preview

Bsa 375 Week 3 Individual Assignment

Good Essays

Riordan Manufacturing Service Request 022 Arce Estremera BSA 375 April, 1 2013 Dr. Belinda Moses How do you define application architecture and process design? Wise Geek defines application architecture as “the organizational design of an entire software application, including all sub-components and external applications interchanges. There are several design patterns that are used to define an application architecture” (wiseGEEK, 2013). The design patterns are created to meet the objectives described in the system requirements. “The activity of determining the workflow, equipment needs, and implementation requirements for a particular process,” is the definition of process design. “Process design typically uses a number of …show more content…

Data Data encryption and passwords should be utilized for those who have authorization to access the HRIS system because Riordan Manufacturing is responsible for all data relating to procedures and employee information. Security and confidentiality is a must when it comes to utilizing data. “The lawsuits alone would easily exceed $10 million and the cost of staff to find an reenter paper records would be enormous and certainly would take more than a few weeks” (Dennis, Wixom, & Roth, 2009). Network The most secure networks are those that incorporate a virtual area network. This allows updating of information by employees and approvals or verification of those updates by authorized personnel. Access to this information calls for password and username protection by way of 128-bit encryption standards. If further, more detailed information would need updating or change, an authorized person will be required to input their information, including fingerprints. This is called multi factor authentication. Data Flow Diagram As the information system is designed, implementation decisions describing how the system will work are made. Data flow diagrams offer those implementation details, including data stores that refer to files and database tables, programs and human actions that perform processes. The automated parts of the system are differentiated from the manual parts by the human-machine boundary (Dennis, Wixom,

Get Access