You are on page 1of 5

Implementation Plan

The plan for implementing the capstone project provides an overview of the project, with

a focus on developing a web-based management information system that includes

document security features. The importance of password protection, secure cloud storage,

and role-based access control within the system is emphasized.

Once the system is revised, it will be presented to the anticipated users at The Good

Shepherd Parish Bulaon Resettlement. If the institution decides to adopt the system, the

proponent will hand over the system and its documentation. A letter of agreement will be

provided, stating that the system will be transferred to the institution without any cost,

and the proponent will no longer be responsible for its updates and maintenance. To

ensure successful implementation, the proponent will employ various strategies, which

are outlined in the table below.

Table 1

Implementation Plan

STRATEGY ACTIVITIES PERSON INVOLVED DURATION

Requirements Conduct a thorough Researcher 2 weeks


Gathering and analysis of user
Analysis requirements,
system
functionalities, and
security needs.
Document the
specific features and
functionalities to be
incorporated into the
system.
System Design Design the overall Researcher/ System 4 weeks
and Architecture system architecture, Architecture/ Database
including database Architecture/ Security
structure, user Architect
interface layout, and
security
mechanisms.
Determine the
technology stack and
frameworks to be
used.
Development and Develop the core Researcher/ Programmer/ 8 weeks
Implementation functionalities of the
web-based Database Developer
management
information system,
focusing on
document security
features.
Implement password
protection, secure
cloud storage, and
role-based access
control mechanisms.
Testing and Conduct Researcher/ Defect or 6 weeks
Quality Assurance comprehensive
testing of the system Bug Analyst/
to identify and fix
any bugs or issues. Performance Tester
Perform security
testing to ensure the
robustness of the
document security
features.
Deployment and Deploy the web- Researcher/ User 3 weeks
User Training based management
information system Training Specialist/ End
on a suitable hosting
environment. Users/ Project Manager
Conduct user
training sessions to
familiarize
stakeholders with
the system's
functionalities and
security features.
System Evaluation Evaluate the Researcher/ System 3 weeks
and system's Evaluator/ User
Documentation performance, Representatives/ Project
functionality, and Manager
user satisfaction.
Gather feedback
from users and
stakeholders for
further
improvements.
Document the
system's
architecture, user
manuals, and
security protocols.

Table 2
Hardware and Software Requirement for computer server

Item Requirements
Minimum Recommended
Processor Speed x64 Processor: 1.4 GHz 3.0 GHz or faster

x64 Processor:

Processor Type AMD: Ryzen Intel I series

Memory 8GB of RAM 12 GB or higher

Hard Disk Space Minimum 512 GB 1 TB or Higher

Operating System Microsoft Microsoft

(Windows 7) (Windows 10)

.Net framework

3.5 3.5 or higher

Table 3
Hardware and Software Requirement for client computer

Item Requirements
Minimum Recommended
Processor Speed x64 Processor: 1.4 GHz 2.4 GHz or faster

Processor Type x64 Processor: AMD Intel I series

Opteron, AMD Athlon

64, Intel Xeon with Intel

EM64T support, Intel

Pentium IV with EM64T

support

Memory 1GB of RAM 4 GB or higher

Hard Disk Space Minimum 256GB 512GB or Higher

Operating System Microsoft Microsoft

(Windows 7) (Windows 10)

.Net framework 3.5 3.5 or higher

You might also like