Context of a systems development project

Assignment Help Computer Network Security
Reference no: EM13943542

Susan, president of MOTO, Inc., a human resources management ?rm, is re?ecting on the client management software system her organization purchased 4 years ago. At that time, the ?rm had just gone through a major growth spurt, and the mixture of automated and manual procedures that had been used to manage client accounts became unwieldy. Susan and Nancy, her IS department head, researched and selected the package that is currently used. Susan had heard about the software at a professional conference she attended, and at least initially, it worked fairly well for the ?rm. Some of their procedures had to change to ?t the package, but they expected that and were prepared for it.

Since that time, MOTO, Inc. has continued to grow, not only through an expansion of the client base, but through the acquisition of several smaller employment-related businesses. MOTO, Inc. is a much di?erent business than it was 4 years ago. Along with expanding to o?er more diversi?ed human resource management services, the ?rm's support sta? has also expanded. Susan and Nancy are particularly proud of the IS department they have built up over the years. Using strong ties with a local university, an attractive compensation package, and a good working environment, the IS department is well sta?ed with competent, innovative people, plus a steady stream of college interns keeps the department fresh and lively. One of the IS teams pioneered the use of the Internet to o?er MOTO's services to a whole new market segment, an experiment that has proven very successful.

It seems clear that a major change is needed in the client management software, and Susan has already begun to plan ?nancially to undertake such a project. This software is a central part of MOTO's operations, and Susan wants to be sure that a quality system is obtained this time. She knows that the vendor of their current system has made some revisions and additions

to its product line. There are also a number of other software vendors who o?er products that may be suitable. Some of these vendors did not exist when the purchase was made 4 years ago.

Susan is also considering Nancy's suggestion that the IS department develop a custom software application.

  1. Outline the issues that Susan should consider which would support the development of a custom software application in-house.

  2. Outline the issues that Susan should consider which would support the purchase of a software package.

  3. Within the context of a systems development project, when should the decision of "make-versus-buy" be made? How should Susan proceed? Explain your answer.

Reference no: EM13943542

Questions Cloud

Compose a two to three paragraphs explaining soap : Assume that your readers are familiar with browsing the internet, but they have no technical knowledge of how it works behind the scene
Describe the specific aims of the project : Summarize the practice issue in need of change providing background information and the perceived significance of the problem and Describe the specific aims of the project - what improved outcomes do you hope to achieve
Simple procedure to implement the graphics package : The group of classes represent a collection of graphic objects, such as circles, rectangles, lines, and points.
Calculate the value of the sending-end phase voltage vsp : Given the parameter values in TABLE A and if the magnitude of the receiving-end line voltage VRL is measured as 154 kV when feeding a balanced load of 40 MVA at a power factor of 0.9, calculate the value of the sending-end phase voltage VSP and se..
Context of a systems development project : Outline the issues that Susan should consider which would support the purchase of a software package. Within the context of a systems development project, when should the decision of "make-versus-buy" be made? How should Susan proceed? Explain your..
How are the two traditions different : Identify which features of these two traditions you saw as non-comparable. How are the two traditions different? If you had grown up in the non-Western culture, do you think you would prefer these two traditions over the ones to which you have bee..
Marlene grady and pauline monroe are partners : Marlene Grady and Pauline Monroe are partners engaged in operating The G&M Doll Shop,doll shop is located in a state that requires unemployment compensation contributions of employers of one or more individuals.
Describe one type of health inequality or inequity : Describe one type of health inequality/inequity that is seen in healthcare that also has an ethical consideration
Define the hot keys for each command button. : Create a macro group named Switchboard Macros for the command buttons. The command buttons perform these actions: open the Subcategory table, open the Item form, open the Registrant form, open the Projected Income Based on Minimum Bid report in th..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Summarize how virtualization works

Summarize how virtualization works, what it can be used for, what the security flaws are, and why the security issues associated withvirtualization might be of concern.

  Explain how outsourcing can be used for risk transference

Describe how outsourcing can be used for risk transference. Name and briefly describe two examples/cases of risk transference in Australia that you believe this type of risk management helps to protect organisations interest. How is an application ..

  Patton-fuller community hospital networking virtual

resource patton-fuller community hospital networking virtual organization or an organization you are familiar with

  Describe the features of telecommunications networks

Describe the features of telecommunications networks

  What levels of security appropriate to secure information

Determine what levels of security are appropriate to secure the information system while allowing a maximum amount of uninterrupted work flow.

  Explain how would you apply operation security opsec

network security-operation security in a corporation - word count 200how would you apply operation security opsec

  Maintain an online reflective blog

Maintain an online reflective blog/journal and write blog posts/entries based on academic articles and conduct a research of the Internet on the topics as listed at the top of this assessment detail.

  Subnet masking and designing small networks

Users on wireless or the open nodes adjacent to the concierges desk should not be able to access the hotels corporate networks and corporate network should only be able to talk to the machine room using protocols DNS, DHCP, HTTP, HTTPS and SSH.

  How system with capabilities as access control mechanism

Consider how a system with capabilities as its access control mechanism could deal with Trojan Horses.

  Genome4u is a scientific research project at a large

Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 100,000 volunteers with a goal of creating a set of publicly accessible databases wit..

  How many ways can a selection of 6 coloured balls be made

At the local school there are 12 different time periods during which 370 different classes must be scheduled. How many rooms does the school need - In how many different ways can a selection of 6 coloured balls be made from a barrel containing red..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd