CETM50 – Technology Management for Organisations

Assignment 1 of 2 – IoT report

This assignment contributes 40% to your final module mark.

The following learning outcomes will be assessed:

Knowledge

Critical appreciation of the policies and procedures to manage data and information securely, to manage risk in technology management

2. Critical analysis of the strategic challenges, risks, opportunities and practical applications afforded by cybersecurity and data science for organisations to enable effective business operation and ensure business continuity Important Information

You are required to submit your work within the bounds of the University Infringement of Assessment Regulations (see your Programme Guide). Plagiarism, paraphrasing and downloading large amounts of information from external sources, will not be tolerated and will be dealt with severely. Although you should make full use of any source material, which would normally be an occasional sentence and/or paragraph (referenced) followed by your own critical analysis/evaluation. You will receive no marks for work that is not your own. Your work may be subject to checks for originality which can include use of an electronic plagiarism detection service.

Where you are asked to submit an individual piece of work, the work must be entirely your own. The safety of your assessments is your responsibility. You must not permit another student access to your work. Where referencing is required, unless otherwise stated, the Harvard referencing system must be used (see your Programme Guide).

Please ensure that you retain a duplicate of your assignment. We are required to send samples of student work to the external examiners for moderation purposes. It will also safeguard in the unlikely event of your work going astray.

Assessment 001 Internet of Things Report

Creation of an “infograph” poster (one A1 sheet) and commentary (2000 words) covering learning outcomes K1 and K2. Students will be expected to undertake research into an issue relevant to technology management and in the context of data science and cybersecurity. Students will be expected to take into account and report on relevant professional, legal and ethical aspects. Students will have the opportunity to present their infograph” in a conference style poster presentation.

Part 1: Infograph (50 marks)

The Internet of Things is a wide ranging and complex one. For the first part of this assignment you are required to produce an Infograph (1 page) outlining the issues of cybersecurity/ big data in an “Internet of Things” application area of interest you and focus on both the typical threats and opportunities that either a) individuals in society or b) organisations face from your chosen topic area. The design of your Infograph and the content of the Infograph is left to you to decide but you should consider visual impact, key messages, data to support, examples and underpinning research.

It is suggested that you make use of the Infographics tool available at the url below https://www.canva.com/create/infographics/

You are not restricted to using this tool and you can make use of any similar tool you wish

Part 2: Commentary (50 marks)

The second part of the assessment is a commentary on the Infograph discussing the rationale for the Internet of Things topic you have chosen, why it is important (please refer to the literature to support your argument), what the key big data and security issues are and how your Infographic illustrates these. You should include any professional or ethical concerns and issues in your commentary. You should include detail on your target audience and what message you are trying to get to the target audience.

Your report (maximum 2000 words) should include the following sections:

  • Introduction
  • Rationale for IoT area
  • Target Audience
  • Importance of Issue to big data and security– key issues
  • Impact on Society – critical discussion of the threats & opportunities to either

individuals in society or to organisations

  • Professional and ethical issues
  • Conclusions
  • References