MIS Park University Programming Paper

Create a development and implementation plan by gathering key information from each of the project components you developed this term and summarizing it in the format outlined below. Note that you should incorporate faculty feedback when developing your plan.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Submit a plan as a word document in APA 7th edition formatting describing your system and the development and implementation steps that the company will need to take to in order to successfully complete the project. Your summary should include the following elements:

  • System Overview—Description of the system and the process(es) it supports
  • System Organization—Summary of the system’s structure and components (software and hardware
  • Security—Summary of system security requirements and/or features
  • Major Tasks—Annotated list of each major task or step required for the implementation of the system
  • 1
    Bike Renting
    Bike renting is one of the operational business processes for the bike-sharing system.
    Firstly, the group should ensure that they have a web page and mobile app that provide details of
    the location of docking stations, bike types, availability of the bikes, and rent costs. The
    customer will initiate the booking and ordering process. Therefore, the customer will need to
    have the mobile application installed on their phone and have a registered account with the
    group. After viewing the nearest docking stations, users can pre-book a bike or order to unlock it
    once they get to the location. For pre-booking, the customers will choose the preferred docking
    station where they will pick the bike, pick time, and the type of bike they need. The IS system
    will save the information and lock the bike until the user picks it up. However, if a customer
    delays to pick the pre-booked bike by 15 minutes, the bike will be available to other users. In the
    second option, a user will go to the docking station, select a bike, then use their phone app to
    scan a QR code on the bike that unlocks it. The information system will play a significant role in
    the process. It will aid in updating information on the available bikes and their location. Also, the
    system will help with pre-booking bikes and unlocking them. Thus, an automated system will be
    utilized, eliminating labor costs.
    Feedback: How does the information system make that interaction better, easy to use, and
    provide value to the experience?
    User Management
    User management will entail managing customer accounts and keeping track of customer
    engagement. The first step is to ensure there is an ease in registration. Next, user engagement
    will be crucial as it will help the group identify areas that need improvements and those that meet
    clients’ tastes and preferences. As Nasr et al. (2014) stipulate, feedback helps in continued
    2
    growth, decision-making, and comparing with competitors. Thus, the user management process
    should ensure that customers are engaged to provide feedback. The system should initiate the
    process whereby the customer is prompted to comment on their experience and rate the services
    after returning a bike. Further, the group can conduct random surveys at regular intervals where
    they send questionnaires to customers. The information received from the surveys will also help
    improve user management. The information system will support the process by prompting
    customers to give service reviews and randomly selecting customers who receive the
    questionnaires. Moreso, it will keep records of the users, personal data like email and age and
    monitor the use of the bike rental services per user.
    Billing
    The billing process will occur after a bike return. The process will be system initiated to
    improve efficiency. Thus, once a customer returns a bike to a docking station, the mobile app
    will request them to pay. The amount applicable is subject to the time a user had the bike and if
    there are fines. The group should provide various payment methods that customers can choose
    from as it eases checkout and convenience (Koksal, 2019). Partnerships with mobile payment
    apps can aid in promoting a cashless and seamless transaction. Cash and card payments can be
    made at the stations to provide users with alternatives. The billing process begins upon booking a
    bike or unlocking it from the docking station. At that point, the user should have an annual
    subscription or a day pass. The information system will support the billing process in various
    ways. First, it will keep records of customers who have subscriptions and those who need a day
    pass. Second, the system will track when a bike was unlocked and when it was returned. The
    information will be used to calculate the amount that a customer will pay. Also, the system will
    provide the customer with a bill breakdown, including the duration of riding and any extra
    3
    charges that apply. All the payment methods will be system-supported, ensuring updates are
    made and thank you messages sent once the user clears the bill. Ultimately, the information
    system will significantly improve the process and promote customer satisfaction.
    Feedback:

    Consider the service you will provide and the operations that will sustain the competitive
    advantage or create a business value through technology. Through a specific experience,
    value can be gained over competitors.

    Focus on the items that can inform and impact business decisions.

    Consider how you can create value through technology by analyzing business processes.
    References
    Koksal, I. (2019, August 31). Why Businesses Need Diverse Payment Options. Forbes. Retrieved
    January 12, 2023, from https://www.forbes.com/sites/ilkerkoksal/2019/08/31/whybusinesses-need-diverse-payment-options/?sh=6c08e1437ebd
    Nasr, L., Burton, J., Gruber, T., & Kitshoff, J. (2014). Exploring the Impact of Customer
    Feedback on the Well-being of Service Entities. Journal of Service Management, 25(4),
    531–555. https://doi.org/10.1108/josm-01-2014-0022
    1
    IS Architecture and Rationale
    Architecture is one of the significant aspects when designing an information system for a
    bike-sharing system. Although the group can adopt different architectural models, a
    decentralized model is best. The model can be integrated with a Customer Relationship
    Management (CRM) system to provide holistic experiences for the users and owners of the
    system. According to Guo et al. (2018), most bike-sharing systems are centralized, which has led
    to increased vandalism and leak of user information. The leakage is associated with the risks and
    exposure of the server in a centralized system. Therefore, there is a need to prevent exposure,
    which can be done by adopting a decentralized IS architecture model. A decentralized model is
    reliable as the connection to the network is maintained when there is an issue with part of the
    network or server. Indeed, it guaranteed continuous service delivery and support of the system.
    Additionally, a decentralized system can act as a strategy for attracting and retaining
    regular bike users. Such is through an increased sense of data safety and privacy, increasing
    users’ trust. Guo et al. (2018) explain that centralized bike-sharing systems are characterized by
    data processing problems when a computing mode is paralyzed. In turn, it paralyzes the system,
    eventually leading to the loss of users. Based on the downsides of the centralized bike-sharing
    systems, a decentralized model must be adopted to help avoid the problems and guarantee
    success. Furthermore, decentralized models are best suited as they utilize blockchain technology.
    The technology adds various benefits, including real-time monitoring of users’ data and
    transactions (Guo et al., 2018). Notably, it will significantly improve the experience when paying
    bills once the user returns the bike to the docking station. The real-time feature also ensures that
    the organization can track the bikes’ location at all times. Such is beneficial in cases where users
    unlock a bike in one station and return it in another.
    2
    Blockchain technology’s decentralized systems help trace parties that divulge user data.
    Such is vital in removing them from the bike-sharing sharing system and taking legal action
    when necessary. Also, the technology aids in recording real-time information that generates
    credit scores. The credit scores awarded to users determine whether they should be allowed to
    access bike-sharing services. Denying access to those with lower credit scores guarantees a
    reduced loss of shared bicycles. In turn, it saves the organization from replacement costs incurred
    after losses. The selected architecture is also beneficial because it supports distributed storage,
    reducing pressure on a central server (Guo et al., 2018). Although a cloud model may function
    similarly to a decentralized one, the number of users accessing the system at a given time may
    not need the scale the cloud system offers. Moreover, a decentralized system is cheaper, saving
    on the initial setup cost.
    Software, Database, and Hardware Components
    The bike-sharing system will require various software, database, and hardware
    components to be fully functional. Notably, hardware comprises the physical features of the
    system. They will include bikes, docking stations, racks, computers, servers, mobile devices,
    GPS trackers, and network equipment like routers. The hardware will provide the framework of
    the system, as the software components will significantly depend on it. The hardware
    components must also meet the required specifications for efficiency. For instance, the correct
    design of bike racks must be installed at the docking stations to ensure bikes fit in and the lock
    mechanisms are functional. Similarly, computers and servers play an essential role in the bikesharing system. Therefore, the organization will have to conduct industry research to determine
    the specifications best suited for the information system. It will ensure that informed decisions
    are made during the purchase. Also, housing the hardware components is vital to protect them
    3
    from extreme weather conditions. For instance, the locks and racks need to be weather-sealed
    and powder coated to increase durability.
    The IS software components include the programs like the operating system, Mobile app,
    tracking software, billing interface, and admin software at the docking stations. Both system and
    application software will help accomplish all business processes and control activities. The
    essential functions will involve user management, billing, file management, and memory
    performance. The mobile app will be available on Appstore and google play store for users to
    install. The app will be used in different processes, including user registration, unlocking bikes,
    and billing. However, the docking stations will be equipped with admin software and computers
    to serve customers without mobile devices when renting a bike. The tracking software will
    monitor bicycle location and provide real-time rider information. Thus, the administrators will
    know the bike locations and identify users who have not returned their rented bikes within the
    stipulated timelines. In such a case, the admin software will automatically impose a fine on the
    particular user. Bluetooth wireless connection aid in transmitting signals that activate the lock
    mechanism in the docking station (Liu, 2018). For example, when a rider returns the bike and
    checks out, a signal will be transmitted via Bluetooth, prompting the lock mechanism to secure
    the bike at the rack. QR codes will also be available for locking and unlocking the bikes.
    The database will also be central to the system’s business processes. As Vaishnavi (2020)
    notes, a database is a collection of organized information that can be easily accessed, managed,
    and updated. It can be accessed electronically from a computer system and is controlled by a
    database management system. The group must conduct market research to determine the best
    database type that suits the bike-sharing system. A database has five major components:
    hardware, software, data, procedures, and database access language. The hardware consists of
    4
    electronic devices that provide storage and act as the interfaces between systems and computers.
    On the other hand, software is a set of programs that control and manage the database. The
    software will include DBMS, operating systems, network software, and application programs.
    Network software is used to share data with other users, while the applications help access the
    data. Data is the third component of the database. According to Vaishnavi (2020), it refers to
    information that needs to be organized and processed. Therefore, database dictionaries are used
    to centralize, document, control, and coordinate the use of data.
    The procedure component of databases involves the instructions used in the management
    of the system. Some of the instructions encompass setup and installation details, instructions to
    log in and log out, manage operations, take data backups, and generate reports(Vaishnavi, 2020).
    Notably, the procedures act as guidelines for the database administrators and provide new
    administrators with a reference point. Its existence helps execute all processes effectively. The
    last component of the database is the access language. It is used to write commands, access,
    update, and delete stored data. The language allows administrators to execute various functions
    within the system and display results in user-readable formats. For the bike-sharing system, the
    database components will support business operations to give users better experiences and allow
    optimal information system functioning.
    Feedback:

    Are there any vulnerabilities inherent within the design? How will you mitigate them?

    The course project should be supported with descriptions of the architecture and discuss the
    data flow between the Information system and the architecture or components to support
    the established business processes. Consider contingencies and how other outages,
    situations, and vulnerabilities could affect your operations. Make sure to explicitly describe
    5
    the advantages and disadvantages inherent in your design and discuss the you chose this
    type.

    Be explicit both in your diagram and description of resources. Explain your consideration
    for contingencies and ensure a review of confidentiality, availability, and Integrity. How
    will data flow throughout your design?

    Consider the architecture and contingencies. Should it be redundant? Would that be part of
    your infrastructure planning? Discuss the hardware and software and how they will
    integrate.
    The architecture of the System
    Information system architecture represents business processes, procedures, data flow,
    structure, and design. The hardware and software components of the system are also included in
    its architecture. Notably, the system structure and interaction with various elements provide an
    understanding of the system’s functionality.
    6
    Figure 1: Architecture of the system
    References
    Guo, H., Zhou, J., Wang, J., & Wang, X. (2018). A Bike Sharing System Based on Blockchain
    Platform. MATEC Web of Conferences, 232, 01027.
    https://doi.org/10.1051/matecconf/201823201027
    Liu, L. (2018). Smart Control Components and Bicycle Sharing Systems. Proceedings of the
    2018 8th International Conference on Manufacturing Science and Engineering (ICMSE
    2018), 164, 667–670. https://doi.org/10.2991/icmse-18.2018.122
    Vaishnavi, M. R. (2020). What is a Database? Know the Definition, Types & Components.
    Edureka. Retrieved January 20, 2023, from https://www.edureka.co/blog/what-is-adatabase/
    1
    Information Security Risks
    Information Security (IS) risk is the dangers associated with the use, management, and
    environments of information systems pose to an organization and its stakeholders. It overlaps
    with many other types of risk when examining the possible consequences of a security-related
    incident (McIlwraith, 2021). This essay discusses the main security risks, potential
    consequences, strategies to minimize them, and a proposed information management structure.
    Main Security Risks and their Potential Consequences
    Human Error
    Human error is one of the causes of unintentional or complacency data breaches when it
    pertains to cybersecurity. It entails downloading malware, using a password that is not strong,
    exposing one’s Internet Protocol (IP) address, and failing to update one’s software.
    Malicious Insiders
    A malicious insider is someone who purposefully abuses insider access to a company’s
    proprietary information to damage the company’s reputation. This person could be a business
    partner, a contractor, or an employee.
    Phishing
    Ransomware has quickly taken over as the primary method for cybercriminals to attack
    organizations and infect them with malware. Phishing is one of the most common methods they
    use. Attacks work by infecting a target organization with malware that spreads through its
    systems, encrypts data, and compels the victim to stop using those systems for operations (Ikhsan
    & Ramli, 2019). The thieves then send the organization a ransom demand, demanding payment
    for the decryption key.
    2
    Strategies to Minimize Security Risks
    Although it is in everyone’s nature to make mistakes, staff must be aware of the most
    crucial information security components. All employees, technical or not, must get familiar with
    the organization’s security rules and practices in the interim (McIlwraith, 2021). Doing this will
    help reduce risks brought by human error. In addition, it is surprising to many businesses that
    risks from negligent or malicious insiders are equally deadly and frequent as attacks from outside
    the company. To stop a malicious insider from launching an attack, organizations need ways to
    stop data breaches through email, identify questionable content in emails, and limit internal
    communications.
    Finally, multi-factor authentication, email spam filtering, and anti-virus software are
    some of the methods to prevent phishing in an organization. It is crucial to regularly test the
    recovery and restoration procedure built into one’s system and to have regular backups to support
    one’s data. Also, training staff and employees on how to detect phishing scams is another way to
    prevent falling prey to phishing scams.
    Structure of Information Security Management
    Information security teams may have different roles and duties depending on the
    organization. An example layout of several functional roles and related duties in creating a
    typical information security team structure is as follows. The senior management incorporates
    various organizational roles like the Chief Information Security Officer (CISO) and includes
    individuals in charge of overarching information security obligations. Information system
    security experts are in charge of developing, implementing, overseeing, and reviewing the
    organization’s security policies, standards, baselines, processes, and guidelines (Mirtsch, Kinne,
    & Blind, 2020). Data owners are responsible for ensuring, among other things, that the
    3
    appropriate security—consistent with the company’s security policy—is incorporated into their
    data systems. Also, the following responsibilities fall under the purview of IS auditors: Providing
    independent assurance to management regarding the compatibility of the security objectives and
    assessing the suitability and effectiveness of the security policy, standards, baselines, procedures,
    and guidelines in order to meet the organization’s security objectives.
    Feedback:

    Hint at a more global and structured approach. Security frameworks exist to impact the
    information more holistically. They can align to any architecture and tailored to
    vulnerabilities inherent to design. There are many areas of security to consider that must
    align with the course project. Consider expanding your research.

    Significant but state how this relates to the architecture you will be using. Focus on your
    design and project delivery. How am I aligning governance, Industry best practices,
    architecture, security, and development to work together? The wise then changes as you
    will then see beyond common threats.
    In conclusion, information system security plays an essential role in any organization.
    Therefore, organizations should assess their vulnerability to security breaches and put up
    measures to safeguard their data.
    4
    References
    Ikhsan, M. G., & Ramli, K. (2019, June). Measuring the Information Security Awareness Level
    of Government Employees Through Phishing Assessment. In 2019 34th International
    Technical Conference on Circuits/Systems, Computers and Communications (ITCCSCC) (pp. 1-4). IEEE. https://doi.org/10.1109/ITC-CSCC.2019.8793292
    Mirtsch, M., Kinne, J., & Blind, K. (2020). Exploring the Adoption of the International
    Information Security Management System Standard ISO/IEC 27001: A Web MiningBased Analysis. IEEE Transactions on Engineering Management, 68(1), 87-100.
    https://doi.org/10.1109/TEM.2020.2977815
    McIlwraith, A. (2021). Information Security and Employee Behaviour: How to Reduce Risk
    Through Employee Education, Training and Awareness. Routledge.
    https://doi.org/10.4324/9780429281785
    1
    Flow Chart
    Enter to the system
    Subscription
    _Status==2
    Daily
    Subscription Status
    Set the Plan:
    Daily
    Subscription
    Annual
    Subscription
    _Status==1
    Set the Plan:
    Annual
    Subscription
    Get pick up
    and drop off
    time
    Calculating and
    displaying for
    the each ride
    2
    Flow Chart: Ride Cost_Calc Function
    Function rid_costcalc
    ride_time=drop_off_time
    pickup_time
    ride_cost=0
    ride_time

    Still stressed from student homework?
    Get quality assistance from academic writers!

    Order your essay today and save 25% with the discount code LAVENDER