Assignment title: Information
(no subject) A Aminu Muazu to me, Aminu 6 hours agoDetails Details of Coursework Coursework 1: Assignment [50%] This is a group coursework assignment. You are required to work as a team to complete the required tasks to the specified requirements. It will be necessary to hold group meetings outside of your weekly timetabled sessions. You are required to keep brief minutes of these meetings (use the given meetings log) showing the progress of the work and the task allocation among the different group members. These minutes should be attached as an appendix to your final report. At the end of the assignment you are required to carry out a self and peer assessment using the templates below. Task 1: Input, Processing and Output (Sales Order Form) Think about the experience, either as a customer or as a salesperson, of completing a sales order. You may have purchased or sold anything ranging from a mobile phone to car. This sales order, upon completion will be entered into a sales order processing system. List what types of information might be included in the sales order. [Hint: think of all the questions that need answering to complete a sales order form]. What processing might be performed on this input data? You need to identify a minimum of six processes. Think about what outputs need to be produced and any management reports /statistics that could be generated from the processing to assist management decision making and problem solving. What are the likely outputs? You need identify a minimum of six outputs. What use are the outputs, and for whom? Your answer should be as full as possible. Please do not simply provide lists of the respective data, activities and information for this application process but offer explanations for each inclusion in your lists. Task 2: Entity Relationship Diagram In data planning and database design, end users must identify key data elements that are needed in order to perform specific business activities. This frequently involves developing entity relationship diagrams (ERDs) that model the relationships among the many entities involved in business processes. Read the following narrative description of a business process: A university employs the services of external moderators to, amongst other things; check the quality of the assessment regimes used by the university to test its students. An external moderator can offer his or her services at many different universities. An external moderator will typically be assigned a number of assessment regimes. Any one assessment regime can only be moderated by a single external moderator. An assessment regime will consist of a number of different coursework. A coursework can only be used on a specific assessment regime. Students complete a number of pieces of coursework. Any coursework is typically given out to many students. Using the ERD notation produce an ERD model of the narrative described above. Task 3: Human Resources (HR) Management Information System A Management Information System (MIS) summarises data and prepares reports for middle, tactical management. Its strength lies in dealing with, and supporting, routine structured decisions. Consider Human Resources Management Information Systems (HRMIS). Give a detailed description of the workings of a HRMIS. In order to do this you must answer the following: What is the objective of such a MIS? What type of management decisions will such an IS support? What are the sources of, and types of, data that will be input to such a system? What outputs are produced? Your answer should be as full as possible and approximately between 1000-1500 words in length. Make use of diagrams to show the workings of the MIS and also how it relates to other types of information systems, e.g. a Transaction Processing System and Executive Information Systems. You must cite all sources for the information you use, i.e. list ALL references Task 4: Unauthorised access to computer and information systems One of the most common security threats is unauthorised access to computer systems, or hacking. Individuals, who illegally access systems may do so to destroy, alter or steal data, whether passwords, credit card numbers or confidential information. Using a suitable search engine, try to find a recent real life case of computer hacking. Complete the following tasks:- Write 500 words (approx.) summarising the case in your own words. Your summary should include details on the hacker(s) and their motives, how the hack was carried out, the organisation whose computer system was hacked into and the damage caused, if any. State what the Computer Misuse Act, 1990 is and how it applies to the case you have found, above. Identify three physical, software, electronic or managerial solutions that the organisation, in the case you have found above, could have implemented in order to safeguard their computer / information system. Your answer should be as full as possible and approximately 1000-1500 words in length. You must cite all sources for the information you use, i.e. list ALL references. These should be wide ranging, including Books, Journals and Websites. Your submission should include the following: Ø A cover sheet, with the title of the module, the day/time of your lab, the name of your lab tutor, the names and student Ids of all group members. Ø Task 1: Input, Processing and Output (Sales Order Form) Ø Task 2: Entity Relationship Diagram (ERD) Ø Task 3: Human Resources (HR) Management Information System Ø Task 4: Unauthorised access to computer and information systems Ø References Ø The meetings log Ø Completed self assessment template (see below) Ø Completed peer assessment template for each group member (see below) NOTE: It is essential that you use a software package such as SmartDraw, MS Word, or similar to present your work, including the Entity Relationship Diagram (ERD) for Task 2. Marking Guidelines Diagrams should be neat and clear. It is compulsory that you use the appropriate software to produce your ERD (e.g. SmartDraw, MS Word, etc.) and word processing software (e.g. Word, WordPerfect) to produce the remainder of the coursework submission. Marks will be awarded for: (%) Presentation · Well structured submission with appropriate sections · Spelling and grammar · Word processed work and diagram completed using appropriate software package 8 Task1: Input, Processing and Output (Sales Order Form) · Identification of inputs pertaining to the sales order form · Sensible set of process activities identified (min. 6) · Sensible list of output identified (min. 6) Explanations offered for each inclusion in your input, processing and output lists 23 Task 2: Entity Relationship Diagram (ERD) · Identification of Entities, Relationships and Cardinality · Resolution of many : many relationships · Logical correctness · Completeness: all entities pertaining to the system described in the case study should be represented · Optional / Mandatory relationships stated 23 Task 3: Human Resources (HR) Management Information Systems State the principle objective of a Human Resources MIS List at least four types of management decisions that a Human Resources IS supports Identify at least four sources of data that will be input into a Human Resources MIS Identify the major, at least four, outputs produced by such a MIS 23 Task 4: Unauthorised access to computer and information systems Finding a suitable real life case of computer hacking Giving a detailed summary of the case facts Giving a detailed account of the criminal activities defined under the Computer Misuse Act, 1990 (CMA, 1990) Applying the CMA, 1990 to the case facts of the real life case Identifying and explaining, how each of the three security measures identified, could have safeguarded the organisation in the case study from the attack inflicted by the hackers. Extra marks for how well the task is researched, citing a wide variety of sources. 23 Total 100 NOTE: All references, including on-line sources, must be clearly listed.