Verified Document

Designing A Database For Double Blind Study

Wild Wood Apartments needs a database that is more efficient in its reporting of leasing, maintenance, and repairs from individual apartment managers to the central headquarters for review and approval. This database needs to be easy to use and accessible for apartment managers and have two basic sections, based on leasing and maintenance needs. Apartment managers can then input all requests, reports, and financial data into the system as it occurs, rather than filing monthly reports. Issues with Current System

The current system has a number of issues. First and foremost, it requires individual apartment managers to manually fill out forms quarterly that includes any new or changes to rentals in his or her building, as well as reports regarding repairs and maintenance. This means that money spent on maintenance is not repaid until the end of the quarter, which can be frustrating for managers. Moreover, the forms are bulky and difficult to fill out for each and every incident at the end of the quarter. The database will increase the efficiency by storing certain apartment and leasing information, making it easier for managers to pull up what is already stored and then adding information as it occurs, rather than waiting till the end of the quarter to be bogged down by paperwork. The database will also help streamline the process so that individual managers are not overwhelmed with making decisions about certain events, as they are immediately uploaded to the headquarters for review.

Database Requirements for Stakeholders

The first group of stakeholders is the apartment managers. These are the individuals that hold the responsibility of making the reports quarterly and dealing with the tenants on a daily basis. Managers will need an easy to use spreadsheet system that can store rental and unit information, so that information on certain units can easily be pulled up without the manager having to re-input information...

Parts of this document are hidden

View Full Document
svg-one

Moreover, they will need a database that is easily accessible using a broadband internet connection, so that they can add notes and other information while they are on location at certain units using their smart phone or tablet. This will help reduce confusion and make sure that all information that is needed is inputted immediately. The format of the database will need two sections, one for leasing and one for maintenance and repairs. The leasing section will need to notify managers in the event certain tenants are late with their rent, which will also be automatically tracked by the home office. They will need to have sections for unit information, notes, and approvals from the head office.
The next major stakeholders that will require access to the database are the employees at the home office. These administrative employees are responsible for reviewing leasing and maintenance reports in order to approve certain actions that would allow managers to contact outside contractors to fix issues within units or prompt a notice of late rent to tenants who are late on their rent. They need to be immediately notified when a new leasing or maintenance event is logged by a manager so that they can approve it and set a budget for the potential repairs. This will streamline the system and make it easier for the home office to track certain events that can later be reviewed for both manager performance and location conditions.

Business Rules

Essentially, business rules "are rules about how the data are captured and used and what limits or constraints are placed on the data" (Cogner 51). Here, the primary business rules are that all interview data of the managers be handled by the IT department so that the can best design a database that will make it as easy as possible for managers to use. Interviews should not be passed around the home office, as it may instill bias against…

Sources used in this document:
References

Cogner, Steve. (2012). Hands on Database. Prentice Hall.
Cite this Document:
Copy Bibliography Citation

Related Documents

Database Security
Words: 2424 Length: 9 Document Type: Term Paper

Database Security The focus of this study is that of database security. Databases and database technology are such that play critical roles in the use of computers whether it be in business, electronic commerce, engineering, medicine, genetics, law, education or other such entities requiring the use of computer technology. A database is quite simply a collection of data that is related such as a database containing customer information, supplier information, employee

Database Security Plan and Requirements Definition for
Words: 2108 Length: 8 Document Type: Research Paper

Database Security Plan and Requirements Definition for a University Department The database security plan and requirements definition were developed. The plan included, at the outset, the inclusion of major stakeholder at the University and described their roles in initiating, implementing, and maintaining the plan. Individuals responsible for daily and other periodic tasks were developed. A major consideration in planning the security was the policy that governs granting of access. The need-to-know,

Database Security Design of an
Words: 2976 Length: 11 Document Type: Term Paper

With optimistic concurrency control, the database checks resources to determine if any conflicts have occurred only when attempting to change data. If a conflict occurs, the application must read the data and attempt the change again. Pessimistic concurrency, on the other hand, control locks resources as they are required, for the duration of a transaction. Unless deadlocks occur, a transaction is assured of successful completion 5.5 Audit Tracking Although auditing does

Database Security and SQL Injection
Words: 364 Length: 1 Document Type: Research Proposal

Database designers and administrators can work concomitantly with it professionals and researchers to implement the security measures necessary to mitigate risks to data. I have been a database user at my company for a number of years. As such, I am allowed access from only a limited number of locations; one static connection at home, one at work, and one laptop connection that I carry with me when traveling. Each

Database Security Over the Last
Words: 904 Length: 2 Document Type: Article Review

Strengths vs. Weaknesses The article 2007 Survey on Database Security; highlights the most pressing issues that could be facing an organization (someone from within who could have access to the data). Where, this strength points out a situation that many it managers are overlooking. However, the weakness of the article is that it points out the problem, while at the same time saying there is no effective solution. In many ways

Case Study of Database Security
Words: 1297 Length: 4 Document Type: Case Study

Database Security Case Study Database Security: Case Study The objective of this study is to answer specific questions following have read the case study which is the focus of this work in writing including naming the concepts which are illustrated in the case study and why a customer database is useful for companies related in the case study under review. This work will additionally answer as to what would occur if the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now