The report presents a developed Desktop Information System for Employee Management. The system includes database development and encryption using a special algorithm to create an encryption key. The main goal of the development is to provide two types of protection: at the entrance to the system and in the transmission and data storage. The system includes four access levels: Employees, Executives or Managers, Directors and Administrators.
The information system includes the following functionalities, depending on the access levels: entering tasks, registering users, entering priorities for tasks, entering the status of tasks, reviewing entered tasks, editing tasks and their status, deleting tasks, reviewing , add, edit and delete all users in the system; and others.
- K. E. Pearlson, C. Saunders, D. F. Galletta, Managing and Using Information Systems: A Strategic Approach, 7th Edition, Wiley, ISBN: 978-1-119-56115-6, (2019)
- K. Sousa, Effy Oz, Management Information Systems, Seventh Edition, Cengage Learning EMEA, ISBN: 9781305172180, (2014)
- R. Maier, Knowledge Management Systems, Information and Communication Technologies for Knowledge Management, Springer, ISBN: 978-3-540-71408-8, (2007)
- R. Stair, G. Reynolds, Principles of Information Systems 13th Edition, Cengage Learning, ISBN: 978-1305971776, (2017)