Ethical Analysis Report

Ethical Analysis Report

Value: 25%
Length: 2000 to 2500 words (Excluding references)
Group Assessment: No
Submission method options: Alternative submission method


Choose one ethical issue arising from the use of ICT that has been reported in the press in the last one year, and discuss it in depth. Show why or how the technology creates or contributes to the problem. Produce an article, discussing both sides of the issue (pros and cons) drawing on both technical and philosophical literature. In addition, argue for your own view of the matter, giving your reasons for your point of view and showing why you believe that they are better than opposing views.

You will be assessed on your ability to reason, analyse and present cogent argument for the particular case. You should outline the main statement you wish to make about your chosen ethical issue along with your reasons and others’ objections to it. You may use any appropriate technique to set out the basic structure of your article.

You are required to submit the following:

A comprehensive and coherent article containing your critical analysis of the ICT related ethical

Your article should present the following :

– Introduction

– The main point(s) of the issue.

– The pros and cons for the main point(s) (your reasons and objections as well as those of others) including a critique of the effectiveness of the arguments presented. Ethical theories and concepts must be appropriately applied to your analysis.

– Conclusions logically drawn from the analysis presented.
Use appropriate headings and subheadings to organize the content of your article.

Note: You may find the ‘Doing Ethics’ technique, described in the following article helpful to form the basis of your analysis. However, as mentioned before, you can use any other appropriate technique if you like.
Simpson, R. et. al. (2003). Doing ethics: A universal technique in an accessibility context. AJIS, 10(2), 127-133.
This article is available from
It is recommended that your name, student ID and page number are included in the header or footer of every page of the assignment.

Further details about submission in Turnitin are provided in On-line submission.

back to top
This assessment task will assess the following learning outcome/s:

be able to discuss various philosophical theories of ethics and how these relate to the ethical and legal issues raised by current practices involving ICT.
be able to apply ethical theories and concepts to analyse ICT related ethical dilemmas.
All sources of information must be appropriately referenced using the APA style ( )

IT Security

Value: 25%
Length: 2000 to 2500 words (Excluding references)
Group Assessment: No
Submission method options: Alternative submission method


Research the security concerns associated with BYOD, in the context of cybersecurity and write a report documenting your findings. Your report should include the following:

– Introduction

– Background

– Security concerns associated with BYOD

– Strategies for addressing the concerns

– Conclusions and future trends

This assessment task will assess the following learning outcome/s:

be able to explain fundamental information security concepts.
be able to discuss and debate some of the security implications of computer networks, including cryptography.
be able to communicate factors that relate to host and data security including vulnerabilities and patches and data protection mechanisms.
be able to evaluate some of the key application security concepts and practices.
be able to explain and debate issues and concepts related to management of ICT security including security planning and policy development.
All sources of information must be appropriately referenced using the APA style ( )

Virtualization Technology


SoftArc Engineering is a civil engineering firm company which works across Australia as well as in Indonesia, Timor Leste and Papua New Guinea. SoftArc Engineering currently has a small self-managed data centre that has the following servers:

2 x Active Directory domain controllers on Windows Server 2012 R2, (2 x Xeon 3.6GHZ, 8GB RAM, 140GB HDD). These servers are used for authentication and authorisation;
3 x SQL Server 11.0 (2012) database servers on Windows Server 2012 (2 x Xeon 2.8GHZ, 4GB RAM, 500GB RAID-5 array). These servers are used for database operations for Active Directory, Exchange, SharePoint and their Client Design application;
1 x Exchange 2013 email server on Windows Server 2012 R2 (2 x Xeon 3.6GHZ, 8GB RAM, 250GB RAID-1 array);
4 x Windows Server 2016 File and Print servers (2 x Xeon 2.8GHZ, 4GB RAM, 250GB RAID-1 array);
1 x SharePoint 2013 server on Windows Server 2012 R2 (2 x Xeon 3.6GHZ, 16GB RAM, 250GB RAID-1 array);
1 x Client Design and CRM application server on Windows Server 2016 (2 x Xeon 3.6GHZ, 8GB RAM, 250GB RAID-1 array);
2 x Red Hat Enterprise Linux v7.1 (2015) servers running Apache TomCat v. 7.0 (2 x Xeon 2.8GHZ, 16GB RAM, 140GB HDD).
1 x Cisco 5505 ASA Firewall v9.3 (2014)
The board have been advised to retire most of their old physical servers and start moving their operations onto a virtual platform hosted in-house (on premise). You have been employed to advise the board on various aspects of virtualisation.

Your Report

You are to consider how to implement a virtual infrastructure for the company and prepare a report for the board of SoftArc. Your report should include:

1) one-page executive summary,
2) Your proposed virtual infrastructure for the data centre. This is to include:
1.Which virtual technology (VMware, Hyper-V, Citrix Xen, etc) you recommend being deployed, along with your detailed and referenced reasons for that recommendation,

2) A discussion of the technical infrastructure proposed including:
a) Number and type of hosts required including CPU, RAM and internal storage requirements
b). Host clustering requirements and number of VMs expected to be hosted on the cluster,
c) Storage requirements (external to servers), including how this storage will be presented to VMs,
d). Additional network requirements to support this infrastructure.

3)A discussion of how you would deliver virtual desktops to all users using the new infrastructure.

4)Your designs for:
1)Data and configuration backup,
2)Disaster recovery.

5)Any Information Security changes required and the steps required to implement/monitor these changes.

back to top
This assessment task will assess the following learning outcome/s:

be able to communicate the importance of different virtualisation technologies for X86 and Unix based platforms.
be able to evaluate which virtualisation technology should be used in a given set of requirements.
be able to communicate the essentials of network and storage virtualisation.
be able to discuss and evaluate the requirements for effective Virtual Machine (VM) management.
be able to identify and evaluate the requirements to create a virtual infrastructure.
be able to analyse the requirements for management of a virtual infrastructure.

back to top
The report should be submitted as a single MS Word document with all images embedded in the document.

Submissions in in *.zip, *.rar or any other format will not be marked.

The report presentation structure is:

Cover page

Title of Report
Student Name and Student ID
Student Email address

Executive Summary
This section provides a brief overview of the scenario, reasoning/findings and concluding remarks on your findings. It must be no more than 1 page in length

Main Report
This section should contain main body of the report. It should discuss all tasks / challenges asked in the case study. You should have a sub-sections that answers each task. Support your answers with solid literature (in-text citations), diagrams and figures (if applicable).

Reference List
You must cite your references using the APA 6th or 7th edition referencing style for all material you have used as sources for the content of your work.

Glossary (optional)
A glossary should assist the reader in understanding any technical terms used in the report. Use a generally accepted source for the definition of the terms and include appropriate referencing.

Building a Data-Driven Python Application

Final Project – Building a Data-Driven Python Application
Your Challenge
Your challenge in this assignment is to develop an interactive data-driven web-based Python application that shows your mastery of many coding concepts as you interact with data real world data. You will use Pandas and NumPy modules for managing and interacting with data, MatPlotLib or Pandas charts for plotting, and the package for creating interactive web applications using Python.
Interact with Real-World Data
Choose one of these data sets:
National Parks in New York Description
Download CSV (from

Colleges and Universities in the United States Description
Download CSV (from

New York City Vehicle Collisions, 2015-present Description
Download CSV (sample data)

Volcanic Eruptions Description
Download CSV (cleaned data)

Used cars for sale on Craigslist Description
Download CSV (sampled data)

Skyscrapers around the World Description
Download CSV (adapted from Wikipedia)
To ensure students create a variety of projects, you will sign up to use the data set you wish during class. If you miss class, or if the signups are not approximately equally distributed, I will assign a data set for you to use.
Demonstrate Your Python Coding Skills
Your Python code should demonstrate your Python coding skills as you implement several concepts that we studied throughout the course that appropriate for your project, such as:
• Coding Fundamentals: data types, if statements, loops, formatting, etc.
• Data Structures: Interact with lists, tuples, dictionaries (keys, values, items)
• Functions: passing positional and optional arguments, returning values
• Files: Reading data from a CSV file into a DataFrame
• statistics or pandas module functions for calculating mean, median, etc.
• MatPlotLib or pandas for creating different types of charts
• for making interactive applications, displaying charts and maps using UI widgets for input
• numpy functions for interacting with arrays (such as np.arange)only if we cover in class
• pandas DataFrames for interacting and manipulating large data sets using filtering, sorting, pivot tables, etc.

Assignment Details
Part 1. Design
The purpose of this part is to get you thinking about what you might do before you start coding. Identify at least two different queries or questions you can ask about your data set and ways to interact with and present the data based on your understanding of pandas DataFrames, matPlotLib, and the packages. Use a combination of charts, graphs maps, word clouds, or other presentation tools.
Describe how your queries will be interactive by incorporating streamlit’s user interface elements to obtain user input. Describe how you will visually present this data using charts, graphs, Streamlit tables or maps. For example, if analyzing housing data, you might use a dropdown list to specify a list of neighborhoods and a slider to specify a price range. You then might display all rooms for rent in that neighborhood within that price range using a table, chart, or map. (That’s an easy one. At least one of your queries needs to be more complex than this!)
Try to make your page as “user friendly” and as “polished” as possible. Include labels on all controls requiring user interaction, make sure your charts have titles, legends or explanations that would be helpful to the user. Don’t use default display values, but customize your charts so they look nice!
Create a Word document describing your plans. Submit it on Blackboard. I will respond within 24 hours on Blackboard approving your proposed questions or making suggestions if they appear to be too complicated or too easy.
You may change your queries or visualizations after you start coding if you need to change your plans. If you do this, please notify me during the coding week.
Feel free to add to your project as you explore pandas and streamlit capabilities and find cool ways to implement new or additional features. Part of your grade will be a “complexity/originality” score. If you use a module or do something cool that we may not have discussed in class or implement more than the minimum requirements, you will receive a higher score. A zero-complexity score means you implemented the minimum requirements for this project.
Part 2. Code.
Create your Python application with a Streamlit UI and the various visualizations. Create at least two different charts, graphs of different types with custom legends, axis labels, tick marks, colors, other features), or a map showing latitude and longitude. Be sure to include appropriate context or labels in your user interface to cue the reader about which values to specify, and the purpose of each chart or graph. You may wish to add a few sentences explaining each chart. Place all UI controls in the left sidebar, and your visualizations in the main content area. Make your application as professional looking as you can.
Post your code to Blackboard before the start of our last class.
Coding Checklist
As you write your code, be sure to demonstrate your mastery of these capabilities in your project:
• At least one function that has two parameters and returns a value
• At least one function that does not return a value
• Interacting with dictionaries, lists, and tuples
• Using a Python module to calculate a statistical function such as average, median, mode, etc.
• User Interface and dashboard with
Your code should demonstrate your mastery of at least three Pandas capabilities as appropriate for your queries and data. These include:
• Sorting data in ascending or descending order, multi-column sorting
• Filtering data by one or more conditions
• Analyzing data with pivot tables
• Managing rows or columns
• Add/drop/select/create new/group columns, frequency count, other features as you wish
Usual rules about writing “good” code apply:
• Make your code as modular and easy to follow as possible.
• Include a docstring, comments, and meaningful variable names.
• If you did something “cool” in your code that you are incredibly proud of, please write a comment call attention to what you did.
• If you referred to any online articles or other information beyond class examples, please be sure to list them as references in your code.
• Make sure the program runs and the output is correct.
Part 3. Present.
Plan to present your project in class during the last week, showing both a demonstration of your project running in the browser and then describing at least one section of the code that you wrote of which you are most proud! Show what you feel is the most interesting part of your project. Then display the code and explain the pandas and Streamlit code well enough to convince me that you understand how your code works and what you did.
Part 4. Publish (Extra Credit)
Publish your application to the web by following these Streamlit Sharing instructions. This is a newly released feature. It may take a few days before your request is filled, so sign up for the invite now! As an alternative, you can deploy it to a server on Heroku by following these instructions .
This project counts toward 15 percent of your final course grade for the course and is based on 50 points, as follows:
Requirement Points
Project—Proposal, Design and Queries submitted on time 4
Design—User Interface: at least three Streamlit UI controls (page has a professional appearance) 9
Coding—At least one function with at least two parameters that returns a value 2
Coding—At least one function with a default parameter called more than once in your application (one time with the default value, and one time without) 2
Coding—Interacting with a dictionary * 3
Coding—Interacting with lists or list comprehension* 3
Coding— Pandas Features: at least three (sort, filter, multiple conditions filter, pivot table, etc.) 12
Coding— At least two different charts with custom legends, labels, tick marks, titles, colors, other features. At most one can be a map. 10
Coding— Well documented, efficient, modular 2
Project— Complexity compared to other student projects
0 = Your project implements less than the minimum requirements
1 = Your project implements the minimum requirements
2 = Your project includes some complex queries, charts, or UI features
3 = You went above and beyond in requirements, ether doing more than what is required, or by including features, modules, or packages learned independently or not described in class 3
Total 50
Extra Credit: Publish Your Project on the Web 5
Getting Help:
• This is a final project, so please do not discuss your program with anyone other than your instructor.
• You can ask CIS Sandbox tutors for assistance on related or general topics, but you cannot ask them to help you write your code for this project. For example, you can ask tutors to help review examples of how to create bar charts in Python (in general), but you cannot ask them to help you debug a bar chart you might create using the data set for this project.
• You can ask CIS Sandbox tutors for help with fixing syntax or runtime errors.

Wireless Networks and Security

Programme: MComp Computer Networks and Cyber Security and Advanced Computer Science
Module Code: KF7031
Module Title: Wireless Networks and Security
Distributed on: eLP
Submission Time and Date: To be submitted by 23:59 GMT on May 03, 2021
Page Limit: 7 sides plus a facing page that includes the abstract but excluding the appendix and references. This should be printed on A4 paper and use a font size no smaller than 10
Weighting This coursework accounts for 50% of the total mark for this module
Submission of Assessment
Electronic Management of Assessment (EMA): Please note if your assignment is submitted electronically it will be submitted online via Turnitin by the given deadline. You will find a Turnitin link on the module’s eLP site.

It is your responsibility to ensure that your assignment arrives before the submission deadline stated above. See the University policy on late submission of work.

Title: 802.11 WLAN data throughput and security overheads

Instructions on Assessment:

Your work must be presented in the form of a short technical paper and be no longer than 7 sides plus a facing page that includes the abstract but excluding the appendix and references. This should be printed on A4 paper and use a font size no smaller than 10. A mark penalty of -10%/additional page will be applied for submissions longer than required. For completeness you must include a detailed table of results within an appendix (not included in page count). You may if you wish include further additional material in an appendix, but this will not contribute to the marks and you should not explicitly refer to any appendix to illustrate results etc. You could use an appendix to present a full derivation of formula.


You are to perform a study on data throughput in 802.11 WLAN systems. This will be carried out with wireless security protocols in place and removed. The study will be partially theoretical and partially practical requiring you to build a theoretical model describing data throughput and verify this model through practical experimentation.

802.11 standards are often characterised by channel bit rates, for example 802.11b is usually described as supporting a bit rate of 11Mbps. WLAN users will notice that actual data throughput, as perceived by the clients on a WLAN only approaches half of this value and is sometimes even less. Implementing secure communications on the wireless link will reduce apparent throughput further. Users will sometimes put this lower actual bit rate down to underperforming systems, but this is usually not the case. The lower through put rate is primarily due to the MAC and physical layer overheads in the 802.11 architecture and is therefore intentional. Security protocols place additional overhead on communications and further reduce apparent throughput rates. Communication between a wireless client and an access point is governed by a strict set of protocols that introduces fixed delays in the communication channel. Indeed, the delays do not change significantly despite faster underlying channel bit rates.
You are to examine one of 802.11b, 802.11g or 802.11n standards. You can choose which one you prefer to work with, however you must state clearly in your report which standard you are focussing on. Additionally, you must apply one method of secure wireless communications from WEP, WPA1/2 Personal to understand the overhead incurred in your theoretical modelling.

Theoretical model
You will need to do some background research to examine how other authors have developed throughput models. The following two papers are a good start:

• XIAO Yang, IEEE 802.11n: Enhancements for higher throughput in wireless LANs. IEEE Wireless Communications , Dec 2005, pg 82-91.

• XIA0 Yang, ROSDAHL Jon, Throughput and Delay Limits of IEEE 802.11. IEEE Communications Letters Vol 6 No 8 Aug 2002.

Here you need to develop a model to allow you to calculate actual data throughput against underlying data rate. You need to plot this data for a number of packet sizes. Additionally, you need to provide the data in tabular form as part of an excel spreadsheet within the Appendix.

Practical work (or Simulation)
You need to perform a number of experiments to measure actual throughput rates for a system using physical experiments or a network simulator of your choice (OMNET++, MATLAB, OPNET or any other suitable simulator). You are required to measure data throughput using an access point supporting the 802.11 mode (b, g or n) you chose to investigate. For practical experiments, throughput can be measured using JPERF and IPERF traffic generation software or the more sophisticated ZTI traffic generator. Wireless traffic (i.e. traffic through the air between the AP and WNIC) needs to be monitored using Omnipeek or AirPCap on a probe WNIC. For the simulation environment, select appropriate configurations and parameters to obtains the throughput results.

Throughput measurements should be taken for the maximum speed available for your chosen standard. You will need to analyse the data collected carefully and compare your observations with the theoretical predictions you have developed.

Additionally, you need to measure throughput with your chosen security mechanism implemented on the wireless link. You should end up with a set of results, one with security on and one with security off, so you can make clear comparisons of your observations.

(This requirement is removed from simulation work because OMNeT++ does not provide the security protocol function.)

Before carrying out any throughput measurements you should assess the channel busyness using a Channelizer Pro spectrum analyser. Chose the quietest channel available for your work. You need to comment in your results and discussion section the impact of interference and other Wi-Fi transmissions on the same channel.

Details of the Paper
Although the following link refers to a social sciences research paper, much of the guidance about structure and style is appropriate for your paper, so you might find it helpful to read this: (checked 04/12/20)

Mapping to Programme Goals and Objectives

The following Learning outcomes will be addressed in this assignment:
KU1 – Be able to describe, explain critically and analyse wireless data communication technology along with associated security issues.
KU2 – Be able to analyse and model wireless behaviour using appropriate mathematics
IP1 – Critically analyse enterprise requirements for wireless systems
IP2 – Critically analyse 802.11 protocol information
IP3 – Make critical decisions about designing secure wireless networks

Module Specific Assessment Criteria and Rubric

Section Max mark available Comment
Abstract – max 300 words 5 This is the section that will be read the most so it should be a good representation of the whole of your work.

Introduction 10 This introduces your paper and work that you are presenting. You can outline the structure of your paper here too. You do NOT need to provide a background to 802.11 here – focus on the work you have done and its context.
Theoretical throughput development 10 You are expected to provide theoretical underpinning of your throughput model(s), probably based on papers you have read. You should present some modelled data that can be later compared with measured data. The modelling will probably be in two parts, one exploring the impact of MAC layer overheads and the other the impact of security overheads.
Experimental method 10 You need to describe your experimental procedure in sufficient detail someone else could reproduce what you have done. Use diagrams where appropriate.
Results 10 Described your results and observations from your experimental process
Discussion 30 Discuss your observations here, paying particular attention to what you expect to see from your theoretical discussions and how this compares with your observations. Try to explain any differences. Use your observations to explain the differing contributions that each overhead has to the overall throughput rate. You should additionally comment on the robustness of the link security mechanism and compare it with WEP or WPA (depending which you chose) and WPA Enterprise. Please look at the learning outcomes (above) to help guide your discussion.
Conclusion 5 Conclude your experimental observations here
References 5 Appropriate: Quality, quantity, usage
Data recorded in appendix 5 You need to include your data set in the appendix. A tabular presentation is required here.
Presentation 10 Does your paper content flow logically? Is it written clearly? Is it formatted well? Appropriate usage of diagrams?

Mechanism for Handout to Students:

In class notification and via ELP

Date by which Work, Feedback and Marks will be returned to Students:

On or before 20 working days following the submission date (as per University policy)


You are advised to read the guidance for students regarding assessment policies. They are available online here.

Late submission of work

Where coursework is submitted without approval, after the published hand-in deadline, the following penalties will apply.

For coursework submitted up to 1 working day (24 hours) after the published hand-in deadline without approval, 10% of the total marks available for the assessment (i.e.100%) shall be deducted from the assessment mark.

Coursework submitted more than 1 working day (24 hours) after the published hand-in deadline without approval will be regarded as not having been completed. A mark of zero will be awarded for the assessment and the module will be failed, irrespective of the overall module mark.

These provisions apply to all assessments, including those assessed on a Pass/Fail basis.

Word limits and penalties

If the assignment is within +10% of the stated word/page limit no penalty will apply.

The word/page count is to be declared on the front page of your assignment and the assignment cover sheet. The word count does not include:

Students must retain an electronic copy of this assignment (including ALL appendices) and it must be made available within 24hours of them requesting it be submitted.

Academic Misconduct

The Assessment Regulations for Taught Awards (ARTA) contain the Regulations and procedures applying to cheating, plagiarism and other forms of academic misconduct. Refer to the Academic Misconduct Policy (Available through the link above for Assessment Regulations)

You are reminded that plagiarism, collusion and other forms of academic misconduct as referred to in the Academic Misconduct procedure of the assessment regulations are taken very seriously. Assignments in which evidence of plagiarism or other forms of academic misconduct is found may receive a mark of zero.

MITS6004:Enterprise Resource Planning

MITS6004:Enterprise Resource Planning
Enterprise Resource Planning
Assignment 2
Research Study
July 2020
MITS6004:Enterprise Resource Planning
Research Study
Assignment 2 – Research Report – 10% (Due Session 8) Individual Assignment
For this component you will be required to analyze a case study of an organization and write a report on it on a recent academic paper on a topic related to ERP implementation on any organization. Some possible topic areas include but are not limited to:
• Digital Transformation
• An analysis of success and failure factors for ERP Systems in Engineering and Construction Firms.
• System Integration Challenges
• Project Management methodologies
• Securing an ERP implementation
• Web based ERP Systems
• Promise and Performance of ERP
• Critical success factors for ERP Implementation in a company
• Role of management in designing enterprise systems integration
• Risk areas found in ERP Implementation
• IoT and ERP
• Supply chain planning and Execution
• Warehouse Management
• Data Intelligence for Enterprise AI
The paper you select must be directly relevant to one of the above topics or another topic and be related to ERP or Software Engineering. The paper must be approved by your lecturer and be related to what we are studying this semester in Enterprise Resource Planning. The paper can be from any academic conference or other relevant Journal or online sources such as Google Scholar, Academic department repositories, or a significant commercial company involved in research such as IBM etc. All students must select a different paper. Thus, the paper must be approved by your lecturer before proceeding. In case two students are wanting to present on the same paper, the first who emails the lecturer with their choice will be allocated that paper. Please note that popular magazine or web-site articles are not academic papers.
MITS6004:Enterprise Resource Planning
What to Submit.
For this component you will write a report or critique on the paper you chose from the topic above listed.
You should perform a literature survey on the topic to identify the benefits and challenges associated with ERP implementation. Based on your literature survey, you need to create and submit (1) an abstract (2 pages) in IEEE format .
Your report should be limited to approx. 2000 words (not including references). Use 1.5 spacing with a 12 point Times New Roman font. Though your paper will largely be based on the chosen article, you should use other sources to support your discussion or the chosen papers premises. Citation of sources is mandatory and must be in the IEEE style.
Your report or critique must include:
Title Page: The title of the assessment, the name of the paper you are reporting on and its authors, and your name and student ID.
Introduction: Identification of the paper you are critiquing/ reviewing, a statement of the purpose for your report and a brief outline of how you will discuss the selected article (one or two paragraphs).
Body of Report: Describe the intention and content of the article. If it is a research report, discuss the research method (survey, case study, observation, experiment, or other method) and findings. Comment on problems or issues highlighted by the authors. Report on results discussed and discuss the conclusions of the article and how they are relevant to the topics of this Unit of Study.
Conclusion: A summary of the points you have made in the body of the paper. The conclusion should not introduce any ‘new’ material that was not discussed in the body of the paper. (One or two paragraphs)
References: A list of sources used in your text. They should be listed alphabetically by (first) author’s family name. Follow the IEEE style.
The footer must include your name, student ID, and page number.
Note: reports submitted on papers which are not approved or not the approved paper registered for the student will not be graded and attract a zero (0) grade.
MITS6004:Enterprise Resource Planning
Submission Guidelines
All submissions are to be submitted through turn-it-in. Submit your report to the Moodle dropbox for Assignment 2. Drop-boxes linked to turn-it-in will be set up in the Unit of Study Moodle account. Assignments not submitted through these drop-boxes will not be considered.
Submissions must be made by the due date and time (which will be in the session detailed above) and determined by your Unit coordinator. Submissions made after the due date and time will be penalized at the rate of 10% per day (including weekend days).
The turn-it-in similarity score will be used in determining the level if any of plagiarism. Turn-it-in will check conference web-sites, Journal articles, the Web and your own class member submissions for plagiarism. You can see your turn-it-in similarity score when you submit your assignment to the appropriate drop-box. However, re-submission is only allowed prior to the submission due date and time.
After the due date and time have elapsed you cannot make re-submissions and you will have to live with the similarity score as there will be no chance for changing. Thus, plan early and submit early to take advantage of this feature. You can make multiple submissions, but please remember we only see the last submission, and the date and time you submitted will be taken from that submission. Your document should be a single word or pdf document containing your report.

ITECH2002 – Systems Modelling

ITECH2002 – Systems Modelling
Assignment 1 Specification – 2021
Page 1/9
Systems Requirement Specification
Due date: Monday, Week 7, 11:55pm.
Weighting: 20%, maximum mark: 20.
Minimum time expectation: 30 hours.
You will be working in groups of three students.
Your assignment will be assessed by your tutor or lecturer if your lecturer is also your tutor. You will receive your mark and written feedback via Moodle two weeks after the due date or submission, whichever is later.
You have been hired as a systems analyst to work with two other analysts. Your task is to document the functional requirements of Airbnb in UML.
In a typical learning environment, assignments are often based on hypothetical case studies, like those in the tutorials. Such case studies are limiting because you have little opportunity to investigate how authentic computer systems work, thus making it difficult to appreciate the complexity of an authentic system, the need of analysis and the usefulness of analysis tools. We hope that by investigating an authentic system you will appreciate the importance of analysis and the role of UML as a communication and analysis tool.
During the analysis stage, UML is used to specify systems requirements, which will be used to design a computer system. In this assignment, we will use UML to document a system that has already been computerised – like reverse engineering a system (from an existing computer system to specification). This has another advantage in that you can evaluate if your specification is close enough to the real system. However, be careful when reverse engineering so you do not also include the design decisions (such as login, click a button, hit Enter, etc) – please see your lecturer when you are unsure, we are more than happy to give you feedback.
Please note that the case study provided here is incomplete and you need to investigate Airbnb to complete the assignment, such as visiting their website or following Airbnb development in the news. If you cannot find the information you need, please talk to your lecturer or tutor.
You may also come up with functionality that does not yet exist but would add value to the business, but please discuss with your tutor first.
ITECH2002 – Systems Modelling
Assignment 1 Specification – 2021
Page 2/9
Section 3 describes the motivation behind the design of this assignment; Section 4 provides information on how and what to submit (note that Moodle has been set up, so there is only one submission from each group). The case study can be found in Section 5. Section 6 describes the tasks and mark allocation for individual and group work. Section 7 shows the marking rubric.
The purpose of the assignment is to ensure that you know:
1. How to document functional requirements using three tools widely used in the IT industry: brief use case description, use case diagram and domain model class diagram. The use case and domain model class diagrams are part of the Unified Modelling Language (UML).
2. How different stakeholders contribute to the definition of requirements.
3. How to write constructive reflection using Gibbs’ reflective cycle.
The assignment addresses the following learning outcomes:
K1. Explain how models are used to assist in analysing and modifying existing business systems;
K2. Define various roles involved in the processes of system analysis;
K3. Describe techniques used to gather required information for system analysis;
K4. Explain the various stages of the system development life cycle;
S1. Identify appropriate models for given scenarios;
S2. Develop various models using a professional CASE tool;
S4. Perform Object Oriented Analysis and Design to construct various object models used to communicate the scope and requirements of the project.
A1. Write integrated reports, using appropriate models, providing detailed analysis of given textual scenarios.
1. Create a document in OneDrive and share it with your team members.
2. This assignment has eight tasks (see Section 6), and there are two types of submissions:
a. Group submission. Submit tasks 1 to 4 and 6 to 8 as a single report.
Submit your document via Moodle Shell. Moodle has been set up so each group submits only one document. You need to submit the group report in .docx or .odt or .pdf.
ITECH2002 – Systems Modelling
Assignment 1 Specification – 2021
Page 3/9
Please nominate a team member to submit. You need to submit only one document for the whole group. If you submit only your own work, you will lose all the group marks.
b. Individual submission. Submit constructive reflection (task 5) individually.
3. Plagiarism. Your submission will be checked by Turnitin, a plagiarism detection system. Students suspected of plagiarism will face disciplinary actions. Copying or allowing your work to be copied (including uploading your assessment to StuDoc or something similar) constitute plagiarism.
4. Working in groups can be challenging but being able to work in groups is a highly valuable skill. Please see the tips on Moodle Shell – “Groupwork Online” on top of the shell for successful group work.
The case study for this assignment is based on Airbnb (, initially a stay share platform but it is offering more services now. We will focus on the accommodation service.
We will investigate three subsystems of the Airbnb accommodation service:
1. Booking subsystem
2. Listings (Accommodation) subsystem; and
3. Airbnb Management subsystem.
These three subsystems are described in the following sections. Some functionality or processes may have been simplified or modified to meet certain learning objectives.
5.1 Booking Subsystem
Before booking, prospective guests search for suitable accommodation. They can specify the location they are interested in, check-in and check-out dates. Note that the dates can be fixed (exactly as users entered) or flexible (± 1, 3 or 7 days). Users also have to specify the number of guests – adults, children (aged 2 to 12), or infants (under 2). The system then lists all available accommodation that fit the search criteria. This list only provides an overview of the properties, and users can choose a rental property to see in detail.
For each available property on the list, the system should show a summary for the property. It should display a large cover photo, a one-line description, the number of guests it can accommodate, rooms available (bedrooms, the number of beds and bathrooms), reviewer
ITECH2002 – Systems Modelling
Assignment 1 Specification – 2021
Page 4/9
rating and the number of reviewers, prices (original and discount price if there is any) and a tag if there is any. Tags can be “New lower price” or “Rare find”.
Guests can also narrow down their search by specifying:
– Property types (house, bed and breakfast, apartment, boutique hotel, bungalow, cabin, etc)
– Unique stays (barn, campervan/RV, boat, campfire, castle, houseboat, lighthouse, plane, teepee, etc)
– House rules (pets allowed, smoking allowed)
– Host language (English, German, Urdu, Chinese, etc)
To help guests get an overview of prices vs address, the system should also display a map and overlay the prices over the map. Guests can also view each property displayed on the map or list in more detail. A detailed view should include all information in the brief display but it should also include:
– Other pictures.
– A map of the location.
– Name of the host
– Check-in and check-out dates
– Any special message (especially now re. COVID-19 restrictions)
– Other information, such as type of cleaning, how to check-in, cancellation policy, house rules, sleeping arrangements, amenities such as parking availability, kitchen, hangers, hairdryer, heating, wifi, iron, tv, washing machine, first aid kit, shampoo, etc – up to 26 amenities.
– Detailed description.
– Detailed house rules, including health and safety.
Prospective guests can also see the overall rating of the reviews in terms of cleanliness, communication, check-in procedure, accuracy, location and value. If they still have questions, they can also contact the host. If all goes well, they can reserve the accommodation – note that reservations can only be confirmed after full payment. Even after confirmation, guests can still cancel their booking but they are bound by the Airbnb standard cancellation policy and extenuating circumstances policy.
All guests have up to 14 days after checking out to review their experience. Similarly, hosts can also review their guests.
5.2 Listings (Accommodation) Subsystem
This system is mostly used by hosts. All hosts are responsible for adding and maintaining their listings. You may like to start exploring hosting in Airbnb. Tips: to get an idea of what kind of information hosts need to provide for a listing, have a look at the information that Airbnb needs to display for guests. Much of the information can only be provided by the
ITECH2002 – Systems Modelling
Assignment 1 Specification – 2021
Page 5/9
hosts; for example, price, description and pictures of the accommodation (
how many pictures can a host upload?).
All hosts are covered by Airbnb Host Protection Insurance, and a host can claim insurance if their guests are injured or if their property is damaged. Airbnb will assess each insurance claim. Bear in mind that this insurance is only available in some countries, so hosts need to check if this insurance is applicable to their listings.
Hosts can also donate their income, track their performance and request professional services, such as professional photography.
5.3 Airbnb Management Subsystem
This subsystem is mostly used by the Airbnb staff in running their services. Generally, bookings are managed by the hosts and their guests, but under exceptional circumstances, Airbnb has to block and cancel all bookings in a region for a period of time. All affected guests are reimbursed, and dependent on management decisions, Airbnb may also reimburse affected hosts.
Airbnb offers superhost badges to exceptional hosts. There is no need for the host to apply – Airbnb initiates this process. Airbnb does not endorse or sponsor hosts or their listings, but it gives superhosts some benefits.
To keep all guests and hosts up to date with policies as well as terms and regulations, Airbnb needs to notify all guests and hosts of changes. Some matters are more relevant to the wider public, such as alerts or a marketing campaign, and they should be publicly available. Airbnb also keeps track of which of their staff release which news articles. All news articles should only be displayed for a specified time.
The management of Airbnb also needs various reports on the financial performance of the platforms in various regions.
This assignment has group work and individual work components. For diagramming (use case diagram and domain model class diagram), you may use any tools you are comfortable with; for example, popular web-based tools such as You may use other tools but make sure all members in your group use the same tool.
The following sections describe the tasks for the group and individual work and the distribution of marks.
ITECH2002 – Systems Modelling
Assignment 1 Specification – 2021
Page 6/9
Task 1 – Individual work [14 marks]
1 mark – Stakeholders.
a. List four stakeholders of your subsystem.
b. Indicate whether they are internal operational, internal executive, external operational or external executive.
c. Describe the role of each stakeholder, that is how they “fit into the grand scheme of the IT solution” (Mason, 2020).
4 marks – Brief use case description.
Ten brief use case texts for your subsystem – each use case description must have actor(s), use case name and use case description. The written case study provides at least six use cases for each subsystem, so you need to add four more new use cases.
The new use cases must fit in with the case study and your subsystem– for example, the case study is based on Airbnb; therefore, a use case such as “calculate postage cost” is irrelevant.
You must include an actor for each use case.
Each use case must also apply these three concepts:
• can be computerised.
• perfect technology assumption (week 3).
• elementary business processes – EBP (week 3).
1.5 marks – use case diagram.
A use case diagram based on the brief use case description you have created.
5.5 marks – class diagram for each subsystem.
A class diagram for your subsystem. The class diagram must support all the use cases identified.
2 marks – constructive reflection (TO BE SUBMITTED INDIVIDUALLY)
Use Gibbs’ Reflective Cycle, as taught in Week 5, to reflect on your experience in working on this assignment.
ITECH2002 – Systems Modelling
Assignment 1 Specification – 2021
Page 7/9
Task 2 – Group work [6 marks]
1 marks – Consolidated report
The report must clearly list each student’s name and ID and which subsystem each member is responsible for.
4 marks – Consolidated class diagram.
Consolidate all the class diagrams from your team members into a single class diagram.
1 mark – Identify the subsystem for the attributes and classes.
Identify the subsystem where the classes and attributes of the consolidated domain model class diagram have come from. This could be achieved by colour coding the attributes from each subsystem; for example, black font for the Booking subsystem, blue font for the Accommodation subsystem and red font for the Airbnb Management subsystem. You must clearly indicate which colour is for which subsystem.
This will ensure that you have included all classes, relationships and attributes from all subsystems and help you and the markers in checking the consistency of the consolidated domain model class diagram.
ITECH2002 – Systems Modelling
Assignment 1 Specification – 2021
Page 8/9
ITECH2002 – Systems Modelling
Assignment 1 Specification – 2021
Page 9/9
Mason, D. 2020. ITECH2002 – Email conversation.
End of assignment specification

Assessment 2 Student Enrolment Database

Task Description
A.1 Overview Your task is to create and test a database in MySQL using PhpMyAdmin. You are provided with a scenario and supporting documents, describing the requirements that Southern Cross University may have for a database to handle their student enrolments. You are provided with most of the design for such a database and will need to create a relational database to meet the client needs. You will also need to add sample data and create SQL queries to provide results suitable for reporting.
A.2 Scenario
Southern Cross University provides a variety of Bachelor degrees to students studying internally across campuses at Coffs Harbour, Lismore and the Gold Coast, as well as by distance education. Student enrolments and their progress in units need to be stored in a database. A systems analyst has partially designed this database (see Entity Relationship Diagram provided). You have been brought into the project to finish creating and testing the database to support SCU needs.
Additional to the ERD, SCU has provided you with some lists and details about what information needs to be stored for enrolment and recording of student results. Some of the data for each of these lists has been provided in the file DATA2001_Assessment2_SampleData.xlsx, included with this assessment. The client had provided you with as much as they know about the data requirements. As with most client-provided data, much information is duplicated in the sample data (the data is not normalised), and the spreadsheets do not reflect the finished database table design. You will have to decide on and set the datatypes and lengths, as well as finish the design of the database. In addition to storage of information about students, courses (such as Bachelor of IT), units (such as DATA2001), staff and workshops, you must allow for the following:
A.2.1 Record student enrolment in a course, including enrolment date;
A.2.2 Record student enrolment in a unit, including the Session and the type of enrolment (internal or external);
A.2.3 Record student enrolment in a workshop;
A.2.4 Record student assessment submission, with date submitted and marks given.
Assessment 2 DATA2001 – Database Systems Page 2
B. Assessment Requirements
B.1 Report 2 marks Using the ERD supplied and the data requirements provided in the Excel file, you must analyse the database needs of the client. You should provide an explanation of your database decisions or data you feel is relevant in your report. Some suggested headings for this report are included in the report template (available in this assignment folder):
• Client Business Rules
• Assumptions Made
• Naming Conventions
• Data types chosen
B.2 MySQL database 5 marks Create a MySQL database using phpMyAdmin. You must name this database as your username followed by A2. For example: rmason10A2. You will build the required tables, columns, data types and relationships based on your analysis. You are free to add any tables you feel are needed or would enhance the system. You must include, but are not limited to, the client’s specific data requirements. You may choose to add additional data columns to store other information about students, teachers, etc if you wish to do so.
B.3 Test Data 1 mark You must provide enough valid data in your database to run the SQL queries below successfully with at least 5-10 resulting rows. In particular, association tables will need to be sufficiently populated to give meaningful test results.
B.4 Export Script 1 mark You must create an export script (.sql) to create a backup of all database structures, including table definitions and data.
B.5 Proof of Testing 1 mark The results of your report queries should be added to your report (see B1). This can be a screen dump of each query result inserted into your report, but MUST be readable. You should paste each query into your report, then the results of that query.
B.6 SQL Queries:
B.6.1 Workshop enrolment list 1 mark Create a query to display the workshop enrolment lists for all students enrolled in Session 1, 2015. The result should include the session, unit code, unit name, campus location, workshop day & time, tutor name, student number and student name. The result should be sorted by the unit code, campus location, workshop day and time then student last name and first name.
B.6.2 Workshop count list 1 mark Create a query to display the number of students who were enrolled in workshops in all sessions for 2014. The result should include the session, unit code, unit name, campus location, tutor name and the total count of students enrolled. The result should be sorted by the Session, unit code, campus location and workshop day & time.
Assessment 2 DATA2001 – Database Systems Page 3
B.6.3 Student Transcripts 1 mark Create a query to display the information required for a Student Transcript. The result should include the student number, student name, year, session, unit code, unit name and final grade. The result should be sorted by the student’s last name, first name, by year, session and then by unit code.
B.6.4 Student Assessment Totals 2 marks Create a query to display the total marks for each student’s assessments in all sessions for 2014. The result should include the student names, unit code, the sum of marks given for their assessments and the final grade given. It should be sorted by the student’s last name and first name, session, and unit code. Note: the final grade is entered by the unit assessor into the database, not calculated automatically from the total.
C. Other Notes
C.1 Marking Criteria Marking Criteria will be made available via a rubric on the MySCU website.
C.2 Submission Format You will be required to submit your assignment materials both on the Infotech server, and via the MySCU unit site. Your assignment submission should be in the form of a Word document and a SQL script text file. Your Word document should be named as your username_A2.doc or username_A2.docx. (eg: rmason10_A2.docx) Your SQL script should be named as your username_A2.sql (eg: rmason10_A2.sql).
C.3 Original work This assignment must be completed individually and must be your own original work. Exchange of ideas with other people can be considered educationally valuable however excessive collaboration will be regarded as plagiarism, which is a University offence. For example, the copying of significant parts of a document (or database) even if subsequently modified, is plagiarism. Such academic dishonesty will be penalised in accordance with the University’s rules and regulations. The assessment process may require some students to attend an interview in order to explain aspects of their assignment.
C.4 Retain duplicate copy You are strongly advised to retain a copy of original work, and progressive versions of your work during the Session. In the event of any uncertainty regarding the submission of assessment items, you may be requested to reproduce a final copy and/or any previous versions of your work.
C.5 Penalty for late submission A penalty of 5% per calendar day will be applied to all late assignments. An extension of time will only be considered (not necessarily approved) when a written request is submitted with appropriate supporting documentation and in accordance with University guidelines.
C.6 Marks and Feedback Marks and feedback comments will be returned through your MySCU site for this unit.

Assignment 1: Form Design

Assignment 1: Form Design (15%)
Due date: Friday, Week 5
Assignment objectives
• Apply the theories and principles studied in the course to date.
• Design and develop an advanced web form.
Assignment specifications
Below is a scenario that requires you to design a form for this organisation.
A local Melbourne based food co-operative, ‘Farm Produce Direct’ sells fresh farm produce (meat, fruit, vegetables, dairy products etc) obtained from local farmers and is delivered to the customer’s door at set days of the week. To buy from the co-operative customers must be registered. Farm Produce Direct is updating their website, previously people wishing to join the co-operative had to do so over the telephone or send in a form. The organisation now plans to allow people to register online, the application form therefore must be designed as an online, web based form. The following are the details:
• Co-operative members can elect to buy a regular box of produce weekly or twice a month. There are three different sized boxes depending on the size of the family, large, medium and small. Members can also have regular weekly deliveries of dairy products such as cheese and milk.
• Members may nominate up to three different fruit or vegetables they do not want included in their order
• There are discounts for ordering a box of produce weekly.
• The delivery charges and dates vary depending on where members live. There are three regions (map provided on the website) and members must identify which region they live in. The charges are $5 for region 1, $10 region 2 and $12 for region 3.
• Orders can be changed online and an email confirmation is sent if there is a change.
• Only people living in Victoria can be members.
• Potential members complete the application form, including an authority to deduct from a credit card. There is a one off small joining fee of $15.
• Farm Produce Direct needs information on delivery details and in particular where the produce should be left. They cannot deliver to a post office box
• Members may elect to receive further information on promotions or new products from Farm Produce Direct.
You are required to draw the design of the form with the labels and any necessary instructions. Because it’s a single page form, you need to be creative.
You are also required to provide a brief written justification for your decisions in relation to the design of the form, to be completed also on the paper provided. This should draw on reading you have done, lecture material and the book.
Draw your form on this page. It’s a single page form, penalty applies for multi-page form.
Justification for your design on this page (you must use the formal theories and concepts discussed in the lectures to justify, one-page only). Use bullet points to organise your ideas.
Marking Guide:
• Form design (1 A4 page): 10 marks
o Clear and meaningful title and headings: 1 mark
o Good grouping: 2 marks
o Good layout: 1 mark
o Required number of fields: 3 marks
o Minimise typing: 2 marks
o Minimise errors/validation: 1 mark
• Form justification (1 A4 page): 5 marks
o Grouping: 1 mark
o Layout: 1 mark
o Inputs: 1 mark
o Fields: 1 mark
o Error prevention: 1 mark
o Others (optional)

Cryptography and Network Security I

Cryptography and Network Security I
Project Description
This is a group (2-3 students) project and you are free to choose your team mates.
You (as a group) will be implementing your own version of SSH/SSL protocol which supports your own implementation of the ciphers including the symmetric key ones (e.g., DES), PKC under ciphertext only adversary, semantically secure PKC, and homomorphic cipher as we discussed in the class and you implemented in home works. For digital signature schemes use one based on PKC, for MAC use HMAC, for hash functions use SHA1.
The project will be implemented as a client-server protocol to mimic transactions/ebanking between an ATM (client) and the bank (server). Your project will enable banking operations to deposit, withdraw money, and check balance via ATM by accessing the bank.
You are allowed to use sockets programming libraries. Each team will play white hat and black hat roles as described below:
TIME LINE & Grading:
White-hat part [60 points] due April 22, 2021: The goal is to
(i) [20pnts] negotiate and establish a secure channel using the SSL/SSH handshake protocol.
(ii) [20pnts] pass back and forth messages to implement the banking operations above.
(iii) [20pnts] You will write a document explaining your implementation as a part of your communication intensive requirement and pass the code to the TA.
We will assign your code a Black-hat team to analyze and attack. If your code does not run than black-hat will get the full points (since they can claim whatever they want) ☺.
Black-hat part [40 points] due April 29, 2021: you will receive the source code of the target team by April 23, 2021. Your goal is to find weaknesses in the implementation of (i) cryptographic primitives and protocols [20pnts]; [ii] write a report on your attacks as a part of your communication intensive requirement.
In class presentation [100 points] May 3, 2021: we will schedule a time slot for each group for presentations and demos. Given that we have time zone differences and large class size, it may be possible to submit project presentations as video recordings. This is a tentative plan and details will follow.