Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)
11th Edition
ISBN: 9781305494602
Author: Scott Tilley, Harry J. Rosenblatt
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 2, Problem 2DT
Program Plan Intro
Response to vice president of accounting on suggestion of bypassing the system.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
“This request method takes too long,” the vice president of accounting tells you, the IT director.
My team knows what they're doing, and the requests they make to the systems are vital and important.” She recommends that the IT department skip the preliminary processes and get right to work on her demands.
What would you say to her if you were in her shoes?
Chain Link Consulting is an information technology consulting company that focuses on system security concerns. When the company's president asks you to assist her with the preparation of a presentation for a group of potential clients at a trade show meeting next month, you say "yes." First and foremost, she would like you to examine system security concerns in light of all six security levels. Afterwards, she wants you to come up with a list of methods that Chain Link might evaluate a client's security procedures in order to obtain an accurate evaluation of their level of exposure.It was her way of making the situation more intriguing by saying that it was fine to be imaginative in your ideas, but that you should avoid proposing anything that would be unlawful or immoral. Example: It might be OK to pretend as a job candidate with phony references to see whether they were being reviewed, but it would be inappropriate to steal a lock and access the computer room to check on things.Your…
Mr. Art Pang is in charge of Receivables. His subordinates must provide information to help us collect system needs for a new billing system. Although Mr. Pang has indicated his desire to assist us in our fact-finding efforts, he has voiced worry about the fact that his employees are very busy and must get their tasks done.What is the best way to get the most out of your fact-finding efforts while requiring the least amount of time from his subordinates?The requirements should be documented after they have been collected. For the new billing system, what methods would we employ? Your reasoning should be explained.
Chapter 2 Solutions
Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- John just finished his inspection coordinator course. After obtaining his first appointment, he plans to add his personal secretary to the inspection team for the purpose of serving as a session scribe and producing the required reports. He assumes that her participation will free him of the coordination tasks and enable him to conduct the session successfully. Is it advisable to employ a secretary (a non-information technology professional) as a scribe in an inspection session? List the pros and cons of adding such a nonprofessional to the inspection session.arrow_forwardAnswer Q1(a) and Q1(b) based on Figure Q1. Your team received a system request by the Principal of Tuition Center located at Malacca. The management ask to improve their current management system. In the first week, your team comes to the place to see the staffs' routine works using the current system. They sit at the receptionist counter, monitor the staffs and students there. In the meantime, they also make copies all the forms they use like subjects' registration form, fees payment form and exam marking form. They notice a list of pass years exam results was display in glasses notice bord. On the following weeks, they organize a meeting to collect all requirements. FIGURE Q1 (a) Based on the Figure Q1, analyze THREE (3) types of requirements gathering. (b) Interview is the best technique to elicitation the requirements for this case. State FOUR (4) suitable users to be selected as the interviewees.arrow_forwardAssume you work for a company in Oklahoma with eight locations spread across the state. The company has never been impacted by a natural disaster or a cyberattack. The IT manager meets with the company president to explain the business continuity plan she is preparing. The president does not believe the company needs a BCP and does not want the time or expense spent on the project.(a) Do you believe a BCP is necessary in this situation? Why or why not?(b) What is the worst-case scenario if the company does not have a BCP in place?arrow_forward
- Then, suppose you get a position as an IT architect at a new organization. The company's CEO instructed your team to develop a contingency plan in the case of a calamity. They have adequate resources to complete the task, but they do not want to exceed their budget, thus they are unwilling to do so. What would your department say about the CEO's safety net?arrow_forwardChain Link Consulting is an IT consulting firm that specializes in system security issues. The company’s president has asked you to help her put together a presentation to a group of potential clients at a trade show meeting next month. First, she wants you to review system security issues, considering all six security levels. Then she wants you to come up with a list of ways that Chain Link could test a client’s security practices, in order to get a real-world assessment of vulnerability. To make matters more interesting, she told you it was OK to be creative in your recommendations, but not to propose any action that would be illegal or unethical. For example, it would be OK to pose as a job applicant with false references to see if they were being checked, but it would not be appropriate to pick a lock and enter the computer room. Your report is due tomorrow. What will you suggest?arrow_forwardChain Link Consulting is an IT consulting firm that specializes in system security issues. The company’s president has asked you to help her put together a presentation to a group of potential clients at a trade show meeting next month. First, she wants you to review system security issues, considering all six security levels. Then she wants you to come up with a list of ways that Chain Link could test a client’s security practices, in order to get a real-world assessment of vulnerability. To make matters more interesting, she told you it was OK to be creative in your recommendations, but not to propose any action that would be illegal or unethical. For example, it would be OK to pose as a job applicant with false references to see if they were being checked, but it would not be appropriate to pick a lock and enter the computer room. Your report is due tomorrow. What will you suggest? Explain your answer thoroughly and explain well.arrow_forward
- David Martin just finished his inspection coordinator course. After obtaining his first appointment, he plans to add his personal secretary to the inspection team for the purpose of serving as session scribe and producing the required reports. He assumes that her participation will free him for the coordination tasks and enable him to conduct the session successfully. 1. Is it advisable to employ a secretary (a non-information technology professional) as a scribe in an inspection session? List your arguments pro and con.arrow_forwardThe IT director of Global Hills started the meeting today by saying “I’ve got some good news andsome bad news. The good news is that the higher management has approved the Customer CareContact (C3) information system project. The new system will reduce clerical time and errors,more over it will improve morale of the department, and avoid possible fines and penalties fornoncompliance. The bad news is that the system must be implemented by the end of November asper the demand of federal government, costs must be within the budget, the new system mustinteract with marketing system, and the president of marketing department insists on approvingthe final design.”1. Identify the constraints and indicate whether each is present, future, internal, externalmandatory, or desirable. (Note: Draw grid that shows the constraints).2. Identify tangible and intangible benefits of the new C3 system.3 What topics should be included in a report to management at the end of thearrow_forwardThe organization you work for in Abu Dhabi is a startup company with 2 years in business. To comply with regulations, your CISO has decided to propose implementation of Information Security Management System (ISMS). As a member of the security team, you have to analyze the business needs for ISMS. Demonstrate effective contributions to the ISMS project team relevant to an assigned task as below: Introduce the Organization Demonstrate your project team Highlight the roles and responsibilities of each team member on the project Develop the ISMS for the organization by utilizing all the steps of from the ISO Standard 27001.arrow_forward
- There are some people in the IT security field who feel their firms should hire ex-computer criminals as consultants to find holes in their security measures. Do you think so? Is there a good reason or a bad reason?arrow_forwardThe IT director of Global Hills started the meeting today by saying "I've got some good news and some bad news. The good news is that the higher management has approved the Customer Care Contact (C3) information system project. The new system will reduce clerical time and errors, more over it will improve morale of the department, and avoid possible fines and penalties for noncompliance. The bad news is that the system must be implemented by the end of November as per the demand of federal government, costs must be within the budget, the new system must interact with marketing system, and the president of marketing department insists on approving the final design." 1. Identify the constraints and indicate whether each is present, future, internal, external mandatory, or desirable. (Note: Draw grid that shows the constraints). 2. Identify tangible and intangible benefits of the new C3 system. 3 What topics should be included in a report to management at the end of the preliminary…arrow_forwardNorth Hills College has decided to implement a new registration system that will allow students to register online as well as in person. As IT manager, you decide to set up a JAD session to help define the requirements for the new system. The North Hills organization is fairly typical, with administrative staff that includes a registrar, a student support and services team, a business office, an IT group, and a number of academic departments. Using this information, you start work on a plan to carry out the JAD session. Who would you invite to the session, and why? What would be your agenda for the session, and what would take place at each stage of the session? Why is the JAD session so important to the task.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning