Information Technology Reference
In-Depth Information
table 3.6
iA 2 F Views: Scope examples
IA 2  F Views
Breadth
Depth
People
People are part of the RFID
card scope; all 7,000+
employees need to be
aware; administrators and
operators need training.
Resolve potential individual,
cultural, and union issues on
the capturing and use of
biometric information.
Policy
Policies do exist that may
accommodate the additional
details for the RFID card
project.
The existing policies do not
cover all the details
necessary for the RFID card.
Business process
The main business process is
employee entry/exit to the
facilities. Additional
processes for reconciling
employee presence
(verification of entry) are
necessary at least until the
RFID process proves
accurate within acceptable
ranges.
Redirecting employee
entrance/exit paths
appropriately to effectively
process entry/exit
Systems and
applications
HR system (additional details
for biometric information
and RFID card registration,
issuance, and revocation).
There will be X fingerprint
readers added to HR for
processing biometric
registration.
Server XYZ in data center
ABC; system owner is
manager, HR.
Data/information
Employee table in database
XYZ
Additional fields to
accommodate
Infrastructure
Identify the infrastructure
affected by the results of the
new project.
Identify the attributes of the
infrastructure, e.g.,
configuration change to all
routers for traffic priority.
Internal to the
organization
All scope is internal.
External to the
organization
N/A
 
Search WWH ::




Custom Search