SlideShare a Scribd company logo
1 of 45
Shopping Cart Expedition
Part I

11 September 2013

2013 copyright Leslie Munday
Universe
Overview






This article contains the results of a
business analysis of the shopping cart
problem described in the following vision
statement.
The analysis uses the UML notation and
RUP-like process that is described in my
book Analysis Through Pictures.
The chosen business problem is one that
the author believes every reader is able to
associate with through personal experience.

2013 copyright Leslie Munday Universe

1/7/2014

2
Vision
How many times have you reached the check-out in a store to
see lines of shoppers waiting to pay for their goods, and
seriously considered just leaving your items in the store and
coming back when it is quieter, or even going somewhere else?
 How many times a week do you arrive at the check-out with a
full cart , which you must unload onto the conveyor or selfcheckout (scanning every item as you unload it from the cart)
and a clerk re-loads your cart differently than how you wanted
it, or, you have to load and organize your cart a second time?
 Have you ever reached the checkout of a store and received a
bill that is for a different amount than what you were expecting?
These scenarios recur millions of times every day throughout the
US alone; if you have you ever thought to yourself: “There must
be a more efficient way of doing this” then this presentation will
provide some answers to your thoughts.


2013 copyright Leslie Munday Universe

1/7/2014

3
Goals
Goals are stated as problem statements:

The problem of loading and unloading the cart too many times.







The problem of it takes too long to check out.







Affects shoppers using carts loaded with items from the store.
The impact of which is it increases time to checkout, additional work for shoppers;
increased chance of damaged goods.
A successful solution would be to require 1 load and 1 unload of the shopping cart by
removing the need to unload in order to scan the items in the shopping cart.
Affects shoppers waiting to pay for items in their shopping cart.
The impact of which is long lines, crowding in the store, frustrated shoppers, loss of
revenue through abandoned shopping carts.
A successful solution would be to reduce checkout lines by having items in the shopping
cart identified before reaching the checkout.

The problem of we do not know how much a cart of items is going to cost
until checkout occurs.





Affects shoppers loading carts with items.
The impact of which is shopper may overspend their budget without realizing it until
checkout, causing delays at the checkout counter and additional work for store workers.
A successful solution would be to keep the shopper continuously informed of the cost of
their cart while they are shopping, so they know how much to expect to pay at the
checkout.

2013 copyright Leslie Munday Universe

1/7/2014

4
Actors
Actors may be roles played by people, or they
may be computer systems used by the people
in order to assist with performing a business
process.
 Roles are the people actors (or
stakeholders) that are impacted by the
process.
 System actors are computer systems that
assist the human actors (roles) with
carrying out the process.
2013 copyright Leslie Munday Universe

1/7/2014

5
Roles







Customer – Is anyone that
enters the store who is not
recognized as working in the
store.
Shopper – A customer who can
be identified by the store as
someone who shops here
(often recognized by a store
card in their name).
Store Worker – Provides
assistance to the shopper.
System Administrator – Looks
after the computer systems and
hardware used by the store

2013 copyright Leslie Munday Universe

1/7/2014

6
System Actors












Card Reader – Allows a store shopper to be associated with a shopping cart
and for the store to identify who the customer is. (Future revisions may allow
for the card reader to be able to read payment cards as well as customer
identification cards.)
Cashier – (Could be a human actor, but in this example we will consider it a
system), is the payment device that is found at a checkout counter in a typical
store, and allows shoppers to scan credit or debit cards, cash or even checks,
in payment for their items.
Cart Scanner – Detects items added to and removed from the shopping cart.
Customer Database – Contains a record of all customers registered with the
store.
Item Detector – Located at the checkout, it detects any store items that pass
through it.
Product Database – Is where a record of every item sold in the store is kept.
Shopping Cart – Is a container for items that are to be purchased from the
store by a single shopper.
Store Clerk display – Alerts store workers to problems with the shopping
system.
Shopping Cart Display – Keeps the shopper informed of their potential
purchases and sends messages to the shopper.

2013 copyright Leslie Munday Universe

1/7/2014

7
System Actors Diagram

2013 copyright Leslie Munday Universe

1/7/2014

8
As-Is Business Model


The first model the business analyst
traditionally builds is called the „as-is‟
model. This captures the current business
process and is used to compare the
differences between the current process
and the future process, to identify changes,
things that can stay the same and estimate
the return on investment of building a new
process.

2013 copyright Leslie Munday Universe

1/7/2014

9
Business Objects








The item detector recognizes unscanned items
leaving the store. (Not strictly true; often it
only recognizes the more expensive items.)
Items are products that the store sells to its
customers. An item may be scanned or
unscanned.
The scanner recognizes items as they are
scanned.
Scanning an item informs the cashier of a cost
to be added to the shoppers bill.

2013 copyright Leslie Munday Universe

1/7/2014

10
As-Is Business Objects Diagram

2013 copyright Leslie Munday Universe

1/7/2014

11
As-Is Business Use Cases
A business use case describes a business
process that gives benefit to an actor. The
actor and the benefiting process are
connected by a relationship.
 Buy Products – This is the process by which
the shopper obtains items in the store.
 Abandon Cart – This use case allows the
shopper to abort the buy „Buy Products‟
process at any time, by simply abandoning
their shopping cart.
2013 copyright Leslie Munday Universe

1/7/2014

12
As-Is Business Use Case Diagram

Abandon Cart – This use case simply allows a shopper to be disassociated with a shopping cart.

2013 copyright Leslie Munday Universe

1/7/2014

13
Buy Products Business Use Case
This is the process by which the shopper obtains items in the store.

Precondition: Before the process starts the customer is not recognized as being
in the store.

Trigger: The customer takes a shopping cart (we are only interested in
shoppers, who are shopping with a cart).
1.
The customer takes ownership of a single shopping cart while in the store,
they are now a shopper.
2.
At first the shopping cart is empty.
3.
As the shopper shops in the store they load up the cart with items. The
shopper may add or remove items in the cart. If the cart becomes empty, we
return to step 2. Otherwise repeat this step.
4.
If the cart is not empty, the shopper may checkout at anytime by scanning
their cart items.
5.
Once scanning is complete the shopper pays for their scanned items.
6.
The shopper then loads their scanned items back into the cart.
7.
The shopper exits the store where any unpaid items are detected
8.
The shopper empties their shopping cart and returns it to the store.
9.
The use case ends.

Postcondition: The customer has completed their shopping.
2013 copyright Leslie Munday Universe

1/7/2014

14
As-Is Buy Products Activity Diagram

The business objects are added for consistency checking purposes, and do not necessarily form part of the use case itself.

2013 copyright Leslie Munday Universe

1/7/2014

15
To-Be Business Model








The item detector recognizes unscanned items
by counting those exiting the store and
comparing to the items paid for.
Items are still identified as scanned items or
unscanned items.
Items are now scanned by the shopping cart.
There is no need for a separate scanner.
The cashier automatically reads the cost of
items in the cart and takes payment for those
items.

2013 copyright Leslie Munday Universe

1/7/2014

16
To-Be Business Objects Diagram

2013 copyright Leslie Munday Universe

1/7/2014

17
To-Be Business Use Case






When the shopper reaches the checkout, they no
longer have to scan the items in the shopping cart.
The items passing the checkout are compared to
those in the cart and if they are the same the
cashier charges the shopper for the items in the
cart. The total cost of the items in the cart is known
to the cashier without having to scan them.
How is this possible – by adding an intelligent
system to the shopping cart. The shopping cart will
track the cost of items being placed in the cart and
also those being removed from the cart.
The shopper simply exits the store and empties the
cart.

2013 copyright Leslie Munday Universe

1/7/2014

18
To-Be Buy Products Activity Diagram

2013 copyright Leslie Munday Universe

1/7/2014

19
Architecture
The business architecture shows the systems that will be used to automate the shopping
experience, and how they communicate with each other.

The shopping system is a new system that will be used to control the shopping experience. It
communicates with the following nodes:

















Shopping Cart – sends messages to and receives scanned items.
Cashier – sends the item description and cost to and receives feedback about payment made by the
shopper.
Item Detector – informs the system of items that pass through it.
Customer Database – sends the customer Id to the customer database and is returned information
about the customer.
Store System – sends messages to the store system for assistance with the shopping experience.

The shopping cart scans products added to and removed from the cart, reads the customer
store card and displays messages to the shopper.
The product database contains all the information needed about products sold in the store.
This is sent to the shopping system upon request.
A Customer Database has been added to the architecture to track and validate shoppers.
(Future extensions to the system may allow for tracking and responding to customer
behavior.)
The Cashier system deals with making payment. It receives a total cost from the shopping
system and ensures the correct payment is made by the shopper.
The Store system is used by employees to assist with the day-to-day operation of the store.
The Item Detector sends information about products at the checkout to the shopping system.

2013 copyright Leslie Munday Universe

1/7/2014

20
Architecture Diagram

2013 copyright Leslie Munday Universe

1/7/2014

21
Systems




Each system in the architecture has its own
set of use cases. The system with which we
are mostly concerned is the Shopping Cart
System, however, changes are needed to
the Customer Database, Product Database
and the Cashier systems.
The Item Detector detects store items as
they pass through it.

2013 copyright Leslie Munday Universe

1/7/2014

22
Shopping Cart Context Diagram

2013 copyright Leslie Munday Universe

1/7/2014

23
Cart Use Cases






The context diagram contains a summary of
the use cases for the shopping cart system
and their actors.
Consider the context diagram as containing
one super-use-case connecting to the
system actors.
The system use cases are captured by the
system use case diagram for the shopping
cart system.

2013 copyright Leslie Munday Universe

1/7/2014

24
Shopping Cart Use Case Diagram

2013 copyright Leslie Munday Universe

1/7/2014

25
Assigning Cart To Shopper Use Case


Shoppers are identified by their store card,
which includes a unique shopperId attribute.
The customer card is read by the cart (bank
cards are a future option for investigation),
and the customer is identified by the customer
database. The customer may be refused to use
the shopping system for many reasons (in
which case they will shop using the current asis process). Otherwise the customer is
approved as a shopper and the new shopping
experience begins.

2013 copyright Leslie Munday Universe

1/7/2014

26
Assigning Cart To Shopper Activity

2013 copyright Leslie Munday Universe

1/7/2014

27
Assigning Cart To Shopper Steps
Precondition:
The shopping cart is not assigned to a shopper
Trigger:
A customer enters their store card and the cart reads their Shopper Id
Steps:
1. Shopping cart card reader reads the card
2. Card is able to be read and the shopping cart sends the customer id to the customer
database and requests the shopper information
3. The customer database responds with a valid shopper information
4. The cart informs the shopper that they have been accepted and they may start shopping
5. The use case ends
Postcondition
Customer Is A Shopper.
Alternative Path:
None.
Exception Path:
E.1.

Card Cannot Be Read

6. At step 2, the customer card cannot be read
7. The customer is displayed a card read error
8. The use case ends
Postcondition:
The customer is not allowed to use the shopping system.
E.2.

Customer Is Not Allowed To Use The Shopping System (or they are already
assigned to a shopping cart)

9. At step 3, the customer database informs the shopping cart system that the customer is
not a shopper or that they are already assigned to a cart
10. The customer is displayed a message to see membership
11. The use case ends
Postcondition:
The customer is not shopping.

2013 copyright Leslie Munday Universe

1/7/2014

28
Releasing Cart From Shopper Use Case


A customer is assigned to a single cart
when their store card is inserted into the
card reader. If the card is removed the
customer is no longer assigned to the cart.
If there are unpaid items in the cart the
shopper is informed that they have not
finished shopping. (The store clerk could
also be informed of carts containing unpaid
items. This may allow for easier cleanup
within the store.)

2013 copyright Leslie Munday Universe

1/7/2014

29
Releasing Cart From Shopper Activity

2013 copyright Leslie Munday Universe

1/7/2014

30
Releasing Cart From Shopper Steps
Precondition:
The shopping cart is assigned to a shopper
Trigger:
The customer is shopping
Steps:
1. The shopping cart monitors the card reader
2. The card is removed from the cart
3. There are no items in the cart and
4. The shopping cart informs the user
to return the cart to the store

5. The shopping cart informs the customer
database that the customer is no longer
shopping

6. Use case ends
Postcondition
The shopping cart is available to be used by another customer for shopping.
Alternative Path:
A.1 Cart Is Not Empty
7. At step 3, there are items in the cart and the shopper is informed that they have unpaid for
items in the cart
8. Use case continues from step 3
Exception Path:
None.

2013 copyright Leslie Munday Universe

1/7/2014

31
System Is Monitoring Shopper Use Case


The shopping cart system will monitor store
items as they are added to or removed from
the shopping cart. A total cost (and optional
list of items in the cart) is displayed to the
shopper at all times.

2013 copyright Leslie Munday Universe

1/7/2014

32
System Is Monitoring Shopper Activity

2013 copyright Leslie Munday Universe

1/7/2014

33
System Is Monitoring Shopper Steps
Precondition:
The shopping cart is empty (this use case functions whether or not the cart is assigned to a
shopper)
Trigger:
A store item is recognized as being added to the shopping cart
Steps:
1. The system requests the product inf ormation from the product database
2. The product database returns cost of the item and product information
3. The system is displaying the total cost of items already in the shopping cart
4. The contents of the cart are changed
5. The system requests the changed product information from the product database
6.

The product database returns the product information and cost of the item (may need to
add consideration for what happens if the product is not found)

7. An item was removed from the cart and the system updates the display to show that the
item has been removed
8. The cart is empty and the use case ends.
Postcondition:
The cart is empty.
Alternative Path:
A.1 Item Is Added To The Cart
9. At step 7, an item was added to the cart and the system upd ates the display to show that
the item was added
10. The use case continues from step 3
A.2 Cart Is Not Empty
11. At step 8, the cart has items in it and the use case continues from step 3
Exception Path:
None.

2013 copyright Leslie Munday Universe

1/7/2014

34
Shopper Requests Assistance Use Case


The shopping cart system will monitor store
items as they are added to or removed from
the shopping cart. A total cost (and optional
list of items in the cart) is displayed to the
shopper at all times.

2013 copyright Leslie Munday Universe

1/7/2014

35
Shopper Requests Assistance Activity

2013 copyright Leslie Munday Universe

1/7/2014

36
Shopper Requests Assistance Steps
Precondition:
Shopper is assigned to a cart
Trigger:
Shopper requests assistance
Steps:
1. System sends a request to the store clerk display from the cart and shopper id
2. The use case ends.
Postcondition
Assistance message is sent to the store clerk display.
Alternative Path:
None.
Exception Path:
None.

2013 copyright Leslie Munday Universe

1/7/2014

37
Shopper Checking Out Use Case






Once the shopper reaches the checkout area
with a cart that is assigned to them, they will
be automatically billed and requested to make
payment.
If the cart is not assigned to a shopper or if
payment was not completed, a store clerk is
informed to assist the shopper.
Upon completion of payment, a check is made
to verify that the items exiting the checkout
are equivalent to the items that were paid for.
If there is a discrepancy a store clerk is
informed to assist the shopper.

2013 copyright Leslie Munday Universe

1/7/2014

38
Shopper Checking Out Activity

2013 copyright Leslie Munday Universe

1/7/2014

39
Shopper Checking Out Steps
Precondition:
There are unpaid items in the shopping cart
Trigger:
The cart reaches the checkout
Steps:
1. The cart is assigned to a shopper and the total amount for items in the cart is sent to the
cashier system
2. The cashier system reports that payment has been accepted for the items
3. The system requests the total for items passing through the item detector
4. The item detector returns information about the items in the cart (could simply be the
number of items or it could return an identifier for each item)
5. The total of all items is equal to the items paid for and the shopping cart informs the
shopper that they may now remove their card and exit the store
6. The use case ends.
Postcondition
The shopper has checked out their items from the store.
Alternative Path:
None.
Exception Path:
E.1.

Cart Is Not Assigned To A Shopper

7. At step 1, the cart is not assigned to a shopper
8. The system informs the store clerk that
the cart cannot be checked out without a
shopper assigned

9. The system informs the
customer that they need to
insert their shopping card in
order to checkout

10. The use case ends.
Postcondition
The shopping cart was not checked out.
E.2.

Payment Is Not Accepted

11. At step 2, the cashier system informs the cart that payment was not accepted
12. The system informs the store clerk to assist the shopper with checking out their cart
13. The use case ends.
Postcondition:

2013 copyright Leslie Munday Universe

1/7/2014

40
Other Systems









In addition to the „new‟ Shopping Cart system, several other
existing systems are impacted by the business needs.
Item Detector – As the shopping cart reaches the checkout the
item detector reads the items in possession of the shopper and
sends this information to the shopping cart system upon
request.
Product Database - The system administrator has the ability to
add, remove and change products in the product database and
upon request the product database will send product
information to a requesting store system.
Customer Database - The system administrator has the ability to
add, remove and change shopper information in the customer
database and upon request the customer database will send
shopper information to a requesting store system.
Cashier - The cashier system receives item details from the
shopping cart system and returns a payment status.

2013 copyright Leslie Munday Universe

1/7/2014

41
Other system Use Cases

Item Detector Use Case Diagram
Product Database Use Case Diagram

Customer Database Use Case Diagram

2013 copyright Leslie Munday Universe

1/7/2014

Cashier Use Case Diagram

42
Summary
The use case model captures the functionality to be implemented by the project team. Use cases are structured
in such a manner that each can be implemented independent of the others in the project. Note that each us case
is assigned to 1 and only 1 system; as such implementing a single use case may not achieve any of the project
objectives. In order to determine which order to implement the use cases, we need to trace them to the business
model

The Customer Is Shopping business activity is implemented by Shopping Cart system use cases, Shopper
Requests Assistance, Assigning Cart To Shopper and System Is Monitoring Shopping Cart, also by the
Product Database use case, Sending Product Info.

Customer Taking Cart business activity is implemented by the shopping cart system use case Assigning Cart
To Shopper and the Customer Database system use case, Sending Customer Info.

Cart Contains Items business activity and Cart Is Empty business activities are satisfied by the System
Monitoring Shopping Cart system use case.

The Customer Paying For Items business activity is satisfied by the implementation of systems use cases,
Take Payment, Checking Out Shopper and Detect Items, which are assigned to the shopping cart, cashier
and item detector systems resp.

Scanning Items business activity is satisfied by the item detector system use case Detect Items, which
detects items leaving the store.

The Customer Leaving store business activity is partially satisfied by the Releasing Cart From Shopper use
case.

The Emptying Shopping Cart business activity is partially satisfied by the implementation of the systems use
case Releasing Cart From Shopper. (The process of removing items from the cart is performed manually by
the shopper.)

The Edit Customer and Edit Product system use cases, are derived from decisions made about the
architecture, and have no direct relationship to the business use cases. (Similar use cases can be derived for
maintenance of the shopping cart, the scanner and the cashier systems.)

2013 copyright Leslie Munday Universe

1/7/2014

43
Traceability Diagram

2013 copyright Leslie Munday Universe

1/7/2014

44
Credits And References






Visual Paradigm – used to draw diagrams,
model the business and systems analysis.
Microsoft Office – Used for publishing this
article.
Analysis Through Pictures http://www.lulu.com/product/ebook/analysisthroughpictures/18335194?productTrackingContext=se
arch_results/search_shelf/center/2
Part II will describe how to build a Platform
Independent logical Model from the system
use cases.

2013 copyright Leslie Munday Universe

1/7/2014

45

More Related Content

Viewers also liked

eCommerce shopping cart design
eCommerce shopping cart designeCommerce shopping cart design
eCommerce shopping cart designMineWhat
 
Software Project Management for 'Weather Forecasting using Data mining'
Software Project Management for 'Weather Forecasting using Data mining'Software Project Management for 'Weather Forecasting using Data mining'
Software Project Management for 'Weather Forecasting using Data mining'Rushikesh Mangrulkar
 
Online shop system use case diagram report
Online shop system use case diagram reportOnline shop system use case diagram report
Online shop system use case diagram reportMahan Gheib Khah Mashak
 
Introduction to E-Commerce with Shopping Cart System
Introduction to E-Commerce with Shopping Cart SystemIntroduction to E-Commerce with Shopping Cart System
Introduction to E-Commerce with Shopping Cart SystemRavi Shankar Ojha
 
Smart cart presentation
Smart cart presentationSmart cart presentation
Smart cart presentationajg08d
 
SRS document for Hotel Management System
SRS document for Hotel Management SystemSRS document for Hotel Management System
SRS document for Hotel Management SystemCharitha Gamage
 
Online shopping system
Online shopping systemOnline shopping system
Online shopping systemNik_Panchal
 
Hotel managementsystemcorrectfinalsrs
Hotel managementsystemcorrectfinalsrsHotel managementsystemcorrectfinalsrs
Hotel managementsystemcorrectfinalsrsvidya_shankar
 
Online Shopping Presentation
Online Shopping PresentationOnline Shopping Presentation
Online Shopping Presentationamanda-schmid
 
Online Shopping Full Project Presentation (20 slides)
Online Shopping Full Project Presentation (20 slides)Online Shopping Full Project Presentation (20 slides)
Online Shopping Full Project Presentation (20 slides)Krishna Mohan Shakya
 
Software requirements specification of Library Management System
Software requirements specification of Library Management SystemSoftware requirements specification of Library Management System
Software requirements specification of Library Management SystemSoumili Sen
 
Library Management System
Library Management SystemLibrary Management System
Library Management SystemAditya Shah
 
Hospital management system project
Hospital management system projectHospital management system project
Hospital management system projectHimani Chopra
 
Library mangement system project srs documentation.doc
Library mangement system project srs documentation.docLibrary mangement system project srs documentation.doc
Library mangement system project srs documentation.docjimmykhan
 

Viewers also liked (16)

eCommerce shopping cart design
eCommerce shopping cart designeCommerce shopping cart design
eCommerce shopping cart design
 
Software Project Management for 'Weather Forecasting using Data mining'
Software Project Management for 'Weather Forecasting using Data mining'Software Project Management for 'Weather Forecasting using Data mining'
Software Project Management for 'Weather Forecasting using Data mining'
 
Online shop system use case diagram report
Online shop system use case diagram reportOnline shop system use case diagram report
Online shop system use case diagram report
 
Shopping Cart
Shopping CartShopping Cart
Shopping Cart
 
Introduction to E-Commerce with Shopping Cart System
Introduction to E-Commerce with Shopping Cart SystemIntroduction to E-Commerce with Shopping Cart System
Introduction to E-Commerce with Shopping Cart System
 
Smart cart presentation
Smart cart presentationSmart cart presentation
Smart cart presentation
 
SRS document for Hotel Management System
SRS document for Hotel Management SystemSRS document for Hotel Management System
SRS document for Hotel Management System
 
Online shopping system
Online shopping systemOnline shopping system
Online shopping system
 
Hotel managementsystemcorrectfinalsrs
Hotel managementsystemcorrectfinalsrsHotel managementsystemcorrectfinalsrs
Hotel managementsystemcorrectfinalsrs
 
Onlineshopping
OnlineshoppingOnlineshopping
Onlineshopping
 
Online Shopping Presentation
Online Shopping PresentationOnline Shopping Presentation
Online Shopping Presentation
 
Online Shopping Full Project Presentation (20 slides)
Online Shopping Full Project Presentation (20 slides)Online Shopping Full Project Presentation (20 slides)
Online Shopping Full Project Presentation (20 slides)
 
Software requirements specification of Library Management System
Software requirements specification of Library Management SystemSoftware requirements specification of Library Management System
Software requirements specification of Library Management System
 
Library Management System
Library Management SystemLibrary Management System
Library Management System
 
Hospital management system project
Hospital management system projectHospital management system project
Hospital management system project
 
Library mangement system project srs documentation.doc
Library mangement system project srs documentation.docLibrary mangement system project srs documentation.doc
Library mangement system project srs documentation.doc
 

More from Leslie Munday

Using Agile In A Quality Driven Environment
Using Agile In A Quality Driven EnvironmentUsing Agile In A Quality Driven Environment
Using Agile In A Quality Driven EnvironmentLeslie Munday
 
Requirements and Traceability With Pictures
Requirements and Traceability With PicturesRequirements and Traceability With Pictures
Requirements and Traceability With PicturesLeslie Munday
 
Using Styles and Properties with MS Word
Using Styles and Properties with MS WordUsing Styles and Properties with MS Word
Using Styles and Properties with MS WordLeslie Munday
 
Use Case and Activity Diagrams Modeling Notation
Use Case and Activity Diagrams Modeling NotationUse Case and Activity Diagrams Modeling Notation
Use Case and Activity Diagrams Modeling NotationLeslie Munday
 
An Analysis Of A Jigsaw Puzzle
An Analysis Of A Jigsaw PuzzleAn Analysis Of A Jigsaw Puzzle
An Analysis Of A Jigsaw PuzzleLeslie Munday
 
Realizing an Application Use Case
Realizing an Application Use CaseRealizing an Application Use Case
Realizing an Application Use CaseLeslie Munday
 
How to Complete a Use Case Templlate with MS Word
How to Complete a Use Case Templlate with MS WordHow to Complete a Use Case Templlate with MS Word
How to Complete a Use Case Templlate with MS WordLeslie Munday
 
Create A Use Case Document with ReqPro
Create A Use Case Document with ReqProCreate A Use Case Document with ReqPro
Create A Use Case Document with ReqProLeslie Munday
 
An Analysis of the BABOK
An Analysis of the BABOKAn Analysis of the BABOK
An Analysis of the BABOKLeslie Munday
 
Requirements management and traceability for IIBA
Requirements management and traceability for IIBARequirements management and traceability for IIBA
Requirements management and traceability for IIBALeslie Munday
 
Analysis Of A Shopping Expedition Part II
Analysis Of A Shopping Expedition Part IIAnalysis Of A Shopping Expedition Part II
Analysis Of A Shopping Expedition Part IILeslie Munday
 
Use Case and Activity Diagrams Modeling Notation
Use Case and Activity Diagrams Modeling NotationUse Case and Activity Diagrams Modeling Notation
Use Case and Activity Diagrams Modeling NotationLeslie Munday
 
Working With Styles And Properties
Working With Styles And PropertiesWorking With Styles And Properties
Working With Styles And PropertiesLeslie Munday
 
Administrating Req Pro
Administrating Req ProAdministrating Req Pro
Administrating Req ProLeslie Munday
 
Managing Requirement With A Rmp
Managing Requirement With A RmpManaging Requirement With A Rmp
Managing Requirement With A RmpLeslie Munday
 
Capture A Common Vocabulary
Capture A Common VocabularyCapture A Common Vocabulary
Capture A Common VocabularyLeslie Munday
 
Introduction To ReqPro
Introduction To ReqProIntroduction To ReqPro
Introduction To ReqProLeslie Munday
 

More from Leslie Munday (18)

Using Agile In A Quality Driven Environment
Using Agile In A Quality Driven EnvironmentUsing Agile In A Quality Driven Environment
Using Agile In A Quality Driven Environment
 
Models vs Diagrams
Models vs DiagramsModels vs Diagrams
Models vs Diagrams
 
Requirements and Traceability With Pictures
Requirements and Traceability With PicturesRequirements and Traceability With Pictures
Requirements and Traceability With Pictures
 
Using Styles and Properties with MS Word
Using Styles and Properties with MS WordUsing Styles and Properties with MS Word
Using Styles and Properties with MS Word
 
Use Case and Activity Diagrams Modeling Notation
Use Case and Activity Diagrams Modeling NotationUse Case and Activity Diagrams Modeling Notation
Use Case and Activity Diagrams Modeling Notation
 
An Analysis Of A Jigsaw Puzzle
An Analysis Of A Jigsaw PuzzleAn Analysis Of A Jigsaw Puzzle
An Analysis Of A Jigsaw Puzzle
 
Realizing an Application Use Case
Realizing an Application Use CaseRealizing an Application Use Case
Realizing an Application Use Case
 
How to Complete a Use Case Templlate with MS Word
How to Complete a Use Case Templlate with MS WordHow to Complete a Use Case Templlate with MS Word
How to Complete a Use Case Templlate with MS Word
 
Create A Use Case Document with ReqPro
Create A Use Case Document with ReqProCreate A Use Case Document with ReqPro
Create A Use Case Document with ReqPro
 
An Analysis of the BABOK
An Analysis of the BABOKAn Analysis of the BABOK
An Analysis of the BABOK
 
Requirements management and traceability for IIBA
Requirements management and traceability for IIBARequirements management and traceability for IIBA
Requirements management and traceability for IIBA
 
Analysis Of A Shopping Expedition Part II
Analysis Of A Shopping Expedition Part IIAnalysis Of A Shopping Expedition Part II
Analysis Of A Shopping Expedition Part II
 
Use Case and Activity Diagrams Modeling Notation
Use Case and Activity Diagrams Modeling NotationUse Case and Activity Diagrams Modeling Notation
Use Case and Activity Diagrams Modeling Notation
 
Working With Styles And Properties
Working With Styles And PropertiesWorking With Styles And Properties
Working With Styles And Properties
 
Administrating Req Pro
Administrating Req ProAdministrating Req Pro
Administrating Req Pro
 
Managing Requirement With A Rmp
Managing Requirement With A RmpManaging Requirement With A Rmp
Managing Requirement With A Rmp
 
Capture A Common Vocabulary
Capture A Common VocabularyCapture A Common Vocabulary
Capture A Common Vocabulary
 
Introduction To ReqPro
Introduction To ReqProIntroduction To ReqPro
Introduction To ReqPro
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Analysis of a Shopping Expedition Part I

  • 1. Shopping Cart Expedition Part I 11 September 2013 2013 copyright Leslie Munday Universe
  • 2. Overview    This article contains the results of a business analysis of the shopping cart problem described in the following vision statement. The analysis uses the UML notation and RUP-like process that is described in my book Analysis Through Pictures. The chosen business problem is one that the author believes every reader is able to associate with through personal experience. 2013 copyright Leslie Munday Universe 1/7/2014 2
  • 3. Vision How many times have you reached the check-out in a store to see lines of shoppers waiting to pay for their goods, and seriously considered just leaving your items in the store and coming back when it is quieter, or even going somewhere else?  How many times a week do you arrive at the check-out with a full cart , which you must unload onto the conveyor or selfcheckout (scanning every item as you unload it from the cart) and a clerk re-loads your cart differently than how you wanted it, or, you have to load and organize your cart a second time?  Have you ever reached the checkout of a store and received a bill that is for a different amount than what you were expecting? These scenarios recur millions of times every day throughout the US alone; if you have you ever thought to yourself: “There must be a more efficient way of doing this” then this presentation will provide some answers to your thoughts.  2013 copyright Leslie Munday Universe 1/7/2014 3
  • 4. Goals Goals are stated as problem statements:  The problem of loading and unloading the cart too many times.     The problem of it takes too long to check out.     Affects shoppers using carts loaded with items from the store. The impact of which is it increases time to checkout, additional work for shoppers; increased chance of damaged goods. A successful solution would be to require 1 load and 1 unload of the shopping cart by removing the need to unload in order to scan the items in the shopping cart. Affects shoppers waiting to pay for items in their shopping cart. The impact of which is long lines, crowding in the store, frustrated shoppers, loss of revenue through abandoned shopping carts. A successful solution would be to reduce checkout lines by having items in the shopping cart identified before reaching the checkout. The problem of we do not know how much a cart of items is going to cost until checkout occurs.    Affects shoppers loading carts with items. The impact of which is shopper may overspend their budget without realizing it until checkout, causing delays at the checkout counter and additional work for store workers. A successful solution would be to keep the shopper continuously informed of the cost of their cart while they are shopping, so they know how much to expect to pay at the checkout. 2013 copyright Leslie Munday Universe 1/7/2014 4
  • 5. Actors Actors may be roles played by people, or they may be computer systems used by the people in order to assist with performing a business process.  Roles are the people actors (or stakeholders) that are impacted by the process.  System actors are computer systems that assist the human actors (roles) with carrying out the process. 2013 copyright Leslie Munday Universe 1/7/2014 5
  • 6. Roles     Customer – Is anyone that enters the store who is not recognized as working in the store. Shopper – A customer who can be identified by the store as someone who shops here (often recognized by a store card in their name). Store Worker – Provides assistance to the shopper. System Administrator – Looks after the computer systems and hardware used by the store 2013 copyright Leslie Munday Universe 1/7/2014 6
  • 7. System Actors          Card Reader – Allows a store shopper to be associated with a shopping cart and for the store to identify who the customer is. (Future revisions may allow for the card reader to be able to read payment cards as well as customer identification cards.) Cashier – (Could be a human actor, but in this example we will consider it a system), is the payment device that is found at a checkout counter in a typical store, and allows shoppers to scan credit or debit cards, cash or even checks, in payment for their items. Cart Scanner – Detects items added to and removed from the shopping cart. Customer Database – Contains a record of all customers registered with the store. Item Detector – Located at the checkout, it detects any store items that pass through it. Product Database – Is where a record of every item sold in the store is kept. Shopping Cart – Is a container for items that are to be purchased from the store by a single shopper. Store Clerk display – Alerts store workers to problems with the shopping system. Shopping Cart Display – Keeps the shopper informed of their potential purchases and sends messages to the shopper. 2013 copyright Leslie Munday Universe 1/7/2014 7
  • 8. System Actors Diagram 2013 copyright Leslie Munday Universe 1/7/2014 8
  • 9. As-Is Business Model  The first model the business analyst traditionally builds is called the „as-is‟ model. This captures the current business process and is used to compare the differences between the current process and the future process, to identify changes, things that can stay the same and estimate the return on investment of building a new process. 2013 copyright Leslie Munday Universe 1/7/2014 9
  • 10. Business Objects     The item detector recognizes unscanned items leaving the store. (Not strictly true; often it only recognizes the more expensive items.) Items are products that the store sells to its customers. An item may be scanned or unscanned. The scanner recognizes items as they are scanned. Scanning an item informs the cashier of a cost to be added to the shoppers bill. 2013 copyright Leslie Munday Universe 1/7/2014 10
  • 11. As-Is Business Objects Diagram 2013 copyright Leslie Munday Universe 1/7/2014 11
  • 12. As-Is Business Use Cases A business use case describes a business process that gives benefit to an actor. The actor and the benefiting process are connected by a relationship.  Buy Products – This is the process by which the shopper obtains items in the store.  Abandon Cart – This use case allows the shopper to abort the buy „Buy Products‟ process at any time, by simply abandoning their shopping cart. 2013 copyright Leslie Munday Universe 1/7/2014 12
  • 13. As-Is Business Use Case Diagram Abandon Cart – This use case simply allows a shopper to be disassociated with a shopping cart. 2013 copyright Leslie Munday Universe 1/7/2014 13
  • 14. Buy Products Business Use Case This is the process by which the shopper obtains items in the store.  Precondition: Before the process starts the customer is not recognized as being in the store.  Trigger: The customer takes a shopping cart (we are only interested in shoppers, who are shopping with a cart). 1. The customer takes ownership of a single shopping cart while in the store, they are now a shopper. 2. At first the shopping cart is empty. 3. As the shopper shops in the store they load up the cart with items. The shopper may add or remove items in the cart. If the cart becomes empty, we return to step 2. Otherwise repeat this step. 4. If the cart is not empty, the shopper may checkout at anytime by scanning their cart items. 5. Once scanning is complete the shopper pays for their scanned items. 6. The shopper then loads their scanned items back into the cart. 7. The shopper exits the store where any unpaid items are detected 8. The shopper empties their shopping cart and returns it to the store. 9. The use case ends.  Postcondition: The customer has completed their shopping. 2013 copyright Leslie Munday Universe 1/7/2014 14
  • 15. As-Is Buy Products Activity Diagram The business objects are added for consistency checking purposes, and do not necessarily form part of the use case itself. 2013 copyright Leslie Munday Universe 1/7/2014 15
  • 16. To-Be Business Model     The item detector recognizes unscanned items by counting those exiting the store and comparing to the items paid for. Items are still identified as scanned items or unscanned items. Items are now scanned by the shopping cart. There is no need for a separate scanner. The cashier automatically reads the cost of items in the cart and takes payment for those items. 2013 copyright Leslie Munday Universe 1/7/2014 16
  • 17. To-Be Business Objects Diagram 2013 copyright Leslie Munday Universe 1/7/2014 17
  • 18. To-Be Business Use Case    When the shopper reaches the checkout, they no longer have to scan the items in the shopping cart. The items passing the checkout are compared to those in the cart and if they are the same the cashier charges the shopper for the items in the cart. The total cost of the items in the cart is known to the cashier without having to scan them. How is this possible – by adding an intelligent system to the shopping cart. The shopping cart will track the cost of items being placed in the cart and also those being removed from the cart. The shopper simply exits the store and empties the cart. 2013 copyright Leslie Munday Universe 1/7/2014 18
  • 19. To-Be Buy Products Activity Diagram 2013 copyright Leslie Munday Universe 1/7/2014 19
  • 20. Architecture The business architecture shows the systems that will be used to automate the shopping experience, and how they communicate with each other.  The shopping system is a new system that will be used to control the shopping experience. It communicates with the following nodes:            Shopping Cart – sends messages to and receives scanned items. Cashier – sends the item description and cost to and receives feedback about payment made by the shopper. Item Detector – informs the system of items that pass through it. Customer Database – sends the customer Id to the customer database and is returned information about the customer. Store System – sends messages to the store system for assistance with the shopping experience. The shopping cart scans products added to and removed from the cart, reads the customer store card and displays messages to the shopper. The product database contains all the information needed about products sold in the store. This is sent to the shopping system upon request. A Customer Database has been added to the architecture to track and validate shoppers. (Future extensions to the system may allow for tracking and responding to customer behavior.) The Cashier system deals with making payment. It receives a total cost from the shopping system and ensures the correct payment is made by the shopper. The Store system is used by employees to assist with the day-to-day operation of the store. The Item Detector sends information about products at the checkout to the shopping system. 2013 copyright Leslie Munday Universe 1/7/2014 20
  • 21. Architecture Diagram 2013 copyright Leslie Munday Universe 1/7/2014 21
  • 22. Systems   Each system in the architecture has its own set of use cases. The system with which we are mostly concerned is the Shopping Cart System, however, changes are needed to the Customer Database, Product Database and the Cashier systems. The Item Detector detects store items as they pass through it. 2013 copyright Leslie Munday Universe 1/7/2014 22
  • 23. Shopping Cart Context Diagram 2013 copyright Leslie Munday Universe 1/7/2014 23
  • 24. Cart Use Cases    The context diagram contains a summary of the use cases for the shopping cart system and their actors. Consider the context diagram as containing one super-use-case connecting to the system actors. The system use cases are captured by the system use case diagram for the shopping cart system. 2013 copyright Leslie Munday Universe 1/7/2014 24
  • 25. Shopping Cart Use Case Diagram 2013 copyright Leslie Munday Universe 1/7/2014 25
  • 26. Assigning Cart To Shopper Use Case  Shoppers are identified by their store card, which includes a unique shopperId attribute. The customer card is read by the cart (bank cards are a future option for investigation), and the customer is identified by the customer database. The customer may be refused to use the shopping system for many reasons (in which case they will shop using the current asis process). Otherwise the customer is approved as a shopper and the new shopping experience begins. 2013 copyright Leslie Munday Universe 1/7/2014 26
  • 27. Assigning Cart To Shopper Activity 2013 copyright Leslie Munday Universe 1/7/2014 27
  • 28. Assigning Cart To Shopper Steps Precondition: The shopping cart is not assigned to a shopper Trigger: A customer enters their store card and the cart reads their Shopper Id Steps: 1. Shopping cart card reader reads the card 2. Card is able to be read and the shopping cart sends the customer id to the customer database and requests the shopper information 3. The customer database responds with a valid shopper information 4. The cart informs the shopper that they have been accepted and they may start shopping 5. The use case ends Postcondition Customer Is A Shopper. Alternative Path: None. Exception Path: E.1. Card Cannot Be Read 6. At step 2, the customer card cannot be read 7. The customer is displayed a card read error 8. The use case ends Postcondition: The customer is not allowed to use the shopping system. E.2. Customer Is Not Allowed To Use The Shopping System (or they are already assigned to a shopping cart) 9. At step 3, the customer database informs the shopping cart system that the customer is not a shopper or that they are already assigned to a cart 10. The customer is displayed a message to see membership 11. The use case ends Postcondition: The customer is not shopping. 2013 copyright Leslie Munday Universe 1/7/2014 28
  • 29. Releasing Cart From Shopper Use Case  A customer is assigned to a single cart when their store card is inserted into the card reader. If the card is removed the customer is no longer assigned to the cart. If there are unpaid items in the cart the shopper is informed that they have not finished shopping. (The store clerk could also be informed of carts containing unpaid items. This may allow for easier cleanup within the store.) 2013 copyright Leslie Munday Universe 1/7/2014 29
  • 30. Releasing Cart From Shopper Activity 2013 copyright Leslie Munday Universe 1/7/2014 30
  • 31. Releasing Cart From Shopper Steps Precondition: The shopping cart is assigned to a shopper Trigger: The customer is shopping Steps: 1. The shopping cart monitors the card reader 2. The card is removed from the cart 3. There are no items in the cart and 4. The shopping cart informs the user to return the cart to the store 5. The shopping cart informs the customer database that the customer is no longer shopping 6. Use case ends Postcondition The shopping cart is available to be used by another customer for shopping. Alternative Path: A.1 Cart Is Not Empty 7. At step 3, there are items in the cart and the shopper is informed that they have unpaid for items in the cart 8. Use case continues from step 3 Exception Path: None. 2013 copyright Leslie Munday Universe 1/7/2014 31
  • 32. System Is Monitoring Shopper Use Case  The shopping cart system will monitor store items as they are added to or removed from the shopping cart. A total cost (and optional list of items in the cart) is displayed to the shopper at all times. 2013 copyright Leslie Munday Universe 1/7/2014 32
  • 33. System Is Monitoring Shopper Activity 2013 copyright Leslie Munday Universe 1/7/2014 33
  • 34. System Is Monitoring Shopper Steps Precondition: The shopping cart is empty (this use case functions whether or not the cart is assigned to a shopper) Trigger: A store item is recognized as being added to the shopping cart Steps: 1. The system requests the product inf ormation from the product database 2. The product database returns cost of the item and product information 3. The system is displaying the total cost of items already in the shopping cart 4. The contents of the cart are changed 5. The system requests the changed product information from the product database 6. The product database returns the product information and cost of the item (may need to add consideration for what happens if the product is not found) 7. An item was removed from the cart and the system updates the display to show that the item has been removed 8. The cart is empty and the use case ends. Postcondition: The cart is empty. Alternative Path: A.1 Item Is Added To The Cart 9. At step 7, an item was added to the cart and the system upd ates the display to show that the item was added 10. The use case continues from step 3 A.2 Cart Is Not Empty 11. At step 8, the cart has items in it and the use case continues from step 3 Exception Path: None. 2013 copyright Leslie Munday Universe 1/7/2014 34
  • 35. Shopper Requests Assistance Use Case  The shopping cart system will monitor store items as they are added to or removed from the shopping cart. A total cost (and optional list of items in the cart) is displayed to the shopper at all times. 2013 copyright Leslie Munday Universe 1/7/2014 35
  • 36. Shopper Requests Assistance Activity 2013 copyright Leslie Munday Universe 1/7/2014 36
  • 37. Shopper Requests Assistance Steps Precondition: Shopper is assigned to a cart Trigger: Shopper requests assistance Steps: 1. System sends a request to the store clerk display from the cart and shopper id 2. The use case ends. Postcondition Assistance message is sent to the store clerk display. Alternative Path: None. Exception Path: None. 2013 copyright Leslie Munday Universe 1/7/2014 37
  • 38. Shopper Checking Out Use Case    Once the shopper reaches the checkout area with a cart that is assigned to them, they will be automatically billed and requested to make payment. If the cart is not assigned to a shopper or if payment was not completed, a store clerk is informed to assist the shopper. Upon completion of payment, a check is made to verify that the items exiting the checkout are equivalent to the items that were paid for. If there is a discrepancy a store clerk is informed to assist the shopper. 2013 copyright Leslie Munday Universe 1/7/2014 38
  • 39. Shopper Checking Out Activity 2013 copyright Leslie Munday Universe 1/7/2014 39
  • 40. Shopper Checking Out Steps Precondition: There are unpaid items in the shopping cart Trigger: The cart reaches the checkout Steps: 1. The cart is assigned to a shopper and the total amount for items in the cart is sent to the cashier system 2. The cashier system reports that payment has been accepted for the items 3. The system requests the total for items passing through the item detector 4. The item detector returns information about the items in the cart (could simply be the number of items or it could return an identifier for each item) 5. The total of all items is equal to the items paid for and the shopping cart informs the shopper that they may now remove their card and exit the store 6. The use case ends. Postcondition The shopper has checked out their items from the store. Alternative Path: None. Exception Path: E.1. Cart Is Not Assigned To A Shopper 7. At step 1, the cart is not assigned to a shopper 8. The system informs the store clerk that the cart cannot be checked out without a shopper assigned 9. The system informs the customer that they need to insert their shopping card in order to checkout 10. The use case ends. Postcondition The shopping cart was not checked out. E.2. Payment Is Not Accepted 11. At step 2, the cashier system informs the cart that payment was not accepted 12. The system informs the store clerk to assist the shopper with checking out their cart 13. The use case ends. Postcondition: 2013 copyright Leslie Munday Universe 1/7/2014 40
  • 41. Other Systems      In addition to the „new‟ Shopping Cart system, several other existing systems are impacted by the business needs. Item Detector – As the shopping cart reaches the checkout the item detector reads the items in possession of the shopper and sends this information to the shopping cart system upon request. Product Database - The system administrator has the ability to add, remove and change products in the product database and upon request the product database will send product information to a requesting store system. Customer Database - The system administrator has the ability to add, remove and change shopper information in the customer database and upon request the customer database will send shopper information to a requesting store system. Cashier - The cashier system receives item details from the shopping cart system and returns a payment status. 2013 copyright Leslie Munday Universe 1/7/2014 41
  • 42. Other system Use Cases Item Detector Use Case Diagram Product Database Use Case Diagram Customer Database Use Case Diagram 2013 copyright Leslie Munday Universe 1/7/2014 Cashier Use Case Diagram 42
  • 43. Summary The use case model captures the functionality to be implemented by the project team. Use cases are structured in such a manner that each can be implemented independent of the others in the project. Note that each us case is assigned to 1 and only 1 system; as such implementing a single use case may not achieve any of the project objectives. In order to determine which order to implement the use cases, we need to trace them to the business model  The Customer Is Shopping business activity is implemented by Shopping Cart system use cases, Shopper Requests Assistance, Assigning Cart To Shopper and System Is Monitoring Shopping Cart, also by the Product Database use case, Sending Product Info.  Customer Taking Cart business activity is implemented by the shopping cart system use case Assigning Cart To Shopper and the Customer Database system use case, Sending Customer Info.  Cart Contains Items business activity and Cart Is Empty business activities are satisfied by the System Monitoring Shopping Cart system use case.  The Customer Paying For Items business activity is satisfied by the implementation of systems use cases, Take Payment, Checking Out Shopper and Detect Items, which are assigned to the shopping cart, cashier and item detector systems resp.  Scanning Items business activity is satisfied by the item detector system use case Detect Items, which detects items leaving the store.  The Customer Leaving store business activity is partially satisfied by the Releasing Cart From Shopper use case.  The Emptying Shopping Cart business activity is partially satisfied by the implementation of the systems use case Releasing Cart From Shopper. (The process of removing items from the cart is performed manually by the shopper.)  The Edit Customer and Edit Product system use cases, are derived from decisions made about the architecture, and have no direct relationship to the business use cases. (Similar use cases can be derived for maintenance of the shopping cart, the scanner and the cashier systems.) 2013 copyright Leslie Munday Universe 1/7/2014 43
  • 44. Traceability Diagram 2013 copyright Leslie Munday Universe 1/7/2014 44
  • 45. Credits And References     Visual Paradigm – used to draw diagrams, model the business and systems analysis. Microsoft Office – Used for publishing this article. Analysis Through Pictures http://www.lulu.com/product/ebook/analysisthroughpictures/18335194?productTrackingContext=se arch_results/search_shelf/center/2 Part II will describe how to build a Platform Independent logical Model from the system use cases. 2013 copyright Leslie Munday Universe 1/7/2014 45