StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Service Request - HR Systems PT.2 - Essay Example

Cite this document
Summary
Name Institution Tutor Date Service Request Describe the architecture and process design Applications can only be designed according to life cycle development intended of the system that include some requirements and several phases like gathering, implementation, design, testing, and maintenance, I describe human resource service request system for Bidco Inc…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Service Request - HR Systems PT.2
Read Text Preview

Extract of sample "Service Request - HR Systems PT.2"

Download file to see previous pages

They can be a presentation done in the data flow diagrams, DFD and their processes. DFD's design allows increasing level of details with each level where they further divide into sub-process until they reach an indivisible sub process. Service Request system will cater for both the employee of the company and visitors who will be visiting the company website. The process design will have two components in which, one will have employee’s data and can only be accessible by the employees through security details.

(Szalapaj, 2005) The second will be open to the visitors and the customer for a service request from the company and those gathering information about the company, its services and products but are not in a state of placing order now. The human resource department will be the general administrator of the system to assign the employee tasks of seeing through the customer request have been the fulfillment. This is the manager’s task who is also an employee of the company. His responsibility includes managing the whole information system, talk with clients, and look into sales, the accounting.

Architecture of this service request system application incorporates both server/client and internet/intranet technology. Professionals in Human resource department will access the system to HR on-line through the web-based service and client/server for human resource functions. By up grading of the HRSR application mostly provides pure internet architecture more stable environment for operation. Added advantage for this is allowing the client or service requester access the application without installing since it is on their web browser.

The system should have the capability to merge HRM processes and activities with the information technology field. (Rosenblatt, 2011) This is where data programming process involves the system into standardized routines and packages of enterprise resource planning (ERP) software. ERP systems software has features of collecting information from different applications into one universal database. This is an added advantage since linkage of human resource modules through one database makes the system application both flexible and rigid.

Highest level of security is a primary advantage of the upgrading of the application. Service request system should remain as a protected application that they afford to it. Introduction of registering or signing up for the accounts, for the purpose accessing system. The upgrading of the system should result to the collection of any new data and the third party would not be in a position to access any new services. The goal of the system should be to deliver service to the customer and the employee that is more efficient, faster and enhances the credibility of the system.

Providing customer and employees, with a mechanism of viewing and updating their own personal information. The goal of service delivery leads to its attainment. The system security administrator will trace system changes to individual system users. Limiting access is a security measure where employees with computerized personnel records do not perform the same functions as their peers. This helps in audit trails and internal security (Accounting: smart Pros: Payroll and security: A Great combination.) The system architecture should have the capability to keep track of the employee information as personal informat

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Service Request - HR Systems PT.2 Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Service Request - HR Systems PT.2 Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1479090-service-request-hr-systems
(Service Request - HR Systems PT.2 Essay Example | Topics and Well Written Essays - 750 Words)
Service Request - HR Systems PT.2 Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1479090-service-request-hr-systems.
“Service Request - HR Systems PT.2 Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1479090-service-request-hr-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Service Request - HR Systems PT.2

Analysis of Decker Repairs

olution: The service bill can be delivered online after the customer confirms the service request to be closed.... From the time of creating a service request and to the final obtaining of the feedback of the customer, it will cater to all.... olution: A web-based system (Client-Server Model)can be developed for the customers to browse the service required and the request can be placed accordingly.... The problem of recording the customer service info is telephonic based which can be problematic with respect to phone line busy due to traffic, phone line damages which hinder loss of customers and requirement of many front desk personnel to handle it....
9 Pages (2250 words) Essay

Computer Network and Management

HTML pages, media stream files, images) passing through it; subsequent requests for any stored web content may be When web cache receives the request, it first examines the cache's inventory of stored objects to verify the existence of the requested web content.... In case if the requested web object is not found, then the web cache transforms and forward the client request to the origin server, receives the response from the origin server, and forwards the response to the client....
28 Pages (7000 words) Case Study

The Development and Implementation of an Inventory Management System

It outlines how pharmaceutical distributors can automate their order processing and inventory management systems, in an effort to improve their performance.... Current pharmaceutical systems are mostly manual; in cases where the systems are automated, they work independently of each other.... The absence of synchrony limits the efficiency of current systems....
11 Pages (2750 words) Research Proposal

Building a Web-Based System To Store Client and Booking Information

This project “Building a Web-Based System To Store Client and Booking Information” shall deliver an integrated system for client contact and profile information, engineer availability, and installation/support guides accessible through a web-based form for Tequme Ltd.... hellip; The project entails the delivery of an integrated system to support the organization's operations, it is assumed that while the main objectives of the project are to improve access to client contact information, engineer availability data, and support and installation guides, the proponent shall entertain user requests for additional system features....
38 Pages (9500 words) Dissertation

Cloud Computing in the IT Industry

Data security is a major concern for users relying on service providers to store their data on the clouds.... ccording to Buyya, Yeo and Venugopal "A Cloud is a type of parallel and distributed system consisting of a collection of interconnected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources based on service-level agreements established through negotiation between the service provider and consumers” (2008, p....
20 Pages (5000 words) Essay

Information Security

This case study "Information Security" focuses on the best practices for the IT systems of an IT solutions firm called Check Point Software Technologies Ltd.... hellip; Information systems are crucial in supporting routine operations within a different organizational context.... In this light, organizations need properly defined and documented guidelines to govern the way of operation of their IT systems to ensure support for business continuity....
22 Pages (5500 words) Case Study

The Design Procedures, and Successful Implementation Principles for Service Oriented Architecture

The business management systems in the system are made in X-Integrate software.... ET framework, helps businesses to be able to integrate the business systems and be able to consequently develop palpable service oriented architectures.... This software has been designed in such a way that it can be able to create solutions which can aid in process communications in heterogeneous systems.... (2006) service-Oriented Architecture (SOA): A Planning and Implementation Guide for Business and Technology2122Service Oriented ArchitectureIntroduction service oriented architecture is lately being acclaimed as the new trend Bell, M....
18 Pages (4500 words) Coursework

Distributed Software Control: A Distributed Computer System

Remote Procedure Call utilizes software to enable part of the hardware to run several operating systems concurrently.... his paper will examine Remote Procedure Call Distributed Computer System, its mechanism, and related systems.... It will also touch on data presentation systems in the Remote Procedure Call and source code compilation.... hellip; The characteristics of cloud computing include on-demand self-service, and measured value, among others....
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us