Professional and scientific staff management case

Assignment Help Computer Network Security
Reference no: EM133397704

PSSM:

Case

Professional and Scientific Staff Management (PSSM) is a unique type of temporary staffing agency. Many organizations today hire highly skilled technical employees on a short-term, temporary basis to assist with special projects or to provide a needed technical skill. PSSM negotiates contracts with its client companies in which it agrees to provide temporary staff in specific job categories for a specified cost. For example, PSSM has a contract with an oil and gas exploration company in which it agrees to supply geologists with at least a master's degree for $5,000 per week. PSSM has contracts with a wide range of companies and can place almost any type of professional or scientific staff members, from computer programmers to geologists to astrophysicists.

When a PSSM client company determines that it will need a temporary professional or scientific employee, it issues a staffing request against the contract it had previously negotiated with PSSM. When PSSM's contract manager receives a staffing request, the contract number referenced on the staffing request is entered into the contract database. Using information from the database, the contract manager reviews the terms and conditions of the contract and determines whether the staffing request is valid. The staffing request is valid if the contract has not expired, the type of professional or scientific employee requested is listed on the original contract, and the requested fee falls within the negotiated fee range. If the staffing request is not valid, the contract manager sends the staffing request back to the client with a letter stating why the staffing request cannot be filled, and a copy of the letter is filed. If the staffing request is valid, the contract manager enters the staffing request into the staffing request database as an outstanding staffing request. The staffing request is then sent to the PSSM placement department.

In the placement department, the type of staff member, experience, and qualifications requested on the staffing request are checked against the database of available professional and scientific staff. If a qualified individual is found, he or she is marked "reserved" in the staff database. If a qualified individual cannot be found in the database or is not immediately available, the placement department creates a memo that explains the inability to meet the staffing request and attaches it to the staffing request. All staffing requests are then sent to the arrangements department.

In the arrangements department, the prospective temporary employee is contacted and asked to agree to the placement. After the placement details have been worked out and agreed to, the staff member is marked "placed" in the staff database. A copy of the staffing request and a bill for the placement fee is sent to the client. Finally, the staffing request, the "unable-to-fill" memo (if any), and a copy of the placement fee bill are sent to the contract manager. If the staffing request was filled, the contract manager closes the open staffing request in the staffing request database. If the staffing request could not be filled, the client is notified. The staffing request, placement fee bill, and unable-tofillmemo are then filedin the contract office.

Question: You are required to propose the hardware and software needed to accomplish the needs of the Professional and Scientific Staff Management (PSSM) case. Make sure you provide a detailed description and state any assumptions you have. Try to mention details wherever applicable, like processor speed, disk storage size, software versions, etc. Format is in the picture example.

Reference no: EM133397704

Questions Cloud

How does dr. bucher define culture in the readings : How does Dr. Bucher define culture in the readings? How has globalization impacted the culture of the US? Explain with an example.
Analyze the types of risk mitigation strategies : Analyze the types of risk mitigation strategies you may have encountered in your organization or industry and each strategy's strengths and weaknesses.
Create a Baseline Budget for this project : What is the budget at completion for this project? What is the expected completion time for this project - Create a Baseline Budget for this project
Analyze types of risk mitigation strategies : Analyze the types of risk mitigation strategies you may have encountered in your organization or industry and each strategy's strengths and weaknesses.
Professional and scientific staff management case : You are required to propose the hardware and software needed to accomplish the needs of the Professional and Scientific Staff Management (PSSM) case.
How many ways are there to pair off 2n people for tennis : How many ways are there to pair off 2n people for tennis matches? Express this function in terms of ?n), where n is the number of PAIRS and Zn is the number
List of the company major capital accounts for fy : Using the information you obtained last week, complete Part 2: Financial Overview portion of the case study report and submit it as an attachment here.
Security plan for blackboard online program : You have been asked to create the framework for the development of a security plan for the Blackboard online program.
Was the sample representative of the study target population : What variables were used to describe the sample and What statistical procedures were used to describe the sample

Reviews

Write a Review

Computer Network Security Questions & Answers

  Risk management strategy for an e-commerce company

Risk Management Strategy for an e-Commerce Company - Identify and document a risk mitigation strategy for 10 separate risks. Your risk mitigation strategies

  Computer operating system in digital environment

What is the technical term for emulating a computer operating system in a digital environment?

  Difference between legislation and other regulatory document

Compare and contrast the difference between legislation and other regulatory documents, i.e., guidance, standards, directives, executive orders, etc

  Describe how each is countered bya particular feature of ssl

Describe how each is countered bya particular feature of SSL - In practice, would you expect a secure design or implementation to impose the two properties on M? Explain.

  What is an ips and do we need one in an e-commerce network

What is an Intrusion Prevention System (IPS) and do we need one in an e-commerce network? Do we need a group of network personnel to monitor the e-commerce network for intrusions 24/7?

  Personal responsibility of your willingness

Self-discipline is taking personal responsibility of your willingness and desire to finish tasks and reach your goals

  Article on a current topic related to it security

Post a link to an article on a current topic related to IT security and/or ethics in the news. Once you post your article, go to other students submission and respond with how you see the articles content relating to either of the texts in class ..

  What level of excess reserves does the bank now have

The bank sells $20,000 in securities to the Federal Reserve Bank in its district, receiving a $20,000 increase in reserves in return.

  Configure a sniffer to monitor traffic

Configure a sniffer to monitor traffic. You will then run two network scans to emulate part of a hacker's life cycle

  Variables a government will look at to predict

Describe 2 variables a government will look at to predict where the economy will be in the next six months.

  Pick an ethical issue rooted in cybertechnology

Create an annotated outline which lays-out your topic, thesis, and analytical process, including premises. This must be clear and complete

  How can mls be implemented in an rbac system

In general terms, how can MLS be implemented in an RBAC system? Describe each of the possible degrees of granularity possible with an MLS database system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd