10.1145/2884781.2884788
Ruwart, T. (2018). Analysis report for Exascale storage requirements for scientific data.
https://doi.org/10.2172/1422359