Applications of systems development models

Assignment Help Computer Network Security
Reference no: EM131021047

Question:

There are four sources for this Module''s Case. The first article relates to the classic SDLC methodology. The second one gives you a description of the applications of systems development models from a practitioner''s perspective. You will see various different paradigms used in practice:

Hoffer, J. F., George,J. A., & Valacich, J, S. (2010). Systems development environment. Modern Systems Analysis and Design. [PPT presentation - Chapter 1] https://wps.prenhall.com/bp_hoffer_msad_4/22/5876/1504457.cw/index.html

Centers for Medicare and Medicaid Services (2008). Selecting a development approach. https://www.cms.gov/Research-Statistics-Data-and-Systems/CMS-Information-Technology/XLC/Downloads/SelectingDevelopmentApproach.pdf

BigLever Software Inc. (2010) The systems and software product line lifecycle framework. Retrieved from https://www.biglever.com/extras/PLE_LifecycleFramework.pdf

The last source is a website that quite thoroughly describes the software development life cycle. You are not responsible for reading all this in its entirety. Rather, look it over, become familiar with the concepts it outlines, and use it for reference in preparing your paper:

Stewart, B. (2011) Systems engineering and software development life cycle framework. OpenSDLC.org. Retrieved from https://opensdlc.org/mediawiki/index.php?title=Systems_Engineering_and_Software_Development_Life_Cycle_Framework

The Portland Pattern Repository (hosted by Cunningham and Cunningham, Inc.) is a Wiki forum specializing in software development. It is a most interesting resource for creative thoughts about computing, systems development, and organizational implications of the information environment. We will be drawing on it at several points in this course. Their introduction and links to key descriptions of what''s going on can be found here.

The Wiki is useful, but it is not a repository of "truth" except perhaps in the large aggregate. Its value lies in the diversity of opinions expresses and the prodigious amounts of experience and talent on view there. Those opinions can help you evaluate other sources of information.

You might want to get a feel for the Wiki first before you begin to use it for detail work. You could start with their section on SoftwareDevelopment (https://c2.com/cgi/wiki?SoftwareDevelopment) and/or on AgileProcesses (https://c2.com/cgi/wiki?AgileProcesses). Within the first one, links will take you to places like ProblemDomain (https://c2.com/cgi/wiki?ProblemDomain), AnalysingTheProblemDomain (https://c2.com/cgi/wiki?AnalysingTheProblemDomain), and ElicitingRequirements (https://c2.com/cgi/wiki?ElicitingRequirements). Essentially, there is no end to how far and where you can go with this. When you get started in earnest, you''ll need a good Search Strategy and careful documentation of where you''ve been; this isn''t random surfing.

Case Assignment

Read the assigned readings, supplemented if you wish with material from the optional readings and perhaps the supplementary background as well, and even other outside reading you might find by yourself to be useful. Then write a short paper stating your position on the question:

"The Systems Development Life Cycle methodology is [OR is not] excessively formal and rigid and should be [OR should not be] more flexible and unstructured?"

Your paper should be short (5-6 pages, not including cover sheet and references) and to the point. It is to be structured as a point/counterpoint argument, in the following manner.

You are expected to:

Begin this paper by stating your position on this question clearly and concisely -- take one or the other position (either for or against formality), but not both!

Citing appropriate sources, present the reasons why you take this position. Be sure to make the most effective case you can.

Then present the best evidence you can, again citing appropriate sources, against your position -- that is, establish what counterarguments can be made in response to your original position.

Finally, review your original position in light of the counterarguments, showing how they are inadequate to rebut your original statement.

By the end of your paper, you should be able to unequivocally re-affirm your original position.

Assignment Expectations

Your assignment will be evaluated based on the Rubric.

You will be particularly assessed on:

Your ability to see what the module is all about and to structure your paper accordingly.

Your informed commentary and analysis -- simply repeating what your sources say does not constitute an adequate paper.

Your ability to apply the professional language and terminology of systems design and analysis correctly and in context; you are expected to be familiar with this language and use it appropriately.

Your effective and appropriate use of in-text citations to the assigned readings and other source material to support your arguments. Refer to the TUI Course Guidelines and or the Purdue University APA formatting and style guide (see optional readings for Module 1) for the proper formats. General Case and SLP Paper Writing Guidelines

Verified Expert

The solution file contains 1700 words and it is discussed about the system development life cycle methodology is excessively formal and rigid and it should be more flexible and unstructured. It is also explained the weakness of the SDLC and stages in the SDLC. The references are included in the APA format

Reference no: EM131021047

Questions Cloud

What function does this story serve : What is a story that your family tells, to others or to itself? What function does this story serve?
The harvest of rice from decreasing : Which of the following is the best way that biotechnology can keep the harvest of rice from decreasing
Was the ipo an example of direct finance or indirect finance : Were the shares of stock issued as a result of Facebook's initial public offering (IPO) sold in a primary market or a secondary market? Was the IPO an example of direct finance or indirect finance?
How many bones are in the body : How many bones are in the body? Please explain in full detail.
Applications of systems development models : The Systems Development Life Cycle methodology is excessively formal and rigid and should be more flexible and unstructured? - review your original position in light of the counterarguments, showing how they are inadequate to rebut your original st..
What''s the biggest bone in the body : What's the biggest bone in the body? Please draw a picture of its location and what it is connected to.
How much money do you have today : Twenty years ago, you deposited $800 into an account. You earned 6% APR compounded annually for the first 15 years, and then 6% compounded monthly for the last 5 years. How much money do you have in your account today? How much money do you have toda..
What are the stages of photosynthesis : What are the stages of photosynthesis? please explain fully
What are the steps of photosynthesis : What are the steps of photosynthesis? Please explain in full detail.

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Write two command-line sockets programs

Write two command-line sockets programs – a client and a server – as follows. Define a Who-Am-I message as a UDP datagram containing the ASCII string “WHO AM I”

  Beat the hacker

A honeypot can be a useful for discovering some of the hacking trends occurring within an organization. Of course, there have to be certain measures placed upon its operation, maintenance

  What is the plaintext for the ciphertext 10000001

What is the ciphertext (in binary form) generated by the encryption of the character T (Please show your work.)

  Present a short summary of the arguments for and against

you have been asked to help decide whether to outsource security or keep the security function within the firm. search

  Discuss what security policies commerce should implement

For Reflective Article Paper 3, select an article that details current methods that are used to successfully prevent identity theft. Discuss what security policies commerce should implement to prevent it from happening.

  Implementing information systems security policies

Describe the roles and responsibilities of those implementing information systems security policies.

  Effective biometric systems

Discuss why are many of the reliable, effective biometric systems perceived as intrusive by users and what are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

  What should network engineers expect to happen with security

Why is the current practice of securing the enterprise by hiding it behind hardened firewalls becoming extinct? What should network engineers expect to happen with security in 2 years

  Analyze the means in which data moves within organization

Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguard

  Paper on physical secuirty

You will write a paper on what area you chose and why. You will explain what in this area you want to expand also why this important to the company.

  A business wants to share its customer account database

a business wants to share its customer account database with its trading partners and customers while at the same time

  Compare distance vector routing with link state routing

Describe the differences between a repeater, a switch and a router. Why is a router generally more expensive and complex than a switch, and why is a switch generally more complex and expensive than a repeater?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd