BSA 385 Week 3 Individual Assignment

Topics: Computer security, Database management system, Information security Pages: 16 (2633 words) Published: May 16, 2015

Technical Article Document: Frequent Shopper Program

Frequent Shopper Program: Technical Article Document
Kudler Fine Foods (KFF) is a specialty food store chain in California. Smith Systems Consulting (SSC) was contacted by KFF to develop a Frequent Shopper Program (FSP). The FSP will be able to monitor client purchasing history and accumulate the history as redeemable loyalty points which clients can use for gift items and other products or services available through external partner companies. The Sales and Marketing page section of KFF’s intranet site describes the strategic purpose of the FSP. SSC will provide IT services and of course consulting. Some other things would be developmental solutions, strengthening, implementation, IT integration, analysis, and design (Apollo Group, 2004). Smith Consulting will also submit a proposal to Kudlers that will detail the development processes of the FSP project. This paper will list the project’s logical and physical models, this includes hardware, software, network, controls, database, and other development related tools. Logical and Physical Models

Logical and physical models are representations of the key elements and processes of a software development. The logical model describes the processes, especially data, in as much detail as possible, without giving regard to how the system will be physically implemented. Logical data models include entities and relationships among them and how data flows from one process or entity to another. Representations of the key elements and processes of a software development is logical and physical models. A logical model will describe the processes without giving regard as to how the system will be physically implemented in as much detail as possible. A physical model is just a modified version of the logical model. It is intended to work with a specific set of software and hardware components (Hoberman, 2009). Logical Model of the FSP In-Store Operation

The brand new FSP will add changes to existing functions within KFF operations. That means when a client initiates a transaction the cashier will ask if the client is a member of KFF FSP and/or if they would like to be a member if they are currently not. If the client does not want to be a member then the cashier will proceed with the checkout but if they do then the client will be asked to fill out the appropriate application and the information will be entered into the system. If the client is already a member then their member’s card will be scanned and then the purchase will continue. Depending on his purchase patterns and history, the FSP will issue discounts and points to the customer. The points and rewards information will be printed on the receipt and given to the customer. Figure 1 shows the low-level data flow diagram of the proposed new system, which includes the basic processes described above. The high-level data flow diagram includes additional details such as data flow to and from databases, and how each database is designed with specific tables.

Figure 1 Low-level Logical Data Flow Diagram

Figure 2 High-level Logical Data Flow Diagram

Logical Data Flow Diagram for FSP Redemption Process
KFF’s customers can redeem their points in various ways. They can login to Kudler’s members’ online portal. The customers can login using the membership ID printed on the back of their membership cards, or by the preferred username they used upon signing up. When they login, they are required to enter their user ID and password. The security system will determine if the customer input is valid or not by matching the credentials to the user’s database. From there onward, the users can retrieve their information, and also use the web portal to redeem their points. The points can be used to print coupons and exchange for items and products not only valid for Kudler stores, but also for Kudler’s partner companies. When customers use the...

References: Apollo Group. (2004). Smith Systems Consulting. Retrieved February 13, 2012 from
Byrnes, C., Proctor, P. (2002). Information Security Must Balance Business Objectives. Retrieved February 13, 2012 from
Douligeris, C., Serpanos, D. (2007). VPN Benefits. Network Security: Current Status and Future Directions. John Wiley and Sons
Hoberman, S. (2009). Physical Data Model Explained. Data Modelling Made Simple: A Practical Guide for Business and IT Professionals. Technics Publications.
Stamp, M. (2005). Information Security: Principles and Practice. Wiley-Interscience.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Bsa/385 Week 3 Essay
  • Bsa 385 Week 3 Essay
  • BSA 385 Week 2 Essay
  • BSA 375 Week 3 Service Request Essay
  • BSA 375 Week 3 Individual Essay
  • Week 4 Individual Assignment Essay
  • Bsa/375 Week 3 Individual Assignment Research Paper
  • BSA 375 Week 3 Team Essay

Become a StudyMode Member

Sign Up - It's Free