Information Systems Design and Management Paper.

Information Systems Design and Management Paper.

Introduction

In system design, determining information ownership and privileges is core. When determining privilege of an entity in an organization on certain information, responsibilities and roles of that entity in that organization should be considered. The given assigned privileges should allow the entity to accomplish all its roles and responsibilities.  Information Systems Design and Management Paper.

Part 1: Identify Create, Update, and Delete Privileges

Entity

Registrar (registration department) – RD

Academic Department-AD

Lecturer – L

ORDER A CUSTOM-WRITTEN, PLAGIARISM-FREE PAPER HERE

Student (me)-S

Information Create Read Update Delete
Student ID RD AD,RD,L,S RD RD
Name RD AD,RD,L RD RD
Address RD RD RD RD
Phone number RD AD,RD,L RD RD
GPA AD AD,S AD AD
Transcript AD AD,S AD AD

Entities with create, update, and delete privileges

Personal information- RD

Transcript- AD

Entities with only view privileges

Personal information- L, S

Transcript- S

Part 2: Develop a CRUD Matrix 

The CRUD matrix(Information Systems Design and Management ) is an excellent technique to model processes and data and how theyinteract with respect to creation, reading, updating, and deleting of the data.Analysts may generalize the application of this extension to databases, information systems, or literally any information system’s object that incorporates data, processes, and how individuals may interact with those within the object. (security-conference.org, 2008)Information Systems Design and Management Paper.

Organizations need to ensure that each employee hasthe appropriate access to information, but does not have excessively powerfulaccess rights to ensure them accomplish their assigned tasks.

The CRUD matrix helps the designer in n storing data and creating processes that effectively manage and manipulate specific data.

  RD AD L S
Student ID CRUD R R R
Name CRUD R    
Address CRUD      
Phone number CRUD R R  
GPA   CRUD   R
Transcript   CRUD   R

CRUD matrix

Part 3: Write a Detail Document

Registrar Department is supposed to input student details during the time of admission and registration therefore the RD creates student details information.

Registrar Department can only update student details and delete student from school database this rule allows the RD to have Update, Read and Delete privileges.Information Systems Design and Management Paper.

Registrar Department can call the student through phone or send a letter in case of an emergency therefore the Registrar Department show have Read privilege on both mobile and address of the student.

The Academic Department can only call the student in case of an emergency there the AD should have Read privilege to accomplish that task therefore it should have the read privilege on student phone number.

The Academic Department should register a student to a course, therefore should have student ID and Name to register a student to a course.

The Academic Department should be able to produce student academic reports at the end of every semester; therefore it should have create privilege of student transcripts.

ORDER A CUSTOM-WRITTEN, PLAGIARISM-FREE PAPER HERE

The lecture should input marks of a student therefore they should be given student ID read privilege to accomplish the task.Information Systems Design and Management Paper.

The student should the able to view transcript therefore he/she should be given Read privilege of the transcript.

The academic department should update student transcript in case of a complaint by student therefore they should have update privilege of the transcript.

( Ambysoft Inc., 2014)

(scn.sap.com, 2015)

Bibliography

Ambysoft Inc. (2014, 0 0). businessRule.htm. Retrieved 8 22, 2015, from www.agilemodeling.com: http://agilemodeling.com/artifacts/businessRule.htm

scn.sap.com. (2015, 0 0). DOC-20035. Retrieved 8 22, 2015, from scn.sap.com: http://scn.sap.com/docs/DOC-20035

security-conference.org. (2008). The CRUD security Matrix. 7th Annual Security Conference (p. 7). Las Vegas: www.security-conference.org.Information Systems Design and Management Paper.