Input Controls

Only available on StudyMode
  • Topic: User interface design, User interface, Data management
  • Pages : 4 (1244 words )
  • Download(s) : 759
  • Published : May 13, 2012
Open Document
Text Preview
The objective of input design is to ensure the quality, accuracy, completeness, and timeliness of input data during its conversion from its original source into computer data, or entry into a computer application. Data can be entered into a computer application from either manual online input or by scheduled automated processing. Input controls will ensure that data is accurately processed through the application and that no data is added, lost, or altered during processing (Shu, unk). No matter how data enter and information system, the quality of the output is only as good as the quality of the input. There are several key input controls for an input design such as, data processing control, source document controls, validation controls, and user interface. Input control includes the necessary measures to ensure that input data is correct, complete, and secure (Rosenblatt, 2012). In computer science, data validation is the process of ensuring that a program operates on clean, correct and useful data. Validation rules or check routines are used to check for correctness, meaningfulness, and security of data that are input to the system. The rules may be implemented through the automated facilities of a data dictionary, or through software application program validation logic. Data that does not conform to these rules will negatively affect company process execution. Therefore, data validation should start with business process definition and set of business rules within this process because incorrect data validation can lead to data corruption or security vulnerability (Shu, unk). Source Document Control are techniques used to prevent source document fraud. Documentation should exist explaining the workflow through the application. Some examples would be narratives on the application processes, flowcharts, and an explanation of system or error messages (Rosenblatt, 2012). A processing and audit logs should generated and be available to be reviewed for unusual or...
tracking img