Applications of systems development models

Assignment Help Computer Network Security
Reference no: EM131021047

Question:

There are four sources for this Module''s Case. The first article relates to the classic SDLC methodology. The second one gives you a description of the applications of systems development models from a practitioner''s perspective. You will see various different paradigms used in practice:

Hoffer, J. F., George,J. A., & Valacich, J, S. (2010). Systems development environment. Modern Systems Analysis and Design. [PPT presentation - Chapter 1] https://wps.prenhall.com/bp_hoffer_msad_4/22/5876/1504457.cw/index.html

Centers for Medicare and Medicaid Services (2008). Selecting a development approach. https://www.cms.gov/Research-Statistics-Data-and-Systems/CMS-Information-Technology/XLC/Downloads/SelectingDevelopmentApproach.pdf

BigLever Software Inc. (2010) The systems and software product line lifecycle framework. Retrieved from https://www.biglever.com/extras/PLE_LifecycleFramework.pdf

The last source is a website that quite thoroughly describes the software development life cycle. You are not responsible for reading all this in its entirety. Rather, look it over, become familiar with the concepts it outlines, and use it for reference in preparing your paper:

Stewart, B. (2011) Systems engineering and software development life cycle framework. OpenSDLC.org. Retrieved from https://opensdlc.org/mediawiki/index.php?title=Systems_Engineering_and_Software_Development_Life_Cycle_Framework

The Portland Pattern Repository (hosted by Cunningham and Cunningham, Inc.) is a Wiki forum specializing in software development. It is a most interesting resource for creative thoughts about computing, systems development, and organizational implications of the information environment. We will be drawing on it at several points in this course. Their introduction and links to key descriptions of what''s going on can be found here.

The Wiki is useful, but it is not a repository of "truth" except perhaps in the large aggregate. Its value lies in the diversity of opinions expresses and the prodigious amounts of experience and talent on view there. Those opinions can help you evaluate other sources of information.

You might want to get a feel for the Wiki first before you begin to use it for detail work. You could start with their section on SoftwareDevelopment (https://c2.com/cgi/wiki?SoftwareDevelopment) and/or on AgileProcesses (https://c2.com/cgi/wiki?AgileProcesses). Within the first one, links will take you to places like ProblemDomain (https://c2.com/cgi/wiki?ProblemDomain), AnalysingTheProblemDomain (https://c2.com/cgi/wiki?AnalysingTheProblemDomain), and ElicitingRequirements (https://c2.com/cgi/wiki?ElicitingRequirements). Essentially, there is no end to how far and where you can go with this. When you get started in earnest, you''ll need a good Search Strategy and careful documentation of where you''ve been; this isn''t random surfing.

Case Assignment

Read the assigned readings, supplemented if you wish with material from the optional readings and perhaps the supplementary background as well, and even other outside reading you might find by yourself to be useful. Then write a short paper stating your position on the question:

"The Systems Development Life Cycle methodology is [OR is not] excessively formal and rigid and should be [OR should not be] more flexible and unstructured?"

Your paper should be short (5-6 pages, not including cover sheet and references) and to the point. It is to be structured as a point/counterpoint argument, in the following manner.

You are expected to:

Begin this paper by stating your position on this question clearly and concisely -- take one or the other position (either for or against formality), but not both!

Citing appropriate sources, present the reasons why you take this position. Be sure to make the most effective case you can.

Then present the best evidence you can, again citing appropriate sources, against your position -- that is, establish what counterarguments can be made in response to your original position.

Finally, review your original position in light of the counterarguments, showing how they are inadequate to rebut your original statement.

By the end of your paper, you should be able to unequivocally re-affirm your original position.

Assignment Expectations

Your assignment will be evaluated based on the Rubric.

You will be particularly assessed on:

Your ability to see what the module is all about and to structure your paper accordingly.

Your informed commentary and analysis -- simply repeating what your sources say does not constitute an adequate paper.

Your ability to apply the professional language and terminology of systems design and analysis correctly and in context; you are expected to be familiar with this language and use it appropriately.

Your effective and appropriate use of in-text citations to the assigned readings and other source material to support your arguments. Refer to the TUI Course Guidelines and or the Purdue University APA formatting and style guide (see optional readings for Module 1) for the proper formats. General Case and SLP Paper Writing Guidelines

Verified Expert

The solution file contains 1700 words and it is discussed about the system development life cycle methodology is excessively formal and rigid and it should be more flexible and unstructured. It is also explained the weakness of the SDLC and stages in the SDLC. The references are included in the APA format

Reference no: EM131021047

Questions Cloud

What function does this story serve : What is a story that your family tells, to others or to itself? What function does this story serve?
The harvest of rice from decreasing : Which of the following is the best way that biotechnology can keep the harvest of rice from decreasing
Was the ipo an example of direct finance or indirect finance : Were the shares of stock issued as a result of Facebook's initial public offering (IPO) sold in a primary market or a secondary market? Was the IPO an example of direct finance or indirect finance?
How many bones are in the body : How many bones are in the body? Please explain in full detail.
Applications of systems development models : The Systems Development Life Cycle methodology is excessively formal and rigid and should be more flexible and unstructured? - review your original position in light of the counterarguments, showing how they are inadequate to rebut your original st..
What''s the biggest bone in the body : What's the biggest bone in the body? Please draw a picture of its location and what it is connected to.
How much money do you have today : Twenty years ago, you deposited $800 into an account. You earned 6% APR compounded annually for the first 15 years, and then 6% compounded monthly for the last 5 years. How much money do you have in your account today? How much money do you have toda..
What are the stages of photosynthesis : What are the stages of photosynthesis? please explain fully
What are the steps of photosynthesis : What are the steps of photosynthesis? Please explain in full detail.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Sarbanes oxley act and gramm leach bliley act

Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including: FISMA, Sarbanes-Oxley Act and Gramm-Leach-Bliley Act

  How are students with exceptional needs

What is the impact of Common Core on education today? How are students with exceptional needs affected by this new initiative?

  What process you would use test the software security

Evaluate the extent to which programmers have the requisite experience to test the security of software within the development of a product. If not, explain what process you would use test the software security.

  Monitoring of a secure network design in an organization

Analyze strategies for maintenance and monitoring of a secure network design in an organization. Create recommendations for maintenance and monitoring tools to support maintenance of a secure network within an organization

  A determine the elements of the risk management framework b

to foster and develop national preparedness and encourage the exploration of risk related interdependencies across the

  In the past several years incidences such as school

in the past several years incidences such as school shootings have caused loss of many lives in us schools and

  What is 128-bit encryption

Most Web browsers now use "128-bit encryption" to exchange data with secure Web sites. But what does this mean. What is "128-bit encryption". In terms of software available to the general public, is "128-bit encryption" the strongest.

  What are the pros and cons of each method

What are the pros and cons of each method? If you are the security officer of your company and want to set up a key distribution mechanism, which one would you choose to use?

  Reference validation mechanism and toe security functions

What are the conceptual differences between a reference validation mechanism, a trusted computing base, and the TOE Security Functions and How will you explain to the management of this company why their software is not a high assurance software.

  What is the resulting cipher

What is the resulting cipher - Given your answer, is security of the a!ne cipher with a given modulus m increased if one encryption is followed by a second encryption with a different key?

  Find one example of password protocols in microsoft product

Find one example of password protocols in Microsoft product and discuss its security or insecurity with your colleagues. If possible, install one of the available cracking tools to see whether you could crack this system and share your experience ..

  Hacking occurred and the organization had the right plan

Security Computer forensics and hacking go hand in hand. Discuss in (Need 2 Reports with 2 pages each report = 4 Total Pages), two cases where hacking occurred and the organization had the right plan in place to combat the hack. Describe the proce..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd