Riordan Manufacturing Service Essay
After the previous meeting we discussed many important subjects that required additional research to present the safe way to process the transitions of new changes. Also we had reviewed different data flow that will work in the best of improve the proper handling between Riordan Manufacturing and the plants related to ensure the best relation between each department. It will improve the communication in Riordan and save money and time after the final implementations.
Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems. Data: All data must be kept secure and confidential. Any company data including company policies and procedures, as well as, employee data containing employment information will be held responsible under Riordan Manufacturing. Any forms of data that belong to the company are proprietary; therefore, data encryption and passwords will be utilized to allow authorization to access the data. If any form were to be intercepted into the wrong hands, this can be detrimental to the organization.
“Lawsuits alone would easily exceed $10 million and the cost of staff to find and reenter paper records would be enormous and certainly would take more than a few weeks” (Dennis, Wixom, & Roth, 2009). Processes: Some processes, such as the application process would benefit from using third-party software. This will allow Riordan Manufacturing to have the security guarantee from the third-party vendor. Using COTS will allow Riordan Manufacturing to save time because programs are already developed and can get some training and services included in them, and it will be a long term investment that will also save money. For any additional program or software that need to cover special projects can be considered an in-house development. Interfaces: “Interface design is the process of defining how the system will interact with external entities e.g. customers, suppliers, other systems” (Dennis, Wixom, & Roth, 2009).
System interfaces are also capable of exchanging information with other systems and therefore require a high level of security. This security can be achieved by incorporating password requirements to unlock confidential and private documents, such as employee files and company tax records. This would help prevent internal security threats of employees attempting to access another employee’s computer. Network: One recommendation is to incorporate a company-wide database, accessible only via a virtual local area network (VLAN), which allows employees to view and update some basic level information that would be subject to verification by a payroll clerk or supervisor. Such access will require security protection thru the use of username and password.
To obtain more detailed information it will require security protection thru the use of username and password. To obtain more detailed information it will require an authorized payroll clerk or supervisor. At the same time, to obtain that information is important to provide three-factor authentication method; such as username and password and a fingerprint scan to obtain those highly confidential records. In addition, the third-party organizations that administer Riordan employee’s benefits such as their health benefits and workers compensation should be audited on a yearly basis for accuracy and competitiveness. It will ensure the utilization of the most accurate process within the organization.
Physical Data Flow Diagrams
While designing the application logic of the information system, the implementation decisions describing how the system will work. Physical data flow diagrams show these implementation details, including “data stores that refer to files and database tables, programs or human actions that perform processes, and the physical transfer media for the data flows” (Dennis, Wixom, & Roth, 2009). Maintaining a clear and proper implementation it will provide the service expected with the simple and clear results. (TIBCO Software Inc., 2001).
After this process there will be a new meeting next week to discuss any additional information about the process and implementation of final changes. Riordan is seeking to resolve those issues in the short time as possible and we will ensure to satisfy all the needs in the safe and secure process.
Apollo Group, Inc. (2012). Virtual Organization Portal: Riordan Manufacturing. Retrieved from https://ecampus.phoenix.edu/secure/aapd/dst/vop/Business/Riordan/index.asp Dennis, A., Wixom, B. H., & Ruth, R. M. (2012). Systems Analysis and Design (5th ed.). Retrieved from the University of Phoenix eBook Collection database. Khosrowpour, M. (1999). Managing information technology resources in organizations in the next millennium. Idea Group Inc. (IGI). Riordan Manufacturing. (2012). Retrieved July 28, 2012 from https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/index.asp TIBCO Software Inc. (2001). Business process. (pp. 10-15). Palo Alto, CA: Global Headquarters. Retrieved from htts://www.tibco.com/multimedia/business-process-design_tcm8-2399.pdf
Study Acers provides students with tutoring and help them save time, and excel in their courses. Students LOVE us!No matter what kind of essay paper you need, it is simple and secure to hire an essay writer for a price you can afford at StudyAcers. Save more time for yourself. Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more