Explosive impacts of computer and information technology on business and individuals have generated a need to design and develop new computer and software system to incorporate a rapid growing range of computer applications. Software engineers apply the software engineering principles and techniques to design, evaluate, test and implement software systems to enable computer to perform different applications. Software engineers use systematic and quantified approach to design, evaluate, implement software and provide maintenance for software. In other word, software engineering systems use sound engineering principles to design economical and reliable software for business and individual uses. Typically, software engineering principles are used for the development of software application, which include network distribution, and operating system.
Pimentel, et al. (2009) argue the growing integration of application development into web development has made software engineers to apply the principles of document engineering to assist in enhancing the software specifications. Document engineering is an aspect of computer science that focuses on the method to investigate document in any form and media. With reference to software engineering, document engineering is concerned with tools, principles and processes to create, manage, and maintain documents. Document engineering is a systematic application of technical and intellectual knowledge that assist a software developer to create tangible product. Document engineers also assist in creating a robust reusable document to design a software application at reasonable costs and at acceptable time. (Glushko, & McGrath, 2008).
In the contemporary business environment, much of the business transactions taking place through the web are through information exchange. The transactions take place through collaborations, which include customer, online catalogue and credit card authorization. Document engineering is needed to design, analyze, and implement the internet information exchange to enhance coherent information exchange. Document engineering is a pragmatic and coherent business approach to model documents that could deliver practical and effective solutions. For nearly three thousands years, business and individuals organized information in a self-contained package called document. With development of technology, there is a fundamental change in the method of encoding and exchange document. Thus, document engineering assists in delivering a pragmatic and coherent approach to model document to provide practical and effective solutions. (Pimentel, et al. 2009). With reference to software engineering solution, document engineering is compatible to design the system and usability engineering that assist in developing application that is applicable for web services and document exchanges.
On the other hand, requirement engineering covers all activities that involve documenting, discovering, and maintaining a set of requirements for computer systems. Typically, requirement engineering shows that the systematic and repeatable technique need to be consistence, complete and relevant so that computer systems could deliver the pre-determine application goals. The major problem in software engineering applications is the requirements specifications and effective management of customer requirements. The system may be delivered late and costly if a software developer does not follow the requirements. Moreover, the system may be unreliable if the requirements are wrong.
Despite the identification of the importance of requirement engineering for the application of software development, software engineers are facing challenging in meeting the system requirements because business operations are rapidly changing and the requirements for system support are also changing. Sometimes, different stakeholders may present conflicting requirements. (Sommerville, 2008).
2: Challenges
This section reviews the literatures that focus on the challenges facing software applications. Sommerville, (2008) argues that software engineers often face challenges to develop a large-scale software application. For example, the development of large-scale application such as ERP (Enterprising Resources Planning) is very complex to configure. And the user-configuration is practically difficult to implement. The author identifies some of the crisis that has been manifested within the software application in the 80s and 90s:
Projects running over the target budget,
Projects running over the time-frame,
Software developed was of low quality.
Software developed did not meet user needs.
Code is difficult to change and projects were unmanageable.
In the light of the problems, there has been a radical shift in the software development. Rather than developing software from the scratch using a conventional programming language such as Java, C++ and C. languages, developers have devised a strategy to develop commercial software using reuse strategy. The reuse is the configuration and adaptation of existing software system to meet specific organizational requirements. However, the resources limitation may hinder the application of large-scale project. More importantly, the security problem is other challenges facing software engineering application. Sometimes, sensitive data are sometimes hidden in the local machines, which may be exploited by unauthorized users.
On...
Cyber Terrorism: The Greatest Risk in the U.S. Tremendous technological advancements have been made in the last few decades. Today, humans depend more on computer networks and information technology (IT) systems than on other means for information. From business to government, computer networks are relied upon to store, process, retrieve, and transfer critical information. Increased dependence on computer networks has, however, posed a major threat. Cyber terrorism is now arguably the
Secured real time protocol (SRTP) is also being identified to enhance the security parameter of WAN and LAN network elements. "SRTP provides protection with encryption keys for wired and wireless networks including bandwidth limited channels." (Guillen and Chacon 2009 P. 690). There is also a growing use of IP secure to protect organization from the interception of data over the LAN and WAN environment. To enhance network security, Chen, Horng,
The net effect of these trends on the environment is mixed. According to Kohler and Erdmann (2004), the expanded use of ICT applications will ultimately result in both benefits to the environment, as well as some new problems associated with their use. The extent to which the negative effects are mitigated will ultimately depend on the foresight that is used today to develop long-term energy and waste management policies
Insurance Fraud After tax evasion, insurance fraud is considered the highest-ranked among white-collar crimes. The original concept of insurance, as a for-profit endeavor, was to collect funds from a large number of people to pay for damages and accidents that involved a small percentage of the population that paid premiums. Insurance fraud is an ever-growing problem. Solving or eliminating this problem requires the resources and knowledge of individuals or associations with
Managing All Stakeholders in the Context of a Merger Process Review of the Relevant Literature Types of Mergers Identifying All Stakeholders in a Given Business Strategic Market Factors Driving Merger Activity Selection Process for Merger Candidates Summary, Conclusion, and Recommendations The Challenge of Managing All Stakeholders in the Context of a Merger Process Mergers and acquisitions became central features of organizational life in the last part of the 20th century, particularly as organizations seek to establish and
' Purchasing agents can place orders, gather information, and communicate with different organizations from any place at any time" (Martin & Hafer, p. 41). Following the introduction of the Internet, many purchasing departments and purchasing representatives were better able to engage in direct communications, order taking and fulfillment as well as the provision of technical support with their business counterparts abroad (Martin & Hafer, 2002). These authors add that, "The
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now