Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
Over the years, theft of staff/customer data has been of major concern to government agencies and corporate organizations alike. This affects the confidentiality of the persons affected and the integrity of such organization. This work examined various Human Resource Management Systems models and proposed a security-based model OnibereOdunayoSecurity-4 (OOS-4). The OOS-4 HRIS Model catered for four-levels of security. This book, therefore, using an iterative software development approach to building and deploying software, a Human Resource Management System was implemented and tested. Standard authentication and authorization were maintained and a role-based user access mechanism employed. This was implemented by applying new levels of security with regards to the available functions of the system. All data in storage are also encrypted using an Adapted ROT-13 Encryption Algorithm, hence making the data of no use to anyone who steals it or employees who may want to trade the organisation's data. This work should be useful to students of Computer Science, Information Technology, and Database Administrators, application developers or anyone concerned with securing personnel data.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
Over the years, theft of staff/customer data has been of major concern to government agencies and corporate organizations alike. This affects the confidentiality of the persons affected and the integrity of such organization. This work examined various Human Resource Management Systems models and proposed a security-based model OnibereOdunayoSecurity-4 (OOS-4). The OOS-4 HRIS Model catered for four-levels of security. This book, therefore, using an iterative software development approach to building and deploying software, a Human Resource Management System was implemented and tested. Standard authentication and authorization were maintained and a role-based user access mechanism employed. This was implemented by applying new levels of security with regards to the available functions of the system. All data in storage are also encrypted using an Adapted ROT-13 Encryption Algorithm, hence making the data of no use to anyone who steals it or employees who may want to trade the organisation's data. This work should be useful to students of Computer Science, Information Technology, and Database Administrators, application developers or anyone concerned with securing personnel data.