Requirement methods: a graduate level course that integrates software engineering principles with information systems theory

1988 ◽  
Vol 20 (1) ◽  
pp. 119-123
Author(s):  
Gayle J. Yaverbaum
1998 ◽  
Vol 37 (04/05) ◽  
pp. 518-526 ◽  
Author(s):  
D. Sauquet ◽  
M.-C. Jaulent ◽  
E. Zapletal ◽  
M. Lavril ◽  
P. Degoulet

AbstractRapid development of community health information networks raises the issue of semantic interoperability between distributed and heterogeneous systems. Indeed, operational health information systems originate from heterogeneous teams of independent developers and have to cooperate in order to exchange data and services. A good cooperation is based on a good understanding of the messages exchanged between the systems. The main issue of semantic interoperability is to ensure that the exchange is not only possible but also meaningful. The main objective of this paper is to analyze semantic interoperability from a software engineering point of view. It describes the principles for the design of a semantic mediator (SM) in the framework of a distributed object manager (DOM). The mediator is itself a component that should allow the exchange of messages independently of languages and platforms. The functional architecture of such a SM is detailed. These principles have been partly applied in the context of the HEllOS object-oriented software engineering environment. The resulting service components are presented with their current state of achievement.


2019 ◽  
Vol 14 (1) ◽  
pp. 15-34 ◽  
Author(s):  
Lorraine Lee ◽  
Rebecca Sawyer

ABSTRACT The verification of Information Technology (IT) controls is a core responsibility of IT auditors. This case places the student in the role of an IT auditor assigned to test the operating effectiveness of a specific IT general control: user access management. In addition to learning about IT controls, the case introduces several Excel functions such as VLOOKUP, MATCH, INDEX, and various text functions. The student documents the results of the IT controls tests by completing a testing matrix and writing a memo. General controls, user access management, and Excel applications are all topics taught in Accounting Information Systems (AIS) and Audit courses. As such, instructors can use this case at the undergraduate or graduate level in an IT Audit, Accounting Information Systems, or Audit class.


Author(s):  
Constantinos Constantinides ◽  
George Roussos

This chapter introduces service patterns for SOA-based enterprise systems. The authors believe that the deployment of such patterns would be of considerable value both as a best-practice guide for practitioners as well as a starting point for further research in their role in software engineering. A comprehensive catalog of service patterns is included in this chapter. In the catalog, each pattern is discussed in the context of selected examples and in terms of a brief description of its role, functionality, and deployment. For each pattern there are recommendations on implementation and a practical usage scenario.


2011 ◽  
pp. 1994-2011
Author(s):  
Daniel Carbone

The aim of this chapter is to bridge the gap between what is known about IS theory and the specifics characteristics of health to develop an evidence based health information systems theory. An initial background first sets the significance for the need to have a solid information systems theory in health and then argues that neither the information systems literature nor the health sector have been able to provide any satisfactory pathway to facilitate the adoption of information systems in health settings. The chapter further continues by reviewing the common pathway to develop information systems theory and the knowledge foundations used in the process, and then proceeds to highlight how this theory was developed. Subsequently, the building blocks (constructs, premises, supporting evidence and conclusions) that underpins the constructs and a brief explanation of the relationships between them is included. A discussion and limitation section is then followed by a conclusion.


Sign in / Sign up

Export Citation Format

Share Document