Topics: Business continuity planning, Disaster recovery, Collaborative software Pages: 13 (2427 words) Published: March 8, 2015

Applying Information Security and SDLC to Business
Anthony Goss, James Leehan, Nicole Rossano, Roxie Carter
BIS 320
September 1, 2014
Cynthia Pryke

Applying Information Security and SDLC to Business
There are several things a manager has to consider when running a business. He or she must ensure that the company does what it needs to meet the needs of the customer, the employees, and protect all personal information. One way is to ensure that there are proper security measures to protect all data by making sure the employees are trained and understand the security protocols. Another way is by using the Systems Development Life Cycle (SDLC) method to help maintain the systems they have or need to conduct business. Businesses that follow the steps in the SDLC method and maintain a good information security system will keep the trust of its customers ensuring it remains profitable.

Use the SDLC method to implement a new technology into the bookstore
Systems development life cycle (SDLC) is the traditional process used to develop information systems. There is a five stage process for SDLC and they are as follows: 1.) System definition, 2.) Requirements analysis, 3.) Component design, 4.) Implementation, 5.) Maintenance (Kroenke, 2014). Having an online business can be a lot of work. There are some ways to make it easier to run the business and to get some new customers. One way is to use collaboration tools. There are many different collaboration tools that you could use for a business. One website that I went to talks about four different ones. According to The Four Best Web Collaboration Tools (2012), “Most online collaboration tools are simple, easy to use and inexpensive.”

The first example is Basecamp. It is an extremely powerful and useful online project collaboration system designed for entrepreneurs, small businesses, freelancers and business groups. The most used online project management application in the world. The application allows you to upload, store, edit and share documents and files online. (The Four Best Web Collaboration Tools, 2012).

The second example is Skype. Skype is a type of video conference. Although scores of online video chat services have emerged over the past few years, Skype remains the most widely used and convenient. Apart from the standard face-to-face video conference chat, Skype’s Screen Sharing feature allows users to show others whatever is on their screen, which is perfect for presenting slideshows or making visual presentations. (The Four Best Web Collaboration Tools, 2012).

The third example is Trello. Trello is a simple and free online collaboration tool perfect for individual or smaller groups. Trello’s friendly interface allows users to create a project by adding items and lists, and assigning people to specific tasks. (The Four Best Web Collaboration Tools, 2012). The fourth and final example is is a web-based word processor that enables users to view and co-edit the same notes and documents in real time from anywhere in the world. (The Four Best Web Collaboration Tools, 2012).

For Amazon, we need to go through the five stage process for SDLC. The first stage is system definition. The upper management has talked and they have decided that they need to get a new information system. They have all agreed on transaction processing systems. They need to find out how much it is going to cost. According to Cashman (2000), “A transaction processing system (TPS) is an information system that captures and processes data generated during an organization’s day-to-day transactions. A transaction is a business activity such as a deposit, payment, order, or reservation.” Cashman also stated “Transaction processing systems were among the first computerized systems developed to process business data – a function originally called data processing. Usually, the TPS computerized an existing manual system to allow for faster processing, reduced...

References: Cashman, S. (2000). Types of Information Systems. Retrieved from
Kroenke, D.M. (2014). MIS Essentials (3rd ed.). Retrieved from The University of Phoenix eBook Collection database.
Leonard-Barton, D., & Kraus, W. A. (1985, November). Implementing New Technology. Harvard Business Review. Retrieved from
Rehani, N. (n. d. ). Using SDLC Methodology to Implement HIT. Retrieved from
Rouse, M. (2006). TechTarget. Retrieved from
The Four Best Web Collaboration Tools. (2012). Retrieved from
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • BIS 320 Week 5 Applying Information Security and SDLC to Business Essay
  • Sdlc Essay
  • Sdlc Essay
  • Business Information Systems Essay
  • Information Security Essay
  • Essay on Information Security
  • information security Essay
  • security information Essay

Become a StudyMode Member

Sign Up - It's Free