Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

College for Research & Technology of Cabanatuan

Burgos Avenue, Cabanatuan City 3100


Tel. 463-2735 463-2697 600-2200; E-mail: crt.cabanatuan@gmail.com

MCDONALD’S PAYROLL SYSTEM

Feasibility Study

A Final Requirement for


ELEC 9/ IT106 Information Security and Assurance

By:
Yuri Gonzaga
Ryan Robby Francisco
Aleck Ferry
Raizza Santiago
John Francis Sanchez

To:
Ms. Ederlyn Ramos

College for Research & Technology


2024
College for Research & Technology of Cabanatuan
Burgos Avenue, Cabanatuan City 3100
Tel. 463-2735 463-2697 600-2200; E-mail: crt.cabanatuan@gmail.com

I. Introduction

McDonald's is a global fast-food chain that was founded in 1940. Over the years, it has
become one of the world's largest restaurant chains, serving millions of customers every day
across more than 100 countries. McDonald's success is not only due to its popular menu items
but also its efficient operations and innovative use of technology, particularly in its IT
infrastructure.

McDonald's IT infrastructure is a vital component of its global operations, supporting various


aspects of the business:

 Point of Sale (POS) Systems: Manage orders, payments, and inventory in restaurants.
 Digital Ordering: Enables online and mobile ordering for customer convenience.
 Mobile Apps: Offer loyalty programs, mobile ordering, and payment options.
 Drive-Thru Technology: Utilizes digital menu boards and analytics for faster service.
 Supply Chain Management: Tracks inventory, manages vendors, and optimizes
logistics.
 Data Analytics: Provides insights into customer behavior and operational efficiency.
 Cybersecurity: Protects customer data and IT systems from cyber threats.

The purpose of the study is to analyze, design, and implement an enhanced payroll system
designed specifically for McDonald's employees. This system aims to streamline payroll
processes, reduce errors, improve data accuracy, and enhance overall payroll management.
College for Research & Technology of Cabanatuan
Burgos Avenue, Cabanatuan City 3100
Tel. 463-2735 463-2697 600-2200; E-mail: crt.cabanatuan@gmail.com

II. Objectives
The scope of our study for the McDonald's employee payroll system includes:

1. Analysis: Reviewing the current payroll system used by McDonald's.


2. Requirements Gathering: Understanding the needs and expectations of
stakeholders, such as HR and finance teams.
3. System Design: Creating a new payroll system tailored for McDonald's employees.
4. Implementation: Developing and deploying the new system, including data
migration and testing.
5. Automation: Incorporating automated features to calculate wages, taxes, and
deductions.
6. Compliance: Ensuring the system complies with labor laws, taxation regulations, and
company policies.
7. Security: Implementing measures to protect employee payroll data.
8. Training: Providing training for employees and administrators on using the new
payroll system effectively.
Overall, the scope covers the entire process from analysis to implementation of an
improved payroll system specifically for McDonald's employees, focusing on
efficiency, accuracy, compliance, and security.
College for Research & Technology of Cabanatuan
Burgos Avenue, Cabanatuan City 3100
Tel. 463-2735 463-2697 600-2200; E-mail: crt.cabanatuan@gmail.com

III. Methodology
Business Requirement Specification Gather Requirements: Talk to
stakeholders to understand their needs.
Document Requirements: Write down
what the system should do.
Approval: Get stakeholders to approve
the requirements.

System Requirement Specification Functional Requirements: List the main


functions (e.g., calculate payroll).
Non-Functional Requirements: List the
performance and security needs.
Document and Approve: Write and get
approval for these requirements.

High level Design System Architecture: Plan the overall


system structure.
Module Design: Outline major parts of
the system.
Data Flow Diagrams: Show how data
moves in the system.
Documentation and Approval:
Document and get approval.

Low level Design Detailed Design: Design each module in


detail.
Database Design: Plan the database
College for Research & Technology of Cabanatuan
Burgos Avenue, Cabanatuan City 3100
Tel. 463-2735 463-2697 600-2200; E-mail: crt.cabanatuan@gmail.com

structure.
Interface Design: Design the user
interfaces.
Documentation and Approval:
Document and get approval.

Coding Setup: Prepare the development


environment.
Coding: Write the code.
Code Review: Check the code for quality.

Unit Testing Write Tests: Create tests for small parts


of the code.
Run Tests: Test each part individually.
Fix Bugs: Fix any issues found.

Components Testing Integration Plan: Plan how to combine


modules.
Run Integration Tests: Test combined
modules.
Fix Issues: Fix any problems found..

System Integration Testing Plan Tests: Plan tests for the entire
system.
Run Tests: Test the full system.
Fix Issues: Fix any problems found.

Acceptance Testing Plan User Tests: Plan tests with actual


users.
Run Tests: Have users test the system.
College for Research & Technology of Cabanatuan
Burgos Avenue, Cabanatuan City 3100
Tel. 463-2735 463-2697 600-2200; E-mail: crt.cabanatuan@gmail.com

Fix Issues and Approve: Fix any issues


and get final approval.

A. SWOT Analysis

STRENGTHS WEAKNESSES

Efficiency and Accuracy: Automated payroll Data Security: Modern systems offer
systems reduce human error and ensure enhanced security features to protect sensitive
calculations are precise, improving overall employee data.
efficiency.
Dependency on Technology: Heavy reliance
Scalability: The system can scale with the
on technology can be problematic if there are
growth of the company, handling an
technical issues or failures.
increasing number of employees without a
significant increase in administrative Customization Needs: Off-the-shelf

workload. solutions may require significant

Integration: Can be integrated with other customization to meet specific business


systems such as HR, accounting, and benefits needs, adding to the cost and time.
management, creating a seamless flow of
information.
Data Security: Modern systems offer
enhanced security features to protect sensitive
employee data.

OPPORTUNITIES THREATS

Technological Advancements: Leveraging Cybersecurity Risks: The risk of


emerging technologies like AI and machine cyberattacks and data breaches is a constant
learning can further enhance system threat, given the sensitive nature of payroll
College for Research & Technology of Cabanatuan
Burgos Avenue, Cabanatuan City 3100
Tel. 463-2735 463-2697 600-2200; E-mail: crt.cabanatuan@gmail.com

capabilities, such as predictive analytics for and employee data.


payroll forecasting.
Regulatory Changes: Frequent changes in
Employee Self-Service: Adding features that
tax laws and employment regulations require
allow employees to access their own payroll
continuous updates to the system to remain
information and make changes to their
compliant.
personal information can improve employee
satisfaction and reduce administrative burden User Adoption: Resistance to change from

Remote Work: Increasing remote work employees and management can hinder the
trends create demand for robust, accessible successful implementation and utilization of
payroll systems that can be managed from the system.
anywhere..

B. Risk Assessment

Identify Risks

 Unauthorized Access: Someone could access payroll data without permission.


 Data Loss or Corruption: Important data could be lost or ruined.
 Legal Non-compliance: Not following laws and regulations.
 System Breakdowns: The whole system could stop working.
 Payroll Errors: Mistakes in calculating pay.

Evaluate Risks

 Unauthorized Access: Very likely to happen and would be very bad.


 Data Corruption: Could happen and would be very bad.
 Legal Issues: Not likely, but would still be very bad.
 System Breakdowns: Could happen and would be somewhat bad.
 Payroll Errors: Could happen and would be very bad.
College for Research & Technology of Cabanatuan
Burgos Avenue, Cabanatuan City 3100
Tel. 463-2735 463-2697 600-2200; E-mail: crt.cabanatuan@gmail.com

C. Security Controls

Physical Controls

 Secure Server Rooms: Lock up the places where servers are kept.
 Surveillance: Use cameras and security guards for protection.
 Biometric Checks: Use fingerprint or eye scans in sensitive areas.
 Disaster Recovery: Have backups and plans for recovering data after disasters.

Technical Controls

 Encrypt Data: Keep sensitive data secure through encryption.


 Software Updates: Keep software updated and patched.
 Firewalls and Intrusion Detection: Use these tools to protect against hackers.
 Security Checks: Regularly check for security weaknesses.

Administrative Controls
College for Research & Technology of Cabanatuan
Burgos Avenue, Cabanatuan City 3100
Tel. 463-2735 463-2697 600-2200; E-mail: crt.cabanatuan@gmail.com

 Training: Teach staff about data security.


 Access Rules: Make clear rules about who can access what information.
 Incident Response: Have a plan ready for when security issues happen.
 Monitoring: Keep an eye on how the system is used and perform regular checks.

D. Security Procedures

Access Control

 Role-Based Access: Control who can see payroll data based on their job.
 Update Access Rights: Regularly update who has access to what.

User Account Management

 Update User Accounts: Keep user accounts up-to-date.


 Remove Access: Quickly take away access when someone leaves the company.
 Unique IDs: Make sure everyone has their own user ID.

Identification, Authentication, and Authorization

 Two-Factor Authentication: Use extra steps for verifying users.


 Strong Passwords: Enforce strong password rules.
 Regular Checks: Keep an eye on log-ins to spot unauthorized access.
College for Research & Technology of Cabanatuan
Burgos Avenue, Cabanatuan City 3100
Tel. 463-2735 463-2697 600-2200; E-mail: crt.cabanatuan@gmail.com

 Single Sign-On: Use one set of login credentials for better security and convenience.

IV. References
McDonald’s Philippines

https://www.mcdonalds.com.ph/

You might also like