Applications of systems development models

Assignment Help Computer Network Security
Reference no: EM131021047

Question:

There are four sources for this Module''s Case. The first article relates to the classic SDLC methodology. The second one gives you a description of the applications of systems development models from a practitioner''s perspective. You will see various different paradigms used in practice:

Hoffer, J. F., George,J. A., & Valacich, J, S. (2010). Systems development environment. Modern Systems Analysis and Design. [PPT presentation - Chapter 1] https://wps.prenhall.com/bp_hoffer_msad_4/22/5876/1504457.cw/index.html

Centers for Medicare and Medicaid Services (2008). Selecting a development approach. https://www.cms.gov/Research-Statistics-Data-and-Systems/CMS-Information-Technology/XLC/Downloads/SelectingDevelopmentApproach.pdf

BigLever Software Inc. (2010) The systems and software product line lifecycle framework. Retrieved from https://www.biglever.com/extras/PLE_LifecycleFramework.pdf

The last source is a website that quite thoroughly describes the software development life cycle. You are not responsible for reading all this in its entirety. Rather, look it over, become familiar with the concepts it outlines, and use it for reference in preparing your paper:

Stewart, B. (2011) Systems engineering and software development life cycle framework. OpenSDLC.org. Retrieved from https://opensdlc.org/mediawiki/index.php?title=Systems_Engineering_and_Software_Development_Life_Cycle_Framework

The Portland Pattern Repository (hosted by Cunningham and Cunningham, Inc.) is a Wiki forum specializing in software development. It is a most interesting resource for creative thoughts about computing, systems development, and organizational implications of the information environment. We will be drawing on it at several points in this course. Their introduction and links to key descriptions of what''s going on can be found here.

The Wiki is useful, but it is not a repository of "truth" except perhaps in the large aggregate. Its value lies in the diversity of opinions expresses and the prodigious amounts of experience and talent on view there. Those opinions can help you evaluate other sources of information.

You might want to get a feel for the Wiki first before you begin to use it for detail work. You could start with their section on SoftwareDevelopment (https://c2.com/cgi/wiki?SoftwareDevelopment) and/or on AgileProcesses (https://c2.com/cgi/wiki?AgileProcesses). Within the first one, links will take you to places like ProblemDomain (https://c2.com/cgi/wiki?ProblemDomain), AnalysingTheProblemDomain (https://c2.com/cgi/wiki?AnalysingTheProblemDomain), and ElicitingRequirements (https://c2.com/cgi/wiki?ElicitingRequirements). Essentially, there is no end to how far and where you can go with this. When you get started in earnest, you''ll need a good Search Strategy and careful documentation of where you''ve been; this isn''t random surfing.

Case Assignment

Read the assigned readings, supplemented if you wish with material from the optional readings and perhaps the supplementary background as well, and even other outside reading you might find by yourself to be useful. Then write a short paper stating your position on the question:

"The Systems Development Life Cycle methodology is [OR is not] excessively formal and rigid and should be [OR should not be] more flexible and unstructured?"

Your paper should be short (5-6 pages, not including cover sheet and references) and to the point. It is to be structured as a point/counterpoint argument, in the following manner.

You are expected to:

Begin this paper by stating your position on this question clearly and concisely -- take one or the other position (either for or against formality), but not both!

Citing appropriate sources, present the reasons why you take this position. Be sure to make the most effective case you can.

Then present the best evidence you can, again citing appropriate sources, against your position -- that is, establish what counterarguments can be made in response to your original position.

Finally, review your original position in light of the counterarguments, showing how they are inadequate to rebut your original statement.

By the end of your paper, you should be able to unequivocally re-affirm your original position.

Assignment Expectations

Your assignment will be evaluated based on the Rubric.

You will be particularly assessed on:

Your ability to see what the module is all about and to structure your paper accordingly.

Your informed commentary and analysis -- simply repeating what your sources say does not constitute an adequate paper.

Your ability to apply the professional language and terminology of systems design and analysis correctly and in context; you are expected to be familiar with this language and use it appropriately.

Your effective and appropriate use of in-text citations to the assigned readings and other source material to support your arguments. Refer to the TUI Course Guidelines and or the Purdue University APA formatting and style guide (see optional readings for Module 1) for the proper formats. General Case and SLP Paper Writing Guidelines

Verified Expert

The solution file contains 1700 words and it is discussed about the system development life cycle methodology is excessively formal and rigid and it should be more flexible and unstructured. It is also explained the weakness of the SDLC and stages in the SDLC. The references are included in the APA format

Reference no: EM131021047

Questions Cloud

What function does this story serve : What is a story that your family tells, to others or to itself? What function does this story serve?
The harvest of rice from decreasing : Which of the following is the best way that biotechnology can keep the harvest of rice from decreasing
Was the ipo an example of direct finance or indirect finance : Were the shares of stock issued as a result of Facebook's initial public offering (IPO) sold in a primary market or a secondary market? Was the IPO an example of direct finance or indirect finance?
How many bones are in the body : How many bones are in the body? Please explain in full detail.
Applications of systems development models : The Systems Development Life Cycle methodology is excessively formal and rigid and should be more flexible and unstructured? - review your original position in light of the counterarguments, showing how they are inadequate to rebut your original st..
What''s the biggest bone in the body : What's the biggest bone in the body? Please draw a picture of its location and what it is connected to.
How much money do you have today : Twenty years ago, you deposited $800 into an account. You earned 6% APR compounded annually for the first 15 years, and then 6% compounded monthly for the last 5 years. How much money do you have in your account today? How much money do you have toda..
What are the stages of photosynthesis : What are the stages of photosynthesis? please explain fully
What are the steps of photosynthesis : What are the steps of photosynthesis? Please explain in full detail.

Reviews

Write a Review

Computer Network Security Questions & Answers

  The author of your text suggests that the ability to

the author of your text suggests that the ability to connect to the internet via wi-fi is available everywhere bowles

  Change the php script to prevent such attacks

Briefly explain each rule in the rule - How would James need to change the PHP script to prevent such attacks?

  Cryptography assignment

cryptography assignment:  Consider the following problems: (P1) computing the output p from an input n; (P2) computing the output phi(n) from an input n. Which one of the following statements is true?

  Assignment on cryptographic systems

The Week 10 Critical Thinking assignment continues with the scenario set up for the Critical Thinking assignment in Week 8. You have been hired as the chief officer of information technology at a retail store in Medina City. The store has 5000 cus..

  Explain your method of attack

Explain your method of attack and operation within reasonable parameters of the law. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals

  What is the application layer protocol involved

What is its transmission distance from radio to radio - What is the security method used and discuss if the creation of a Wi-Fi Direct multi-hop network is possible or not.

  Recognize the various ways that agency or organization

cyber security power point presentation using the information you learned from modules 1 and 2 create a powerpoint

  Method of establishing compliance of it security controls

Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations

  Briefly describe the ict configuration of your company

Design suitable a security system for your company, clearly identifying the major security components of your design. Marks will be awarded on insight and elaboration.

  Largest threats against network security

Research and discuss what you believe are the largest threats against network security, and what measures should be taken to protect against such intrusions.

  Question about substitution ciphers

Think about two substitution ciphers. One adds a value of i to the ASCII code of the plain text character. The other adds a price of j to the plaintext character. All additions are modulo 256.

  The discussion board is part of the core of online

the discussion board is part of the core of online learning. classroom discussion in an online environment requires

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd