Analysis of IT System Issues at Red Star College: Solutions

Verified

Added on  2022/08/25

|5
|555
|28
Homework Assignment
AI Summary
This assignment analyzes the outdated IT system of Red Star College, a private school facing significant challenges due to its 1995 IT infrastructure. The student addresses the college president's request by listing the crucial reasons for implementing a new IT system, emphasizing issues like an old database, security vulnerabilities, and the inability to meet student and faculty technical requirements. The solution then proposes a series of IT-related changes, including database upgrades, online class scheduling, registration systems, and social network enhancements, assigning a relative importance weight to each. The assignment highlights the need for a modern IT structure to improve database management, security, and overall operational efficiency. A Fishbone diagram is also included to illustrate the IT issues. The solution uses references to support the arguments and recommendations for the college.
Document Page
Running head: IT TECHNOLOGY MANAGEMENT
IT TECHNOLOGY MANAGEMENT
Name of the Student:
Name of the University:
Author’s Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
IT TECHNOLOGY MANAGEMENT
Answer 1:-
The IT system of Red star college is ancient, and that is the reason they are facing some most
significant difficulties. At this moment, the college authority is trying to evolve modern IT
systems (Aradau et al., 2014). That's why IT project listing is very much relevant. New IT
system is essential in this college because their system database is too much old and security
measurement is also not up to the mark. If they are not implementing new IT structure, then any
person can hack their official database and manipulate student record. The college authority also
not fulfil the student and faculty's technical requirement, and that is very important for education
(Gill, 2014). The current system is very much helpful for the correct data calculation purpose. So
a modern IT system is essential to enhance the college’s internal and external database and
security structure.
Answer 2:-
If these Red star college is implementing modern IT structure, then they should include below
mentions requirement.
Old requirement Modern implementation Upgrade/Purchase Rating
Student database System up-gradation keep student
data properly
Upgrade student database daily 8
HR Implement daily attendance tracker
(Biometric),
Automatic attendance
Purchase online attendance
tracking biometric software
7
Class scheduling Implement online class scheduling
process and also upgrade daily class
Purchase new tracking 8
Document Page
2
IT TECHNOLOGY MANAGEMENT
scheduling tracker software and update it daily.
Registration systems Implement online registration
systems.
Implement online exam fees and
exam form fill-up systems.
Upgrade the registration
system database and hire a
developer who develops these
new features for providing
excellent student facilities
(Ermakov et al., 2014)
9
College social network Create a good structure social
network pages by a professional
programmer. This social page can
enhance a college's fame among the
students and guardians.
Create a social network page
and hire professional social
account handler who upgrade
the college’s facilities and
replay the student feedback
daily basis.
8
Student grade Implement online student grade
calculator which is accurate and
perfect
Purchase online grade
calculation software and
handle it securely
9
Answer 3:-
Following Fishbone diagram deliver IT issues of this college.
Document Page
3
IT TECHNOLOGY MANAGEMENT
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
IT TECHNOLOGY MANAGEMENT
References:-
Aradau, C., Huysmans, J., Neal, A., & Voelkner, N. (Eds.). (2014). Critical security methods:
New frameworks for analysis. Routledge.
Ermakov, S. A., Zavorykin, A. S., Kolenbet, N. S., Ostapenko, A. G., & Kalashnikov, A. O.
(2014). Optimization of expert methods used to analyze information security risk in
modern wireless networks. Life Science Journal, 11(10), 511.
Gill, M. (2014). Exploring some contradictions of modern-day security. In The handbook of
security (pp. 980-1000). Palgrave Macmillan, London.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]