CIS210 Assignment Case Study 2

CIS210: Assignment: Case Study 2

CIS210: Systems Analysis and Development

I was instructed to design a payroll system for a large organization with offices that will spread across the United States. The organization has already a data center which we will use to connect the existing network and hardware. In this paper, I will be describing what type of architecture the new payroll application will have. Also, will provide what type of technology equipment will be involve in creating the payroll application. and explain the purpose of each equipment. After designing the payroll system, tests will be run to make sure that the program is running according to customer expectations.

Before we can modify the network and hardware the organization currently have, we will have to make sure that all necessary cables are working correctly and there are no faulty wires. The WAN and LAN will play a huge part in implementing the system. Without the WAN or LAN, there is no connection, so there will be no communication between systems and no data being sent/receive. The payroll program must have connections to perform the work the customer needs, so the employees’ can input their information into the system. After the employee input, their information the data will be sent into the system where the data can be verified.

When it comes to personal information, providing security is a significant feature that must be implemented in the payroll program. Users will be prompt to create a username and a strong password for security purposes. Always want to keep the system secure from threats such as hackers, cyber attacks, etc. Also, sometimes employees’ can be the reason why the system is being attacked due to lack of training. Training is very important when it comes to using a new system. Improper training can cause a massive problem within the organization.

When creating any program, there are procedures that must be followed to meets the organization standards. Only certain users are allowed to have access to manage, modify and control the payroll program. The network administrator department will have access to make any changes to the system. The employee will have access to the system but will be very limited in what he/she can have access to. The employee can view their information once login into the system. Controlling the flow of the network and how the system is being controlled is very crucial in this method.

Once the payroll program has been developed, tests are being run to make sure the system is working correctly. When running the test, we are making sure the servers are fully functional and working correctly, network and hardware are working correctly, and also test the program making sure the application passes the test run. To keep the program maintained and fully functional at all times, this position is required to have a network technician. Network technician will monitor the program daily to prevent any delay or issues that will cause the application to crash.

Budgeting and keeping the overall costs for the project low is very crucial. Since the organization already their network and hardware, we didn’t have to buy any unnecessary equipment for the project. We used the existing network and hardware to design the program. Always try to keep the cost of the project as low as possible, especially if a customer is on a budget and not trying to spend over a certain amount. Make sure the program meets the customer expectation before launching the application.

At this point, the payroll program has been completed. All network and hardware have pass test runs, and it is working properly. Next step is to train the users on how to use the program, and explain the new features the program has. Not all users will have the same access; only the administrator will have full access to the program. Employees will have access only to their personal payroll information as instructed. After everyone has been trained to use the new program, the project has been completed, and it met the organization expectations.

After creating a program, you have to take in consideration that there will be potential ethical issues. I’m going to explain the potential ethical issues that could arise in connection with the new architecture. Any issues that we will potentially have will be monitored by the network security. The network security will be required to monitor network traffic just in case we have any network problems. To eliminate any other potential issues, the system will prompt all users to create a secure password to prevent hackers and other outside threats to keep private information secured.

In conclusion, I explained the type of technology equipment that we use to design the payroll program and explain the purpose of the equipment. Always want to keep certain users from having full access to the system, the only administrator will have full access. Budgeting and keeping costs at a low price are very crucial, especially when the customer is on a budget. Lastly, Network security will play a huge role in this method because there will be many potential issues.

References

Luther, Carol (July 2018) – What Tools Does an Architect Use?

https://work.chron.com/tools-architect-use-10408.html

Markgraf, Bert (August 2013) – Ethical Issues With Business Technology

https://smallbusiness.chron.com/ethical-issues-business-technology-27297.html

Levy, Darren ( October 2014) – Use Case Effective

http://www.gatherspace.com/static/use_case_example.html#

Place an Order

Plagiarism Free!

Scroll to Top