Please enable JavaScript.
Coggle requires JavaScript to display documents.
PSM - Coggle Diagram
PSM
Analysis
Gather data
Survey
Interview
Reports / Documentation
Error logs
Observation
Focus group
Data
Quantitative
Qualitative
Data Integrity
Accuracy
Authenticity
Correctness
Reasonableness
Timeliness
SRS
Functional requirements
Non-functional requirements
Easy to read
Speed
Robust / stable
Attractive
Scope
Constraints
Legal
Economic
Technical
Social
Usability
Effectiveness
Efficiency
Diagrams
DFD (Level 1)
Process
Data flow
Entity
Data store
Context diagram
Level 0
Entities
Data flows
UML
Use Case
Actors
Use cases
Association
Arrows (initiated)
includes
Extends
System boundary
Organisation
Goals
Objectives
Mission statement
System
Goals
Objectives
Design
Generating design ideas
Brainstorming
Mind maps
SCAMPER*
DeBono hats*
Evaluation criteria
Methods
Data dictionary
Variable name
Variable type
Purpose
Mock-up
Object descriptions
(similar to data dictionary)
Object (button, tab, text box)
Event
Function
Psuedocode
Factors
Affordance
Interoperability
Marketability
Security
Usability
User experience
Efficient UI
Fast
Number of clicks / actions
Effective UI
Gives correct results
Gantt charts
Tasks
Time allocation
Dependencies
Milestones
Zero duration
Critical path
Longest path
Methods for recording progress
Adjustments to tasks and timeframes
Annotations
Logs
Managing files and data
Archiving
Backing up
Full
Incremental
Differential
Disposal of files
Security
Storage media
Transmission rates
Organisation of files
Data file types
CSV
XML
Plain text
Legal
Privacy Act 1988
Government
Private business >$3M
Privacy and Data Protection Act 2014 (Vic)
Health Records Act 2001 (Vic)
Copyright 1968
Ethical issues
Security
Risk management strategies
Software auditing
Physical
Locks, bars
Biometrics
Cameras
Logical
Version control
User authentication
Encryption
Software updates
Types of threats
Data breaches
Man in the middle attack
Social engineering
How to protect against these
Web app risks
SQL injection
Cross-site scripting
Viruses / malware
Development
Programming
Classes
Methods
Objects
Control structures
Sequence
Iteration
While... do
Repeat..until
For....
Condition
Functions
Parameters
Instructions
Methods
Click
Select
Drag
Data types
Boolean
Float
Integer
String
Data structures
Associative arrays
Hash tables
Dictionaries
One dimensional arrays
Records
Naming conventions
Hungarian convention
Camel case
Snake case'
Internal documentaion
Sorting
Selection sort
Quick sort
Searching
Binary search
Linear search
Testing
Testing table
Test (input)
Expected result
Actual result
Construction of test data
Trace table
Testing logic
Validation
Existence (1)
Type (2)
Range (3)
Development Models
Agile
Sprints
Easier to make changes (+)
Large teams (+)
Waterfall
Sequential steps (+)
Easier to plan (+)
Can't go backwards (-)
Less client interaction (-)
Spiral
Risk management
Prototype - quickly
Evaluation
Usability
Criteria for evaluation
Effectiveness of security
Impact of ineffective security