The Proposed Business Process Changes For The System In Riordan Manufacturing
Jessica Rahming
IT 205
UofP
September 20, 2015
Introduction
In this presentation, a diagram of the information flow and any elements controlling proper access to the information it uses will be provided.
This will include a description of any proposed business process changes for the system along with flow diagrams.
The discussion will be based on Riordan Manufacturing which is one of the Virtual Organizations.
Riordan Manufacturing which is one of the Virtual Organizations manufactures plastics. It was founded in 1991 by Dr. Riordan and its headquarters is in San Jose, California.
2
Overview
In Riordan Manufacturing, there have been a number of meetings that have taken place on the subject of drafting some safe ways to process transition to new changes in the system.
Different data flows have been reviewed to ensure that there is proper handling between Riordan Manufacturing and the others plan through improving good relations between various departments.
After the final implementation of these changes, communication will be improved in Riordan Manufacturing Company and time and money will also be save.
3
Security Controls
Kim & Solomon (2011) stated that security is paramount in every project that is set to be undertaken.
Therefore, in this project the staffs that are in charge will ensure that they install the necessary, firewalls, carry out routine backups of data, intrusion detection systems and also carry recovery operations.
System developers should also be responsible in security matters especially in information systems.
In every organization that is keen in ensuring that its data is safe from any unauthorized and loss of important data, data security is a key. Installing data security systems will ensure that loss of important data is minimized.
4
Areas where the business process changes in Riordan Manufacturing will take place
The following are the proposed areas where business process changes will be carried out:
Data
System processes
System Interfaces
Network
5
Data
According to Nabliba (2012), all forms of data should be kept secure from any access by unauthorized persons.
Riordan Manufacturing value information on processes and procedures, data on employees and that those who do not keep the confidentiality of these data will be held responsible for any loss of data.
Data encryption and use of passwords and other access ids will be used in the Riordan Manufacturing Company to ensure that access to crucial data is limited to authorize persons only.
6
Processes
Some processes that are valued in Riordan Manufacturing such as application process will be carried out using third-party software.
This software will allow the company to get security guarantee from the third party vendor.
According to Harmon (2007). Using COTS in Riordan Manufacturing will benefit in saving time and money since it ...
Chapter 3 - Islamic Banking Products and Services.pptx
The Proposed Business Process Changes For The System In Riordan .docx
1. The Proposed Business Process Changes For The System In
Riordan Manufacturing
Jessica Rahming
IT 205
UofP
September 20, 2015
Introduction
In this presentation, a diagram of the information flow and any
elements controlling proper access to the information it uses
will be provided.
This will include a description of any proposed business process
changes for the system along with flow diagrams.
The discussion will be based on Riordan Manufacturing which
is one of the Virtual Organizations.
Riordan Manufacturing which is one of the Virtual
Organizations manufactures plastics. It was founded in 1991 by
Dr. Riordan and its headquarters is in San Jose, California.
2
Overview
In Riordan Manufacturing, there have been a number of
meetings that have taken place on the subject of drafting some
safe ways to process transition to new changes in the system.
2. Different data flows have been reviewed to ensure that there is
proper handling between Riordan Manufacturing and the others
plan through improving good relations between various
departments.
After the final implementation of these changes, communication
will be improved in Riordan Manufacturing Company and time
and money will also be save.
3
Security Controls
Kim & Solomon (2011) stated that security is paramount in
every project that is set to be undertaken.
Therefore, in this project the staffs that are in charge will
ensure that they install the necessary, firewalls, carry out
routine backups of data, intrusion detection systems and also
carry recovery operations.
System developers should also be responsible in security
matters especially in information systems.
In every organization that is keen in ensuring that its data is
safe from any unauthorized and loss of important data, data
security is a key. Installing data security systems will ensure
that loss of important data is minimized.
4
3. Areas where the business process changes in Riordan
Manufacturing will take place
The following are the proposed areas where business process
changes will be carried out:
Data
System processes
System Interfaces
Network
5
Data
According to Nabliba (2012), all forms of data should be kept
secure from any access by unauthorized persons.
Riordan Manufacturing value information on processes and
procedures, data on employees and that those who do not keep
the confidentiality of these data will be held responsible for any
loss of data.
Data encryption and use of passwords and other access ids will
be used in the Riordan Manufacturing Company to ensure that
access to crucial data is limited to authorize persons only.
6
Processes
4. Some processes that are valued in Riordan Manufacturing such
as application process will be carried out using third-party
software.
This software will allow the company to get security guarantee
from the third party vendor.
According to Harmon (2007). Using COTS in Riordan
Manufacturing will benefit in saving time and money since it
has programs that have been already development and training
services are also included of them.
Harmon (2007) argued that as a long term investment in the
company, it will help in saving a lot of financial resources.
7
System Interfaces
Creating an interface involves designing a platform where
external users such as suppliers, customers and others systems
will interact with the system.
High level of security is therefore needed since system interface
will interact and exchange information with other systems.
To ensure authorized access, passwords can be incorporated in
order to have safe access to employee records or company’s tax
records.
This will help in preventing some employees from accessing
other employees’ computer records.
8
5. Network
It is recommended that a company-wide database should be
created and made accessible only through a virtual local area
network (VLAN).
This will allow employees to view and also update some basic
information that will be subjected to verification by a payroll
supervisor of clerk.
Accessing this information will required a security confirmation
that is guaranteed by use of a username and a password and to
access detailed information, a payroll supervisor or clerk is
required.
In addition, a third-party organization that administer
employees’ benefits such as employee compensation and
employee health benefits should be audited on yearly basis to
check for competitiveness and accuracy.
9
Cloud Storage
Physical Data Flow Diagrams
In the process of designing the application logic of an
information system, the implementation decisions that describe
how the system work is included.
6. The system implementation details are shown in the Physical
data flow diagrams.
Saeed & Pejas (2005) suggested that these details include:
human actions or programs that perform the processes, data
stores that refers to database tables and files and the physical
transfers media from the data flows.
Following the appropriate and the recommended implementation
process will ensure that Riordan Manufacturing benefits from
the new business process changes.
12
References
Harmon, P. (2007). Business process change: A guide for
business managers and BPM and six sigma professionals.
Amsterdam: Elsevier
Kim, D., & Solomon, M. (2011). Fundamentals of information
systems security. Sudbury, MA: Jones & Bartlett Learning.
Nabliba, M. (2012). Integrity data protection forensic:
Computer forensic technology new trend. S.l.: Xlibris
Saeed, K., & Pejas, J. (2005). Information Processing and
Security Systems. Boston, MA: Springer Science+Business
Media, Inc.