Analyzes the implementation of the system in your plan

Assignment Help Management Information Sys
Reference no: EM131738713

Security

A large, fast-food chain unveiled a new touch screen register for its franchises. Each cashier was assigned a user id and password combination to log in to the register.

The system allowed the incorrect password to be entered four (4) times before the register would lock and require a manager to unlock it with a key card.

To prevent unauthorized access, the registers would lock after three (3) minutes if the screen was not touched. When the register locked, only the cashier who was logged in prior to it locking could unlock it without a system restart.

After a few days in operation, restaurant managers started complaining about the amount of time they were spending unlocking the registers. Some cashiers were forgetting their user Id and password, so other cashiers would log in for them.

It also seemed that the button layout made it easy for the cashiers to key in the incorrect password. The managers also complained that cashiers would leave for a break or end their shift and forget to log out of the locked register.

The managers would have to reboot the system, a three to five (3-5) minute process in order for the next cashier to log in. Additionally, managers noticed that grease was building up on the touch screens, making them less responsive.

Write a five to eight (5-8) page paper in which you:

1. Analyze the new system and determine the design issues with this new system.

2. Describe how you would correct the design issues with the system to make the restaurant managers happy.

3. Create a design plan that:

1. Lists and explains the tasks associated with improving this interface.

2. Contains at least six (6) tasks.

3. Includes realistic time estimates for each task to be completed.

4. Analyzes the development of the system in your plan.

5. Analyzes the testing of the system in your plan.

6. Analyzes the implementation of the system in your plan.

4. Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.

5. Suggest changes that could be made to the security of this system to still meet security objectives but make the system more usable.

6. Use Microsoft Visio or an open source alternative, Dia, to create a graphical representation of your proposed interface. Note: The graphically depicted solution is not included in the required page length.

7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

· Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

· Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.

Reference no: EM131738713

Questions Cloud

Identify the financial ratios : As a lending agency, what criteria using the 3 c's of lending would you use to determine how much to grant, to whom, and under what conditions?
Minimize the cost of holding inventory : The objective of inventory management is to minimize the cost of holding inventory.
Explain one of the main themes of shakespeares hamlet : This activity assesses your ability to rephrase and explain one of the main themes of Shakespeare's Hamlet: political decay.
Which of the points should kevin consider most important : When devising goals for his team to achieve, which of the following points should Kevin consider most important
Analyzes the implementation of the system in your plan : Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.
Throwback regarding the hawthorne effect : View this interesting throwback regarding the Hawthorne Effect.
Analyze the crime and compare at least two theories : How would Islamic Law treat the crime versus mentioned justice system where the crime occurred? Analyze the crime and compare at least 2 theories.
Identify the vector-borne disease : Identify the vector-borne disease - Explain in detail the factors contributing to global warming - Describe the effect of global warming on the incidence
Develop a high-level use case to represent the application : Develop an E-R diagram, class diagram, or a data flow diagram that effectively represents the data that are required for your application or system.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Web diagram organizing the following specific technologies

Create a table or web diagram organizing the following specific technologies (as discussed in your textbook) in the order they would appear in an IT network connected to the internet:  Vulnerability scanners Firewalls

  What are the differences between emr and ehr

This sounds like a very efficient system. How quickly can patients access their own records through this system? Does EMR differ in this way then? If so how? What are the differences between EMR and EHR?

  Briefly describe elements of an information security plan

Briefly describe the elements of an Information Security Plan (ISP). Keep in mind the types of information a commercial software development company may need.

  Explain about capacity requirement planning

PPQ Parts Manufacturing: Best Software for MRP, CRP and ERP Needs - Justify your recommendations by analyzing the pros and cons of each of the six software systems you evaluated to perform materials requirements planning (MRP), capacity requirement..

  It department objectives and goalsi will set up an aerobic

it department objectives and goalsi will set up an aerobic center for teenagers and i need to set a objectives for some

  Describe two companies with a global presence

Describe two companies with a global presence and describe the IT governance organization and structure of each

  Inventory models to address lou carlsons questions

Use inventory models to address Lou Carlson's questions. Support your recommendations with cost justification.

  What are the major network topologies

What are the major network topologies? Refer to the network diagrams you created as an illustration of the logical and physical topology you employed.

  Do john and jane have any recourse against david

John and Jane have also been left empty handed as David's contract with Big Blue Co Ltd was in his own name, making no reference to Start Up Pty Ltd. Do John and Jane have any recourse against David?

  Determine the operational and enterprise systems

Determine the operational and enterprise systems that support wireless and mobile technologies for each company. Provide a rationale for your response.

  Can a business survive in todays world without a website

Can a business survive in today's world without a website or a with poorly maintained website?

  Cloud computingi need help with the following

cloud computingi need help with the following assignmentcloud computing is defined by cearly and phifer in their case

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd