Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
8 views11 pages

Case Study

The document outlines a case study assignment focused on developing a computerized security and tracking system for Bigelow, Bannister and Gomez Inc., a supplier of explosive devices. It discusses the classification of the system, identifies primary stakeholders and their consequences, and details the development process phases. Additionally, it includes an interview with the Director of Corporate Security, Kim Watson, highlighting current security challenges and functional requirements for the proposed system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views11 pages

Case Study

The document outlines a case study assignment focused on developing a computerized security and tracking system for Bigelow, Bannister and Gomez Inc., a supplier of explosive devices. It discusses the classification of the system, identifies primary stakeholders and their consequences, and details the development process phases. Additionally, it includes an interview with the Director of Corporate Security, Kim Watson, highlighting current security challenges and functional requirements for the proposed system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

CPSY 200 – CASE STUDY ASSIGNMENT

Mohammed Moin Shaikh 000928696


PART ONE
Bigelow, Bannister and Gomez Inc. is a major supplier of explosive devices to the military. Because of the nature of
their business, many security and safety issues need to be addressed. One of the more important issues is restricting
access of personnel to areas of the plant. It is required to restrict access by individual (such as Alice Sloan and Jim
Weston are allowed in the nitro room) or by job category (only engineers would be allowed into the design room).
Employee’s access permissions change on a regular basis; the change must be implemented immediately. Govern-
ment and military officials often visit the plant. Temporary privileges must be granted to these individuals. Another is-
sue is that of employee/guest location. Safety regulations require that the location of each individual be known at all
times. It is also required to keep historic data of who was in each area and when they were there.

Your company SAD Contractors has been hired to assist in the implementation of a computerized security system.
You have been chosen as team leader.

With the limited information supplied:

1. Given the following type of IT systems


a. Operational,
b. Managerial,
c. Technical,
d. Real Time,
How would you classify this type of system?

Answer - I would classify this system by using Operational and Real-Time Classifications

2. Identify the primary stakeholders for this system. How would they be affected.
Answer - Primary Stakeholders for this System
• Specific Individuals (Alice Solan and Jim Weston)
➢ The system will ensure that they get access to the specific area in which their presence is required
• Employees (Engineers and Technicians)
➢ With the increase of security measures they will be impacted at first but soon they will get used to this and
this will also provide them with a much safer work environment
• Government and Military Officials
➢ The system will keep a track of their visits and will also grant them the temporary access to facility they are
required in.

3. What might be the cost of failure of the system?


Answer -
• Physical Harm to Employees and Security Personnel
• Potential Danger of Data Leaks
• Unable to Regulate the Situation in case of Emergency
• Unable to manage Employees Properly
• Unable to track the movement of Employees and Security Personnel
PART TWO
A study of the company reveals that George Bigelow and Juanita Gomez have retired and left Susan Bannister as
C.E.O. The company has four directors; they are:

Kim Watson Director Corporate Security


Alex Wong Director Administrative Services
Rachel Smith Director Research and Development
Juan Valdez Director Production

You were able to review the job descriptions and the company organizational chart. The organization of the company
is summarized below:
Identify the stakeholders, possible consequences of the system and the effect on the stakeholder.
Create a chart similar to this:

Stakeholder Consequence of System Effect on Stakeholder

Director of Corporate Security Controlling security access is au- Improved management and re-
tomated. porting.
Director of Administrative Ser- Administrative process and per- Increase in operational efficiency
vices missions access becomes easy
Director of Research and Devel- Access in research and develop- Protection of intellectual property
opment mental areas becomes secured

Director of Production Access in areas of production be- Safety enhancement.


comes smooth
Security personnel Real time monitoring is con- Security and efficiency is en-
ducted hanced
IT and system administrators System is maintained in timely or- Duties are increased
der
2. Identify people you might want to be involved in the development process
• C.E.O. (Susan Bannister)
• Director of Production (Juan Valdez)
• Director of Corporate Security (Kim Watson)
• Director of Administrative Services (Alex Wong)
• Director of Research and Development (Rachel Smith)
• Employees (Engineers and Technicians )

3. Considering the development process in three general phases

a. Identify requirements.
· C.E.O.: Susan Bannister
Supervise and Ensure that everthing goes in right direction
· Director of Corporate Security:-Kim Watson
Manages Security
· Director of Administrative Services:-Alex Wong
Manages and Supervises General Management procedures
· Director of Research and Development:-Rachel Smith
Ensure secure access to certain areas and manages who will be stationed in which
facility
· Director of Production:-Juan Valdez
Looks after Production Area and ensures that production operations go smoothly
· Employees (Engineers and Technicians )
Will look after Technical work and Infrastructure management at a small scale
· Security Personnel
Ensure that all the security protocols of the Facility runs smoothly and without any
compromise

b. Planning how to deliver what is required.


• Project Plan - CEO or the Director of Administrative Services suggests a proper plan to work
on
• Director of Security should identify the potential risks and challenges which might occur in
the implementation of the Plan
• Director of Research and Development should design the technical architecture required to
implement the plan
c. Delivering what is required.
• Implementation - starting to build the system required according to the plan
• Testing - Before activating the system it must go through a thorough testing process to identify po-
tential bugs and errors that may occur
• Training - Training the staff to use the system efficiently
• Support- the system should be activated at this point but a support team must always be present
to ensure that system runs without any errors

Identify at what phase you would involve those people from question 2.
Indicate the type of information you would require from them at each phase.
Answer - CEO and Directors from the first phase i.e. planning till the end
Most of the employees in technical background at implementation ant testing phase

PART THREE
Interview with Kim Watson

Susan Bannister the C.E.O. of Big Bang has approached your company to develop a computerized security
/ tracking system. Susan has asked Kim Watson (head of corporate security) to be the primary contact at
Big Bang. You have been asked by your manager to be the project lead. You have arranged a meeting with
Kim on the 15 of this September, at 2:30 in her office. The following memo has been sent to her.

September 24, 2020

Kim Watson
Director Corporate Security

Dear Kim:

Thank you for making time to meet with me. I would like to confirm the meeting time of 2:30 P.M. on the 15
of September in your office. If this is not acceptable please inform me as soon as possible. Susan Bannis-
ter has asked if our company, SAD Contractors, would develop an employee tracking and security system
for your manufacturing plant.

The purpose of this meeting is to meeting is to gather information in the following areas:

1. What are the goals of the security and tracking process?


2. What is presently being done in the areas of security and tracking?
3. The problems with the current procedures.
What procedures you would like to implement.
I am looking forward to our meeting.

Yours truly,

SAD Contractors

SAD Contractors arrived at the main entrance of the Big Bang complex, only to be informed that there was
no record of his appointment with Kim. SAD Contractors waited as the security guard contacted his supervi-
sor, Howard West. Howard had no record of the appointment either. He said that he would have to contact
Kim, please be patient. In a few minutes Kim appeared at the main entrance slightly embarrassed and
apologetic, she filled in a form, SAD Contractors showed some identification and was allowed to sign in.
SAD Contractors was given a visitors tag and the departed for Kim’s office. Once in the office the interview
proceeded as follows:

SAD Contractors: That is quite a procedure to get access to the place.

Kim: I guess you have already identified one of our problems.

SAD Contractors: Yes I think we could improve that procedure. Could you walk me through how it
works?

Kim: Well when a visitor is invited to the plant the host, person inviting him, must fill out the
Guest Admission form in triplicate. (Kim gives SAD Contractors a copy of the form) The
host keeps one copy; one copy goes to security for the shift supervisor and one copy goes
to the main entrance. Just as an aside, here is the one I filled out for your visit. I don’t know
what happened to the other copies.

SAD Contractors: May I keep this form?

Kim: Yes it is all yours.

SAD Contractors: Do you use all of the information on the form? I noticed at the front gate you only
filled in a minimal amount.

Kim: We are supposed to fill out the entire form, but sometimes we get lazy.
SAD Contractors: Let’s start form the top. What is the goal of your department?

Kim: We have two major responsibilities. The first is security only allowing authorized people
any given area. The second is tracking the location of any employee or guest.

SAD Contractors: So security knows where I am now.

Kim Probably.

SAD Contractors: Could we take a more in depth look at the tracking system?

Kim: Certainly, what would you like to know?

SAD Contractors: What is the goal of the employee tracking system?

Kim: In the event of an emergency such as a fire, explosion or release of toxic gas, we need to
know the location of each employee and guest. We may have a very limited amount of
time to rescue individuals and do not want to waste time going to areas where no one is.
Also, if we discover at a later date that a contaminant might have been present in an area,
we need to know who was in that area during that time.

SAD Contractors: What might be the company goal in this area?

Kim: To ensure the safety of employees and guest while they are on the site.

SAD Contractors: How is this accomplished at present?

Kim: I am afraid not very well at present. The procedure is to keep track of employees by their
shift log.

SAD Contractors: What do you mean?

Kim: Juan, the director of production, in consultation with the shift foremen, assign workers to
different tasks on projects. Once a worker is assigned, they are assumed to be in a certain
area at any given time.

SAD Contractors: Are there not a lot of problems with that system?

Kim: Yes an employee might leave the area for a break, or they might be seconded to another
job for a short period of time. So far we have been lucky in that we have had no major dis-
asters.

SAD Contractors: That is a minimal solution for the production workers. What about people like you?

Kim: All others have an assigned office or lab space; if they leave that area they are to report
their location to the security shift supervisor.

SAD Contractors: Does that always happen?


Kim: Most of the time, however people are sometimes rushed or just forget or, like today, some-
times information is just lost.

SAD Contractors: What happens if an emergency happens?

Kim: We would like to know where everyone is located, when everyone is evacuated, and make
sure there is an escape route from all areas.

SAD Contractors: In summary for the employee-tracking portion, you need to know the location of
each employee, where they have been, and, in case of an emergency, know when they
have been evacuated.

Kim: That is pretty well it.

SAD Contractors: Would you tell me a little more about the security aspect of your department?

Kim: Certainly. At any time, we have many projects on the go. Because of the nature of the
work we do, certain areas need to be restricted to only the personnel who need to be
there.

SAD Contractors: How is access assigned?

Kim: Rachel Smith, I, and, possibly, the project leader assign it on an individual basis.

SAD Contractors: How is the access to these areas monitored?

Kim: Each area has a keypad entry system, and those employees who need access are given
the key code. A problem arises when an employee needs access to many areas. He or
she has to remember a number of codes. This quite often leads to doors being propped
open.

SAD Contractors: That is a problem that we need to address. Is there anything else?

Kim: I don’t know where it fits but we need to monitor certain areas.

SAD Contractors: What types of things are you monitoring?

Kim: Because of the nature of certain processes that take place, certain areas are monitored for
excessive heat. Other areas need to be monitored for emission of toxic gases. Also, if a
room is supposed to be empty, we would like to monitor it for motion.

SAD Contractors: Would there be any special action required in the monitoring of these areas?

Kim: In the case of excessive heat, the situation would be investigated. If a serious situation ex-
ists, the area would be evacuated. For toxic gases the area would also be evacuated, the
time and date would be recorded as well as all personnel that were in the room near the
time of detection. If motion is detected in a supposedly empty room a security guard would
be sent to investigate.

SAD Contractors: That would be possible to incorporate. Is there anything else that is required?
Kim: Not that I can think of now.

SAD Contractors: In summary it is required to track employee movement, control access to all the ar-
eas, and monitor motion, toxicity and temperature.

Kim: That’s right.

SAD Contractors: I think that about does it. I will summarize this information and get back to you. At
that time we will probably involve more people in the discussion. Thanks again for your
time.

Using the information from the preceding interview:

1. List the functional requirements of the proposed system.


• Control Requirements
➢ Real-time Monitoring
➢ Access Management
• Employee Tracking
➢ Abhle to track live locations of employees in the facility
• Reports
➢ Able generate reports of incidents happening in facility

2. Use SIM to create a use case diagram that will meet the needs for security and employee
tracking.

You might also like