IT-226 Project 2 Recommendation Report PDF

Title IT-226 Project 2 Recommendation Report
Course Communications in STEM Professions
Institution Southern New Hampshire University
Pages 4
File Size 139.8 KB
File Type PDF
Total Downloads 41
Total Views 135

Summary

Download IT-226 Project 2 Recommendation Report PDF


Description

Optimum Way Development

DataNanny Recommendation report 18 February 2021

Jason Popejoy Software Development Team Manager

0

EXECUTIVE SUMMARY This recommendation report has been created to explain the ongoing development of the DataNanny application. I will describe the background of the software and the consumers that will benefit from this app. I will also talk about the features of DataNanny and how it works. This report will additionally provide an insight into the conflicts faced by the development team during the recent acquisition of a software company based in San Jose, California, and the onboarded team from that location.

APPLICATION Background My software development team has been working diligently on a project tentatively nicknamed DataNanny. This Application arose from the need to ensure the security of personal and corporate data like financial data, customer credit card numbers, and sensitive internal business information. Our primary focus is to have DataNanny deployed securely across all computing devices an individual may own, or that an organization may utilize. Our goal with DataNanny will be to provide totally automated and complete security to our customers.

Audience The target audience for DataNanny will consist of both individual users and businesses of various sizes. The individual user audience will consist of both technical and non-technical users who would like to totally keep their personal information private while online. According to the Federal Trade Commission, there were 3.2 million reports of fraud reported to the Consumer Sentinel Network in 2019, 20 percent of those reports involved identity theft (Vigderman & Turner, 2020). DataNanny will also be targeted toward small businesses and large organizations, concerned with protecting employee and customer data. In 2019, 43% of data breaches involved small business victims. This is mainly because private businesses are often less secured than their larger counterparts (Security.org team, 2020).

Function DataNanny’s main function will be to keep sensitive personal or business data safe from hackers who would sell this information on the dark web. This will be accomplished by using a central server in a separate facility to coordinate tracking blockers installed on all user devices. Allowing DataNanny to function as a proxy server for these devices. Also critical to the function of DataNanny will be the total buy-in stipulation. DataNanny must be installed on all devices owned by an individual or connected to a business’s entire network to be fully functional. This is due to possible security leaks created by the omitted devices. 1

Features To protect our customers data, it will be monitored and kept separate from the application and its data. The DataNanny application will also be multi-device aware, allowing it to work on a single device or multiple devices. Users will also be able to access a notification and logging system to see what requests have been made and which requests have been allowed or blocked by DataNanny. If the users believe that a request has been allowed or denied in error, those requests can be challenged. When a request has been challenged, an AI will review the challenged request. If the certainty level of the request falls below 85% it will be sent to an evaluation team. This team will determine why the request should be reversed. The user will receive a determination from the evaluation team within 24 hours.

CONFLICT Optimum Development’s acquisition of the software company based in San Jose; California has caused some concern among the five new team members relocating to Raleigh. During a recent conference call with the San Jose team members, I learned they were troubled by a message they received from human resources. In this message, they were informed that they must move to Raleigh, North Carolina, to retain their jobs. The San Jose team members felt this message was more of an impersonal ultimatum than a letter of welcome. Causing some to question the move to North Carolina. Our current team members here in Raleigh, North Carolina, also voiced some concerns about the new team members. They have heard rumors that they will be expected to train the new team members from San Jose. They have also heard rumors that there are plans to eventually eliminate positions, giving rise to concerns that the new hires will ultimately be replacing them.

CONFLICT RESOLUTION To resolve any conflicts caused by the acquisition of the company in San Jose, I would like to hold a meeting with both teams. This would allow both teams to voice their concerns and to learn about each other and the details of the DataNanny Project. The Raleigh team can explain the DataNanny project, what they have done to date and what they would like to see done next. While the team from San Jose, with their extra experience, may be able to give some new insight into the project, helping our existing teamwork through problem areas and maybe sharing ideas we have not thought of. Holding this meeting will help to put all issues between the two teams to rest, while keeping the DataNanny project on schedule. Allowing us to begin building one strong, cohesive development team.

2

ACTION STEPS I would recommend approaching the areas of conflict during the meeting with both teams. This would allow each team to get an idea of where the other team is coming from and the issues they are having. Additionally, it would allow both teams to introduce themselves and what they can bring to the company. During this meeting the San Jose team will be reassured that we are thrilled to have them join our team and that it may be possible to allow them to work remotely, allowing them to stay in San Jose if they chose not to move and still work for Optimum Way Development. We will assure Raleigh team members they are not training the new team members so they can replace them later. They should be receptive to questions from the new team members concerning how things are done, as well as asking advice from the new team members with more experience.

REFERENCES Budanović, N. (2020, January 3). 25 internet privacy statistics that will make you rethink your surfing habits. DataProt. https://dataprot.net/statistics/internet-privacy-statistics/ Marsh & Microsoft. (2019, September). 2019 Global Cyber Risk Perception Survey. Microsoft.Com. https://www.microsoft.com/security/blog/wpcontent/uploads/2019/09/Marsh-Microsoft-2019-Global-Cyber-Risk-PerceptionSurvey.pdf Security.org team. (2020, May 25). Data Security: 25 Important Facts and Statistics for 2020. Security.Org. https://www.security.org/resources/data-security-facts-statistics/# Vigderman, A., & Turner, G. (2020, December 10). Identity Theft Protection | Guide to Identity & Credit Monitoring Services. Security.Org. https://www.security.org/identitytheft/

3...


Similar Free PDFs