Preview

Chapter 1 the Problem and Its Background

Powerful Essays
Open Document
Open Document
1544 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chapter 1 the Problem and Its Background
CHAPTER 1

THE PROBLEM AND ITS BACKGROUND

Introduction

Nowadays, modern companies in our country used proximity cards/access badges to maintain that only authorized employees enters the specific offices or floors of the building/company office. This helps in ensuring the security of every room and offices of the company.

But a gaping hole in this system is the ‘what ifs’ questions it needed answers for; what if the employee just went to work and do nothing?, what if I just let somebody badge in my card to report for work? The company’s productivity will then be lessened by such kind of action of staff going to work and just sit around in front of the computer?

Such issue made us come with the idea to make the company more productive by being able to monitor which staff worker is doing his/her job and which is not, and by getting the jobs done also calculates the salary the employee will earn work working his/her head out.

The proposed system will be an improvisation of the standard proximity card (passive card) that only allows access to certain doors on a certain office/building. The improvisation of such in the proposed system includes registering the proximity card the a certain employee and making it also a time card (for it tracks the time the employee went out of office and enters back in) and then computes the salary of the employees per cut-off based on the time he/she enter and leaves the building. Also, the access card will also serve as login to the computer the employee will use during the entire shift/office hours.

Background of the Study Based on past experiences with proximity cards, the researchers came up with this study as we wanted to improve how it is used make the ID and access cards more cost-efficient for the employees and the company alike. Most business process outsourcing (BPO) companies (Convergys and Teletech to name a few) use proximity cards for their employees to access doors and floors of the building. With

You May Also Find These Documents Helpful

  • Best Essays

    The department is responsible for educating and assisting in working through the company’s policy and in dealing with policy breaches. Data security, quality, and integrity are valued commodities for a business who wishes to continue to prosper and grow, but the improper handling can also easily jeopardize its future (Pratt, 2008). Riordan’s need to consolidate data that has been created offline and potentially could be out-of-date is a data manager idea of a horror story. Through the use of data management solutions that support transactions processing in one location supports a more secure and efficient high-volume business. What also need to be considered are the multinational laws that Riordan had to adhere to because of its global footprint; legal requirements relating to data vary by country. It would be remiss to overlook the security of employees within the company because security falls under the domain of human resources. To take a safer, smarter approach toward personnel security the proposal will also include recommendations for company badges. A badge policy would keep track of employees as they come and go plus alert employees to the presence of a visitor. Monitoring equipment should also be considered as this would be ideal for public gathering places to record any activity after hours by using a motion sensor…

    • 3105 Words
    • 13 Pages
    Best Essays
  • Satisfactory Essays

    Chapter 12 Assignment

    • 498 Words
    • 2 Pages

    Individual Assessment John Appleseed ACC/291 June 30, 2011 William Backer Individual Assessment E9-2 Trudy Company incurred the following costs. 1. Sales tax on factory machinery purchased $ 5,000 2. Painting of and lettering on truck immediately upon purchase 700 3. Installation and testing of factory machinery 2,000 4.…

    • 498 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Biometric scanners should be used for all sensitive areas as a second method to prevent card cloning . Those that have access to sensitive areas or doors that can allow more than one person through such as the shipping area and front double doors will be issued a Personal Identity Verification…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Nt1310 Unit 1 Assignment 1

    • 7711 Words
    • 31 Pages

    The system stores all the necessary information about the user. A new user is first registered to the system and the corresponding information is burned in the RFID tag. This RFID tag will then be accessible through the system. When a registered user comes to the entry point and puts his/her tag into the reader, the system checks whether he/she is a registered user or an imposter. If the user is registered, then the tab information is matched with the user information stored in system. The door is opened after the successful authentication and is closed automatically after a specific time interval. The check-in information is also stored in the database with the corresponding date and time. A log is also generated by the system according to the check-in information. Finally, this check-in information is stored in a central server along with the basic information of the…

    • 7711 Words
    • 31 Pages
    Better Essays
  • Satisfactory Essays

    6. A. Allows you to give commands to QuickBooks according to the type of transaction being entered…

    • 612 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Authentication: The key badge given to each employee will be used to allow access and authenticate that employee. An initial temporary password will be applied to each employee logon information and require the employee to change the password on first login. The policy will be set up to ensure that the employees create strong passwords and are required to change their passwords every 60 to 90 days. Employees at higher levels who have access to sensitive information may also be required to use two-factor authentication such as fingerprint biometric access to get into rooms and buildings and/or simply login to their computer system. PIN numbers will be used to access server rooms. Token will be issued to provide access remotely to allow for secure logins.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Many facilities are finding it difficult to find the right system for their work places. This proves the importance of…

    • 726 Words
    • 3 Pages
    Good Essays
  • Good Essays

    "The His'Er problem" is what stuck out most to me. There are many phrases and issues people could bring up today in modern times. The author speaks of how she feels about phrases like man and wo-man or man kind. The one main point she brings up is "to each his own". She along with many other people feels this is politically incorrect. Why do we still refer to people as man or man kind? Does our society still feel men are more superior? We may never know for each individual but all together society is saying…

    • 447 Words
    • 1 Page
    Good Essays
  • Better Essays

    The implementation of McBride's new electronic key cards provides an excellent source of control in the area of physical security. Employees will now only have access to areas that they are authorized to there specific authorization level. Any unauthorized access to any area of any McBride facility will be punishable in accordance with McBride's Non-Compliance Policy. A service charge may be assessed for access cards and/or keys that are lost, stolen, or are not returned. (The Trusted Toolkit, 2007) Lost cards will also be immediately deactivated at the release of a new card. Card access records and visitor logs must also be kept current for routine review based upon the needs of the company.…

    • 897 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    This work contains INF 220 Week 5 Assignment Final Paper Information Systems as a Whole…

    • 496 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Problem And Solution

    • 1361 Words
    • 13 Pages

    4 points 2. What is the maximum amount you would pay for an asset that gen- 2 pt for a…

    • 1361 Words
    • 13 Pages
    Good Essays
  • Satisfactory Essays

    Adverse Impact

    • 424 Words
    • 2 Pages

    Measure the employees job performance based on job related standards. This will confirm whether the employee is performing to…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Business Level 2

    • 355 Words
    • 2 Pages

    If the individual employee doesn’t have a standard of work then it is difficult for them to know what they should be doing and when, making it tricky for them to monitor their performance.…

    • 355 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Pfizer Case Study

    • 1500 Words
    • 6 Pages

    Pfizer is the world’s largest research-based pharmaceuticals firm and also a well known Pharmaceutical company. So their most of the work depends on research, developing Strategies and innovate. They were trying to find a new way of system which makes their Work more effective and efficient. Pfizer find out that their worker spends more time on Business research and data analysis to the creation of documents and other routine Support like Goggling and making power points and also spending so much time on Menial tasks rather than knowledge work. The average Pfizer employee was spending 20 Percent to 40 percent of his or her time on supporting work (creating documents, typing Notes, doing research, manipulating data, scheduling meetings) and only 60 percent to 80 Percent on knowledge work (strategy, innovation, networking, collaborating, critical Thinking. That’s why Pfizer starting to find a solution of this problem to increase their Efficiency and effectiveness. Pfizer build a new kind of structure by using Microsoft Outlook where their connecting to a outsourcing company where Pfizer can connect with Different worker by email where they can connect with any worker around world and get Cost specification for their requested work. By using this process the time spent on Analysis of data has been reduce, also have many financial benefits and employees also get rid of their boring work.…

    • 1500 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Due to lack of skills among employees and shortage of employees in the management, our organization has been experiencing a decrease in the level of productivity. In the meantime, fundamental project details change, responses come in late and some never arrive, leaving the management incomplete. As a result, the productivity of the employees is not always as great as it could be.…

    • 1954 Words
    • 8 Pages
    Powerful Essays

Related Topics