Goal-Oriented Modeling

 “Goal-Oriented Modeling” Please respond to the following:

Suppose someone made the claim, “There is no difference between modeling the system-as-is and the system-to-be”. Provide three reasons to support or refute this claim.
From the e-Activity, provide your opinion as to whether the extension from the article makes it easier or harder to build models compared to using plain UML. Provide a rationale.
 The purpose of use-case models is to provide a description of the problem domain.  The use case descriptions and diagrams provide a formal definition of the external behavior or functionality of the business processes.  These provide a logical view of the system.  In the design phase a physical view of the internals of the new system are modeled. 

Classmate:
 
Suppose someone made the claim, “There is no difference between modeling the system-as-is and the system-to-be”. Provide three reasons to support or refute this claim.
There is a difference between modeling a system-as-is and modeling a system-to-be.  First, the system-as-is is a system that is no longer useful because it is not meeting all the needs of end-users.  For example, the system-as-is may be meeting needs for which it was intended but, due to change in business directions, end-users have new needs that need to be satisfied.  Second, it allows the requirements engineer (RE) to define a preliminary model of the stable business goals that must be incorporated into every system (Lamsweerde, 2009).  Third, modeling the system-to-be, by expanding on the preliminary model, enables the RE to build a new system that can better meet user needs and enable the organization to achieve new business objectives.
From the e-Activity, provide your opinion as to whether the extension from the article makes it easier or harder to build models compared to using plain UML. Provide a rationale.
The profile extension in the article does make model building easier.  It uses symbols that are more distinctive but also have similarities to UML diagrams.  For example, one of the three main concepts are actors (Abid, Amyot, Som´e, & Mussbacher, n.d.).  They are considered to be similar to actors within use case diagrams that interact with the system in some way.  The profile extension also defines categories of links for different types of relationships. For example, decomposition links are used to break down elements into sub-elements for better understanding and contribution links indicate qualitative or quantitative impacts between one element andanother.  In addition, the extension profiles dependency links to describe the dependencies that one actor has on another (Abid, Amyot, Som´e, & Mussbacher, n.d.). 

critically analyze the specific methods for measuring financial costs/investments and social impact.

 It is essential that you critically analyze the specific methods for measuring financial costs/investments and social impact.  (Do you feel these measures are adequate?  What other methods might you suggest for measuring impact?) This paper should draw from a minimum of 5 respected resources, which may be journal articles, books, newspaper articles, websites, etc. Papers are to be written in APA style for referencing.  You may include Appendices and Figures in addition to the 6 – 8 pages.  The Report is worth 10 points. 

What position do you want to take in regard to your Patriot Act?

Write a 6 pages paper about the topic Patriot Act and Cybersecurity.  APA Guidelines for citing and referencing sources should be followed. Include at least 6 references. 
1. Thesis: What position do you want to take in regard to your Patriot Act? You will need to decide if you agree or disagree with the current way the law is written. You can choose to like certain aspects of the law and not others.  
2. Background: What is the existing point you want to challenge or support, and how did the law get to be that way (This is where you would need to find cases, background information, etc.)?  
3. Inadequacies: What are the deficiencies in the present way of doing things, or what are the weaknesses in the argument you are attacking?  
4. Adequacies:  Discuss the positive aspects of the law?  
5. Proposed Changes: How will we have a better situation, mode of understanding or clarity with what you are advocating? In short, how can the law be improved (or not diminished)? (This is where you have the chance to change the law with your own ideas of how it should be written).  
6). Conclusion: Why should and how can your proposal be adopted? 

Human Resources Department of a medium-sized organization that is implementing a new interorganizational system.

You are a member of the Human Resources Department of a medium-sized organization that is implementing a new interorganizational system that will impact employees, customers, and suppliers. Your manager has requested that you work with the system development team to create a communications plan for the project. He would like to meet with you in two hours to review your thoughts on the key objectives of the communications plan. What should those objectives be?
You are the newest member on the IT development team contracted to implement an enterprise resource planning system for a small retail chain. You are surprised after the project’s initial kick-off meeting that no one was there to represent the client. Following the meeting, you encounter the project manager in the hallway. What do you say?

REMINDER

The legal implications of Blockchain.

 
Read the following article below and provide a two paragraph review on the legal implications of Blockchain.  Be sure to comment on other students.
Ross, E. S. (2017). Nobody Puts Blockchain in a Corner: The Disruptive Role of Blockchain Technology in the Financial Services Industry and Current Regulatory Issues. Catholic University Journal of Law and Technology, 25(2), 7.
Nobody Puts Blockchain in a Corner.pdf 

How does the new Russian Federation differ from the former Soviet Republic?

For the Midterm Exam, the requirement is to write an essay that addresses the following items:

• Conduct research to determine three types of computer crime. Please provide a detailed description for all crimes, and share an example of where an organization was impacted by each of the types.
• Elaborate on how the impact of computer crime is quantified. Please share at least two examples.
• Include at least four (4) reputable sources.
• Your final paper should be 1,000-to-1,250-words, and written in APA Style. 

Discussion separate topic:

 How would you build a CSIRT? What are the components to building an effective team?  

DQ requirement: Note that the requirement is to post your initial response no later than Thursday and you must post one additional post during the week. I recommend your initial posting to be between 200-to-300 words. All initial posts must contain a properly formatted in-text citation and scholarly reference. 

Conduct research to determine three types of computer crime.

 

For the Midterm Exam, the requirement is to write an essay that addresses the following items:

• Conduct research to determine three types of computer crime. Please provide a detailed description for all crimes, and share an example of where an organization was impacted by each of the types.
• Elaborate on how the impact of computer crime is quantified. Please share at least two examples.
• Include at least four (4) reputable sources.
• Your final paper should be 1,000-to-1,250-words, and written in APA Style.

By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates. Institution Release Statement

Functionality Consequences Assignment Your Mobile Ordering Project team was ask

Functionality Consequences Assignment

Your Mobile Ordering Project team was asked to evaluate two “out-of-scope” functionalities for the Mobile Ordering App. You are tasked with documenting the evaluation results of one.

Select one of the two functionalities.

Summarize the following:

1. The additional business processes that would be affected by the functionality
2. Additional data that would need to be collected to enable the functionality
3. Additional information new data would provide the organization and potential opportunities it could create  for the organization
4.Disadvantages or additional responsibilities the addition of functionality or collection and storage of additional data could create for the organization

Document your summary using a 1-page Microsoft® Word document

1 2 3 22