StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Engineering - Assignment Example

Cite this document
Summary
In the paper “Information Engineering” the author explains what is meant by an ethical analysis framework that might be used in the IT industry today. In this framework, he initially accesses the ethical point of view and takes the deep insight into the overall aspects of the ethical dilemma…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Information Engineering
Read Text Preview

Extract of sample "Information Engineering"

Information Engineering By Question a- Explain what is meant by an ethical analysis framework that might be used in the IT industry today. The ethical framework for IT industry is really essential. In this framework we initially access the ethical point of view and take the deep insight into the overall aspects of the ethical dilemma. Then we develop a detailed description of the case to be analyzed and check for the main facts regarding the problem. Here for the solution of the problem we have to access the pervious solutions for the better management and handling of the solution. This stage also involves the management of problem through the ethical knowledge and skills. At the present time, we have lot of ethical issues in IT. They can be regarding the information theft, hacking, and identity break-in. for the solution of such problem we have to apply all aspects of the ethical framework for the solution of these problems. Then we gather the main facts regarding the problem then apply the pervious solution for the handling of problem. This also involves the assessment of the problem through your own skills of problem handling and management. Here we take advantage of one or more systematic analysis techniques. This helps us to draw the ethical conclusions about the case regarding the IT ethical problem. This decision provides help for the solution of the ethical dilemma in the IT working environment (Laudon & Laudon, 1999). In most of the nations the concepts of the information technology have improved and ethics has changed a lot of features of life considerably: medicine, service, commerce, online safety, shipping, and so on. As a result, ICT or information and communication technology has involved in both awful and good conducts. Computer analysis and information ethics in the wide intellect can be understood as a division of practical ethics those concerns and examines such community as well as ethical influences of information and communication technology (Gladney, 2009). At the same time as ethical analysis is paying attention to similar things because the up-to-date information technology as well as confidentiality matters, a great deal of it has concerted on media like that advertising, news, entertainment not precisely tech­nologies. Specified fields require an integrative and methodical technique for ethical evaluation of ethical analysis formwork (Gladney, 2009). A distinctive difficulty in computer ethics takes place since there is strategy emptiness regarding how information and computer technology should be employed. Computers present us new possibilities as well as they consecutively offer us innovative alternatives for achievements. Normally, either no strategies for accomplishing these positions exist or reachable strategies seem unsatisfactory. A fundamental task of computer principles is to decide what we should carry out in similar situation, that is, invent strategies to direct our proceedings. One complication is that beside strategy blankness there is frequently a theoretical emptiness. Despite the fact that, complicatedness in computer ethics can emerge apparent originally, a diminutive expression releases a theoretical confusion. What is needed in similar problems is an exploration that presents a rational theoretical framework inside which to build a strategy for accomplishment (Bologna, 1991 ). The ethical analysis framework for IT based working atmosphere engrosses the enhanced working equality, justice and respect. This type of ethical environment needs to present people a better respect and effective communication with each other. b- Recently Facebook has been criticized for changing the terms and conditions for users of the site. Using a suitable ethical framework, discuss the ethical, social and professional issues that relate to this case. What are the legal issues? Face book previously announced that the according to new terms of the services the Facebook will own all the data and information posed by the user. This will also be applied to the user that leaves the website. This is a great problem regarding the user safety of the information contents (Bingham, 2009). Do you think it is a “professional” thing for Facebook to have done? The transformation in terms of services was done to enhance the user integration with the network. But this causes a huge ethical dilemma. This transformation of terms has provided the user less rights for the website operations and working. here we can not say that Facebook has taken a wise step for the customer interest. Who are the stakeholders in the case? The public and account holders of the Facebook are the main victims of this ethical dilemma. How will they be affected by different decisions? The public can be affected through this decision. A user posted personal video. When he wants to remove that and have not right for that task then he will feel less satisfaction. In this scenario another user can watch and spread that video for bad purpose. What are the issues of social responsibility? Here the user needs to have the social responsibility regarding the information safety and user data utilization. Here we need to have a system that allows user the full rights regarding utilization and handling of the personal data. Here we should have a social responsibility to make the network for the people and provide the better facility for the user data handling. What about issues of nationality and culture? This ethical dilemma for the Facebook is really critical for the cultural point of view. It is less effective to the nationality point of view. Here a person who does not have control over his personal data can face greater problem regarding the social point of view. Question no 2 a- Describe the key system development activities that should take place in the Social World, Pragmatic and Semantic layers. Social Level In social level the design environment, where system designers make use of the models of usage centered design to correspond their system designs to every system module as well as to the client. It can also be represented as the context in which the system user interface is to be positioned. At the social level, usage centered design offers us through the User-Role-Model for forming the functions of the possible users of the system interface to be planned (Jennifer Ferreira, 2004 ). Pragmatic Level The pragmatic level is linked to the practice of signs. The pragmatic level is concerned to the study the association among signs and their users. The outcome of the user position and jobs models will rely on the social intensity. The client positions as well as the associations among them, and the jobs they require to carry out by means of the system force, for the duration of the client function as well as job Models, be inferred through the client interface designer at the social point so as to carry on to choose on the inside of the client interface, therefore, the content model (Jennifer Ferreira, 2004 ). Semantic Level semantic level At this stage the validity and behavior of the user interface desires to be confirmed. This is previously moderately done in the course of the development of the task models and user role, that model the practice of the user-interface (Jennifer Ferreira, 2004 ). b- Discuss why it is important for the developer to understand issues of beliefs, culture, law, commitments and expectations when building information systems. Understanding the issues of beliefs, culture, law, commitments and expectations when building information systems is really significant for the system working and operating. The resourceful use of the basic aspects of the beliefs, culture, law, commitments and expectations for the system are required to enhance company performance. These systems accomplish their prospective for enhancing the managerial performance regardless of their technical unassailability as well as attentiveness to human issues. Basically, clients are not aggravated to carry out what the organization facilitates them to perform. In the most horrible cases, the system formulates it tough and inflexible for them to carry out what they are aggravated to accomplish. Undoubtedly, such non-use is mainly attributable to behavioral moderately than realistic issues. It is therefore a very significant to be familiar with the function of these behavioral aspects in information technology performance. Similar issues have to be considered mutually by means of the tactical issues to guarantee that information technology implementations distribute predictable company performance (Yogesh Malhotra, 2004). The incorporation of aspects of beliefs, culture, law, commitments and expectations will offer a great deal of the significant advantage for the better user interaction. A system with all these aspects will provide a better user performance in working and adoption after development. Question no 3 a- Explain why we need to abstract and model as part of the requirements analysis process. Provide a relevant example in support of your answer. Abstraction and model as fraction of the requirements analysis practice is really necessary for the better system working and system development. Abstraction and model based system requirement analysis offer orderly or systematic way for the system development. The abstraction provides a method of determining likeness among perceptions by paying no attention to a number of details. Through this way of requirements analysis we focus on the specific / general association among events. This way provides the categorization groups units by means of a comparable role as associates of a particular class. Simplification articulates resemblance among dissimilar classes in a relationship. For example, we are gathering the system requirements for the huge databases. The utilization the abstraction and model based system requirement analysis will proffer more easiness for the requirement gathering for similar entities (Laudon & Laudon, 1999). Here we have similar entities in different departments and collecting requirements from one department will provide the abstraction for all the departments. b- Identify two modeling techniques with which you are familiar (e.g. Rich Pictures and Use Case modeling), and for each discuss how it supports analyst in understanding requirements at an early stage in the development process). Rich Picture Rich Picture" is an expression that is at the present in extensive use for a drawing that uses words, arrows, and images to facilitate make sense of the connections in a subject or a difficulty (Leith, 2008). Rich picture offers an enhanced means to demonstrate the basics of the procedure flow. We are able to examine the environmental aspects and kinds of necessities that will have to be urbanized. The major recompense of rich picture is the capability to present an enhanced understanding of the settlement: concerning the areas of assets, concerned parties, difference as well as their positions. One more capability of this tool is to display the thoughts, views, concerns, responses as well as response of the information system contents and data (Yinghong, 2007). Use Case Use cases are a scenario based practice for the requirements elicitation. Use cases outline the individual communications with the system (Sommerville, 2004). The use case is the reaction of system against any external input. The use case demonstrates the user input to the system and the possible responses of the system. Uses case diagram is an overall description of the system working and operating. This also outline the main stockholders/ actors those directly or indirectly involved to the system working. This way of system modeling provides the possible system response and also the negative outcomes. So this tool is very supportive for the analysis of requirements. Question no 4 a- Explain what is meant by an ‘iterative and incremental approach’ to systems development and suggest why this approach is being adopted more frequently by project teams keen to take a rapid approach to systems development. Iterative and Incremental system development approaches are similar to a cyclic software development procedure designed in response to the limitations of the waterfall model. It establishes through an original planning as well as ends through operation by means of the cyclic interaction involving in. The iterative and incremental system development is a significant division of the Rational-Unified-Procedure the DSDM or Dynamic Systems Development Method, tremendous programming as well as normally the agile software production structure (Oddur Benediktsson, 2004). Increments and Iterations normally work effectively jointly. So these techniques are not the similar. It is a one of the easiest methods that are able to work through dividing the development in growths as well as then breaking down in a convinced time in subsequent augmentation for iteration on what was transported in the earlier addition. We could be really incremental when we have need of to be too iterative or else vice-versa. As well as undoubtedly, we could be performing incremental and iterative also not Agile (Incremental-and-Iterative, 2009). (b) Discuss how the concept of time boxing supports the Rapid Application Development (RAD) philosophy generally and the DSDM approach specifically. Time boxing is concerned with fixing the time which we have on hand to work on a particular job and then doing the best we can within that time frame (Cheong, 2006). Time boxing is the procedure of selecting feature to be released in prospective iterations so as to entire the present description in a small quantity of time. The significance of this process is not to be undervalued (RAD, 2009). In Time boxing, each iteration consists of an equivalent period, which is the length of the time box (Jalote, Palit, Kurien, & Peethamber). Time boxing is a technique for time administration method extensive in software system developments to map out a development, for instance the establishment of a new information system, through dividing the system development in a number of time phases. Every fraction has its own limit and its own financial plan. Through incrementally concluding one fraction at a time, a development can be productively delivered (boxing, 2009). According to the DSDM the Time boxing is a procedure through that described objectives are attained at prearranged as well as steady dates in the course of permanent prioritization and contracting of necessities. Prototyping is immediately individual of the numerous methods utilized in DSDM. The technique DSDM presents apparent strategies for guaranteeing prototyping is directed as well as pays attention to particular objectives, passing up a runaway-prototyping condition. The DSDM technique as well utilizes a quantity of other methods like that time boxing, prioritization helped workshops as well as offered a holistic technique (DSDM, 2009). Question No 5 (a) Discuss three reasons why systems failure still occurs. In your answer, comment upon the role that is a formal development method or framework may play in supporting successful system development. Here below I have given 3 main reasons for the systems failure (Laudon & Laudon, 1999): 1. System not developed on specified time 2. System not developed within specified budget 3. System delivered not the one asked for The formal development method or framework may play an important role in supporting successful system development. The development of the system is a complex task and utilization of formal methods of system development provides better advantages for the system handling and working. The formal methods are more appropriate for the development of small system. This development includes the better estimating and resource handling techniques those offers great advantage for the on time and within resources systems completion and development (Laudon & Laudon, 1999). (b) How does user participation in the development process help the development of successful systems? The participation of the user in the system development process provides a great advantage regarding the better system development. The utilization the user experience provides a great advantage for the development of the system functionality according to user desire. The developed system provides the more convenient system that fulfills the user requirement. User can participate in the development of system by many ways. Like user can participate in system requirements gathering. Here user helps the system development team regarding the gathering of the system working requirements (Laudon & Laudon, 1999). The system design development process can also engage system user for the enhanced system design. Here development team can incorporate the user’s valuable consultation for system user interface designing (Laudon & Laudon, 1999). The main system development phase that require user interaction is the system testing. The testing of the system is really essential task in every system development. The incorporation of the user views provides user huge advantage regarding the system working quality assurance (Laudon & Laudon, 1999). Question No 6 (a) The Soft Systems Method (SSM) allows for the modeling of real world activities and system world activities. Discuss why both of these views are important when building Human Activity Systems. Soft systems methods are unique technique in the field of practical systems judgment, carrying simplicity to perplexed and composite conditions. The tools of Soft systems methodology conceptualization, encrusted view and idea - hold up the model structuring stage as well as contain the dissimilar. Contrast of the representations by means of the affluent as well as disordered real-world present common imminent concerning what must be as well as, in an iterative way, authorize determined deeds to be in use (Yinghong, 2007). The Soft Systems Method (SSM) facilitates in the modeling of real world activities and system world activities. In building Human Activity Systems these both views are really significant. The feature of Soft Systems Method (SSM) for the modeling of real world activities and system permits to inspect other systems, predominantly those concerning human activity structure. The main significance of soft system investigation for the human activity system is that there are two most important fractions to some human activity system. There are the technological features of the system of behaviors those are frequently uncomplicated to distinguish as well as model and the informal, complicated attributes of the system. It is the community system fraction that frequently obtains unobserved and therefore the system is unproductive. The main significance has to model the technical fractions as well as we have to judge the community system fractions (Yinghong, 2007). (b) Why do we need to take both a hard and soft approach when developing information systems? The development of system engrosses both the utilization of the hard and soft approach. The utilization of the hard system development approach provides benefit regarding the resolution of the technical issues. While, the soft system development technique provides help regarding the incorporation of the social, moral, ethical, human aspects for the systems development. These both system development aspects provide a great help for the implementation of all aspects those are both technical and non technical (Laudon & Laudon, 1999). References Bologna, J. (1991 ). A framework for the ethical analysis of information technologies. Elsevier Advanced Technology Publications Oxford, UK, UK , 303 - 307. boxing, T. (2009). Time boxing . Retrieved 08 01, 2009, from http://www.reference.com/browse/wiki/Time_boxing Cheong, D. (2006, 07 26). Time Boxing is an Effective Getting Things Done Strategy. Retrieved 08 03, 2009, from Dave Cheong.Com: http://www.davecheong.com/2006/07/26/time-boxing-is-an-effective-getting-things-done-strategy/ DSDM. (2009). DSDM -What are the tangible benefits? Retrieved 08 01, 2009, from http://www.dsdm.org/services/faqs.asp Facebook. (2009). My photos are MINE! NOT Facebooks! Change the Terms and conditions! Retrieved 08 01, 2009, from http://www.facebook.com/group.php?gid=5606823556 Gladney, G. A. (2009). Bringing Communication Technology Under Ethical Analysis:A Case Study of Newspaper Audiotex. Retrieved 08 01, 2009, from http://www.questiaschool.com: http://www.questiaschool.com/read/95226439?title=Bringing%20Communication%20Technology%20Under%20Ethical%20Analysis%3A%20a%20Case%20Study%20of%20Newspaper%20Audiotex Incremental-and-Iterative. (2009). Incremental and Iterative Software Development. Retrieved 08 01, 2009, from http://www.agilecollab.com/: http://www.agilecollab.com/incremental-and-iterative-software-development Jalote, P., Palit, A., Kurien, P., & Peethamber, V. T. (n.d.). Timeboxing: A Process Model for Iterative Software Development. Retrieved 08 03, 2009, from Computer Science and Engineering Department, IIT Kanpur: http://www.cse.iitk.ac.in/users/jalote/papers/Timeboxing.pdf Jennifer Ferreira, J. N. (2004 ). The Semiotics of Usage-Centered Design. Retrieved 08 01, 2009, from Human-Oriented Technology Laboratory, Carleton University, Ottawa,: http://homepages.mcs.vuw.ac.nz/~jennifer/chapter_iwos2005.pdf. Laudon, K. C., & Laudon, J. P. (1999). Management Information Systems, Sixth Edition. New Jersey: Prentice Hall . Leith, J. M. (2008). Idea generation methods. Retrieved 08 03, 2009, from JackMartinKeith: http://www.jackmartinleith.com/idea-generation-methods/rich-picture.html Marshall, J. (2009). Definitions and Concepts for Ethical Analysis. Retrieved 08 01, 2009, from http://www.ethicsscoreboard.com/rb_definitions.html Marshall, R. (2009). Facebook users up in arms over new T&Cs. Retrieved 08 01, 2009, from http://www.v3.co.uk/: http://www.v3.co.uk/vnunet/news/2236647/thousands-protest-against Oddur Benediktsson, D. D. (2004). COCOMO-Based Effort Estimation for Iterative and Incremental Software Development. Software Quality Journal , 65-281. RAD. (2009). RAD (Rapid Application Development). Retrieved 08 01, 2009, from http://www.novulo.com/Rad.aspx Rien, T. O. (2009). Social Networking Media Present New Ethical Challenges for Public Relations. Retrieved 08 01, 2009, from http://www.timobrienpr.com/pr%20strategist%20-%20ethics%20and%20social%20media%20-%20spring%202009.pdf. Sommerville, I. (2004). Software Engineering, 7th Edition,. New York: Pearson Education (Addison Wesley). Yinghong, Z. (2007). Soft Systems Methodology Based on Decision Making Knowledge Integration. Guangdong University of Technology . Yogesh Malhotra, D. F. (2004). Building systems that users want to use. Communications of the ACM , 88-94. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information Engineering Assignment Example | Topics and Well Written Essays - 3000 words, n.d.)
Information Engineering Assignment Example | Topics and Well Written Essays - 3000 words. https://studentshare.org/information-technology/1726187-information-enginnering
(Information Engineering Assignment Example | Topics and Well Written Essays - 3000 Words)
Information Engineering Assignment Example | Topics and Well Written Essays - 3000 Words. https://studentshare.org/information-technology/1726187-information-enginnering.
“Information Engineering Assignment Example | Topics and Well Written Essays - 3000 Words”. https://studentshare.org/information-technology/1726187-information-enginnering.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Engineering

Total cost minimization

US Steel, the largest steel company in the US, in 1980, employed over 120,000 workers, which decreased to 20,000 in 1990 and 14,000, in 2005, even though it was producing the same output (National Academy of engineering 10).... The new communication and information technologies today have made it possible to attain sophisticated and continuous process manufacturing....
4 Pages (1000 words) Essay

BlackBerry Strategic Assessment

BlackBerry Strategic Assessment Name: Institution: BLACKBERRY BUSINESS STRATEGY Global Smartphone Industry Analysis Analysis of BlackBerry's Position in the Industry While there are few smartphone firms involved in the development of operating systems, such as Apple, Google, RIM, and Nokia, more companies are developing software (Ogunsanwo, 2013: p54)....
6 Pages (1500 words) Essay

IMPACT OF INCORPORATION OF INFORMATION SYSTEMS

… Impact of incorporation of information systems (Author's name) (Institutional Affiliation) Key words: Principles, Competitors Introduction Technology has been a vital ingredient in the study of organizational forms since the year 1950.... Apparently, it also during this time that information technologies were introduced into organizations and as a result they have come with numerous advantages and limitations for that matter.... However, information technology has also incorporated some of the existing organizational features in a bid to maximize on the efficiency....
8 Pages (2000 words) Essay

The Evolution of the Smartphone Markets

The Evolution of the Smartphone Markets Name University The Evolution of the Smartphone Markets Introduction In the contemporary world Smartphones have become the necessity of life for millions of people (Molina, 2013:6).... They actually fall under the category of differentiated products as most of them have similar features with very little variations....
6 Pages (1500 words) Essay

Business Process Reengineering

For example, there are some organizations, which have gained impressive profits after conducting business process engineering but then again there are some organizations that have failed to achieve their objectives and targets or the improvement these companies sought to improve their business processes....
6 Pages (1500 words) Assignment

Role of information Technology in the Implementation of Business Process Reengineering

After conducting the thorough data analysis, it can be concluded that the information technology has proved to be an integral part for the business process reengineering for the government Institutions in the UAE.... The employees are more satisfied with the new system of business than the old one. One of the major reasons for a Conclusion After conducting the thorough data analysis, it can be concluded that the information technology has proved to be an integral part for the business process reengineering for the government Institutions in the UAE....
1 Pages (250 words) Research Paper

The Difference between the 80s and 90s Generation in China

The paper "The Difference between the 80s and 90s Generation in China" states that those who were born in the 1980s did not want to adopt the culture which was promoted by the Internet and remained conservative; contrary to that the younger generation is largely influenced by the Web.... hellip; The findings are significant since they are able to explain the fundamental difference between the two generations and allow one to choose the best approach towards building a strong relationship with them....
5 Pages (1250 words) Essay

Internet Has Actually Had a Negative Effect on Non-Western Societies

nbsp;Internet is an important technological advancement that has provided means in which information can be shared easily… It is easier for someone in Thailand to communicate with someone who is located in the United States of America (Barker and Angelopulo, 2005).... Some of the challenges that are associated with the Internet are the type of information that is transmitted, controlling and monitoring information that has been disseminated, and cultural decay....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us