Blog
Application Architecture
Application Architecture
Student’s Name
Professors Name
Affiliation
Course
Date
A payroll system generates all reports related to company, employee, attendance/leave, payroll, government forms. This is an important part of any business so as to enable the efficient work flow of employees through motivation that is salary. The payroll is a list of employees receiving compensation that a business must pay to its employees on a given date. Payroll software helps management get a clear view about payroll and attendance of employees generated by the software. The software is used to standardize the way a company processes its payroll and maintaining accurate data on employees.
There are basically three types of payroll systems that will assist in paying employees, filing taxes, submitting reports and processing year end data for tax report purposes. They include Manual: This is an inexpensive endeavor and you will have to calculate each pay period on paper. Computerized: Almost all companies offer computer software that process the payroll. The only thing used is information of each employee and it takes less time and requires qualified persons to monitor. External payroll service: Outsourcing from companies such as ADP to process payroll and submitting end year reports (Bernard J. Bieg, Judith A. Toland, 2011).
`The type of payroll application depends on the company size in our case large organization. Some companies choose to use payroll software’s in conjunction with professional payroll service. The company might need use software to handle the information and reports outside service might need to process companies payroll. A generic architecture is usually configured and adapted to create a system that meets specific requirements; such is the case of a payroll system. The system application has three types, data, transaction, event and language processing applications. The data processing application is mostly data driven applications that process data in batches without explicit user intervention during the processing. Data processing has an input-process-output structure. Input- reads data and checks validity. Process-takes a transaction perform computation and records. Output-reads and formats them while sending to database (Bernard J. Bieg, Judith A. Toland, 2011).
There are various types of architecture used: Information and security architecture are best used to prevent hacking or cyber criminals from accessing the information (Rosenblatt, 2013). No plan is fool proof same security goal underlies all enterprise architectures, successful organizations supported by reasonable and appropriate controls ensure data confidentiality, integrity and availability in accordance with standards of best practice and relevant regulations. Models tested and Implemented should consider design for probability of exploitation or actual risk. Information architecture identifies required information, how and where to collect, it analysis documentation.
All the other architectures implement the information architecture. Network architecture: this provides connectivity, security and communication services for systems. System architecture: it assists to collect process store and disseminate information related to business process. Software architecture: this requires input collaboration and cooperation across many groups. Information gathered from network and system architecture applies to Software in constructs unique to internal software design. The effectiveness of security architecture is only as good as the organizations willingness and ability to implement solutions within framework. Before anything a guiding principle should be applied. Security architecture: to implement and stream line, the arising from policy intent and management’s expectations risk, ensuring training and awareness. Security enables the business by ensuring all architectures are designed safe and collect, process and deliver information. The above architectures must integrate with and support one another.
The reason for such architectural designs is to ensure architectural constraints are reviewed and reduce risk from potential threats. Technology such as Geospatial Tax identification enables one to have leverage information garnished from local taxing authority. Implies taxes are applied for a particular employee through geographical locations. Reciprocity Automation ensures compliance by virtually eliminating the chance for manual errors it takes into account the necessary factors to withhold the proper taxes. Built in test environment to boost customer loyalty: in a test without having physical process payroll. There is also advancement in time keeping functions and direct deposits. Almost all payroll systems are highly automated to reduce error rates and time spent processing payroll (Rosenblatt, 2013).
PAYEROLL FLOW CHART
36957003035300038195259525Read monthly pay data
00Read monthly pay data
11239502940050012573009525Read employee record
00Read employee record
25241259525Monthly pay data
00Monthly pay data
190509525Employees Records
00Employees Records
291465022288500204787522288500
149542593980Validate employee data
00Validate employee data
224790013716000
335280032321500131445032321500-66675142240Monthly Pay Rates
00Monthly Pay Rates
1495425142240Compute salary
00Compute salary
3409950142875Tax tables
00Tax tables
33528001473200029146501473200024765001473200016383001473200049530014732000
4429125218440Write social security data
00Write social security data
3219450218440Write bank transaction
00Write bank transaction
2047875218440Print pay slip
00Print pay slip
819150218440Write pension data
00Write pension data
-342900218440Write tax transaction
00Write tax transaction
46863001752600034671001752600014954251752600049530017526000252412517526000
2581275189865Pension data
00Pension data
28575189865Social security data
00Social security data
1314450189865Bank transaction
00Bank transaction
3819525189865Tax transaction
00Tax transaction
FIG 1: Graphical representation of a payroll system
Ethical issues that may arise include provision of too much information which may breach privacy of an individual. This is because data can be centrally stored and retrieved effortlessly and quickly. This violates individual privacy rights since all organizations collect data on employees data that if not properly safeguarded can result in significant negative implications for individuals.
Organizations have the right to monitor what employees do, it is a common practice for employees to be notified when they use organizations asset. Corporate invade privacy for commercial reasons such as to increase business, control expenses, enhance profitability. The other issue is security networks can be breached, personal identification information can be compromised, identities can be stolen and potential result in person financial ruin. Accuracy is need that customers always expect from a system and this should be ensured to enable reduce time consumption on tasks (Bernard J. Bieg, Judith A. Toland, 2011).
A good payroll application should be able to: Ability to automatically calculate federal stat payroll taxes, multiple payroll frequencies, multiple pay types and comprehensive payroll reports. The application should also help employers keep payroll information confidential by offering password protection and ability to mask social security numbers. It should also be able to define an unlimited number of custom payroll solutions and is an important feature for users with advanced payroll processing requirements or payroll service bureau.
Reference
Rosenblatt, H. J. (2013). Systems analysis and design (Vol. 10). Michigan: Cengage Learning.
Bernard J. Bieg, Judith A. Toland. (2011) Payroll accounting (pp. 54-200) Michigan: Cengage Learning.
