Complete library private process and its interactions

Assignment Help Basic Computer Science
Reference no: EM132363271

Assignment: Business Process Modelling

Assignment details:

Quality and service excellence is the cornerstone of the University of Wollongong Library commitment to staff and students. Located throughout NSW and the world, libraries and access centres support over 20,000 students and staff, providing access to half a million books, over 106,955 journal titles, 610 databases (online collections of journal articles) and 246,450+ e-books.

The handling of delays for delivering books and journals back to the library today is very inefficient. The existing IT system is able to automatically send a reminder to the customer about the delay, but the handling of the delay is done purely manually by the librarians if the customer does not return the book or journal. The management of the Library has decided that the delay process should be managed by a business process management system. A business consultant interviewed a number of librarians about how they handle delays. The interviews result in a heterogeneous view of the practice of handling delays. The (hypothetical) scenario of handling a delay can be summarised as:

A delay can be recognised automatically by the existing library management system. An email will be sent to the customer automatically, requesting him/her to return or renew the book. If the book has not been returned a week later, a librarian will be notified by email. The librarian looks up the delayed customer in the IT system. If there is a phone number registered, she tries to call him by phone, else she writes a letter telling about the delay, that he already has received one reminder and that he will be charged a fee for the delay. If the book has not been returned a week later, the librarian will send another letter to the delayed customer informing him that he will be reported to the police for theft if the book is not returned. One more week later, if not returned, the librarian contacts her manager, who takes over. If the book is returned anytime during this period, the librarian will close this case and no further action will be taken.

If the delayed customer is a student, the manager contacts the academic registry department to suspend the student account. If the delayed customer is a staff member, the manager contacts the Personnel unit to suspend the staff payroll. After that, the manager attaches a fee payable to the customer's account and request the customer to pay, which includes the cost of the book and a late return penalty. The case will be closed by the manager when the charged amount is paid in full. When the case is closed, the manager will notify the academic registry department or the personnel unit to lift the suspension. Occasionally, the customer might return the book and also pay the fee in full. In this case, the cost of the book will be refunded. In some other cases, the customer returns the book without paying the fee. The case remains open but the amount the customer owes will be changed. Sixty days after the delay is first identified, if the case is still open, the manager change the status of the case to "forced close" and contacts a debt collection agency by phone to collect any outstanding fee.

You are employed as an IT architect for the library. You are responsible for modelling the above delay handling business process using BPMN. You will need to identify events, activities and decision points, and show the complete library private process and its interactions with external entities. Document your business process diagram using Bizagi BPMN modeller. Where the description is not clear, you can make your own assumptions. You will need to write a supporting document to clearly explain your process model and submit it with your project.

Reference no: EM132363271

Questions Cloud

Describe how to account for an impairment of a security : Determine how close to maturity Cascade could sell an investment and still classify it as held-to-maturity.Describe how to account for an impairment of security
Calculate the earnings on an annual basis : Calculate the earnings on an annual basis and use the total of 12 months of the annuity for the amount she will take out.
Prepare a flexed budget and variance analysis for the month : Break down the labour variance and material variance into rate and efficiency variance, and price and usage variance, respectively.
Clearly state the mystery and provide a brief summary : Clearly state the "mystery" and provide a brief summary of at least two (2) reasonable and scholarly theories which could explain the mystery
Complete library private process and its interactions : ISIT332 - Business Process Management - University of Wollongong - Delay handling business process using BPMN. You will need to identify events, activities
Describe what is meant by victim precipitated homicide : Discuss and describe what is meant by a 'victim precipitated homicide'. In doing so, briefly describe and elaborate a bit on how 'situational rage'
American process of rendering criminal justice as non-system : Provide an overview of the rationale as to why some view the American process of rendering criminal justice as a non-system.
Determine the company resources and capabilities : Strayer University - BUS499 Business Administration Capstone Assignment. Determine the company resources and capabilities
What is the equity at the beginning of the year : What is the equity at the beginning of the year? If the company issues common stock of $8,600 and pay dividends of $43,200, how much is net income loss?

Reviews

len2363271

8/29/2019 11:53:32 PM

Description: This is an individual assignment and is worth 20 marks. Please submit a digital copy to the Moodle site by the due date. Excellent Satisfactory Poor N/A Key elements identified (e.g., events, activities, gateways) (4) Objects connected correctly (4) Primary elements grouped correctly (2) Artifacts described correctly (2) Descriptions meaningful and helpful (3) Report clear and comprehensive (5) Overall Mark /20 Overall Comments

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd