Information Systems Design and Management Paper.
In system design, determining information ownership and privileges is core. When determining privilege of an entity in an organization on certain information, responsibilities and roles of that entity in that organization should be considered. The given assigned privileges should allow the entity to accomplish all its roles and responsibilities. Information Systems Design and Management Paper.
Part 1: Identify Create, Update, and Delete Privileges
Entity
Registrar (registration department) – RD
Academic Department-AD
Lecturer – L
ORDER A CUSTOM-WRITTEN, PLAGIARISM-FREE PAPER HERE
Student (me)-S
Information | Create | Read | Update | Delete |
Student ID | RD | AD,RD,L,S | RD | RD |
Name | RD | AD,RD,L | RD | RD |
Address | RD | RD | RD | RD |
Phone number | RD | AD,RD,L | RD | RD |
GPA | AD | AD,S | AD | AD |
Transcript | AD | AD,S | AD | AD |
Entities with create, update, and delete privileges
Personal information- RD
Transcript- AD
Entities with only view privileges
Personal information- L, S
Transcript- S
Part 2: Develop a CRUD Matrix
The CRUD matrix(Information Systems Design and Management ) is an excellent technique to model processes and data and how theyinteract with respect to creation, reading, updating, and deleting of the data.Analysts may generalize the application of this extension to databases, information systems, or literally any information system’s object that incorporates data, processes, and how individuals may interact with those within the object. (security-conference.org, 2008)Information Systems Design and Management Paper.
Organizations need to ensure that each employee hasthe appropriate access to information, but does not have excessively powerfulaccess rights to ensure them accomplish their assigned tasks.
The CRUD matrix helps the designer in n storing data and creating processes that effectively manage and manipulate specific data.
RD | AD | L | S | |
Student ID | CRUD | R | R | R |
Name | CRUD | R | ||
Address | CRUD | |||
Phone number | CRUD | R | R | |
GPA | CRUD | R | ||
Transcript | CRUD | R |
CRUD matrix
Part 3: Write a Detail Document
Registrar Department is supposed to input student details during the time of admission and registration therefore the RD creates student details information.
Registrar Department can only update student details and delete student from school database this rule allows the RD to have Update, Read and Delete privileges.Information Systems Design and Management Paper.
Registrar Department can call the student through phone or send a letter in case of an emergency therefore the Registrar Department show have Read privilege on both mobile and address of the student.
The Academic Department can only call the student in case of an emergency there the AD should have Read privilege to accomplish that task therefore it should have the read privilege on student phone number.
The Academic Department should register a student to a course, therefore should have student ID and Name to register a student to a course.
The Academic Department should be able to produce student academic reports at the end of every semester; therefore it should have create privilege of student transcripts.
ORDER A CUSTOM-WRITTEN, PLAGIARISM-FREE PAPER HERE
The lecture should input marks of a student therefore they should be given student ID read privilege to accomplish the task.Information Systems Design and Management Paper.
The student should the able to view transcript therefore he/she should be given Read privilege of the transcript.
The academic department should update student transcript in case of a complaint by student therefore they should have update privilege of the transcript.
( Ambysoft Inc., 2014)
(scn.sap.com, 2015)
Bibliography
Ambysoft Inc. (2014, 0 0). businessRule.htm. Retrieved 8 22, 2015, from www.agilemodeling.com: http://agilemodeling.com/artifacts/businessRule.htm
scn.sap.com. (2015, 0 0). DOC-20035. Retrieved 8 22, 2015, from scn.sap.com: http://scn.sap.com/docs/DOC-20035
security-conference.org. (2008). The CRUD security Matrix. 7th Annual Security Conference (p. 7). Las Vegas: www.security-conference.org.Information Systems Design and Management Paper.