HRIS Chapter 3: Systems Design and Implementation
45 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is one potential risk associated with poor implementation of a project?

  • Reduction in training costs
  • Enhanced stakeholder commitment
  • Increased scope creep (correct)
  • Improved team collaboration
  • Which project management option involves hiring a person temporarily from within the organization?

  • Full-time project manager
  • Outsourcing project management
  • Hiring someone involved in the project (correct)
  • Hiring a consultant
  • What is critical to ensure the successful implementation of either immediate or parallel conversion options?

  • Ensuring technology outdates exist
  • Focusing solely on cost reduction
  • Minimizing stakeholder involvement
  • Having support for training and software (correct)
  • What can insufficient process mapping lead to during project implementation?

    <p>Increased risk of implementation errors</p> Signup and view all the answers

    Which of the following is a common issue identified in project management?

    <p>Lack of a steering committee</p> Signup and view all the answers

    What is the primary need of managers when using an HRIS?

    <p>Real-time access to accurate data for decision making</p> Signup and view all the answers

    Which of the following is NOT listed as a type of user or customer of HRIS?

    <p>External Auditors</p> Signup and view all the answers

    What characterizes the best of breed approach to HRIS acquisition?

    <p>Integrating various specialized systems to meet different needs</p> Signup and view all the answers

    Which of these architectures is considered the most modern in HRIS development?

    <p>Cloud computing</p> Signup and view all the answers

    Which user group relies heavily on reporting and query tools provided by HRIS?

    <p>Managers</p> Signup and view all the answers

    What type of data is crucial for managers to make decisions about training program enrollment?

    <p>Accurate performance data</p> Signup and view all the answers

    Which of the following roles typically represents non-employees in the context of HRIS?

    <p>Job Seekers</p> Signup and view all the answers

    Which concept is critical for ensuring the safety of data within an HRIS?

    <p>Database security measures</p> Signup and view all the answers

    What is the main functionality of the Presentation Layer in a software architecture?

    <p>To enable user interaction with the system</p> Signup and view all the answers

    Which layer functions as a mediator between the Presentation and Data layers?

    <p>Application Layer</p> Signup and view all the answers

    What type of logic is implemented within the Application Layer?

    <p>Business processing logic</p> Signup and view all the answers

    In which layer is user input data processed before being sent to the Application Layer?

    <p>Presentation Layer</p> Signup and view all the answers

    Where is data stored in a software architecture consisting of three layers?

    <p>Data Layer</p> Signup and view all the answers

    When a user clicks the login button on a webpage, which layer interacts first to process this action?

    <p>Presentation Layer</p> Signup and view all the answers

    What is the role of the Data Layer in the context of user input from the Presentation Layer?

    <p>To store and retrieve actual data</p> Signup and view all the answers

    What type of interactions does the Application Layer manage?

    <p>Interacting with backend databases</p> Signup and view all the answers

    What is the primary responsibility of clerical employees in relation to the HRIS?

    <p>Entering new employee information</p> Signup and view all the answers

    Which group is primarily responsible for interacting with the HRIS to manage personal information?

    <p>Organizational employees</p> Signup and view all the answers

    Which of the following is typically not a function of non-employee users of the HRIS?

    <p>Accessing employee performance records</p> Signup and view all the answers

    Which of the following types of data is included in the 'Information About People' category?

    <p>Employee skills</p> Signup and view all the answers

    What do partner organizations typically require from the HRIS?

    <p>Position descriptions and job specifications</p> Signup and view all the answers

    Which category of data is created as a result of the interaction between 'Information About People' and 'Information About the Organization'?

    <p>Performance appraisals</p> Signup and view all the answers

    What is a primary benefit of organizational employees utilizing the HRIS?

    <p>To make updates without HR assistance</p> Signup and view all the answers

    Which of the following best describes clerical employees' role in employee compensation?

    <p>They ensure new employees are compensated correctly.</p> Signup and view all the answers

    What is a defining characteristic of single-tier architecture?

    <p>All components reside on the mainframe.</p> Signup and view all the answers

    What is one advantage of two-tier architecture in HR systems?

    <p>It performs typical HR functions using PC processing power.</p> Signup and view all the answers

    Which of the following is NOT a drawback of two-tier and three-tier architectures?

    <p>High processing load on individual PCs.</p> Signup and view all the answers

    What function does middleware serve in three-tier architecture?

    <p>It manages data and transactions before saving to the database.</p> Signup and view all the answers

    How does two-tier architecture handle HR functions?

    <p>By leveraging the processing power of PCs for typical functions.</p> Signup and view all the answers

    One primary limitation of two-tier and three-tier architectures is related to:

    <p>The requirement for database drivers on each client.</p> Signup and view all the answers

    What aspect of data management is improved with three-tier architecture?

    <p>Transactions are managed more efficiently by middleware.</p> Signup and view all the answers

    In a two-tier architecture, what is required for the system to function effectively?

    <p>Software installation on each local machine.</p> Signup and view all the answers

    What is a primary security challenge in cloud computing related to employees?

    <p>Exposure of sensitive payroll and benefits data between employees</p> Signup and view all the answers

    Which condition is NOT necessary for the best of breed architecture to work effectively?

    <p>Mandatory cloud compatibility</p> Signup and view all the answers

    What might be a consequence of unauthorized updates in a cloud computing environment?

    <p>Loss of sensitive personnel data</p> Signup and view all the answers

    Which of the following describes a requirement for software solutions in a best of breed architecture?

    <p>Should have interoperability with other systems</p> Signup and view all the answers

    What type of data is notably at risk of loss outside the enterprise in cloud computing?

    <p>Social Security numbers</p> Signup and view all the answers

    In a cloud computing architecture, what is necessary for applications to communicate effectively?

    <p>A universally agreed-upon data description method</p> Signup and view all the answers

    Which scenario illustrates a condition that negates the need for specialized software in best of breed architecture?

    <p>Running hand-written resumes through OCR systems</p> Signup and view all the answers

    Which of the following is a common misconception regarding data sharing in cloud environments?

    <p>External organizations can access sensitive information without consent</p> Signup and view all the answers

    Study Notes

    Chapter 3: Systems Considerations in the Design of an HRIS: Planning for Implementation

    • Chapter Objectives: Understand different HRIS user types and data needs, five general hardware architectures (from "dinosaur" to cloud), hardware and database security concepts, and the "best of breed" approach to HRIS acquisition.

    HRIS Customers/Users

    • Employees: Managers, Analysts (Power Users), Technicians (HRIS Experts), Clerical Employees, Organizational Employees
    • Non-employees: Job Seekers, Sourcing Partner Organizations

    Managers

    • Primary Need: Real-time access to accurate data for decision-making regarding employees.
    • Examples: Performance data for training program decisions, recruiting channel evaluation, and employee retention/promotion strategies.
    • HRIS Tools: Reporting and query tools (dashboards) for easy-to-read and real-time data analysis.

    Analysts - Power Users

    • Role: Acquire, examine, and provide relevant data, and reasonable alternatives to support manager decisions.
    • Access Levels: Access more areas of the HRIS than other users.
    • Tools: Model scenarios and perform "what-if" analyses using HRIS tools.
    • Example: Recruiting analyst providing a list of potential internal candidates for a marketing position.

    Technicians (HRIS Experts)

    • Dual Function: Bridge HR needs and technical implementation.
    • Role: Ensure HR staff have access, information, and tools necessary for their jobs, translating HR needs into technical specifications for programmers, database administrators, and application administrators.
    • Update Role: Translate technical functionality changes into HR-understandable language.

    Clerical Employees

    • Information Role: Input of information about new employees (e.g. details, position, benefits, salary).
    • Limited Decision Making: Not generally involved in hiring decisions, but responsible for ensuring employee compensation is processed correctly.

    Organizational Employees

    • Information Use: Use HRIS to manage their personal information, reducing the need for HR clerks.
    • Limited Decision-Making: Typically not involved in significant HR decisions.

    Non-employees Users

    • Job Seekers: Interact with recruiting portals (usability, navigation, and up-to-date information are key).
    • Partner Organizations: Need information about open positions including job descriptions, job specifications, and potential salary ranges.

    Categories of Data

    • Information About People: Name, address, date of birth, skills, and training.
    • Information About The Organization: Positions, job specifications, organizational structure, compensation, and employee/labor relations.
    • Data from Interaction: Performance appraisals and compensation information.

    HRIS Architecture

    • One-tier (Mainframe): All functionality, processing, and storage on the mainframe; accessed locally by company.
    • Two-tier (Client-server): Separates application logic processing from database; often using PCs and a central mainframe server.
    • Three-tier (Middleware): Introduces a middle layer (middleware) for handling data and transactions before entering the database to improve transaction management.
    • N-tier (Web-based): More scalable and allows distributed processing. Usually, uses a web browser as the client, intermediary web servers, and application servers handling the various functionalities.
    • Cloud Computing: Uses the internet; data and applications are stored in central remote servers that are maintained and managed by a third-party.

    Security Challenges

    • Sensitive Data Exposure: Sensitive payroll and benefits information might be exposed to unauthorized individuals.
    • External Data Loss: Sensitive information like Social Security numbers might accidentally be revealed or transmitted outside of the organization.
    • Unauthorized Data Changes: Key data like salary amounts might be impacted by unauthorized updates.
    • Internal Data Sharing: Sharing personnel or applicant information must be carefully controlled and monitored to prevent misuse.
    • External Sharing: Sharing HR data with outside organizations or service providers requires proper security protocols.

    Best of Breed

    • Combining Products From Different Vendors: An architectural approach for combining products from different vendors that allows proper interoperability.
    • Interoperability: Established guidelines and mechanisms to ensure data exchange and compatibility between different applications
    • Example Software: Resumix, Oracle PeopleSoft, Chronos, ADP

    Revision Questions

    • Difference Between Architectures: Compare and contrast single-tier, client-server, three-tier, N-tier, and cloud computing architectures.
    • Best of Breed: Explain the "best of breed" method, and the conditions for its proper function.

    Planning System Implementation: Roles & Key Activities

    • Project Management Roles: Project Manager, Steering Committee/Project Charter, Implementation Team, Project Scope Management, and Sponsorship.
    • Key Implementation Activities: Management sponsorship, Process Mapping, Software Implementation, Customization, Change Management, Go Live!, Project Evaluation, and Potential Pitfalls.

    Project Manager Options

    • Consultant: Hiring a consultant to manage the project.
    • Full-Time Project Manager: Selecting a dedicated, certified project manager.
    • Internal Project Champion: Assigning an internal employee to the role on a temporary basis.

    "Go Live!" Conversion Methods

    • Immediate Conversion: Switching to the new system at once
    • Parallel Conversion: Running both the old and new systems concurrently.

    Potential Pitfalls

    • Poor Planning, Incomplete Steering Committee/Steering Committee Without Top Management Support, Implementation Team Problems Or Incomplete Implementation Team, Failure To Assess The Politics Of The Organization Adequately, Insufficient Process Mapping, Scope Creep, Poor Implementation Of Or Insufficient Change Management.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Explore the various considerations in designing a Human Resource Information System (HRIS) in Chapter 3. Learn about different user types, hardware architectures, and essential security concepts for successful implementation. This chapter prepares you for understanding the planning required for effective HRIS deployment.

    More Like This

    Hris
    38 questions

    Hris

    BrainyAcer avatar
    BrainyAcer
    HRIS Implementation Quiz 2
    16 questions
    Use Quizgecko on...
    Browser
    Browser