Friday, August 9, 2019
Software System Development Essay Example | Topics and Well Written Essays - 1250 words
Software System Development - Essay Example This pejorative form of the noun "hack" is even used among users of the positive sense of "hacker". The nuclear power plant's project manager who has already entered into contract with the software house should have considered all the aspects of software house before awarding the contract. Though the nuclear power plant has every right to question and demand the details of the employees working with the software house, however the software house need not provide the data as they feel it as a trade secret. The Project Manager being a higher official is not entitled to hack the database of the supplier company and grab the details on the basis of ex-employees information. This is a bad practice on the part of buyer. This type of action would affect buyer-seller relationship among the firms. For effective business process the exchange partners should have mutual trust and cooperation. According to Moorman, Deshpande, and Zaltman (Moorman et al, 1993) trust is willingness to rely on an exchange partner in whom one has confidence. According to Achrol (Achrol et al, 1991), Morgan and Hunt trust is a major determinant of relationship commitment. Thus the decision of Project Manager to hack the database of software house can be considered as breach of trust. The Project Manager instead of hacking the database can demand the software house to prove their employees skills to complete the project through negotiations. It would be onus duty on the part of supplier to prove his capabilities. The action of hacking is against legal procedures and the trespasser can be prosecuted under the following cyber laws: Under Computer Fraud and Abuse Act (as amended Oct. 3, 1996) section 1030,a hacker is liable to be punished for knowingly and intent to defraud, accesses a protected computer without authorization In Western Australia under section 440A of criminal code under the heading 'unlawful operation of a computer system'. The hacker can be prosecuted. (www.aic.gov.au ,11,2006) References 1. Network Security and Ethical Hacking by Rajat Khare, 1st Edition, 2006. 2. Factors affecting the trust in market research relationships by Moorman, Deshpande, and Zaltman. Journal of Marketing, 57(January), 81-101. 3. Evolution of the marketing organization by Achrol .Journal of Marketing, 55(October), 77-93. Answer 2 System Development Life Cycle (SLDC) is a structure imposed on the development of a software product. SLDC has three primary objectives: ensure that high quality systems are delivered, providing strong management controls over the projects, and maximize the productivity of the systems staff. In order to meet these objectives the SLDC has many specific requirements it must meet including: being able to support projects and systems of various scopes and types, supporting all of the technical activities, supporting all of the management activities, being highly usable, and providing guidance on how to install it. The technical activities include system definition, that is, analysis, design, coding, testing, system installation ( Training, data
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment