Final Deliverable
docx
keyboard_arrow_up
School
Kenyatta University *
*We aren’t endorsed by this school
Course
5803
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
27
Uploaded by Jmsomuse
Final Deliverable: Implementation of Surveillance System In The Workplace
Trine University
John Cilla
Lakshmi Siva Prasad Arja
IS---5803-1D1-SU-2021 - Info Studies Capstone
07/30/2022
1. System Request
Project Sponsor
Name(s): Lakshmi Siva Prasad ARJA
Title(s):
Implementation of surveillance system in the workplace
Business Need – Why is this request being made:
The successful implementation of the surveillance system will make it much easier for the
management to keep a complete track of every single employee and ensure everyone follows
the rules and regulations the administration sets. It is helpful to track every single activity of
employees, so it will make it much easier to avoid harassment and violence in the workplace
and also helps to contribute to improving productivity.
Business Requirements
– What is needed explicitly from this system
High-speed internet system
Hard Disk - 100 TB to store the videos
Monitor to view the live videos
Security cameras
A professional who can easily manage any single issue
Business Value – how will this benefit the business:
Implementing a surveillance system will make it much easier to improve workplace
productivity by eliminating the issues related to conflicts or harassment. It also makes it
much easier for the management to monitor the employees from any place. It is used not only
for security purposes but also for evaluating players' productivity and performance
assessment.
Special Issues or Constraints:
surveillance systems in the workplace sometimes make employees uncomfortable and can
also hurt employee morale. Surveillance is not only enough for the organization, but also it is
essential to track the employee's system browsing history to avoid issues that harm the
organization.
2. Company overview
Surveillance systems consist of critical elements including hardware and software that
aim at prevent the intrusion of business premises. This system may include preventive
measures for example alarms and sensors.
On the other hand, there are elements such as
CCTV cameras which enables the business owners either identify the criminals in real time or
provide footage that will assist in the investigation by authorities. Through this presentation I
will take you through the survailance system and what its does. Second, address the history of
the problem which this system intends to solve. Thereafter, I will evaluate the problems itself
and suggest a solutions to the problem. I will end the presentation with a review of a gant t
chart and the feasibility analysis of this system.
3. Feasibility Analysis
Description of the project
The project's primary purpose is to install the surveillance system in the workplace, which
will make it much easier for the leaders to keep a complete track of employees' performance
and avoid conflicts between the employees.
Operational feasibility
When a comparison is made for the previous process of tracking the employee's performance,
which was done manually, the installation of surveillance systems in the workplace will keep
a complete track of every employee in the organization in an easier way. Also, it will improve
workplace productivity by decreasing conflicts.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Economic feasibility
The total amount of money needed to complete the project successfully is around $30000 to
$50000, which will vary according to the requirements of the business. The costs also include
the total amount of money for wiring, surveillance cameras, hardware, development,
maintenance, and many others
(Brown, 2018). All of the expenses needed to complete the
project will vary depending on the requirement to negotiate during the first or initial stage of
the project development. Also, it will be a rough evaluation of the project costs.
Technical feasibility
The surveillance system is developed in a certain way so that it can easily be controlled
through the internet from any different location. A specialized application is used to monitor
the employee's performance from any place, which was developed with the java and HTML
programming language.
●
Technologies required - facial recognition technology
●
Programming languages - Java and HTML
●
Operating system - Windows, Android, Mac, Linux
●
Cloud storage to store the complete video records to review them in case of any
issues.
Schedule feasibility
Schedule feasibility is defined as the type of process to develop the timeline needed for
completing the project successfully before starting the project. The project has a realistic
timeline. We can also meet the complete project successfully within the time and test the
system before starting its usage. The issues that exist in the project can be easily avoided by
finishing the project as soon as possible. Also, the people have the time to test the
surveillance system and the working of facial recognition systems.
Phases
Task duration in
days
Expected start date
Expected
finish
date
planning
7
6/20/2022
6/27/2022
finding the best
places to install the
surveillance system
5
6/27/2022
7/2/2022
purchase
of
equipment
5
7/2/2022
7/7/2022
installing
20
7/7/2022
7/27/2022
testing the installed
system
5
7/27/2022
8/1/2022
operations
and
maintenance
7
8/1/2022
8/8/2022
Additional comments
The primary purpose of installing surveillance systems in the workplace is to protect the
valuable assets and the valuable information of the workplace from compromising.
Surveillance systems will decrease conflicts and improve productivity in the workplace. It
will also eliminate the total amount of costs which is needed for human monitoring.
Employees' privacy is one of the most significant issues of workplace surveillance.
4. Gantt Chart
System request:
surveillance management system.
Feasibility analysis:
The analysis of the feasibility looks after the elements for the operational characteristics of
several kinds by indicating the continuation of the surveillance management system. Based
on the information that is given by the feasibility when included in the project helps to know
whether it is valid or not.
Gantt chart
1
planning phase
Days to
complete
start date
end date
1.
1
A
system request
5
4/5/2022
4/10/2022
1.
2
B
feasibility analysis
5
4/10/2022
4/15/2022
2.
1
C
gantt chart
3
4/15/2022
4/18/2022
2.
2
D
requirements definitions
3
4/18/2022
4/21/2022
2.
3
E
data flow diagrams
5
4/21/2022
4/26/2022
2.
4
F
use cases
3
4/26/2022
4/29/2022
3.
1
G
acquisition strategy
4
4/29/2022
5/3/2022
3.
2
H
entity relationship design
5
5/3/2022
5/8/2022
3.
3
I
prototypes/mockups
6
5/8/2022
5/14/2022
3.
4
J
input/output design
5
5/14/2022
5/19/2022
3.
5
K
architecture design
5
5/19/2022
5/24/2022
3.
6
L
hardware and software
specifications
6
5/24/2022
5/30/2022
4.
1
M
testing
6
5/30/2022
6/5/2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4.
2
N
documentation
10
6/5/2022
6/15/2022
4.
3
O
migration and conversion
5
6/15/2022
6/20/2022
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
4/5/2022
4/15/2022
4/25/2022
5/5/2022
5/15/2022
5/25/2022
6/4/2022
6/14/2022
6/24/2022
Gantt Chart
Required definitions
System requirement:
surveillance management systems provide all the requirements for the
organization. It is helpful to keep a complete track of process or information that is required
during the method of development. Those requirements are input, outcome, process,
performance, and supervision were the five requirements that are available.
Outcome:
The outcome of the system will keep on changing according to the information that the
system analyst is required from the system. The advanced system also gives the chance for
the management system to keep a look at the data based on the index from anywhere and also
it makes the real-time judgments simpler to enforce according to the data that is present. The
system always enables the users to view the footage at any time.
Input:
For controlling the employees in the organization the surveillance management system will
make it easier to identify the issues that are happening in the workplace with the face
recognition software. Having this will make it much easier to keep a complete track of
employees' work.
Process:
The system is organized by the system analyst eventually. This process enables the
management to find the conflicts happening in the workplace by providing the signals to
rectify the issues even before they cause a huge negative impact. It will also make it easier to
keep track of the employees performance and their activities in the workplace.
Performance
It is very significant to use many storage devices or databases because the surveillance
management system will work continuously so to store the huge amount of data it is very
important. The surveillance management system is developed in a certain way so that it will
make it easier for the management or the leaders to view the employee's performance from
any location just by having an internet connection. The surveillance man agent system should
respond quickly because the delay in the system may lead to an increase in conflicts in the
workplace or make it difficult to stop someone who is doing some illegal activities.
Supervision
Every system is formulated by using several types of protections, the management will only
have access to the data securely As the system is encrypted successfully then it will not give
easy access to the attackers to get into the system with the delicate data that is preserved in
the system.
Input/output (I/O)design
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Architectural design
The system contains three various layers of logical computing and it is known as the 3-tier
architecture. This 3-tier is categorized into the three different levels such as the customer tier,
logic tier, and data tier. This helps them work to complete more simply by dividing because
each tier will perform some different type of module individually.
Hardware and Software or Firmware specifications
Hardware requirements
●
RAM of 8GB
●
17 inches display
●
100TB hard drive
Software requirements
●
Microsoft office of the latest version
●
Windows 10
●
Cloud storage
●
Facial recognition system
The system testing
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
The system testing is performed in three ways which include inventor testing, user testing,
and consumer testing.
5. Requirements Definition Statement
System request:
surveillance management system.
Required definitions
System requirement:
surveillance management systems provide all the requirements for the
organization. It is helpful to keep a complete track of process or information that is required
during the method of development. Those requirements are input, outcome, process,
performance, and supervision were the five requirements that are available.
Outcome:
The outcome of the system will keep on changing according to the information
that the system analyst is required from the system. The advanced system also gives the
chance for the management system to keep a look at the data based on the index from
anywhere and also it makes the real-time judgments simpler to enforce according to the data
that is present. The system always enables the users to view the footage at any time.
Input:
For controlling the employees in the organization the surveillance management
system will make it easier to identify the issues that are happening in the workplace with the
face recognition software. Having this will make it much easier to keep a complete track of
employees' work.
Process:
The system is organized by the system analyst eventually. This process enables the
management to find the conflicts happening in the workplace by providing the signals to
rectify the issues even before they cause a huge negative impact. It will also make it easier to
keep track of the employees performance and their activities in the workplace.
Performance
It is very significant to use many storage devices or databases because the surveillance
management system will work continuously so to store the huge amount of data it is very
important. The surveillance management system is developed in a certain way so that it will
make it easier for the management or the leaders to view the employee's performance from
any location just by having an internet connection. The surveillance man agent system should
respond quickly because the delay in the system may lead to an increase in conflicts in the
workplace or make it difficult to stop someone who is doing some illegal activities.
Supervision
Every system is formulated by using several types of protections, the management will only
have access to the data securely As the system is encrypted successfully then it will not give
easy access to the attackers to get into the system with the delicate data that is preserved in
the system.
6. Acquisition Strategy
Alternative Matrix
The alternative matrix is a crucial technique for evaluating multiple options for factors
to take into account while creating systems (
Chondrakis, Melero & Sako, 2022). The three
possibilities for acquiring the software in this situation are outsourced, prepackaged, and in-
house. Since it is specifically designed to satisfy the needs of the business and its workers, the
in-house solution was chosen in this instance.
Creteria for Consideration
The selection criterion for the options took into account three elements. The three
factors for evaluating the three choices are technological, financial, and organizational
(Langhans, 2018). Specifications for each of the three attributes are vital and pertinent to
determining how beneficial the three possibilities are.
Technical
In accordance with the technical requirements, a comparison of the three choices'
Technical requirements of the system and the workers' technical expertise in relation to each
of the choices was done. By employing menus, symbols, and other visual cues, the user
interface (GUI) enables consumers to interact with digital devices like phones and computers
(graphics). The three choices will be evaluated according to this standard depending on the
provided of a GUI and how it adds to the software's ease of use (Langhans, 2018). Technical
knowledge, on the other hand, entails evaluating the options in light of the technical know-
how needed to properly utilize and maintain the program. Because GUI has a little impact on
an organization's success (10), it has the lowest weight.
Economic
The second important factor to compare while evaluating the possibilities is the cost.
This economic factor takes into account two factors: cost and maintenance and
improvements. The initial cost of purchasing the items is taken into account in the costing
process. Cost is a major consideration for firms, and those with tight budgets may find it
helpful to save costs by selecting a less expensive option (
Chondrakis, Melero & Sako,
2022). On the other hand, considering that the items may be utilized for a very long time,
maintenance costs and upgrades are an important factor to take into account. Because cost is
important when choosing between the three solutions, it has the greatest weight (25).
Organizational
The organization that two key factors fall under is the last criterion for comparing the
alternatives. The first consideration is if it satisfies employee demands, and the second is
whether it will enhance organizational operations. The retention of employees and the general
effectiveness of the businesses depend on meeting their demands. Due to this, it is crucial to
think about strategies that will increase staff loyalty (Fuller, 2018). On the other hand,
streamlining the option with the business process is necessary to provide efficient activity
flow in order to improve business procedures. The greatest option in this situation is the
alternative that is created to fulfill the business's most important demands.
Reasons for Choosing Option Three
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
With a weighted score of 319, alternative 3 is the greatest choice to take into
consideration according to the alternative matrix, whereas the first and second alternatives
received scores of 309 and 195, respectively. evaluating the organizational's technological
component. When compared to the other option, Option 3 performs comparably in terms of
Technical requirements of the system and technical expertise. This rating is reasonable since
the majority of internally produced software places a strong emphasis on basic usefulness
while paying little attention to user interface (
Chondrakis, Melero & Sako, 2022). This does
not, however, mean that internal software is not user-friendly. The proper conclusion would
be that internal software concentrates on creating programs that carry out the required
function. The third option, on the other hand, did poorly in terms of the requirement for
technical knowledge because creating software from scratch necessitates a high level of
software design expertise (
Shehzad
et al.,
2017). In order to create a system specifically for
the business, the programmer will also be required to do a comprehensive analysis of the
situation in the business.
Option 3 is a financially difficult alternative in terms of the cost of building the
program due to the high initial purchase price. Since in-house software is created from
scratch, it is much more expensive than options. In contrast to outsourced software, internal
software maintenance is less expensive. When compared to non-open-source software, these
expenses are generally greater (Langhans, 2018). The fact that internal software is
specifically designed to fulfill the demands of both the business and the employees is the
final argument in favor of it. For staff retention and ultimately the success of the companies,
having software that fulfills the needs of the business is essential.
7. Prototypes/Mockups
The user the user interface of the Surveillance system. This system has two pages, the
administrator authentication and the surveillance work area.
8. Hardware and Software Specifications
Software Requirment
Digital video recorders (DVRs) DVRs are used to improve and personalize surveillance
monitoring in commercial buildings and other assets. They have long served as the de facto
choice for surveillance recording in any HD-over-Coax system and are an essential
component. You may choose a DVR based on the size of your home and your security
requirements. When deciding what hardware to employ in your CCTV system, you may pick
multi-channel NVRs to meet the amount of security cameras you have.
Hardware requirements
Video recorders over networks (NVR)
You should also be aware of which cables and connections are essential aspects of your
CCTV system if you want to fully comprehend what the hardware devices utilized in a CCTV
system are as well as the fundamentals of how CCTV parts function together. Depending on
the security cameras you select, your surveillance system, and video recorders, there are
several connections and connectors. These consist of connector elements, RG-59 Siamese
coax combination cables, CAT5/6 ethernet cables, plug-and-play combo cables, and more.
Choosing the correct hardware for your CCTV system's hardware devices depends on the
cabling. To finish installing your CCTV components, you might also require additional
accessories including power adapter cables, HDMI cables, connection tools, and crimping
tools. The majority of fully equipped CCTV security systems include all the cables and
connections required for installation.
Monitors
Even while the majority of CCTV systems now allow you to access live video surveillance
feeds on smartphones, tablets, and PCs, you could choose to use LCD flat monitors
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
sometimes to see footage from several security cameras at once. Monitors are perfect for
installing business CCTV systems when continuous live monitoring is needed.
Think about Lcd screens with built-in loudspeakers when choosing the equipment for your
Video surveillance system to watch over the security camera system of your residence or
place of business. The mounting brackets you need to enjoy exceptional video quality for
your surveillance requirements are frequently included with these monitors along with
anything else you could possibly need.
Power Sources
To ensure dependable functioning, CCTV systems require the proper power supplies. You
need the appropriate power supply options for your system whether it uses coaxial cable or
CAT5e ethernet cable to communicate. To maintain your CCTV systems well-organized and
functional with less wiring, you might also require extra power supply accessories like a PoE
switch, PoE extender, and numerous power supply options.
PC or server with an x86-64 (64-bit) compliant CPU: A processor with 6 cores and a clock
speed of 3 GHz or above is advised.
Support for AVX2 is strongly advised. The SentiVeillance algorithms will still run on
processors that don't support AVX2, but they will do so in a mode that won't deliver the
expected performance. The majority of contemporary processors are capable of using this
instruction set, but you should always double-check.
GPU: If a SentiVeillance component with any of the available modalities is used to process
more than two video streams at once, a GPU is necessary.
For the purpose of processing up to 10 video streams on a node, an NVIDIA GeForce RTX
3080 GPU or greater is advised.
To handle more video streams, several GPUs might be utilized on the same system.
VRAM of at least 6 GB is advised.
GPU support for Compute Capability 3.5 or above is recommended.
CUDA 11.x toolkit or a later version is needed.
This cuDNN 7.5 library is necessary.
a minimum of 8 GB of RAM.
an excellent digital camera (s). Depending on the particular application, the camera resolution
may change. As processing video from cameras with greater resolutions will demand more
free RAM and a more potent processor to maintain the required frame rate, a resolution of
roughly 2 MegaPixel is advised.
SentiVeillance 8.2 SDK may be used with these compatible cameras:
Any IP camera with RTSP (Real Time Streaming Protocol) support:
Support is limited to RTP over UDP.
Video streams can be read using the VLC framework, which is optional.
The video stream should be encoded using Motion JPEG or H.264/MPEG-4 AVC.
Any high-resolution digital camera that can be used with the GStreamer interface for Linux
and the DirectShow, Windows Media, or Media Foundation APIs for Microsoft Windows.
Systems that need thermal imaging are supported by the Mobotix M16 Thermal camera. A
special programming example for handling the video feeds from this camera is included in
the SentiVeillance SDK.
Customers can add support for any other devices utilizing the Device Manager Plug-in
Framework that is offered. For further details, please see the SentiVeillance 8.2 SDK
documentation.
Particular to Microsoft Windows:
Microsoft Windows 7/8/10/11/Server 2008/2012/2016/2019. Microsoft Windows
7/8/10/11/Server.
4.5 or newer Microsoft.NET framework (for .NET components usage).
DirectX 9.0 or later from Microsoft
For the development of applications, choose one of the following environments:
For C/C++, C#, and Visual Basic.Net application development, Microsoft Visual Studio 2012
or later is required.
JDK 8 or later for Java SE
Debian 11.2 OS with glibc 2.17 or newer is particular to Linux.
gst with GStreamer 1.10.x or later
-installed hardware-accelerated video decoding plugins for the VAAP protocol
newer than libgudev-1.0 219
libs and development packages for wxWidgets 3.0.0 or later
JDK 8 or later for Java SE
Khairunj. (n.d.).
Point of sale
. Microsoft Docs. Retrieved July 16, 2022, from
https://docs.microsoft.com/en-us/dynamicsax-2012/appuser-itpro/point-of-sale
9. Architectural Design
The presentation tier, or user interface, the application tier, where data is analyzed, and the
data tier, where the software's related information is recorded and maintained, are the three
logical and physical computer tiers that make up the well-known three-tier organization. The
main advantage of a three-tier structure is that each layer may be built concurrently by a
different programming staff and can be upgraded or enlarged as necessary without affecting
the other levels since each tier operates on its own platform. The standard design for software
components for many years was three tiers. The majority of three-tier programs today are
candidates for modernisation utilizing cloud-native tools like container and microservices, as
well as for cloud migration.
The specifics of the three levels
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Presentation level
The user interface and communication layer of the program, or presentation tier, is where end
users engage with the software. Information presentation to and data collection from the user
are its primary goals. This top-level layer can function, for instance, on a desktop program, a
web browser, or a graphical user interface (GUI). Tiers of web appearance are often created
with HTML, CSS, and JavaScript. Based on the environment, a variety of languages can be
used to create desktop apps.
Applications level
The core of the program is the application layer, sometimes referred to as the logic tier or
middle tier. In this layer, data gathered in the presentation tier is processed using procedural
code, or a particular set of standard operating procedures, sometimes in comparison to data
gathered in the data tier. Data in the data layer may also be added, removed, or modified by
the application tier. The application layer often uses Python, Java, Perl, PHP, or Ruby for
development and uses API calls to talk to the data tier.
Data level
The data captured by the program is kept and handled in the data tier, that is sometimes
referred to as the back-end, db tier, or data access tier. This might be a NoSQL database
server like Cassandra, CouchDB, or MongoDB, or a rdbms system like PostgreSQL,
MySQL, MariaDB, Oracle, DB2, Informix, or Microsoft SQL Server. All interaction in a
three-tier application passes through the application tier. Direct communication between the
presentation tier and the data tier is not possible.
10. Non-functional requirements
Operational
Your System
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Requirements
Technical
This system is designed to support the hardware of a surveillance
system and provide accessibility of such tools to the managers of
a business premise. The idea in this case is that the technician can
control the system from any point where he or she is located
System Integration
This system will be intergated with other hardware in the
survaillance system including the CCTV cameras and the motion
sensors and detectors
Portability
The system is designed to be highly portable and accesible to the
uses at any given geographical region given that it is available for
android and iOS
Maintainability
The system must accomdate connectivity of a Wide Area
Network considering that the company might consider expand its
operations to other regions
Performance
Requirements
Your System
Speed
The network had a delay of 1 second meaning that it allows the
operator monitor the system in realtime
Capacity
This system can handle upto 24 CCTV cameras and 30 sensors
Availability and
Reliability
The system should available to the technician for 24 hours
and
should fuction at a 99% effeciency
Security
Requirements
Your System
System Value
Estimates
The loss of the system will lead to $500,000
Access Control
The system can only be access by on individual who has all the
credential for login in into the system.
Encryption and
Authentication
The communications between the devices will occur through a
secure network with a secure firewall
Virus Control
The computers that acess the system have software installed
Cultural/Political
Requirements
Your System
Multilingual
This system will support three languages includes English,
Spanish and Chinese
Customization
The technician can change the items that are available in the
monitoring panel
Making Unstated
Norms Explicit
The time in the system is measure in local time
Legal
All the footage in the system can only be shared with authorities
for the purpose of investigations.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
11. All your Implementation Deliverables
Proposed Documentation Type
Documentation for the program, which is still in progress, offers details about it and
instructions on how to use it for a variety of tasks. Basic themes of product documentation
include requirements, relevant information, characteristics of the system, and guidance
(Ovaskainen et al., 2017). As the last pieces of preparation from the project implementation,
this project will mostly concentrate on generating documentation. The two most common
types of documentation are as follows:
System documentation:
system documentation is a term used to describe documents that
describe a system's elements and the organization as a whole. It includes description papers,
design options, architectural justifications, and frequently asked questions.
User documentation:
The term "user documentation" refers to instructions prepared
predominantly for computer programmers and application users. Recorded material includes,
but is not limited to, professional guides, assembly guides, operating instructions, and
resource manuals.
Users inside the organization will have access to this documentation via electronic means
(Ovaskainen et al., 2017). The project documentation will be created by the program
designers, who will share it with the organization's management as a downloadable PDF file
that can be accessed as soon as users begin installing the application.
Testing Method
For this program to be implemented successfully, program testing is crucial. Through this
procedure, the program is certain to serve its intended purpose and help the organization
reach its desired goals (Ovaskainen et al., 2017). I'd want to suggest five distinct testing
procedures for this application program in order to test it.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Adoption Testing
This evaluation determines whether the program has helped users meet their task
objectives in the desired manner (Eickhoff et al., 2017). Acceptance testing will be used in
this project to assess how the application program has helped the security personnel monitor
all the activities in the organisation
Functional Evaluation:
This determines whether the program accomplishes the goal for
which it was created. Does the program record surveillance footage, operate motion sensors,
and send signals to tiggers allarms?
Interactive Examination:
This testing, also known as manual testing, enables the developers
to carry out tests on how the system's users interact with it. This test is essential for looking at
user performance while using the program through actual physical interactions.
Performance Evaluation:
This type of testing looks at five critical steps, including the
software's dependability, bandwidth, expandability, continuity, and memory consumption.
Security Checks:
Security evaluation exposes the system's flaws so that the software system
and application are guaranteed to be risk- and threat-free (Eickhoff et al., 2017). These
assessments aim to find prospective weak spots in programming code that could lead to the
loss of data, revenue, or company image among clients or other third parties.
System Transition Plan
This system's transition plan calls for a direct switchover. The computers are switched
as soon as possible, and the current platform accomplishes the old one right away while still
closing it down. The main benefit of making this switch is that it will save money.
Training Method
The tutorials that are included in the documentation will be used primarily as part of the
training for implementing this software. The installation of a computer system must include
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
tutorials, which are essential in giving the end-user a rather more reachable option (Eickhoff
et al., 2017).
Type of Support and Maintenance
Given that this is an internal software, the internal system developer will offer the suggested
servicing and assistance. The system's users will stay in touch with the creator to offer
assistance as needed (Ovaskainen et al., 2017). Due to the fact that the technical support is
provided for the store as well, this strategy has the advantages of being efficient and
affordable.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
12. Works Cited
Asburry, A., & Blatt, M. (2019). Improving Childhood Lead Poisoning Surveillance and Data
Management in Arizona Through an Evaluation of the Transition to a New
Surveillance System.
Journal Of Public Health Management And Practice
,
25
(1),
S58-S62.
https://doi.org/10.1097/phh.0000000000000873
Brown, T. (2018). Price uncertainty, policy, and the economic feasibility of cellulosic
biorefineries.
Biofuels, Bioproducts And Biorefining
,
12
(3), 485-496. doi:
10.1002/bbb.1865
Chondrakis, G., Melero, E., & Sako, M. (2022). The effect of coordination requirements on
sourcing decisions: Evidence from patent prosecution services.
Strategic
Management Journal
,
43
(6), 1141-1169.
Fox, P. T., Lancaster, J. L., Eickhoff, S. B., Laird, A. R., and Fox, P. M. (2017). GingerALE
Software implementation flaws: a description and suggestions (Pages 7–11 of Vol. 38,
No. 1)
Khairunj. (n.d.).
Point of sale
. Microsoft Docs. Retrieved July 16, 2022, from
https://docs.microsoft.com/en-us/dynamicsax-2012/appuser-itpro/point-of-sale
Langhans, W. (2018, April). Use of commercial services and outsourcing to supply CNS
services—An ANSP's perspective. In
2018 Integrated Communications, Navigation,
Surveillance Conference (ICNS)
(pp. 1-13). IEEE.
Shehzad, B., Awan, K. M., Lali, M. I. U., & Aslam, W. (2017). Identification of Patterns in
Failure of Software Projects.
J. Inf. Sci. Eng.
,
33
(6), 1465-1479.
Tikhonov, G., Norberg, A., Guillaume Blanchet, F., Duan, L., Dunson, D., et al (2017). How
can community data be improved? a conceptual framework and its application in the
form of software and models. 20(5), 561-576; Ecology Letters.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help