Context of a systems development project

Assignment Help Computer Network Security
Reference no: EM13943542

Susan, president of MOTO, Inc., a human resources management ?rm, is re?ecting on the client management software system her organization purchased 4 years ago. At that time, the ?rm had just gone through a major growth spurt, and the mixture of automated and manual procedures that had been used to manage client accounts became unwieldy. Susan and Nancy, her IS department head, researched and selected the package that is currently used. Susan had heard about the software at a professional conference she attended, and at least initially, it worked fairly well for the ?rm. Some of their procedures had to change to ?t the package, but they expected that and were prepared for it.

Since that time, MOTO, Inc. has continued to grow, not only through an expansion of the client base, but through the acquisition of several smaller employment-related businesses. MOTO, Inc. is a much di?erent business than it was 4 years ago. Along with expanding to o?er more diversi?ed human resource management services, the ?rm's support sta? has also expanded. Susan and Nancy are particularly proud of the IS department they have built up over the years. Using strong ties with a local university, an attractive compensation package, and a good working environment, the IS department is well sta?ed with competent, innovative people, plus a steady stream of college interns keeps the department fresh and lively. One of the IS teams pioneered the use of the Internet to o?er MOTO's services to a whole new market segment, an experiment that has proven very successful.

It seems clear that a major change is needed in the client management software, and Susan has already begun to plan ?nancially to undertake such a project. This software is a central part of MOTO's operations, and Susan wants to be sure that a quality system is obtained this time. She knows that the vendor of their current system has made some revisions and additions

to its product line. There are also a number of other software vendors who o?er products that may be suitable. Some of these vendors did not exist when the purchase was made 4 years ago.

Susan is also considering Nancy's suggestion that the IS department develop a custom software application.

  1. Outline the issues that Susan should consider which would support the development of a custom software application in-house.

  2. Outline the issues that Susan should consider which would support the purchase of a software package.

  3. Within the context of a systems development project, when should the decision of "make-versus-buy" be made? How should Susan proceed? Explain your answer.

Reference no: EM13943542

Questions Cloud

Compose a two to three paragraphs explaining soap : Assume that your readers are familiar with browsing the internet, but they have no technical knowledge of how it works behind the scene
Describe the specific aims of the project : Summarize the practice issue in need of change providing background information and the perceived significance of the problem and Describe the specific aims of the project - what improved outcomes do you hope to achieve
Simple procedure to implement the graphics package : The group of classes represent a collection of graphic objects, such as circles, rectangles, lines, and points.
Calculate the value of the sending-end phase voltage vsp : Given the parameter values in TABLE A and if the magnitude of the receiving-end line voltage VRL is measured as 154 kV when feeding a balanced load of 40 MVA at a power factor of 0.9, calculate the value of the sending-end phase voltage VSP and se..
Context of a systems development project : Outline the issues that Susan should consider which would support the purchase of a software package. Within the context of a systems development project, when should the decision of "make-versus-buy" be made? How should Susan proceed? Explain your..
How are the two traditions different : Identify which features of these two traditions you saw as non-comparable. How are the two traditions different? If you had grown up in the non-Western culture, do you think you would prefer these two traditions over the ones to which you have bee..
Marlene grady and pauline monroe are partners : Marlene Grady and Pauline Monroe are partners engaged in operating The G&M Doll Shop,doll shop is located in a state that requires unemployment compensation contributions of employers of one or more individuals.
Describe one type of health inequality or inequity : Describe one type of health inequality/inequity that is seen in healthcare that also has an ethical consideration
Define the hot keys for each command button. : Create a macro group named Switchboard Macros for the command buttons. The command buttons perform these actions: open the Subcategory table, open the Item form, open the Registrant form, open the Projected Income Based on Minimum Bid report in th..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd