Software Law Essay

1228 words - 5 pages

1 Explain any 3 models used by Software engineers during systems development
a) Reuse-oriented development
Based on systematic reuse where systems are integrated from existing components or COTS (Commercial-off-the-shelf) systems Process stages: Component analysis, Requirements modification, System design with reuse, Development and integration.

Component analysis-Given the requirements specification, a search is made for components to implement that specification. Usually, there is not an exact match
Requirements modification-During this stage, the requirements are analysed using information about the components which have been discovered. They are then ...view middle of the document...

Software design involves identifying and describing the fundamental software system abstractions and their relationships.
Implementation and unit testing- During this stage, the software design is realized as a set of programs or program units. Unit testing involves verifying that each unit meets its specification.

Integration and system testing-The individual program units or programs are integrated and tested as a complete system to ensure that the software requirements have been met. After testing, the software system is delivered to the customer.
Operation and maintenance-Normally this is the longest life-cycle phase. The system is installed and put into practical use. Maintenance involves correcting errors which were not discovered in earlier stages of the life cycle, improving the implementation of system units and enhancing the system’s services as new requirements are discovered.

c) Evolutionary development
An initial system is rapidly developed from abstract specifications. This is then refined with customer input to produce a system which satisfies the customer’ needs.
In addition to having separate activities, this model provides feedback to cepatdan simultaneously. The basic idea this approach is based on is: developing an initial implementation, exposing this to the user comments and refining it through many version until an adequate system has been developed. Specification, development and validation are interleaved rather than separate, with rapid feedback across activities. There are to two fundamental types of evolutionary development:
Exploratory development -Objective is to work with customers and to evolve a final system from an initial outline specification. Should start with well-understood requirements and add new features as proposed by the customer.

2 Define the requirements engineering process and State any 3 problems encountered
during this process
Requirements engineering is the processes identifying the system requirements to be met in developing a system. It entails the following:
Feasibility study -This is an estimate is made of whether the identified user needs may be satisfied using current software and hardware technologies.
Requirements elicitation and analysis -This is the process of deriving the system requirements through observation of existing systems, discussions with potential users and procurers, task analysis
Requirements specification -Requirements specification is the activity of translating the information gathered during the analysis activity into a document that defines a set of requirements.
Requirements validation -This activity checks the requirements for realism, consistency and completeness.
Problems encountered during this process
I. Volatility of Requirements- requirements may change during the development process.
II. Stakeholders don’t know what they really want.
III. Different stakeholders may have conflicting requirements
IV. Organizational and...

Other Essays Like Software law

Vw Type 2 Camper Essay

5442 words - 22 pages , or install the software on a device for use only by remote users; (vi) reverse engineer, decompile, or disassemble the software, or attempt to do so, except and only to the extent that the foregoing restriction is permitted by applicable law or by licensing terms governing the use of open-source components that may be included with the software; and (vii) when using Internet-based features you may not use those features in any way that

Mgmt597- You Decide Essay

1539 words - 7 pages Software Inc. be liable to the owners of Jimmy’s bar? • What about Jimmy’s mom? Does the same law apply to both cases? • Will John win his lawsuit against Software Inc. for his injuries? • If you were Software Inc.’s CEO or head of HR, what policies would you implement to try to limit your liability for people such as Coleman? Should Coleman win his wrongful termination suit with Software Inc.? According to Software, Inc.’s

Case Study-Crime That Pays

1767 words - 8 pages contrary. The United States, for example, stipulates that software is automatically protected by federal copyright law from the moment of its creation; relevant codes speak to any and all contingencies. South Korea goes a step further by cutting pirates’ broadband connections, blocking pirate websites from even loading, and compelling seemingly innocuous downloaders into education programs, and the like. Nor, for that matter, is ignorance of law any

Technical Writer

1407 words - 6 pages , appropriate licensee fee, testing demonstration purpose, export control law, multiple-users license grant, (1) archival copy, product authorization key, event audit disclose, required license fee, temporary software module, commercial computer software, software license agreement, single location, suppliers grant, rights clause, license fee. Preamble 1 Single User License Grant: 1 Multiple-Users License Grant: 1 LIMITED WARRANTY. 2

Legal Issues Essay: Open Versus Closed

3366 words - 14 pages ] “Building and Maintaining a Good Corporate Reputation” Robert Worchester [13] “Industrial Organisation and Innovation” - Chapter 5 - “Product and Process Innovation in Software Activities” Salvatore Torrisi 1998 ISBN : 1 85898 894 2 [14] “Introduction to Computer Law, Fifth Edition” - Chapter 16 - “Fundamentals of Computer Contracts” David Bainbridge ISBN : 0 582 47365

Software Patents Must be Eliminated

5270 words - 22 pages . Complete elimination of software patents may not be the ideal solution, but it is close, and is a great improvement. Its very simplicity helps avoid a long delay while people argue about details. If it is ever shown that software patents are beneficial in certain exceptional cases, the law can be changed again at that time--if it is important enough. There is no reason to continue the present catastrophic situation until that day

Komputer Auditing

1577 words - 7 pages Hukum Benford (Benford’s Law) besaran nilai kumulatif moneter sampling, interval sampling,cross tabulasi. c. Dapat digunakan untuk melakukan beberapa pengujian statistik seperti Chi Square, pemeriksaan nomor kartu kredit, penyusunan nomor keatas dan kebawah. d. Menghasilkan grafik – histogram, garis trend, grafik pareto, dan lain-lain QSAQ Software ini digunakan untuk menjadwalkan, mengelola analisis dan

Hackers And Forms Of Electronic Trespassing

1952 words - 8 pages piracy is the illegal duplication of copyrighted software. Intellectual property includes the results of intellectual activities in the arts, sciences, and industry. The expression of intellectual property can be copyrighted. Inventions are patented. Trade secrets are covered by contract law. Look-and-feel lawsuits can result from mimicking intellectual property. Software piracy is a serious worldwide problem. In fact, many countries have

Marketing Communication and Promotion Strategies

1711 words - 7 pages * Entertainment * Download music * Listen to music * Play video game * Entertainment Software * Educational Software Small Office/Home Office User * A small office/home office includes any company with fewer than 50 employees, as well as the self-employed who work from home. * Local law practice * Accounting firms * Travel Agencies * Florist * Computer uses

Software and Copyright

3176 words - 13 pages for change in the system. The current laws regarding the protection of intellectual material cannot adequately protect software, they are either too weak or too strict. We need a new category of protection. The perfect protection law would most likely last for 10 years, renewable. This is long enough to protect a program for as long as it is still useful, and allows for sequels and new versions just in case. It would also have to allow

Kudler's Recommendations

1243 words - 5 pages The processes of Kudler Fine Foods include inventory, payroll, accounts payable and accounts receivable. Using accounting information systems, Kudler Fine Foods has the potential to improve these processes. Kudler Fine Foods has hired an accounting firm to recommend systems to assist with automating their current processes. The accounting firm has recommended that Kudler Fine Foods purchase industry-specific software. The firm will provide flow

Related Papers

Analysis You Decide Business Law Coleman Works For Software Inc

1120 words - 5 pages actions. In the three lawsuits against Software Inc., Software Inc. should not be held liable based on the legal concepts discuss above. Coleman should take responsibility for his actions. Just because you are employed and are representing a Company during travel doesn’t mean the company is responsible for your actions.   Bibliography 1(Cheeseman 459) Cheeseman, Henry. Business Law: Legal Environment, Online Commerce, Business Ethics

Software Piracy Under Ipr Regime Essay

2525 words - 11 pages An Overview on SOFTWARE PIRACY under Intellectual Property Right Regime e1834 Abinash Chandra Nayak (SOFTWARE PIRACY IS "UNAUTHORIZED COPYING OR DISTRIBUTION OF COPYRIGHTED SOFTWARE .") SOFTWARE PIRACY IS A VIOLATION OF COPYRIGHT LAW AND A FORM OF THEFT . What Is Software Piracy? The definition of software piracy is the "unauthorized copying or distribution of copyrighted software." While this definition may sound simple, its impact

Software Engineering Essay

2776 words - 12 pages INTRODUCTION TO SOFTWARE ENGINEERING Have you ever noticed how the invention of one technology can have profound and unexpected effects on other seemingly unrelated technologies, on commercial enterprises, on people and even on culture as a whole? This phenomenon often called:- “THE LAW OF UNINTENDED CONSEQUENCES”. Today, computer software is the single most important technology on the world stage, and software is also a prime example of

Office Administration Essay

5442 words - 22 pages , or install the software on a device for use only by remote users; (vi) reverse engineer, decompile, or disassemble the software, or attempt to do so, except and only to the extent that the foregoing restriction is permitted by applicable law or by licensing terms governing the use of open-source components that may be included with the software; and (vii) when using Internet-based features you may not use those features in any way that