Analyzes the implementation of the system in your plan

Assignment Help Management Information Sys
Reference no: EM131738713

Security

A large, fast-food chain unveiled a new touch screen register for its franchises. Each cashier was assigned a user id and password combination to log in to the register.

The system allowed the incorrect password to be entered four (4) times before the register would lock and require a manager to unlock it with a key card.

To prevent unauthorized access, the registers would lock after three (3) minutes if the screen was not touched. When the register locked, only the cashier who was logged in prior to it locking could unlock it without a system restart.

After a few days in operation, restaurant managers started complaining about the amount of time they were spending unlocking the registers. Some cashiers were forgetting their user Id and password, so other cashiers would log in for them.

It also seemed that the button layout made it easy for the cashiers to key in the incorrect password. The managers also complained that cashiers would leave for a break or end their shift and forget to log out of the locked register.

The managers would have to reboot the system, a three to five (3-5) minute process in order for the next cashier to log in. Additionally, managers noticed that grease was building up on the touch screens, making them less responsive.

Write a five to eight (5-8) page paper in which you:

1. Analyze the new system and determine the design issues with this new system.

2. Describe how you would correct the design issues with the system to make the restaurant managers happy.

3. Create a design plan that:

1. Lists and explains the tasks associated with improving this interface.

2. Contains at least six (6) tasks.

3. Includes realistic time estimates for each task to be completed.

4. Analyzes the development of the system in your plan.

5. Analyzes the testing of the system in your plan.

6. Analyzes the implementation of the system in your plan.

4. Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.

5. Suggest changes that could be made to the security of this system to still meet security objectives but make the system more usable.

6. Use Microsoft Visio or an open source alternative, Dia, to create a graphical representation of your proposed interface. Note: The graphically depicted solution is not included in the required page length.

7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

· Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

· Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.

Reference no: EM131738713

Questions Cloud

Identify the financial ratios : As a lending agency, what criteria using the 3 c's of lending would you use to determine how much to grant, to whom, and under what conditions?
Minimize the cost of holding inventory : The objective of inventory management is to minimize the cost of holding inventory.
Explain one of the main themes of shakespeares hamlet : This activity assesses your ability to rephrase and explain one of the main themes of Shakespeare's Hamlet: political decay.
Which of the points should kevin consider most important : When devising goals for his team to achieve, which of the following points should Kevin consider most important
Analyzes the implementation of the system in your plan : Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.
Throwback regarding the hawthorne effect : View this interesting throwback regarding the Hawthorne Effect.
Analyze the crime and compare at least two theories : How would Islamic Law treat the crime versus mentioned justice system where the crime occurred? Analyze the crime and compare at least 2 theories.
Identify the vector-borne disease : Identify the vector-borne disease - Explain in detail the factors contributing to global warming - Describe the effect of global warming on the incidence
Develop a high-level use case to represent the application : Develop an E-R diagram, class diagram, or a data flow diagram that effectively represents the data that are required for your application or system.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Reinforce ongoing monitoring activities

Develop the following tools to reinforce ongoing monitoring activities

  Identify the job you would like to hold in the organization

Identify the job you would like to hold in that organization and write about 300 words to persuade the CEO that you really want this job by providing evidence o

  Small businesses versus large businesses

Show the technological advances for small businesses versus that of large businesses?

  Investigate examples of software failure and see if you can

investigate examples of software failure and see if you can discern any trends. is the failure-rate getting better or

  How effectively customer relationship management contributes

To find out how effectively Customer Relationship Management contributes to ecommerce with the applications of information technology.

  Identify how the adoption of standard and creation of policy

Explain how the information security professional can ensure that there is adequate consideration and approval for diverging from common practice in situations where that is necessary.

  Create a competitive advantage through inventory management

Discuss how information technology can help to create a competitive advantage through inventory management.

  Data management issueswhat are some of the issues inherent

data management issueswhat are some of the issues inherent in managing data? what methods may be used to identify data

  Student query - information systems

Student query: Information Systems - Briefly describe your company and Would you recommend highly centralized, loosely centralized, non-centralized information

  What is penetration testing

What is penetration testing? Why is it performed? When should it be performed?

  What is the difference between a project risk and an issue

Define the difference between Business Process Re-engineering (BPR) and Business Process Management (BPM) concepts. What are the advantages and disadvantages of BPM? How do "value chain" principles apply to BPR and BPM? Why should an IT manager kn..

  Describe the examinations performed on the items submitted

Forensic evidence reports follow a standard format, with specific content, to describe the examinations performed on the items submitted for analysis.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd