Business Analysis/Design Student Name Institution Course Date Contents TOC \z \o "1-3" \u \hIntroductionPAGEREF _Toc504742157 \h4Problem StatementPAGEREF _Toc504742158 \h4Two TechnologiesPAGEREF _Toc504742159 \h4Business RequirementsPAGEREF _Toc504742160 \h4ObjectivesPAGEREF _Toc504742161 \h4Project DescriptionPAGEREF _Toc504742162 \h4Technology RequirementsPAGEREF _Toc504742163 \h5Competitors and TechnologyPAGEREF _Toc504742164 \h5Technology One Big Data and Knowledge ManagementPAGEREF _Toc504742165 \h5Technology Two Business Analytics and Business Intelligence SolutionsPAGEREF _Toc504742166 \h6Technology BenefitPAGEREF _Toc504742167 \h6Technology SolutionsPAGEREF _Toc504742168 \h6Technology OnePAGEREF _Toc504742169 \h6Technology TwoPAGEREF _Toc504742170 \h6RecommendationsPAGEREF _Toc504742171 \h6Technology SolutionPAGEREF _Toc504742172 \h7Overall BenefitPAGEREF _Toc504742173 \h7Basic Security ConsiderationsPAGEREF _Toc504742174 \h7Security FeaturesPAGEREF _Toc504742175 \h7Third-Party VendorsPAGEREF _Toc504742176 \h7Internal SafeguardsPAGEREF _Toc504742177 \h7 Final Paper Introduction It is a dream of every small business owner to grow big. However the strategies laid down to achieve such high goals determine how soon they are achieved. Nonetheless customers are the major determiners. In this case small brick-and-mortar business needs to monitor the activities in the deals of designer clothing handbags and shoes. They need a system to and expansion of the business it will be possible to monitor every activity. Basic Security Considerations Security Features The system should embrace cloud computing. Furthermore data abstraction cryptography authentication and authorization measures should be implemented. Third-Party Vendors To inhibit intrusion it is wise enough to have various authorization levels for the data access. The system should have views which different classes of users are able to access. Internal Safeguards Only some few selected individuals should be made aware of what happens behind the normal usage of equipment used in day to day business activities. The actual big data and knowledge management system usage should remain highly confidential. References Paul D. Cadle J. & Yeates D. (2017). Business analysis. Swindon: British Informatics Society Limited. Johri A. (2010). Business analysis. Mumbai [India: Himalaya Pub. House. Laudon K. C. & Traver C. G. (2018). E-commerce: Business technology society. 13th Ed. Boston Pearson [...]
Please review rubric and guidelines. I have attached 4 documents that you will need to complete this paper. It is 3-4 pages.