University Database Application Report: ACCT6001 Project Management

Verified

Added on  2020/04/15

|7
|774
|268
Report
AI Summary
This report presents a database application designed for a project management company, addressing the need for efficient data tracking and management. It begins by justifying the use of a database to handle project details, employee assignments, and material information. The core of the report includes an Entity-Relationship (ER) diagram and a relational schema to illustrate the database structure. Furthermore, it outlines necessary IT controls to ensure data security and integrity, covering aspects like access controls and data encryption. The report also discusses critical ethical, privacy, and security issues related to database implementation, such as data breaches and unauthorized access. Finally, it provides a bibliography of relevant sources supporting the analysis and design of the database application, demonstrating the student's understanding of database principles and practical application within a business context.
Document Page
Running head: DATABASE APPLICATION
ACCT6001 Accounting Information Systems
Student Name:
University Name:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1DATABASE APPLICATION
Table of Contents
1. Introduction..................................................................................................................................2
2. Justification of the use of database..............................................................................................2
3. Database Design: E-R Diagram...................................................................................................3
3.1 ER Diagram...........................................................................................................................3
3.2 Relational Schema.................................................................................................................4
4. IT controls needed.......................................................................................................................4
5. Ethical, privacy and security issues.............................................................................................5
Bibliography....................................................................................................................................7
Document Page
2DATABASE APPLICATION
1. Introduction
The aim of this paper is to demonstrate the ability of solving problems related to business
with the help of database design tool and software. This paper also focuses on illustrating the
impacts of using IT (Information Technology) in business and reflecting the key issues. There is
a need of accurate recording, updating and tracking of data by various businesses so that the
employees can access the data with the help of database. Hence, in this paper a database is
designed in context to a project management company for tracking its commercial projects,
employee and the employees’ participation in each project.
2. Justification of the use of database
The project management company handles various ongoing projects at a same time hence
it is essential for project leaders to know the team members who are associated with a particular
project. The database to be will help to keep track of the data on each employee that is associated
with a project or employees that have not been assigned to any project. The database will also
help to record each project being undertaken by the company along with the activities that are
associated with the project. The description of project will comprise of the list of associated
activities and each activity will require some materials so that information will be also stored in
the database. The supplier information of materials will be also recorded in the database to keep
track of which materials are being delivered by which supplier. Hence, there is a need for
database to keep track of every information that is associated with each project.
Document Page
3DATABASE APPLICATION
3. Database Design: E-R Diagram
3.1 ER Diagram
Figure 1: ER diagram for the database
(Source: Created by Author)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4DATABASE APPLICATION
3.2 Relational Schema
Figure 2: Relational schema of the database
(Source: Created by Author)
4. IT controls needed
The IT controls that are needed for implementation of database in the organization are
listed as below:
Foundation: A stable and functioning operating environment have to be maintained for
users as well as application systems so that is available 24 hours for 7 days in a week1. Proper
security measures have to be adopted for protecting information and transactions being carried
out over the internet or any insecure environment.
1 Erez Shmueli and others, 'Implementing A Database Encryption Solution, Design And Implementation
Issues' (2014) 44 Computers & Security.
Document Page
5DATABASE APPLICATION
Access controls: Specific users should be provided with separate access to data
individually as per requirement or role of user. Proper authentication measures have to be
implemented within the organization so that unauthorized access to sensitive data or information
is prevented.
Data Encryption: An additional security measure to prevent data breach is to encrypt the
data being stored or during transmission2. Proper encryption and decryption method have to be
followed so that the data is secure from external threat.
5. Ethical, privacy and security issues
Ethical issues: This issue relates to information that must be stored or not in a database3.
Such as some sensitive information that is not required to be stored in the database goes into
wrong hands then it may hamper security of the organization.
Privacy issues: This issue relates to the identity theft such as there may be data leakage
of the employee or supplier information. Further, the project information may be also leaked if
the database is accessed by external threat.
Security issues: The information of customers or clients is a valuable asset for any
organization and if an attacker can get into the database system then the sensitive information
may be leaked4.
2 Elisa Bertino, 'Editorial: Introduction To Data Security And Privacy' (2016) 1 Data Science and
Engineering.
3 S Balamurugan and S Charanyaa, Principles Of Database Security (Scholars' Press 2014).
4 Ben Densham, 'Three Cyber-Security Strategies To Mitigate The Impact Of A Data Breach' (2015) 2015
Network Security.
Document Page
6DATABASE APPLICATION
Bibliography
Balamurugan S and Charanyaa S, Principles Of Database Security (Scholars' Press 2014)
Bertino E, 'Editorial: Introduction To Data Security And Privacy' (2016) 1 Data Science and
Engineering
Densham B, 'Three Cyber-Security Strategies To Mitigate The Impact Of A Data Breach' (2015)
2015 Network Security
Shmueli E and others, 'Implementing A Database Encryption Solution, Design And
Implementation Issues' (2014) 44 Computers & Security
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]