Develop a crud matrix

Assignment Help Management Information Sys
Reference no: EM13757192

Assignment: CRUD - Defining Information Ownership

One easy way to determine information ownership is to think of CRUD-create, read, update, and delete. If you cannot only read but also create, update, and/or delete information, then in some way you own that information because you are responsible for its quality.
Here again, let's consider your school as an example and focus on your personal and transcript information. That information includes your student ID, name, address, phone number, GPA, declared major, declared minor (if you have one), and courses completed (your transcript).

Part 1: Identify Create, Update, and Delete Privileges

For each piece of information, first identify who has create, update, and delete privileges. Include any individuals or departments that have these sorts of information privileges. There may be several. If so, who is ultimately responsible for your personal and transcript information? Second, identify all the groups of people at your school who can only view (read) your information.

Part 2: Develop a CRUD Matrix

Develop a CRUD matrix that outlines the relationships among the pieces of information and user privileges.

Part 3: Write a Detail Document

Write a detail document about the various business rules that define how the scenario described in Part 1 works with respect to information ownership and their relationships. Identify the appropriate relationships among the information, and define the minimum and maximum privileges associated with each relationship.

Reference no: EM13757192

Questions Cloud

Should us government play in health care for americans : What role, if any, should the U.S. Government play in health care coverage for Americans? Should the government's role in terms of health insurance be different for those with jobs and for those without jobs?
Create an instance function in the inventorymanager : Create an instance function in the InventoryManager class called getDatabaseConnection. This function should
Analyse information security vulnerabilities : analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks
Find three musicians or bands/groups that are from scotland : Find three musicians or bands/groups that are from Scotland. Not Ireland or England or Wales. Do some indepth research and pick and artist and a song that "speaks to you".
Develop a crud matrix : Develop a CRUD matrix that outlines the relationships among the pieces of information and user privileges
Analyze your own characteristics and behaviors : This assignment is an in-depth exploration and new understanding of you! You will use theories of personality to analyze your own characteristics and behaviors.
Write paper that identifies common trends in a close reading : Students wishing to write a detailed, focused paper that identifies common trends in, or does a close reading of a single work of, Electronic Literature may do so.
What ongoing training needs to be implemented : What ongoing training needs to be implemented and why. What training documentation should be kept and why
Good and bad technologies : Good and bad technologies-Some say that no technology is inherently good or evil, any technology can be used for good or evil purposes. Pick three of them and cite a good use and a bad use of the technology

Reviews

Write a Review

Management Information Sys Questions & Answers

  Important ingredient to a supply chain strategy

Supply Chain Strategy - Check at least four key drivers of any supply chain strategy and discuss why each is an important ingredient to a supply chain strategy.

  Show the bottom-up and top-down budgets

Bottom-Up and Top-Down Budgets - Contrast the strengths of bottom-up and top-down approaches to project budgeting.

  Who should be involved in a technology team for a company

who should be involved in a technology team for a company technology change?once a decision has been made to change a

  Describe three accounting and finance features

List and describe three accounting and finance features for limited companies. How are accounting and financial reporting regulated in your country?

  Academic computing environment

Discuss or share any problems that you faced in accessing or using the Academic Computing Environment and the Java Development Environment

  Challenge that health care organizations will face

Elaborate on the trend of interoperability of health care management information systems. Determine a significant challenge that health care organizations will face when creating an interoperable system. Justify your response

  Solution to supply chain management and supply chain

solution to supply chain management and supply chain managementa identify the main issues in the chosen area b contain

  Explain strategic role of the supply chain

Strategic role of the supply chain - Can you help me get started with this assignment?

  Benefits of automating the business

Advantages of Automating the Business - How would you estimate the benefits of automating the business versus the investment cost? Give a specific example.

  Computer searchconduct an internet search looking for tips

computer searchconduct an internet search looking for tips for microsoft office 2010 e.g. tutorials tips etc.. which

  Strategic role of the supply chaincan you help me get

strategic role of the supply chaincan you help me get started with this assignment?maria and janet at rock horse feed

  Systems solution online travel agencybusiness situation

systems solution online travel agencybusiness situation that requires a systems solution i have selected a small online

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd