SlideShare una empresa de Scribd logo
1 de 6
-Running head: RIORDAN MANUFACTURING SR-22 -2 Part         1




                      Riordan Manufacturing SR-22 2 Part

                               Reinaldo Burgos

                                   BSA375

                              December 09, 2012

                                Ilka Kawashita
RIORDAN MANUFACTURING SR 22- 2 Part                                                                 2




                        Riordan Manufacturing Service Request 22 2 Part

       After theprevious meeting we discussed many important subjects that required additional

research to present the safe way to process the transitions of new changes. Alsowe had reviewed

different data flow that will work in the best of improve the proper handling between Riordan

Manufacturing and the plants related to ensure the best relation between each department. It will

improve the communication in Riordan and save money and time after the final implementation.

                                        Security Controls


   Security should be a high level of concern in any project. "Security is primarily the

responsibility of the operations group, which consist of the staff responsible for installing and

operating security controls such as firewalls, intrusion detection systems, and routine backup and

recovery operations" (Dennis, Wixom, & Roth, 2009). However, system developers also have a

responsibility when it comes to security; especially within the information systems.


   Data: All data must be kept secure and confidential. Any company data including company

policies and procedures, as well as, employee data containing employment information will be

held responsible under Riordan Manufacturing. Any forms of data that belong to the company

are proprietary; therefore, data encryption and passwords will be utilized to allow authorization

to access the data. If any form of data were to be intercepted into the wrong hands, this can be

detrimental to the organization. “Lawsuits alone would easily exceed $10 million and the cost of

staff to find and reenter paper records would be enormous and certainly would take more than a

few weeks" (Dennis, Wixom, & Roth, 2009).
RIORDAN MANUFACTURING SR 22- 2 Part                                                                 3




       Processes:Some processes, such as the application process would benefit from using

third-party software. This will allow Riordan Manufacturing to have the security guarantee from

the third-party vendor. Using COTS will allow Riordan Manufacturing to save time because

programs are already developed and can get some training and services included in them, and it

will be a long term investment that will also save money. For any additional program or software

that need to cover special projects can be consider an in-house development.


       Interfaces: "Interface design is the process of defining how the system will interact with

external entities e.g., customers, suppliers, other systems" (Dennis, Wixom, & Roth, 2009).

System interfaces are also capable of exchanging information with other systems andtherefore

require a high level of security. This security can be achieved by incorporating password

requirements to unlock confidential and private documents, such as employee files and company

tax records. This would help prevent internal security threats of employees attempting to access

another employee's computer.


       Network:One recommendation is to incorporate a company-widedatabase, accessible

only via a virtual local area network (VLAN), which allows employees to view and update some

basic level information that would be subject to verification by a payroll clerk or supervisor.

Such access will required security protection thru the use of username and password. To obtain

more detailed informationit will required an authorized payroll clerk or supervisor. At the same

time, to obtain that information is important to provide three-factor authentication method: such

as username with password and a fingerprint scan to obtain those highly confidential records. In

addition, the third-party organizations that administer Riordan employee’s benefits such as their
RIORDAN MANUFACTURING SR 22- 2 Part                                                               4




health benefits and workers compensation should be audited on a yearly basis for accuracy and

competitiveness. It will ensure the utilization of the most accurate processes within

theorganization.


                                 Physical Data Flow Diagrams


       While designing the application logic of the information system, the implementation

decisions describing how the system will work. Physical data flow diagrams show these

implementation details, including “data stores that refer to files and database tables, programs or

human actions that perform processes, and the physical transfer media for the data flows”

(Dennis, Wixom, & Roth, 2009). Maintaining a clear and proper implementation it will provide

the service expected with the simple and clear results.(TIBCO Software Inc., 2001)
RIORDAN MANUFACTURING SR 22- 2 Part                                                                  5




       After this process there will be a new meeting next week to discuss any additional

information about the process and implementation of final changes. Riordan is seeking to resolve

those issues in the short time as possible and we will ensure to satisfy all the needs in the safe

and secure process.
RIORDAN MANUFACTURING SR 22- 2 Part                                                             6




                                          References

Apollo Group, Inc. (2012). Virtual Organization Portal: Riordan Manufacturing. Retrieved from


       https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/index.asp


Dennis, A., Wixom, B. H., & Ruth, R. M. (2012).Systems Analysis and Design (5th ed.).


       Retrieved from the University of Phoenix eBook Collection database.


Khosrowpour, M. (1999). Managing information technology resources in organizations in the


       next millennium. Idea Group Inc (IGI).

Riordan Manufacturing. (2012). Retrived July 28, 2012, from


       https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/index.asp


TIBCO Software Inc. (2001). Business process. (pp. 10-15). Palo Alto, CA: Global
       Headquarters. Retrieved from http://www.tibco.com/multimedia/business-process-
       design_tcm8-2399.pdf

Más contenido relacionado

La actualidad más candente

Smart factory Solution from InTouch Systems Pvt. Ltd.
Smart factory Solution from InTouch Systems Pvt. Ltd.Smart factory Solution from InTouch Systems Pvt. Ltd.
Smart factory Solution from InTouch Systems Pvt. Ltd.
Sanjay Singh
 
Sushant edp
Sushant edpSushant edp
Sushant edp
zalak007
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
Rikesh Chaurasia
 
'Electronic Batch Process recording system
'Electronic Batch Process recording system'Electronic Batch Process recording system
'Electronic Batch Process recording system
anusa
 
Equipment manager for ems
Equipment manager for emsEquipment manager for ems
Equipment manager for ems
Dynamic Systems
 

La actualidad más candente (20)

Smart factory Solution from InTouch Systems Pvt. Ltd.
Smart factory Solution from InTouch Systems Pvt. Ltd.Smart factory Solution from InTouch Systems Pvt. Ltd.
Smart factory Solution from InTouch Systems Pvt. Ltd.
 
Sushant edp
Sushant edpSushant edp
Sushant edp
 
Computerised Accounting System
Computerised Accounting SystemComputerised Accounting System
Computerised Accounting System
 
James hall ch 1
James hall ch 1James hall ch 1
James hall ch 1
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
 
Ais Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleAis Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production Cycle
 
Management Information System-Process Control system
Management Information System-Process Control systemManagement Information System-Process Control system
Management Information System-Process Control system
 
Erp (Enterprise Resource Planning)
Erp (Enterprise Resource Planning)Erp (Enterprise Resource Planning)
Erp (Enterprise Resource Planning)
 
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
 
'Electronic Batch Process recording system
'Electronic Batch Process recording system'Electronic Batch Process recording system
'Electronic Batch Process recording system
 
James hall ch 7
James hall ch 7James hall ch 7
James hall ch 7
 
Introduction to computerised accounting
Introduction to computerised  accountingIntroduction to computerised  accounting
Introduction to computerised accounting
 
Computerised accounting plus_one_chap_12_15_2
Computerised  accounting plus_one_chap_12_15_2Computerised  accounting plus_one_chap_12_15_2
Computerised accounting plus_one_chap_12_15_2
 
LUBRILYS - LUBRICATION MANAGEMENT SOFTWARE
LUBRILYS - LUBRICATION MANAGEMENT SOFTWARELUBRILYS - LUBRICATION MANAGEMENT SOFTWARE
LUBRILYS - LUBRICATION MANAGEMENT SOFTWARE
 
INTRODUCTION TO COMPUTER BASED ACCOUNTING
INTRODUCTION TO COMPUTER BASED ACCOUNTINGINTRODUCTION TO COMPUTER BASED ACCOUNTING
INTRODUCTION TO COMPUTER BASED ACCOUNTING
 
Equipment manager for ems
Equipment manager for emsEquipment manager for ems
Equipment manager for ems
 
Ch07
Ch07Ch07
Ch07
 
Accounting system and control
Accounting system and controlAccounting system and control
Accounting system and control
 
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
 
Accounting information system
Accounting information systemAccounting information system
Accounting information system
 

Similar a Rioldan manufacturing service_request_22_part2(1)

The Proposed Business Process Changes For The System In Riordan .docx
The Proposed Business Process Changes For The System In Riordan .docxThe Proposed Business Process Changes For The System In Riordan .docx
The Proposed Business Process Changes For The System In Riordan .docx
ssusera34210
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
Tiffany Graham
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 

Similar a Rioldan manufacturing service_request_22_part2(1) (20)

The Proposed Business Process Changes For The System In Riordan .docx
The Proposed Business Process Changes For The System In Riordan .docxThe Proposed Business Process Changes For The System In Riordan .docx
The Proposed Business Process Changes For The System In Riordan .docx
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service provider
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps  - SharePoint Fest DCUnderstanding Federal IT Compliance in Three Steps  - SharePoint Fest DC
Understanding Federal IT Compliance in Three Steps - SharePoint Fest DC
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
Blockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT DevicesBlockchain Technology using System Requirement Specification and IoT Devices
Blockchain Technology using System Requirement Specification and IoT Devices
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISCASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the Cloud
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Rioldan manufacturing service_request_22_part2(1)

  • 1. -Running head: RIORDAN MANUFACTURING SR-22 -2 Part 1 Riordan Manufacturing SR-22 2 Part Reinaldo Burgos BSA375 December 09, 2012 Ilka Kawashita
  • 2. RIORDAN MANUFACTURING SR 22- 2 Part 2 Riordan Manufacturing Service Request 22 2 Part After theprevious meeting we discussed many important subjects that required additional research to present the safe way to process the transitions of new changes. Alsowe had reviewed different data flow that will work in the best of improve the proper handling between Riordan Manufacturing and the plants related to ensure the best relation between each department. It will improve the communication in Riordan and save money and time after the final implementation. Security Controls Security should be a high level of concern in any project. "Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations" (Dennis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security; especially within the information systems. Data: All data must be kept secure and confidential. Any company data including company policies and procedures, as well as, employee data containing employment information will be held responsible under Riordan Manufacturing. Any forms of data that belong to the company are proprietary; therefore, data encryption and passwords will be utilized to allow authorization to access the data. If any form of data were to be intercepted into the wrong hands, this can be detrimental to the organization. “Lawsuits alone would easily exceed $10 million and the cost of staff to find and reenter paper records would be enormous and certainly would take more than a few weeks" (Dennis, Wixom, & Roth, 2009).
  • 3. RIORDAN MANUFACTURING SR 22- 2 Part 3 Processes:Some processes, such as the application process would benefit from using third-party software. This will allow Riordan Manufacturing to have the security guarantee from the third-party vendor. Using COTS will allow Riordan Manufacturing to save time because programs are already developed and can get some training and services included in them, and it will be a long term investment that will also save money. For any additional program or software that need to cover special projects can be consider an in-house development. Interfaces: "Interface design is the process of defining how the system will interact with external entities e.g., customers, suppliers, other systems" (Dennis, Wixom, & Roth, 2009). System interfaces are also capable of exchanging information with other systems andtherefore require a high level of security. This security can be achieved by incorporating password requirements to unlock confidential and private documents, such as employee files and company tax records. This would help prevent internal security threats of employees attempting to access another employee's computer. Network:One recommendation is to incorporate a company-widedatabase, accessible only via a virtual local area network (VLAN), which allows employees to view and update some basic level information that would be subject to verification by a payroll clerk or supervisor. Such access will required security protection thru the use of username and password. To obtain more detailed informationit will required an authorized payroll clerk or supervisor. At the same time, to obtain that information is important to provide three-factor authentication method: such as username with password and a fingerprint scan to obtain those highly confidential records. In addition, the third-party organizations that administer Riordan employee’s benefits such as their
  • 4. RIORDAN MANUFACTURING SR 22- 2 Part 4 health benefits and workers compensation should be audited on a yearly basis for accuracy and competitiveness. It will ensure the utilization of the most accurate processes within theorganization. Physical Data Flow Diagrams While designing the application logic of the information system, the implementation decisions describing how the system will work. Physical data flow diagrams show these implementation details, including “data stores that refer to files and database tables, programs or human actions that perform processes, and the physical transfer media for the data flows” (Dennis, Wixom, & Roth, 2009). Maintaining a clear and proper implementation it will provide the service expected with the simple and clear results.(TIBCO Software Inc., 2001)
  • 5. RIORDAN MANUFACTURING SR 22- 2 Part 5 After this process there will be a new meeting next week to discuss any additional information about the process and implementation of final changes. Riordan is seeking to resolve those issues in the short time as possible and we will ensure to satisfy all the needs in the safe and secure process.
  • 6. RIORDAN MANUFACTURING SR 22- 2 Part 6 References Apollo Group, Inc. (2012). Virtual Organization Portal: Riordan Manufacturing. Retrieved from https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/index.asp Dennis, A., Wixom, B. H., & Ruth, R. M. (2012).Systems Analysis and Design (5th ed.). Retrieved from the University of Phoenix eBook Collection database. Khosrowpour, M. (1999). Managing information technology resources in organizations in the next millennium. Idea Group Inc (IGI). Riordan Manufacturing. (2012). Retrived July 28, 2012, from https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/index.asp TIBCO Software Inc. (2001). Business process. (pp. 10-15). Palo Alto, CA: Global Headquarters. Retrieved from http://www.tibco.com/multimedia/business-process- design_tcm8-2399.pdf