School of Computing 2021-2022
Information Technology Project
[Home | Projects | Resources | Details]
School of Computing
Prof. Mohammad Zulkernine, Goodwin Hall 540, mz at queensu dot ca
Office Hours: Appointments by Email
Name: Anika Anwar
Fall : Wed
2:30PM - 5:30PM, MACINTOSH-CORRY RM D214
Winter : Thu 2:30PM - 5:30PM, MACINTOSH-CORRY RM D214
First Lecture: Sepetember 8, Wed 2:30PM - 5:30PM, MACINTOSH-CORRY RM D214 :
An introduction to the course with some intial instructions
Honours students with software design (SODE) option.
Topic selected under the supervision of a faculty member. Emphasis is on the application of software engineering techniques to the development of a substantial software system. Group work, oral presentation, participation in design and code review meetings, and delivery of complete software specification and design are required.
Admission to Honours in SODE.
By the end of the course the successful student
will be able to:
Collaborate with colleagues to develop a substantial software system. Communicate with a customer to define and deliver a system that meets the customer's needs. Apply a predefined software development process to plan, manage, and track a team project. Reflect on their experience to critique their group's performance and changes in their own perspectives during the project.
Some software produced in CISC 498 is valuable enough over long enough a time period that intellectual property rights in the software are an important consideration. The Queen's default policy on IP is that it belongs to the creators, which by default would be seen to be the students. Otherwise, when you sign a Project Acceptance Form, one of the things you clarify is what rights and licences apply to the software.
Customers must understand that it is their responsibility to ensure their project complies with all of their organizational policies, procedures, and IT standards, including but not limited to the following:
• privacy impact assessment
• security threat/risk analysis
• integration with existing systems (e.g., identity authentication)
Furthermore, customers must understand that they are responsible for the ongoing maintenance of the system. It is highly recommended that customers discuss the viability of their project with their own organization's IT services before starting a project for this course.
In any course you often communicate with your peers and teaching team through electronic communication. You are expected to use the utmost respect in your dealings with your colleagues or when participating in activities, discussions, and online communication.
Here is a list of netiquette guidelines. Please read them carefully and use them to guide your communication in this course and beyond.
Make a personal commitment to learn about, understand, and support your peers.
Assume the best of others and expect the best of them.
Acknowledge the impact of oppression on the lives of other people and make sure your writing is respectful and inclusive.
Recognize and value the experiences, abilities, and knowledge each person brings.
Pay close attention to what your peers write before you respond. Think through and re-read your writings before you post or send them to others.
It’s ok to disagree with ideas, but do not make personal attacks.
Be open to being challenged or confronted on your ideas and to challenging others with the intent of facilitating growth. Do not demean or embarrass others.
Encourage others to develop and share their ideas.
In this class I will work to promote an anti-discriminatory environment where everyone feels respected, valued and welcome. It is my intent to present materials and activities that are respectful of the diversity of students and experiences in this classroom. Students in this class are encouraged to speak up and participate during class meetings. Because the class will represent a diversity of individuals, beliefs, backgrounds, and experiences, every member of this class must show respect for every other member of this class.