Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
System Rules of Behavior, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
It is very important that the systems established to welcome users have a specific rule of policies that are dedicated to make a definite impact on how the users themselves would behave towards the operation of the system. In this regard, the system rules of behavior are among the aspects of the SSAA regulations that must be given attention to. Notably, it could be analyzed that these set of rules intend to define how the division of information that is accessible to specific users only ought to be fully respected. What makes these policies definitely comprehensible is that the system itself has a form of operative control that makes it easier for the users to apply the needed behaviors for the functioning conditions that they ought to recognize while using the website’s shared and private information.
The MCC or the Medical Credentials Company is one organization that provides a clearinghouse for doctors, hospitals and other group practices. Considering the role of the organization, it could be analyzed that a shared online network from the company ought to be well protected. Noting that there are different users who engage in the process of accessing the information to be kept and shared in the network, several points of access point allowances should be given attention to. In the discussion that follows, such division of access-capacities shall be given particular attention to.
The first aspect to give consideration is that of the access that the regular users are to be given. As mentioned earlier, MCC provides the right for third party groups to access particular information that are needed in attending to patients. This particular party includes nurses and other remote healthcare providers who might be attending to the same patients. The access point they are to be allowed to have control of need to be specifically designed to give them only the information that they need and the data that they are allowed to see. This means that the information sharing process ought to be hierarchical. Note that through this approach, the information that are protected and are dedicated to higher supervisory positions only are to be well protected hence putting a great deal of consideration upon the privacy of such data. This aspect of the system’s operation requires the establishment of network firewalls. These firewalls ought to protect the data inside from being accessed by unauthorized personnel. To be able to complete this task, the project or system creators ought to formulate numerical coefficients that would stand as variables for access that the users could use to verify which level of users they are hence allowing them to access information that they could rightfully see and note.
Most likely, the establishment of such security firewalls would take at least a week and a half especially considering that the network shall be made available online. Trials and testing methods ought to be applied to completely see how the firewall functions for the protection of the data stored in the system’s online database. The differential level of access points of the users depending on their hierarchical position in the organization may be one of the most important obstacles that the system creators ought to give attention to. Take note that this means that the divisions of hierarchy ought to be clear. Protecting the information based on this hierarchy of users also mean segregating the information depending on their usability based on the position of the users. For example, a nurse would only need the basic information about a patient as they tend to him or her. However, for a doctor, more in-depth data might be required for diagnosis and reporting purpose. Storing the data into the system alone could already take a week. The other week and a half that was stipulated above is expected to be considered as the point of processing the system’s conditional establishment that is dedicated to making a great impact on how each member of the healthcare organization functions properly for their stakeholders in the society, their patients.
Following the standards of the DITSCAP SSAA guidelines, it could be understood that the need to control the data distribution only to authorized personnel is a crucial point of defining the usability of the system produced. An online database created for MCC is then expected to follow such pattern of information protection and security that would depend largely on the pattern of firewalls that the creators of the system ought to apply in recognition of the said process. In this case, the proper function of the system is not only assumed to be dependent on how much information it could share but also on how efficient the system would be in segregating the information that is to be given towards the users depending on their authorized points of access.
In this regard, it is deemed that the allotted time of at least two and a half weeks is enough to establish the system’s sufficiency and efficiency to function for the target organization. Notably, it could be analyzed that given the proper number of personnel working on the system’s development, the capacity of the system to provide the service and function it is hoped to give to MCC and its stakeholders would be established enough. Given the said time, trials and runtime revisions are expected to be completed hence releasing the system for use at the right time as required by the organization being served. From this point, the group who would handle the project’s completion is expected to make recommended adjustments according to the function of the system that MCC requires during the allotted time. Putting attention particularly on imposing the policies and the technical operations related to securing the information placed within the conditions of the database to be used by the company, the group of system creators are expected to provide ample functional competency on the system that they are to provide.
References:
SSA Outline Guidelines. http://securityv.isu.edu/pdf/ssaaoutl.pdf. (Retrieved on June 10, 2012).
System Authorization Access Request (SAAR) Documentation. System Rules of Behavior. http://www.docstoc.com/docs/849467/DD-Form-2875-System-Authorization-Access-Request-(SAAR)-April-2005. (Retrieved on June 10, 2012).
SANS Institute InfoSec Reading Room: An Introduction to Certification and Accreditation. http://www.sans.org/reading_room/whitepapers/standards/introduction-certification-accreditation_1259. (Retrieved on June 10, 2012).
Security Plans to System Security Authorization Agreements: A Guide for Using the NIACAP Methodology to Develop Quality System Security Plan Certification and Accreditation Packages Developed. https://acc.dau.mil/adl/en-US/33266/file/6591/%2314111%20Department%20of%20Commerce%20Guide.pdf. (Retrieved on June 10, 2012).
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee