Final Deliverable

docx

School

Kenyatta University *

*We aren’t endorsed by this school

Course

5803

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

27

Uploaded by Jmsomuse

Report
Final Deliverable: Implementation of Surveillance System In The Workplace Trine University John Cilla Lakshmi Siva Prasad Arja IS---5803-1D1-SU-2021 - Info Studies Capstone 07/30/2022
1. System Request Project Sponsor Name(s): Lakshmi Siva Prasad ARJA Title(s): Implementation of surveillance system in the workplace Business Need – Why is this request being made: The successful implementation of the surveillance system will make it much easier for the management to keep a complete track of every single employee and ensure everyone follows the rules and regulations the administration sets. It is helpful to track every single activity of employees, so it will make it much easier to avoid harassment and violence in the workplace and also helps to contribute to improving productivity. Business Requirements – What is needed explicitly from this system High-speed internet system Hard Disk - 100 TB to store the videos Monitor to view the live videos Security cameras A professional who can easily manage any single issue Business Value – how will this benefit the business: Implementing a surveillance system will make it much easier to improve workplace productivity by eliminating the issues related to conflicts or harassment. It also makes it much easier for the management to monitor the employees from any place. It is used not only for security purposes but also for evaluating players' productivity and performance assessment. Special Issues or Constraints:
surveillance systems in the workplace sometimes make employees uncomfortable and can also hurt employee morale. Surveillance is not only enough for the organization, but also it is essential to track the employee's system browsing history to avoid issues that harm the organization. 2. Company overview Surveillance systems consist of critical elements including hardware and software that aim at prevent the intrusion of business premises. This system may include preventive measures for example alarms and sensors. On the other hand, there are elements such as CCTV cameras which enables the business owners either identify the criminals in real time or provide footage that will assist in the investigation by authorities. Through this presentation I will take you through the survailance system and what its does. Second, address the history of the problem which this system intends to solve. Thereafter, I will evaluate the problems itself and suggest a solutions to the problem. I will end the presentation with a review of a gant t chart and the feasibility analysis of this system. 3. Feasibility Analysis Description of the project The project's primary purpose is to install the surveillance system in the workplace, which will make it much easier for the leaders to keep a complete track of employees' performance and avoid conflicts between the employees. Operational feasibility When a comparison is made for the previous process of tracking the employee's performance, which was done manually, the installation of surveillance systems in the workplace will keep a complete track of every employee in the organization in an easier way. Also, it will improve workplace productivity by decreasing conflicts.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Economic feasibility The total amount of money needed to complete the project successfully is around $30000 to $50000, which will vary according to the requirements of the business. The costs also include the total amount of money for wiring, surveillance cameras, hardware, development, maintenance, and many others (Brown, 2018). All of the expenses needed to complete the project will vary depending on the requirement to negotiate during the first or initial stage of the project development. Also, it will be a rough evaluation of the project costs. Technical feasibility The surveillance system is developed in a certain way so that it can easily be controlled through the internet from any different location. A specialized application is used to monitor the employee's performance from any place, which was developed with the java and HTML programming language. Technologies required - facial recognition technology Programming languages - Java and HTML Operating system - Windows, Android, Mac, Linux Cloud storage to store the complete video records to review them in case of any issues. Schedule feasibility Schedule feasibility is defined as the type of process to develop the timeline needed for completing the project successfully before starting the project. The project has a realistic timeline. We can also meet the complete project successfully within the time and test the system before starting its usage. The issues that exist in the project can be easily avoided by finishing the project as soon as possible. Also, the people have the time to test the surveillance system and the working of facial recognition systems.
Phases Task duration in days Expected start date Expected finish date planning 7 6/20/2022 6/27/2022 finding the best places to install the surveillance system 5 6/27/2022 7/2/2022 purchase of equipment 5 7/2/2022 7/7/2022 installing 20 7/7/2022 7/27/2022 testing the installed system 5 7/27/2022 8/1/2022 operations and maintenance 7 8/1/2022 8/8/2022 Additional comments The primary purpose of installing surveillance systems in the workplace is to protect the valuable assets and the valuable information of the workplace from compromising. Surveillance systems will decrease conflicts and improve productivity in the workplace. It will also eliminate the total amount of costs which is needed for human monitoring. Employees' privacy is one of the most significant issues of workplace surveillance. 4. Gantt Chart System request: surveillance management system. Feasibility analysis: The analysis of the feasibility looks after the elements for the operational characteristics of several kinds by indicating the continuation of the surveillance management system. Based
on the information that is given by the feasibility when included in the project helps to know whether it is valid or not. Gantt chart 1 planning phase Days to complete start date end date 1. 1 A system request 5 4/5/2022 4/10/2022 1. 2 B feasibility analysis 5 4/10/2022 4/15/2022 2. 1 C gantt chart 3 4/15/2022 4/18/2022 2. 2 D requirements definitions 3 4/18/2022 4/21/2022 2. 3 E data flow diagrams 5 4/21/2022 4/26/2022 2. 4 F use cases 3 4/26/2022 4/29/2022 3. 1 G acquisition strategy 4 4/29/2022 5/3/2022 3. 2 H entity relationship design 5 5/3/2022 5/8/2022 3. 3 I prototypes/mockups 6 5/8/2022 5/14/2022 3. 4 J input/output design 5 5/14/2022 5/19/2022 3. 5 K architecture design 5 5/19/2022 5/24/2022 3. 6 L hardware and software specifications 6 5/24/2022 5/30/2022 4. 1 M testing 6 5/30/2022 6/5/2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4. 2 N documentation 10 6/5/2022 6/15/2022 4. 3 O migration and conversion 5 6/15/2022 6/20/2022 A B C D E F G H I J K L M N O 4/5/2022 4/15/2022 4/25/2022 5/5/2022 5/15/2022 5/25/2022 6/4/2022 6/14/2022 6/24/2022 Gantt Chart Required definitions System requirement: surveillance management systems provide all the requirements for the organization. It is helpful to keep a complete track of process or information that is required during the method of development. Those requirements are input, outcome, process, performance, and supervision were the five requirements that are available. Outcome:
The outcome of the system will keep on changing according to the information that the system analyst is required from the system. The advanced system also gives the chance for the management system to keep a look at the data based on the index from anywhere and also it makes the real-time judgments simpler to enforce according to the data that is present. The system always enables the users to view the footage at any time. Input: For controlling the employees in the organization the surveillance management system will make it easier to identify the issues that are happening in the workplace with the face recognition software. Having this will make it much easier to keep a complete track of employees' work. Process: The system is organized by the system analyst eventually. This process enables the management to find the conflicts happening in the workplace by providing the signals to rectify the issues even before they cause a huge negative impact. It will also make it easier to keep track of the employees performance and their activities in the workplace. Performance It is very significant to use many storage devices or databases because the surveillance management system will work continuously so to store the huge amount of data it is very important. The surveillance management system is developed in a certain way so that it will make it easier for the management or the leaders to view the employee's performance from any location just by having an internet connection. The surveillance man agent system should respond quickly because the delay in the system may lead to an increase in conflicts in the workplace or make it difficult to stop someone who is doing some illegal activities. Supervision
Every system is formulated by using several types of protections, the management will only have access to the data securely As the system is encrypted successfully then it will not give easy access to the attackers to get into the system with the delicate data that is preserved in the system. Input/output (I/O)design
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Architectural design The system contains three various layers of logical computing and it is known as the 3-tier architecture. This 3-tier is categorized into the three different levels such as the customer tier, logic tier, and data tier. This helps them work to complete more simply by dividing because each tier will perform some different type of module individually.
Hardware and Software or Firmware specifications Hardware requirements RAM of 8GB 17 inches display 100TB hard drive Software requirements Microsoft office of the latest version Windows 10 Cloud storage Facial recognition system The system testing
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
The system testing is performed in three ways which include inventor testing, user testing, and consumer testing. 5. Requirements Definition Statement System request: surveillance management system. Required definitions System requirement: surveillance management systems provide all the requirements for the organization. It is helpful to keep a complete track of process or information that is required during the method of development. Those requirements are input, outcome, process, performance, and supervision were the five requirements that are available. Outcome: The outcome of the system will keep on changing according to the information that the system analyst is required from the system. The advanced system also gives the chance for the management system to keep a look at the data based on the index from anywhere and also it makes the real-time judgments simpler to enforce according to the data that is present. The system always enables the users to view the footage at any time. Input: For controlling the employees in the organization the surveillance management system will make it easier to identify the issues that are happening in the workplace with the face recognition software. Having this will make it much easier to keep a complete track of employees' work. Process: The system is organized by the system analyst eventually. This process enables the management to find the conflicts happening in the workplace by providing the signals to rectify the issues even before they cause a huge negative impact. It will also make it easier to keep track of the employees performance and their activities in the workplace. Performance It is very significant to use many storage devices or databases because the surveillance management system will work continuously so to store the huge amount of data it is very
important. The surveillance management system is developed in a certain way so that it will make it easier for the management or the leaders to view the employee's performance from any location just by having an internet connection. The surveillance man agent system should respond quickly because the delay in the system may lead to an increase in conflicts in the workplace or make it difficult to stop someone who is doing some illegal activities. Supervision Every system is formulated by using several types of protections, the management will only have access to the data securely As the system is encrypted successfully then it will not give easy access to the attackers to get into the system with the delicate data that is preserved in the system. 6. Acquisition Strategy Alternative Matrix The alternative matrix is a crucial technique for evaluating multiple options for factors to take into account while creating systems ( Chondrakis, Melero & Sako, 2022). The three possibilities for acquiring the software in this situation are outsourced, prepackaged, and in- house. Since it is specifically designed to satisfy the needs of the business and its workers, the in-house solution was chosen in this instance. Creteria for Consideration The selection criterion for the options took into account three elements. The three factors for evaluating the three choices are technological, financial, and organizational (Langhans, 2018). Specifications for each of the three attributes are vital and pertinent to determining how beneficial the three possibilities are. Technical In accordance with the technical requirements, a comparison of the three choices' Technical requirements of the system and the workers' technical expertise in relation to each
of the choices was done. By employing menus, symbols, and other visual cues, the user interface (GUI) enables consumers to interact with digital devices like phones and computers (graphics). The three choices will be evaluated according to this standard depending on the provided of a GUI and how it adds to the software's ease of use (Langhans, 2018). Technical knowledge, on the other hand, entails evaluating the options in light of the technical know- how needed to properly utilize and maintain the program. Because GUI has a little impact on an organization's success (10), it has the lowest weight. Economic The second important factor to compare while evaluating the possibilities is the cost. This economic factor takes into account two factors: cost and maintenance and improvements. The initial cost of purchasing the items is taken into account in the costing process. Cost is a major consideration for firms, and those with tight budgets may find it helpful to save costs by selecting a less expensive option ( Chondrakis, Melero & Sako, 2022). On the other hand, considering that the items may be utilized for a very long time, maintenance costs and upgrades are an important factor to take into account. Because cost is important when choosing between the three solutions, it has the greatest weight (25). Organizational The organization that two key factors fall under is the last criterion for comparing the alternatives. The first consideration is if it satisfies employee demands, and the second is whether it will enhance organizational operations. The retention of employees and the general effectiveness of the businesses depend on meeting their demands. Due to this, it is crucial to think about strategies that will increase staff loyalty (Fuller, 2018). On the other hand, streamlining the option with the business process is necessary to provide efficient activity flow in order to improve business procedures. The greatest option in this situation is the alternative that is created to fulfill the business's most important demands. Reasons for Choosing Option Three
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
With a weighted score of 319, alternative 3 is the greatest choice to take into consideration according to the alternative matrix, whereas the first and second alternatives received scores of 309 and 195, respectively. evaluating the organizational's technological component. When compared to the other option, Option 3 performs comparably in terms of Technical requirements of the system and technical expertise. This rating is reasonable since the majority of internally produced software places a strong emphasis on basic usefulness while paying little attention to user interface ( Chondrakis, Melero & Sako, 2022). This does not, however, mean that internal software is not user-friendly. The proper conclusion would be that internal software concentrates on creating programs that carry out the required function. The third option, on the other hand, did poorly in terms of the requirement for technical knowledge because creating software from scratch necessitates a high level of software design expertise ( Shehzad et al., 2017). In order to create a system specifically for the business, the programmer will also be required to do a comprehensive analysis of the situation in the business. Option 3 is a financially difficult alternative in terms of the cost of building the program due to the high initial purchase price. Since in-house software is created from scratch, it is much more expensive than options. In contrast to outsourced software, internal software maintenance is less expensive. When compared to non-open-source software, these expenses are generally greater (Langhans, 2018). The fact that internal software is specifically designed to fulfill the demands of both the business and the employees is the final argument in favor of it. For staff retention and ultimately the success of the companies, having software that fulfills the needs of the business is essential. 7. Prototypes/Mockups The user the user interface of the Surveillance system. This system has two pages, the administrator authentication and the surveillance work area.
8. Hardware and Software Specifications Software Requirment Digital video recorders (DVRs) DVRs are used to improve and personalize surveillance monitoring in commercial buildings and other assets. They have long served as the de facto choice for surveillance recording in any HD-over-Coax system and are an essential component. You may choose a DVR based on the size of your home and your security requirements. When deciding what hardware to employ in your CCTV system, you may pick multi-channel NVRs to meet the amount of security cameras you have. Hardware requirements Video recorders over networks (NVR) You should also be aware of which cables and connections are essential aspects of your CCTV system if you want to fully comprehend what the hardware devices utilized in a CCTV system are as well as the fundamentals of how CCTV parts function together. Depending on the security cameras you select, your surveillance system, and video recorders, there are several connections and connectors. These consist of connector elements, RG-59 Siamese coax combination cables, CAT5/6 ethernet cables, plug-and-play combo cables, and more. Choosing the correct hardware for your CCTV system's hardware devices depends on the cabling. To finish installing your CCTV components, you might also require additional accessories including power adapter cables, HDMI cables, connection tools, and crimping tools. The majority of fully equipped CCTV security systems include all the cables and connections required for installation. Monitors Even while the majority of CCTV systems now allow you to access live video surveillance feeds on smartphones, tablets, and PCs, you could choose to use LCD flat monitors
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
sometimes to see footage from several security cameras at once. Monitors are perfect for installing business CCTV systems when continuous live monitoring is needed. Think about Lcd screens with built-in loudspeakers when choosing the equipment for your Video surveillance system to watch over the security camera system of your residence or place of business. The mounting brackets you need to enjoy exceptional video quality for your surveillance requirements are frequently included with these monitors along with anything else you could possibly need. Power Sources To ensure dependable functioning, CCTV systems require the proper power supplies. You need the appropriate power supply options for your system whether it uses coaxial cable or CAT5e ethernet cable to communicate. To maintain your CCTV systems well-organized and functional with less wiring, you might also require extra power supply accessories like a PoE switch, PoE extender, and numerous power supply options. PC or server with an x86-64 (64-bit) compliant CPU: A processor with 6 cores and a clock speed of 3 GHz or above is advised. Support for AVX2 is strongly advised. The SentiVeillance algorithms will still run on processors that don't support AVX2, but they will do so in a mode that won't deliver the expected performance. The majority of contemporary processors are capable of using this instruction set, but you should always double-check. GPU: If a SentiVeillance component with any of the available modalities is used to process more than two video streams at once, a GPU is necessary. For the purpose of processing up to 10 video streams on a node, an NVIDIA GeForce RTX 3080 GPU or greater is advised. To handle more video streams, several GPUs might be utilized on the same system. VRAM of at least 6 GB is advised.
GPU support for Compute Capability 3.5 or above is recommended. CUDA 11.x toolkit or a later version is needed. This cuDNN 7.5 library is necessary. a minimum of 8 GB of RAM. an excellent digital camera (s). Depending on the particular application, the camera resolution may change. As processing video from cameras with greater resolutions will demand more free RAM and a more potent processor to maintain the required frame rate, a resolution of roughly 2 MegaPixel is advised. SentiVeillance 8.2 SDK may be used with these compatible cameras: Any IP camera with RTSP (Real Time Streaming Protocol) support: Support is limited to RTP over UDP. Video streams can be read using the VLC framework, which is optional. The video stream should be encoded using Motion JPEG or H.264/MPEG-4 AVC. Any high-resolution digital camera that can be used with the GStreamer interface for Linux and the DirectShow, Windows Media, or Media Foundation APIs for Microsoft Windows. Systems that need thermal imaging are supported by the Mobotix M16 Thermal camera. A special programming example for handling the video feeds from this camera is included in the SentiVeillance SDK. Customers can add support for any other devices utilizing the Device Manager Plug-in Framework that is offered. For further details, please see the SentiVeillance 8.2 SDK documentation. Particular to Microsoft Windows: Microsoft Windows 7/8/10/11/Server 2008/2012/2016/2019. Microsoft Windows 7/8/10/11/Server. 4.5 or newer Microsoft.NET framework (for .NET components usage).
DirectX 9.0 or later from Microsoft For the development of applications, choose one of the following environments: For C/C++, C#, and Visual Basic.Net application development, Microsoft Visual Studio 2012 or later is required. JDK 8 or later for Java SE Debian 11.2 OS with glibc 2.17 or newer is particular to Linux. gst with GStreamer 1.10.x or later -installed hardware-accelerated video decoding plugins for the VAAP protocol newer than libgudev-1.0 219 libs and development packages for wxWidgets 3.0.0 or later JDK 8 or later for Java SE Khairunj. (n.d.). Point of sale . Microsoft Docs. Retrieved July 16, 2022, from https://docs.microsoft.com/en-us/dynamicsax-2012/appuser-itpro/point-of-sale 9. Architectural Design The presentation tier, or user interface, the application tier, where data is analyzed, and the data tier, where the software's related information is recorded and maintained, are the three logical and physical computer tiers that make up the well-known three-tier organization. The main advantage of a three-tier structure is that each layer may be built concurrently by a different programming staff and can be upgraded or enlarged as necessary without affecting the other levels since each tier operates on its own platform. The standard design for software components for many years was three tiers. The majority of three-tier programs today are candidates for modernisation utilizing cloud-native tools like container and microservices, as well as for cloud migration. The specifics of the three levels
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Presentation level The user interface and communication layer of the program, or presentation tier, is where end users engage with the software. Information presentation to and data collection from the user are its primary goals. This top-level layer can function, for instance, on a desktop program, a web browser, or a graphical user interface (GUI). Tiers of web appearance are often created with HTML, CSS, and JavaScript. Based on the environment, a variety of languages can be used to create desktop apps. Applications level The core of the program is the application layer, sometimes referred to as the logic tier or middle tier. In this layer, data gathered in the presentation tier is processed using procedural code, or a particular set of standard operating procedures, sometimes in comparison to data gathered in the data tier. Data in the data layer may also be added, removed, or modified by the application tier. The application layer often uses Python, Java, Perl, PHP, or Ruby for development and uses API calls to talk to the data tier. Data level The data captured by the program is kept and handled in the data tier, that is sometimes referred to as the back-end, db tier, or data access tier. This might be a NoSQL database server like Cassandra, CouchDB, or MongoDB, or a rdbms system like PostgreSQL, MySQL, MariaDB, Oracle, DB2, Informix, or Microsoft SQL Server. All interaction in a three-tier application passes through the application tier. Direct communication between the presentation tier and the data tier is not possible. 10. Non-functional requirements Operational Your System
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Requirements Technical This system is designed to support the hardware of a surveillance system and provide accessibility of such tools to the managers of a business premise. The idea in this case is that the technician can control the system from any point where he or she is located System Integration This system will be intergated with other hardware in the survaillance system including the CCTV cameras and the motion sensors and detectors Portability The system is designed to be highly portable and accesible to the uses at any given geographical region given that it is available for android and iOS Maintainability The system must accomdate connectivity of a Wide Area Network considering that the company might consider expand its operations to other regions Performance Requirements Your System Speed The network had a delay of 1 second meaning that it allows the operator monitor the system in realtime Capacity This system can handle upto 24 CCTV cameras and 30 sensors Availability and Reliability The system should available to the technician for 24 hours and should fuction at a 99% effeciency Security Requirements Your System System Value Estimates The loss of the system will lead to $500,000 Access Control The system can only be access by on individual who has all the credential for login in into the system. Encryption and Authentication The communications between the devices will occur through a secure network with a secure firewall Virus Control The computers that acess the system have software installed Cultural/Political Requirements Your System Multilingual This system will support three languages includes English, Spanish and Chinese Customization The technician can change the items that are available in the monitoring panel Making Unstated Norms Explicit The time in the system is measure in local time Legal All the footage in the system can only be shared with authorities for the purpose of investigations.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
11. All your Implementation Deliverables Proposed Documentation Type Documentation for the program, which is still in progress, offers details about it and instructions on how to use it for a variety of tasks. Basic themes of product documentation include requirements, relevant information, characteristics of the system, and guidance (Ovaskainen et al., 2017). As the last pieces of preparation from the project implementation, this project will mostly concentrate on generating documentation. The two most common types of documentation are as follows: System documentation: system documentation is a term used to describe documents that describe a system's elements and the organization as a whole. It includes description papers, design options, architectural justifications, and frequently asked questions. User documentation: The term "user documentation" refers to instructions prepared predominantly for computer programmers and application users. Recorded material includes, but is not limited to, professional guides, assembly guides, operating instructions, and resource manuals. Users inside the organization will have access to this documentation via electronic means (Ovaskainen et al., 2017). The project documentation will be created by the program designers, who will share it with the organization's management as a downloadable PDF file that can be accessed as soon as users begin installing the application. Testing Method For this program to be implemented successfully, program testing is crucial. Through this procedure, the program is certain to serve its intended purpose and help the organization reach its desired goals (Ovaskainen et al., 2017). I'd want to suggest five distinct testing procedures for this application program in order to test it.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Adoption Testing This evaluation determines whether the program has helped users meet their task objectives in the desired manner (Eickhoff et al., 2017). Acceptance testing will be used in this project to assess how the application program has helped the security personnel monitor all the activities in the organisation Functional Evaluation: This determines whether the program accomplishes the goal for which it was created. Does the program record surveillance footage, operate motion sensors, and send signals to tiggers allarms? Interactive Examination: This testing, also known as manual testing, enables the developers to carry out tests on how the system's users interact with it. This test is essential for looking at user performance while using the program through actual physical interactions. Performance Evaluation: This type of testing looks at five critical steps, including the software's dependability, bandwidth, expandability, continuity, and memory consumption. Security Checks: Security evaluation exposes the system's flaws so that the software system and application are guaranteed to be risk- and threat-free (Eickhoff et al., 2017). These assessments aim to find prospective weak spots in programming code that could lead to the loss of data, revenue, or company image among clients or other third parties. System Transition Plan This system's transition plan calls for a direct switchover. The computers are switched as soon as possible, and the current platform accomplishes the old one right away while still closing it down. The main benefit of making this switch is that it will save money. Training Method The tutorials that are included in the documentation will be used primarily as part of the training for implementing this software. The installation of a computer system must include
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
tutorials, which are essential in giving the end-user a rather more reachable option (Eickhoff et al., 2017). Type of Support and Maintenance Given that this is an internal software, the internal system developer will offer the suggested servicing and assistance. The system's users will stay in touch with the creator to offer assistance as needed (Ovaskainen et al., 2017). Due to the fact that the technical support is provided for the store as well, this strategy has the advantages of being efficient and affordable.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
12. Works Cited Asburry, A., & Blatt, M. (2019). Improving Childhood Lead Poisoning Surveillance and Data Management in Arizona Through an Evaluation of the Transition to a New Surveillance System. Journal Of Public Health Management And Practice , 25 (1), S58-S62. https://doi.org/10.1097/phh.0000000000000873 Brown, T. (2018). Price uncertainty, policy, and the economic feasibility of cellulosic biorefineries. Biofuels, Bioproducts And Biorefining , 12 (3), 485-496. doi: 10.1002/bbb.1865 Chondrakis, G., Melero, E., & Sako, M. (2022). The effect of coordination requirements on sourcing decisions: Evidence from patent prosecution services. Strategic Management Journal , 43 (6), 1141-1169. Fox, P. T., Lancaster, J. L., Eickhoff, S. B., Laird, A. R., and Fox, P. M. (2017). GingerALE Software implementation flaws: a description and suggestions (Pages 7–11 of Vol. 38, No. 1) Khairunj. (n.d.). Point of sale . Microsoft Docs. Retrieved July 16, 2022, from https://docs.microsoft.com/en-us/dynamicsax-2012/appuser-itpro/point-of-sale Langhans, W. (2018, April). Use of commercial services and outsourcing to supply CNS services—An ANSP's perspective. In 2018 Integrated Communications, Navigation, Surveillance Conference (ICNS) (pp. 1-13). IEEE. Shehzad, B., Awan, K. M., Lali, M. I. U., & Aslam, W. (2017). Identification of Patterns in Failure of Software Projects. J. Inf. Sci. Eng. , 33 (6), 1465-1479. Tikhonov, G., Norberg, A., Guillaume Blanchet, F., Duan, L., Dunson, D., et al (2017). How can community data be improved? a conceptual framework and its application in the form of software and models. 20(5), 561-576; Ecology Letters.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help