14. 17
Access Control and Identity Management Life Cycle
‹#›
18
Provisioning
Review
Revocation
Provisioning
‹#›
19
Provisioning entails determining the organizational
requirements for access to information, and applies the
appropriate access rights
15. Review
‹#›
20
Access rights and usage must be monitored on a basis
commensurate with risk
Reviewing access can take the form of automated checks,
manual audits, and several other methods
Revocation
‹#›
21
Through access review, revocation typically is invoked when a
user has aggregated unnecessary access, or access is not
commensurate with the role of the user
17. Reviewers
Name
Position
Table of Contents
2Document Control
1
Business Requirements
4
1.1
Project Overview
4
1.2
Background including current process
4
1.3
Scope
4
1.3.1
Scope of Project
4
1.3.2
Constraints and Assumptions
5
1.3.3
Risks
18. 5
1.3.4
Scope Control
5
1.3.5
Relationship to Other Systems/Projects
5
1.3.6
Definition of Terms (if applicable)
5
1 Business Requirements
1.1 Project Overview
Provide a short, yet complete, overview of the project.
1.2 Background including current process
Describe the background to the project, (same section may be
reused in the Quality Plan) include:
This project is
The project goal is to
The IT role for this project is
1.3 Scope
1.3.1 Scope of Project
The scope of this project includes a number of areas. For each
area, there should be a corresponding strategy for incorporating
these areas into the overall project.
Applications
In order to meet the target production date, only these
applications will be implemented:
19. Sites
These sites are considered part of the implementation:
Process Re-engineering
Re-engineering will
Customization
Customizations will be limited to
Interfaces
the interfaces included are:
Architecture
Application and Technical Architecture will
Conversion
Only the following data and volume will be considered for
conversion:
Testing
Testing will include only
Funding
Project funding is limited to
Training
Training will be
Education
Education will include
1.3.2 Constraints and Assumptions
The following constraints have been identified:
The following assumptions have been made in defining the
20. scope, objectives and approach:
1.3.3 Risks
The following risks have been identified as possibly affecting
the project during its progression:
1.3.4 Scope Control
The control of changes to the scope identified in this document
will be managed through the Change Control, with business
owner representative approval for any changes that affect cost
or timeline for the project.
1.3.5 Relationship to Other Systems/Projects
It is the responsibility of the business unit to inform IT of other
business initiatives that may impact the project. The following
are known business initiatives:
1.3.6 Definition of Terms (if applicable)
List any definitions that will be used throughout the duration of
the project.
5
Running Head: BUSINESS REQUIREMENT
DOCUMENTATION 1
BUSINESS REQUIREMENT DOCUMENTATION 2
21. Business Requirement Documentation
Student Name
Professor Name
Course Title
Date
Business Requirement Documentation
Scope of the Project
Company and Project Objectives
The company aims to use the project to cater to the increasing
company needs and offer qualities services to expanding the
number of customers. The goal of the company is to increase the
speed use of the system to customer with a more reliable system
by providing an open and flexible system base of future
speculation of technology change. It will ensure a high level of
customer’s data security and remove repetition of business
transactions in the organization. It will be enhanced by
electrical capture of stakeholder’s data from the sources. The
project aims to increase information sharing form the company
and stakeholders as well as boasts the ability and effectiveness
of employee to perform their job. The overall objective is to
provide a more efficient and effective way to serve increasing
22. customer and safekeeping of stakeholder data.
The project ensures the end user that is customer and
organization have the best experience input into the design
process. It ensures there is a reduction in time taken to make a
transaction online and the delivery time is reduced. It also gives
update of time-to-time on the delivery process (Hsu & Wang,
2017). The project aims to achieve all the organization's goal
and objective within the stipulated time and budget. It will also
try to minimize the disruption of business operation during this
tie on the affected units. It will also come into favorable terms
of agreement with the vendors and another department.
Application
To cater to the increasing number and period given, the project
will first implement the installation of the servers. It also
includes updating the database, starting with the internal
environment of the business that is the update of staff data,
management, and shareholders information (Lind & Culler,
2015). It will be followed by updating the customer's profile to
capture the necessary data, ensure the safety of data received,
and increase the speed of the access to the profiles. The system
will then concentrate on the security features of the database.
The analysis of the system will be conducted to ensure effective
use of the application.
The project will update the central hub with the update servers
to access the new database. This is to boost the network
connectivity between the serves and the computers in the
organization. The operating system will be configured again to
gain access to the new database and with the networking
system. Due to the time parameter, the project will not be
updating the hardware system with the new application. They
include action such printer and scanners replacement, upgrade
of computer desktop hardware, an increase of internet cables,
and routers.
Sites
Management is required to interpret different data from the
system without physically involved in the daily activities of the
23. business. To achieve the project will install software that will
analyze the daily transaction of the business and send
interpreted data to the management (T. Hans, 2014). The data
may involve a sale report, invoices analysis, and output data of
the product. It will easily decision making on the management.
The system will contain part of the vendors of the company as
part of the implementation of the project. It will be in the aim to
reconcile all the company data and transaction to an online
platform. It is to ensure the proper record keeping of all
incoming and outgoing transaction with the vendors. To
effectively implement the project, the website design will have
to change to accommodate the new data. It will include more
feature at the end, such as delivery track option, promotion
options, and more to compare competing brand in the website.
Re-engineering Process
Re-engineering will restructure the business processes involved
during the transaction between the customer and the company.
To improve on quality and speed between the transactions taken
between the customers purchasing the product and the company
staff authenticating the process some of the step involved will
be redesigned (Lind & Culler, 2015). There will be a few steps
involves, and the website will be automatically caring for the
whole process of buying. To authenticate the process employee
will take a few seconds to update the customers on the delivery
start.
Another process that will be redesign is the analysis of the data.
The system will be able to improve in term of speed to analyze
customer data, thus offer better quality. Management will be
able to pull the reports required as a concise moment to enable
make the right decision. The re-engineering of the various
process such the customer website, staff users, vendor process,
and management will affect the company structures. It will
bring in the supervisor of the transaction, the system, and
updating and analysis of the system data.
Customization
Since the project is designed according to company
24. specification, it will include all the customers’ preferences. One
the customer create a profile and make his first customer the
program will be able to speculate customer’s choice and taste of
products such that the next time customer login in it will be to
advertise the best product (Lind & Culler, 2015). The
customization will be limited to only those who have created an
account on the company’s website. Accessibility of product and
the whole process of buying on the customer's end interface will
only be limited to those who have created an account also.
On the company end, interface vendor will be required to create
an account and keep track of their invoices. They will be alerted
automatically when they supply product each reorders level.
The management will be able to manage the company
inventories from the others, as vendors are limited to access the
movement of product in the company.
The low-level staff will only have access to daily activities
transactions. Their activities involve managing the money
transaction, authenticating product for delivery, and updating
the customers on the delivery process. Top management will be
able to analyze all the data required in the running of the
business. It includes sale report, balance sheet, income
statement, inventory management report, among other reports
necessary for decision-making. The information technology
department will be in control of the system to offer support and
troubleshooting of the system when needed.
Interfaces
The project will implement two information system interface.
The first one includes the external user interface that will
comprise of customer and vendors(Foster &Godbole, 2016).
Customer’s user will consist of features such as the creation of
an account, filling of profile data, comparison of various
product, various payment methods, the making of purchase, and
tracking the delivery of the product. Vendor’s side will
comprise of quotation platform, track of invoices, methods of
payments, quantities delivered an update of reorder level.
The second interface includes that company user. It comprises
25. features such as the update of the product, price update,
promotion update, viewing of successful completion of the
purchase of product transactions, update on delivery methods,
and time. It will also comprise of customer care services to
ensure customer complaints are handled and are satisfied with
the services offered. It will also be able to produce various
reports needed for decision making in the business.
Architecture
The technical architecture will be involved in planning the
design of the whole project. They show in the diagram, chart the
information flow, and control measure in places at every point
of the system(Xing & Qi, 2015). They include the physical
design of the project and the material required to hold the
hardware part of the system. They form the connection of all the
system involving the hardware and the software to ensure the
system run as required. They recommend the requirement of the
information asset in implementing the project. They will be
involved in using various domains as a business model,
information, services and technical in design the required
business model, capture the relevant data, alignment with
business process, and provide security features.
They will also play the role of management in offering
technological strategies for the company process according to
business vision and goals. They also provide advisory services
to the management team concerning the business solution that
involves the role of information technology. Some application
includes providing information technology long-range plan to
achieve the project objectives.
Conversion
The project will first utilize the parallel conversion method to
make customer familiar with the new system. Within a
stipulated time, the project will use to direct conversion method
where it ultimately uses the new system(T. Hans, 2014). The
customer old profile will be deleted and required to create new
profiles. The previous company data that is stored on electronic
devices will be converted to the new system to ensure full
26. transit to the new system. The vital information that was left
behind in the old system will be integrated into the new system
to make it full operation. Security measure will be followed to
ensure no critical data is lost during the transit.
Testing
The project will be tested on a fully integrated system to ensure
it complies with the desired result. The project will use
simulated method to test the reliability, compliance, and
performance before being launched. It will be able to
recommend an improvement need.
Funding
The project is expected to receive much support from
shareholder since the main aim is to improve shareholders
wealth; thus, most of the financing will be shareholders
contribution. The company retention profit will be used to fund
the project. The company wills also source from external credit
sources such as a bank.
Training and Education
Training on the uses of the new system will be conducted on all
employee in the company according to their customization use.
Education will include all the stakeholder of the company to
make them familiar with the project (T. Hans, 2014). Customer
will be provided with the written guideline on the website the
moment the access it on how to create both the account and a
profile and how to maximize all the features available.
Project Control
The project will use the documentation and prepared project
plan along with company budgeting plan to monitor the progress
of the system. It wills constraint not all the activities within the
budget line and make sure resources are misused (Keyes, 2017).
It will ensure the project is on track with the stipulate
completion time by following the project plan. It will ensure
there is no or little change occur on the scope of the project
working on the project documentation. The company is required
to employ skilled personnel in the area of project management
to always evaluate and monitor the progress of the project. The
27. monitoring group is expected to come up with a baseline review
of the project.
The Possible Risk Associated With the Project
The project is related to the risk of uncontrolled strategy
schedule leading to developing a comprehensive timeline. The
number of the developed interface may interfere with the
existing system. The project may include failure due to shallow
knowledge of the user. Vendor may not estimate the product
may be due to insufficient information provided. Unrealistic
budgeting of the project may cause the constraint on the
implementation of the project (Parry & Lind, 2016). Unrealistic
time estimation to complete the project due to enormous
pressure from management. The project may face the risk of
being implement by a team member with little knowledge of the
business operation or information technology. There may be
unmatched functionality with the new packages due to reducing
customization. The procurement may use unclear methods to
provide low qualities raw material or induce unclear quality
management procedure.
Project Assumption
The project assumes the following in developing the plan. All
the stakeholders are willing to shift the business operation to
take advantage of the new system. Top management is in
support of the project and provides all the resources need to
ensure the project is completed. The monitoring group carries
their work precisely without any influences to ensure they
provide recommendation where required. The vendor will
deliver the material in time. The project team member will
adhere to the company guideline and communication plan. Any
delay in supply of material will result to project completion
delays(Hassan, Ahmad, &Zuhaira, 2018). Any new information
provided may lead to a change in the project plan. All the
information about the company and the user is disclosed to the
project. All the users will participate in the timely execution of
the project plan. The technological infrastructures that needed
in the project will be readily available in the market.
28. Project Constraints
The project may be limited access to the international user to
the nature of law enforcement. Resources available in the
market may limit the project success. Budget constraints due to
limited sources of finance may hinder the successful completion
of the project (Parry & Lind, 2016). An unforeseeable disaster
such as national disaster, for example, war, earthquake may
extend completion time. Completion time of the project may
constrain the proper execution of the plan.
Integration with Other System and Infrastructure
For the project to be completed, all the software system must be
integrated with the hardware system. The computer software
such as enterprise resource planning will be integrated with
computer desktop. The networking such as the internet will be
accessed through the router available and central hub. Servers
will serve as the domain for accesses of internet and storage of
data to ensure reliability and speed of the system. Printer and
scanner will be connected with the computer to produce the
output processed such as invoice and reports. The database will
be upgraded and made available to both the customer user
interface and company user. Security features such as password
and supervision when the long transaction is involved will be
implemented in the system to ensure safe data storage (Norman,
2014). The project will be integrated in all business unit of the
company to ensure uniform flow of the project.
Definition of Terms
Interface refers to a point where two systems interact to make a
complete pattern of design software.
Integration refers to the redesign of different sub-system or
component of a system and brings them together to make one
complete system.
Database refers to the storage of the collection of information
can be easily managed, update, and accessed anytime in need.
Project scope refers to tools that are used to explain the key
objective of the project, the desired milestone, functions,
completion time, and costs.
29. Project Activities Plan
Gantt Chart Showing the Schedule of the Project Activities
References
Foster, E. C., &Godbole, S. (2016). Database User Interface
Design. Database Systems, 139-153. doi:10.1007/978-1-4842-
1191-5_6
Hassan, I. U., Ahmad, N., &Zuhaira, B. (2018). Calculating
completeness of software project scope definition. Information
and Software Technology, 94, 208-233.
30. doi:10.1016/j.infsof.2017.10.010
Hsu, H., & Wang, S. (2017). Integrating Technology: Using
Google Forms to Collect and Analyze Data. Science
Scope, 040(08). doi:10.2505/4/ss17_040_08_64
Keyes, J. (2017). Information Technology Project Tracking and
Control. The CIO’s Guide to Risk, 105-
122.doi:10.1201/9781315108674-7
Lind, M. R., & Culler, E. (2015).Information Technology
Project Performance. Perspectives and Techniques for
Improving Information Technology Project Management, 39-50.
doi:10.4018/978-1-4666-2800-7.ch004
Norman, T. (2014).Information Technology Systems
Infrastructure. Integrated Security Systems Design, 203-249.
doi:10.1016/b978-0-12-800022-9.00011-5
Parry, V. K., & Lind, M. L. (2016). Alignment of Business
Strategy and Information Technology Considering Information
Technology Governance, Project Portfolio Control, and Risk
Management. International Journal of Information Technology
Project Management, 7(4), 21-37.
doi:10.4018/ijitpm.2016100102
T. Hans, R. (2014). Software Project Scope Verification
Through Deliverable-Oriented Work Breakdown
Structure. Computer Science & Information Technology ( CS&
IT ). doi:10.5121/csit.2013.3646
Xing, F., & Qi, H. (2015).Montage's Application and
Exploration in the Architecture Project Art. 2015 International
Conference on Industrial Informatics - Computing Technology,
Intelligent Technology, Industrial Information Integration.
doi:10.1109/iciicii.2015.130
Applications Implementation Re-engineering process
Customization Project Interface Project Architecture
Project Conersion Project Testing Employees Training
Project End 43586 43593 43600 43607
43607 43610 43616 43635 43639
Duration Applications Implementation Re-engineering
31. process Customization Project Interface Project
Architecture Project Conersion Project Testing Employees
Training Project End 28 14 14 7 14 6 5 4
3
Start Week
Week
0123456789
MayMayMayMayMayJunJunJunJunJul
1815222951219263
Phase
Applications Implementation
One
Re-engineering
Customization
Phase
Project Interfaces
Two
Project Architecture
Project Conversion
Project Testing
Final Project Specification
Phase Review and Approval
Phase
Three
Employees Training
Project End
Milestone: additional funds
May 1, 2019
Starting
1
32. Project Plan Inception
Muhammad Jawad
Dr. Dave Verret
CIS 498
April 15, 2019
Project Introduction
Background Information
Mino is an innovative e-commerce company that is located in
Beijing, China. The company has been in existence for the last
five years. The company has employed ten workers, and it
raises revenue of $5 million per year. With the increase in
demand for company products, the company is expanding at a
very rapid rate. It is even estimated that in the next two years
the company will be able to employ about 30 employees and the
revenue generated is also expected to increase from $ 5 million
to $ 30 million. To effectively perform their tasks the company
relies on information technology because most of the
transactions are done online. The company has invested strongly
in information technology. The company has does most of its
transactions online, and it is recording an increase in the
number of users who are seeking to have access to their goods
33. and services. Therefore, there is a need to expand the business
so that it can meet the needs of the rising number of customers
who have access to the company.
The business of the Company
The company is an e-commerce oriented meaning that most of
their transactions are done over the internet. Users have to have
access to the website of the company from where they can place
their orders. Then the transactions are done online, and the
products are delivered to the customer. The company deals
mostly with electronics such as phones, tablets, televisions,
computers, and laptops. The goods are ordered and are delivered
within China in a week, but overseas delivery may take months.
Most of the transactions that the company does are based in
China, but there are a few exceptions whereby it may sell their
products overseas.
Information Systems
The organization does most of its transactions online; therefore
it should have a well-established information system. The
company uses a MySQL database because it bests serves the
needs of the organization. The MySQL database allows for the
frequent databases to be performed by the company. The
database also can handle the multiple documents, and because
the company will require many users to create their profiles,
then MySQL database will be the best. The information
systems have very many components; therefore, the system
requires regular system analysis that helps solve the problems
of the system. During system analysis, the system is split into
parts to determine how they are working to achieve the needs of
the organization. During splitting they can identify any problem
to the system and try to solve the problems ("Networking
systems,").
The computers in the organization are connected independently
to the central hub which connects them to the external network
34. via the router. The company has ten computers and printers that
are all connected through the central hub. The computer also
has a variety of computer resources that help in the network
connectivity processes. Apart from the computers, it has a
central hub, router, printers, scanners, internet cables that allow
for easier operating of the tasks in the organization.
Furthermore, the company uses a network operating software
called Microsoft NT that allows for the connection to the
internet
The human-computer interface that the organization is has on
two parts. First, the client end allows for the client to view the
product, create an account and buy products. While on the
company end it allows them to post their products over the
internet and view who have bought products. The website
design that is used by the company is the responsive design. It
allows individuals to view the best quality of images and also it
allows for transactions to be performed by the website
("Different types of website design,").
References
Different types of website design. (n.d.). Retrieved from
https://expert.services/blog/managing-your-website/custom-
website-trends/responsive-design
Networking systems. (n.d.). Retrieved from
https://www.purplezeus.com/networking-systems.html
· Week 6 Project Deliverable 3 Submission
Click the link above to submit your assignment.
Students, please view the "Submit a Clickable Rubric
Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor
Center.
35. Project Deliverable 3: Database and Programming Design
Due Week 6 and worth 150 points
This assignment consists of two (2) sections: a design document
and a revised Gantt chart or project plan. You must submit both
sections as separate files for the completion of this
assignment. Label each file name according to the section of the
assignment for which it is written. Additionally, you may create
and / or assume all necessary assumptions needed for the
completion of this assignment.
One (1) of the main functions of any business is to transform
data into information. The use of relational databases has
gained recognition as a standard for organizations and business
transactions. A quality database design makes the flow of data
seamless. The database schema is the foundation of the
relational database. The schema defines the tables, fields,
relationships, views, indexes, and other elements. The schema
should be created by envisioning the business, processes, and
workflow of the company.
Section 1: Design Document
1. Write a five to ten (5-10) page design document in which
you:
a. Create a database schema that supports the company’s
business and processes.
b. Explain and support the database schema with relevant
arguments that support the rationale for the structure. Note: The
minimum requirement for the schema should entail the tables,
fields, relationships, views, and indexes.
c. Create database tables with appropriate field-naming
conventions. Then, identify primary keys and foreign keys, and
explain how referential integrity will be achieved.
d. Normalize the database tables to third normal form (3NF).
e. Create an Entity-Relationship (E-R) Diagram through the use
of graphical tools in Microsoft Visio or an open source
alternative such as Dia. Note: The graphically depicted solution
36. is not included in the required page length but must be included
in the design document appendix.
f. Explain your rationale behind the design of your E-R
Diagram.
g. Create a Data Flow Diagram (DFD) through the use of
graphical tools in Microsoft Visio or an open source alternative
such as Dia. Note: The graphically depicted solution is not
included in the required page length but must be included in the
design document appendix.
h. Explain your rationale behind the design of your DFD.
i. Create at least two (2) sample queries that will support the
organizational reporting needs.
j. Create at least two (2) screen layouts that illustrate the
interface that organizational users will utilize.
Your assignment must follow these formatting requirements:
· This course requires use of Strayer Writing Standards (SWS).
The format is different than other Strayer University courses.
Please take a moment to review the SWS documentation for
details.
· Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
· Include charts or diagrams created in MS Visio or Dia as an
appendix of the design document. All references to these
diagrams must be included in the body of the design document.
Section 2: Revised Gantt Chart / Project Plan
Use Microsoft Project or an open source alternative, such as
Open Project, to:
2. Update the Gantt chart or project plan (summary and detail)
template, from Project Deliverable 2: Business Requirements,
with all the project tasks.
The specific course learning outcomes associated with this
37. assignment are:
· Describe the various integrative functions and processes
within the information systems area, including databases,
systems analysis, security, networking, computer infrastructure,
human computer interaction, and Web design.
· Demonstrate the ability to evaluate organizational issues with
integrative technological solutions.
· Apply integrative information technology solutions with
project management tools to solve business problems.
· Use technology and information resources to research issues in
information technology.
· Write clearly and concisely about strategic issues and
practices in the information technology domain using proper
writing mechanics and technical style conventions.
Grading for this assignment will be based on answer quality,
logic/organization of the paper, and language and writing skills,
using the following rubric found here.