6 Jun 2022

393

Defining Information Ownership

Format: Other

Academic level: University

Paper type: Coursework

Words: 649

Pages: 2

Downloads: 0

Introduction 

At XYZ High School, career counseling is a very important activity taken seriously by the career development department. Making good career choices by our student has been one of the schools long term marketing strategy that will that our education system positively impact the lives of our students, the leaders of tomorrow. As such, the school through the help of the Information Technology department has developed a system which will enable the school follows the subjects taken by students and ensure that they match with the career choices made by students. This essay is going to highlight all the processes will be followed in defining information ownership including a CRUD Matrix  and various business rules that define how the system works. 

Identify Create, Update, and Delete Privileges 

Students’ information will be prepared and managed by the career development department. As such career, the career counselors will have the ability to create read and update all students’ information. The candidates or the finalists will present their particulars i.e. their names and ID numbers to the counselors. Under the student’s ID other additional students’ information such as their contact information including, address and phone number will be recorded. After this exercise, students will be assigned different career coaches or counselors in accordance with their interests. The coaches will help the students marry their interests with the career opportunities available and in case of a mismatch of the two; the coach will transfer the student to a different coach who can best assist the student. Once the students have successfully matched their interests to opportunities, the counselor will help the student decide what to do. They must have the aptitude to create the identified Major and Minor of the student. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The career coaches or the counselors will closely monitor the performance of the students through the school year, updating grades and course which the student completes. While the counselors will have the rights to create, read and update the information, they will not have the right actually to delete any of the information entered in the system. This information which will be accessible to the school’s management who during career days or on any occasion can share the information with the student’s parents will not have any other privilege apart from reading the information. The students will also be able to log into the system and assess their development, having only the reading privilege. It’s only the IT department which will have the privilege to delete information which will only take place in the event a student leaves the school in the middle of the high school study. The academic department in close collaboration with the career development department will be responsible for the production of transcripts. 

The CRUD Matrix 

A CRUD matrix is a technique used to form to model procedures and records and how they interrelate with respect to creation, reading, updating and deleting of the records. Knowing the processes which Create, Read, Update, and Delete (CRUD) data helps the database analysts within an institution in storing data and creating processes that successfully manage and control specific data (Oppel, 2004). The school’s CRUD Matrix will require an individual first to log into the website or student portal. It will be as shown below 

Student ID  USER ACTION  Create  Read  Update  Delete 
  Student Detail         
  Student Grades         
  Student career choice         
  Observations made         
  Log out         

Rules of How the System Works 

The CRUD matrix provides a two-dimensional illustration of data and processes and the relationship which exist between the different dimensions in deference to creating, reading, updating, and deleting of data (Collins & Lunsford 2008). All stakeholders will have privileges or access rights but of varying degree. Students will be able to access and read from the matrix by first logging into the portal using the usernames and passwords provided by the IT department, and no student will be allowed to check other student’s portal. The career development department will have automatic access, but their privileges will be limited to create, read and update the information. The school’s management will also have the privilege of reading only. The only department which will be having all the privileges is the IT department. However, their contact with the matrix will only come in when a student leaves the institution. 

References 

Collins, M & Lunsford, D. (2008). The CRUD Security Matrix: A Technique for Documenting Access Rights. Retrieved from https://www.homeworkmarket.com/sites/default/files/qx/15/01/04/05/crudsc2008.pdf 

Oppel, A. (2004). Databases DeMystified . Emeryville: McGraw-Hill. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Defining Information Ownership.
https://studybounty.com/defining-information-ownership-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration