StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Systems Engineering - Case Study Example

Cite this document
Summary
In this study, the author will discuss the key focus of the environment shown. Also, the author describes how to establish a new system technology infrastructure that will offer and put additional effective and flexible operational and working settings and valuable problem handling…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Information Systems Engineering
Read Text Preview

Extract of sample "Information Systems Engineering"

Course:COMP1304 Information Systems Engineering «Children Support Agency System» Name Date Institute Table of Contents Table of Contents 2 Section A ‐ Requirements Analysis using Rich Pictures 3 A1. Rich Picture 3 A2. Process Followed 4 A2.1 Key Actors in the Environment 4 A2.2 Key issues and areas of conflict affecting the environment 5 A2.3 Main focus of the environment 6 A2.4 Control of systems, data and processing 7 Section B – Requirements Analysis using Use Case Modeling 7 B1.Use Case Diagram 7 B1.1 Write a primary scenario for each use of the system 9 B1.2 Write secondary scenario for each use of the system 10 B2. Process Followed 12 B2.1. Choose Actors 12 B2.2 identifying key activities 12 B2.3- Identifying Alternative 13 B2.4 Assumptions and Questions 14 Section C – Critical Analysis of the tools used 15 C3- Rich Picture and Use Case modeling 15 C3.1- Rich Picture 15 C3.2 Use Case Modeling 16 Conclusion 17 Reference 18 Section A ‐ Requirements Analysis using Rich Pictures A1. Rich Picture Figure 1- Rich Picture A2. Process Followed Children Support Agency is a national charity situated in United Kingdom that takes care of young people who necessitate extra support to facilitate them live their lives effectively. This association has determined to apply a new information management system that will have the capability of handling the general organizational information. The CSA (Children Support Agency) has appeared like a national charity type business intended for the effectiveness and betterment of the United Kingdom’s young people. Furthermore, this business has intended to ease young people of United Kingdom for their profession as well as support them for expenditure of their lives efficiently (Case Study). Children Support Agency has described its 4 major areas of the work those are: Family support Housing Tackling crime Education & training Children Support Agency has established their system extremely successfully and their head office is located in London. In addition, recently they have transferred their two major offices, a small one in London and a superior one on the South Coast of England in Brighton. A2.1 Key Actors in the Environment In the above rich picture I have analyzed some of the main aspects of the system working and areas. In this scenario I have analyzed fundamental organizational areas. In addition, I have assessed that in the overall organizational set-up we have following a key Actors: Director Regional Directors Area Managers Team Leaders Lead Workers Services Director Director of the Finance A2.2 Key issues and areas of conflict affecting the environment In this section I will outline some of the main key issues and areas of conflict which are affecting the environment that we have faced in the drawing of the rich diagram. The diagram which I developed is able to address some important issues about system interaction as well as their association to particular stakeholder. This rich picture represents the formation of actor communications through the obtainable application as well as the novel feature. In addition, here we as well have capability to observe the characteristic and their incorporation by means of obtainable functions. Moreover, this rich picture offered an improved means to show the essential basics of the procedure flow. We are able to observe the environmental factors and kinds of necessities that will have to be developed. In analyzing main issues regarding development of the rich picture we are able to have a look on some of the main issues on the system development and implementation. In this scenario I have observed a potential conflict among the project team and organizational directors who are expecting high quality system on time. In this scenario I have also assessed an issue that is about the user and system interaction. In case of bad system interaction the user of the system is not able to have a more enhanced user interface that leads to overall system performance down. A2.3 Main focus of the environment In this section I will discuss key focus of the environment shown in our rich picture. In case of implementation of the new technology based armament we are aimed to offer and establish a new system technology infrastructure that will offer and put additional effective and flexible operational and working settings and valuable problem handling. Here we have demonstrated that new technology development and establishment at every business area is aimed to cope with the crisis and to facilitate the business in case of some of main problems faced by organizations. Here we have also tried to demonstrate the reduced costs system and business handling. There is as well an intention that is demonstrated in about drive to convert fixed costs to variable costs where this is probable, approaching these costs out to the cost centers where they are acquired. This is providing augment to a surge in attention, on the part of huge organizations, in 3rd-party sites or local offices that are able to recognize to explicit cost centers. The accomplishment of the teleporting based arrangement is able to minimize the amount of capital engaged in office services as well as the resources these services need intended for upholding, enhanced projects management and organization. In addition, this accomplishment will augment the general organizational efficiency in addition to the improved user support and management. Here in this rich picture I have demonstrated the user overview in obtaining latest technological and effective services intended for the online transaction as well as product (plant) searching. Through this rich picture awareness about the better services will enhance. A2.4 Control of systems, data and processing In this part I will outline some of main aspects of the control of systems, data and processing lie in the environment. Here I have presented the main system development procedure that is managed by the different corporate stakeholders. In the overall network of the new system development I have presented some of the main aspects and scenarios for the enhanced handling and management of the new system. In this system development the initial control initiated from the system analysis by the system team. Then in the next phase the system designers and analyzers assess the system operational arrangement and working scenario. This rich picture also demonstrates the overall quality assurance process and aspects for the enhanced system development. The last operational formwork shows the main user interface based scenario that is demanding the quality and efficiently of the system interface and support. Section B – Requirements Analysis using Use Case Modeling B1.Use Case Diagram Figure 2- Use Case Diagram B1.1 Write a primary scenario for each use of the system Use Case ID Use Case Name Primary scenario 1 View organization projects details Login to main corporate page Enter project details for viewing View Specific project Log-out and close system window 2 View projects details at regional level Login to main corporate page Enter project details for regional level view Interpreting details Log-out and close system window 3 View and analyse project information Open the main system interface Provide the log-in and password Search for the undergoing projects. Access the main project progress report Analyze the project Success scenarios Apply analysis tools and techniques Check results Save new adjustments Exit 4 Check project progress Login to main corporate page Enter for the specify project Check for project progress Perform Changes and assess resources 5 Add resources Login for adding resource portal Add resource to projects Updating the database 6 Record and monitor performance indicators (KPIs) User will open the main menu Then the user will provide the password and user name On the proper authentication the system will show the main project menus The user will provide the project id to view to project details Then user will analyze the project progress and further resource allocation details This project screen will allow to analyze the project progress parameters Save new added resources and close the application 7 Contracts management and handling Supplier login Assessing details and analyzing Contracts details Updating changes B1.2 Write secondary scenario for each use of the system Use Case ID Use Case Name Secondary scenario 1 View organization projects details Login Failed Project details in-available Server connection not found 2 View projects details at regional level Login Failed Server connection not found Projects details not found 3 View and analyse project information Login Failed Undergoing project details blocked Project Complete details archived Network connection failed Un-authorized user 4 Check project progress Login Failed Project Complete details archived User not found Network connection failed 5 Add resources Login Failed Resource Clash Resource un-availability 6 Record and monitor performance indicators (KPIs) Login Failed Project Details not found Project is not started yet Network connection failed 7 Contracts management and handling Login Failed Project details not found Network connection failed B2. Process Followed In this section I will present some of main processes which were followed in use case development: B2.1. Choose Actors In the selection and assessment of the key actors of the Children Support Agency system, I have analyzed the overall life cycle and operational framework of the corporate. In this scenario I have outlined some of the main areas those are influenced by some key personnel. In this overall technology based project I have outlined people who are involved in the overall development and after usage process. The selection has also concentrated on the people who are having some direct or indirect influence on the fundamental areas of the system working and operational framework. B2.2 identifying key activities The system for the Children Support Agency (CSA) system is intended to help in the “recording as well as monitoring the performance” of project. Thus to indentify the key activities of the system development at the Children Support Agency system, I will discuss the record and monitor performance scenario. In this scenario we have the following course of actions. Here we are having the main course of action and operational scenarios that are outlined below: 1- Initially User will open the Children Support Agency main menu 2- In the next step user enter the system access password and user name 3- This step will be about the appropriate verification of the system that will illustrate the major project menus 4- In this step user will enter the details to view to project information 5- This step will allow the user to assess and analyze the project development as well as additional resource allocation particulars 6- Here in this step the project screen will permit to examine the project progress strictures 7- At the end of the work the user can able to save the latest entered data about the resources as well as close the system application With the identification of above listed activities we are able to assess the system working needs and requirements regarding particular area of operations. Here in case of recording and monitoring performance scenario I have analyzed the foundational course of action of the activities and their mutual interaction. After the assessment of these areas I have made an imaginary prototype of the system on page and run the system from step to step. In each step I have listed the main activities and operational scenarios and listed them down. B2.3- Identifying Alternative For indentifying the alternative uses and secondary scenarios of the activities of the system at the Children Support Agency, I have tried to present the possible diversions for the main course of action in case of simple system use. For example for the Record and monitor performance scenario we are having the following alternative course of actions. Initially system will stop the additional operations till the antiquation of user password as well as username. Assign resources View another project In this example I have listed some alternative actions those can be considered while the system working. Here for sake the identifying the alternative scenarios I have analyzed the main working and operational areas and possible divergence in case of un-availability of main working scenario. In this situation system will automatically change to secondary course of action that leads to secondary course of action. B2.4 Assumptions and Questions Yes! In case of this system development and definition I have made some assumptions. In the assumptions we need to assess the basic working of the system and operational framework. In this scenario I have outlined some of the main areas of the system those can be assessed for the system working and operational framework. In case of development and designing of the system we will ask some fundamental and basic questions those are outlined in the below section: What will main users of the system? How much support is needed? Need of optimization? Business support required? What about the need of availability of the online and network based support? What are the basic reporting requirements and which areas of reporting are needed? What level of security is needed? Projects support required? Operational support required? Outside and inside availability of the system required? Section C – Critical Analysis of the tools used C3- Rich Picture and Use Case modeling Through recent technology there exist a lot of techniques to undermine an information system that could compromise the privacy, reliability, or ease of use of the resource. Because of theoretical nature of current computing, there are simple means to be reliably attentive of a system cooperation is through evaluating the system’s measures at mutually the host as well as network layers and then associating those two layers to build up a thorough analysis into the system’s actions (Daniel Frye, 2009; Pressman, 2001). In this section I will present a detailed overview of two most well known techniques for system designing and development. In this scenario I will discuss working and operational features of these two techniques to demonstrate the basic working of these techniques: C3.1- Rich Picture A ‘rich picture’ is the foundational step in the overall system development and design procedure. When we initiate designing, the subject is positioned in the centre of the page as well as connection words are placed all through it. These connection words must be connected to the main, fundamental and central subject and they will be able to facilitate us in what we think of points that we have to judge when trying to resolve the design difficulties. For instance, the word ‘materials’ can prompt us to think of diverse metals, woods plus plastics that could be practical when annoying to work out the most excellent materials for our answers. In this scenario we should note down as a lot of words as probable around the subject however just if they have a number of links. Moreover, a rich picture has to as well comprise diagrams or pictures to offer a high-quality, obvious, visual outcome (Ryan, 2010; Jawadekar, 2004; Sommerville, 2004). Sketching or drawing a rich picture is a method to discover concerning the difficulty of state and state it in the course of cartoon-like diagrams that are a beginning mental model of the condition. The similar type of rich picture modeling “CATWOE” is employed to facilitate people to keep in mind the fundamentals of the rich picture such as actors, customers, alterations, owner, worldview and situation. Additionally, the rich pictures are usually drawn previous to the analysis stage. In addition, a rich picture offers a more relaxed kind of details that can be employed in conjunction with RADs to map the procedures. Moreover, it can be like a fraction of our observation, we get into the practice of formulating these 'informal' drawings that can be extended afterwards if needed (Sprint, 2010; Ryan, 2010; Pressman, 2001). C3.2 Use Case Modeling Use case modeling is a way of the modeling from the user point of view (as well recognized as the use case or state view), that includes a problem as well as solution like implicit through those individuals whose difficulty of the result tackles, entails use case diagrams to show the working, operations and functionality of a system. Additionally, the use case classes are employed to form and illustrate the components of services or functionality offered by a system (or fractions of a system: classes or subsystems) to clients. Use cases are signified like ovals or ellipses. They can be enclosed through a system limit or rectangle labeled by means of the identifier intended system. They have a lot of characteristics such as use cases work as a platform for the communications or dialogs between systems and actors, comprising the messages exchanged and the events performed by the system. Use cases can contain alternatives of these sequences, comprising alternative and exception sequences. In addition, the use cases are started from the actors but they can engage the contribution of many other actors. However, the use cases should offer value to at least one of the contributing actors. In addition, the use cases can have extension points that describe definite points inside a communication at that other use cases can be inserted. Moreover, the use case classes contain use case examples or objects acknowledged as situations that represent precise communications. In this regard, situations stand for a single sequence of communication as well as events (Alhir, 2010; Pressman, 2001; Jawadekar, 2004; Sommerville, 2004). Use cases offer a prearranged, industry-standard method of drawing out and documenting practical needs. Additionally, the procedure improves the communication among business analysts and business clients, and puts down the basis for user interface design and test case development. They as well offer approaching into data requirements, in addition to facilitating clients articulate their requirements in a way other requirements activities can’t (Daniel Frye, 2009; Alhir, 2010; Jawadekar, 2004; Pressman, 2001). Conclusion Information systems have become a basic need of almost every organization. But for the successful implementation of these information systems organizations should take a lot of effective steps. In this report I have presented a detailed overview of designing and analyzing of some of the main aspects of the Children Support Agency System. This report has presented the modeling of system through the rich picture and use case. This report has also presented the detailed overview of some of the basic explanations of the system designing and development. In this scenario this report have covered almost all the modeling and designing aspects which are necessary for the better development of Children Support Agency System. Reference Alhir, S. S. (2010). Understanding Use Case Modeling. Retrieved 10 16, 2010, from http://www.methodsandtools.com/archive/archive.php?id=24 Daniel Frye. (2009). Effective Use Case Modeling for Security Information & Event Management`. Retrieved 10 17, 2010, from http://www.sans.org/reading_room/whitepapers/auditing/effective-case-modeling-security-information-event-management_33319 Jawadekar, W. S. (2004). Software Engineering: Principles and Practice. New York: McGraw Hill. Pressman, R. S. (2001). Software Engineering: A Practicioner's Approach, 5th Edition. London: McGraw Hill. Ryan, V. (2010). RICH PICTURE . Retrieved 10 15, 2010, from http://www.technologystudent.com/designpro/richpic1.htm Sommerville, I. (2004). Software Engineering (7th ed.). New York: Pearson Education (Addison Wesley). Sprint. (2010). Rich Pictures . Retrieved 10 13, 2010, from http://www.sprint.gov.uk/index.php?option=com_content&view=article&id=57&Itemid=65 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information Systems Engineering Case Study Example | Topics and Well Written Essays - 3000 words, n.d.)
Information Systems Engineering Case Study Example | Topics and Well Written Essays - 3000 words. Retrieved from https://studentshare.org/environmental-studies/1743133-information-systems-engineering
(Information Systems Engineering Case Study Example | Topics and Well Written Essays - 3000 Words)
Information Systems Engineering Case Study Example | Topics and Well Written Essays - 3000 Words. https://studentshare.org/environmental-studies/1743133-information-systems-engineering.
“Information Systems Engineering Case Study Example | Topics and Well Written Essays - 3000 Words”, n.d. https://studentshare.org/environmental-studies/1743133-information-systems-engineering.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Systems Engineering

Practice-Based Learning

This paper ''Practice-Based Learning'' tells that Starbucks is a U.... .... coffee retailer industry that is situated in around fifty different countries in the world which focuses on quality as being the main area of concern when selling it to other companies.... All the coffee we drink nearly originates from the south of the globe....
7 Pages (1750 words) Essay

Trading & Dealing in Security Markets

Since the commands are executed by software systems, positions on various stocks are held for durations that vary from a few seconds to a few minutes.... Like many other areas of business processes such as procurement, automatic ordering in supply change management, ERP systems, humans are removed from decision-making and power is vested in machines....
4 Pages (1000 words) Essay

Question and Answer

As identified by Webb and Humphrey (1999) in their report "Using the TSP on the TaskView Project," 74 percent of all information systems development projects in 1999 were not successful.... In this respect, they both argue for the need for adaptability and flexibility in software development in order to create good information systems. According to Humphrey, an effective software development project requires a balanced approach which takes into consideration both tools and process development....
3 Pages (750 words) Essay

Risk-Based Systems Security Engineering

Morda Article Summary Security and functionality are competing goals in design of most of the contemporary information systems.... Morda methodology is a methodology of systems security engineering can help the designers in making informed decisions.... With Morda assessment, a risk posture can be produced for a proposed architecture, that not only drives the engineering process of the system security but also influences the development of countermeasures....
1 Pages (250 words) Essay

Debreifing

Business & Information Systems Engineering, 1(5), 400-402.... Sustainable information systems Management.... All systems must contain documentation to ensure ease of use (Schmidt, Erek, Kolbe & Zarnekow, 2009).... ecommendations the futureInformation technology systems are always complex and need expertise to use.... Debriefing report Insert Insert Midsouth Chamber of Commerce (MSCC) has problems in the management and information technology....
2 Pages (500 words) Research Proposal

Smart phones

For instance, the traditional process of managing information systems has been overtaken by… e portable technology that provides flexibility in terms of accessing, sharing and utilizing business information between employees of an organization with the aim of improving efficiency at the workplace.... Previously, sharing of information within the workplace environment was Also, the process was slow and, in particular, the previous management of information systems where most organizations had fewer computers used to retrieve and store information....
5 Pages (1250 words) Research Paper

Healthcare Reengineering

Nurse leaders play a vital role in system re-engineering since they are among the decision makers in a health institution. Nurse leaders are Healthcare Reengineering Healthcare Reengineering Reengineering of healthcare services is proving to be a vital methodology in addressing the quality issues in health care.... Nurse leaders play a vital role in system re-engineering since they are among the decision makers in a health institution.... Reengineering entails an overhaul of the existing process, systems and consolidating overlapping systems so as to maximize the benefits of both nurses and… The primary objective of reengineering is to increase the quality of healthcare at the lowest cost....
1 Pages (250 words) Essay

The Chief Information Officer

Although there are no specific educational requirements for CIO, most of them have educational qualifications in computer science, information systems or software engineering (Curtis).... One of the most essential skills a CIO should have cores knowledge of information technology and how to work with information systems.... They should also be open to learning since information systems evolve by the day.... Knowledge of the business is a key attribute where the CIO should understand how all the business processes work and how the information systems can be integrated into the business processes....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us