Friday, April 26, 2019
Software System Development Essay Example | Topics and Well Written Essays - 1250 words
Software System Development - Essay eventThis pejorative form of the noun hack is even used among users of the positive sense of hacker.The nuclear forcefulness plants project manager who has already entered into contract with the software endure should have considered all the aspects of software house before awarding the contract. Though the nuclear power plant has every right to question and posit the details of the employees working with the software house, however the software house need not provide the data as they feel it as a trade secret. The Project Manager being a high official is not entitled to hack the database of the supplier company and grab the details on the prat of ex-employees information. This is a bad practice on the part of buyer. This type of action would affect buyer-seller relationship among the firms. For potent business process the exchange partners should have mutual trust and cooperation.According to Moorman, Deshpande, and Zaltman (Moorman et al, 1993) trust is willingness to rely on an exchange partner in whom one has confidence. According to Achrol (Achrol et al, 1991), Morgan and Hunt trust is a major determiner of relationship commitment.Thus the decision of Project Manager to hack the database of software house can be considered as breach of trust. The Project Manager instead of hacking the database can demand the software house to get up their employees skills to complete the project through negotiations. It would be onus duty on the part of supplier to locate his capabilities. The action of hacking is against legal procedures and the trespasser can be prosecuted under the following cyber laws Under Computer takeoff and Abuse Act (as amended Oct. 3, 1996) section 1030,a hacker is liable to be punished for knowingly and aspiration to defraud, accesses a protected computer without authorizationIn Western Australia under section 440A of criminal commandment under the heading unlawful operation of a computer system. The hacker can be prosecuted. (www.aic.gov.au ,11,2006)References1. Network trade protection and Ethical Hacking by Rajat Khare, 1st Edition, 2006.2. Factors affecting the trust in market research relationships by Moorman, Deshpande, and Zaltman. journal of Marketing, 57(January), 81-101.3. Evolution of the marketing organization by Achrol .Journal of Marketing, 55(October), 77-93.Answer 2System Development Life rung (SLDC) is a structure imposed on the development of a software product. SLDC has three primary objectives find out that high quality systems are delivered, providing strong management controls over the projects, and maximize the productivity of the systems staff. In put to meet these objectives the SLDC has many specific requirements it must meet including being able to support projects and systems of various scopes and types, financial support all of the technical activities, supporting all of the management activities, being highly usable, and providing guidanc e on how to install it.The technical activities include system definition, that is, analysis, design, coding, testing, system installation ( Training, data
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.