Verified Document

Information Technology IT Solutions Case Study

Security

L

There is not much security risk in this approach to the problem. Beautician scheduling is not regarded as a high risk activity.

Data Quality

L

Names and time are all that are really needed in this software. As long as that quality is fine, there are no problems with this area.

Authentication

L

Once again the lack of a need for high security denotes the lack of importance of this area. Authentication is not that important since the scheduling software is more like a common good to be used by all.

Encryption

L

Only basic encryption is needed in a software application such as this. There is no reasonable excuse for any hacker to break into this system.

Cloud Computing

H

Since this software is compatible with the cloud, it is very important that this quality is addressed. Myra's requirements do not seem to call for large computer...

Since the problem of Myra's business is deeply rooted in communication issues, it is important that any solution is dedicated to this principle or area.
Database, Data Warehouse, Data Mining

M

Database capabilities may become important down the line, but at this stage of Myra's business it is relegated to medium importance. Perhaps if her business grows, the need for more big data may be increased as well.

Business Intelligence

n/a

Transaction Processing

n/a

Decision Support

M

Executive Information

M

Business-to-Business eCommerce

n/a

Business-to-Consumer eCommerce

n/a

Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now