This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Capability maturity model (CMM)

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Capability maturity model (CMM)

Q.4

Capability maturity model (CMM) is a strategy used to measure and define the level of an organization’s software development process. The first level is the Initial used in new organizations. The repeatable level used in tracking the cost of developments, organization schedules, and the functionality of the software. The defined level standardizes the development of software approaches in an organization. While the managed level helps an organization in the management process and improvement of software and quality through detailing measures of the system. Lastly, the optimized level strengthens all process of development through optimization of efforts by innovation (Piccoli, 2016).

Q.5

The mobile platform involves the hardware and software environment for most of the electronic devices. In information technologies, these platforms have three characteristics. The main features include Mobile commerce, which is used to facilitate business through online. Most business nowadays gets transacted electronically due to the improved information systems where a customer can shop and pay for goods electronically. Secondly, they incorporate ubiquity. They are easy and accessible and used with different devices simultaneously. They provide the consumer with the ability to connect in every mode of interaction and channels on one device without restrictions due to their mobility factor. With this feature, organizations can interact with customers and market their products simultaneously. The third attribute of the platform is identifiability (Piccoli, 2016) it provides an end-user experienced whereby the user can protect their data through various restriction on the platform. Through this feature, it is possible used to track down and to display the location information used primarily for tracking inventory in a sales company.

Don't use plagiarised sources.Get your custom essay just from $11/page

Q.6

Environmental sustainability refers to the use of natural resources, effectively avoiding depletion while the products interact well with the environment. It encompasses meeting the present generation’s needs without affecting the possibilities of the next generation meeting their needs. The school purchases less energy-consuming information technology equipment built with nontoxic substances. The school also provides areas of waste disposal to all non-degradable equipment while also encourages the planting of trees in the environment.

Q.7

Information systems face many risks. However, different measures are put to prevent hazards from occurring. Encryption mainly used in securing electronic transmissions. A company dealing in eCommerce protects its data that others can use to siphon money electronically or manipulate the trading information to their benefit leading to losses in the company. Digital authorities protect electronic transactions by authenticating the users to prevent an unauthorized user from conducting business on behalf of a company that can lead to the closing of the business.

Q.8

From the studies, the application of the various mitigation measures to threat to information technologies is beneficial since mainly all activities occur online. Through this, I get to learn how to protect my data and crucial information and my computer from malicious users. Also, I learn to appreciate the various uses of the platform and use them for beneficial purposes, not for misleading. I can either use the internet to either study or learn about different things. Economic sustainability is one concept everybody should put into use. The current issue of global warming results in many problems, but through practising economic sustainability, these problems could come to an end. Also, the uses of these platforms should be monitored to avoid misuse because of their identifiability attribute.

 

 

Reference

Piccoli, G. (2016). Information Systems for Managers [Ebook] (3rd ed., pp. 87-135). Prospect Press. Retrieved from http://dl4a.org/uploads/pdf/Information%20system%20for%20managers.pdf

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask