699

Modern Systems Analysis and Design Technologies and Applications by Mahbubur Rahman Syed & Sharifun Nessa Syed

Embed Size (px)

DESCRIPTION

Modern Systems Analysis and Design Technologies and Applications by Mahbubur Rahman Syed & Sharifun Nessa Syed Note: I share this book for educational purpose only. If you really like this book please buy it and help the authors, they deserve it. All The Best. :) If this book is helpful to you then don't forget to like, share and comment. Facebook: www.facebook.com/pran93

Citation preview

  • 1.Handbook of Research onModern Systems Analysisand Design Technologiesand ApplicationsMahbubur Rahman SyedMinnesota State University, Mankato, USASharifun Nessa SyedMinnesota State University, Mankato, USAInformatIon scIence referenceHershey New York

2. Acquisitions Editor: Kristin KlingerDevelopment Editor: Kristin RothSenior Managing Editor: Jennifer NeidigManaging Editor: Jamie SnavelyAssistant Managing Editor: Carole CoulsonCopy Editor: Ashlee Kunkel and Joy LangelTypesetter: Jeff AshCover Design: Lisa TosheffPrinted at: Yurchak Printing Inc.Published in the United States of America byInformation Science Reference (an imprint of IGI Global)701 E. Chocolate Avenue, Suite 200Hershey PA 17033Tel: 717-533-8845Fax: 717-533-8661E-mail: [email protected] site: http://www.igi-global.comand in the United Kingdom byInformation Science Reference (an imprint of IGI Global)3 Henrietta StreetCovent GardenLondon WC2E 8LUTel: 44 20 7240 0856Fax: 44 20 7379 0609Web site: http://www.eurospanbookstore.comCopyright 2009 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or byany means, electronic or mechanical, including photocopying, without written permission from the publisher.Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does notindicate a claim of ownership by IGI Global of the trademark or registered trademark.Library of Congress Cataloging-in-Publication DataHandbook of research on modern systems analysis and design technologies and applications / Mahbubur Rahman Syed and Sharifun NessaSyed.p. cm.Summary: "This book provides a compendium of terms, definitions, and explanations of concepts in various areas of systems and design, aswell as a vast collection of cutting-edge research articles from the field's leading experts"--Provided by publisher.Includes bibliographical references and index.ISBN 978-1-59904-887-1 (hard cover) -- ISBN 978-1-59904-888-8 (ebook)1. System analysis--Handbooks, manuals, etc. 2. System design--Handbooks, manuals, etc. I. Syed, Mahbubur Rahman, 1952- II. Syed,Sharifun Nessa, 1954-T57.6.H3634 2008004.2'1--dc222008007571British Cataloguing in Publication DataA Cataloguing in Publication record for this book is available from the British Library.All work contributed to this book set is original material. The views expressed in this book are those of the authors, but not necessarily of thepublisher.If a library purchased a print copy of this publication, please go to http://www.igi-global.com/agreement for information on activatingthe library's complimentary electronic access to this publication. 3. Editorial Advisory BoardTimothy K. ShihTamkang University, TaiwanM. AtiquzzamanUniversity of Oklahoma, USASalahuddin Muhammad Salim ZabirKyushu University, Fukuoka, JapanXun YiVictoria University, CanadaRuhul A. SarkerUniversity of New South Wales at ADFA, Australia 4. List of ContributorsAhmed, Farid / The Catholic University of America, USA ...................................................................................484Alexander, Paulette / University of North Alabama, USA ....................................................................................628Alexopoulou, Nancy / University of Athens, Greece .............................................................................................326Ali, A. B. M. Shawkat / Central Queensland University, Australia .............................................................501, 584Alvarez, Francisco / Autonomous University of Aguascalientes, Mexico .........................................................76, 90Begg, Rezaul K. / Victoria University, Australia ...................................................................................................544Begum, Rashida / Eminence Associates, Bangladesh ...........................................................................................584Berger, Paul / Bentley College, USA .....................................................................................................................271Brinkkemper, Sjaak / Utrecht University, The Netherlands ..................................................................................35Canton, Maria P. / South Central College, USA ...................................................................................................388Chen, Qiyang / Montclair State University, USA ..................................................................................................119Cole, Alan / IBM T.J. Watson Research Center, USA ..............................................................................................55Dahl, Laura B. / University of Utah, USA .............................................................................................................305Day, Karen / University of Auckland, New Zealand ..............................................................................................560Even, Adir / Ben Gurion University of the Negev, Israel ......................................................................................271Flores, Fernado / Autonomous University of Aguascalientes, Mexico ....................................................................90Flygare, Jill / University of Utah, USA ..................................................................................................................305Gelbard, Roy / Bar-Ilan University, Israel ....................................................................................................140, 169Gomes, Cecilia / The Catholic University of America, USA..................................................................................484Gossett, Carol / University of North Alabama, USA .............................................................................................628Hardas, Manas / Kent State University, USA ........................................................................................................609Hart, Allan M. / Minnesota State University, Mankato, USA ...............................................................................433Hawryszkiewycz, I. / University of Technology, Sydney, Australia ..............................................................223, 243Henderson-Sellers, B. / University of Technology, Sydney, Australia ..........................................................223, 243Hua, Winnie / CTS Inc., USA ....................................................................................................................................1Islam, Razibul A.H.M. / Macquarie University, Australia ...................................................................................584Johnston, Robert B. / University of Melbourne Australia & University College Dublin, Ireland .........................23Kelley, Dean / Minnesota State University, Mankato, USA ...................................................................................148Khan, Javed / Kent State University, USA ............................................................................................................609Khandoker, Ahsan H. / The University of Melbourne, Australia .........................................................................544Knapp, Kenneth / U.S.A.F. Academy, USA ...........................................................................................................295Macias-Luvano, Jorge / Autonomous University of Aguascalientes, Mexico .......................................................90Magni, Massimo / Bocconi University, Italy .........................................................................................................105Martin, Miguel Vargas / University of Ontario Institute of Technology, Canada ..................................................76Mendling, Jan / Queensland University of Technology, Australia ........................................................................189Milton, Simon K. / University of Melbourne, Australia ..........................................................................................23Mohamed Gasmelseid, Tagelsir / King Faisal University, Saudi Arabia ....................................................357, 371Mora, Manuel / Autonomous University of Aguascalientes, Mexico ................................................................76, 90 5. Munson, Jonathan / IBM T.J. Watson Research Center, USA ................................................................................55Murshed, Manzur / Monash University, Australia ...............................................................................................469Nikolaidou, Mara / Harokopio University of Athens, Greece ...............................................................................326OConner, Rory / Dublin City University, Ireland ...........................................................................................76, 90Orr, Martin / University of Auckland, New Zealand.............................................................................................560Paul, Manoranjan / Monash University, Australia ...............................................................................................469Proserpio, Luigi / Bocconi University, Italy ..........................................................................................................105Provera, Bernardino / Bocconi University, Italy ..................................................................................................105Quade, Ann M. / Minnesota State University, Mankato, USA ..............................................................................642Rittgen, Peter / University College of Bors, Sweden ...........................................................................................179Rodrguez, Laura / Autonomous University of Aguascalientes, Mexico ................................................................76Samuelis, Ladislav / Technical University of Kosice, Slovakia .............................................................................161Sanchez, Julio / Minnesota State University, Mankato, USA ................................................................................388Shankaranarayanan, G. / Boston University School of Management, USA ........................................................271Shan, Tony C. / Bank of America, USA .....................................................................................................................1Tran, Q.N.N. / University of Technology, Sydney, Australia .........................................................................223, 243van de Weerd, Inge / Utrecht University, The Netherlands ....................................................................................35Verma, Brijesh / Central Queensland University, Australia .................................................................................523Waller, Vivienne / Swinburne University of Technology, Australia ........................................................................23Wang, John / Montclair State University, USA .............................................................................................119, 130Warren, Jim / University of Auckland, New Zealand ............................................................................................560Wood, David / IBM T.J. Watson Research Center, USA ..........................................................................................55Xia, Jun / Montclair State University, USA ...........................................................................................................130Xia, Yuni / Indiana University Purdue UniversityIndianopolis, USA ...................................................................55Xing, Ruben / Montclair State University, USA ....................................................................................................119Yang, James G.S. / Montclair State University, USA ............................................................................................130Yao, James / Montclair State University, USA ......................................................................................................119Zahid Hassan, Syed / Central Queensland University, Australia .........................................................................523Zheng, Robert Z. / University of Utah, USA .........................................................................................................305 6. Table of ContentsPreface .................................................................................................................................................................. xxivAcknowledgment ...............................................................................................................................................xxviiiSection ISystem Development MethodologiesChapter ITowards a Systematic Method for Solutions Architecting..........................................................................................1Tony C. Shan, Bank of America, USAWinnie W. Hua, CTS Inc., USAChapter IIA Methodology for Situated Analysis and Design .................................................................................................... 23Vivienne Waller, Swinburne University of Technology, AustraliaRobert B. Johnston, University of Melbourne, Australia & University College Dublin, IrelandSimon K. Milton, University of Melbourne, AustraliaChapter IIIMeta-Modeling for Situational Analysis and Design Methods ................................................................................. 35Inge van de Weerd, Utrecht University, The NetherlandsSjaak Brinkkemper, Utrecht University, The NetherlandsChapter IVLocation-Based Service (LBS) System Analysis and Design ................................................................................... 55Yuni Xia, Indiana University Purdue UniversityIndianapolis, USAJonathan Munson, IBM T.J. Watson Research Center, USADavid Wood, IBM T.J. Watson Research Center, USAAlan Cole, IBM T.J. Watson Research Center, USA 7. Chapter VProcess Models of SDLCs: Comparison and Evolution ........................................................................................... 76Laura C. Rodrguez, Autonomous University of Aguascalientes, MexicoManuel Mora, Autonomous University of Aguascalientes, MexicoMiguel Vargas Martin, University of Ontario Institute of Technology, CanadaRory OConnor, Dublin City University, IrelandFrancisco Alvarez, Autonomous University of Aguascalientes, MexicoChapter VIRequirements Engineering: A Review of Processes and Techniques ....................................................................... 90Fernando Flores, Autonomous University of Aguascalientes, MexicoManuel Mora, Autonomous University of Aguascalientes, MexicoFrancisco Alvarez, Autonomous University of Aguascalientes, MexicoRory OConnor, Dublin City University, IrelandJorge Macias-Luvano, Autonomous University of Aguascalientes, MexicoChapter VIIIndividual Improvisation in Information Systems Development ............................................................................ 105Massimo Magni, Bocconi University, ItalyBernardino Provera, Bocconi University, ItalyLuigi Proserpio, Bocconi University, ItalyChapter VIIIDesign and Analysis of Decision Support Systems ................................................................................................ 119John Wang, Montclair State University, USAJames Yao, Montclair State University, USAQiyang Chen, Montclair State University, USARuben Xing, Montclair State University, USAChapter IXA Systematic Implementation of Project Management .......................................................................................... 130John Wang, Montclair State University, USAJames G.S. Yang, Montclair State University, USAJun Xia, Montclair State University, USAChapter XDecision Rule for Investment in Frameworks of Reuse ......................................................................................... 140Roy Gelbard, Bar-Ilan University, IsraelChapter XIStrategies for Static Tables ...................................................................................................................................... 148Dean Kelley, Minnesota State University, Mankato, USA 8. Chapter XIINotes on the Emerging Science of Software Evolution .......................................................................................... 161Ladislav Samuelis, Technical University of Kosice, SlovakiaSection IIModeling ProcessesChapter XIIISoftware Modeling Processes: UMLXUML Review ........................................................................................... 169Roy Gelbard, Bar-Ilan University, IsraelChapter XIVFrom Business Process Model to Information Systems Model: Integrating Demo and UML ............................... 179Peter Rittgen, University College of Bors, SwedenChapter XVFoundations of Business Process Modeling ........................................................................................................... 189Jan Mendling, Queensland University of Technology, AustraliaSection IIIAgile Software DevelopmentChapter XVISome Method Fragments for Agile Software Development ................................................................................... 223Q.N.N. Tran, University of Technology, Sydney, AustraliaB. Henderson-Sellers, University of Technology, Sydney, AustraliaI. Hawryszkiewycz, University of Technology, Sydney, AustraliaChapter XVIIAgile Method Fragments and Construction Validation........................................................................................... 243Q.N.N. Tran, University of Technology, Sydney, AustraliaB. Henderson-Sellers, University of Technology, Sydney, AustraliaI. Hawryszkiewycz, University of Technology, Sydney, AustraliaSection IVSystem Design and ConsiderationsChapter XVIIIUtility-Cost Tradeoffs in the Design of Data Resource .......................................................................................... 271Adir Even, Ben Gurion University of the Negev, IsraelG. Shankaranarayanan, Boston University School of Management, USAPaul D. Berger, Bentley College, USA 9. Chapter XIXSecurity Considerations in the Development Life Cycle ........................................................................................ 295Kenneth J. Knapp, U. S. A. F. Academy, USAChapter XXCognitive Perspective on Human-Computer Interface Design ............................................................................... 305Robert Z. Zheng, University of Utah, USALaura B. Dahl, University of Utah, USAJill Flygare, University of Utah, USAChapter XXIFrameworks for Model-Based Design of Enterprise Information Systems ............................................................ 326Mara Nikolaidou, Harokopio University of Athens, GreeceNancy Alexopoulou, University of Athens, GreeceChapter XXIIOn the Design of Multiagent, Context-Aware and Mobile Systems ....................................................................... 357Tagelsir Mohamed Gasmelseid, King Faisal University, Saudi ArabiaChapter XXIIIModern Design Dimensions of Multiagent CSCW Systems .................................................................................. 371Tagelsir Mohamed Gasmelseid, King Faisal University, Saudi ArabiaSection VObject Oriented DevelopmentChapter XXIVClass Patterns and Templates in Software Design .................................................................................................. 388Julio Sanchez, Minnesota State University, Mankato, USAMaria P. Canton, South Central College, USAChapter XXVHibernate: A Full Object Relational Mapping Service ........................................................................................... 433Allan M. Hart, Minnesota State University, Mankato, USASection VIDesign ApplicationsChapter XXVIPattern Based Video Coding ................................................................................................................................... 469Manoranjan Paul, Monash University, AustraliaManzur Murshed, Monash University, Australia 10. Chapter XXVIIDigital Watermarking for Digital Rights Management ........................................................................................... 484Farid Ahmed, The Catholic University of America, USACecilia Gomes, The Catholic University of America, USAChapter XXVIIISupport Vector Machine: Itself an Intelligent Systems ........................................................................................... 501A. B. M. Shawkat Ali, Central Queensland University, AustraliaSection VIIMedical ApplicationsChapter XXIXHybrid Data Mining for Medical Applications ....................................................................................................... 523Syed Zahid Hassan, Central Queensland University, AustraliaBrijesh Verma, Central Queensland University, AustraliaChapter XXXMachine Learning for Designing an Automated Medical Diagnostic System ....................................................... 544Ahsan H. Khandoker, University of Melbourne, AustraliaRezaul K. Begg, Victoria University, AustraliaChapter XXXIAchieving Effective Health Information Systems .................................................................................................. 560Jim Warren, University of Auckland, New ZealandKaren Day, University of Auckland, New ZealandMartin Orr, University of Auckland, New ZealandChapter XXXIITrends and Prospects of Telemedicine .................................................................................................................... 584A.H.M. Razibul Islam, Macquarie University, AustraliaRashida Begum, Eminence Associates, BangladeshA. B. M. Shawkat Ali, Central Queensland University, AustraliaSection VIIIEducational ApplicationsChapter XXXIIIKnowledge-Based Characterization of Test Questions ........................................................................................... 609Javed Khan, Kent State University, USAManas Hardas, Kent State University, USA 11. Chapter XXXIVInformation Systems Curriculum Design Processes ............................................................................................... 628Paulette Alexander, University of North Alabama, USACarol Gossett, University of North Alabama, USAChapter XXXVRedesigning a SAD Course to Promote Problem-Based Learning ......................................................................... 642Ann M. Quade, Minnesota State University, Mankato, USAAbout the Contributors ........................................................................................................................................ 655Index ................................................................................................................................................................... 665 12. Detailed Table of ContentsPreface .................................................................................................................................................................. xxivAcknowledgment ...............................................................................................................................................xxviiiSection ISystem Development MethodologiesChapter ITowards a Systematic Method for Solutions Architecting..........................................................................................1Tony C. Shan, Bank of America, USAWinnie W. Hua, CTS Inc., USASolutions architecting method (SAM) is defined as a methodical approach to dealing with the architecture complexityof enterprise information systems in IT solution designs. This comprehensive method consists of eight interconnectedmodules: framework for e-business architecture and technology, prescriptive artineering procedure, technology ar-chitectureplanning, architecture stack and perspectives, rapid architecting process, architecture readiness maturity,generic application platform, and Tao of IT development & engineering. Collectively, these modules form a holisticdiscipline guiding the process of developing architected solutions in an enterprise computing environment. Severalunconventional concepts and thinking styles are introduced in this overarching structure. This systematic methodhas been customized and adapted to be extensively applied in one form or another to develop various IT solutionsacross a broad range of industrial sectors. Reference solutions are presented and articulated to illustrate the exem-plaryimplementations of some key elements in SAM. Best practice and lessons learned as well as future trends arediscussed in the context.Chapter IIA Methodology for Situated Analysis and Design .................................................................................................... 23Vivienne Waller, Swinburne University of Technology, AustraliaRobert B. Johnston, University of Melbourne, Australia & University College Dublin, IrelandSimon K. Milton, University of Melbourne, AustraliaThis chapter presents a new high level methodology for the analysis and design of information systems specificallyto support routine action at the operational level of organizations. The authors argue that traditional methods fail toadequately address the unique requirements of support for routine operational action. The main innovation of themethodology is the use of an action-centred approach derived from recent work on the nature of purposeful humanaction, and as such, emphasises both the information requirements for action and the dependence of action uponappropriately structured environments. A brief case study illustrates how using the methodology can sensitize theanalyst to opportunities to increase human efficiency and effectiveness through lighter weight information systems. 13. Chapter IIIMeta-Modeling for Situational Analysis and Design Methods ................................................................................. 35Inge van de Weerd, Utrecht University, The NetherlandsSjaak Brinkkemper, Utrecht University, The NetherlandsThis chapter introduces an assembly-based method engineering approach for constructing situational analysis anddesign methods. The approach is supported by a meta-modeling technique, based on UML activity and class diagrams.Both the method engineering approach and meta-modeling technique will be explained and illustrated by case studies.The first case study describes the use of the meta-modeling technique in the analysis of method evolution. The nextcase study describes the use of situational method engineering, supported by the proposed meta-modeling technique,in method construction. With this research, the authors hope to provide researchers in the information system devel-opmentdomain with a useful approach for analyzing, constructing, and adapting methods.Chapter IVLocation-Based Service (LBS) System Analysis and Design ................................................................................... 55Yuni Xia, Indiana University Purdue UniversityIndianapolis, USAJonathan Munson, IBM T.J. Watson Research Center, USADavid Wood, IBM T.J. Watson Research Center, USAAlan Cole, IBM T.J. Watson Research Center, USAAdvances in GPS, personal locator technology, Internet and network technology, and the rapidly growing numberof mobile personal devices are helping to drive the fast growth of mobile e-commerce, we refer to as m-commerce.A special case of m-commerce is enabled with location based services (LBS) where often the actual position of theterminal is used in the service provision. In this chapter, we concentrate on the analysis and design issues and tech-niquesfor the LBS. We give a brief introduction of LBS and its applications and present the most important user,system, and infrastructure requirements. We also present the architecture and database design issues in LBS systemsand study the performance an LBS system and evaluate its properties.Chapter VProcess Models of SDLCs: Comparison and Evolution ........................................................................................... 76Laura C. Rodrguez, Autonomous University of Aguascalientes, MexicoManuel Mora, Autonomous University of Aguascalientes, MexicoMiguel Vargas Martin, University of Ontario Institute of Technology, CanadaRory OConnor, Dublin City University, IrelandFrancisco Alvarez, Autonomous University of Aguascalientes, MexicoThe software engineering discipline has developed the concept of software process to guide development teamstowards a high-quality end product that be delivered on-time and within the planned budget. Consequently, severalsoftware-systems development life-cycles (PM-SDLCs) have been theoretically formulated and empirically testedover the years. In this chapter, a conceptual research methodology is used to review the state of the art on the mainPM-SDLCs formulated for software-intensive systems, with the aim to answer the following research questions: (a)What are the main characteristics that describe the PM-SDLCs?, (b) What are the common and unique characteris-ticsof such PM-SDLCs?, and (c) What are the main benefits and limitations of PM-SDLCs from a viewpoint of aconceptual analysis? This research is motivated by a gap in the literature on comprehensive studies that describe andcompare the main PM-SDLCs and organizes a view of the large variety of PM-SDLCs.Chapter VIRequirements Engineering: A Review of Processes and Techniques ....................................................................... 90Fernando Flores, Autonomous University of Aguascalientes, MexicoManuel Mora, Autonomous University of Aguascalientes, Mexico 14. Francisco Alvarez, Autonomous University of Aguascalientes, MexicoRory OConnor, Dublin City University, IrelandJorge Macias-Luvano, Autonomous University of Aguascalientes, MexicoRequirements engineering is the process of discovering the purpose and implicit needs of a software system that willbe developed and making explicit, complete, and non ambiguous their specification. Its relevance is based in thatomission or mistakes generated during this phase and corrected in later phases of a system development lifecycle,will cause cost overruns and delays to the project, as well as incomplete software. This chapter, by using a conceptualresearch approach, reviews the literature for developing a review of types of requirements, and the processes, activi-ties,and techniques used. Analysis and synthesis of such findings permit to posit a generic requirements engineer-ingprocess. Implications, trends, and challenges are then reported. While its execution is being mandatory in mostSDLCs, it is done partially. Furthermore, the emergence of advanced services-oriented technologies suggests furtherresearch for identifying what of the present knowledge is useful and what is needed. This research is an initial effortto synthesize accumulated knowledge.Chapter VIIIndividual Improvisation in Information Systems Development ............................................................................ 105Massimo Magni, Bocconi University, ItalyBernardino Provera, Bocconi University, ItalyLuigi Proserpio, Bocconi University, ItalyImprovisation is rapidly becoming an important issue for both scholars and practitioners. Organizations that operatein turbulent environments must learn to swiftly adapt and respond to such instability, especially in areas as innovationand new product development. In such contexts, traditional top-down, carefully-planned approaches to innovativeprojects may represent an obstacle to effectively dealing with environment uncertainty. Prior research on improvisationhas focused considerable attention on the centrality of improvisation in individual and group outcomes, while lessemphasis has been placed on how individual attitude toward improvisation is formed. In an attempt to fill this gap, wewill theoretically analyze the antecedents of individual attitude toward improvisation, by looking at the informationsystems development (ISD) domain. In particular, the outcome of this chapter is the development of theoreticalpropositions which could be empirically tested in future research.Chapter VIIIDesign and Analysis of Decision Support Systems ................................................................................................ 119John Wang, Montclair State University, USAJames Yao, Montclair State University, USAQiyang Chen, Montclair State University, USARuben Xing, Montclair State University, USASince their creation in the early 1960s, decision support systems (DSSs) have evolved over the past 4 decades andcontinue to do so today. Although DSSs have grown substantially since its inception, improvements still need to bemade. New technology has emerged and will continue to do so and, consequently, DSSs need to keep pace with it.Also, knowledge needs to play a bigger role in the form of decision making. We first discuss design and analysismethods/techniques/issues related to DSSs. Then, the three possible ways to enhance DSSs will be explored.Chapter IXA Systematic Implementation of Project Management .......................................................................................... 130John Wang, Montclair State University, USAJames G.S. Yang, Montclair State University, USAJun Xia, Montclair State University, USAIn contrast to ongoing, functional work, a project is a temporary endeavor undertaken to achieve or create a uniqueproduct or service(s). The project management knowledge and practices are best described as component process- 15. esinitiating, planning, executing, controlling, and closing. We have taken a closer look at project management byreviewing the types of methodologies and tools that exist in business today. We observed the major existing risk fac-torsfacing project management practices. We also evaluated the unique issues in delivering projects brought about byglobalization. As we were extracting the information, it became apparent that there should be measures taken relatedto the project management process that could alleviate the some major risk factors in some way.Chapter XDecision Rule for Investment in Frameworks of Reuse ......................................................................................... 140Roy Gelbard, Bar-Ilan University, IsraelReuse helps to decrease development time, code errors, and code units. Therefore, it serves to improve quality andproductivity frameworks in software development. The question is not HOW to make the code reusable, but WHICHamount of software components would be most beneficial, that is, cost-effective in terms of reuse, and WHAT methodshould be used to decide whether to make a component reusable or not. If we had unlimited time and resources, wecould write any code unit in a reusable way. In other words, its reusability would be 100%. However, in real life,resources are limited and there are clear deadlines to be met. Given these constraints, decisions regarding reusabilityare not always straightforward. The current research focuses on decision-making rules for investing in reuse frame-works.It attempts to determine the parameters, which should be taken into account in decisions relating to degreesof reusability. Two new models are presented for decision-making relating to reusability: (i) a restricted model and(ii) a non-restricted model. Decisions made by using these models are then analyzed and discussed.Chapter XIStrategies for Static Tables ...................................................................................................................................... 148Dean Kelley, Minnesota State University, Mankato, USAThis chapter presents three alternatives for structuring static tablesthose tables in which the collection of keys re-mainsunchanged and in which the FIND operation is optimized. Each alternative provides performance guaranteesfor the FIND operation which can help those who design and/or implement systems achieve performance guaranteesof their own. The chapter provides clear and concise algorithms for construction and/or usage and simple guidelinesfor choosing among the strategies. It is intended that this presentation will help inform system design decisions. It isfurther intended that this chapter will assist implementation activities for systems which make use of static tables.Chapter XIINotes on the Emerging Science of Software Evolution .......................................................................................... 161Ladislav Samuelis, Technical University of Kosice, SlovakiaThis chapter introduces the irreducibility principle within the context of computer science and software engineer-ingdisciplines. It argues that the evolution, analysis, and design of the application software, which represent higherlevel concepts, cannot be deduced from the underlying concepts, which are valid on a lower level of abstractions.We analyze two specific sweeping statements often observed in the software engineering community and highlightthe presence of the reductionism approach being treated already in the philosophy. We draw an analogy between theirreducibility principle and this approach. Furthermore, we hope that deep understanding of the reductionism approachwill assist in the correct application of software design principles. 16. Section IIModeling ProcessesChapter XIIISoftware Modeling Processes: UMLXUML Review ........................................................................................... 169Roy Gelbard, Bar-Ilan University, IsraelApplications require short development cycles and constant interaction with customers. Requirement gathering hasbecome an ongoing process, reflecting continuous changes in technology and market demands. System analysis andmodeling that are made at the initial project stages are quickly abandoned and become outmoded. Model driven ar-chitecture(MDA), rapid application development (RAD), adaptive development, extreme programming (XP), andothers have resulted in a shift from the traditional waterfall model. These methodologies attempt to respond to theneeds, but do they really fulfill their objectives, which are essential to the success of software development? Unifiedmodeling language (UML) was created by the convergence of several well-known modeling methodologies. Despiteits popularity and the investments that have been made in UML tools, UML is not yet translatable into running code.Some of the problems that have been discovered have to do with the absence of action semantics language and itssize. This chapter reviews and evaluates the UML evolution (UML2, xUML), providing criteria and requirements toevaluate UML and the xUML potential to raise levels of abstraction, flexibility, and productivity enhancement. At thesame time, it pinpoints its liabilities that keep it from completely fulfilling the vision of software development througha continuous exactable modeling process, considered to be the future direction for modeling and implementation.Chapter XIVFrom Business Process Model to Information Systems Model: Integrating Demo and UML ............................... 179Peter Rittgen, University College of Bors, SwedenThe main purpose of a corporate information system is the support of the companys business processes. The de-velopmentof information systems is therefore typically preceded by an analysis of the business processes it is sup-posedto support. The tasks of analysing business processes and designing information systems are governed by twoseemingly incompatible perspectives related to the interaction between human actors or inanimate agents (objects),respectively. As a consequence, the corresponding modeling languages also differ. DEMO (dynamic essential mod-elingof organization) is a typical language for modeling business processes, the UML is the predominant languagefor information systems modeling. We challenge the assumption of incompatibility of the perspectives by providinga framework for the integration of these languages.Chapter XVFoundations of Business Process Modeling ........................................................................................................... 189Jan Mendling, Queensland University of Technology, AustraliaThis chapter provides an overview of business process management and business process modeling. We approachbusiness process management by giving a historical classification of seminal work, and define it by the help of thebusiness process management life cycle. Business process models play an important role in this life cycle, in particu-lar,if information systems are used for executing processes. We deduct a definition for business process modelingbased on a discussion of modeling from a general information systems point of view. In the following, we detailbusiness process modeling techniques, in particular, modeling languages and modeling procedures for businessprocess modeling. Finally, we discuss some future trends with a focus on the business process execution languagefor Web services (BPEL), and conclude the chapter with a summary. The chapter aims to cover business processmodeling in a comprehensive way such that academics and practitioners can use it as a reference for identifyingmore specialized works. 17. Section IIIAgile Software DevelopmentChapter XVISome Method Fragments for Agile Software Development ................................................................................... 223Q.N.N. Tran, University of Technology, Sydney, AustraliaB. Henderson-Sellers, University of Technology, Sydney, AustraliaI. Hawryszkiewycz, University of Technology, Sydney, AustraliaThe use of a situational method engineering approach to create agile methodologies is demonstrated. Although exist-ingmethod bases are shown to be deficient, we take one of these (that of the OPEN process framework) and proposeadditional method fragments specific to agile methodologies. These are derived from a study of several of the existingagile methods, each fragment being created from the relevant powertype pattern as standardized in the AustralianStandard methodology metamodel of AS 4651.Chapter XVIIAgile Method Fragments and Construction Validation........................................................................................... 243Q.N.N. Tran, University of Technology, Sydney, AustraliaB. Henderson-Sellers, University of Technology, Sydney, AustraliaI. Hawryszkiewycz, University of Technology, Sydney, AustraliaMethod fragments for work units and workflows are identified for the support of agile methodologies. Using one suchsituational method engineering approach, the OPEN process framework, we show how the full set of these newlyidentified agile method fragments, each created from the relevant powertype pattern as standardized in the AustralianStandard methodology metamodel of AS 4651, can be used to recreate four of the currently available agile methods:XP, scrum, and two members of the crystal familythus providing an initial validation of the approach and thespecifically proposed method fragments for agile software development.Section IVSystem Design and ConsiderationsChapter XVIIIUtility-Cost Tradeoffs in the Design of Data Resource .......................................................................................... 271Adir Even, Ben Gurion University of the Negev, IsraelG. Shankaranarayanan, Boston University School of Management, USAPaul D. Berger, Bentley College, USAThis chapter introduces a novel perspective for designing and maintaining data resources. Data and the informationsystems that manage it, are critical organizational resources. Today the design and the maintenance of data man-agementenvironments are driven primarily by technical and functional requirements. We suggest that economicconsiderations, such as the utility gained by the use of data resources and the costs involved in implementing andmaintaining them, may significantly affect data management decisions. We propose an analytical framework foranalyzing utility-cost tradeoffs and optimizing design. Its application is demonstrated for analyzing certain designdecisions in a data warehouse environment. The analysis considers variability and inequality in the utility of dataresources, and possible uncertainties with usage and implementation. 18. Chapter XIXSecurity Considerations in the Development Life Cycle ........................................................................................ 295Kenneth J. Knapp, U. S. A. F. Academy, USATo promote the development of inherently secure software, this chapter describes various strategies and techniquesfor integrating security requirements into the systems development life cycle (SDLC). For each major phase of theSDLC, recommendations are made to promote the development of secure information systems. In brief, developersshould identify risks, document initial requirements early, and stress the importance of security during each phase ofthe SDLC. Security concerns are then offered for less traditional models of systems analysis and development. Beforeconcluding, future trends are discussed. Practitioners who read this chapter will be better equipped to improve theirmethodological processes by addressing security requirements in their development efforts.Chapter XXCognitive Perspective on Human-Computer Interface Design ............................................................................... 305Robert Z. Zheng, University of Utah, USALaura B. Dahl, University of Utah, USAJill Flygare, University of Utah, USAThis chapter focuses on the design of human-computer interface, particularly the software interface design, by ex-aminingthe relationship between the functionality and features of the interface and the cognitive factors associatedwith the design of such interface. A design framework is proposed followed by an empirical study to validate someof the theoretical assumptions of the framework. The findings indicate that learners become more perceptually en-gagedwhen a multiple sensory-input interface is used. Our study also shows that building affective interaction at theperceptual level could significantly enhance learners perceptual engagement which further leads them to cognitiveengagement. Guidelines for designing an effective interface are proposed. The significance of the study is discussedwith some suggestions for future study.Chapter XXIFrameworks for Model-Based Design of Enterprise Information Systems ............................................................ 326Mara Nikolaidou, Harokopio University of Athens, GreeceNancy Alexopoulou, University of Athens, GreeceSystem design is an important phase of system engineering, determining system architecture to satisfy specific require-ments.System design focuses on analyzing performance requirements, system modeling and prototyping, definingand optimizing system architecture, and studying system design tradeoffs and risks. Modern enterprise informationsystems (EIS) are distributed systems usually built on multitiered client server architectures, which can be modeledusing well-known frameworks, such as Zachman enterprise architecture or open distributed processing referencemodel (RM-ODP). Both frameworks identify different system models, named views, corresponding to discretestakeholders perspectives, specific viewpoints, and could serve as a basis for model-based system design. The mainfocus of this chapter is to explore the potential of model-based design for enterprise information systems (EIS). Tothis end, the basic requirements for model-based EIS design are identified, while three alternative approaches arediscussed based on the above requirements, namely, rational unified process for systems engineering (RUP SE),UML4ODP and EIS design framework.Chapter XXIIOn the Design of Multiagent, Context-Aware and Mobile Systems ....................................................................... 357Tagelsir Mohamed Gasmelseid, King Faisal University, Saudi ArabiaThis chapter addresses the software engineering dimensions associated with the development of mobile and con-text-aware multiagent systems. It argues that despite the growing deployment of such systems in different applica-tiondomains little has been done with regards to their analysis and design methodologies. The author argues that 19. the introduction of mobility and context awareness raises three main challenges that deserve a paradigm shift: thechallenge of information integrity, service availability on mobile devices, and the complexity of decision modeling.Because they reflect different operational and procedural dimensions, the author argues that the conventional softwareengineering practices used with intelligent systems that possess other agency qualities need to be re-engineered.The chapter emphasizes that the envisioned methodology should reflect a thorough understanding of decision en-vironments,domains representation, and organizational and decision-making structures. Furthermore, the chapterprovides a description for the appropriate enablers necessary for integrated implementation.Chapter XXIIIModern Design Dimensions of Multiagent CSCW Systems .................................................................................. 371Tagelsir Mohamed Gasmelseid, King Faisal University, Saudi ArabiaThis chapter introduces and investigates the applicability of the multiagent paradigm for engineering and develop-ingCSCW systems with the aim of advocating modern design dimensions and software engineering implications.It argues that the use of multiagent systems can significantly improve and enhance the functionalities of computersupported work systems. To meet such an objective, the chapter raises the importance of revisiting the context anddomain of CSCW in accordance with the growing organizational transformations, situational shifts, and technologicaldevelopments. While such changes are motivating group collaboration, the information systems that support themmust be powerful. The author believes that because of their specific limitations and the continuous changes in thecollaboration environment, there is an urgent importance of using thorough system-oriented approaches to address theway they evolve. Furthermore, the chapter draws a framework for the use of the multiagent paradigm to understandand deploy CSCW systems by adopting an integrated context of analysis that improves our general understandingabout their potentials.Section VObject Oriented DevelopmentChapter XXIVClass Patterns and Templates in Software Design .................................................................................................. 388Julio Sanchez, Minnesota State University, Mankato, USAMaria P. Canton, South Central College, USAThis chapter describes the use of design patterns as reusable components in program design. The discussion includesthe two core elements: the class diagram and examples implemented in code. The authors believe that althoughprecanned patterns have been popular in the literature, it is the patterns that we personally create or adapt that aremost useful. Only after gaining intimate familiarity with a particular class structure will we be able to use it in anapplication. In addition to the conventional treatment of class patterns, the discussion includes the notion of a classtemplate. A template describes functionality and object relations within a single class, while patterns refer to structuresof communicating and interacting classes. The class template fosters reusability by providing a guide in solving aspecific implementation problem. The chapter includes several class templates that could be useful to the softwaredeveloper.Chapter XXVHibernate: A Full Object Relational Mapping Service ........................................................................................... 433Allan M. Hart, Minnesota State University, Mankato, USAThis chapter presents a brief overview of the object/relational mapping service known as Hibernate. Based on workprovided in the book Java Persistence with Hibernate, it is argued that the paradigm mismatch problem consists of fiveproblems: the problem of granularity, the problem of subtypes, the problem of identity, the problem of associations,and the problem of data navigation. It is argued that Hibernate, if it is to be considered a successful object/relational 20. mapping service, must solve the paradigm mismatch problem and, hence, each of the five problems noted above. Asimplified version of an order entry system is presented together with the mapping files required to store persistentobjects to a database. Examples are given for one-to-one, one-to-many, and many-to-many mappings. The distinctionbetween value and entity types is explained and the mapping technique required for value types is introduced into theorder entry system application. The n+1 selects problem is explained and a strategy for solving that problem usingHibernates support for lazy, batch, and eager fetching strategies is discussed.Section VIDesign ApplicationsChapter XXVIPattern Based Video Coding ................................................................................................................................... 469Manoranjan Paul, Monash University, AustraliaManzur Murshed, Monash University, AustraliaPeoples demands are escalating with technology advances. Now, people are not happy with only text or voice mes-sages,they like to see video as well. Video transmission through limited bandwidth, for example, an existing tele-phoneline, requires an efficient video coding technique. Unfortunately, existing video coding standards have somelimitations due to this demand. Recently, a pattern-based video coding technique has established its potentiality toimprove the coding compared to the recent standard H.264 in the range of low bit rates. This chapter describes thistechnique with its background, features, recent developments, and future trends.Chapter XXVIIDigital Watermarking for Digital Rights Management ........................................................................................... 484Farid Ahmed, The Catholic University of America, USACecilia Gomes, The Catholic University of America, USAWith the remarkable growth of Internet and multimedia applications, production and distribution of digital mediahas become exceedingly easy and affordable. Applications such as distance education, e-commerce, telemedicine,digital library, and live audio/video broadcast activities require distribution and sharing of digital multimedia contents.Consequently, maintaining the quality of service of the applications and the rights of the content owner as well asenforcing a viable business model among the producer, consumer, and distributor of digital contents has become anincreasingly challenging task, leading to a contentious area called digital rights management (DRM). This chapterpresents how digital watermarking (DWM) technology can addresses part of this DRM problem of secure distribu-tionof digital contentsChapter XXVIIISupport Vector Machine: Itself an Intelligent Systems ........................................................................................... 501A. B. M. Shawkat Ali, Central Queensland University, AustraliaFrom the beginning, machine learning methodology, which is the origin of artificial intelligence, has been rapidlyspreading in the different research communities with successful outcomes. This chapter aims to introduce for systemanalysers and designers a comparatively new statistical supervised machine learning algorithm called support vectormachine (SVM). We explain two useful areas of SVM, that is, classification and regression, with basic mathematicalformulation and simple demonstration to make easy the understanding of SVM. Prospects and challenges of futureresearch in this emerging area are also described. Future research of SVM will provide improved and quality accessto the users. Therefore, developing an automated SVM system with state-of-the-art technologies is of paramountimportance, and hence, this chapter will link up an important step in the system analysis and design perspective tothis evolving research arena. 21. Section VIIMedical ApplicationsChapter XXIXHybrid Data Mining for Medical Applications ....................................................................................................... 523Syed Zahid Hassan, Central Queensland University, AustraliaBrijesh Verma, Central Queensland University, AustraliaThis chapter focuses on hybrid data mining algorithms and their use in medical applications. It reviews existingdata mining algorithms and presents a novel hybrid data mining approach, which takes advantage of intelligent andstatistical modeling of data mining algorithms to extract meaningful patterns from medical data repositories. Varioushybrid combinations of data mining algorithms are formulated and tested on a benchmark medical database. Thechapter includes the experimental results with existing and new hybrid approaches to demonstrate the superiority ofhybrid data mining algorithms over standard algorithms.Chapter XXXMachine Learning for Designing an Automated Medical Diagnostic System ....................................................... 544Ahsan H. Khandoker, University of Melbourne, AustraliaRezaul K. Begg, Victoria University, AustraliaThis chapter describes the application of machine learning techniques to solve biomedical problems in a varietyof clinical domains. First, the concept of development and the main elements of a basic machine learning systemfor medical diagnostics are presented. This is followed by an introduction to the design of a diagnostic model forthe identification of balance impairments in the elderly using human gait pattern, as well as a diagnostic modelfor predicating sleep apnoea syndrome from electrocardiogram recordings. Examples are presented using supportvector machines (a machine learning technique) to build a reliable model that utilizes key indices of physiologicalmeasurements (gait/electrocardiography [ECG] signals). A number of recommendations have been proposed forchoosing the right classifier model in designing a successful medical diagnostic system. The chapter concludes witha discussion of the importance of signal processing techniques and other future trends in enhancing the performanceof a diagnostic system.Chapter XXXIAchieving Effective Health Information Systems .................................................................................................. 560Jim Warren, University of Auckland, New ZealandKaren Day, University of Auckland, New ZealandMartin Orr, University of Auckland, New ZealandIn this chapter we aim to promote an understanding of the complexity of healthcare as a setting for information systemsand how this complexity influences the achievement of successful implementations. We define health informaticsand examine its role as an enabler in the delivery of healthcare. Then we look at the knowledge commodity cultureof healthcare, with the gold standard of systematic reviews and its hierarchy of evidence. We examine the differentforms of quantitative and qualitative research that are most commonly found in healthcare and how they influence therequirements for health information systems. We also examine some domain-specific issues that must be consideredby health information systems developers, including those around clinical decision support systems and clinical clas-sificationand coding systems. We conclude with a discussion of the challenges that must be balanced by the healthsystems implementer in delivering robust systems that support evidence-based healthcare processes. 22. Chapter XXXIITrends and Prospects of Telemedicine .................................................................................................................... 584A.H.M. Razibul Islam, Macquarie University, AustraliaRashida Begum, Eminence Associates, BangladeshA. B. M. Shawkat Ali, Central Queensland University, AustraliaRecent development in telecommunication and information technologies came up with several technology options fortelemedicine applications in hospitals and for medics for quality healthcare to patients. The research trends thereforeneed to be addressed for the proper deployment of technologies in a clinical setting or in a telemedicine environmentwith the adaptive compromise of technology and suitability. In this chapter, along with a description of the researchtrends and system design issues concerned with telemedicine, a mobile telemedicine system architecture and designhave been proposed. Other current telemedicine technology options and prospects and challenges of future researchin this emerging area are also described to indicate the possible future research challenges. Research in telemedicineis a future to provide improved and quality access to the healthcare professionals and patients. Therefore, developingtelemedicine systems with state-of-the-art technologies is of paramount importance and hence, this chapter wouldlink up an important step in system analysis and design perspective to this evolving research arena.Section VIIIEducational ApplicationsChapter XXXIIIKnowledge-Based Characterization of Test Questions ........................................................................................... 609Javed Khan, Kent State University, USAManas Hardas, Kent State University, USAThe recent advances in knowledge engineering entail us to represent knowledge associated with a course in an ex-pressiveyet computable format as a hierarchical prerequisite relation-based weighted ontology. A schema called thecourse concept dependency schema written in Web ontology language (OWL) is designed to represent the prereq-uisiteconcept dependency. The knowledge associated with educational resources, like the knowledge required foranswering a particular test question correctly, can be mapped to subgraphs in the course ontology. A novel approachfor selectively extracting these subgraphs is given and some interesting inferences are made by observing the clus-teringof knowledge associated with test questions. We argue that the difficulty of a question is not only dependenton the knowledge it tests but also the structure of the knowledge it tests. Some assessment parameters are defined toquantify these properties of the knowledge associated with a test question. It is observed that the parameters are verygood indicators of question difficulty.Chapter XXXIVInformation Systems Curriculum Design Processes ............................................................................................... 628Paulette Alexander, University of North Alabama, USACarol Gossett, University of North Alabama, USAThe process of designing a university curriculum in the information systems discipline needs to follow many of thesame processes that professional systems analysts use. Of concern are the product, the stakeholders, the drivers,and the methods; indeed, an information systems curriculum is an information system. This chapter presents a casestudy of one small regional universitys efforts to create an updated information systems curriculum addressing thechallenges of curriculum development using the framework of the very systems analysis and design course contentthat the students are expected to learn. The chapter identifies each component of the information system curriculumand details the processes supporting each development step along the way, from problem identification to systemoperation and support. This case study presents a cohesive approach to dealing with the many pressures associatedwith information systems curriculum development and might be instructive for curriculum development in otherdisciplines as well. 23. Chapter XXXVRedesigning a SAD Course to Promote Problem-Based Learning ......................................................................... 642Ann M. Quade, Minnesota State University, Mankato, USAThis chapter reports on the design, development, and implementation of a hybrid introductory systems analysis anddesign (SAD) semester long course taught at the junior/senior level. Five online instructional modules that focus onstudent-centered, problem-based learning (PBL) were developed. Each module parallels and reinforces the classroomsession content. The classroom seat-time saved by having students study and complete online materials providesthe instructor and students with additional time for face-to-face and electronic discussions. To further encourage PBLthroughout the semester, students use an iterative approach to the SAD life cycle to analyze, design, and implementa prototypic solution to a real world problem presented by the authentic client. The use of a learning managementsystem allows the client to participate in the course throughout the semester regardless of the physical distance be-tweenthe students and the client. Instructor experiences, hybrid module development strategies, and a summary ofstudent and client feedback are included.About the Contributors ........................................................................................................................................ 655Index ................................................................................................................................................................... 665 24. xxivPrefaceMethodical and well-planned analysis and design is a key factor in the successful development, implementation, andefficient use of any system. With explosive growth of computer-based systems in diverse application areas, appro-priateand additional application-specific methods of analysis and design are emerging. New approaches are beingdeveloped and new ways of utilizing older and new techniques are being constantly reviewed. In such an ever-evolv-ingenvironment the practitioners, educators, researchers, and professionals of a discipline need access to the mostcurrent information about the methodologies, concepts, issues, trends, tools, and techniques in systems analysis anddesign. The Handbook of Research on Modern Systems Analysis and Design Technologies and Applications will bea useful source for comprehensive coverage and definitions of related topics, providing evolution of systems analysisand design methodologies and practices with insight into the comparative study of general and application-specificanalysis and design approaches.This book has 35 chapters divided into eight broader areas: System development methodologies Modeling processes Agile software development System design and considerations Object oriented development Design applications Medical applications Educational applicationsThe following paragraphs are intended to put together the abstracts from the chapters in this book that will providean overview of the topics covered.System Development Methodologies: The ever-growing business needs in large organizations demand forcomplex, but flexible, scalable, extensible, and forward-thinking technical solutions. To effectively manage the ar-chitectureassets and design top-quality IT solutions in a diverse environment the highly structured methodologiesare of critical importance to achieve an array of goals, such as separate concerns, divide responsibilities, encapsulatethe complexity, utilize patterns, leverage best practices, control quality, ensure compliance, and establish executionprocesses. Chapter I discusses the solutions architecting method (SAM), which is defined as a methodical approachto dealing with the architecture complexity of enterprise information systems in IT solution designs. It consists ofeight interconnected modules: framework for e-business architecture and technology, prescriptive artineering proce-dure,technology architecture planning, architecture stack and perspectives, rapid architecting process, architecturereadiness maturity, generic application platform, and tao of IT development and engineering. Best practice and les-sonslearned as well as future trends are discussed in the context. Chapter II presents a new high level methodologyfor the analysis and design of information systems, specifically to support routine action at the operational level oforganizations. A brief case study illustrates how using the methodology can sensitize the analyst to opportunities toincrease human efficiency and effectiveness through lighter weight information systems. Chapter III introduces anassembly-based method engineering approach for constructing situational analysis and design methods. It is sup-portedby a metamodelling technique, based on UML activity and class diagrams. Chapter IV focuses on the analysis 25. xxvand design issues and techniques for the location-based service (LBS). It also presents the architecture and databasedesign issues in LBS systems and studies the performance of an LBS system and evaluates its properties. ChapterV aims to identify important research questions in PM-SDLC formulated for software-intensive systems. ChapterVI is an effort to synthesize accumulated knowledge through developing a review of the types of requirements,processes, activities, and techniques used in software systems development. Analysis and synthesis of such findingspermit to posit a generic requirements engineering process. Chapter VII is an attempt to theoretically analyze theantecedents of individual attitude toward improvisation by looking at the information systems development domain,while Chapter VIII discuses design and analysis methods, techniques, and issues related to decision support systems(DSS). Chapter IX takes a closer look at project management, highlighting the major existing risk factors and somemeasures facing project management practices. It also evaluates the unique issues in delivering projects broughtabout by globalization. Chapter X focuses on decision-making rules for investing in reuse frameworks and attemptsto determine the parameters that should be taken into account in decisions relating to degrees of reusability. Two newmodels, a restricted model and a nonrestricted model, used for decisions-making relating to reusability are presented,analyzed, and discussed. Chapter XI presents three alternatives for structuring static tables and provides algorithmsfor construction. It also provides simple guidelines for choosing among the strategies. Chapter XII argues that theevolution, analysis, and design of the application software representing higher level concepts cannot be deduced fromthe underlying concepts, which are valid on a lower level of abstractions.Modeling Processes: Model driven architecture (MDA), rapid application development (RAD), adaptive de-velopment,extreme programming (XP), and others have resulted in a shift from the traditional waterfall model.Unified modeling language (UML) was created by the convergence of several well-known modeling methodologies.Chapter XIII reviews the UML evolution (UML2, xUML), and outlines criteria and requirements to evaluate UMLand xUML. It discusses the potentials and limitations that impose restrictions on it to completely fulfill the visionof software development through a continuous exactable modeling process. Chapter XIV discusses the dynamicessential modelling of organization (DEMO), which is a typical language for modelling business processes and theUML, which is a predominant language for information systems modelling. It also challenges the assumption of theirincompatibility by providing a framework for the integration of these languages. Chapter XV provides an overviewof business process management and business process modeling in a comprehensive way such that academics andpractitioners can use it as a reference for identifying more specialized works.Agile Software Development: Agile development emphasizes the relationship and communality of softwaredevelopers as opposed to a universally applicable methodology for software and systems development. Chapter XVIhypothesize that an agile method can be created from method fragments, once those fragments have been identifiedand appropriately documented. It identifies and documents the method fragments that conform to an underpinningmetamodel (AS4651) and that support a range of agile methods, including XP, Crystal, Scrum, ASD, SDSM, and FDD.An important part of any such research is the validation phase. This is described in Chapter XVII, where four agilemethods are recreated from the fragments in the newly enhanced OPEN process framework (OPF) method base.System Design and Considerations: The design and the maintenance of data management environments aredriven primarily by technical and functional requirements. Chapter XVIII suggests that economic considerations,such as the utility gained by the use of data resources and the costs involved in implementing and maintaining them,may significantly affect data management decisions, and accordingly proposes an analytical framework for analyzingutility-cost tradeoffs and optimizing design. Chapter XIX emphasizes identifying security risks and documentationrequirements from the very early stage in the development life stage, which is vital for the design, use, and mainte-nanceof data, and the information system that manages it. It argues that practitioners will be able to improve both thesecurity and the overall quality of computerized information systems by paying attention toward improving securitywith automated tools, performing abuse cases, tracing security requirements, holding regular security reviews, con-ductingcertification and accreditation, and developing security response processes.Chapter XX focuses on the design aspects of human-computer interface by examining the relationship betweenthe functionality and features of the interface and the cognitive factors associated with the design of such interface.It proposes a framework and guidelines for designing an effective interface. Chapter XXI explores the potential ofmodel-based design for enterprise information systems (EIS) and identifies the basic requirements for model-basedEIS design. It discusses the RUP SE, UML4ODP, and EIS design framework based on the above requirements. 26. xxviThe significant advances exhibited in the field of mobile and wireless information systems have resulted intoa rapid proliferation of mobile information devices and considerable improvement in their capabilities. ChapterXXII addresses the software engineering dimensions associated with the development of mobile and context-awaremultiagent systems, while Chapter XXIII introduces and investigates the applicability of the multiagent paradigmfor engineering and developing CSCW systems with the aim of advocating modern design dimensions and softwareengineering implications.Object Oriented Development and design patterns: Chapter XXIV describes the use of design patterns as re-usablecomponents in program design, while Chapter XXV introduces Hibernate, which is described as a powerful,high performance object/relational persistence and query service.Design Applications: With the remarkable growth of the Internet and multimedia applications, the produc-tion,distribution, and transmission of digital media are gaining importance. With increasing demand of video, itstransmission through limited bandwidth media requires efficient video coding techniques. Chapter XVI describesthe background, features, recent developments, and future trends of a pattern-based video coding technique that hasrecently established its potentiality to improve coding compared to the standard H.264 in the range of low bit rates.Chapter XVII discusses the issue of secure distribution of digital contents maintaining the quality of service of theapplications and the rights of the content owner as well as enforcing a viable business model among the producer,consumer, and distributor of digital contents. Chapter XVIII deals with the development of an automated supportvector machine (SVM) system with state-of-the-art technologies.Medical Applications: Chapters XXIX to XXXII discuss tools, design, and trends in medical applications devel-opment.The first chapter focuses on hybrid data mining algorithms and their use in medical applications. It includesexperimental results with existing and new hybrid approaches to demonstrate the superiority of hybrid data miningalgorithms over standard algorithms. The next chapter describes the application of machine learning techniques tosolve biomedical problems in a variety of clinical domains. Chapter XXXI provides an understanding of the complexityof healthcare as a setting for information systems and how this complexity influences the achievement of successfulimplementations. It discusses the challenges that must be balanced by the health systems implementer in deliveringrobust systems that support evidence-based healthcare processes. The next chapter discusses research trends andsystem design issues of telemedicine and proposes a mobile telemedicine system architecture and design.Educational Applications: Chapters XXXIII to XXXV introduce design and analysis concepts in educational ap-plications.Chapter XXXIII discusses the course concept dependency schema using Web ontology language (OWL)to represent the prerequisite concept dependency. The next chapter argues that an information systems curriculum isan information system, and, as such, design of a university curriculum in the information systems discipline needsto follow many of the same processes that professional systems analysts use. The last chapter reports on the design,development, and implementation of a hybrid introductory systems analysis and design (SAD) course.As is evident from the above collection of the abstracts, many different audiences can make use of this book.Contributions to this publication have been made by scholars from around the world with notable research portfo-liosand expertise. Provocative ideas from the methodologies, applications, case studies, and research questions indifferent chapters from different aspects will make it instrumental in providing researchers, scholars, students, andprofessionals access to current knowledge related to systems analysis. Even a casual reader may benefit from it bygetting broader understanding of the design and analysis terminologies and concepts.Mahbubur Rahman SyedSharifun Nessa SyedEditors 27. xxviiMahbubur Rahman Syed is currently a professor of Information Systems and Technology at Minnesota State University,Mankato (MSU). He has about 25 years of experience in teaching, in industry, in research and in academic leadership in thefield of computer science, engineering, information technology and systems. Earlier he worked in the Electrical and ComputerEngineering Department at the North Dakota State University, in the School of Computing and Information Technology, MonashUniversity in Australia, in the Department of Computer Science and Engineering in Bangladesh University of Engineering andTechnology (BUET) in Bangladesh and Ganz Electric Works in Hungary. He was a founding member of the Department of ComputerScience and Engineering at BUET and served as Head of the Department during 1986-92. He served as the general secretary ofBangladesh Computer Society and also as the General Secretary of BUET Teachers Association. He received the UNESCO/ROS-TSCA85 award for South and Central Asia region in the field of Informatics and Computer Applications in Scientific Research.He won several other awards. He has co-edited several books in the area of e-commerce, software agents, multimedia systemsand networking. He guest edited the 2001 fall issue of IEEE multimedia. He has more than 100 papers published in journalsand conference proceedings. He has been serving in different roles such as co-editor-in chief, associate editor, editorial reviewcommittee, member of several international journals. Syed has been involved in international professional activities includingorganizing conferences and serving as conference and program committee chair.Sharifun Nessa Syed is currently teaching Management Information Systems as an adjunct in the Department of Managementat Minnesota State University, Mankato. She also taught at other educational institutions that include the South Central Techni-calCollege in Mankato, Rasmussen College in Mankato and BRAC University in Bangladesh. She worked as a consultant in theCanadian International Development Authority (CIDA) in Dhaka. She also worked as an assistant chief in the Planning Commis-sionof the Government of Bangladesh. She completed her masters degree in economics from Dhaka University in Bangladesh,Masters of Business from Monash University in Australia and Bachelors in Computer and Information Sciences from MinnesotaState University, Mankato. She also completed a post graduate diploma in Urban and Regional Planning under a joint programbetween BUET (Bangladesh) and AIT (Bangkok, Thailand). She has publications in the area of IT, economic analysis, resourcemobilization and administration. 28. xxviiiAcknowledgmentMany people deserve credit for the successful publication of this book. We express our sincere gratitude to each ofthe chapter authors in this book, who contributed and expanded all the ideas mentioned above and made their ex-pertiseavailable in bringing this book to fruition. Our sincere thanks to the many colleagues and authors who havecontributed invaluable suggestions in their thorough reviews of each chapter. Support from colleagues and staff inour respective departments, that is, the Department of Information Systems and Technology and the Department ofManagement at Minnesota State University Mankato, helped sustain our continued interest. A special note of thanksgoes to all staff at IGI Global, whose contribution throughout the whole process from inception of the initial idea tofinal publication has been invaluable.Mahbubur Rahman SyedSharifun Nessa SyedEditors 29. Section ISystem DevelopmentMethodologies 30. Chapter ITowards a Systematic Methodfor Solutions ArchitectingTony C. ShanBank of America, USAWinnie W. HuaCTS Inc., USAAbstrActSolutions architecting method (SAM) is defined as a methodical approach to dealing with the architecturecomplexity of enterprise information systems in IT solution designs. This comprehensive method consistsof eight interconnected modules: framework for e-business architecture and technology, prescriptiveartineering procedure, technology architecture planning, architecture stack and perspectives, rapid archi-tectingprocess, architecture readiness maturity, generic application platform, and Tao of IT development& engineering. Collectively, these modules form a holistic discipline guiding the process of developingarchitected solutions in an enterprise computing environment. Several unconventional concepts and think-ingstyles are introduced in this overarching structure. This systematic method has been customized andadapted to be extensively applied in one form or another to develop various IT solutions across a broadrange of industrial sectors. Reference solutions are presented and articulated to illustrate the exemplaryimplementations of some key elements in SAM. Best practice and lessons learned as well as future trendsare discussed in the context.INtrODUctIONThe e-business models in todays fast-paced on-de-mandbusiness world mandate increasing flexibilityof information systems applications. It is compul-soryfor the information technology (IT) group toprovide a higher level of services at a lower costfor the business to compete and succeed in a glo-balizedeconomy. The reality is that IT must buildmore complicated, flexible, scalable, extensible, andforward-thinking technical solutions, to satisfy theever-growing business needs.In large organizations like worldwide financialinstitutions, virtually hundreds, if not thousandsof IT applications and systems have been built,acquired, or purchased through the years, to provideboth external customers and internal employees withCopyright 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited. 31. Towards a Systematic Method for Solutions Architectingreliable electronic services, utilizing heterogeneoustechnologies and architectures to satisfy diversefunctional requirements from different lines of busi-ness.In the financial services industry, the bankingbusiness processes generally involves differentbusiness divisions that address retail, commercial,investment, wealth management, treasury, andcapital markets. In particular, services are deliv-eredvia different channels. To effectively managethe architecture assets and design top-quality ITsolutions in such a diverse environment, a highlystructured methodology is of critical importanceto achieve an array of goalsseparate concerns,divide responsibilities, encapsulate the complex-ity,utilize patterns, leverage best practices, controlquality, ensure compliance, and establish executionprocesses.bAcKGrOUNDThe computing paradigm has gone through severalgenerations of evolution in the last five decades:monolithic, client/server, multi-tier, structured meth-ods,object-oriented, component-based, service-ori-ented,and event-driven model. The overall solutionarchitecture has become increasingly complicatedand thus hardly manageable through a traditionalwaterfall process. Previous work over the past fewyears has strived to address the complexity issuein the architecture design and process. A pioneereffort in this space was the Zachman framework(Zachman, 1987), which is a logical structure toclassify and organize the descriptive representationsof an enterprise computing environment, whichare important to the development of the enterprisesystems and the enterprise management. In a formof a two-dimensional matrix to symbolize the en-terprisearchitecture environments, it has achieveda substantial level of penetration in the domainof business and information systems architectureas well as modeling. Though it is primarily usedas a planning or problem-solving tool, it tends toimplicitly align with data-driven and process-de-compositionmethods and processes, and it operatesabove and across the individual project level. Asimilar approach is taken in the extended enterprisearchitecture framework (E2AF) (IEAD, 2004)with a scope of aspect areas containing business,information, system, and infrastructure in a 2-Dmatrix. Rational unified process (RUP) (Kruchten,2003) overcomes these shortcomings by taking ause-case driven, object-oriented and component-basedapproach, using a standard notationunifiedmodeling language (UML). The concept of 4+1views offers multi-perspective interpretations ofthe overall system structure. RUP is more process-oriented,and to some extent is a waterfall approach.RUP has little to address software maintenance andoperations, and lacks a broad coverage of physicaltopology and development/testing tools. It generallyoperates at the individual project level. Enterpriseunified process (EUP) (Nalbone, 2005) attempts toextend the RUP to cover the entire IT lifecycle. Anopen source unified process (OpenUP/Basic) is alsounder development in Eclipse (OpenUP, 2007).Another heavyweight approach, the open grouparchitecture framework (TOGAF) (Open Group,2007), is a comprehensive framework with a setof supporting tools for developing an enterprisearchitecture to meet the business and informationtechnology needs of an organization. The threecore parts of TOGAF are architecture developmentmethod (ADM), enterprise architecture continuum,and resource base. The scope of TOGAF covers busi-nessprocess architecture, applications architecture,data architecture, and technology architecture.All these approaches are heavyweight method-ologies,which require a fairly steep learning curveto get started. On the other hand, model-driven ar-chitecture(MDA) (OMG, 2007) takes a lightweightapproach. MDA aims to separate business logic orapplication logic from underlying platform technol-ogy.The core of MDA is the platform-independentmodel (PIM) and platform-specific model (PSM),which provide greater portability and interoper-abilityas well as enhanced productivity and main-tenance.The primary focus of MDA is on softwaremodeling in the development life-cycle process.Quite a few agile methods are available suchas extreme programming (XP), dynamic systemsdevelopment method (DSDM), agile modeling(AM), feature driven development (FDD), crystal,adaptive software development (ASD), scrum, and 32. Towards a Systematic Method for Solutions Architectingtest-driven design (TDD). Agile methods typically fitwell with small- or medium-size projects developedby highly-skilled people. It is noteworthy that inDSDM (DSDM, 2007) time is fixed for a project,and resources are fixed as far as possible. The con-sequenceof these restrictions in DSDM is that therequirements have to be allowed to change.In the business process management (BPM)space, the business process management initiative(BPMI) organization (BPMI, 2007) has been work-ingto develop open, complete, and royalty freeXML-based BPM standards such as business pro-cessmodeling language (BPML), business processmodeling notations (BPMN), and business processquery language (BPQL), but there have been onlya handful of implementations so far. The businessprocess execution language (BPEL) is specified bythe OASIS group and has been gradually endorsedby many vendors. The extended business modelinglanguage (xBML) (Business Genetics, 2007) differsfrom other approaches in that it dissects the busi-n