Unit 35 Systems Analysis and Design
Unit 35 Systems Analysis and Design
Anusha Asim
Pearson ID: RF64842
HND
Regent Middle East
Contents
Unit 35: Systems Analysis and Design..........................................................................................1
Discussing Strengths and Weaknesses of Traditional and Agile System Analysis Methodologies
.......................................................................................................................................................2
Comparing The Strengths and Weaknesses of Methodologies for UCMS (University Course
Management System).................................................................................................................10
System Feasibility Report:...........................................................................................................12
Evaluation of the Importance of the Feasibility Criteria...............................................................17
Critical Evaluation of Methodological Strengths/Weaknesses and the Feasibility Study for the
UCMS..........................................................................................................................................21
System Review Using Agile Modelling (AM) Methodology..........................................................25
Assessing the Effectiveness of the Methodology........................................................................26
Justifying the Methodology Choice..............................................................................................28
Requirements..............................................................................................................................31
Design Specification....................................................................................................................34
Assessing the Effectiveness of the System Design.....................................................................48
References..................................................................................................................................51
Student Declaration.....................................................................................................................52
Traditional Methodologies
Traditional SDLC models represent the fundamental approach to systems development which
existed for numerous years. The models follow structured plans which execute their steps either
through a straight order or an endless loop. The following section demonstrates different
versions of traditional SDLC models:
1. Waterfall Model
Among the classic traditional methodologies stands the Waterfall model as one of the early and
well-established models.
The development process through which the Waterfall model is executed follows along the
phases of requirements gathering, design, implementation, testing, deployment and
maintenance in a strict sequential order.
Project documentation and control functions as the central focus of this approach yet leaves no
room for change after project commencement.
2. Prototyping Model
The Prototyping model stresses the creation of working system prototypes during early stages
of developing the process.
The prototype moves from development to testing to user feedback and implementation.
Risk assessment plays a fundamental role in this model which combines multiple development
cycles each time. The developmental process consists of planning followed by risk evaluation
then development work, followed by testing followed by evaluation which lets organizations
enhance product quality through received feedback.
However, the existing complexity in the Spiral Model may act as a management obstacle in
smaller and simpler projects.
2. The development cycle produces in-depth documentation that verifies complete records of all
process activities.
3. These methodologies provide organizations with the ability to maintain strict control over
project scope along with schedule and budget requirements, specifically in large-scale projects.
Weaknesses:
1. The Traditional approach exhibits high degrees of inflexibility which makes it unfavorable in
dynamic environments, as changes become impossible after project initiation.
2. The speed of project delivery often gets compromised because the linear progression
requires extra time for feedback-based adjustments and review requests.
3. User participation i.e testing during traditional development begins late in the project so users
may find their needs mismatched from what the finished product delivers.
Waterfall Clear structure and sequential flow Inflexible to changes once development
of activities. starts.
Agile Methodologies
Agile methodologies introduce flexible models based on continuously iterative collaboration. The
essential elements of agile are defined by flexibility as a main principle to promote ongoing
feedback, combined with a user-centric approach. Various agile models have become popular
in the industry, including:
1. Scrum
Scrum functions as an iterative framework through which agile developers split projects into
small work units known as "sprints."
The time period for each sprint extends to 2-4 weeks until the team confirms a product
increment that is ready for delivery.
Through its methodology Scrum focuses on three main features: regular team collaboration,
agile reviews and continuous system improvement.
Through this approach, developers collaborate with stakeholders to verify that the product suits
user requirements.
3. Lean
The lean methodology concentrates on creating the maximum value while removing all
avoidable costs.
By cutting unnecessary procedures and streamlining operations, along with shorter delivery
schedules, this approach delivers maximum performance.
4. Scaled Agile Framework:
The Scaled Agile Framework (SAFe) is a collection of organizational patterns with workflow
guidance, which enables large organizations to scale agile methods throughout their
enterprises.
5. Kanban
The visual work management system called Kanban focuses on delivering work in a constant
flow through its visual board framework.
Organizations use a visual tracking system to display task movement across different
development levels that demonstrates workflow and helps teams find improvement areas.
6. DevOps
DevOps serves as a series of practices which automate and combine development with IT
operations functions between software teams.
This method enhances the collaborative relationships between developer and operational
teams, resulting in faster software deployment with enhanced quality.
Strengths:
1. Agile methodologies demonstrate adaptable characteristics for teams who need to change
requirements and priorities.
2. Agile provides teams with the ability to release function-based parts progressively, thus
delivering value quickly and speeding up the processes.
4. Driven by multiple evaluation cycles, Agile helps organizations develop high-quality products
through continuous feedback sessions.
Weaknesses:
1. Working software takes precedence over documentation in Agile methods which results in
diminished detailed records about the development processes.
2. Agile methods tend to evolve during development but projects can develop scope changes
when proper management of changes is neglected.
3. Organizations face difficulties with Agile implementation because these methods need
experienced self-organized teams, yet they might not have proper team expertise.
4. Agile projects face difficulties in forecasting project timelines, costs and resource needs
because they use flexible methodologies, even in large-scale projects.
Model Advantages Disadvantages
Strengths:
1. The waterfall method provides structured planning because it outlines the requirements
gathering , design development and testing phases, leading to deployment. An elaborate
product like the UCMS will sufficiently benefit in managing its various features through
this clear, linear approach.
Weaknesses:
3. The Spiral model develops systems through iterations but developers experience
difficulties when handling complex systems like UCMS because of the need to align
multiple functional teams, such as professors, students and administrators during
requirement evolution.
Strengths:
3. Developers can utilize Kanban and Lean methodologies to provide fast and iterative
deliveries for features. This will aid the UCMS to roll out and test vital features like
course registration, while other features will develop throughout its evolution.
Weaknesses:
1. Agile methodologies using Scrum may experience extended project timelines when
users continuously request modifications to system features. The UCMS system might
end up with complexities or unreliable tendencies because of potential excessive user-
requested features which would divert from its original design purpose, delay its launch
and confuse users.
2. Highly trained team members are essential for Agile methodology frameworks like XP
and DevOps. If Bright Horizons lacks these resources, the UCMS might experience
delivery problems that would delay fundamental grade management systems and
reporting tools that need advanced back-end infrastructure.
The power of both traditional and agile approaches to systems analysis is that each has
comparative strengths and weaknesses when applied to the UCMS development at Bright
Horizons. Traditional approaches provide predictability as well as thoroughly documented
completeness, which will be suitable if the project size is large with fixed requirements.
However, if the goal is to evolve the nature of the UCMS nature with integrating user feedback
along the way, it may be better suited by agile approaches due to their flexibility and iterative
approach. The selection of methodology relies on the organizational capacity, the level of
complexity of the system, and the presence of qualified teams to carry out the development.
The educational institution, Bright Horizons, plans on using a web-based University Course
Management System (UCMS) for managing student enrollment, teaching courses and grading
students, all while maintaining records of academic performance. The feasibility study below
analyzes the market and technical aspects of the project, alongside organizational and financial
elements.
Market Feasibility
Industry Demand:
The educational technology market continues to grow as educational institutions increasingly
adopt digital learning and course administration solutions (Tsymbal et al., 2023)
The incorporation of technology in higher education learning environments has particularly
shown improvements in student outcomes in the UAE, garnering support from local
stakeholders (Ashour, 2020). These positive perceptions held by the stakeholders, i.e students
and educators, reflect the significant demand for such technology.
Competitor Analysis:
Various educational institutions adopt educational platforms, including Moodle, Blackboard and
Canvas. However, an exclusively designed UCMS will offer better specific functional capabilities
than general-purpose commercial solutions.
User Needs:
a. Students need an easily navigable platform, one that will offer straightforward use in
both course enrollment and grade monitoring features.
b. Teachers and professors need tools to administer courses, as well as monitor and grade
the performance of their students.
c. Administrative teams need smooth operations, automations in repetitive processes and
improved recordkeeping, as well as reporting features.
A UCMS system aligns with the market demand and user needs. There is the challenge of
competition but with reduced costs through efficient resource allocation, and personalization,
the UCMS can set itself apart from the preexisting software in the market.
Technical Feasibility
The following technology will be required for the development of the UCMS.
Organizational Feasibility
Stakeholder Support:
Stakeholders of the organization are likely to maintain a supportive stature for the
implementation of the UCMS. There is a strong commitment from Bright Horizons'
administration and faculty to supporting the UCMS, as it will streamline the particular duties for
every organizational member, ranging from IT specialists, to teaching staff, administrative
workers and students.
Operational Integration:
There is a clear path for the integration of the system, as it will function through integrating
information from pre-existing student information systems (SIS) and learning management tools.
Furthermore, the organization will offer training to faculty members, students and administrative
personnel to achieve smooth implementation of the UCMS.
Regulatory Compliance:
Compliance to certain regulatory standards is mandatory for the UCMS to be successful.
b. Students from outside the EU require the protection of privacy standards, equivalent to
GDPR to safeguard their data.
Financial Feasibility
Considering the technological and administrative requirements, the UCMS will amass the
following costs:
a. The UCMS will make course management more efficient, thereby reducing
administrative costs.
c. An efficient UCMS will boost student satisfaction, which will in term boost the university’s
retention rates and long-term sustainability.
The financial Cost-Benefit Analysis below further confirms the economic viability of the project.
Schedule Feasibility
The design, development and testing of the UCMS is expected to follow the tentative schedule
below.
As the project is expected to approximately take 1 month and 2 weeks, it can be expected to
quickly be implemented into the University, satisfying organizational demand. However, the
short time allocated for the design and development phase introduces a challenge and creates
the demand for a methodology which will enable these phases to parallelly take place.
Security Considerations
As the system will be dealing with sensitive university data, there are several security
considerations to keep in mind. The primary concerns are highlighted below, with the suggested
strategy for mitigating the security risks:
Conclusion
The feasibility analysis supports UCMS as a viable project for Bright Horizons. The project
should move forward as the feasibility criteria above indicates positive outcomes.
1. Market Feasibility
In the age of rapid technological advancement, the market for new systems is rife with
competition. It is easy to overestimate the viability of a new product, only for it to get eaten up by
competitors. In order to ensure that the UCMS flourishes in such a market, an analysis of
industry demand and competitors was done. This revealed the security of such a product as
user demand continues to inflate, while the competitor analysis brought to light how the system
will have a competitive edge over pre-existing solutions on the market, even having the potential
to be scaled up to generate further revenue.
These conclusions could not have been made without the criterion of market feasibility.
However, it carries some strengths and weaknesses.
Advantages
a. Examining the market feasibility checked if the system matched the current demands of
the industry, as well as user expectations.
b. It aided in identifying the competitive edge that the UCMS will hold over preexisting
solutions like Moodle and Blackboard.
c. It will boost the confidence of stakeholders in the UCMS, as a clear market need for the
system is demonstrated.
Disadvantages
a. Market demand may shift due to rapid advancement and unforeseen trends, thereby
rendering the market feasibility assessment void.
b. The presence of strong competitors, like Moddle and Blackboard, may make it difficult
for the UCMS to gain traction in the market, even despite its clearly demonstrated
competitive edge.
c. The current market feasibility analysis may overlook other practical obstacles or
opportunities in the market for the UCMS, as it is largely theoretical.
2. Technical Feasibility
The criterion of technical feasibility was vital to verify if the UCMS can be developed through the
university’s resources. This revealed that only is it viable to be built through minimal resources,
but that it can also be scaled up. Despite these advantages, some disadvantages are attached
to the criterion as well.
Advantages:
b. Future technical challenges are prevented through the analysis of technical feasibility,
thereby enabling smooth project deployment.
c. The integration of the system with relevant preexisting university systems, as well as its
overall scalability, were uncovered through the technical feasibility analysis.
Disadvantages:
a. New technology integration into current systems demands extensive time investments
for proper implementation, which might be overlooked by the technical feasibility
analysis.
b. Unforeseen by the criterion, additional hiring or training expenses may occur because
skilled IT experts are needed to implement the system.
c. The criterion didn’t account for potential technical problems that may emerge
unexpectedly, potentially resulting in additional expenses and time delays.
3. Organizational Feasibility
Through the criterion of organizational feasibility, it was highlighted that UCMS could easily
integrate with preexisting university systems. Certain regulations for compliance were also
found. Furthermore, the roles of stakeholders in supporting the development and
implementation of the system were identified.
Advantages:
a. The criterion was successful in highlighting the compatibility of the UCMS with the
university’s operational structure and workflows.
b. Relevant regulations, that the UCMS would be subject to within the scope of the
organization, were identified.
c. Through this criterion, the supporting roles that stakeholders will have to play were
highlighted.
Disadvantages:
a. The operational feasibility analysis did not account for potential bottlenecks that may
emerge with the integration of the UCMS with preexisting university systems, which may
cause time and financial losses to accumulate.
b. The stakeholder supporting roles that were outlined may be misaligned with the culture
and values of the university.
4. Financial Feasibility
Similar to market feasibility, the criterion of financial feasibility assessed the economic viability
and sustainability of the UCMS. It revealed the approximate budget of its development and
implementation, along with using the CBA (cost benefit analysis) to demonstrate the significant
costs that the university will save. Without this criterion, these findings could not have been
uncovered. Regardless, it still has certain disadvantages meshed with the advantages.
Advantages:
a. The financial feasibility analysis determined if the UCMS represented a successful cost-
efficient solution with solid return on investment performance.
b. The criterion uncovered that the UCMS will enable administrators to obtain opportunities
for expense reduction, along with the ability to automate repetitive administrative
procedures.
c. It also found that the university can generate further revenue through partnerships and
sponsorships on the UCMS.
Disadvantages:
a. A measurable financial return on investment in the UCMS requires significant time for
the benefits to appear in measurable form.
b. There is the risk that the financial feasibility analysis underestimated the cost of
developing and implementing the UCMS. Another criterion could have identified potential
unexpected costs.
5. Schedule Feasibility
The criterion of schedule feasibility enabled the assessment and outlining of the approximate
schedule through which the UCMS will be developed and subsequently implemented. Through
this analysis, a timing concern was identified and the demand for a methodology that will enable
design and development to parallelly take place was uncovered.
Advantages:
b. The criterion-driven schedule will enable both students and faculty members to begin
using new systems quickly after deployment.
c. Through this criterion, the methodological needs of the UCMS development and design
were also identified.
Disadvantages:
a. Dependencies unforeseen by the schedule feasibility analysis can lead to delays and
bottlenecks.
b. Due to the scheduling analysis prioritizing fast development, the execution of tasks in
short periods may shorten development quality, as rushed processes could generate
programming errors and system faults.
6. Security Concerns
Although security concerns are not necessarily a direct feasibility criteria, the inclusion of this
variable in the feasibility study allowed for the recognition of pressing security threats that the
university might face through the UCMS, as well as efficient mitigation strategies and the
likelihood.
Advantages:
a. The security concerns section successfully evaluated the different threats to data and IT
security.
b. Exploring this variable led to the development of mitigation strategies of potential data
and IT security threats.
c. The exploration of security concerts also enabled the categorization of each threat
according to its likelihood.
Disadvantages:
b. The security protocols highlighted as mitigation strategies may create complications for
users while accessing the system.
In a nutshell, the feasibility criteria in the system investigation that took place in the feasibility
study are both boosted by advantages and weighed down by certain advantages. Ultimately, the
scales tip in the favor of the inclusion of these criteria, as well as the assessments enabled by
them, since the positives outweigh the negative. These feasibility criteria uncovered valuable
findings that led to a concrete conclusion on the viability of the UCMS.
Strengths
3. Maintenance Ease:
The development process includes complete document compilation which promotes
maintenance ease and knowledge preservation, enhancing the lifecycle of the UCMS.
4. Suited to Stable Environments:
This approach delivers its best performance under stable requirement circumstances, which is
ideal for an academic institution.
Weaknesses
1. Inflexibility:
The project becomes less adaptable after its initiation because the design process is resistant to
modifications in requirements, potentially making the UCMS static and unable to reflect evolving
academic trends and standards, which is an important requirement in the evolving field of higher
education.
Agile Methodology:
Strengths
1. Flexibility:
Changing requirements during a project receive easier implementation because Agile
methodologies permit modifications regardless of the current stage of the project. This will help
the UCMS stay aligned with changing requirements that emerge in the evolving field of
education. For example, improving grading mechanisms through developing AI-detection
features and other new technologies that students begin using.
3. Increased Testability:
Throughout the development process, Agile methodologies enable the delivery of operational
features in short portions to allow testers and users to adopt, as well as examine the work,
which will release a testable and iterative UCMS.
4. Collaborative Approach:
Agile methodologies encourage close collaboration between developers, stakeholders, and end-
users which leads to constant project refinement, potentially boosting the quality of the UCMS.
Weaknesses:
3. Insufficient Documentation:
Since working software takes precedence over documentation in Agile methodologies, the
issue of insufficient documentation can potentially arise. This can create problems in the
maintenance of the UCMS.
4. Scope Creep:
The scope of projects tends to expand beyond limits when multiple modifications occur, which
may cause the final iteration of the UCMS to be distant from the original conceptualization.
Taking these strengths and weaknesses into consideration, Agile Modeling (AM) should be the
selected methodology as the UCMS project requires ongoing stakeholder feedback and
potential post-development modifications due to the nature of the education field. This will also
suit its short development timeline of 1 month and 2 weeks which necessitates parallel tasks.
System development through Agile will allow fast development cycles and continuous
optimization so the system stays in line with evolving user requirements. However,
documentation and scope review must be prioritized to overcome the limitations of Agile
methodologies.
Strengths:
Weaknesses:
3. Scheduling Concerns:
A 1 month period, combined with 2 weeks, to complete the project appears highly challenging.
This may lead to the rushed and unrefined development of the UCMS>
Overall Assessment:
The feasibility report successfully addresses key criteria related to market opportunity
recognition, technical feasibility and organizational backing and security requirements. However,
it needs strengthened assessment of risks and competitors while also presenting a detailed
methodology review to suit the parallel, time-bound needs of the project .
System Review Using Agile Modelling (AM) Methodology
The development and deployment of the University Course Management System (UCMS) at
Bright Horizons should utilize Agile Modeling (AM) as the most appropriate methodology. The
model known as Agile Modeling enables organizations to complete development cycles through
iterative sprints which receive constant stakeholder input and provides adaptable solutions, thus
matching the needs of the university for a flexible and effective system.
The following features of Agile Modelling (AM) make it ideal for this business problem:
The aforementioned points demonstrate that through the application of Agile Modeling, the
development process for UCMS will proceed efficiently with flexibility innovations to suit the
university requirements.
a. The Agile method enables regular modifications to the system through feedback
received from students, professors and administrators.
b. Changes within student education management processes like course structures and
grading systems can occur without interrupting the whole system.
2. Faster Time-to-Market
a. Agile methodology delivers initial access to the most vital application modules such as
student enrollment procedures and grade tracking systems through incremental version
releases.
b. The multistage deployment strategy accelerates the system delivery process as it boosts
the implementation time.
a. Organizational shifts toward regular review sessions help maintain user participation so
end-users can prevent business and technical requirements from becoming mismatched
with the design.
b. The system operations undergo continuous validation procedures from lecturers, along
with students and administrators, who confirm the system delivers what they need.
b. Perpetual security risk assessments combined with system updates will prevent the
exposure of sensitive stakeholder data to unauthorized users.
a. The modular approach to development will enable the organization to scale their
systems, which makes them ready to accept new AI-driven features and reporting
analytics in the future.
b. The institution can extend the system to different universities without substantial
modifications to its design.
Risk Reduction & High Iterative testing identifies issues early, preventing
Quality Assurance large-scale failures.
Thus, Agile Modelling (AM) emerges as a suitable methodology for the UCMS. It provides
feedback-informed development, parallel iterative phases which speed delivery time,long-term
viability and the high flexibility which is ideal for evolving educational trends.
a. Users can easily understand and complete the registration procedures as usability
issues are identified and eliminated through user feedback.
b. Academic staff members can submit and handle their educational content in an efficient
manner without facing complicated processes.
c. Real-life user feedback supports the maintenance of system interface usability and
accessibility, as well as interface response speed.
Example
Agile Modelling (AM) has shown high potential in educational contexts (Salza et al., 2019), from
being used in classroom settings to the development of educational software.
2. Incremental and Iterative Development will Ensure Early Release of Basic System
Functionalities
Core student registration, along with grade management functionalities, must primarily as they
form the foundational features of the UCMS, while supplementary features will be implemented
at a later time according to the UCMS requirements.
a. The university can enable course enrollment and grade monitoring functions right away
even though certain non-essential features (analytics) remain under development.
b. Professors gain access to upload courses and administer assignments through UCMS
during its initial deployment stages.
c. The identification of bugs and usability issues occurs before UCMS gets released across
the entire system.
Example
Longitudinal research has shown that Agile Modelling (AM) tends to improve the efficiency of
software delivery in various applications, reducing the delivery time (Heikkilä et al., 2015).
a. For example, new grading scales and other changes can be integrated without
postponing the execution of any system elements because of the adaptive nature of the
methodology.
b. The UCMS enables new modules and hybrid learning options to be added without
affecting operational functionalities.
Example
Research on the application of Agile methods to software projects has demonstrated high
flexibility in features, as well as significant user satisfaction (Aldave et al., 2019).
4. Effective Risk Management will Ensure Secure Handling of Student Data
The database of the UCMS needs to maintain sensitive academic records which include grades.
as well as enrollment information. Hence, the system security protocols must be built strongly to
stop breaches of confidential data and to prevent unauthorized users from accessing
information.
a. The testing of role-based access controls (students, professors, admins) during each
development phase helps stop unauthorized data release.
b. System developers will double-check the encryption and authentication protocols during
the pre-deployment stage to ensure compliance with UAE education standards and any
global data protection regulations.
c. Systematic threat identification of cyber intrusions will allow Bright Horizons to mitigate
significant security threats.
Example
Research has shown that Agile development achieves standard software security through user
feedback, stakeholder involvement and iterative testing (Bartsch, 2011).
b. The system development starts with constructing essential features that enable user
registration and grading functions to provide early functional benefits.
c. To prevent both development time wastage and additional costs, the system avoids
unnecessary functionalities in the early versions.
d. Essential system repairs and enhancements are maintained by development teams who
can efficiently improve operational function at no extra development costs.
Example
An investigation into Agile effectiveness shows that Agile methodologies, such as Agile
Modelling (AM) lead to the fast and continuous delivery of high quality software (Moniruzzaman
& Hossain, 2013).
Given these justifications, I selected Agile Modeling (AM) for developing the UCMS because it
supports its ideal development scenarios. Due to its capability to provide early functional parts
and adapt to academic regulations, along with enhancing security measures and cost reduction
features, Bright Horizons should use this methodology for their business needs.
Requirements
The system design will attempt to adhere to the following user and system requirements.
User Requirements:
1. Students need an easily navigable platform, one that will offer straightforward use in
both course enrollment and grade monitoring features.
2. Teachers and professors need tools to administer courses, as well as monitor and grade
the performance of their students.
b. Each student should be able explore listed courses with their corresponding descriptions
and details.
c. Under given deadlines, students must be able to register for courses or drop them.
d. The system must allow administrators to confirm or deny the requests of student
enrollment.
2. Course Management
a. Professors must have the control to upload new courses, along with updating or erasing
existing ones.
b. Through the system, professors must have access to upload all teaching resources,
starting from lectures, through readings to assignments.
c. Each enrolled student must have the option to download all course content directly from
their enrolled classes.
d. Teachers must have the ability to add both assignment due dates, along with
submission requirements for students.
3. Grade Management
a. The professors must have full authority to set grades, update them and make final grade
announcements.
b. Students should access grading results to see all their grades along with any other
academic performance data, such as teacher feedback.
c. Professors maintain the ability to deliver feedback together with grades to students.
a. The system needs to provide faculty members with tools for generating performance
reports about their students.
b. Students and faculty members need to be able to monitor both basic completion
statistics and overall grade performance.
b. System users must have access to secure login procedures, as well as password
recovery methods.
1. Security
b. The system should use encryption to protect important information such as grades,
alongside other student records.
d. The system must adhere to mitigation techniques for the security risks identified in the
feasibility study, along with an incident response plan.
b. The system needs flexible capacity to handle a higher number of enrolled students
throughout time periods.
a. The system should present users with an easy-to-use interface which enables
straightforward navigation.
b. The system must have intuitive adaptability for users accessing it through smartphones,
tablets and laptop screens.
c. The system must adhere to Web Content Accessibility Guidelines (WCAG) for ensuring
universal access.
b. Student records must be secured by backup systems that enable instant recovery if
information is lost.
These requirements lay the foundation for the UCMS design plan, as well its eventual
evaluation.
Design Specification
1. Introduction
1.1 Scope
This design specification document outlines the architecture, features and technical
requirements for Bright Horizons' University Course Management System (UCMS). It aims to
serve as a guide for developers to guarantee adherence to the user requirements and system
objectives outlined in the requirements document above.
1.2 Purpose
The purpose of this document is to define the system design, its behavior, interface and
security. The document will provide visualizations and explicit directions to enable smoother
development, making sure that the UCMS will meet performance, usability and scalability
requirements.
Acronym Meaning
AM Agile Modelling
2. System Overview
The Level 0 Data Flow (contex) diagram (Figure 1) provides a high-level overview of the
system and its components, illustrating the flow of the core processes that must be kept in sight
during the development stages.
Level 0 (Context) Data Flow Diagram
FIGURE 1
An exemplary flow within the system is depicted at the student level below, displaying the case
of a student registering for a course. This must be prioritized during the initial sprints and
iterations.
Following this, a Level 1 Data Flow Diagram (see Figure 2) can be referred to.
FIGURE 2
Going into more detail, the Level 2 Data Flow Diagram (see Figure 3) depicts the process
through which a faculty member may update their profile details on the UCMS. Being an
additional feature, this must only manifest in future iterations after all key functionalities are
successful. Essentially, it is not a primary focus.
Revisiting the essential requirements, the flowchart below (Figure 4) depicts the lecturer flow of
uploading a lesson on the UCMS and administering a quiz. This is one of the key functionalities
of the UCMS.
FIGURE 4
2. System Components
The primary components of the system and their relationships are depicted in terms of their
relational contexts in the Entity Relationship Diagram (ERD) below (Figure 5). The earlier
iterations of the UCMS can focus primarily on students and faculty i.e lecturers, then
subsequently expand to include administrator roles and processes in future iterations.
FIGURE 5
Closing in from the macro level, the following use case diagrams depict potential actions by the
primary actors of the UCMS i.e faculty and students.
FIGURE 6
3. Interface
The following high-fidelity wireframe prototypes depict key pages of the UCMS, at the faculty
and student level.
The designed interface aims to offer students, along with faculty members and administrative
users, straightforward access to the UCMS platform through an easy-to-navigate and interactive
interface.
These technologies serve this need as they will allow cross-platform operations and create
user-friendly interfaces which lead to improved accessibility.
Thus, it gains benefits from Python due to its versatility, readability and the comprehensive
libraries at its disposal.
The UCMS will also function as a data repository for academic records that contain student
profiles, along with course enrollment data, grades and staff data.
These databases can be hosted on MySQL, which acts as a tool for managing academic data
through structured storage, optimized querying and dependable operations when processing
high volumes of academic data.
The cloud infrastructure of Heroku will provide the UCMS with hosting services, serving both the
availability and scalability needs.
This deployment system becomes more efficient due to the cloud infrastructure of Heroku, while
its automatic infrastructure ensures minimal maintenance operations.
These technologies will protect sensitive student and faculty data from unauthorized access and
cyber threats. Compliance with security standards and protection of academic records will be
achieved through this combination of encryption and authentication protocols.
This technology selection allows the UCMS to provide high performance and security, along
with ease of use as well as technical feasibility for the university's IT staff to create and support
the system.
Testing will be a vital part of development as the completion of each sprint will lead to a round of
testing. A tentative testing plan is outlined below:
Sprint Testing Focus Test Cases
In the case of IT security or system malfunction incidents, the incident response plan (IRP)
outlined below can be followed for quick resolution:
2. Investigate breach
source.
4. Implement additional
security measures.
3. Implement preventive
measures.
The development of various iterations of the UCMS must align with the Release Plan below.
Assessing the Effectiveness of the System Design
The success of the UCMS design is assessed in terms of its alignment with the user and
system requirements, as well as adherence to the Agile Modelling (AM) process adopted.
1. Student Registration and Enrollment: The system enables students to complete the
essential processes of registering, viewing course grades and timetables through an easy-to-
use interface.
2. Course Management: The system equips instructors with the ability to upload their lectures,
quizzes, assignments, as well as course resources thus enabling effortless content
organization.
3. Grade Management: The system enables professors to add academic input in the form of
grade entry and management so students can conveniently check their academic outcomes.
4. Reporting and Analytics: The system delivers analytical data through reporting features
(the notification icon) which enables lecturers to look out for submissions and notifies the
students when their academic outcomes are available.
1. The sprint-based method used modular development to handle key features before
planning for additional growth.
3. Security Vulnerabilities were reduced early in the plan through the inclusion of features
that brought two-factor authentication (2FA) and encryption capabilities.
4. Within the design plan, enhanced accessibility was the focus of UI/UX design in later
sprints to achieve better user experience across the system.
2. Future usage of MySQL to handle large academic datasets will need optimization
strategies, along with index creation, to achieve ideal performance.
3. A drawback exists in cloud hosting as Heroku simplifies development but external cloud
usage leads to potential long-term expense costs.
The design plan specifically reflects these strengths and limitations, along with unique ones.
Student Registration Secure login, course exploration, Admin approval for enrollment
& Enrollment enrollment/drop options. not mentioned.
Availability & Cloud hosting ensures uptime and Backup frequency and disaster
Reliability data security. recovery unclear.
Overall Assessment
Under this UCMS system analysis and design approach, all fundamental requirements,
including functionality, user experience, security and scalability are posed to be balanced.
Through Agile Modelling, I achieved a framework that combines structural development with
flexibility to enable iterative testing before completing development stages, leading to cyclical
improvement processes. Future updates will address existing performance optimization issues
and complex role management problems which affect the database system.
The UCMS is planned to be an efficient and rigorous university course management system by
following user requirements, alongside system needs, through the implementation of Agile
Modelling (AM).
References
Tsymbal, L., & Kalenyuk, I., 2023. DIGITAL TRANSFORMATION OF THE GLOBAL
EDUCATION MARKET. Baltic Journal of Economic Studies. https://doi.org/10.30525/2256-
0742/2023-9-5-266-274.
Ashour, S., 2020. How technology has shaped university students’ perceptions and
expectations around higher education: an exploratory study of the United Arab Emirates.
Studies in Higher Education, 45, pp. 2513 - 2525.
https://doi.org/10.1080/03075079.2019.1617683.
Salza, Pasquale, et al. “Agile Methodologies in Education: A Review.” Agile and Lean Concepts
for Teaching and Learning, 25 Oct. 2018, pp. 25–45, https://doi.org/10.1007/978-981-13-2751-
3_2.
Heikkilä, V., Paasivaara, M., Rautiainen, K., Lassenius, C., Toivola, T., & Järvinen, J., 2015.
Operational release planning in large-scale Scrum with multiple stakeholders - A longitudinal
case study at F-Secure Corporation. Inf. Softw. Technol., 57, pp. 116-140.
https://doi.org/10.1016/J.INFSOF.2014.09.005.
Aldave, A., Vara, J., Granada, D., & Marcos, E., 2019. Leveraging creativity in requirements
elicitation within agile software development: a systematic literature review. J. Syst. Softw., 157.
https://doi.org/10.1016/j.jss.2019.110396.
Bartsch, S., 2011. Practitioners' Perspectives on Security in Agile Development. 2011 Sixth
International Conference on Availability, Reliability and Security, pp. 479-484.
https://doi.org/10.1109/ARES.2011.82.
Moniruzzaman, A., & Hossain, S., 2013. Comparative Study on Agile software development
methodologies. ArXiv, abs/1307.3356.
Student Declaration