Context of a systems development project

Assignment Help Computer Network Security
Reference no: EM13943542

Susan, president of MOTO, Inc., a human resources management ?rm, is re?ecting on the client management software system her organization purchased 4 years ago. At that time, the ?rm had just gone through a major growth spurt, and the mixture of automated and manual procedures that had been used to manage client accounts became unwieldy. Susan and Nancy, her IS department head, researched and selected the package that is currently used. Susan had heard about the software at a professional conference she attended, and at least initially, it worked fairly well for the ?rm. Some of their procedures had to change to ?t the package, but they expected that and were prepared for it.

Since that time, MOTO, Inc. has continued to grow, not only through an expansion of the client base, but through the acquisition of several smaller employment-related businesses. MOTO, Inc. is a much di?erent business than it was 4 years ago. Along with expanding to o?er more diversi?ed human resource management services, the ?rm's support sta? has also expanded. Susan and Nancy are particularly proud of the IS department they have built up over the years. Using strong ties with a local university, an attractive compensation package, and a good working environment, the IS department is well sta?ed with competent, innovative people, plus a steady stream of college interns keeps the department fresh and lively. One of the IS teams pioneered the use of the Internet to o?er MOTO's services to a whole new market segment, an experiment that has proven very successful.

It seems clear that a major change is needed in the client management software, and Susan has already begun to plan ?nancially to undertake such a project. This software is a central part of MOTO's operations, and Susan wants to be sure that a quality system is obtained this time. She knows that the vendor of their current system has made some revisions and additions

to its product line. There are also a number of other software vendors who o?er products that may be suitable. Some of these vendors did not exist when the purchase was made 4 years ago.

Susan is also considering Nancy's suggestion that the IS department develop a custom software application.

  1. Outline the issues that Susan should consider which would support the development of a custom software application in-house.

  2. Outline the issues that Susan should consider which would support the purchase of a software package.

  3. Within the context of a systems development project, when should the decision of "make-versus-buy" be made? How should Susan proceed? Explain your answer.

Reference no: EM13943542

Questions Cloud

Compose a two to three paragraphs explaining soap : Assume that your readers are familiar with browsing the internet, but they have no technical knowledge of how it works behind the scene
Describe the specific aims of the project : Summarize the practice issue in need of change providing background information and the perceived significance of the problem and Describe the specific aims of the project - what improved outcomes do you hope to achieve
Simple procedure to implement the graphics package : The group of classes represent a collection of graphic objects, such as circles, rectangles, lines, and points.
Calculate the value of the sending-end phase voltage vsp : Given the parameter values in TABLE A and if the magnitude of the receiving-end line voltage VRL is measured as 154 kV when feeding a balanced load of 40 MVA at a power factor of 0.9, calculate the value of the sending-end phase voltage VSP and se..
Context of a systems development project : Outline the issues that Susan should consider which would support the purchase of a software package. Within the context of a systems development project, when should the decision of "make-versus-buy" be made? How should Susan proceed? Explain your..
How are the two traditions different : Identify which features of these two traditions you saw as non-comparable. How are the two traditions different? If you had grown up in the non-Western culture, do you think you would prefer these two traditions over the ones to which you have bee..
Marlene grady and pauline monroe are partners : Marlene Grady and Pauline Monroe are partners engaged in operating The G&M Doll Shop,doll shop is located in a state that requires unemployment compensation contributions of employers of one or more individuals.
Describe one type of health inequality or inequity : Describe one type of health inequality/inequity that is seen in healthcare that also has an ethical consideration
Define the hot keys for each command button. : Create a macro group named Switchboard Macros for the command buttons. The command buttons perform these actions: open the Subcategory table, open the Item form, open the Registrant form, open the Projected Income Based on Minimum Bid report in th..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain computer forensics software or services

Use a web search engine to search for companies specializing in computer forensics software or services. Select two or three and write a one- to two-page report comparing what each company does.

  Describe what hacking of memory or hacking of ram means

Describe what hacking of memory or hacking of RAM means

  Find the sequence obtained by applying successively the

1 encrypt the message buy now using the knapsack cipher based on the sequence obtained from the super-increasing

  Improve security on its network

You were hired as a security consultant for a medium-sized organization. You and your team need to help the organization to improve security on its network

  Perspective of current hot topics in information security

Build an understanding and perspective of current hot topics in Information Security and build generic skills including

  Content of e-mail rightfully belongs to sender-receiver

Who does content of e-mail rightfully belongs to sender or receiver? Are security threats overblown? Present the example to support response.

  Beat the hacker

A honeypot can be a useful for discovering some of the hacking trends occurring within an organization. Of course, there have to be certain measures placed upon its operation, maintenance

  Maintain an online reflective blog

Maintain an online reflective blog/journal and write blog posts/entries based on academic articles and conduct a research of the Internet on the topics as listed at the top of this assessment detail.

  Organizations security policies and procedures

Analyze the chosen organization's security policies and procedures, and provide an opinion of whether or not its policies and procedures are strong from an information security standpoint

  Mobile devices security

Mobile Devices Security

  Kerberos authentication protocol

Describe 802.1x authentication and the steps that when a wireless client connects to a network using RADIUS server for authentication and Explain the PEAP protocol - how does it differ from EAP and what EAP deficiency does it address?

  Security suppose you have recently responded to your first

suppose you have recently responded to your first computer forensic incident based on the results of your investigation

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd