首页
网站开发
桌面应用
管理软件
微信开发
App开发
嵌入式软件
工具软件
数据采集与分析
其他
首页
>
> 详细
辅导INFO 2222编程、Python,Java,c++程序语言调试 解析Haskell程序|解析
项目预算:
开发周期:
发布时间:
要求地区:
INFO 2222 Computing 2 Usability and
Security (Final Exam)
Semester 1 – Main, 2020
You are asked to design a desktop web application that enables final exams to be administered
remotely for University of Sydney School of Computer Science. It should mimic a
conventional physical closed book exam as closely as possible. The website should allow
lecturers or examiners to upload a copy of the exam paper or set the questions directly into the
application, set the duration of the exam and invigilate the exam.
The exams at the School usually comes in two question formats – programming questions and
essay questions where students write paragraphs of text that includes equations and code
snippets to explain their answer. A major challenge to online examination is academic
misconduct. This includes, but is not limited to plagiarism, contract cheating and
impersonation. Your proposed design should attempt to minimise the possibility of academic
misconduct without detection.
You should submit a single report answering the questions below. As a report, it should not be
titled with the question titles, however you may find that your sections follow the questions
below. You should submit your report as a single PDF document. Your responses to these
questions are expected to be technical, not merely a high-level overview.
The report should not exceed the word limit of 5000 words. This does not include appendices,
figures and tables. You are not required to reach this word count limit, but you should include
as much detail as you feel is appropriate for the question. Your student identification number
(SID) should be written on the left header of the document. The file should be named [SID].pdf.
Question 1 – Privacy, Usability and Security (20 Marks)
i. Discuss the trade-offs between the security of the invigilation and the privacy of the
students.
ii. Present a scheme that ensures as best as possible that students either cannot cheat, or
will be detected if cheating, while also adhering to the University Privacy Policy, and
the NSW Privacy and Personal Information Protection Act 1998.
iii. Perform PACT analysis on the task of setting, sitting and invigilating for examinations.
a) If there are questions that arises during the analysis, create a list of questions and
explain why these questions are important to the success of the project.
b) Discuss factors that must be considered during design in order to cater the applica-
tion to individual users need and the organizational context.
2
Question 2 – Building the Scheme (10 Marks)
From the PACT Analysis and invigilation requirements:
i. Describe the infrastructure required to support the scheme you have proposed.
Diagrams modelling your system may be helpful here.
ii. Identify all relevant stakeholders.
iii. Within the context of the stakeholders and infrastructure, discuss in detail what
security goals this scheme must fulfil, and what the consequences are of failing to
fulfil them.
Question 3 – User Investigation (15 Marks)
Develop a user investigation plan to understand the context of use (if needed) when a student
sits for a programming exam. You do not need to conduct the investigation session. The inves-
tigation plan must be sufficiently detailed that another person reading the document can exe-
cute the plan and achieve the purpose of the investigation. Details that must be included in the
investigation plan:
Aim of the investigation
Choice of research method
Selection strategy
Number of users
Software/hardware needed to conduct the investigation
Analysis approach. Identify the different types of data expected to be collected and de-
scribe your analysis approach to convert the data into usable information.
If you think that a user investigation is not required, justify your decision and describe steps
that you would have taken to understand the context of use in place of the user investigation
plan.
Question 4 – Design and Design Rules (13 Marks)
Illustrate your initial design to explain to the client a typical student’s journey when he uses
the application to sit for a programming exam.
i. Draw a series of wireframes on paper to illustrate each screen that a student sees during
the task. You can use multiple sheets of paper if required. Make sure each sheet of paper
is labelled accordingly to indicate the sequence of viewing. Embed the sketches into
your report by scanning or taking a picture of them. Please note that the design of the
interface is being assessed in the question and not your drawing skills.
Do not use a prototyping software for this question.
ii. Explain design decisions that you made in your sketches in response to the factors that
you have identified in Question 1.3b.
3
iii. Explain Schneiderman’s Eight Golden Rules in your own words and use your
wireframes as an example of adherence or violation to the rule. If the wireframe violates
the rule, explain how you would fix it by re-sketching that wireframe.
Question 5 – User Evaluation (12 Marks)
Develop a usability test plan. The test plan must be sufficiently detailed that another person
reading the document can execute the plan to achieve the purpose of the conducting the session.
You do not have to conduct the test. Your plan must include:
Aim of the test
Preparation checklist that lists out all the resources needed to conduct the session. In-
clude a short explanation of the purpose of each resource during the test.
Procedures before, during and after the test.
Analysis approach. Identify the different types of data expected to be collected and de-
scribe your analysis approach to convert the data into usable information.
Question 6 – Threats (15 Marks)
Assuming that you have developed a paper prototype for your website and have a model of the
structure of the site:
i. Develop a threat model for the scheme you have proposed
ii. For each threat you should discuss what the threat is, its severity and the probability
with which the threat will occur.
iii. For each page in your paper prototype, consider each of the input fields and what attacks
are possible.
Question 7 – Controls (15 Marks)
For your threat model and attacks discussed in the previous question:
i. Suggest controls to mitigate or eliminate each threat.
ii. For each threat that cannot be mitigated or eliminated, propose controls to detect these
threats.
iii. Discuss any threats that cannot be detected or mitigated.
软件开发、广告设计客服
QQ:99515681
邮箱:99515681@qq.com
工作时间:8:00-23:00
微信:codinghelp
热点项目
更多
代写dts207tc、sql编程语言代做
2024-12-25
cs209a代做、java程序设计代写
2024-12-25
cs305程序代做、代写python程序...
2024-12-25
代写csc1001、代做python设计程...
2024-12-24
代写practice test preparatio...
2024-12-24
代写bre2031 – environmental...
2024-12-24
代写ece5550: applied kalman ...
2024-12-24
代做conmgnt 7049 – measurem...
2024-12-24
代写ece3700j introduction to...
2024-12-24
代做adad9311 designing the e...
2024-12-24
代做comp5618 - applied cyber...
2024-12-24
代做ece5550: applied kalman ...
2024-12-24
代做cp1402 assignment - netw...
2024-12-24
热点标签
mktg2509
csci 2600
38170
lng302
csse3010
phas3226
77938
arch1162
engn4536/engn6536
acx5903
comp151101
phl245
cse12
comp9312
stat3016/6016
phas0038
comp2140
6qqmb312
xjco3011
rest0005
ematm0051
5qqmn219
lubs5062m
eee8155
cege0100
eap033
artd1109
mat246
etc3430
ecmm462
mis102
inft6800
ddes9903
comp6521
comp9517
comp3331/9331
comp4337
comp6008
comp9414
bu.231.790.81
man00150m
csb352h
math1041
eengm4100
isys1002
08
6057cem
mktg3504
mthm036
mtrx1701
mth3241
eeee3086
cmp-7038b
cmp-7000a
ints4010
econ2151
infs5710
fins5516
fin3309
fins5510
gsoe9340
math2007
math2036
soee5010
mark3088
infs3605
elec9714
comp2271
ma214
comp2211
infs3604
600426
sit254
acct3091
bbt405
msin0116
com107/com113
mark5826
sit120
comp9021
eco2101
eeen40700
cs253
ece3114
ecmm447
chns3000
math377
itd102
comp9444
comp(2041|9044)
econ0060
econ7230
mgt001371
ecs-323
cs6250
mgdi60012
mdia2012
comm221001
comm5000
ma1008
engl642
econ241
com333
math367
mis201
nbs-7041x
meek16104
econ2003
comm1190
mbas902
comp-1027
dpst1091
comp7315
eppd1033
m06
ee3025
msci231
bb113/bbs1063
fc709
comp3425
comp9417
econ42915
cb9101
math1102e
chme0017
fc307
mkt60104
5522usst
litr1-uc6201.200
ee1102
cosc2803
math39512
omp9727
int2067/int5051
bsb151
mgt253
fc021
babs2202
mis2002s
phya21
18-213
cege0012
mdia1002
math38032
mech5125
07
cisc102
mgx3110
cs240
11175
fin3020s
eco3420
ictten622
comp9727
cpt111
de114102d
mgm320h5s
bafi1019
math21112
efim20036
mn-3503
fins5568
110.807
bcpm000028
info6030
bma0092
bcpm0054
math20212
ce335
cs365
cenv6141
ftec5580
math2010
ec3450
comm1170
ecmt1010
csci-ua.0480-003
econ12-200
ib3960
ectb60h3f
cs247—assignment
tk3163
ics3u
ib3j80
comp20008
comp9334
eppd1063
acct2343
cct109
isys1055/3412
math350-real
math2014
eec180
stat141b
econ2101
msinm014/msing014/msing014b
fit2004
comp643
bu1002
cm2030
联系我们
- QQ: 9951568
© 2021
www.rj363.com
软件定制开发网!