Solved by verified expert:Law, Ethics, and Security Plan and Database Management System
In Module Nine, you will submit the legal and ethical considerations relative to the database and include a security plan that addresses the legal and ethical
considerations. Articulate the relevant legal and ethical standards that need to be considered in your solution design and in future implementation. Determine
the best practices in design, data use, and storage to ensure legal compliance. The regulations in place and the best practices for aligning operations will likely
change depending on the type of industry in which your company resides. Support your conclusions with research support. Determine best practices in design,
data use, and storage to ensure ethical operation of your company. These best practices will likely change depending on the industry in which your company
resides. Support your conclusions with research support. In consideration of the type of organization you selected, the data used, and your consideration of legal
and ethical standards, discuss the security needs of your DBMS solution. Considering the group/department for which you constructed your enterprise data
model (Milestone Four), discuss the differences in security needs at this level in comparison with those of the company as a whole. Given the comparisons and
discussions above, recommend a comprehensive but high-level (pertaining to the solution as a whole rather than the particular department) security
management plan for your design that will align to organizational needs.
You will submit this law, ethics and security plan as part of your completed database management system. Please use 12-point Times New Roman font, double spacing, and one-inch margins. Citations should be formatted according to APA style.
2_1grandfieldcollegescenariotodoactivity__1_.docx
milestone_four_database_data_model.docx
milestoneoneanalysisoforganizationforgrandfieldcollege.docx
milestonetwodatabase_design_models_grandfieldcollege.docx
milestone_three_dbms_research_and_recommendation.docx
Unformatted Attachment Preview
Running head: 2-1 SCENARIO ACTIVITY: GATHERING INFORMATION
2-1 Scenario Activity: Gathering Information
Shakira Baez
Southern New Hampshire University
Principles of Database Design
IT-650
Prof. Bindu George
September 15, 2017
1
2-1 SCENARIO ACTIVITY: GATHERING INFORMATION
2
2-1 Scenario Activity: Gathering Information
Databases enhances users’ ability to navigate through institutional activities and data
stored on all machines connected to its network. Therefore, Granfield needs to structure their
databases to track their network, computers, software licensing and updates, monitor users and
prevent confidential information getting into the wrong hands (Hernandez, 2013). The college
also needs the database to track its faculty, staff computers and monitor software to safeguard
data and effectively prevent the misuse of this data or the data falling into the wrong hands. That
is why creating a database system that runs effectively is important, as in doing so, it will allow
for the organization to efficiently store, organize, and manage large amount of information
within a software application, while increasing the efficiency of the college operations, and cost
(Aveda, 2015).
To do List:
Based on the information given regarding Granfield College, it is clear their software
management system solely holds spreadsheets designed to offer an explanation on how the
institution centralizes its software management (Conger, 2014). Their current system raises some
security concerns, such as loopholes within the system that can lead to lack of integrity of the
input, output, and maintenance of the spreadsheets that house the data, which lead to the
development of the following questions:
•
Why is the software displayed does not show where it originated from, is that
information accessible, if so how?
•
Why is access granted to the software but access to the system is no done
simultaneously?
2-1 SCENARIO ACTIVITY: GATHERING INFORMATION
•
3
Is there a system in place to track the amount of times a software, or data is
copied to a computer? Why is this information not checked?
•
Is the information on the spreadsheets interface stored for future reference? If so,
where is it stored, and who has access to the information?
•
Are there any restrictions to the certain software, if so, what are the guidelines for
such restrictions, who controls this document, and who has access to this
information?
•
How are unwanted request handled? If there a process in place?
•
What happens to the request that are not recorded?
•
How does the system notify management that an upgrade is needed?
An effective system is a combination of various components including information from
stakeholders as these individuals from the database system. These stakeholders include:
•
The platforms where the software runs
•
The company who owns the software
•
The software users
•
The software management team
•
The software licensing companies
Interview with Stakeholders and Instructors
The purpose of the meeting with stakeholders and instructors will offer a better since of
what components are necessary to manage the database more efficiently, it will also allow them
to understand the new changes that will be implemented in the new database.
There will need to be a meeting with the licensing companies to inform them of the new system,
and what our expectations are from them, we also need to discuss management of software key,
2-1 SCENARIO ACTIVITY: GATHERING INFORMATION
4
software expiration, and payment of their services, as this is a new system with new regulations.
The same type of meeting will need to occur with the software companies, as they play an
important role in the database system, in areas such as software features, usage, and copying
rights, if we want the new database to succeed we need to make sure we have clear
communication with all our stakeholders.
Furthermore, in the meeting with the instructors we will discuss the loopholes found
during the investigation that was perform on the current database system, we will also need to
discuss security concerns, and the measures we will take to discuss these issues in the new
system. For example, there needs to be a security system in place to discuss some of the security
issues, regular upgrades to the system need to be in place, and they need to be checked by a
specialist in this field, these types of changes will give Granfield the security and efficiency they
are looking from a database system.
Questionnaire for Faculty
The purpose of the questionnaire is to serve as a baseline of what the staff and faculty
expect to obtain from the new database system, it provides brief information on staff, and their
views on the current process, it also allows them to anonymously leave feedback, which is very
important for the success of the new database. Once feedback is received, that information will
be used when creating the new database, and all issues or concerns listed on the questionnaire
will be addressed to the best of the database capabilities.
Questions
Please take your valuable time and fill in the following questionnaire
1. What is your gender?
•
Male
Female
2-1 SCENARIO ACTIVITY: GATHERING INFORMATION
2. What is your age?
•
15-20 years
•
21-25 years
•
25-30 years
3. What is your highest level of education?
•
College certificate
•
Bachelor’s Degree
•
Master’s
•
PhD
4. Are you familiar with this software?
•
Yes
No
5. If YES, how often do you use it?
•
Very Often
•
Often
•
Once in a While
6. How effective is the service provided?
•
Very Good
•
Good
•
Bad
7. What is the service most used for?
______________________________________________________
______________________________________________________
5
2-1 SCENARIO ACTIVITY: GATHERING INFORMATION
______________________________________________________
8. List any changes you would like to see in the request process:
______________________________________________________
______________________________________________________
______________________________________________________
_______________________________________________________
______________________________________________________
9. What do you like about the current request process?
______________________________________________________
______________________________________________________
______________________________________________________
_______________________________________________________
10. Is the payment system in the software favorable for the services accessed?
Yes
No
11. How do you rate the services?
•
Very Good
•
Good
•
Bad
6
2-1 SCENARIO ACTIVITY: GATHERING INFORMATION
7
Report Review
When looking at the job shadowing report there seems to be a need for a system upgrade
or in this case for creating a new database system that works effectively to meet the college
needs. The current system leaves a significant amount of room for errors, security breaches, and
software misuse, but by implementing a new system most of the issues that the staff and faculty
mentions will be resolved, and there will be noticeable improvements on the turnaround time for
all requests that enter the new system. There will need to be changes to the business
requirements, and stricter rules surrounding Granfield software are going to be necessary, but
this will only make the new system stronger and more efficient.
2-1 SCENARIO ACTIVITY: GATHERING INFORMATION
References
Aveda, S. (2015). What is the importance of a database management system? Retrieved from
https://www.linkedin.com/pulse/what-importance-database-management-system-scottaveda
Conger, S. (2014). Hands-On Database (2nd ed.). [MBS Direct].
https://doi.org/https://mbsdirect.vitalsource.com/#/books/9780133927078/
Hernandez, M. J. (2013). Database Design for Mere Mortals (3rd ed.). [[MBS Direct]].
https://doi.org/https://mbsdirect.vitalsource.com/#/books/9780133122275/
8
Running head: MILESTONE FOUR: DATABASE DATA MODEL
Milestone Four: Database Data Model
Shakira Baez
Southern New Hampshire University
Principles of Database Design
IT-650
Prof. Bindu George
October 18, 2017
1
MILESTONE FOUR: DATABASE DATA MODEL
2
Milestone Four: Database Data Model
Data Modeling for the Finance Department at Grandfield College
The study will work with the finance department at Grandfield College to develop and
illustrate a compressive enterprise data model.
Data Model
It organizes elements of data and ensure that they relate to one another with entities in the
real world. For every database to be created there is a need that a data model is created listing all
operation and rules for a reliable system. Formally the basic inputs in data modelling are entities,
operations, attributes, relations and Tables. The study will review all the requirements in the
Finance department. (Blaha, 2017)
Administration
•
Able to view available students list.
•
Able to search available student list.
•
Able to update student list.
•
Able to make requests for student details.
•
Able to track student fee status.
•
Able to track student fee balance.
•
Able to clear a student after his/her full cause.
•
Able to classify students by cause and tag the respective fee payment.
Student
•
Able to make requests for the fee balance
•
Able to make requests for the fee structure.
MILESTONE FOUR: DATABASE DATA MODEL
Lecturers and Other Staff Members
•
Able to view list of approve students to take a course.
Entities and Attributes and The Relations That Exist Between Them.
Entities
•
Students.
•
Administration.
•
Staff.
Attributes
•
Key for student accounts.
•
Key for student details.
•
Key for student list.
Relations.
•
Administration to students-one to many relationship.
•
Administration to staff-one to many relationship.
•
Staff to students-many to many relationship.
•
Student to student-one to one relationship.
3
MILESTONE FOUR: DATABASE DATA MODEL
Table
•
Student account table.
Illustration of key entities
The diagram to illustrate the different operations in a data model (Kendle, 2017).
4
MILESTONE FOUR: DATABASE DATA MODEL
5
CONCEPTUAL DATA MODEL
(Visual-paradigm.com, 1999 – 2017)
Staff
Administrator
ID
manages
ID
First Name
Last Name
Name
Privilege Level
manages
Computer ID
License type
License number
Student
Makes inquiries
ID
Requests information
First Name
Last Name
Student personal information
Student condition
Browses student information
Privilege level
MILESTONE FOUR: DATABASE DATA MODEL
A Class Diagram with Enterprise Architect
After coming up with a proper data model, the next step is to implement it in a database
management system to enable users to manage a large amount of data within an application.
With the proper DBMS in place, institutions such as Grandfield college will achieve
efficiency in handling multiple data types, some of which is easily manageable, such as
student records, fee structure information, and courses, while, some systems are much more
complex to meet its user’s needs (Aveda, 2015, para. 2).
6
MILESTONE FOUR: DATABASE DATA MODEL
Some of known DBMS according to (Panwar, 2011) include:
•
Relational databases management system
•
Hierarchical databases management system
•
Network databases management system
•
Object-oriented databases management system
7
MILESTONE FOUR: DATABASE DATA MODEL
References
Blaha, M. (2017). Enterprise Data Modeling. Dataversity: http://www.dataversity.net/last-blogdata-modeling-sql-uml
Kendle, N. (2017). The Enterprise Data Model. TDAN.com: http://tdan.com/the-enterprise-datamodel/5205
L., Reese, E. and Stupay, R. (2017). Learn about class diagrams @OpenClassrooms.
OpenClassrooms: https://openclassrooms.com/courses/design-a-database-with-uml1/primary-keys
Panwar, A. (2011). Types of Database Management Systems. Retrieved from http://www.csharpcorner.com/UploadFile/65fc13/types-of-database-management-systems/
8
Running head: MILESTONE ONE: ANALYSIS OF ORGANIZATION FOR
Milestone One: Analysis of Organization for Grandfield College
Shakira Baez
Southern New Hampshire University
Principles of Database Design
IT-650
Prof. Bindu George
September 15, 2017
1
MILESTONE ONE: ANALYSIS OF ORGANIZATION FOR
2
Milestone One: Analysis of Organization for Grandfield College
Background History
The law requires that any business, including a school, track its software, know what
software the school owns, in what versions, and what the license agreement for that software is
available (Conger, 2014). There are several different licensing schemes, once of is the least
restrictive, is a “site” license that allows an institution to have a copy of the software on any
machine on the business property, while the other licenses specify a certain number of active
copies for an institution (Conger, 2014). Despite the type of license, the software poses it is
important to know which software is installed on which machine, where that machine is found,
and which users have access to that machine, and it is also important to track when the software
is uninstalled from a machine, and when a machine is retired (Conger, 2014).
Therefore, Grandfield will need to perform an organization analysis that will enable the
school to evaluate external, and internal factors that affect the college performance, especially in
the software, hardware, and licenses management (Keefer, 2017). This analysis will allow
Grandfield to assess its resources, and evaluate its strengths, weaknesses, and threats (Keefer,
2017), which will enable them to make the necessary changes to its current system so that it can
be a more synchronize system that correlates with the organizations business practice.
Additionally, the analysis will offer a summary of the problem/challenge, business requirements,
and limitations of current system based on the information obtained through the evaluation of the
current tracking process, which was evaluated during the interviews, and through the
questionnaires that were completed by the stakeholders defined in the software tracking system
(Conger, 2014).
MILESTONE ONE: ANALYSIS OF ORGANIZATION FOR
3
Business Requirements
Business requirements are an important part of a project, as it allows for the stakeholders,
project team, and other members of the organization to understand the importance of the project
(Parker, 2012). With the creation of the business requirements for this project Grandfield will be
able to gather and process data successfully, which will ensure that the new database system is
functions in a manner that is effective for their business. Based on the reading and
documentation offered about Grandfield, there are three business requirements, that were found
during the examination of current system, and the investigation conducted for the new database,
these business requirements are:
•
Administration Department
•
IT department
•
Faculty and Staff
The administration department falls under business requirements because their jobs
responsibilities mandates them to need full access to the new tracking system, as this will allow
them to create, support, and change the reports they use on their day-to-day activities, and they
are the owner of that system. Since Administration is the system owner they need the following
permissions:
•
Full access without restrictions to make any modification to the software request
including version upgrades
•
Full access without restrictions to all information about the different licenses, license
versions if applicable, their effective and expiration date
•
Full access without restrictions to all information about installations or removable of
software in the college and their locations
MILESTONE ONE: ANALYSIS OF ORGANIZATION FOR
•
4
Full access without restrictions of the list of faculties, staff, students, or any individual
with access to the computers, and software, and full access to those who do not, and any
documentation to support the acceptance or denial
While the IT Department handles solving any issues with the installation, upgrades, and
system, therefore they need access to view everything that the administration department can
view, plus they need full access to all the software owned by the college, their locations, access
to install or remove software, license access and license documentation, also they need full
access to the college operating system without restrictions. Whereas, faculty and staff will need
permissions to certain software, depending on their needs, their permissions will be on an
individual basis and each access granted will need to be reviewed before approving it, please
note that all request will need to be done with the request form, no other type of method will be
accepted.
Limitations of Current System
The current soft tracking system at Granfield college lacks the requirements set by laws that
every college should follow, it lacks security and authentication since the tracking system
constitutes of four different spreadsheets kept at separate location, by different departments, who
lack synchronization within their business requirements, which causes duplication of data.
Additionally, the current system lacks speed, adequate file transfer, and the ability to perform
two tasks simultaneously, as this can reduce the speed in which a task is completed.
Furthermore, in the example of the list of who has what software, the Assigned User is missing
for some of the entries, which is important because by law the college needs to have correct, and
precise information, which they now do not have, nor do they have the capabilities to produce
this information. Another issue is the significant amount of manual labor that this current system
MILESTONE ONE: ANALYSIS OF ORGANIZATION FOR
5
needs, which leads the system open to errors, discrepancy, duplications, and lack of correct data
entering the system.
Departments and Operations
Currently, departments create a report that goes to administration for their software needs
for that day, instead of using emails, each department should have generated a validated report,
meaning a report that is generated by the computer based on the stakeholders’ needs, not one that
is created on an Excel spreadsheet. By law, any business, including a school are needing tracking
its software, know what software the school owns, in what versions, and what the license
agreement for that software is available (Conger, 2014), if the college creates a validated report,
it would suffice the laws and regulations which they need to follow. The report will be available
to the IT department, and the Administration department so that they can supply users with their
request, and this will enable uploads, download, and tracking of the software/ computers to be
performed in a more effective manner, with the new system this type of service will be the norm.
MILESTONE ONE: ANALYSIS OF ORGANIZATION FOR
References
Conger, S. (2014). Hands-On Database (2nd ed.). [MBS Direct].
https://doi.org/https://mbsdirect.vitalsource.com/#/books/9780133927078/
Keefer, A. (2017). Characteristics of Organizational Analysis. Retrieved from
http://smallbusiness.chron.com/characteristics-organizational-analysis-38352.html
Parker, J. (2012). Business Requirements vs. Functional Requirements. Retrieved from
6
Running head: MILESTONE TWO: DATABASE ANALYSIS AND DESIGN
Milestone Two: Database Analysis and Design
Shakira Baez
Southern New Hampshire University
Principles of Database Design
IT-650
Prof. Bindu George
September 26, 2017
1
MILESTONE TWO: DATABASE ANALYSIS AND DESIGN
2
Milestone Two: Database Analysis and Design
Conceptual model
CONCEPTUAL DATA MODEL
(Visual-paradig …
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more