{"id":39263,"date":"2024-04-26T23:04:49","date_gmt":"2024-04-26T23:04:49","guid":{"rendered":"http:\/\/localhost\/branding\/application-architecture\/"},"modified":"2024-04-26T23:04:49","modified_gmt":"2024-04-26T23:04:49","slug":"application-architecture","status":"publish","type":"post","link":"https:\/\/sheilathewriter.com\/blog\/application-architecture\/","title":{"rendered":"Application Architecture"},"content":{"rendered":"<p>Application Architecture<\/p>\n<p>Student\u2019s Name<\/p>\n<p>Professors Name<\/p>\n<p>Affiliation<\/p>\n<p>Course<\/p>\n<p>Date<\/p>\n<p>A payroll system generates all reports related to company, employee, attendance\/leave, payroll, government forms. This is an important part of any business so as to enable the efficient work flow of employees through motivation that is salary. The payroll is a list of employees receiving compensation that a business must pay to its employees on a given date. Payroll software helps management get a clear view about payroll and attendance of employees generated by the software. The software is used to standardize the way a company processes its payroll and maintaining accurate data on employees.<\/p>\n<p>There are basically three types of payroll systems that will assist in paying employees, filing taxes, submitting reports and processing year end data for tax report purposes. They include Manual: This is an inexpensive endeavor and you will have to calculate each pay period on paper. Computerized: Almost all companies offer computer software that process the payroll. The only thing used is information of each employee and it takes less time and requires qualified persons to monitor. External payroll service: Outsourcing from companies such as ADP to process payroll and submitting end year reports (Bernard J. Bieg, Judith A. Toland, 2011).<\/p>\n<p>`The type of payroll application depends on the company size in our case large organization. Some companies choose to use payroll software\u2019s in conjunction with professional payroll service. The company might need use software to handle the information and reports outside service might need to process companies payroll. A generic architecture is usually configured and adapted to create a system that meets specific requirements; such is the case of a payroll system. The system application has three types, data, transaction, event and language processing applications. The data processing application is mostly data driven applications that process data in batches without explicit user intervention during the processing. Data processing has an input-process-output structure. Input- reads data and checks validity. Process-takes a transaction perform computation and records. Output-reads and formats them while sending to database (Bernard J. Bieg, Judith A. Toland, 2011). <\/p>\n<p>There are various types of architecture used: Information and security architecture are best used to prevent hacking or cyber criminals from accessing the information (Rosenblatt, 2013). No plan is fool proof same security goal underlies all enterprise architectures, successful organizations supported by reasonable and appropriate controls ensure data confidentiality, integrity and availability in accordance with standards of best practice and relevant regulations. Models tested and Implemented should consider design for probability of exploitation or actual risk. Information architecture identifies required information, how and where to collect, it analysis documentation.<\/p>\n<p>All the other architectures implement the information architecture. Network architecture: this provides connectivity, security and communication services for systems. System architecture: it assists to collect process store and disseminate information related to business process. Software architecture: this requires input collaboration and cooperation across many groups. Information gathered from network and system architecture applies to Software in constructs unique to internal software design. The effectiveness of security architecture is only as good as the organizations willingness and ability to implement solutions within framework. Before anything a guiding principle should be applied. Security architecture: to implement and stream line, the arising from policy intent and management\u2019s expectations risk, ensuring training and awareness. Security enables the business by ensuring all architectures are designed safe and collect, process and deliver information. The above architectures must integrate with and support one another. <\/p>\n<p>The reason for such architectural designs is to ensure architectural constraints are reviewed and reduce risk from potential threats. Technology such as Geospatial Tax identification enables one to have leverage information garnished from local taxing authority. Implies taxes are applied for a particular employee through geographical locations. Reciprocity Automation ensures compliance by virtually eliminating the chance for manual errors it takes into account the necessary factors to withhold the proper taxes. Built in test environment to boost customer loyalty: in a test without having physical process payroll. There is also advancement in time keeping functions and direct deposits. Almost all payroll systems are highly automated to reduce error rates and time spent processing payroll (Rosenblatt, 2013).<\/p>\n<p>PAYEROLL FLOW CHART<\/p>\n<p>36957003035300038195259525Read monthly pay data<\/p>\n<p>00Read monthly pay data<\/p>\n<p>11239502940050012573009525Read employee record<\/p>\n<p>00Read employee record<\/p>\n<p>25241259525Monthly pay data<\/p>\n<p>00Monthly pay data<\/p>\n<p>190509525Employees Records<\/p>\n<p>00Employees Records<\/p>\n<p>291465022288500204787522288500<\/p>\n<p>149542593980Validate employee data<\/p>\n<p>00Validate employee data<\/p>\n<p>224790013716000<\/p>\n<p>335280032321500131445032321500-66675142240Monthly Pay Rates<\/p>\n<p>00Monthly Pay Rates<\/p>\n<p>1495425142240Compute salary<\/p>\n<p>00Compute salary<\/p>\n<p>3409950142875Tax tables<\/p>\n<p>00Tax tables<\/p>\n<p>33528001473200029146501473200024765001473200016383001473200049530014732000<\/p>\n<p>4429125218440Write social security data<\/p>\n<p>00Write social security data<\/p>\n<p>3219450218440Write bank transaction<\/p>\n<p>00Write bank transaction<\/p>\n<p>2047875218440Print pay slip<\/p>\n<p>00Print pay slip<\/p>\n<p>819150218440Write pension data<\/p>\n<p>00Write pension data<\/p>\n<p>-342900218440Write tax transaction<\/p>\n<p>00Write tax transaction<\/p>\n<p>46863001752600034671001752600014954251752600049530017526000252412517526000<\/p>\n<p>2581275189865Pension data<\/p>\n<p>00Pension data<\/p>\n<p>28575189865Social security data<\/p>\n<p>00Social security data<\/p>\n<p>1314450189865Bank transaction<\/p>\n<p>00Bank transaction<\/p>\n<p>3819525189865Tax transaction<\/p>\n<p>00Tax transaction<\/p>\n<p>FIG 1: Graphical representation of a payroll system<\/p>\n<p>Ethical issues that may arise include provision of too much information which may breach privacy of an individual. This is because data can be centrally stored and retrieved effortlessly and quickly. This violates individual privacy rights since all organizations collect data on employees data that if not properly safeguarded can result in significant negative implications for individuals.<\/p>\n<p> Organizations have the right to monitor what employees do, it is a common practice for employees to be notified when they use organizations asset. Corporate invade privacy for commercial reasons such as to increase business, control expenses, enhance profitability. The other issue is security networks can be breached, personal identification information can be compromised, identities can be stolen and potential result in person financial ruin. Accuracy is need that customers always expect from a system and this should be ensured to enable reduce time consumption on tasks (Bernard J. Bieg, Judith A. Toland, 2011).<\/p>\n<p>A good payroll application should be able to: Ability to automatically calculate federal stat payroll taxes, multiple payroll frequencies, multiple pay types and comprehensive payroll reports. The application should also help employers keep payroll information confidential by offering password protection and ability to mask social security numbers. It should also be able to define an unlimited number of custom payroll solutions and is an important feature for users with advanced payroll processing requirements or payroll service bureau.<\/p>\n<p>Reference<\/p>\n<p>Rosenblatt, H. J. (2013). Systems analysis and design (Vol. 10). Michigan: Cengage Learning.<\/p>\n<p> Bernard J. Bieg, Judith A. Toland. (2011) Payroll accounting   (pp. 54-200)   Michigan: Cengage Learning.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Application Architecture Student\u2019s Name Professors Name Affiliation Course Date A payroll system generates all reports related to company, employee, attendance\/leave,<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-39263","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Application Architecture - sheilathewriter<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sheilathewriter.com\/blog\/application-architecture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Application Architecture - sheilathewriter\" \/>\n<meta property=\"og:description\" content=\"Application Architecture Student\u2019s Name Professors Name Affiliation Course Date A payroll system generates all reports related to company, employee, attendance\/leave,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sheilathewriter.com\/blog\/application-architecture\/\" \/>\n<meta property=\"og:site_name\" content=\"sheilathewriter\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-26T23:04:49+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/application-architecture\/\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/application-architecture\/\",\"name\":\"Application Architecture - sheilathewriter\",\"isPartOf\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\"},\"datePublished\":\"2024-04-26T23:04:49+00:00\",\"author\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\"},\"breadcrumb\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/application-architecture\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sheilathewriter.com\/blog\/application-architecture\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/application-architecture\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sheilathewriter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Application Architecture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/\",\"name\":\"sheilathewriter\",\"description\":\"Custom essay writing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/opskill.com\/propapers\"],\"url\":\"https:\/\/sheilathewriter.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Application Architecture - sheilathewriter","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sheilathewriter.com\/blog\/application-architecture\/","og_locale":"en_US","og_type":"article","og_title":"Application Architecture - sheilathewriter","og_description":"Application Architecture Student\u2019s Name Professors Name Affiliation Course Date A payroll system generates all reports related to company, employee, attendance\/leave,","og_url":"https:\/\/sheilathewriter.com\/blog\/application-architecture\/","og_site_name":"sheilathewriter","article_published_time":"2024-04-26T23:04:49+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sheilathewriter.com\/blog\/application-architecture\/","url":"https:\/\/sheilathewriter.com\/blog\/application-architecture\/","name":"Application Architecture - sheilathewriter","isPartOf":{"@id":"https:\/\/sheilathewriter.com\/blog\/#website"},"datePublished":"2024-04-26T23:04:49+00:00","author":{"@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab"},"breadcrumb":{"@id":"https:\/\/sheilathewriter.com\/blog\/application-architecture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sheilathewriter.com\/blog\/application-architecture\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sheilathewriter.com\/blog\/application-architecture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sheilathewriter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Application Architecture"}]},{"@type":"WebSite","@id":"https:\/\/sheilathewriter.com\/blog\/#website","url":"https:\/\/sheilathewriter.com\/blog\/","name":"sheilathewriter","description":"Custom essay writing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/opskill.com\/propapers"],"url":"https:\/\/sheilathewriter.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/39263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/comments?post=39263"}],"version-history":[{"count":0,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/39263\/revisions"}],"wp:attachment":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/media?parent=39263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/categories?post=39263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/tags?post=39263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}