• No results found

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

N/A
N/A
Protected

Academic year: 2022

Share "Reproduced with permission of the copyright owner. Further reproduction prohibited without permission."

Copied!
18
0
0
Show more ( Page)

Full text

(1)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

Using Reengineering as an Integrating Capstone Experience

Matos, Victor;Grasser, Rebecca

Journal of Information Systems Education; Spring 2007; 18, 1; Research Library

pg. 85

Journal of Information Systems Education, Vol. 18(1)

Using Reengineering as an Integrating Capstone Experience

Victor Matos Rebecca Grasser Cleveland State University Cleveland, Ohio, 44114 USA matos(mcis.csuohio.edu rgrasser@acm.org

ABSTRACT

This paper presents an example of integrating IT skills using an interesting real life problem. We describe how the reverse- and forward-engineering of the USA National Do Not Call registry was used in our capstone course to illustrate the fusion of different (but interdependent) issues and techniques learned in the IT program. The purpose of the registry is to maintain a list of residential and personal phone numbers whose owners want to keep out of the reach of the telemarketing industry. We believe this experience is rich in educational possibilities; it is very appropriate for a technically oriented Information Technology program and can be conducted in a typical one-semester capstone or senior design project course. The project begins with an exhaustive investigation of the existing artifact leading the student to the discovery of the original model, and its processes, business rules and data structures. The various UML diagrams representing the specifications collected in the discovery phase are used to forward engineer a functionally equivalent database solution using the Microsoft .NET platform.

The project touches on ethical issues concerning the legality of reverse-engineering and hints at possibilities on producing similar designs such as a "Do-Not-Email" Registry.

Keywords: Capstone project, senior design project, reengineering, National Do Not Call Registry, UML modeling, web programming, Microsoft .NET applications, database systems.

1. INTRODUCTION

This paper describes an educational experience suitable for advanced IT students whose academic programs include courses on systems analysis and design, web-based programming, and database development. We believe this example is ideal for a senior design project or capstone course requiring the participants to work in integrating concepts and skills around a familiar real life problem which is realistic but moderate in length and complexity.

The subject of this study is the National Do Not Call Registry (DNC) ("Rules and Regulations", 2003). The DNC gives you a choice about whether to receive telemarketing calls at home. The goal of our project is to produce a functionally equivalent version of the internet-based

component of the DNC system.

Students engage in a process of reverse engineering the existing registry in order to discover and learn its underlying structure and design. This approach is consistent with the case-study and problem based learning methods which help students to develop individual and group working skills, including effective communication and critical thinking (Herreid, 1994). Students working on this problem will assume a sequence of increasingly demanding roles. Some of those roles and their corresponding assignments are:

85

(a) Researcher. Investigate and collect published references about the DNC,

(b) Author/Reporter. Write an executive summary report describing the purpose of the registry, ( c) User. Register own home/personal phone,

(d) Analyst. Based on the knowledge acquired from references and their experience of registering their own phones, students are asked to guess what processes, business rules, and data structures are used to support the registry,

(e) Designer. Provide graphical depictions of the existing DNC model suitable for implementation of the new model,

(f) Developer. Apply a current technology (we use Microsoft .NET solutions) to construct an equivalent version of the registry,

(g) Administrator. Provide maintenance, security, recovery, and catastrophic operational plans.

Those roles are typical of a successful systems development team, in which business analysis, software development, database support and operational maintenance need to work harmoniously to provide an effective solution to the user's problem. Asking the student to be different actors is useful in illustrating how a system is assembled to meet a particular goal, showing alternative courses of action

(2)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

(3)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

(4)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

(5)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

(6)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

(7)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

(8)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

(9)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

(10)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

(11)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

(12)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

(13)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

(14)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

(15)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

(16)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

(17)

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.

(18)

Information Systems & Computing Academic Professionals

STATEMENT OF PEER REVIEW INTEGRITY

All papers published in the Journal of Information Systems Education have undergone rigorous peer review. This includes an initial editor screening and double-blind refereeing by three or more expert referees.

Copyright ©2007 by the Information Systems & Computing Academic Professionals, Inc. (ISCAP). Permission to make digital or hard copies of all or part of this journal for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial use. All copies must bear this notice and full citation. Permission from the Editor is required to post to servers, redistribute to lists, or utilize in a for-profit or commercial use. Permission requests should be sent to the Editor-in-Chief, Journal of Information Systems Education, editor@jise.org.

ISSN 1055-3096

References

Related documents

Reproduced with permission of the copyright owner. Further reproduction prohibited without permission... Further reproduction prohibited without permission... IF C ANOTHER

The intended goals of the change plan are to develop realistic expectations and scope of work for building level administration (for example, assessment schedules, personal

In this paper, we argue that much of the small business strategic management literature has drawn too heavily from work done on large, established firms. We build upon the notions of

business executives and 62 Korean business executives, we find empirical support for the persistence of cross-cultural differences in the decision criteria used in project evaluation

Resource dependence theory explains the importance of outside directors on corporate boards, especially for small- and mid-sized companies.. Attracting qualified board members is

In the process of assessing our curriculum, we discovered generally inconsistent courses, lack of integration across the various courses, outdated and irrelevant

Although the transition from theory to the ability and propensity to implement knowledge in an abstract area like management is not simple (Rafaeli et al.,

Four major server-side technologies are needed to support Internet-based e-business: a web server to handle requests from the Internet, a server-side programming

The results confirmed that FTF teams outperformed OL Ts and identified four approaches to improve the performance of OLTs: (1) Posting well-organized information; (2)

Reproduced with permission of the copyright owner.. Further reproduction prohibited

WoNeF am?lioration, extension et ?valuation d?une traduction fran?aise automatique de WordNet WoNeF am?lioration, extension et ?valuation d?une traduction fran?aise automatique de

BioMed CentralVirology Journal ss Open AcceResearch The ability of flagellum specific Proteus vulgaris bacteriophage PV22 to interact with Campylobacter jejuni flagella in culture

BioMed CentralVirology Journal ss Open AcceResearch A phosphorylation map of the bovine papillomavirus E1 helicase Michael R Lentz*1, Stanley M Stevens Jr2, Joshua Raynes1 and Nancy

First, we propose a framework for multi-language service design to bridge the gap between the service-oriented language in- frastructures and multi-language applications by

Multilingual Parallel Corpus for Global Communication Plan Kenji Imamura and Eiichiro Sumita National Institute of Information and Communications Technology 3 5 Hikaridai, Seika cho,

BioMed CentralVirology Journal ss Open AcceResearch Kaposi's sarcoma associated herpesvirus G protein coupled receptor activation of cyclooxygenase 2 in vascular endothelial cells Bryan

Analysis of the available TPM virus S (1530 nt) RNA genome segment sequence and the newly derived M (3621 nt) and L (6581 nt) segment sequences demonstrate that the entire TPM

Molecular detection of Porcine astrovirus in Sichuan Province, China SHORT REPORT Open Access Molecular detection of Porcine astrovirus in Sichuan Province, China Yuhan Cai1,2,3?,

Use of dietary supplements by pregnant women in Colombia RESEARCH ARTICLE Open Access Use of dietary supplements by pregnant women in Colombia Robinson Ram?rez V?lez1*, Jorge Enrique

12919 2018 152 Article 1 7 PROCEEDINGS Open Access An efficient analytic approach in genome wide identification of methylation quantitative trait loci response to fenofibrate

BioMed Central World Journal of Surgical Oncology ss Open AcceResearch Is the thymidine labeling index a good prognostic marker in breast cancer? Ebru Sen Oran*1,4, Vahit Ozmen1,

Earth Planets Space, 56, 39?45, 2004 Geomagnetic fluctuations during the 1999 Chi Chi earthquake in Taiwan Horng Yuan Yen1, Chieh Hung Chen1, Yih Hsiung Yeh3, Jann Yeng Liu2, Chin Ren