The Types Of Uml Diagram

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

1 INTRODUCTION:

Unified Modeling Language (UML) modeling language which includes a set of graphic notation techniques to create visual models of object-oriented software-intensive systems in the field of software engineering. Unified Modeling Language (UML) combines techniques from object modeling, and component modeling and data modeling , business modeling (work flows). It can be used with all processes, throughout this life cycle of a software development, and across different implementation technologies.

1.1 TYPES OF UML DIAGRAM:

There are 14 different UML diagrams, which are divided into 2 main categories. They are structural and behavioral diagrams, and further in behavioral diagrams, which interact with the actor, more are classified into an interaction category. Their hierarchical diagram is as shown below.

800px-Uml_hierarchie_des_diagrammes

Fig 1.0 UML diagram hierarchy

Here we are going to have a brief description of only three of them, they are

1.1.1 Use Case Diagram

1.1.2 Class Diagram

1.1.3 Sequence Diagram

Use Case Diagram:

These are classified under behavioral diagrams of UML diagrams. Use case diagrams describes the behavior of the target system from an external point of view. Use cases describe "the meat" of the actual requirements. A use case describes a sequence of actions that provide something of measurable value to an actor and is drawn as a horizontal ellipse. It mainly consists of two main parts, they are;

Actors. An actor is a representation of the thing in the diagram which interacts with the system, the one who plays the role or interacts with the system. An actor is represented with the diagram as shown below

Associations.  An association is something which is the direction of the actor and the action. Solid lines usually represent associations. These solid lines actually connect the actions and their actor.

UseCase

Fig 1.1 Use Case Diagram

Class diagram

It is the most used UML diagram type. It shows the operation and relationship between each class in a system. Different relationship between diagrams are shown in different arrows. Class Diagrams show the classes of the system, their inter-relationships, and the operations and attributes of the classes. They mainly;

Domains are the main concept which are explored in it.

Analyze all the requirements, by analyzing all the major actions.

Find out all the detail of the subject with the detailed description of the diagram.

classDiagramAggregationComposition

Fig 1.2 Class diagram

Sequence Diagram

A Sequence diagram shows how the object interacts with the actor, and also how long is the action-taking place i.e., it shows the specific amount of time of the action. . It shows how the objects interact with others in a particular scenario of a use case.

sequenceDiagramEnrollInSeminar

Fig 1.3 Sequence Diagram

1.2 PROBLEM SCENARIO

Based on the scenario on the course work the following diagrams have been drawn;

1.2.1 Use case diagram

Fig 1.4 Use case diagram from scenario

There are a total of seven actors, who plays the roles in this diagram. Like there are three types of customers, which includes guest users, registered customers and gold customers each one having their own privileges. For example a gold example is actually a super set of normal customers provided they have additional time for return, extra bonus points, and future product notifications. And on the other side, we have sales executives who keeps in track of the order and their status, the shipping company takes care of the shipping address and the accounting system with the payment credit card details etc.

1.2.2 Class Diagram

Fig 1.5 Class Diagram from scenario

In the above diagram, I have given a simple class diagram of a transaction through online shopping. There are few generalizations like customer is inheriting the property of both normal customer and gold customer, their attributes and operations are listed below. This attribute determines a class classification. The main job in here is done by the processing unit, which keeps in track of all the transactions going within, in turn has the maximum number of attributes and operations to perform. I have avoided complexity in this diagram by removing multiplicity and keeping it simple and easily understandable to the user.

1.2.3 Sequence diagram

Fig 1.6 Sequence Diagram from scenario

The above diagram displays how Ali (customer) makes a transaction through this online shopping network. He always communicates as per the interface through which he sees the system. Here Ali browse through all the products, then requests for one of them, but is denied. Then after a while he requests for the other then gets approved by the stock department. After which he confirms with the shipping department followed by the submission and payment. The amount of time span each action is alive is visible clearly through the diagram.

1.3 INFORMATION SYSTEM:

Information systems are the well structured units made up of both hardware and software networks that state and the society use them for countless purposes. They provide the backbones of the present basic computing and networking in the world. When talking about a computer science field where business models are closely related to the algorithmic processes, this Information system could not be avoided. Combining together all the software, hardware their applications produces a great impact on the society or to the fundamental system. The serious problems caused by the information system, not even the laws and social practices or organizations are establishing a responsibility or accountability over these problems. Though the bugs in this system are impossible to kept aside, but even the minute errors and having least serious problems could cause a very mighty loss to companies when computers become workers and task becoming non-vital for these process. The use of this electronic highly intelligent device could also raise various racial and social inequalities among us. And also taking these computers from office to bed have also increased the rate of cyber crimes and provided rooms for hackers.

1.3.1 Relation between Ethical, Social and Political Issues:

Ethical, social and political issues are related to each other so closely. The social and political debate rising through the information system are the main confusion you face when you are sitting in a commandable position. To understand the impact of the social and political issues in the daily life, we could compare the society with a traffic signal working at its best, like the vehicles and the individuals are maintaining a perfect stream of balance of traffic lights, to stay out of accidents. The whole thing maintains a perfect equilibrium, until someone puts a rookie driver in the middle, which causes all the disturbance accidents and crashes, that the traffic signals is already become a void. So this is the effect brought by information system inside a perfectly saturated equilibrium. These disturbances may be massive or small, which purely depends on the rookie driver. And in this system they are always facing up new things and often called off by old rules. There are institutions, which could prevent the rookie to enter the road, but once he hit the road, it may take years for any organization to bring back the equilibrium, the peace, the state of politically correct altitudes, with apt rules and regulations.

So by the below diagram, you will forced to take actions. In where you will be put in the grey area, The political, social and ethical issues stays right opposite to the Individual, society and polity of the place. It may affect the ones Information’s rights and obligations, Property rights, system quality, accountability and control, the system quality and also the most vital quality of life.

SEPis.jpg

Fig 2.1 Issues in Information System

1.3.2 Ethical Issues:

When we look back into the history, we find that the information system has been paid least important when compared to personal policies and financial integrity by corporate management. But after you went through this chapter you would get to know that the management has done a great mistake by doing so. The main thing is to educate each team member through the policies not only the managers in which the IS covering the human issues related to life. Taking these issues seriously would be great consideration to the ethical issues. As at now many companies like American Express, IBM, Siemens have not provided their employees much awareness to the IS issues, though being un-aware a they cannot much alert to the growing problems. But there are companies which have provided with great study to the information system and spread through their employees, such companies must be appreciated for their effort being done. Five moral dimensions of IS specific set are stated below.

Information rights and obligations

Property rights and obligations

System quality

Quality of life

Accountability and control

That having a code of study to the employees, having covering almost every aspects of information system. System quality provides the basic line of control to which the data quality and the errors are bound , cause all the code conducts error and to provide a set of standard in data quality. Information rights and obligations deals with the topics and creates a code for internet security, workplace mail accounts and employee treatment of corporate information’s. They take care of all the rights that the employee should process in a n institution which are not being obliged. Then of course their must be a team, which takes account of all the company software certificates and hardware licenses the company ownerships and the small firm sand places they contain. Their copyrights and relationship with the outside world, are then created a code called property rights an obligations. And also their must be a code which takes into account of a individual, their software capability, and hardware association a, their security in information system, quality of life. Audits and responsibility of their team, such check s should be implemented at regular intervals, they are placed inside Accountability and control. Quality of life as we know is to improve our standard of living that is having good relationship with costumers, with enhanced product quality and giving significance to product quantity, customer and team member satisfaction.

fg04_02.gif

Fig 2.2 Nonobvious relationship awareness (NORA)

1.3.3 Ethical Confusions in the World:

Information system a has provided a world in which every aspects run over the other, like bringing new technologies and the public interest casing the ethical dilemma to occur. Now a days the large employment multinational companies are making use of the information system o reduce the working team, and to cop up the speed with the available system. Taking the telephone companies into account there are number of voice recognition available in the public to make use of them, which would replace the customer representative at that post, these recognition software’s could recognize the customer with their speech modulation and their programmed series of questionnaire. Many companies are finding their employment on basis of working on the Internet. Thus there’s a rising debate on this where the values at work are been compromised with the groups lined up on either side. As the company could not be blamed for such an activity, cause in this fast moving world to keep up the pace they need to implement this information system and reduce the workforce, increase the profit to stay in business. The higher level employees may feel guilty to reduce the team member’s and a look into their email, their property values to the c computers to the growing needs. At the present situation has developed as such neither the company nor the employee has been fully satisfied, but their rights has been compromised, with the computers usage instead having a direct talk to the customers.

tb04_01.gif

Fig 2.3 Ethical Fails in Information Systems

1.4 Moral Views OF Information systems:

In each dimension we identify the ethical, social, and political levels of analysis

1.4.1 Freedom and Privacy:

Based on the nature of information freedom and privacy are totally opposite ends

of the information. Privacy of information is protecting information while freedom

of information is the demand of the society in getting the information. When both

freedom and privacy overlap, the conflict fires up.Privacy is the needs of the individuals to be left alone for protecting some information or free from obstructions from other individuals or organizations. Due to this factor privacy should have consideration in this information society. So privacy plays an important role in this competitive and borderless information world. Privacy Protection is an operation of finding suitable balances between privacy and multiple competing interests. While installing or downloading software, many software companies collect the personal information from the user. Information society may be misused this data. The threats of hacking makes it mandatory to give attention to the privacy issues.

Fair Information Practices (FIP) is a group of principles ruling the collection and use of data about individuals. Usually a business or government agency is the record keepers of FIP; collect the required data of the individual to support the transaction who interested in the transaction. The individual needs to maintains an interest in the record, once the information is gathered and the record may not be support other activities without the person’s consent. In 1998, the Federal Trade Commission (FTC) restated and extended the original FIP to provide guidelines for protecting online privacy.

1.4.2 Data Protection:

Data protection mainly tells to make sure of the security of computer-based data from

an unauthorized access from demolish user actions and from computer failures. On

October 25, 1998, A Data Protection Directive went into action in European countries

for managing the personal data processing within the European Union (EU). EU

set some principles for how data processing shall be performed for the protection of

personal data. The companies should inform the people, when they need to collect

the data. The collected data must keep from any potential abuses. Not disclose the data without the permission of consent and should inform the data subjects to the

person who is collecting the data and they have the right to read the information in

the data, and make correction to any incorrect data. The data must use for the purpose

stated in the data and not for other uses. EU members cannot revel the personal data

to other countries, because they do not have the similar protection policies. Working

with the European Commission, the U.S. Department of Commerce developed a safe

harbor framework for U.S. firms. A safe harbor is a private, self-regulating policy

and Which does not include the enforcement and all the government regulations but introducing mechanism to force in meet their objective in the field of legislation.

1.4.3 Troubles faced to Privacy:

New technologies have been imposed into the internet to secure privacy which have become a challenge now. The individual sending a message have no idea the barriers and the protocols the message is going through to reach its target in that complications may occur. Monitoring, capturing, and storing communications that pass through it are all the main capacity of the system. It is possible to record all online activities of literally tens of millions of people, including which online newsgroups or files a person has accessed, which Web sites and Web pages he or she has visited, and it also depends on the respective description of the product which has been purchased. User or an individual have no idea on where this tracking and monitoring had been done, so that any measures be taken from their side to avoid them. The tools used to monitor and enter in to the sea of world wide web has become a criteria of web users now, to offer them a safe and protected browsing. Companies network resources are also monitored by checking their employee data, to explore the research that they have been doing Web retailers now have access to software that lets them "watch" the online shopping behavior of individuals and groups while they are visiting a Web site142 Part One Organizations, Management, and the Networked. In this way, the site can customize its contents for each visitor’s interests. For example, if you purchase a book on the Amazon.com Web site and return later from the same browser, the site will welcome you by name and recommend other books of interest based on your past purchases. DoubleClick, described earlier in this chapter, uses cookies to build its dossiers with details of online purchases and to examine the behavior of Web site visitors. Figure 4-3 illustrates ho cookies work. Web sites using cookie technology cannot directly obtain visitors’ names and addresses.

1.4.4 Technical solutions:

New technologies are available to protect user privacy during interactions with Web sites. Many of these tools are used for encrypting e-mail, for making e-mail or surfing activities appear anonymous, for preventing client computers from accepting cookies, or for detecting and eliminating spyware..

1.4.5 Property rights and Intellectual Property:

Contemporary information systems have severely challenged existing law and social practices that protect private intellectual property. Intellectual property is considered to be intangible property created by individuals or corporations. Information technology has made it difficult to protect intellectual property because computerized information can be so easily copied or distributed on networks. Intellectual property is subject to a variety of protections under three different legal traditions: trade secrets, copyright, and patent law. Trade secrets, copyrights and patents.

fg04_03.gif

Fig 2.4 P3P Working

1.4.6 Increasing Racial and Social Class Cleavages:

The impact of systems technology on various groups in society has not been thoroughly studied. What is known is that information, knowledge, computers, and access to these resources through educational institutions and public libraries are inequitably distributed along ethnic and social class lines, as are many other information resources. The computer has become a part of our lives—personally as well as socially, culturally, and politically



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now