Você está na página 1de 3

Opposition report to Cloud Based

Payroll Management System

By group 13
Michael Almr
Simon hman
Asif Hasan
Zohaib Aslam
Bekir Morina

Project Management for IT Systems / DSV


2011-09-22

1 Background
The background is well written, but the reference in the text and picture to Armbust is not
enough. Who is he and why is he not mentioned as a reference?

2 Executive Summary
In this part different levels of risks are mentioned. There is nothing written anywhere in the
project proposal about the sensitive security matters that occur after the implementation of this
project about the organizations information. In particular, what about the confidentiality and
integrity of the information that are stored in the cloud. This is very important for the project,
because not every potential client in the market is familiar with security of information in the
clouds. Also, authors should have cleared out how open source software and convincing clients
to buy the service will be achieved - which seems pretty hard.

3 Business Case
3.1 Problem definition or opportunity description
The part of this section is clear and understandable but they do not mention IT security risks
that is a important area in these kind of project.

3.2 Aim
The aim of this report is to offer companies more effective payroll system .In other
words some of the things mentioned in the previous sections should be mentioned here in a
more compact way.

3.3 Goal
Many think that cloud computing is unsafe because you dont know exact where the data is
stored. Security should thereby be a main goal for this project to convince there reader that this
is a product he/she can rely on.
Why mention beta version in the main goal? It should be mentioned as a sub-goal.

3.4 Sub-Goals
Security should also be mentioned here as a sub-goal.

3.5 Options available and considered


The grammar are not as good as with the rest of the report but the content is good and easy to
understand.

3.6 Cost-benefit analysis


Where is appendix 3? If its the same as the presentation, 130 SEK/h is not a cost, its salary.
The analyse do not cover how long it will take for the project to be profitable. Does the fee
include the cost from the cloud computer provider? 100 SEK/month sounds extremely cheap.

3.7 Impact and Risks


Why specify an exact cloud computing system in the project proposal? Another question is why
they chose a cloud computing system that costs money when they dont have any? Maybe take
some time to look on cloud computing systems that are for free?
Good to refer to more risks in appendix B.

3.8 Method
Well written. What does conduces mean? It cant be translated through google translate, it
feels a bit unnecessary.

3.9 Conclusions and recommendations


The text is very good, but they mention to increase security here, but not in aim or goals.

References
There are no numbers on the references and they are not referred to in the text. This makes
the report not trustworthy.
The first and the last reference are very good. The second one are not good, where can I find
it? The third one are good, but you either use , or and: Not both.

Appendix A
Concise, not sure how the arrows are necessary though.

4 Appendix B
The table ends on page unknown and then continues on page 1.
Why is the table closed at the bottom of page unknown and open at the top on page 1?
Risk number 1: Good to have this risk, but you will code the program and if it gets hacked, who

Summary of what we think


The idea to develop an online payroll system for an organisation is a very good idea, and
indeed it is a very effective way of managing and keeping tracks of employees wages, leaves,
taxes etc. But this project includes allot of practical security issues, and psychological prepreparation of the potential clients about the safeness of their information. And this project
proposal lacks especially on that. Another thing that stays unclear is costumers support.
We recommend that authors of this project proposal should be more focused in the security
matters, which will convince potential clients that their informations confidentiality and integrity
will remain intact-ed.

Você também pode gostar