Question:
Case Study on Monash Video Library.
Monash Video Library purchases video cassettes and loans them to the customers with an aim to make profit out of the same. The library was started at one location and a old PC package is used till date to manage all of the information. The business has now expanded to three more locations and each of them uses a standalone copy of the software.
The primary goals of the system and the business are to have a developed and an updated information system in place which would allow the management of loans in a simpler manner and would also provide enhanced features to have better customer experience.
The primary business objectives are to have increased loans to have maximum profits along with the simultaneous management of the database and improved delivery experience.
The current system makes use of an old PC package and the other three business locations also use a standalone copy of the system.
The current system is not proficient enough to manage, monitor and track all the information in an accurate manner. The database is also not centralized leading to increased probability of risks and attacks.
There are innovative, better and automated systems that are available which are far superior in function and operation as compared to the current system used in terms of speed, reliability and accessibility.
With a new and updated information system in place, it would be possible to showcase the product catalogue, reserve the choice made by the customer, and manage the suppliers in a better way, easy tracking and auditing.
It is necessary to gather data from all the probable resources and also to analyze the same in an accurate manner.
These techniques give a depiction of the sensible stream of information through a business procedure. They don’t as a matter of course give insights about how choices are made or how undertakings are picked amid the procedure execution.
Logical Process Model: Function Hierarchy Diagram
To plan an application to give ideal advantages, the draftsman, fashioner and software engineers should altogether comprehend the information and procedures required. An amazing approach to pick up this comprehension also, get ready to execute programming is to deliberately and totally demonstrate business forms and the applicable information. Business forms speak to the stream of information through a progression of undertakings that are intended to bring about particular business results. This article surveys the ideas of business procedures and consistent procedure displaying. It is a helpful spot to begin understanding the ideas of business procedures and the advantages of displaying procedures and also information.
Data Modeling is a process which is used to represent the business and the insides of the same with the help of a framework or a model. It represents the various entities that are involved in the system.
The following Entity-Relationship (ER) diagram shows the several entities that would be involved in the new system to be designed for Monash Video Library. The five prime entities involved would be:
E-R Diagram
It is the process to predict and judge the viability of the system. The opportunities that have been suggested for the Monash Video Library are analyzed on different parameters as discussed below:
The suggested system would have an integrated solution to the required specifications with a centralized database server. These would be implemented on the latest hardware options and would be technically feasible in nature.
The cost and budget associated with the new system would revolve around the cost of the machine, development and testing cost along with the cost of the database and the network. It would come under the specified budget.
Data protection and information security along with adherence to the legal policies are the basic requirements that are expected to be fulfilled by the new system. The same would be implemented with the help of risk mitigation systems in place.
The business needs and the objectives can be rightfully fulfilled with the proposed solution and would be successful in the design and development.
The timeline that has been designed for the project is under the defined schedule and all the activities would be fulfilled according to the same.
Functional Requirements
The solution that has been proposed comprises of three sub-systems as:
The three locations that the business is expanded in to can have the access to the database from a centralized file server. The centralized file server will allow the ease of managing the data from one single point and will also be easier in the management of the same.
Data protection and information security are the prime issues that emerge.
The first and the foremost issue that comes up in the case of threat to the security to the information is data breach. It occurs when the data is maliciously monitored or captured and is then used to perform a unethical or misleading activity. Next in the list is the data loss. There will be a lot many instances when the data would be sent over from a source to destination over the network. The data may be lost in between by unauthorized means. It is also possible if the resource at the destination end loses the key to decrypt the data. Another serious concern in the list is that related to the hacked interfaces and Application Programming Interfaces (APIs). These interfaces open the path for an intruder to enter in the system and gain unauthorized access to the same. Sharing of resources is a common practice in case of such scenarios. The shared access allows the increased possibility of attacks and may also result in unwanted sharing of information. Some of the other issues that may come up during the implementation could be account hijacking, denial of service, distributed denial of service and inadequate due diligence. There are also a number of malicious programs that are present which may attack the system and perform malicious activities. Programs such as viruses, worms, Trojan horses and logic bombs can have devastating effect on the system as far as data protection and information security are concerned.
References
1keydata,. (2016). Retrieved 25 May 2016,
(2016). Sans.org. Retrieved 25 May 2016,
Anne Marie Smith, P. & View all posts Anne Marie Smith, P. (2000). Business Processes and Logical Process Modeling – An Overview.
Data Gathering and Analysis. (2016). Hr.od.nih.gov. Retrieved 25 May 2016,
Differentiating between Functional and Nonfunctional Requirements. (2016). SearchSoftwareQuality. Retrieved 25 May 2016,
Feasibility Study An Important aspect of Project Management | Simplilearn. (2016). Simplilearn.com. Retrieved 25 May 2016,
The Elements of a Good Feasibility Study. (2016). Project Smart. Retrieved 25 May 2016,
The Top 10 Information Security Risks for 2015 – BerryDunn. (2014). Berrydunn.com. Retrieved 25 May 2016.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download