SlideShare a Scribd company logo
1 of 19
Download to read offline
Development, Frameworks and Methods
1
Student Name: Myint Oo @ Amirul Hassan
UOG Student Registration ID: 000805763
Coursework Title: Children Support Agency
COMP1648: Development, Frameworks and Methods
Due Date: 11/11/2013
Center: KMD (Yangon, Myanmar)
Development, Frameworks and Methods
2
Table of Content
Section A
A.1 Management Summary …………………………………………………………..….5
A.1.1 Some about current information system……………………...………….….5
A.1.2 Current issues which CSA is facing…………..………………………….…5
A.1.3 What CSA expects from MIS………………………………………….…...5
A.1.4 Management on developing new MIS……………………….……………..6
A.1.5 DSDM is appropriate for MIS project…………….....……………………..6
A.1.6 Advantages of using DSDM…………..……………………………….…...6
A.1.7 Disadvantages of using DSDM…………………………………………......6
Section B
B.1 High Level Requirement
B.1.1 Short explanation of high level requirement requirements………….….….8
B.1.2 Short explanation of functional and non-functional requirement……….…8
B.1.3 Appropriate High level requirements………………………………..…...8-9
B.1.4 Inappropriate High level requirements……………………………….....9-10
B.2 Moscow Prioritization
B.2.1 List of functional and non-functional requirements based on
high level requirement (appropriate)………………………………………….…10
B.2.2 Explanation of setting prioritizing the requirements………………..…11-12
B.2.3 High level requirements shown in three increments………………..…12-14
Section C
C.1 Management Summary (LSEPI Issues based on DPA)
C.1.2 Why Data Controller is important in CSA………………………….….....16
C.1.2 How Data Controller will help overcome LSEPI issues
with two case study examples……………………………………………..…16-17
Development, Frameworks and Methods
3
C.2 Management Summary (BCS Code of conduct)
C.2.1 What professional body do…………...………………………..……..….18
C.2.2 Purpose of professional body…………………………….……………...18
C.2.3 Four professional issues that the system developer
may need to consider ……………...………………………..……....18-19
Development, Frameworks and Methods
4
Section A
Development, Frameworks and Methods
5
Management Summary
Some about current information system
The current information system doesn’t come into use for all fields of CSA. They have to
overcome a lot of obstacles to manage projects with it. The current information system can’t be used
for managing projects as it doesn’t support. It can only be used for the financial transactions in CSA.
The system they run doesn’t gratify all their needs as it’s an off-the-shelf payroll system. So, a new
management information system has become a must to monitor all projects of CSA. CSA is
overcoming various difficulties as it’s lacking an effective MIS. The following are some key issues
that the CSA is facing currently.
Current issues which CSA is facing
- Due to the different approaches and requirements of doing the project by different staff,
the organization doesn’t have a consistent way of doing a project
- Staff are very dependent on each other because of lack of guidance from the SEG
- No systematic way of recording information
- Some staff keep the record of the project using a paper based system
- The current system is not secure
- The Finance Director doesn’t get correct financial data from Area Managers and Regional
Directors sometimes and they information provided was not very clear enough
- There is no hard connection between the Financial system and MIS
- The head of HR have some problems with Area Managers for keeping the record of their
staff
- No clear record of which contracts are presently in force, what resources are needed and
the deadline of each contract etc
- Peter Jackson, Area Manager has to give much time of searching pieces of data and
collecting all the data together
What CSA expects from MIS
As CSA is running 60 different projects at different places, the requirements and issues from all
offices are increasing. The current system can’t help with all. The new MIS will be developed with
these following requirements which are really required by CSA. New MIS will help CSA monitor and
manage all projects.
The new MIS will be able to gather all data from local centers and it can be accessed from all local
offices. It can produce correct report with complete details for SMT, Trustees and funders. It will
contain some standard set of performance indicators which will help measure CSA projects. It can
keep correct financial data and shows how much resource and fund are used for each projects. The
financial data can only be accessed by the authorized person. Apart from financial data, every
department will have access to see the information they need. It will have a standard way of keeping
the data. Entering the same data at the same place will not be allowed. So, the data will become
consistent and correct. It will allow accessing to the sensitive data of CSA to the authorized people
only. It will keep the details of contracts between CSA and funding bodies which is important for
starting a project. It will also save the demographic data of young people and this type of data can be
accessible from local centers depending on their needs. It also helps regional director, area managers
and lead workers manage their respective projects.
Development, Frameworks and Methods
6
Management on developing new MIS
The new MIS will be developed under the instruction of the Administrative Services Director,
Jim Massey and the finance director, Steve Sutherland. These two people have been working in CSA
for a long time and know all about CSA. Jim Massey himself wants to change the current MIS and he
surely knows that current MIS is completely rubbish. He also realizes CSA needs an effective
management information system. He also states that as long as CSA doesn’t change the current
system, there will always be hardship to get new contracts in the future which might impact the whole
organization. Steve Sutherland suggests that the new MIS must include finance management for local
projects and access to financial data should be protected.
DSDM is appropriate for MIS project
According to Sebastian LeFevre, an Information Systems Consultant, he has just had a
contract with CSA to help analysis of what the organization really needs. He reviewed the current
information system and found that it is lack of security and secure storage of data and many more
problems. He also recommends using an agile method, called DSDM.
DSDM is appropriate for developing a new MIS because the MIS will be developed and
managed under a top management group called Administrative Service director and Finance Director.
The high level requirements are already gathered. Functionality is clear enough as the staffs have
already disclosed their needs in the interview, for example, (No clear record of which contracts are
presently in force, what resources are needed and the deadline of each contract etc) discussed by
Julieanne Black.
Advantages of using DSDM
As all the requirements are collected at the beginning, the system is more likely to meet the
business needs for examples; almost all staffs of CSA have identified their respective needs in the
interview. It will increase the speed of development and increase quality because of the end user
involvement. For example, Peter Jackson, Area Manager who has been working in the organization
for 18 years, has a lot of idea concerning the organization needs, is very willing and pleased to be a
part of the development. So, he can give feedback thought prototyping which can make a quality
system delivers the real needs of the organization. Time boxing and cost of system can be fixed by
analyzing the clear and understandable functions or requirements.
Disadvantages of using DSDM
There will be features which need to be reduced due to the time boxing. For examples
Functions which are not very important for the organization will be removed. But for good
information system, these types of requirements are necessary for example “Sending messages to
young people about events in the area”.
Total words for Section A: 988
Development, Frameworks and Methods
7
Section B
Development, Frameworks and Methods
8
A short explanation of high level requirement
High level requirements are the same as business requirements which are better understood by the top
level management. It is only planned to offer guidance to the key issues or problems. This can be split
into functional and non-functional requirements.
A short explanation of functional and non functional requirement
Functional requirements describe what a system is supposed to do. These are always the main
functions of a system to be built. They focus on these criteria such as business rules, validation,
managing finance, reporting requirement etc. Non functional requirements describe further functions
of the system to be built except functionality. It indicates criteria which evaluates the function of a
system instead of exact behaviors. They focus on these criteria such as performance, security,
maintainability, reliability etc.
Remark: I have also taken a few requirements from the interview list in order to get an effective
information system. Without them, the system will be incomplete and unusable. These are excluded in
overall requirements list given at the case study.
B1. High level appropriate and inappropriate requirements
B1.1 High level requirements (Appropriate)
1. Collecting data correctly from local offices
MIS must be able to keep the data about projects from all local centers. If required, it must
offer data immediately. Depending on data, SEG can offer guidance to improve the
performance of employees and projects.
2. Producing management reports for both SMT and Trustees
MIS must produce reports about each project, only then they can estimate for further projects
and make decision what to do next. They can also offer necessary instructions for projects
having problems. Everything they ratify is based on project reports.
3. Adding a standard set of performance indicators into the system in order to measure the
project
MIS will include some standards set of performance indicators for example, the time box of a
project, use of resource, budget, man power, number young people improved in each project
to measure the effectiveness and success of projects.
4. Giving better data as to how finances and resources are allocated
MIS must have this function to get correct financial records from local offices as regional
directors are reluctant to give accurate financial data. It must also be able to offer suggestions
to the Head Office to allocate finance and resources because CSA needs to know the use of
resources and finance for each project running at different offices. Only then they can send
information to their related parties who have asked to see it.
Development, Frameworks and Methods
9
5. Developing a common interface for the Management Information System and external
systems so that data is only entered once
CSA will have hardship to control MIS if it contains the same data at different places. So,
entering the data more than once must be restricted.
6. Can pass the information from on project to another
To get faster performance of the projects, the MIS should provide easy access to information
from one project to another. It increases workload and reduce overheads and saves time.
7. Ensuring the data is protected and it is allowed to use to the right people at different
levels in the organization
A data controller must be appointed to keep data securely. The system must provide access to
sensitive data such as financial information to the authorized person only because there are
many staffs in CSA and the data can be used for illegal purposes.
8. Keeping details of the contracts between CSA and funding bodies for each project
MIS must have this requirement in order to set time boxing, use resources and man power for
each project at CSA. This will help CSA manage projects.
9. Permitting projects to keep demographic data about young people in a standard way,
able to be seen by central offices
The management team of CSA must know demographic data concerning young people
because they have to know what the real needs of young people are. Only then they can know
what types of project are required to start at what area.
B1.2 High Level Requirement (Inappropriate)
10. Containing a simple case management tool to allow project workers to record short
notes in a secure way
This requirement can make the MIS complex and unusable by keeping a lot of detail
information of managing the projects which are not very important for CSA.
11. Developing an enterprise scheduling tool for the managing meetings with staff and
young people
The Management information system will become very large if it contains enterprise
scheduling tools which are not urgently needed by CSA. They just need an effective
management tool to manage projects.
Development, Frameworks and Methods
10
12. Integrating existing data into the system
As CSA doesn’t have a standard way of recording projects information, the existing data
won’t come into use for developing MIS.
13. Developing the system in order to be extendable to contain extra features in the future
This requirement should be thought before development of the MIS but not very important for
CSA to monitor projects. MIS should have only core functions for management (for example
keeping financial records correctly). CSA has just intended to add features of the MIS after it
has been developed.
Word Counts B1= 861
********************************************************************************
Moscow
B2. List of functional and non-functional requirements
B2.1The following are functional and non-functional requirements based on appropriate high
level requirements with prioritization.
Functional Requirements
1. Collecting data correctly from local offices Must Have
2. Producing management reports for both SMT and Trustees Must Have
3. Giving better data as to how finance and resources are allocated Must Have
4. Keeping details of the contracts between CSA and funding Must Have
bodies for each project
5. Adding a standard set of performance indicators into the system
in order to measure projects Must Have
6. Permitting projects to keep demographic data about
young people in a standard way, able to be seen by central offices Must Have
7. Developing a common interface for the Management Information
system and external systems so that data only entered one Could Have
Non-Functional Requirements
8. Ensuring the data is protected and it is allowed to use
to the right people at different levels in the organization Should Have
9. Can pass the information from on project to another Could Have
Development, Frameworks and Methods
11
B2.2 Explanation of setting about prioritization with justification
Functional Requirement
Collecting data correctly from local offices Must Have
This is a must have requirement for developing MIS. As CSA needs MIS to monitor all projects, the
system must be added this requirement to be able to collect correct data about each project from local
offices. Without having this in MIS, CSA will have difficulties to manage projects from head offices
as data about projects are missing which are very important for managing projects.
Producing management reports for both SMT and Trustees Must Have
The requirement must be included in MIS because it must produce reports by showing all
management information for example, progress of project, use of resources and man power used for
each project etc. Both SMT and Trustees need reports to offer necessary guidance and show that the
projects are going well to the funders.
Giving better data as to how finance and resources are allocated Must Have
This is a must have requirement for developing MIS because MIS must have correct financial record
and it should provide data for the use of finance and resource when needed. Only then CSA can
estimate for future projects and avoid unwanted cost.
Keeping details of the contracts between CSA and funding Must Have
bodies for each project
MIS must includes this requirement because MIS must have all information of contracts between
CSA and funding bodies in order to offer contract information to the contract team when required.
With this information, contract team can manage current contracts.
Adding a standard set of performance indicators into the system Must Have
in order to measure projects
This requirement can’t be left because CSA will not able to measure the projects running under it so
that MIS must be added some standard set of performance indicators for example, functions that
calculate use of resources, finance, number of young people improved by each project. This will help
CSA make better projects in the future.
Permitting projects to keep demographic data about
young people in a standard way, able to be seen by central offices Must Have
By keeping demographic data systematically, CSA can easily analyze for future projects based on
these data. So, I selected this requirement as a must have for developing MIS.
Development, Frameworks and Methods
12
Developing a common interface for the Management Information Could Have
system and external systems so that data only entered one
CSA can monitor or manage projects without this requirement as it is related to data input and
restriction of inserting duplicate data. But MIS may include duplicate data if it doesn’t add this
requirement.
Non-Functional Requirements
Ensuring the data is protected and it is allowed to use Should Have
to the right people at different levels in the organization
This is a should have requirement for developing MIS because it’s related to authentication and
security. CSA can run MIS to monitor projects without this requirement. As it’s a non-profit
organization, unauthorized access to data may not effect very much on CSA. This requirement should
be included to prevent unwanted risks.
Can pass the information from on project to another Could Have
This requirement can be left for developing MIS because MIS will be able to collect all information
about project from all local offices. So, authorized people at different local offices will have access to
the data from MIS.
First Increment, Second Increment and Third Increment
Each requirement will be described for how long they will take to be completed.
As the project will be developed by using DSDM, it should be finished during six months. 8
hours for a day and 40 hours for a month and 960 hours for six months. Within 770 hours, all
must have functions will be completed.
These are the must have requirements which will be delivered as the first increment. The MIS will
really be workable with these requirements and employees in CSA can give feedback for each
increment for avoid unwanted errors and meet it their desired requirements.
First Increment
No Requirement Hours Prioritization
1 Collecting data correctly from local offices 120 Must Have
2 Producing management reports for both SMT and
Trustees
80 Must Have
3 Giving better data as to how finance and resources are
allocated
100 Must Have
4 Keeping details of the contracts between CSA and
funding bodies for each project
100 Must Have
5 Adding a standard set of performance indicators into the
system in order to measure projects
80 Must Have
Development, Frameworks and Methods
13
6 Permitting projects to keep demographic data about
young people in a standard way, able to be seen by
central offices
80 Must Have
7 Ensuring the data is protected and it is allowed to use
to the right people at different levels in the organization
70
8 Developing a common interface for the Management
Information system and external systems so that data
only entered one
70
9 Can pass the information from on project to another 70
Total Must have hours= 770
This should have requirement is essential but not very important for the system to contains in the first
increment. So, it will be delivered as the second increment to the users.
Second Increment
No Requirement Hours Prioritization
1 Collecting data correctly from local offices 120 Must Have
2 Producing management reports for both SMT and
Trustees
80 Must Have
3 Giving better data as to how finance and resources are
allocated
100 Must Have
4 Keeping details of the contracts between CSA and
funding bodies for each project
100 Must Have
5 Adding a standard set of performance indicators into the
system in order to measure projects
80 Must Have
6 Permitting projects to keep demographic data about
young people in a standard way, able to be seen by
central offices
80 Must Have
7 Ensuring the data is protected and it is allowed to use
to the right people at different levels in the organization
70 Should Have
8 Developing a common interface for the Management
Information system and external systems so that data
only entered one
70
9 Can pass the information from on project to another 70
Total should have hours = 70
Second Increment total hours = 840
Development, Frameworks and Methods
14
These are could have requirement and these can make MIS better. It could be left if the time box is
not enough. But, MIS will work without any problems.
Third Increment
No Requirement Hours Prioritization
1 Collecting data correctly from local offices 120 Must Have
2 Producing management reports for both SMT and
Trustees
80 Must Have
3 Giving better data as to how finance and resources are
allocated
100 Must Have
4 Keeping details of the contracts between CSA and
funding bodies for each project
100 Must Have
5 Adding a standard set of performance indicators into the
system in order to measure projects
80 Must Have
6 Permitting projects to keep demographic data about
young people in a standard way, able to be seen by
central offices
80 Must Have
7 Ensuring the data is protected and it is allowed to use
to the right people at different levels in the organization
70 Should Have
8 Developing a common interface for the Management
Information system and external systems so that data
only entered one
60 Could Have
9 Can pass the information from on project to another 60 Could Have
Must Have= 770 hours
Should Have= 70 hours
Could Have= 120 hours
Within six months, MIS will be finished. But some unexpected risks may occur, so, there will be
some delays to deliver the system. If the project is likely to be late, should have and could have
requirements could be left.
********************************************************************************
Development, Frameworks and Methods
15
Section C
Development, Frameworks and Methods
16
(C1)
As CSA is a charity organization, it relies on public trust. It’s not possible to make sure that CSA
is 100% safe at all times. So, CSA needs to show that they focus on its responsibilities to keep the
data securely and it is taking balanced measures for protecting personal data from being misused. As
it has 60 different projects at different local offices, data protection has become an issue for it with
large amount of data of young people and funders but although small charity organizations are
possibly to keep personal data on people for example staff, trustees. Currently CSA is facing various
difficulties to collect data as staffs have no awareness of keeping data securely and no professionalism
about dissemination of data. What’s worse is duplication of the same personal data because CSA has
no standard way of keep data related to young people, staff and funders or supporters.
In order for CSA to stand on its existing reputation, it needs to handle all its data securely. CSA
should make sure that the personal information is not misused and doesn’t reach into wrong hands.
So, to keep and manage data securely, a data controller should be appointed who has to process CSA
data under Data Protection Act. DPA is only related to the treatment of personal data. He will be
lawfully in charge for making sure that data processing complies with the DPA. DPA is in relation to
protect people from the misuse of their personal information. In order for data controllers to work at
organization, they need to register with the Information Commissioner by providing details on the
type of data which will be hold and the purpose of processing personal data. DPA states eight
principles that the data controllers must follow them when processing the data.
As Data controllers must follow the eight principles, the data about CSA projects will become secure.
Every local office can access to data within CSA depending on their needs but they must comply with
the data protection act. So, data will be protected and not misused. Public trust for CSA will increase.
The following are the issues that CSA may have to face after developing a centralized management
information system attached what the data controller will have to solve these issues.
Example (One)
CSA has all the personal data of employees, young people and funders. If the government or other
charity organizations ask for the data it holds to use for other purpose, CSA will likely to share the
data to them.
Data controller help overcome this issue according to DPA 1,
- Deciding why the government or other charity organizations needs the personal data and what
they intend to do with it
- Making sure that CSA provides clear and correct privacy notices to employees or young
people for collecting their personal data
 Privacy notice should contain the purpose of processing their personal data
and the processing of their personal information is fair such as who you may
disclose the information to that subject would not expect.
Development, Frameworks and Methods
17
Example (Two)
The system will permit projects to keep demographic data about young people which will be
accessible by central offices. Existing data will also be kept in the new MIS.
According to DPA 3,
- Data controller must make sure that whether the personal information that the CSA holds is
relevant. In order to consider if each is relevant for the purposes this is described in a privacy
notice to the data subject and in notification to the Information Commissioner Organization.
- Data Controller must ensure that the data he holds is too much. The excessive data that he
doesn’t require for his specified purposes, must delete it.
- Data Controller must establish if the data is sufficient to make decisions it informs, decisions
that may have a major impact on the data subject will probably needs a great deal of
information and CSA is often required to make those decisions.
- Making sure that CSA holds the right information is important for both decisions making and
protecting individuals CSA hold data about. It’s ethical and legal responsibilities for both
CSA and data controller to keep their personal data properly.
Word Counts: 700
Development, Frameworks and Methods
18
(C2)
Purpose of the code of conduct for a professional body (BCS)
Today, People around the world are using IT for different purposes. Especially, organizations and
companies are mainly using IT for their daily processing to be smooth and reduce workload. As IT is
on the rise, the IT professionals and universities are also increasing day by day. And, the IT society
will become outrageous because IT professionals and universities are misusing IT and taking
advantages of people who are lack of IT knowledge. Not only in IT but also other fields are like that.
It’s widely regarded that using IT is very expensive in organizations and companies. So, every
organization doesn’t need to have wasted their investment by having unusable systems. So, they need
a professional body to control all these issues. That’s why Professional bodies such as BCS have to
form to handle IT professionals and set the standards and rules for them to work accordingly. Here is
the purpose of BCS
 Promote the study and practice of computing and to advance knowledge of and education in
IT for public’s advantage.
 Sets out the professional standards needed by the society
 Applies to members of all grades (including students)
BCS Code of conduct
Based on the following BCS code of conduct, the four professional issues are done.
(d) “Shall not reveal or allow to be revealed, or use for personal advantage or to profit a third party,
private information apart from the permission of relevant authority, or as needed by legislation”.
(e) “NOT misrepresent or withhold information on the performance of products, systems or services
(unless lawfully bound by a duty of confidentiality not to disclose such information), or take
advantage of the lack of relevant knowledge or inexperience of others”.
(g) “Shall refuse and not make any offer inducement”.
(f) “Shall avoid hurting others, their belongings, reputation, and employment by false” etc.
(b) “Shall avoid any condition which may raise conflict of interest between professionals and
employers and organization”.
(a) “Shall be focus on and careful of public health, safety and environment in professional role”.
Ref: BCS, the Chartered Institute for IT, 8 June 2011. Code of Conduct for BCS members. Trustee
Board Regulations Schedule 3 Volume 4, page 2-3. BCS, UK.
Four Professional Issues
After developing MIS for CSA, the system developer will know all about a charity organization
and have the copy of MIS as he would develop it. If other charity organization may ask him to
develop a similar system for their organization, he may sell the information system of CSA by
adding some necessary functions.
In this condition, the system developer will be in breach of rule (d) and (e) of duty of relevant
authority of the BCS. The case would be clear of disclosing information for personal gains without
letting CSA know and keeping information of the MIS of CSA on the performance of system and
taking benefits from other organization who doesn’t know that the system that the system developer
Development, Frameworks and Methods
19
will deliver to them legally belongs to the CSA. Being a professional, he should seek permission and
provide explanation to CSA before he discloses information. He should also tell other organization
that he has developed the same similar system for CSA. So, he will take some of the functions from it
to develop a system for them.
Some of the main employees in CSA such as Sean McNally, Northern Regional Director isn’t
interested and willing for the new information system because he doesn’t want to have been
supervised from the central office so that he can take benefits with this way. So, he may
probably tell system developer to add some wrong functions by offering bribes to make central
office fail to manage his office.
According to BCS code of conduct, the system developer will be in breach of rule (g) and (f) of
professional competence and integrity and he shouldn’t take any bribe from Sean McNally and other.
Instead, he should tell the management team about that.
As the management information system that CSA wants to have is a large development project,
the system developer may take this an opportunities by giving time for other’s project during
developing CSA project in order to get more money at the same time. So, he will likely to deliver
the system later than the deadline.
In this situation, role (b) of Duty to relevant section of the BCS is the most suitable. This case would
be a plain case of increasing conflicts between system developer and CSA because he will deliver the
system late. As a professional, he should work according the commitment with CSA and finish within
time box or. Time is very important for every organization or company. So, he should not break his
commitment. He should make direct disclosure to the management team of the CSA with the correct
reasons why he fails to deliver the system on time. He should seek advice from them how to move
next.
As the system developer has contracted to CSA to develop an information system, he must
collect personal data about young people, employees and funders and will have all personal data
in his hand. He may likely to use these data when developing similar information systems.
According to BCS code of conduct, the system developer will be in breach of rule (a) of public trust.
As a professional, he should always be careful of public security and privacy. He should not disclose
their data for any purposes without their permission.
Word Counts: 734 (Exclusive of BCS Code of Conduct rules)

More Related Content

What's hot

Myo pyae phoo pwint(comp1649)
Myo pyae phoo pwint(comp1649)Myo pyae phoo pwint(comp1649)
Myo pyae phoo pwint(comp1649)Sofia Nolasco
 
Interaction design comp1649
Interaction design comp1649Interaction design comp1649
Interaction design comp1649Htet Htet Aung
 
Cw comp1640 211453_mo233_20131120_214054_1314
Cw comp1640 211453_mo233_20131120_214054_1314Cw comp1640 211453_mo233_20131120_214054_1314
Cw comp1640 211453_mo233_20131120_214054_1314Owen Muzi
 
Human Computer Interaction Design
Human Computer Interaction DesignHuman Computer Interaction Design
Human Computer Interaction DesignYeeMonNyuntWin
 
Cw comp1108 78_mo233_20141120_200330_1415
Cw comp1108 78_mo233_20141120_200330_1415Cw comp1108 78_mo233_20141120_200330_1415
Cw comp1108 78_mo233_20141120_200330_1415Owen Muzi
 
NayLinnKo_BIT_InteractionDesign
NayLinnKo_BIT_InteractionDesignNayLinnKo_BIT_InteractionDesign
NayLinnKo_BIT_InteractionDesignNay Linn Ko
 
Development Frameworks and Methods Coursework (DFM CW)
Development Frameworks and Methods Coursework (DFM CW)Development Frameworks and Methods Coursework (DFM CW)
Development Frameworks and Methods Coursework (DFM CW)Aung Hein Htet
 
May Hnit Oo Khin Business IT Project
May Hnit Oo Khin  Business IT ProjectMay Hnit Oo Khin  Business IT Project
May Hnit Oo Khin Business IT ProjectMay Hnit
 
Development Frameworks and Methods COMP1648
Development Frameworks and Methods COMP1648Development Frameworks and Methods COMP1648
Development Frameworks and Methods COMP1648Shane Min Zaw
 
User Interface Design Coursework (UID CW)
User Interface Design Coursework (UID CW)User Interface Design Coursework (UID CW)
User Interface Design Coursework (UID CW)Aung Hein Htet
 
Chapter 8 User Interface Design
Chapter 8 User Interface DesignChapter 8 User Interface Design
Chapter 8 User Interface DesignMeryl C
 
Human Computer Interaction Chapter 2 Interaction and Interaction Design Basi...
Human Computer Interaction Chapter 2  Interaction and Interaction Design Basi...Human Computer Interaction Chapter 2  Interaction and Interaction Design Basi...
Human Computer Interaction Chapter 2 Interaction and Interaction Design Basi...VijiPriya Jeyamani
 
UID_AZY_COMP1650
UID_AZY_COMP1650UID_AZY_COMP1650
UID_AZY_COMP1650Aung Zay Ya
 
Mobile Information Architecture
Mobile Information ArchitectureMobile Information Architecture
Mobile Information ArchitectureLifna C.S
 

What's hot (20)

Myo pyae phoo pwint(comp1649)
Myo pyae phoo pwint(comp1649)Myo pyae phoo pwint(comp1649)
Myo pyae phoo pwint(comp1649)
 
Interaction design comp1649
Interaction design comp1649Interaction design comp1649
Interaction design comp1649
 
MYINT OO ID BIT COURSEWORK
MYINT OO ID BIT COURSEWORKMYINT OO ID BIT COURSEWORK
MYINT OO ID BIT COURSEWORK
 
User Interface Design
User Interface DesignUser Interface Design
User Interface Design
 
Cw comp1640 211453_mo233_20131120_214054_1314
Cw comp1640 211453_mo233_20131120_214054_1314Cw comp1640 211453_mo233_20131120_214054_1314
Cw comp1640 211453_mo233_20131120_214054_1314
 
Human Computer Interaction Design
Human Computer Interaction DesignHuman Computer Interaction Design
Human Computer Interaction Design
 
Cw comp1108 78_mo233_20141120_200330_1415
Cw comp1108 78_mo233_20141120_200330_1415Cw comp1108 78_mo233_20141120_200330_1415
Cw comp1108 78_mo233_20141120_200330_1415
 
NayLinnKo_BIT_InteractionDesign
NayLinnKo_BIT_InteractionDesignNayLinnKo_BIT_InteractionDesign
NayLinnKo_BIT_InteractionDesign
 
Development Frameworks and Methods Coursework (DFM CW)
Development Frameworks and Methods Coursework (DFM CW)Development Frameworks and Methods Coursework (DFM CW)
Development Frameworks and Methods Coursework (DFM CW)
 
May Hnit Oo Khin Business IT Project
May Hnit Oo Khin  Business IT ProjectMay Hnit Oo Khin  Business IT Project
May Hnit Oo Khin Business IT Project
 
Development Frameworks and Methods COMP1648
Development Frameworks and Methods COMP1648Development Frameworks and Methods COMP1648
Development Frameworks and Methods COMP1648
 
User interface design
User interface designUser interface design
User interface design
 
Business IT Project
Business IT ProjectBusiness IT Project
Business IT Project
 
User Interface Design Coursework (UID CW)
User Interface Design Coursework (UID CW)User Interface Design Coursework (UID CW)
User Interface Design Coursework (UID CW)
 
Interaction design
Interaction designInteraction design
Interaction design
 
Chapter 8 User Interface Design
Chapter 8 User Interface DesignChapter 8 User Interface Design
Chapter 8 User Interface Design
 
Hci md exam
Hci md examHci md exam
Hci md exam
 
Human Computer Interaction Chapter 2 Interaction and Interaction Design Basi...
Human Computer Interaction Chapter 2  Interaction and Interaction Design Basi...Human Computer Interaction Chapter 2  Interaction and Interaction Design Basi...
Human Computer Interaction Chapter 2 Interaction and Interaction Design Basi...
 
UID_AZY_COMP1650
UID_AZY_COMP1650UID_AZY_COMP1650
UID_AZY_COMP1650
 
Mobile Information Architecture
Mobile Information ArchitectureMobile Information Architecture
Mobile Information Architecture
 

Viewers also liked

Development, Frameworks and Methods
Development, Frameworks and MethodsDevelopment, Frameworks and Methods
Development, Frameworks and MethodsMd. Mahbub Alam
 
Lecture 04 normalization
Lecture 04 normalization Lecture 04 normalization
Lecture 04 normalization emailharmeet
 
DFM_AZY_COMP1648
DFM_AZY_COMP1648DFM_AZY_COMP1648
DFM_AZY_COMP1648Aung Zay Ya
 
Railway booking & management system
Railway booking & management systemRailway booking & management system
Railway booking & management systemNikhil Raj
 
Railway reservation system
Railway reservation systemRailway reservation system
Railway reservation systemAbhishek Yadav
 
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NFDatabase Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NFOum Saokosal
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital ageAccenture Technology
 
Documentation of railway reservation system
Documentation of railway reservation systemDocumentation of railway reservation system
Documentation of railway reservation systemSandip Murari
 
Online railway reservation system
Online railway reservation systemOnline railway reservation system
Online railway reservation systemPIYUSH Dubey
 
Airline reservation system db design
Airline reservation system db designAirline reservation system db design
Airline reservation system db designUC San Diego
 
srs for railway reservation system
 srs for railway reservation system srs for railway reservation system
srs for railway reservation systemkhushi kalaria
 
Railway Reservation System
Railway Reservation SystemRailway Reservation System
Railway Reservation SystemRoccers
 
Presentation on Railway Reservation System
Presentation on Railway Reservation SystemPresentation on Railway Reservation System
Presentation on Railway Reservation SystemPriyanka Sharma
 

Viewers also liked (18)

Development, Frameworks and Methods
Development, Frameworks and MethodsDevelopment, Frameworks and Methods
Development, Frameworks and Methods
 
Lecture 04 normalization
Lecture 04 normalization Lecture 04 normalization
Lecture 04 normalization
 
Database Normalization by Dr. Kamal Gulati
Database Normalization by Dr. Kamal GulatiDatabase Normalization by Dr. Kamal Gulati
Database Normalization by Dr. Kamal Gulati
 
ITP BIT Coursework
ITP BIT CourseworkITP BIT Coursework
ITP BIT Coursework
 
DFM_AZY_COMP1648
DFM_AZY_COMP1648DFM_AZY_COMP1648
DFM_AZY_COMP1648
 
Railway booking & management system
Railway booking & management systemRailway booking & management system
Railway booking & management system
 
enhanced er diagram
enhanced er diagramenhanced er diagram
enhanced er diagram
 
Railway reservation system
Railway reservation systemRailway reservation system
Railway reservation system
 
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NFDatabase Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
Online railway reservation system
Online railway reservation systemOnline railway reservation system
Online railway reservation system
 
DFMA design for manufacturing and assembly
DFMA design for manufacturing and assembly DFMA design for manufacturing and assembly
DFMA design for manufacturing and assembly
 
Documentation of railway reservation system
Documentation of railway reservation systemDocumentation of railway reservation system
Documentation of railway reservation system
 
Online railway reservation system
Online railway reservation systemOnline railway reservation system
Online railway reservation system
 
Airline reservation system db design
Airline reservation system db designAirline reservation system db design
Airline reservation system db design
 
srs for railway reservation system
 srs for railway reservation system srs for railway reservation system
srs for railway reservation system
 
Railway Reservation System
Railway Reservation SystemRailway Reservation System
Railway Reservation System
 
Presentation on Railway Reservation System
Presentation on Railway Reservation SystemPresentation on Railway Reservation System
Presentation on Railway Reservation System
 

Similar to DFM BIT Coursework

Information Systems Engineering Coursework
Information Systems Engineering CourseworkInformation Systems Engineering Coursework
Information Systems Engineering CourseworkVượng Vũ
 
Designing Financial Information System Using Structured System Analysis and D...
Designing Financial Information System Using Structured System Analysis and D...Designing Financial Information System Using Structured System Analysis and D...
Designing Financial Information System Using Structured System Analysis and D...ijcnac
 
Structured systems analysis and design methodology
Structured systems analysis and design methodologyStructured systems analysis and design methodology
Structured systems analysis and design methodologyVatsana Technologies Pte Ltd
 
Running head Key Factors in Computer Information Systems1Ke.docx
Running head Key Factors in Computer Information Systems1Ke.docxRunning head Key Factors in Computer Information Systems1Ke.docx
Running head Key Factors in Computer Information Systems1Ke.docxwlynn1
 
MIS.pptx
MIS.pptxMIS.pptx
MIS.pptxU V
 
Essay Sample on Management of Information Systems
Essay Sample on Management of Information SystemsEssay Sample on Management of Information Systems
Essay Sample on Management of Information SystemsWrite my essay
 
Business Analysis and System Recommendation.docx
Business Analysis and System Recommendation.docxBusiness Analysis and System Recommendation.docx
Business Analysis and System Recommendation.docxfelicidaddinwoodie
 
Presentation by dakshinamoorthi g
Presentation by dakshinamoorthi  gPresentation by dakshinamoorthi  g
Presentation by dakshinamoorthi gPMI_IREP_TP
 
Management Information Systems: Mastering the Discreet Planning
Management Information Systems: Mastering the Discreet PlanningManagement Information Systems: Mastering the Discreet Planning
Management Information Systems: Mastering the Discreet Planningvishal dineshkumar soni
 
What is management information systems
What is management information systemsWhat is management information systems
What is management information systemsShyam Sundar Gupta
 
Management information sysstem set 1
Management information sysstem set 1Management information sysstem set 1
Management information sysstem set 1Sampath Raj
 
Assignment mqanagement information system 0047
Assignment mqanagement information system 0047Assignment mqanagement information system 0047
Assignment mqanagement information system 0047amol_dongare
 
Systems analysis project 7 can you answer the 4 questions at the ta.pdf
Systems analysis project 7 can you answer the 4 questions at the ta.pdfSystems analysis project 7 can you answer the 4 questions at the ta.pdf
Systems analysis project 7 can you answer the 4 questions at the ta.pdfformicreation
 

Similar to DFM BIT Coursework (20)

Information Systems Engineering Coursework
Information Systems Engineering CourseworkInformation Systems Engineering Coursework
Information Systems Engineering Coursework
 
Designing Financial Information System Using Structured System Analysis and D...
Designing Financial Information System Using Structured System Analysis and D...Designing Financial Information System Using Structured System Analysis and D...
Designing Financial Information System Using Structured System Analysis and D...
 
Mis
MisMis
Mis
 
Structured systems analysis and design methodology
Structured systems analysis and design methodologyStructured systems analysis and design methodology
Structured systems analysis and design methodology
 
Running head Key Factors in Computer Information Systems1Ke.docx
Running head Key Factors in Computer Information Systems1Ke.docxRunning head Key Factors in Computer Information Systems1Ke.docx
Running head Key Factors in Computer Information Systems1Ke.docx
 
IT FESTA1
IT FESTA1IT FESTA1
IT FESTA1
 
MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
 
M i s
M i sM i s
M i s
 
Mis notes unit 4
Mis notes unit 4Mis notes unit 4
Mis notes unit 4
 
Essay Sample on Management of Information Systems
Essay Sample on Management of Information SystemsEssay Sample on Management of Information Systems
Essay Sample on Management of Information Systems
 
Mis analysis
Mis analysisMis analysis
Mis analysis
 
Business Analysis and System Recommendation.docx
Business Analysis and System Recommendation.docxBusiness Analysis and System Recommendation.docx
Business Analysis and System Recommendation.docx
 
Mis finl
Mis finlMis finl
Mis finl
 
Presentation by dakshinamoorthi g
Presentation by dakshinamoorthi  gPresentation by dakshinamoorthi  g
Presentation by dakshinamoorthi g
 
Unit iii mis
Unit iii mis Unit iii mis
Unit iii mis
 
Management Information Systems: Mastering the Discreet Planning
Management Information Systems: Mastering the Discreet PlanningManagement Information Systems: Mastering the Discreet Planning
Management Information Systems: Mastering the Discreet Planning
 
What is management information systems
What is management information systemsWhat is management information systems
What is management information systems
 
Management information sysstem set 1
Management information sysstem set 1Management information sysstem set 1
Management information sysstem set 1
 
Assignment mqanagement information system 0047
Assignment mqanagement information system 0047Assignment mqanagement information system 0047
Assignment mqanagement information system 0047
 
Systems analysis project 7 can you answer the 4 questions at the ta.pdf
Systems analysis project 7 can you answer the 4 questions at the ta.pdfSystems analysis project 7 can you answer the 4 questions at the ta.pdf
Systems analysis project 7 can you answer the 4 questions at the ta.pdf
 

Recently uploaded

(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 

Recently uploaded (20)

(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 

DFM BIT Coursework

  • 1. Development, Frameworks and Methods 1 Student Name: Myint Oo @ Amirul Hassan UOG Student Registration ID: 000805763 Coursework Title: Children Support Agency COMP1648: Development, Frameworks and Methods Due Date: 11/11/2013 Center: KMD (Yangon, Myanmar)
  • 2. Development, Frameworks and Methods 2 Table of Content Section A A.1 Management Summary …………………………………………………………..….5 A.1.1 Some about current information system……………………...………….….5 A.1.2 Current issues which CSA is facing…………..………………………….…5 A.1.3 What CSA expects from MIS………………………………………….…...5 A.1.4 Management on developing new MIS……………………….……………..6 A.1.5 DSDM is appropriate for MIS project…………….....……………………..6 A.1.6 Advantages of using DSDM…………..……………………………….…...6 A.1.7 Disadvantages of using DSDM…………………………………………......6 Section B B.1 High Level Requirement B.1.1 Short explanation of high level requirement requirements………….….….8 B.1.2 Short explanation of functional and non-functional requirement……….…8 B.1.3 Appropriate High level requirements………………………………..…...8-9 B.1.4 Inappropriate High level requirements……………………………….....9-10 B.2 Moscow Prioritization B.2.1 List of functional and non-functional requirements based on high level requirement (appropriate)………………………………………….…10 B.2.2 Explanation of setting prioritizing the requirements………………..…11-12 B.2.3 High level requirements shown in three increments………………..…12-14 Section C C.1 Management Summary (LSEPI Issues based on DPA) C.1.2 Why Data Controller is important in CSA………………………….….....16 C.1.2 How Data Controller will help overcome LSEPI issues with two case study examples……………………………………………..…16-17
  • 3. Development, Frameworks and Methods 3 C.2 Management Summary (BCS Code of conduct) C.2.1 What professional body do…………...………………………..……..….18 C.2.2 Purpose of professional body…………………………….……………...18 C.2.3 Four professional issues that the system developer may need to consider ……………...………………………..……....18-19
  • 4. Development, Frameworks and Methods 4 Section A
  • 5. Development, Frameworks and Methods 5 Management Summary Some about current information system The current information system doesn’t come into use for all fields of CSA. They have to overcome a lot of obstacles to manage projects with it. The current information system can’t be used for managing projects as it doesn’t support. It can only be used for the financial transactions in CSA. The system they run doesn’t gratify all their needs as it’s an off-the-shelf payroll system. So, a new management information system has become a must to monitor all projects of CSA. CSA is overcoming various difficulties as it’s lacking an effective MIS. The following are some key issues that the CSA is facing currently. Current issues which CSA is facing - Due to the different approaches and requirements of doing the project by different staff, the organization doesn’t have a consistent way of doing a project - Staff are very dependent on each other because of lack of guidance from the SEG - No systematic way of recording information - Some staff keep the record of the project using a paper based system - The current system is not secure - The Finance Director doesn’t get correct financial data from Area Managers and Regional Directors sometimes and they information provided was not very clear enough - There is no hard connection between the Financial system and MIS - The head of HR have some problems with Area Managers for keeping the record of their staff - No clear record of which contracts are presently in force, what resources are needed and the deadline of each contract etc - Peter Jackson, Area Manager has to give much time of searching pieces of data and collecting all the data together What CSA expects from MIS As CSA is running 60 different projects at different places, the requirements and issues from all offices are increasing. The current system can’t help with all. The new MIS will be developed with these following requirements which are really required by CSA. New MIS will help CSA monitor and manage all projects. The new MIS will be able to gather all data from local centers and it can be accessed from all local offices. It can produce correct report with complete details for SMT, Trustees and funders. It will contain some standard set of performance indicators which will help measure CSA projects. It can keep correct financial data and shows how much resource and fund are used for each projects. The financial data can only be accessed by the authorized person. Apart from financial data, every department will have access to see the information they need. It will have a standard way of keeping the data. Entering the same data at the same place will not be allowed. So, the data will become consistent and correct. It will allow accessing to the sensitive data of CSA to the authorized people only. It will keep the details of contracts between CSA and funding bodies which is important for starting a project. It will also save the demographic data of young people and this type of data can be accessible from local centers depending on their needs. It also helps regional director, area managers and lead workers manage their respective projects.
  • 6. Development, Frameworks and Methods 6 Management on developing new MIS The new MIS will be developed under the instruction of the Administrative Services Director, Jim Massey and the finance director, Steve Sutherland. These two people have been working in CSA for a long time and know all about CSA. Jim Massey himself wants to change the current MIS and he surely knows that current MIS is completely rubbish. He also realizes CSA needs an effective management information system. He also states that as long as CSA doesn’t change the current system, there will always be hardship to get new contracts in the future which might impact the whole organization. Steve Sutherland suggests that the new MIS must include finance management for local projects and access to financial data should be protected. DSDM is appropriate for MIS project According to Sebastian LeFevre, an Information Systems Consultant, he has just had a contract with CSA to help analysis of what the organization really needs. He reviewed the current information system and found that it is lack of security and secure storage of data and many more problems. He also recommends using an agile method, called DSDM. DSDM is appropriate for developing a new MIS because the MIS will be developed and managed under a top management group called Administrative Service director and Finance Director. The high level requirements are already gathered. Functionality is clear enough as the staffs have already disclosed their needs in the interview, for example, (No clear record of which contracts are presently in force, what resources are needed and the deadline of each contract etc) discussed by Julieanne Black. Advantages of using DSDM As all the requirements are collected at the beginning, the system is more likely to meet the business needs for examples; almost all staffs of CSA have identified their respective needs in the interview. It will increase the speed of development and increase quality because of the end user involvement. For example, Peter Jackson, Area Manager who has been working in the organization for 18 years, has a lot of idea concerning the organization needs, is very willing and pleased to be a part of the development. So, he can give feedback thought prototyping which can make a quality system delivers the real needs of the organization. Time boxing and cost of system can be fixed by analyzing the clear and understandable functions or requirements. Disadvantages of using DSDM There will be features which need to be reduced due to the time boxing. For examples Functions which are not very important for the organization will be removed. But for good information system, these types of requirements are necessary for example “Sending messages to young people about events in the area”. Total words for Section A: 988
  • 7. Development, Frameworks and Methods 7 Section B
  • 8. Development, Frameworks and Methods 8 A short explanation of high level requirement High level requirements are the same as business requirements which are better understood by the top level management. It is only planned to offer guidance to the key issues or problems. This can be split into functional and non-functional requirements. A short explanation of functional and non functional requirement Functional requirements describe what a system is supposed to do. These are always the main functions of a system to be built. They focus on these criteria such as business rules, validation, managing finance, reporting requirement etc. Non functional requirements describe further functions of the system to be built except functionality. It indicates criteria which evaluates the function of a system instead of exact behaviors. They focus on these criteria such as performance, security, maintainability, reliability etc. Remark: I have also taken a few requirements from the interview list in order to get an effective information system. Without them, the system will be incomplete and unusable. These are excluded in overall requirements list given at the case study. B1. High level appropriate and inappropriate requirements B1.1 High level requirements (Appropriate) 1. Collecting data correctly from local offices MIS must be able to keep the data about projects from all local centers. If required, it must offer data immediately. Depending on data, SEG can offer guidance to improve the performance of employees and projects. 2. Producing management reports for both SMT and Trustees MIS must produce reports about each project, only then they can estimate for further projects and make decision what to do next. They can also offer necessary instructions for projects having problems. Everything they ratify is based on project reports. 3. Adding a standard set of performance indicators into the system in order to measure the project MIS will include some standards set of performance indicators for example, the time box of a project, use of resource, budget, man power, number young people improved in each project to measure the effectiveness and success of projects. 4. Giving better data as to how finances and resources are allocated MIS must have this function to get correct financial records from local offices as regional directors are reluctant to give accurate financial data. It must also be able to offer suggestions to the Head Office to allocate finance and resources because CSA needs to know the use of resources and finance for each project running at different offices. Only then they can send information to their related parties who have asked to see it.
  • 9. Development, Frameworks and Methods 9 5. Developing a common interface for the Management Information System and external systems so that data is only entered once CSA will have hardship to control MIS if it contains the same data at different places. So, entering the data more than once must be restricted. 6. Can pass the information from on project to another To get faster performance of the projects, the MIS should provide easy access to information from one project to another. It increases workload and reduce overheads and saves time. 7. Ensuring the data is protected and it is allowed to use to the right people at different levels in the organization A data controller must be appointed to keep data securely. The system must provide access to sensitive data such as financial information to the authorized person only because there are many staffs in CSA and the data can be used for illegal purposes. 8. Keeping details of the contracts between CSA and funding bodies for each project MIS must have this requirement in order to set time boxing, use resources and man power for each project at CSA. This will help CSA manage projects. 9. Permitting projects to keep demographic data about young people in a standard way, able to be seen by central offices The management team of CSA must know demographic data concerning young people because they have to know what the real needs of young people are. Only then they can know what types of project are required to start at what area. B1.2 High Level Requirement (Inappropriate) 10. Containing a simple case management tool to allow project workers to record short notes in a secure way This requirement can make the MIS complex and unusable by keeping a lot of detail information of managing the projects which are not very important for CSA. 11. Developing an enterprise scheduling tool for the managing meetings with staff and young people The Management information system will become very large if it contains enterprise scheduling tools which are not urgently needed by CSA. They just need an effective management tool to manage projects.
  • 10. Development, Frameworks and Methods 10 12. Integrating existing data into the system As CSA doesn’t have a standard way of recording projects information, the existing data won’t come into use for developing MIS. 13. Developing the system in order to be extendable to contain extra features in the future This requirement should be thought before development of the MIS but not very important for CSA to monitor projects. MIS should have only core functions for management (for example keeping financial records correctly). CSA has just intended to add features of the MIS after it has been developed. Word Counts B1= 861 ******************************************************************************** Moscow B2. List of functional and non-functional requirements B2.1The following are functional and non-functional requirements based on appropriate high level requirements with prioritization. Functional Requirements 1. Collecting data correctly from local offices Must Have 2. Producing management reports for both SMT and Trustees Must Have 3. Giving better data as to how finance and resources are allocated Must Have 4. Keeping details of the contracts between CSA and funding Must Have bodies for each project 5. Adding a standard set of performance indicators into the system in order to measure projects Must Have 6. Permitting projects to keep demographic data about young people in a standard way, able to be seen by central offices Must Have 7. Developing a common interface for the Management Information system and external systems so that data only entered one Could Have Non-Functional Requirements 8. Ensuring the data is protected and it is allowed to use to the right people at different levels in the organization Should Have 9. Can pass the information from on project to another Could Have
  • 11. Development, Frameworks and Methods 11 B2.2 Explanation of setting about prioritization with justification Functional Requirement Collecting data correctly from local offices Must Have This is a must have requirement for developing MIS. As CSA needs MIS to monitor all projects, the system must be added this requirement to be able to collect correct data about each project from local offices. Without having this in MIS, CSA will have difficulties to manage projects from head offices as data about projects are missing which are very important for managing projects. Producing management reports for both SMT and Trustees Must Have The requirement must be included in MIS because it must produce reports by showing all management information for example, progress of project, use of resources and man power used for each project etc. Both SMT and Trustees need reports to offer necessary guidance and show that the projects are going well to the funders. Giving better data as to how finance and resources are allocated Must Have This is a must have requirement for developing MIS because MIS must have correct financial record and it should provide data for the use of finance and resource when needed. Only then CSA can estimate for future projects and avoid unwanted cost. Keeping details of the contracts between CSA and funding Must Have bodies for each project MIS must includes this requirement because MIS must have all information of contracts between CSA and funding bodies in order to offer contract information to the contract team when required. With this information, contract team can manage current contracts. Adding a standard set of performance indicators into the system Must Have in order to measure projects This requirement can’t be left because CSA will not able to measure the projects running under it so that MIS must be added some standard set of performance indicators for example, functions that calculate use of resources, finance, number of young people improved by each project. This will help CSA make better projects in the future. Permitting projects to keep demographic data about young people in a standard way, able to be seen by central offices Must Have By keeping demographic data systematically, CSA can easily analyze for future projects based on these data. So, I selected this requirement as a must have for developing MIS.
  • 12. Development, Frameworks and Methods 12 Developing a common interface for the Management Information Could Have system and external systems so that data only entered one CSA can monitor or manage projects without this requirement as it is related to data input and restriction of inserting duplicate data. But MIS may include duplicate data if it doesn’t add this requirement. Non-Functional Requirements Ensuring the data is protected and it is allowed to use Should Have to the right people at different levels in the organization This is a should have requirement for developing MIS because it’s related to authentication and security. CSA can run MIS to monitor projects without this requirement. As it’s a non-profit organization, unauthorized access to data may not effect very much on CSA. This requirement should be included to prevent unwanted risks. Can pass the information from on project to another Could Have This requirement can be left for developing MIS because MIS will be able to collect all information about project from all local offices. So, authorized people at different local offices will have access to the data from MIS. First Increment, Second Increment and Third Increment Each requirement will be described for how long they will take to be completed. As the project will be developed by using DSDM, it should be finished during six months. 8 hours for a day and 40 hours for a month and 960 hours for six months. Within 770 hours, all must have functions will be completed. These are the must have requirements which will be delivered as the first increment. The MIS will really be workable with these requirements and employees in CSA can give feedback for each increment for avoid unwanted errors and meet it their desired requirements. First Increment No Requirement Hours Prioritization 1 Collecting data correctly from local offices 120 Must Have 2 Producing management reports for both SMT and Trustees 80 Must Have 3 Giving better data as to how finance and resources are allocated 100 Must Have 4 Keeping details of the contracts between CSA and funding bodies for each project 100 Must Have 5 Adding a standard set of performance indicators into the system in order to measure projects 80 Must Have
  • 13. Development, Frameworks and Methods 13 6 Permitting projects to keep demographic data about young people in a standard way, able to be seen by central offices 80 Must Have 7 Ensuring the data is protected and it is allowed to use to the right people at different levels in the organization 70 8 Developing a common interface for the Management Information system and external systems so that data only entered one 70 9 Can pass the information from on project to another 70 Total Must have hours= 770 This should have requirement is essential but not very important for the system to contains in the first increment. So, it will be delivered as the second increment to the users. Second Increment No Requirement Hours Prioritization 1 Collecting data correctly from local offices 120 Must Have 2 Producing management reports for both SMT and Trustees 80 Must Have 3 Giving better data as to how finance and resources are allocated 100 Must Have 4 Keeping details of the contracts between CSA and funding bodies for each project 100 Must Have 5 Adding a standard set of performance indicators into the system in order to measure projects 80 Must Have 6 Permitting projects to keep demographic data about young people in a standard way, able to be seen by central offices 80 Must Have 7 Ensuring the data is protected and it is allowed to use to the right people at different levels in the organization 70 Should Have 8 Developing a common interface for the Management Information system and external systems so that data only entered one 70 9 Can pass the information from on project to another 70 Total should have hours = 70 Second Increment total hours = 840
  • 14. Development, Frameworks and Methods 14 These are could have requirement and these can make MIS better. It could be left if the time box is not enough. But, MIS will work without any problems. Third Increment No Requirement Hours Prioritization 1 Collecting data correctly from local offices 120 Must Have 2 Producing management reports for both SMT and Trustees 80 Must Have 3 Giving better data as to how finance and resources are allocated 100 Must Have 4 Keeping details of the contracts between CSA and funding bodies for each project 100 Must Have 5 Adding a standard set of performance indicators into the system in order to measure projects 80 Must Have 6 Permitting projects to keep demographic data about young people in a standard way, able to be seen by central offices 80 Must Have 7 Ensuring the data is protected and it is allowed to use to the right people at different levels in the organization 70 Should Have 8 Developing a common interface for the Management Information system and external systems so that data only entered one 60 Could Have 9 Can pass the information from on project to another 60 Could Have Must Have= 770 hours Should Have= 70 hours Could Have= 120 hours Within six months, MIS will be finished. But some unexpected risks may occur, so, there will be some delays to deliver the system. If the project is likely to be late, should have and could have requirements could be left. ********************************************************************************
  • 15. Development, Frameworks and Methods 15 Section C
  • 16. Development, Frameworks and Methods 16 (C1) As CSA is a charity organization, it relies on public trust. It’s not possible to make sure that CSA is 100% safe at all times. So, CSA needs to show that they focus on its responsibilities to keep the data securely and it is taking balanced measures for protecting personal data from being misused. As it has 60 different projects at different local offices, data protection has become an issue for it with large amount of data of young people and funders but although small charity organizations are possibly to keep personal data on people for example staff, trustees. Currently CSA is facing various difficulties to collect data as staffs have no awareness of keeping data securely and no professionalism about dissemination of data. What’s worse is duplication of the same personal data because CSA has no standard way of keep data related to young people, staff and funders or supporters. In order for CSA to stand on its existing reputation, it needs to handle all its data securely. CSA should make sure that the personal information is not misused and doesn’t reach into wrong hands. So, to keep and manage data securely, a data controller should be appointed who has to process CSA data under Data Protection Act. DPA is only related to the treatment of personal data. He will be lawfully in charge for making sure that data processing complies with the DPA. DPA is in relation to protect people from the misuse of their personal information. In order for data controllers to work at organization, they need to register with the Information Commissioner by providing details on the type of data which will be hold and the purpose of processing personal data. DPA states eight principles that the data controllers must follow them when processing the data. As Data controllers must follow the eight principles, the data about CSA projects will become secure. Every local office can access to data within CSA depending on their needs but they must comply with the data protection act. So, data will be protected and not misused. Public trust for CSA will increase. The following are the issues that CSA may have to face after developing a centralized management information system attached what the data controller will have to solve these issues. Example (One) CSA has all the personal data of employees, young people and funders. If the government or other charity organizations ask for the data it holds to use for other purpose, CSA will likely to share the data to them. Data controller help overcome this issue according to DPA 1, - Deciding why the government or other charity organizations needs the personal data and what they intend to do with it - Making sure that CSA provides clear and correct privacy notices to employees or young people for collecting their personal data  Privacy notice should contain the purpose of processing their personal data and the processing of their personal information is fair such as who you may disclose the information to that subject would not expect.
  • 17. Development, Frameworks and Methods 17 Example (Two) The system will permit projects to keep demographic data about young people which will be accessible by central offices. Existing data will also be kept in the new MIS. According to DPA 3, - Data controller must make sure that whether the personal information that the CSA holds is relevant. In order to consider if each is relevant for the purposes this is described in a privacy notice to the data subject and in notification to the Information Commissioner Organization. - Data Controller must ensure that the data he holds is too much. The excessive data that he doesn’t require for his specified purposes, must delete it. - Data Controller must establish if the data is sufficient to make decisions it informs, decisions that may have a major impact on the data subject will probably needs a great deal of information and CSA is often required to make those decisions. - Making sure that CSA holds the right information is important for both decisions making and protecting individuals CSA hold data about. It’s ethical and legal responsibilities for both CSA and data controller to keep their personal data properly. Word Counts: 700
  • 18. Development, Frameworks and Methods 18 (C2) Purpose of the code of conduct for a professional body (BCS) Today, People around the world are using IT for different purposes. Especially, organizations and companies are mainly using IT for their daily processing to be smooth and reduce workload. As IT is on the rise, the IT professionals and universities are also increasing day by day. And, the IT society will become outrageous because IT professionals and universities are misusing IT and taking advantages of people who are lack of IT knowledge. Not only in IT but also other fields are like that. It’s widely regarded that using IT is very expensive in organizations and companies. So, every organization doesn’t need to have wasted their investment by having unusable systems. So, they need a professional body to control all these issues. That’s why Professional bodies such as BCS have to form to handle IT professionals and set the standards and rules for them to work accordingly. Here is the purpose of BCS  Promote the study and practice of computing and to advance knowledge of and education in IT for public’s advantage.  Sets out the professional standards needed by the society  Applies to members of all grades (including students) BCS Code of conduct Based on the following BCS code of conduct, the four professional issues are done. (d) “Shall not reveal or allow to be revealed, or use for personal advantage or to profit a third party, private information apart from the permission of relevant authority, or as needed by legislation”. (e) “NOT misrepresent or withhold information on the performance of products, systems or services (unless lawfully bound by a duty of confidentiality not to disclose such information), or take advantage of the lack of relevant knowledge or inexperience of others”. (g) “Shall refuse and not make any offer inducement”. (f) “Shall avoid hurting others, their belongings, reputation, and employment by false” etc. (b) “Shall avoid any condition which may raise conflict of interest between professionals and employers and organization”. (a) “Shall be focus on and careful of public health, safety and environment in professional role”. Ref: BCS, the Chartered Institute for IT, 8 June 2011. Code of Conduct for BCS members. Trustee Board Regulations Schedule 3 Volume 4, page 2-3. BCS, UK. Four Professional Issues After developing MIS for CSA, the system developer will know all about a charity organization and have the copy of MIS as he would develop it. If other charity organization may ask him to develop a similar system for their organization, he may sell the information system of CSA by adding some necessary functions. In this condition, the system developer will be in breach of rule (d) and (e) of duty of relevant authority of the BCS. The case would be clear of disclosing information for personal gains without letting CSA know and keeping information of the MIS of CSA on the performance of system and taking benefits from other organization who doesn’t know that the system that the system developer
  • 19. Development, Frameworks and Methods 19 will deliver to them legally belongs to the CSA. Being a professional, he should seek permission and provide explanation to CSA before he discloses information. He should also tell other organization that he has developed the same similar system for CSA. So, he will take some of the functions from it to develop a system for them. Some of the main employees in CSA such as Sean McNally, Northern Regional Director isn’t interested and willing for the new information system because he doesn’t want to have been supervised from the central office so that he can take benefits with this way. So, he may probably tell system developer to add some wrong functions by offering bribes to make central office fail to manage his office. According to BCS code of conduct, the system developer will be in breach of rule (g) and (f) of professional competence and integrity and he shouldn’t take any bribe from Sean McNally and other. Instead, he should tell the management team about that. As the management information system that CSA wants to have is a large development project, the system developer may take this an opportunities by giving time for other’s project during developing CSA project in order to get more money at the same time. So, he will likely to deliver the system later than the deadline. In this situation, role (b) of Duty to relevant section of the BCS is the most suitable. This case would be a plain case of increasing conflicts between system developer and CSA because he will deliver the system late. As a professional, he should work according the commitment with CSA and finish within time box or. Time is very important for every organization or company. So, he should not break his commitment. He should make direct disclosure to the management team of the CSA with the correct reasons why he fails to deliver the system on time. He should seek advice from them how to move next. As the system developer has contracted to CSA to develop an information system, he must collect personal data about young people, employees and funders and will have all personal data in his hand. He may likely to use these data when developing similar information systems. According to BCS code of conduct, the system developer will be in breach of rule (a) of public trust. As a professional, he should always be careful of public security and privacy. He should not disclose their data for any purposes without their permission. Word Counts: 734 (Exclusive of BCS Code of Conduct rules)