Preview

BSA 375 Week 3 Individual

Good Essays
Open Document
Open Document
793 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
BSA 375 Week 3 Individual
Riordan Service Request SR-rm-022, Part 2
Name Here
BSA/375
25 May, 2015
Instructor Name, Instructor

Last week, we discussed in general detail the roles of the corporate faculty and staff members in regards to development and deployment of the upgraded Human Resource database application. While the roles of individuals was made fairly clear, planning is still in the earliest of phases. The roles of team members discussed last week revealed that additional research is needed in order to formulate the most efficient means of transitioning to the upgraded application. Moreover, several different flows of data were discussed in a fairly general manner in regards to improving efficiency of the flow of said data. Efficiency of the software can be greatly increased in reducing the data flow footprint to provide the most efficient flow of data between departments. Security Controls
The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.

Data
As with any other system, all data needs to be kept secure. Employee confidentiality is of paramount importance, particularly in a system that hold and utilizes potentially sensitive personal employee information. Moreover, seemingly innocuous information such as standards and procedures within the company also need to be kept secure. Any secure, sensitive, or proprietary information should be encrypted and password



References: Apollo Group, Inc. (2013). Virtual Organization Portal: Riordan Manufacturing. Retrieved from https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/index.asp Valacich, J. S., George, J. F., and Hoffer, J. A. (2012). Essentials of Systems Analysis and Design (5th ed.). Upper Saddle River, NJ: Pearson Education. Retrieved from the University of Phoenix eBook Collection database. Khosrowpour, M. (1999). Managing Information Technology Resources in Organizations in the Next Millennium. Idea Group Publishing Yourdon, E. (2006). Just Enough Structured Analysis (rev. 013106). Yourdon Press

You May Also Find These Documents Helpful

  • Better Essays

    References: Dennis, Alan, Systems Analysis and Design, 4e, John Wiley & Sons, Inc. copyright 2009…

    • 3711 Words
    • 15 Pages
    Better Essays
  • Powerful Essays

    Cmgt410 Team Paper Riordan

    • 4511 Words
    • 19 Pages

    Valacich, J. S., George, J. F., & Hoffer, J. A. (2009). Essentials of Systems Analysis and Design (4th ed.). Upper Saddle River, NJ: Prentice Hall…

    • 4511 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Bsa 375 Week 1

    • 700 Words
    • 3 Pages

    The human resource department has gathered information through the analysis phase and the design phase. Here we will focus on the implementation phase. The implementation phase has six key activities which are critical when executing this phase. The six activities are coding, testing, installation, documentation, training and support. These factors can get quite complex and confusing if the plan is not implemented correctly. Riordan Manufacturing has chosen to follow through with this system to improve its functions and to keep certain employee information confidential.…

    • 700 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Kudler Fine Foods

    • 1782 Words
    • 8 Pages

    Valacich, J., George, J. F., & Hoffer, J. A. (2012). Essentials of Systems Analysis and Design (5th ed.). Upper Saddle River, NJ: Prentice Hall.…

    • 1782 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    The project requires an overhaul of the corporation’s Human Resource Information System (HRIS). The desired goal for this project can be time consuming with the integration of the new centrally located database. Meanwhile, implementing on-site training sessions can help to test the system and enable the employees to acquire the proper skills needed for the new HR hardware and software. It would be pertinent to seek the help of a project manager to help coordinate and achieve the specific targets within the specified budget and project deadline.…

    • 581 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bsa 375 Week 2 Dq

    • 257 Words
    • 2 Pages

    The company should have taken some time to redesign or retool the application at the first sign of user displeasure.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Sysyem

    • 3253 Words
    • 14 Pages

    Course Code CSE312 Course Category Course Title SYSTEM ANALYSIS AND DESIGN Courses with conceptual focus Course Planner 14810::Jagwinder Kaur Lectures 3.0 Tutorials Practicals Credits 0.0 0.0 3.0…

    • 3253 Words
    • 14 Pages
    Powerful Essays
  • Best Essays

    Whitten, J., Bentley, L.., Barlow, V. Systems Analysis and Design Methods (2nd edition). 1989. Irwin College Publishing: Boston…

    • 2859 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    Ibid.; Kraemer, Kenneth L., Dutton, William H., and Northrop, Alana (1981) The Management of Information Systems…

    • 45763 Words
    • 184 Pages
    Satisfactory Essays
  • Powerful Essays

    Online Auction

    • 2817 Words
    • 12 Pages

    Hoffer, J. A., George, J. F & Valacich, J. S. (2004). Modern Systems Analysis and Design (2nd Edition).…

    • 2817 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Secure Sdlc

    • 1102 Words
    • 5 Pages

    Abstract- It is to be to present the information about existing processes, standards, life cycle models, frameworks, and methodologies that support or could support secure software development. This includes software engineering process group (SEPG) members, software developers, and managers seeing information about existing software development life cycle (SDLC) processes that address security. Index Terms- SDLC processes, security Risk Identification, security engineering activities.…

    • 1102 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Wixom, B, Roth, R, & Dennis A , System Analysis and Design 4th Edn, 2009, John Wiley & Sons Inc, USA, pp.…

    • 9511 Words
    • 39 Pages
    Satisfactory Essays
  • Good Essays

    UMLsec

    • 559 Words
    • 2 Pages

    Besides the analysis of today’s software development processes expose that the cautious engineering of security into the general system design is repeatedly ignored. Security aspects s are typically built into an application are only included later during the system administration phase. There are quite a few reasons for this. the security , required tools behind security engineering, the integration of security into a system by hand is tricky and errors often occur due to the lack of knowledge of the individual developers. The developers need to concrete guidelines for constructing secure applications.…

    • 559 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Kendal, Kenneth E. (2008). Systems analysis and design. (Kenneth E. Kendal & Julie E. Kendal). New Jersey: Pearson Prentice Hall.…

    • 2777 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Essentials of Systems Analysis and Design, Fourth Edition, by Joseph S. Valacich, Joey F. George, and Jeffrey A. Hoffer. Published by Prentice Hall. Copyright © 2009 by Pearson Education, Inc.…

    • 13969 Words
    • 56 Pages
    Satisfactory Essays