Preview

BSA 375 Week 3 Individual

Good Essays
Open Document
Open Document
793 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
BSA 375 Week 3 Individual
Riordan Service Request SR-rm-022, Part 2
Name Here
BSA/375
25 May, 2015
Instructor Name, Instructor

Last week, we discussed in general detail the roles of the corporate faculty and staff members in regards to development and deployment of the upgraded Human Resource database application. While the roles of individuals was made fairly clear, planning is still in the earliest of phases. The roles of team members discussed last week revealed that additional research is needed in order to formulate the most efficient means of transitioning to the upgraded application. Moreover, several different flows of data were discussed in a fairly general manner in regards to improving efficiency of the flow of said data. Efficiency of the software can be greatly increased in reducing the data flow footprint to provide the most efficient flow of data between departments. Security Controls
The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.

Data
As with any other system, all data needs to be kept secure. Employee confidentiality is of paramount importance, particularly in a system that hold and utilizes potentially sensitive personal employee information. Moreover, seemingly innocuous information such as standards and procedures within the company also need to be kept secure. Any secure, sensitive, or proprietary information should be encrypted and password



References: Apollo Group, Inc. (2013). Virtual Organization Portal: Riordan Manufacturing. Retrieved from https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/index.asp Valacich, J. S., George, J. F., and Hoffer, J. A. (2012). Essentials of Systems Analysis and Design (5th ed.). Upper Saddle River, NJ: Pearson Education. Retrieved from the University of Phoenix eBook Collection database. Khosrowpour, M. (1999). Managing Information Technology Resources in Organizations in the Next Millennium. Idea Group Publishing Yourdon, E. (2006). Just Enough Structured Analysis (rev. 013106). Yourdon Press

You May Also Find These Documents Helpful

  • Powerful Essays

    Cmgt410 Team Paper Riordan

    • 4511 Words
    • 19 Pages

    Valacich, J. S., George, J. F., & Hoffer, J. A. (2009). Essentials of Systems Analysis and Design (4th ed.). Upper Saddle River, NJ: Prentice Hall…

    • 4511 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Khosrowpour, M. (1999). Managing information technology resources in organizations in the next millennium. Idea Group Inc. (IGI).…

    • 839 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Service Request Sr Rm 004

    • 1582 Words
    • 7 Pages

    Valacich, J., George, J., & Roth, R. (2009). Essentials of systems analysis and design (4th ed.). Upper Saddle River, NJ: Prentice Hall.…

    • 1582 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Bsa 385 Week 2

    • 791 Words
    • 4 Pages

    Developing software is far from an exact science and without a structured system to guide the process a project is likely to fail. Defining and adhering to a Software Development Life Cycle (SDLC) early in the project will help to guide the development of a new information system. In addition to having the structure for the development team to work within a defined and agree upon SDLC will help to set the proper expectations for deliverables with the stakeholders and customer(s). Smith Consulting has been given the task of creating a Frequent Shopper program for Kudler Fine Foods. As a result Smith Consulting needs to decide on which SDLC will work best for this project. In addition to selecting a SDLC to use Smith Consulting will need to determine how testing will be conducted. The purpose of this paper is to compare and contrast Waterfall and Scrum SDLC's, including how testing will be performed for each, such that Smith Consulting will be able to make an informed decision on which methodology to use when creating the Frequent Shopper Program for Kudler Fine Foods.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Bsa 375 Week 2 Dq

    • 257 Words
    • 2 Pages

    The company should have taken some time to redesign or retool the application at the first sign of user displeasure.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The project requires an overhaul of the corporation’s Human Resource Information System (HRIS). The desired goal for this project can be time consuming with the integration of the new centrally located database. Meanwhile, implementing on-site training sessions can help to test the system and enable the employees to acquire the proper skills needed for the new HR hardware and software. It would be pertinent to seek the help of a project manager to help coordinate and achieve the specific targets within the specified budget and project deadline.…

    • 581 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Sysyem

    • 3253 Words
    • 14 Pages

    Course Code CSE312 Course Category Course Title SYSTEM ANALYSIS AND DESIGN Courses with conceptual focus Course Planner 14810::Jagwinder Kaur Lectures 3.0 Tutorials Practicals Credits 0.0 0.0 3.0…

    • 3253 Words
    • 14 Pages
    Powerful Essays
  • Best Essays

    Whitten, J., Bentley, L.., Barlow, V. Systems Analysis and Design Methods (2nd edition). 1989. Irwin College Publishing: Boston…

    • 2859 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    Ibid.; Kraemer, Kenneth L., Dutton, William H., and Northrop, Alana (1981) The Management of Information Systems…

    • 45763 Words
    • 184 Pages
    Satisfactory Essays
  • Powerful Essays

    Online Auction

    • 2817 Words
    • 12 Pages

    Hoffer, J. A., George, J. F & Valacich, J. S. (2004). Modern Systems Analysis and Design (2nd Edition).…

    • 2817 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Kendal, Kenneth E. (2008). Systems analysis and design. (Kenneth E. Kendal & Julie E. Kendal). New Jersey: Pearson Prentice Hall.…

    • 2777 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Essentials of Systems Analysis and Design, Fourth Edition, by Joseph S. Valacich, Joey F. George, and Jeffrey A. Hoffer. Published by Prentice Hall. Copyright © 2009 by Pearson Education, Inc.…

    • 13969 Words
    • 56 Pages
    Satisfactory Essays
  • Good Essays

    UMLsec

    • 559 Words
    • 2 Pages

    Besides the analysis of today’s software development processes expose that the cautious engineering of security into the general system design is repeatedly ignored. Security aspects s are typically built into an application are only included later during the system administration phase. There are quite a few reasons for this. the security , required tools behind security engineering, the integration of security into a system by hand is tricky and errors often occur due to the lack of knowledge of the individual developers. The developers need to concrete guidelines for constructing secure applications.…

    • 559 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Wixom, B, Roth, R, & Dennis A , System Analysis and Design 4th Edn, 2009, John Wiley & Sons Inc, USA, pp.…

    • 9511 Words
    • 39 Pages
    Satisfactory Essays
  • Powerful Essays

    Secure Sdlc

    • 1102 Words
    • 5 Pages

    Abstract- It is to be to present the information about existing processes, standards, life cycle models, frameworks, and methodologies that support or could support secure software development. This includes software engineering process group (SEPG) members, software developers, and managers seeing information about existing software development life cycle (SDLC) processes that address security. Index Terms- SDLC processes, security Risk Identification, security engineering activities.…

    • 1102 Words
    • 5 Pages
    Powerful Essays