Analyzes the testing of the system in your plan

Assignment Help Management Information Sys
Reference no: EM131501858 , Length: 8

Case Study : Security

A large, fast-food chain unveiled a new touch screen register for its franchises. Each cashier was assigned a user id and password combination to log in to the register.

The system allowed the incorrect password to be entered four (4) times before the register would lock and require a manager to unlock it with a key card. To prevent unauthorized access, the registers would lock after three (3) minutes if the screen was not touched. When the register locked, only the cashier who was logged in prior to it locking could unlock it without a system restart.

After a few days in operation, restaurant managers started complaining about the amount of time they were spending unlocking the registers. Some cashiers were forgetting their user Id and password, so other cashiers would log in for them. It also seemed that the button layout made it easy for the cashiers to key in the incorrect password.

The managers also complained that cashiers would leave for a break or end their shift and forget to log out of the locked register. The managers would have to reboot the system, a three to five (3-5) minute process in order for the next cashier to log in. Additionally, managers noticed that grease was building up on the touch screens, making them less responsive.

Write a five to eight (5-8) page paper in which you:

Analyze the new system and determine the design issues with this new system.

Describe how you would correct the design issues with the system to make the restaurant managers happy.

Create a design plan that:

Lists and explains the tasks associated with improving this interface.

Contains at least six (6) tasks.

Includes realistic time estimates for each task to be completed.

Analyzes the development of the system in your plan.

Analyzes the testing of the system in your plan.

Analyzes the implementation of the system in your plan.

Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.

Suggest changes that could be made to the security of this system to still meet security objectives but make the system more usable.

Use Microsoft Visio or an open source alternative, Dia, to create a graphical representation of your proposed interface. Note: The graphically depicted solution is not included in the required page length.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

Describe the usability properties of interactive systems.

Describe the inherent design issues across HCI environments

Develop an interface `

Use technology and information resources to research issues in human-computer interaction.

Write clearly and concisely about HCI topics using proper writing mechanics and technical style conventions.

Reference no: EM131501858

Questions Cloud

Divine right of kings and absolute monarchy : Think about the pros and cons of the divine right of kings and absolute monarchy. What was good about these concepts? What was bad?
What documentation you will provide with your system : Make a decision about what documentation you will provide with your system and explain it to Ray and Jason.
Impact did they have on later legal systems : What were the Twelve Tables and what impact did they have on later legal systems? Be sure to clearly develop and organize your ideas, use supporting evidence.
Views of westward expansion and native americans : Thomas Jefferson wrote this secret message to Congress about the Lewis & Clark expedition in 1803; what does it tell us about Jefferson.
Analyzes the testing of the system in your plan : Describe how you would correct the design issues with the system to make the restaurant managers happy.
Celebration of columbus day : What is the conflict that exists between the celebration of Columbus Day while some opponents think it should be replaced by Indigenous People's Day ?
Acquiring new territory in the constitution : Should the founding fathers have provided provisions for acquiring new territory in the constitution? Why or Why not?
Concept of a lost continent : From which ancient sources did the concept of a "lost continent" of Atlantis originally derive?
How keith fitzpatrick-matthews debunks : Briefly explain how Keith Fitzpatrick-Matthews debunks ONE of the supposed "Amazing Discoveries" from the Spirit Science listicle.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Skills for an information technology project managerwhich

skills for an information technology project managerwhich skills do you think are most important for an information

  Create the analysis and design documentation

You will complete the analysis and design for the project. You will use the information described in the required reading to create the Analysis and Design documentation. You will create the following items.

  How does the new integrated system secure information

How does the new integrated system secure information? This includes looking at laws, regulations, patient rights, employee rights, and barriers to security.

  Describe how the organization''s policies

Describe how the organization's policies and standards would be administered to meet the key requirements of accepted industry standards.

  How different is it from us in term of distribution of power

Finally, it should also include a summary of the political structure of Mexico think about how is it governed, and how different is it from the U.S in term of distribution of power.

  Why knowledge of systems architecture is important

Why knowledge of systems architecture is important to different roles and job titles (high-level overview from online lecture and in-class discussion)

  What are the business information system requirements

Explain which of the potential approaches to system development (computer-aided software engineering (CASE) tools, joint application design (JAD), rapid application development (RAD), participatory design (PD), or the use of Agile Methodologies sh..

  Unique ways salesforce’s sfa application

For this assignment, you are to view the video case study "Salesforce.com SFA Automation on the iPhone and iPod Touch" located belowand answer the following questions.

  Create preventative measures to minimize disruption

create preventative measures to minimize disruption of a supply chain system. Can you name a place (country) in any part of the world.

  Review some web sites of good policy

Review some Web sites of "good" policy examples you can use to start your research. EACH WEEK you will find examples that apply to the section we are doing. This week we focus on the firm overview - what is the firm and what are we protecting.

  Identify how cultural values affect cyber ethics norms

Identify examples of how cultural values affect moral legitimacy and cyber ethics norms. Cyber Espionage and the Theft of U.S. Intellectual Property and Technology [2013 - video / transcripts of Congressional hearing].

  Explain the process to install a network adapter

Details about what is necessary for Internet connectivity. Explain the process to install a network adapter.  Primary differences between a wide area network and a local area network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd