Uncategorized

Application Architecture

Application Architecture

Student’s Name

Professors Name

Affiliation

Course

Date

A payroll system generates all reports related to company, employee, attendance/leave, payroll, government forms. This is an important part of any business so as to enable the efficient work flow of employees through motivation that is salary. The payroll is a list of employees receiving compensation that a business must pay to its employees on a given date. Payroll software helps management get a clear view about payroll and attendance of employees generated by the software. The software is used to standardize the way a company processes its payroll and maintaining accurate data on employees.

There are basically three types of payroll systems that will assist in paying employees, filing taxes, submitting reports and processing year end data for tax report purposes. They include Manual: This is an inexpensive endeavor and you will have to calculate each pay period on paper. Computerized: Almost all companies offer computer software that process the payroll. The only thing used is information of each employee and it takes less time and requires qualified persons to monitor. External payroll service: Outsourcing from companies such as ADP to process payroll and submitting end year reports (Bernard J. Bieg, Judith A. Toland, 2011).

`The type of payroll application depends on the company size in our case large organization. Some companies choose to use payroll software’s in conjunction with professional payroll service. The company might need use software to handle the information and reports outside service might need to process companies payroll. A generic architecture is usually configured and adapted to create a system that meets specific requirements; such is the case of a payroll system. The system application has three types, data, transaction, event and language processing applications. The data processing application is mostly data driven applications that process data in batches without explicit user intervention during the processing. Data processing has an input-process-output structure. Input- reads data and checks validity. Process-takes a transaction perform computation and records. Output-reads and formats them while sending to database (Bernard J. Bieg, Judith A. Toland, 2011).

There are various types of architecture used: Information and security architecture are best used to prevent hacking or cyber criminals from accessing the information (Rosenblatt, 2013). No plan is fool proof same security goal underlies all enterprise architectures, successful organizations supported by reasonable and appropriate controls ensure data confidentiality, integrity and availability in accordance with standards of best practice and relevant regulations. Models tested and Implemented should consider design for probability of exploitation or actual risk. Information architecture identifies required information, how and where to collect, it analysis documentation.

All the other architectures implement the information architecture. Network architecture: this provides connectivity, security and communication services for systems. System architecture: it assists to collect process store and disseminate information related to business process. Software architecture: this requires input collaboration and cooperation across many groups. Information gathered from network and system architecture applies to Software in constructs unique to internal software design. The effectiveness of security architecture is only as good as the organizations willingness and ability to implement solutions within framework. Before anything a guiding principle should be applied. Security architecture: to implement and stream line, the arising from policy intent and management’s expectations risk, ensuring training and awareness. Security enables the business by ensuring all architectures are designed safe and collect, process and deliver information. The above architectures must integrate with and support one another.

The reason for such architectural designs is to ensure architectural constraints are reviewed and reduce risk from potential threats. Technology such as Geospatial Tax identification enables one to have leverage information garnished from local taxing authority. Implies taxes are applied for a particular employee through geographical locations. Reciprocity Automation ensures compliance by virtually eliminating the chance for manual errors it takes into account the necessary factors to withhold the proper taxes. Built in test environment to boost customer loyalty: in a test without having physical process payroll. There is also advancement in time keeping functions and direct deposits. Almost all payroll systems are highly automated to reduce error rates and time spent processing payroll (Rosenblatt, 2013).

PAYEROLL FLOW CHART

36957003035300038195259525Read monthly pay data

00Read monthly pay data

11239502940050012573009525Read employee record

00Read employee record

25241259525Monthly pay data

00Monthly pay data

190509525Employees Records

00Employees Records

291465022288500204787522288500

149542593980Validate employee data

00Validate employee data

224790013716000

335280032321500131445032321500-66675142240Monthly Pay Rates

00Monthly Pay Rates

1495425142240Compute salary

00Compute salary

3409950142875Tax tables

00Tax tables

33528001473200029146501473200024765001473200016383001473200049530014732000

4429125218440Write social security data

00Write social security data

3219450218440Write bank transaction

00Write bank transaction

2047875218440Print pay slip

00Print pay slip

819150218440Write pension data

00Write pension data

-342900218440Write tax transaction

00Write tax transaction

46863001752600034671001752600014954251752600049530017526000252412517526000

2581275189865Pension data

00Pension data

28575189865Social security data

00Social security data

1314450189865Bank transaction

00Bank transaction

3819525189865Tax transaction

00Tax transaction

FIG 1: Graphical representation of a payroll system

Ethical issues that may arise include provision of too much information which may breach privacy of an individual. This is because data can be centrally stored and retrieved effortlessly and quickly. This violates individual privacy rights since all organizations collect data on employees data that if not properly safeguarded can result in significant negative implications for individuals.

Organizations have the right to monitor what employees do, it is a common practice for employees to be notified when they use organizations asset. Corporate invade privacy for commercial reasons such as to increase business, control expenses, enhance profitability. The other issue is security networks can be breached, personal identification information can be compromised, identities can be stolen and potential result in person financial ruin. Accuracy is need that customers always expect from a system and this should be ensured to enable reduce time consumption on tasks (Bernard J. Bieg, Judith A. Toland, 2011).

A good payroll application should be able to: Ability to automatically calculate federal stat payroll taxes, multiple payroll frequencies, multiple pay types and comprehensive payroll reports. The application should also help employers keep payroll information confidential by offering password protection and ability to mask social security numbers. It should also be able to define an unlimited number of custom payroll solutions and is an important feature for users with advanced payroll processing requirements or payroll service bureau.

Reference

Rosenblatt, H. J. (2013). Systems analysis and design (Vol. 10). Michigan: Cengage Learning.

Bernard J. Bieg, Judith A. Toland. (2011) Payroll accounting (pp. 54-200) Michigan: Cengage Learning.