Business Scenario:
A bike company called York bikes wants to create a customer information system for its company. York Bikes is a company that designs custom bikes and sells custom bikes which is a niche market, both at its business establishment and over the company’s web site. In the custom bike market one which is growing rapidly, Markham Bikes is one of York Bikes’ main competitors. (Purcell)
Using the 5P’s of meeting in the SDLC stages of the above business scenario
1) Feasibility - Charter – Requirements:
Purpose:
Why are we holding this meeting? ("The mindmap blog," 2008)
In the initiation stage of the SDLC, the agenda is to find the need for the information system in the meeting with the appropriate employees of the company. Whether or not needed for the company? What are their cost and benefits? How well it will integrate to the existing system. (Purcell)
What are the key objectives? ("The mindmap blog," 2008)
The key objectives of the meeting are to identify the information system sponsor, the system being developed is linked to one of the company’s goals, and a preliminary checklist of troubles that can be rectified by an information system is presented as a document. Include establishing the basic system idea for discussion, preliminary requirements outline, feasibility assessment, technology assessment and management approval to continue to the following stages. The design team designate high, medium, and low risk values for each risk. Doing the preliminary risk assessment helps identify security threats before the next SDLC phases. It also gives the design team to ponder over the security threats initially in the design level. Based on the preliminary risk assessment, puts the York bikes information system appli...
... middle of paper ...
...ss.
Works Cited
Citation list:
Purcell, J. E. (2008). Building security into the system development life cycle (sdlc) a case study . Retrieved from http://software-security.sans.org/resources/paper/cissp/building-security-system-development-life-cycle-sdlc-case-study
The mindmap blog. (2008, 06 24). Retrieved from http://mindmapblog.files.wordpress.com/2008/06/the-5-ps.jpg
Systems development life cycle. (n.d.). Retrieved from http://en.wikipedia.org/wiki/Systems_development_life-cycle
Shah, S. (2012, 04 06). Building security system development life cycle sdlc case study new. Retrieved from http://www.scribd.com/doc/88236428/Building-Security-System-Development-Life-Cycle-Sdlc-Case-Study-New
Purcell, J. E. (2008). Building security into the system development life cycle (sdlc) a case study . Retrieved from http://software-security.sans.org/resources/whitepapers
...tion requirements. Similarly, the systems analysis, or define phase, is the deliverable which defines the system’s requirements. This includes taking the deficiencies in the existing system and addressing them with specific proposals for improvement. These proposals can be to ensure that the new EHR has all the necessary requirements to qualify for certification and help to narrow down vendor selection. Incorporated into the SDLC is a maintenance phase in which constant upkeep and evaluation is needed to ensure an operational system that is properly maintained, supported and secured. During this phase, system users should be kept up-to-date about the latest modifications and procedures. It is therefore important to know that your vendor has a good standing reputation and plans to provide continuous support for your software throughout the product’s lifecycle.
Security helps the organization meet its business objectives or mission by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets through the selection and application of appropriate safeguards. Businesses should establish roles and responsibilities of all personnel and staff members. However, a Chief Information Officer should be appointed to direct an organization’s day to day management of information assets. Supporting roles are performed by the service providers and include systems operations, whose personnel design and operate the computer systems. Each team member must be held accountable in ensuring all of the rules and policies are being followed, as well as, understanding their roles, responsibilities and functions. Organizations information processing systems are vulnerable to many threats that can inflict various types of damage that can result in significant losses (Harris, 2014). Losses can come from actions from trusted employees that defraud the system, outside hackers, or from careless data entry. The major threat to information protection is error and omissions that data entry personnel, users, system operators and programmers make. To better protect business information resources, organizations should conduct a risk analysis to see what
Managers that are not a part of the developmental phase are unaware of how systems are designed making it difficult to communicate its capabilities to the end-users. The purpose for developing the software was to ensure the check imaging and endorsing process of shared branch transactions would be more efficient for the end-user instead it was complicated and time consuming. End-users were not involved in the design phase of the ITC system therefore they could not convey their expectations and/or needs. Inadequate involvement of users in the design process is cited as a major factor contributing to the shortfall between expectation and reality (Damodaran, L., 1996). There are advantages to end-user involvement such as; improved levels of acceptance, accurate user requirements and better understanding of the system resulting in more effective participation.
Some of the earliest digital interactions a potential customer has relate to choosing the best vehicle. This will often involve searches for specific brands or car styles, followed by visits to manufacturers or review websites. Customers may search
Pikas, E. (2013). Building information modeling dcation for construction engineeng and managemet. ii; procedures and implementaion case stdy. Journal of Construction Engineering and Management, 139(11), 04013016-1 - 04013014-11.
With the model having existed for over a decade, respondents have seen BIM system being integrated into building designs. It is important to clarify that having knowledge on BIM system for fire safety does not imply that the respondents have had a direct contact with the system, but rather the general knowledge of the system and its rudimentary functionality.
Whitman, M., & Mattord, H. (2010). Management of information security. (3rd ed., p. 6). Boston, MA: Cengage Learning.
The systems planning phase is the first phase completed in the SDLC. It encompasses evaluating the feasibility and the cost of the system, identifying the risks involved with implementing the system, and determining the responsibilities of each of the team members. To begin the planning phase, a systems request is submitted to the IT department, detailing the problems and changes to be made in a system. (Rosenblatt, 2014). It is important to note that the request may be a large, significant request, or it can be a smaller, more minor request; however, each request should be addressed using the systems development life cycle. After the request has been made, a feasibility study is conducted that determines the costs and benefits of the new or improved system. The study then recommends a strategy that is best for the system in terms of technical, monetary, and time factors.
A recent external and internal environment change has given Harley-Davidson both threaten and opportunities. The thorniest problem Harley-Davidson face is shrinking a market, caused by the reduction of profitable customer, slow development of the potential customer as well as the intense competition of the heavyweight motorcycle market. However, the increasing demand of emerging countries has offered Harley-Davidson the opportunity. Factors such as retaining the existing profitable customer and developing the potential market will be received emphasis in future strategic decision. However, corporate strategy of profitable market and potential market vary widely because of different demography, consumer behaviour and the regional difference. With the relatively small scale company in the motorcycle industry, customer segmentation and product development will be a significant point. The purpose of the case analysis was to discuss the causes of a shrinking market as well as provide a solution.
Principle of Security Management by Brian R. Johnson, Published by Prentice-Hall copyright 2005 by Pearson Education, Inc.
The Systems Development Life Cycle (SDLC) consists of phases used in developing a piece of software. It is the plan of how to develop and maintain software, and when necessary, replace that software. In 2007 during my hospital’s transition to a new software system, I was fortunate enough to be included in the process. I did not get involved until the implementation phase, but from then on, until now, I remain very active in the process. I decided to highlight the Waterfall Model of SDLC. The Waterfall Model is a “sequential development process” with each phase continuing in a line (McGonigle and Mastrian, 2012, p. 205).
- Williams, L.T, 1997, “Planning and managing the information system - a manager's guide”, Industrial Management & Data Systems Volume 97 Number 5 1997 pp. 187-191
Base on the case of “Your Choice Furniture”, we marked this system's analysis to formulate solutions in this report; it assisted in evaluating the impact of recent change information technologies of “Your choice furniture” business system for evaluating how well the firm will be performing.
The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad. The following report will provide you guidance about auditing and hardening techniques applied though the 7 Domains by utilizing IT Security Best Practices.
Curtis G. & D. Cobham (2002: 4th edition) Business Information Systems: Analysis, Design and Practice. Essex: Pearson Education Limited