Wednesday, June 12, 2019

Software System Development Essay Example | Topics and Well Written Essays - 1250 words

Software System Development - Essay ExampleThis pejorative grade of the noun hack is even used among users of the positive sense of hacker.The nuclear power plants project manager who has already entered into contract with the software house should reach considered all the aspects of software house before awarding the contract. Though the nuclear power plant has every right to question and pack the details of the employees works with the software house, however the software house need not provide the data as they feel it as a trade secret. The Project coach being a higher official is not entitled to hack the database of the supplier company and grab the details on the basis of ex-employees information. This is a pretty practice on the part of buyer. This type of action would affect buyer-seller relationship among the firms. For effective business process the exchange partners should have mutual trust and cooperation. accord to Moorman, Deshpande, and Zaltman (Moorman et al, 1993 ) trust is willingness to rely on an exchange partner in whom one has confidence. According to Achrol (Achrol et al, 1991), Morgan and Hunt trust is a major determinant of relationship commitment. and so the decision of Project Manager to hack the database of software house can be considered as breach of trust. The Project Manager instead of hacking the database can demand the software house to prove their employees skills to complete the project through negotiations. It would be onus duty on the part of supplier to prove his capabilities. The action of hacking is against legitimate procedures and the trespasser can be prosecuted under the following cyber laws Under Computer Fraud and Abuse Act (as amended Oct. 3, 1996) section 1030,a hacker is liable to be punished for knowingly and intent to defraud, accesses a protected computer without authorizationIn Western Australia under section 440A of criminal code under the head word unlawful operation of a computer system. The hacker c an be prosecuted. (www.aic.gov.au ,11,2006)References1. Network Security and Ethical Hacking by Rajat Khare, 1st Edition, 2006.2. Factors affecting the trust in marketplace research relationships by Moorman, Deshpande, and Zaltman. Journal of Marketing, 57(January), 81-101.3. Evolution of the marketing organization by Achrol .Journal of Marketing, 55(October), 77-93.Answer 2System Development Life Cycle (SLDC) is a bodily structure imposed on the development of a software product. SLDC has three primary objectives ensure that high quality systems are delivered, providing strong management controls over the projects, and increase the productivity of the systems staff. In order to meet these objectives the SLDC has many specific requirements it must meet including being able to support projects and systems of various scopes and types, supporting all of the technical activities, supporting all of the management activities, being highly usable, and providing guidance on how to insta ll it.The technical activities include system definition, that is, analysis, design, coding, testing, system installation ( Training, data

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.