Assignment 2FV3
Assignment 2FV3
Student Declaration:
Academic Integrity Statement
In accordance with the HCT Academic Integrity Policy
• Students are required to refrain from all forms of academic integrity breaches as defined and
explained by HCT.
• A student found guilty of having committed acts of academic integrity breach(es) will be
subject to the relevant sanctions as outlined by HCT.
إﻓﺎدة اﻟﻧزاھﺔ اﻷﻛﺎدﯾﻣﯾﺔ
وﻓﻘًﺎ ﻟﺳﯾﺎﺳﺔ ﻛﻠﯾﺎت اﻟﺗﻘﻧﯾﺔ اﻟﻌﻠﯾﺎ ﻟﻠﻧزاھﺔ اﻷﻛﺎدﯾﻣﯾﺔ
. ﻛﻣﺎ ھو ﻣﺑﯾّن وﻣوﺿﺢ ﻓﻲ اﻟﺳﯾﺎﺳﺎت واﻹﺟراءات اﻟﺧﺎﺻﺔ ﺑﻛﻠﯾﺎت اﻟﺗﻘﻧﯾﺔ اﻟﻌﻠﯾﺎ،•ﻋﻠﻰ اﻟطﻠﺑﺔ اﻹﻟﺗزام ﺑﻠواﺋﺢ وﻗواﻋد اﻟﻧزاھﺔ اﻷﻛﺎدﯾﻣﯾﺔ
. ﺳﯾﺗﻌرض اﻟﻰ اﻟﻌﻘوﺑﺎت اﻟﻣوﺿﺣﺔ ﻓﻲ اﻟﺳﯾﺎﺳﺎت ذات اﻟﺻﻠﺔ،•ﻓﻲ ﺣﺎﻟﺔ ارﺗﻛﺎب اﻟطﺎﻟب أي ﺷﻛل ﻣن أﺷﻛﺎل اﻹﺧﻼل ﺑﺎﻟﻧزاھﺔ اﻷﻛﺎدﯾﻣﯾﺔ
This assignment is entirely my own work except where I have duly acknowledged other sources in
the text and listed those sources at the end of the assignment. I have not previously submitted
this work to the HCT, or any other entity. I understand that I may be orally examined on my
submission.
Student (s) Signature: ___________________________________
Student Name(s):
Marks Allocated
Marks Obtained
HCT Policy statement: Alternative Assessment: Any assessment in which the students
know the instructions, questions, requirements, purpose, and grading criteria in advance,
such as portfolios, reports, presentations, projects, etc.
This submission does not allow you to use any AI tool to complete. Any breach of this
requirement will be treated as a plagiarism attempt and shall be subject to the HCT
Academic Integrity Policy.
CIS4913- CAPSTONE PROJECT I
ASSIGNMENT 2
WEIGHT: 25%
AIM:
PROCEDURE:
EACH TEAM WILL RECEIVE CONSTRUCTIVE FEEDBACK ON THIS
ASSIGNMENT FROM THEIR INSTRUCTOR BEFORE THE FINAL SUBMISSSION.
EACH TEAM WILL SUBMIT A REPORT IN A PDF FORMAT ENTITLED
“CAPSTONE ASSIGNMENT2- PROJECT PLANNING”. TO COMPLETE THIS
REPORT, YOU MUST FUNCTION AS A TEAM WITH THE WORKLOAD SPREAD
ACROSS ALL TEAM MEMBERS.
AFTER REPORT SUBMISSION, TEAM MEMBERS WILL PRESENT THEIR WORK
AND WILL BE INTERVIEWED INDIVIDUALLY TO ASSESS THEIR LEVEL OF
CONTRIBUTION AND UNDERSTANDING OF THE ASSIGNMENT.
EACH TEAM MEMBER WILL RECEIVE AN INDIVIDUAL GRADE BASED ON THE
TEAM REPORT (50%) AND HIS OR HER PERFORMANCE DURING THE
PRESENTATION AND INTERVIEW (50%).
OBJ E C TI VE S
The primary objective of this phase is to apply system analysis skills to the user requirements and needs and
create an effective project plan. To achieve this task, you will collaborate with other team members and build
on the findings from your preliminary analysis. During this assignment, you will:
1. Select the development methodology to follow;
2. Refine and specify the user’s needs and requirements using a standard system analysis framework;
3. Define the project plan;
4. Identify, categorize, and classify the risks [Only for Security and Forensics concentration];
5. Communicate professionally with multiple audiences.
RE P OR T FO R MA T G UI DE LIN E S [ 5 0% ]
1. Font. Use black font, 12-point font, double or single line spacing (your choice) and one inch margins.
2. Front Matter. Create a cover page for your report that includes course code and title; assignment title;
project name; all team member names; faculty mentor’s name; client’s name & organization. Your
report must include page numbers on all pages and an automatically generated table of contents, table
of figures, table of tables, and a list of acronyms.
3. Abstract. Write a 100-word abstract that summarizes the rest of the report. Think of it as an Executive
Summary.
4. Introduction. Write a brief introduction describing the purpose of this assignment.
5. Adopted Methodology. Write at most 300 words supported by figures describing the methodology
adopted by the team in the project (examples: Structured, Agile models (Scrum, XP), Iterative &
Incremental models, etc.) that will come down to your goals, the size of the project and your team, and
other factors. Justify your choice. In case you are doing an evaluation type of project, you must describe
your evaluation methodology including the aspects to be evaluated, evaluation criteria, and
methods/techniques to be followed to perform the evaluation.
6. Analysis. Write at least 500 words that thoroughly explain your analysis work. Apply the selected
analysis approach in a deep and thorough manner to the problem, system requirements/constraints
and stakeholder perspectives. Your choice of analysis approach must be consistent with the adopted
methodology. Use a CASE tool (StarUML, Entreprise Architect, etc.) to model the requirements. . This is
the key section of this assignment, be sure to spend a large portion of your time on this topic.
a If a structured methodology and a traditional analysis approach are chosen, the students must
analyze the whole computing-based solution. The analysis model might include context
diagrams, data flow diagrams, Entity Relationship Diagrams; Process Descriptions.
b If an agile or Iterative methodology and O.O approach are chosen, the students do not attempt
to start with a full specification of requirements. Instead, the development begins by
specifying and implementing just part of the computing-based solution, which can then be
reviewed in order to identify further requirements. The analysis model might include a use
case diagram/product backlog, use case descriptions, system sequence diagrams, activity
diagrams, and a domain class diagram
7. Time Management. Use appropriate tools and techniques to develop a schedule for project. Identify
major milestones and use relevant techniques to estimate project duration. Make sure you include
charts and graphs to illustrate/support your findings. Depending on the adopted methodology, use the
work break down structure or user story map to list all significant tasks or deliverables or features.
8. Cost Management. Identify different types of resources to complete the project and estimate their cost
required. Describe and explain the methods used to estimate cost using detailed examples. The
methods should be compliant and coherent with the adopted methodology.
9. Risk Management [Only for Security and Forensics concentration]. Write 200 words describing the
potential project risks. Categorize the risk identified and describe the possibilities/fallback plans you
have considered to mitigate these risks. Compile your findings in a Risk Register.
10. Discussion/Reflection. Write at least 250 words (individually or as a group) where you clarify the
problems and summarize the major challenges the team has identified for this project. List technical
areas that team members must study before they can complete the project. Use appropriate graphics
to enhance your document.
11. References. List your references including refereed journal articles, standards, web sites and verbal
communications with experts. Use the APA referencing format for both inline citations and
bibliography.
PRE SE N TA T ION G UI DE L I N E S [5 0 % ]
Each group is allocated 25-30 minutes: 15-20 minutes for the presentation and an additional 10 minutes for a
question and answer session. Students should use PowerPoint or some other presentation software and alert
the Capstone mentor in advance if they will be using a non-standard presentation software or if they have any
special audio-visual requests.
The presentation must include the following sections.
1. Title of paper (1 slide)
2. Outline of the talk (1 slide)
3. Development Methodology (1 slide)
4. Analysis Approach (1 slide)
5. Analysis outputs
6. Time Management
7. Cost Management
8. Risk management [Only for Security and Forensics concentration]
9. Summary /Discussion (2 slides)
a Summarize major findings
b Discuss implications of findings
c List study limitations and how they were mitigated
d Present next steps of the projects
IMP OR T AN T RE M AR K S
Use the collaborative tool mentioned above to record all tasks, monitor task progress, and keep track of
objectives. Your mentor has full access to this tool, and he/she will use it to assess the collaboration skill of each
student.
RU B RI C
Absent Insufficient (1-59%) Emerging (60-69%) Satisfactory (70-76%) Competent (77-86%) Mastering (87-100%)
(F) (F)
(D/D+/C-) (C/C+) (B-/B/B+) (A-/A)
• Inappropriate Some but not all of the Most but not all of the All of the following: All of the following:
development following: following: • Appropriate development • Appropriate development
methodology is chosen • Appropriate • Appropriate methodology is chosen methodology is chosen
• Inappropriate analysis development development • Appropriate analysis • Appropriate analysis
approach is chosen methodology is methodology is approach is chosen approach is chosen
• • •
CLO 3 - Critical Thinking: Analysis and Evaluation [30%]
Selection rationale is chosen chosen Sound rationale for Rationale for development
not sound • Appropriate analysis • Appropriate analysis chosen development methodology and analysis
• Inconsistency between approach is chosen approach is chosen methodology and analysis approach choice is
the adopted analysis • Sound rationale for • Sound rationale for approach sophisticated & extremely
approach and selected chosen development chosen development • Consistency between the well-developed. Rigor is
diagrams methodology and methodology and adopted analysis evident
• Diagrams contain analysis approach analysis approach approach and selected • Consistency between the
syntactical and • Consistency • Consistency diagrams adopted analysis approach
semantics errors between the between the • No syntactical and and selected diagrams
• Incoherent, adopted analysis adopted analysis semantics errors in the • No syntactical and
incomplete, and approach and approach and defined diagrams semantics errors in the
inaccurate analysis selected diagrams selected diagrams • Coherent, complete, and defined diagrams
model • No syntactical and • No syntactical and accurate analysis model, • Quality of diagrams is
semantics errors in semantics errors in according to the chosen measured and proved
the defined the defined methodology • Well-formed, consistent,
diagrams diagrams coherent, complete, and
• Coherent, complete, • Coherent, complete, accurate analysis model,
Group submission-Report
Analysis and
project completion is following: following: • All activities and • All activities and attributes
Evaluation
• •
Thinking:
presented. Missing All activities and All activities and attributes needed to needed to achieve project
and/or wrong activities attributes needed to attributes needed to achieve project goals are goals are identified and
[10%]
and attributes needed achieve project goals achieve project goals identified and logically logically sequenced
to achieve project goals sequenced
• Minimal use of are identified and are identified and • Duration of all activities is • Duration of all activities is
schedule tools and logically sequenced logically sequenced estimated using estimated using
charts • Duration of all • Duration of all appropriate techniques appropriate techniques
• Sample calculations activities is activities is • All required resources are • All required resources are
demonstrate a estimated using estimated using included and correctly included and correctly
rudimentary appropriate appropriate classified under different classified under different
understanding of techniques techniques types of cost types of cost
selected cost • All required • All required • Sample calculations • Sample calculations
estimation method(s) resources are resources are demonstrate a detailed demonstrate a detailed
• [Only for Security and included and included and understanding of selected understanding of selected
Forensics correctly classified correctly classified cost estimation cost estimation method(s)
concentration] Some under different under different method(s) • Appropriate tools are
potential project risks types of cost types of cost • [Only for Security and utilized to develop a
are identified. Attempt • Sample calculations • Sample calculations Forensics concentration] schedule for project
has been made to rank demonstrate a demonstrate a All potential project risks completion and to
these risks. detailed detailed are identified, accurately compute
Contingencies are understanding of understanding of categorized, and ranked anticipated project cost
either lacking or very selected cost selected cost in a risk register. • [Only for Security and
simplistic. estimation estimation Contingency and fallback Forensics concentration]
method(s) method(s) plans are articulated. All potential project risks
• [Only for Security • [Only for Security are identified, categorized,
and Forensics and Forensics and ranked in a risk
concentration] All concentration] All register. Contingency and
potential project potential project fallback plans are
risks are identified, risks are identified, articulated.
categorized, and categorized, and
ranked in a risk ranked in a risk
register. register.
Contingency and Contingency and
fallback plans are fallback plans are
articulated articulated
• Ideas and evidence are Some but not all of the Most but not all of the All of the following: All of the following:
disorganized, making following: following: • Ideas and evidence are • Ideas and evidence are
relationships unclear • Ideas and evidence • Ideas and evidence sequenced to show logically sequenced to
• No transitions are used, are sequenced to are sequenced to relationships show clear relationships
or are used show relationships show relationships • Transitions connect ideas • Transitions are varied and
CLO 6 - Written Communication [10%]
ineffectively • Transitions connect • Transitions connect • Conclusion, when connect ideas, showing
• Conclusion, when ideas ideas appropriate, follows from clear relationships
appropriate, is absent • Conclusion, when • Conclusion, when and supports the • Conclusion, when
or restates the appropriate, follows appropriate, follows controlling idea appropriate, is logical and
introduction or prompt from and supports from and supports • Student uses proper HCT raises important
• Student does not use the controlling idea the controlling idea structure, format, implications
proper HCT structure, • Student uses proper • Student uses proper referencing • Student uses proper HCT
format, referencing. HCT structure, HCT structure, • Is free of distracting structure & format used,
• Student has an format, referencing format, referencing errors in grammar, usage, including APA referencing.
accumulation of errors • Is free of distracting • Is free of distracting and mechanics • Is free of distracting errors
in grammar, usage, and errors in grammar, errors in grammar, in grammar, usage, and
mechanics that distract usage, and usage, and mechanics
or interfere with mechanics mechanics
meaning
• Communicates with a Some but not all of the Most but not all of the All of the following: All of the following:
limited sense of following: following: • Communicates with a • Communicates with a
audience and purpose • Communicates with • Communicates with clear sense of audience strong sense of audience
(No eye contact, no a clear sense of a clear sense of and purpose (Eye contact, and purpose (holds
body language, and no audience and audience and body language, and attention with the use if
poise) purpose (Eye purpose (Eye poise) direct eye contact, seldom
• •
Individual- Presentation and Interview
with limited clarity • Communicates • Communicates with considerable clarity and ideas with a high
• Uses language with information and information and • Uses language with degree of clarity
limited accuracy and ideas with ideas with considerable accuracy • Uses Language with a high
effectiveness considerable clarity considerable clarity and effectiveness degree of accuracy and
• Tension and • Uses Language with • Uses language with • Makes minor mistakes, effectiveness
nervousness are considerable considerable but quickly recovers from • Student displays relaxed,
obvious; has trouble accuracy and accuracy and them; displays little or no self-confident, with no
recovering from effectiveness effectiveness tensions mistakes
mistakes • Makes minor • Makes minor
mistakes, but quickly mistakes, but quickly
recovers from them; recovers from them;
displays little or no displays little or no
tensions tensions
• Does not participate in • Participates in the • Cooperates with the • Coordinates both • Student coordinates
the task or is so often task, but does not group process, but processes and products processes and products
off-task that he/she cooperate with does not coordinate with those of teammates, with those of teammates
makes no contribution others or with the his or her but does not resolve • Resolves both major and
to the group goal group process contributions with major conflicts minor conflicts effectively
• Participates in those of others • Actively listens • Expresses disagreements
discussions • Listens without • Gives and receives honestly but tactfully
CLO 5 - Collaboration [15%]
• Unable to answer • Able to answer some • Able to answer most • Able to answer all • Able to answer all
Explanation [20%]
questions from the but not all questions but not all questions questions from the questions and
CLO 6 - Critical -
examining board from the examining from the examining examining board demonstrate a complete
board board understanding of the study
Thinking-