Inshore Insurance Ltd (IIL) is a financial profitable organization based in Australia with its head office in Sydney and other branches in all the other cities. The company wants to invest in an IT solution that will provide a single storage platform and provides accurate timing and location of accidents and crimes. This project has been named Location Intelligence for Policy Profile Assessment (LIPPA) Project. IIL already have some infrastructure in place that it is currently using such as web enable applications and cloud services that enable the institution to connect with brokers and customers. The main data center is located in the headquarters and all the information technology services are managed in-house.
Solution Scope
The scope of the LIPPA project is to provide a high level recommendation and analysis of the proposed IT solution. Risk Analysis Product (RAP) s assumed to provide the functional processing services required by IIL and has been hosted in the IIL main data center. The IT solution shall provide a single storage platform to accommodate the vast volume of generated and primary data from cloud and in-house sources.
The IT solution should be able to address the current challenges faced by IIL. The amount of data that the institution is handling is increasing and thus requires an application that will be able to store, manage, analyze, and archive the data. The application should also have the capacity to record the location and time when a crime and accidents occur. It should have the ability to process low transaction and high volume of data with system access only restricted to thirteen users (CIO and six other users to access report distribution and six users at the HQ). The IT solution will provide episodic localized workday.
Constraints
Data sensitivity is a very crucial aspect especially when it involves private and confidential data. Data sensitivity is one of the constraints that limits the development of the solution. As such, the project team should be able to come up with measures to ensure data sensitivity. Benefit realization plan is very important to ensure that the project adds value to the institution. Benefit realization plan is important in benefit identification, execution, and sustenance. The threat model is necessary to determine the risks and threats that the system may face and prioritize them according to the level of impact (Mehta, 2018). It also allows the project team to prioritize the risks and develop mitigation strategies. The diagram below represents the threat model:
Exclusions
The project only involves the conceptual and logical design and as such the technical requirements have been excluded. Also, the development of the software is not required at this stage.
Use Cases Actors
The following actors are involved in storage, approval, and publishing of the notices and refunds:
Design Overview Solution Architecture
The system should be able to capture the timings and locations of the incidences and crimes. It should also allow storage of large amount of data that keeps growing at a higher rate. It should also support data archiving so that the inactive data are moved to a different location to free up more space for the usable and active data (Liu, 2013). The insurance claim involves the customer reporting a crime incident or an accident and initiates a refund.
The insurance company will then have to analyze the claim and either approve it for payment or reject it (Sunusi, Aidawayati and Irmayani, 2016). The customer should be notified if the claim has been approved or if rejected, given reasons as to why. The system should be able to mirror this business process and allow generation of reports on-demand. The diagram below represents the system architecture.
project Governance Process
Project governance is a very crucial aspect in project management. This is because it allows the project team and shareholder to qualitatively and quantitatively identify risks and prioritize them according to the impact it will have. This will facilitate proper alignment of the risks to the threat model and allow for proper optimization of the mitigation strategies. The diagram below describes the project governance framework:
This framework gives enables the project team to identify the various risks associated with the project and through this critical success factors can be laid out clearly. Additionally, it enables adoption of best practices in the project and ensures that the project is compliant with all the set standards.
IT Infrastructure Solution
The IT infrastructure is the backbone to any IT solution. As such, the system architects should ensure that a proper logical design have been created before it is implemented. The process starts with conceptualization where the conceptual design or idea is out on the table. However, the conceptual design has less details and the users and other stakeholders are only given the general picture of how the final product works or looks like. Logical design is an enhanced conceptual design and gives more in-depth details of how the system operates and work. The diagram below further illustrates the logical design:
Infrastructure Security
Infrastructure security is a very crucial aspect in ensuring the security of data and other digital resources. It is a vital area that is concerned with network, systems, and assets protection. It requires different expertise and skills so as to understand how the infrastructure work, possible threats and security issues, and best practices to enforce security measures. There exist several It infrastructure security measure including firewalls, access control, antiviruses, encryption among others (Eden, 2018).
Firewall is the first line defense for a network, it analyzes the network traffic that gets into or out of the network and checks for any malicious or unwanted traffic end prevents it from getting into the company network. This ensures that any unwanted traffic that targets the company network is prevented. Another security measure is access control where the company devices password policies and access level restrictions.
This will ensure that only authorized users are able to access the system and all their activities are monitored to detect any malicious activities by the users. Additionally, having a password policy is important to allow users to create strong passwords to make it hard for attackers to guess. Encryption is a very crucial aspect because it allows the users to send information in an encoded manner and thus the cyber criminals will not be able to decode the information ensuring that privacy and integrity of the information sent is maintained (Rouse, 2018).
Application Solution
The Risk Analysis Product (RAP) can be scaled in future to add more functionalities that are relevant to the increasing requirements of the company. More functionalities can be integrated to achieve maximum benefits from the system through process automation. Users should be able to make their claims without visiting the company offices and provide enough information that can be used to assess the claim. Additionally, the system should enable the users to generate reports regarding the various aspects of the business such as financial reports, claim reports, incident and crime reports among others. The reports should provide detailed information regarding the specific function or process.
Data Solution
Data is a very critical resource to any business and therefore extreme care should be taken while handling it. It should be defined, classified, and properly structured to allow easy management and analysis. The new IT solution should be able to populate the data by categorizing the data into various identifiable categories so as to allow easy analysis, search, and retrieval. Additionally, the application should facilitate automated data archiving every five years to ensure that data that is no longer being used is moved to create more space for the active data.
Archiving data is very essential because it allows most recent information to be used in decision making and processing claims (Bojmaeh, 2015). It is recommended to archive data rather than destroying it because it can be used in future for references on cases that may arise and needs old data to arrive at a decision or a conclusion. It can also serve as evidence for the decisions made.
Capacity Requirements
The performance of the system depends on capacity requirements. The overall productivity of the system depends on various factors including hard disk capacity, RAM, processor type and speed, operating system used in clients’ computers, and network speed (Flanigan and Brouse, 2012). As such, the minimum requirements should be clearly layout to enable users take advantage of the system performance and productivity and allow them to carry out their daily responsibilities with ease.
System Interfaces
System interface is a very critical aspect in any IT solution because it dictates if the product will be accepted by users. The interface should be easy to use and uses icons and wordings that are familiar to the users. This will allow the users to carry out their tasks with minimal help from the system administrators. The interface should provide the users with options for searching, generating and printing reports, and data archiving. By giving users more select and click options over issuing commands through typing improves the productivity of the users.
Constraints and Assumptions
The IT solution will have several constraints including financial constraints, technological constraints, limited time and human resource. These are scarce resources and therefore, they should be used sparingly. The assumption made is that the IIL has the necessary infrastructure for system implementation and that the users have proficient computer knowledge.
System Object Model Sub Systems
The system will have various subsystem that will be integrated together to achieve the common goal of customer satisfaction and increasing company productivity and revenue. Some of the subsystems include finance module, claims module, sales and marketing module, data archiving module, and system administrator module. These subsystems will work together in processing customer claims. The database will be stored in the IIL data center in the head office while the backup will be hosted in the cloud. The system administrator will have access to all these subsystems in order to monitor users’ actions and troubleshoot any problems that may emerge.
Subsystem Interfaces
The system will have several interfaces including:
The system should allow several processes to collaborate for instance, when a customer makes a claim the claim manager, customer relationship manager, and the finance manager are notified. The claim manager analyzes the claim raised by the customer then the claim is approved and sent to the finance manager to make payments. If it is rejected the customer relationship manager is notified to get in touch with the customer to communicate why the claim was rejected.
Access Model
Access control system is very crucial in order to control the access to system resources. The company should come with policies and regulations such as password policies to restrict access. Additionally, it is important to implement access control measures such as two-factor authentication to ensure that only authorized users have access to the system.
Non Functional Requirements Performance Considerations
Users expect the system to process their request using the shortest time possible. As such, it is important to pay attention to system security, network connectivity, cost, hard disk capacity, RAM size, and processing speed (Shuaib, Khalil and Abdel-Hafez, 2013).
Design Constraints
There are several design constraint including usability, cost constraints, technological constraints, integration, functional requirements, and non-functional requirements (Kim, 2014).
Test Criteria
The system will undergo several test criteria including unit testing, user acceptance testing, white box testing, black box testing, integration testing, and fault tolerance testing (Spillner, 2013).
Proof of Compliance
Before the system is developed all the required compliance certificates will be acquired and it is the responsibility of all the stakeholders to ensure that the system does not infringe on users right or break any law.
References
Bojmaeh, H. (2015). Mediating role of Information System Security Awareness in the relationship between Self-Efficacy, Security Practice and Information System Security Behavior. International Journal of Science and Engineering Applications, 4(6), pp.361-365
Eden, T. (2018). IT Infrastructure Security – Techotopia.
Flanigan, D. and Brouse, P. (2012). System of Systems Requirements Capacity Allocation. Procedia Computer Science, 8, pp.112-117.
Kim, Y. (2014). Design Constraints Adopted by Industrial Design Students in the Concept Design Phase. Archives of Design Research.
Liu, X. (2013). The Framework of the System on Architectural Design Logical Thinking and its Application. Advanced Materials Research, 671-674, pp.2268-2277.
Mahmoud, A. and Williams, G. (2016). Detecting, classifying, and tracing non-functional software requirements. Requirements Engineering, 21(3), pp.357-381.
Malone, R. (2015). Protective intelligence: Applying the intelligence cycle model to threat assessment. Journal of Threat Assessment and Management, 2(1), pp.53-62.
Mehta, K. (2018). Project Management Risk Factor #2: Lack of Alignment.
Rouse, M. (2018). What is critical infrastructure security? – Definition from WhatIs.com.
Shuaib, K., Khalil, I. and Abdel-Hafez, M. (2013). Communications in Smart Grid: A Review with Performance, Reliability and Security Consideration. Journal of Networks, 8(6).
Spillner, A. (2013). Test criteria and coverage measures for software integration testing. Software Quality Journal, 4(4), pp.275-286.
Strauss, L. (2015). Management Control System Design: Conditional Interdependencies between Behavioral Constraints, Incentives and Employee Selection. MaRBLe, 2.
Sunusi, N., Aidawayati, R. and Irmayani (2016). Study of Insurance Claim using Point Process Models. Indian Journal of Science and Technology, 9(28).
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order form