Escolar Documentos
Profissional Documentos
Cultura Documentos
By group 13
Michael Almr
Simon hman
Asif Hasan
Zohaib Aslam
Bekir Morina
1 Background
The background is well written, but the reference in the text and picture to Armbust is not
enough. Who is he and why is he not mentioned as a reference?
2 Executive Summary
In this part different levels of risks are mentioned. There is nothing written anywhere in the
project proposal about the sensitive security matters that occur after the implementation of this
project about the organizations information. In particular, what about the confidentiality and
integrity of the information that are stored in the cloud. This is very important for the project,
because not every potential client in the market is familiar with security of information in the
clouds. Also, authors should have cleared out how open source software and convincing clients
to buy the service will be achieved - which seems pretty hard.
3 Business Case
3.1 Problem definition or opportunity description
The part of this section is clear and understandable but they do not mention IT security risks
that is a important area in these kind of project.
3.2 Aim
The aim of this report is to offer companies more effective payroll system .In other
words some of the things mentioned in the previous sections should be mentioned here in a
more compact way.
3.3 Goal
Many think that cloud computing is unsafe because you dont know exact where the data is
stored. Security should thereby be a main goal for this project to convince there reader that this
is a product he/she can rely on.
Why mention beta version in the main goal? It should be mentioned as a sub-goal.
3.4 Sub-Goals
Security should also be mentioned here as a sub-goal.
3.8 Method
Well written. What does conduces mean? It cant be translated through google translate, it
feels a bit unnecessary.
References
There are no numbers on the references and they are not referred to in the text. This makes
the report not trustworthy.
The first and the last reference are very good. The second one are not good, where can I find
it? The third one are good, but you either use , or and: Not both.
Appendix A
Concise, not sure how the arrows are necessary though.
4 Appendix B
The table ends on page unknown and then continues on page 1.
Why is the table closed at the bottom of page unknown and open at the top on page 1?
Risk number 1: Good to have this risk, but you will code the program and if it gets hacked, who