Phil 240: Ethics Winter Session 2025 Course Description This class will introduce students to moral philosophy. Our first aim is to investigate four major ethical theories that seek to explain what makes an action morally right or morally wrong. We will also consider whether there are any objective moral truths or whether morality is, in some sense, a subjective or relative matter. Our second aim is to explore a couple of contemporary moral issues. More specifically, we will consider • Whether abortion is morally permissible • Whether killing animals for food is morally permissible Books: I will post all ofthe readings on Canvas Learning Outcomes: a) Students identify primary philosophical themes found in the writings of major ancient, medieval, modern, and moral philosophers. b) Students write historical and argumentative essays on central philosophical issues. c) Students develop philosophical arguments using formal and informal methods originated by historical and contemporary philosophers. Core D3 Learning Outcomes Students will be able to: • Identify and articulate central ethical problems concerning equality, justice, and rights, and understand the role these play in personal and professional life. • Compare and contrast major ethical theories, to show how actions can be determined to be just or unjust, right or wrong, or good or bad, and to demonstrate knowledge of the strengths and weaknesses of major ethical theories. • Investigate ways of settling ethical disputes in arriving at ethical judgments. • Think and write critically about classic and contemporary moral issues. • Identify the contributions of diversity and recognize the challenge that it presents in resolving contemporary ethical issues. • Demonstrate an ability to apply ethical theories and values in personal decision-making. Assignments See the Work and Grade Agreement page on Canvas Grades (what they mean) A+ A A- Excellent performance. Outstanding grasp of subject matter, and an exceptional capacity to analyze and synthesize course material. Demonstrates a superior ability to evaluate and construct philosophical arguments. B+ B B- Good performance. Good grasp of subject matter, and a satisfactory ability to analyze and synthesize course material. Demonstrates satisfactory ability to evaluate and construct philosophical arguments. C+ C C- Satisfactory performance. Some understanding of the subject matter, and some ability to analyze and synthesize course material. Demonstrates some ability to evaluate and construct philosophical arguments. D+ D D- Marginal pass. Evidence of minimally acceptable familiarity with subject matter. Does not demonstrate satisfactory ability to analyze and synthesize course material, or to evaluate and construct philosophical arguments. F Inadequate. Does not demonstrate an understanding of the subject matter. Unable to analyze and synthesize course material, or to evaluate and construct philosophical arguments.
DS-UA 202, Responsible Data Science, Spring 2024 Course Project: Technical Audit of an Automated Decision System assigned on February 20, 2025; see description for due dates Objectives In this project, you will work in teams of two to conduct a technical audit of an automated decision system (ADS) of your choice. We suggest that you audit one of the systems developed in response to a Kaggle competition of your choice, but you should feel free to use other systems that are of interest to you. Do not focus on Northpointe’s COMPAS in this assignment, since this tool was already covered extensively during class. Be sure to prominently cite your sources of code and data! Both team members should work together on all parts of the project. You should not discuss your project submission or components of your solution with any students other than your project partner. If you have questions about this assignment, please send a private question to all instructors over email. Detailed description and goals In this project, we encourage you to focus on examples from Kaggle competitions, where the goals, the data, and one or several implementations are available for analysis. Select a Kaggle competition that has already finished, and for which you can find and successfully execute at least one solution. A list of solutions to Kaggle competitions is available here, and you may be able to find solutions in other ways. If you decide to work with a system that’s not from Kaggle, you should make sure that data and at least one implementation is available to you. Once again: Be sure to prominently cite your sources of code and data! Background reading Your report, and the corresponding Google Colab notebook(s), should be the result of our audit. We do not expect you to develop a UI or any other fancy data presentation methods. That said, it is important that the plots you produce are informative, and that they support your analysis. This reading list should inspire you to think about interesting ways to analyze your ADS. ● “Closing the AI accountability gap: defining an end-to-end framework for internal algorithmic auditing”, Raji et al., ACM FAccT 2020, https://dl.acm.org/doi/10.1145/3351095.3372873 ● “Towards Algorithm Auditing: A Survey on Managing Legal, Ethical and Technological Risks of AI, ML and Associated Algorithms”, Koshiyama et al., 2021 https://www.ssrn.com/abstract=3778998 ● “Problematic Machine Behavior. A Systematic Literature Review of Algorithm Audits”, Bandy, ACM CHI / CSCW 2021 https://dl.acm.org/doi/10.1145/3449148 ● “The algorithm audit: Scoring the algorithms that score us”, Brown et al., Big Data & Society 2021, https://journals.sagepub.com/doi/10.1177/2053951720983865 ● “Resume Format, Linked In URLs and Other Unexpected Influences of AI Personality Prediction in Hiring: Results of an Audit”, Rhea et al., AIES 2022 https://dl.acm.org/doi/10.1145/3514094.3534189 ● “Nutritional labels for data and models”, Stoyanovich and Howe, IEEE Data Engineering Bulletin Special Issue on Fairness, Diversity, and Transparency in Data Systems 42(3), 2019, http://sites.computer.org/debull/A19sept/p13.pdf ● “The imperative of interpretable machines”, Stoyanovich, Van Bavel, West, Nature Machine Intelligence 2, 2020, https://rdcu.be/b57mr ● “The dataset nutrition label: A Framework to drive higher data quality standards”, Holland et al., arXiv 2018, https://arxiv.org/abs/1805.03677 ● “Datasheets for datasets”, Gebru et al., Communications of the ACM, 2021 https://cacm.acm.org/magazines/2021/12/256932-datasheets-for-datasets/fulltext ● “Model cards for model reporting”, Mitchell et al., ACM FAT* 2019 https://dl.acm.org/doi/10.1145/3287560.3287596 Deliverables and grading The project is worth 30% of the course grade. Both partners will receive the same grade for the project. There are three deliverables, see below for description and due dates. You may not use any late days towards the course project deliverables. 1. Project team formation, due at 11:59pm ET on Monday, March 3. Find a project partner and fill out this form. We will assign a teaching assistant to shepherd your team, they will be your primary contact for any project-related questions. If you have not identified a team partner by the deadline above, let us know by filling out this form by 11:59pm ET on Monday, March 3, so we can pair you up promptly. 2. Project proposal, due at 11:59pm ET on Friday, March 28. Submit a 1-page summary of your proposed project, listing the names of both project partners and the ADS you propose to analyze in the project. Be explicit about where you’ll get the data and the code implementing the ADS: cite all sources properly in your project proposal. Leading up to the submission of your project proposal, you should make sure that the data is available, and that you are able to run the code on that data. As part of your project proposal, include a brief (1-3 sentence) explanation of why you selected this specific ADS, in relation to the topics we study in this course. We are still early in the course, but we encourage you to look at the schedule / syllabus for a full list of topics when answering this question. 3. Draft report, with Colab notebook, due at 11:59pm ET on Friday, April 18. Refer to the reading list above, and to the report structure. Submit a draft of your project report, filling in the “Background” and “ Input and Output” sections. Also develop a detailed plan for the other sections, and describe this plan in your draft. Submit a PDF of your draft, and a Colab notebook used for the computation. 4. Final submission, due at 11:59pm ET on Friday, May 9. Submit your project report, implementation. You will be graded on your execution of the project (with a Colab notebook), and on the quality of the project report. You should submit a Colab notebook implementing your project, an accompanying written report in PDF format (up to 10 pages). Submission instructions Both students should submit all project deliverables on Bright Space. ● Submissions from the team partners should be identical with the exception of the brief project contributions document that each partner should submit individually as part of the final submission (due on May 9). In that document, each partner should discuss their own and their partner’s contributions to the project. ● Your project proposal, draft report, and final report should be submitted as PDF files, created using LaTeX (we suggest using Overleaf). You should submit a Google Colab notebook, or a collection of notebooks, that support the computation in your report. Report structure The outline below may be refined in response to clarification questions. We will post announcements on Bright Space if and when changes are made. You may use any of the methods we discussed in class, as well as additional methods you find in the literature, for your analysis. 1. Background: general information about your chosen ADS a. What is the purpose of this ADS? What are its stated goals? b. If the ADS has multiple goals, explain any trade-offs that these goals may introduce. 2. Input and output a. Describe the data used by this ADS. How was this data collected or selected? b. For each input feature, describe its datatype, give information on missing values and on the value distribution. Show pairwise correlations between features if appropriate. Run any other reasonable profiling of the input that you find interesting and appropriate. c. What is the output of the system (e.g., is it a class label, a score, a probability, or some other type of output), and how do we interpret it? 3. Implementation and validation: present your understanding of the code that implements the ADS. This code was implemented by others (e.g., as part of the Kaggle competition), not by you as part of this assignment. Your goal here is to demonstrate that you understand the implementation at a high level. a. Describe data cleaning and any other pre-processing b. Give high-level information about the implementation of the system c. How was the ADS validated? How do we know that it meets its stated goal(s)? 4. Outcomes a. Analyze the accuracy of the ADS by comparing its performance across different subpopulations, with respect to different accuracy metrics. Carefully justify your choice of accuracy metrics. b. Analyze the fairness of the ADS, with respect to different fairness metrics. Carefully justify your choice of fairness metrics. c. Develop additional methods to analyze ADS performance: think about stability, robustness, performance on difficult or otherwise important examples, or any other property that you believe is important to check for this ADS. Carefully justify your methodology. 5. Summary: reflect on the following points in your report. a. Do you believe that the data was appropriate for this ADS? b. Do you believe the implementation is robust, accurate, and fair? Discuss your choice of accuracy and fairness measures, and explain which stakeholders may find these measures appropriate. c. Would you be comfortable deploying this ADS in the public sector, or in the industry? Why so or why not? d. What improvements do you recommend to the data collection, processing, or analysis methodology?
MEC206 Dynamic Systems Lab Assignment 2 Due on Monday, 12th May, 2025, 18:00 Assignment Regulations l This is the second lab assignment and this assignment accounts 15% of the final mark, i.e. 15 marks in total. l This is an individual assignment. Every student MUST submit one soft copy of the assignment via the Learning Mall before the due date. l A coversheet can be created in your own way, but the following information MUST be included: student ID number, full name and email address. l You may refer to internet, textbooks and lecture notes to discover approaches to problems, however, the assignment should be your own work. Students are reminded to refer and adhere to plagiarism policy and regulations set by XJTLU. References, in IEEE style can be attached as an appendix. l Assignments may be accepted up to 5 working days after the deadline has passed; a late penalty of 5% will be applied for each working day late without an extension being granted. Submissions over 5 working days late will not be marked. Emailed submissions will NOT be accepted without exceptional circumstances. l All the reports need to be submitted to Turnitin for review and the repetition rate needs to be less than 25%. l The use of Generative AI for content generation is not permitted on all assessed coursework in this module. Literature review and practice about the mechatronic system modeling, simulation and control This is an open project. Students are expected to understand the background and development of mechatronic system modeling, simulation and control, know the common modeling methods through the comprehensive literature review. Moreover, students are also expected to develop the literature survey and management skills. After the literature review, students are required to find a mechatronic system example and use one of the modeling methods you find to model the system. In addition, do the open-loop simulation without the controller and closed-loop simulation with the controller. Requirement: 1. An introduction part is needed. 2. Show the background of the mechatronic system and provide some relevant examples. 3. Discuss the importance of the system modeling and simulation. 4. Describe the main modeling methods for mechatronic systems and the relevant state- of-art skills. 5. Choose one common control algorithm for mechatronic systems and explain the basic idea of the control algorithm. 6. Provide one practical mechatronic system you interested in, and choose one modeling method to derive the mathematical equations. Then, simulate the system based on the mathematic model. Finally, use the control algorithm you choose to design a controller for your system. 7. The report should be named as StudentID_Studentname.pdf. 8. No more than 15 pages in total, single column, 1.25x line-space, 2.54cm for page edges. 9. Font: Times New Roman, Font size for content: 11pt. 10. PDF file only. 11. The related simulation codes should submitted in one zip file. Appendix: Marking sheet tion10Applications for mechatronic sys iption20Control algorithm explanation10Example explain, modeling and sim references, layout, outline,
2024/25 ASSIGNMENT REMIT – DOCUMENT UPLOAD Programme Title BA/FdA Business Enterprise (core) BA/FdA Business Management (option) Module Title Social Enterprise Module Code 2105 ASSIGNMENT TITLE Business and Marketing Strategies for Third Sector Enterprises Level 5 Weighting 100% W/C Hand Out Date 24/02/2025 Due Date By 17:00 on 20/05/2025 Cut-off Date for Late Submissions (10 working days after the due date) By 17:00 on 04/06/2025 Feedback Post Date 18/06/2025 ASSIGNMENT FORMAT FILE UPLOAD (DOCUMENT) Essay/Report Format Other (please state in "Assignment Task" below) Assignment Word Count 2500 Submission Format e-Submission Individual Permitted use of Artificial Intelligence within this assessment Delete as required: For this assignment, Artificial Intelligence can ONLY be used as stated within Using AI Ethically within Assignments document. https://rise.articulate.com/share/4h250QmyY8hNnsQ9HS7B702dJedhlsM6. ASSIGNMENT TASK: ● You are required to select ONE* enterprise operating in the Third Sector and create a 2500-word individual portfolio. Your portfolio will: o Address the role, objectives, and stakeholders of this enterprise o Develop viable business and marketing strategies aimed at raising awareness, acceptability, membership and fundraising of this enterprise and the wider Third Sector. *Chosen Social Enteprise must be based in the UK and have a reported annual income
ELEC4310 Power System Analysis Assignment 3 Fault Analysis Submission due date: 4 pm Thursday 16th May 2025 Use the base case 13-bus power system provided and make the following changes: 1. Add the following sequence data to each machine object. 2. Add the following sequence data into each AC line object 3. Set all transformer connections to YG-YG (YN-YN) and add the following sequence data into each transformer (2 Winding) object. After making all changes, conduct a power flow and ensure it converges. Then, complete P1 and P2 as described below. (System Base: 100 MVA.) The report should include a concise summary of the results: • Table of required results (voltage and current value), python code (in P2) and bar graphs for comparisons. (Bar graphs can be generated by using Excel.) • Comments and discussions should accompany each section. It may be a short paragraph. • The corresponding saved .sav and .sld files used in this section need to be attached in the submission .zip file. 1) P1 Fault Current Study by Using PSS E Interface (25 Marks) Perform. the following different type of fault analysis for the slack bus and the lowest voltage bus. • Bolted three-phase balanced fault. • Line to line fault on phase B and C. • Bolted Single line to ground fault on phase A • Bolted double line to ground fault on phase B and C Show the fault current of all three phases a, b and c (in polar form) on the fault bus during fault. Please comment on results. 2) P2 Get Voltage of Each Bus During Fault by Using Python (75 Marks) 1) Use python to perform. bolted three-phase balanced fault analysis for the slack bus, and the lowest voltage bus. Use bar graphs to show system voltage profiles of all buses during the fault against the base case (pre-fault system). Please provide the python code you have used for this question and comment on results. (15 Marks) 2) Used python to perform line-to-line fault analysis for the slack and lowest voltage buses. Use bar graphs to show system voltage profiles of all three phases during the fault against the base case (pre-fault system). Please provide the Python code you have used and comment on the results. (15 Marks) 3) Make sure all transformer connections are YG-YG. Use python to perform. bolted single- line-to-ground, and bolted double-line-to-ground fault analysis for slack bus and the lowest voltage bus, respectively. Use bar graphs to show system voltage profiles of all three phases against the base case (pre-fault system). Please provide the python code you have used and comment on results. (Please make sure the Connection Code of each transformer are “8-Series path, ground each side” as shown in figure below) (15 Marks) 4) Change all transformer connections to Δ-Δ . Use python to conduct bolted single-line-to- ground, and bolted double-line-to-ground faults the same as (3). Use bar graphs to show system voltage profiles of all three phases against the base case (pre-fault system). Please provide the python code you have used and comment on results. (Please change the Connection Code of each transformer to “4 – No series or ground paths” as shown in figure below) (15 Marks) 5) According to the results obtained from above questions, compare fault currents among different types of faults using a table. What is your conclusion? (The conclusion should summarise all comparisons in P1 to P2. Also consider severity of each type of fault that places on the system if it occurs.) (15 Marks) Useful Functions in psspy: sequence_network_setup(), scmu_2(), scinit(), scbus2() IMPORTANT SUBMISSION INFORMATION (a) All case (.sav) files, diagram (.sld) files, python (.py) scripts must be named appropriately. There should be one folder for each task. Compress all five folders in a single zip file, named ########_PSSE_files , where ######## is your 8-digit student number. (b) Your PSS/E report must be submitted to Blackboard directly in PDF version. The report itself should not be included in the zip file. (c) Make sure you have answered all the questions. (d) This report should be no more than 12 - 15 pages (one-sided only, Arial/Times New Roman/Calibri, font size 12, single line spacing with 2cm margin on all sides). The appendix does not count. You should place tables and graphs into the body of the report. The report's figures, tables and codes are counted in the page limit. (e) The report must include a concise summary of results for each section, along with comments and discussions. It could be as short as one sentence or as long as a paragraph. (f) Place figures as close as possible to where you refer them to in the context.
CHE216 Assessed coursework 3 Deadline for submission 16:00 Tuesday may 13th These questions are on the two remaining topics not yet assessed – (a) molecular bonding through symmetry adapted linear combinations, and (b) spectroscopic transitions. They are written in the style. of what will appear in your exam. These are not your exam questions, but they are written as if they were actual exam questions on these topics. In your exam, there will be 4 questions, worth 25 marks each. Hence, the questions below are worth 25 marks each. In that way, the marks reflect actual marks in an exam. However, your coursework mark will be reported out of 100. In attempting these questions keep in mind that your exam will be 120 minutes along. Hence, as these two questions represent half of an exam, one hour would be available to complete them in an exam (~30 minutes each). You might initially try to attempt these questions under timed exam conditions as a test of where you are now. You can then use the two-working week period to polish your answers, and then during revision re-try to complete them within the hour. Question 1 Consider planar molecule with D3h symmetry of the type AB3. A and B are elements of the periodic table. Elements A and B have s and p valance electrons. In this question, you will determine the symmetry-adapted linear combinations (SALCs) of thep atomic orbitals of element B that can participate in σ bonding with the s atomic orbitals on the central atom A. D3h E 2C3 3C2 σh 2S3 3σv A1′ 1 1 1 1 1 1 x2+y2, z2 A2 ′ 1 1 -1 1 1 -1 Rz E′ 2 -1 0 2 -1 0 (xy) (x2-y2, xy) A1 ′′ 1 1 1 -1 -1 -1 A2 ′′ 1 1 -1 -1 -1 1 z E ′′ 2 -1 0 -2 1 0 (Rx,Ry) (xz,yz) (a) Considering only the Bp orbitals (one from each B atom) directed toward the central A atom, and only s orbitals on atom A, construct the reducible representation (Γred) for their combination using the D₃h character table. Clearly explain how each character in Γred is obtained. [7 marks] (b) Reduce your reducible representation into a sum of irreducible representations. [6 marks] (c) With a brief explanation of your reasons, identify the valence orbitals (s and p) on A that can participate in σ bonding. For each orbital, state its symmetry under D₃h. [6 marks] (d) Using the results from parts (b) and (c), determine which SALCs ofthe B atoms can combine with which A orbitals to form. bonding molecular orbitals. Indicate which interactions are symmetry-allowed and explain why. [6 marks] Question 2 (a) In the context of molecular electronic spectroscopy (e.g., UV-vis absorption spectroscopy), explain what is meant by saying that an electronic excitation within a molecule is electric dipole allowed. [3 marks] (b) In what ways does molecular symmetry influence whether such a transition can occur? [2 marks] (c) State the two main selection rules that determine whether an electronic transition is electric dipole-allowed in a molecule with a centre of inversion. Give a brief explanation of each. [5 marks] (d) Explain how group theory can be used to determine whether a transition is dipole-allowed. [5 marks] (e) Describe how the direct product of irreducible representations is used in this context. [5 marks] (f) Consider a transition between an A2u ground state to a T1u excited state of an Oh complex. With an explanation of your method, use group theory to prove that this transition is dipole forbidden. Hint: You do not need the character table to prove this. [5 marks]
Social Enterprise: 2105 Assignment: Business and Marketing Strategies for Third Sector Enterprises Task 1: Introduction to the Third Sector a) Introduction to the Third Sector in the UK. Define the Third Sector and explain how it differs from the public and private sectors. Highlight the importance of the Third Sector in the UK. Discuss the funding sources for the Third Sector. b) Background of your ONE chosen enterprise to include: Remember, you must chose a Social Enterprise that is based in the UK with an annual income of
OFRM Group Assignment Weighting: 25% of final grade Due date: May 30, 2025 o Submit your assignment in a Word document ONLY via MyUni by 5pm Friday, May 30. The link for the Assignment has been created for you under the Assignment page on MyUni. Email submission will not be accepted. Students are expected to submit their work by the due date to maintain a fair and equitable system. o Groups of 3 students (Does not need to be from the same tutorial) . o Statement of Acknowledgement of Original Work: By submitting your assignment, you declare that all material in this assessment is your own work. You have also read the University's Academic Honesty Policy. Please be aware of policy and guidelines regarding plagiarism and use of AI (see Course Outline for website link). o Whilst you are encouraged to make use of the LSEG access available to you for your individual research, it is mandatory to use ONLY the data provided in the “OPFM - data for assignment” file for this assignment. You may choose any of the stocks/options from the data file. Assume interest rate is 5%. Preface The recent imposition of tariffs by the United States on Australian exports has led to significant market volatility. Options trading volume, as one would expect, has surged in response. This assignment challenges you to develop and justify an options trading strategy to exploit on the potential impacts of these tariffs on selected Australian companies. Instructions: 1. Market Analysis (5 marks): • Select an Australian company that is heavily impacted by the recent US tariffs. • Analyse the likely effect of these tariffs on the company’s financial performance and stock prices. Consider company-specific factors and overall market sentiment. 2. Strategy Development (5 marks): • Determine an appropriate strategy ONLY from the myriad of options trading strategies you learned in Topic 6. • The chosen strategy must be supported by your market analysis and theoretical underpinnings. • Justify whether your position is bullish, bearish or neutral. 3. Strategy Execution & Evaluation (10 marks): • Initiate your options strategy position on April 2, 2025 • Monitor and record the performance of your trades over two weeks, noting any adjustments made during the period. • Close out your position at the end of two weeks period. • Evaluate your trading results in relation to your market analyses, option strategy, relevant benchmarks, inter alia. 4. Report Writing (5 marks): Write a comprehensive report (2000-2500 words) in Word format ONLY that document: • An introduction to the selected company and its impact from the US tariffs. • A detailed explanation of your options strategy, and how that benefit from the tariff situation, including theoretical justifications. • The outcome of your trading, with complete performance analysis. • A thorough evaluation of the effectiveness of your strategy, including any improvements gained in hindsight. • Conclusion. Assessment Criteria: • Depth and thoroughness of market analysis. • Creativity and fitness of trading strategies. • Accuracy and attention to detail in the trading execution. • Clarity, coherence, and structure of the written report.
ECON 214: Intermediate Macro (2024/25, T2) Assignment 3 due on March 6th The Solow Model In the Solow Model, the evolution of the (per effective labour) capital stock is determined by the equation (1.1) where is the current capital stock, is the capital stock next period, d, n, and g are, respectively, the depreciation rate, the rate of population growth, and the rate of technological progress. The constant s stands for the saving rate, and f() is the production function (in per-capita terms). Assume that the production technology is Cobb-Douglas with , and that d=0.05, n=0.01, g=0.015, and s=0.3. a) Find the steady-state level of capital, i.e. the amount of capital for which = in the equation (1.1) above. Also, compute (per effective labour) output , investment , and consumption in this steady state. b) Now assume that the economy starts out in year 1 with a capital stock =6 below the steady-state level you found in part a). Use equation (1.1) to find the evolution of the capital stock for the following 10 years, i.e. years 2 to 11 (for the following 50 years if you are using a program like Excel to do the work for you). Does the capital stock approach its steady-state value? How long does it take to close 30% of the initial gap between the capital stock and its steady-state value? c) Is the steady state you found in part a) the golden rule equilibrium, dynamically efficient, or dynamically inefficient? Explain how you got your result.
INFO1111: Computing 1A Professionalism 2025 Semester 1 Self-Learning Report Task 1: Foundation: Learning Vercel Instructions Important: This section should be removed prior to submission. You should use this template to generate your self-learning report. Keep in mind the following key points: ● Submissions: There will be three opportunities during the semester to submit this report. For each submission you can attempt one task (the Foundation Report is Task 1 ) and aim for a rating of ‘OK’ or ‘STRONG’. Each submission should use the same report template, but amended to include new information. You can only attempt the advanced task (the Advanced Report is Task 2) after you have achieved a ‘STRONG’ on the foundation task. ● Minimum requirement: Remember that in order to pass the unit, you must achieve at least a rating of ‘OK’ on ‘Self-Learning Report (Task 1: Foundation)’. ● Using this template: When completing each section you should remove the explanation text and replace it with your material. Your report should begin with the “Background” section. ● Referencing: You should also ensure that any resources you use are suitably referenced, and references are included into the reference list at the end of this document. You should use the IEEE reference style. [1] (the reference included here shows you how this can be easily achieved) Scenario In New South Wales, strata-titled apartment buildings are governed by the Strata Schemes Management Act (2015). Each building is subdivided into units, or lots, and are collectively part of the Owners Corporation (aka body corporate) which is responsible for things like the maintenance of common areas, and insurance for the building. For this, owners pay levies into an administration fund and capital works fund. The act sets out the responsibilities of the Strata Committee, which are elected representatives of the owners, responsible for managing the body corporate. There must be a Treasurer, Secretary and Chairperson, and it can have other members, up to a maximum of 9. Imagine you have been elected to the committee and are now managing the building yourself. Design a website to support the management of the building. Overview of the tool/technology to be self-learnt Vercel is a cloud platform. for hosting web applications, particularly optimized for frontend frameworks and static sites. It enables developers to deploy web applications with ease, offering features like automatic CI/CD, serverless functions, and edge computing. Vercel supports popular frameworks like Next.js, React, Vue, and Svelte, allowing seamless deployment and scaling. Knowing how to use Vercel and similar platforms to it is an important skill for several reasons: ● Real-world application: Vercel (and similar platforms) are widely used in the industry for hosting modern web applications. Learning to deploy and manage applications on Vercel is a valuable skill for frontend and full-stack developers. ● Seamless deployment: Vercel simplifies the deployment process with continuous integration and automatic previews, reducing the complexity of managing infrastructure. ● Performance optimization: Vercel provides built-in performance optimizations such as edge caching and automatic scaling, ensuring fast and reliable applications. ● Career readiness: Proficiency in using Vercel is beneficial for web development roles, as many companies leverage it or similar cloud platforms for rapid and efficient deployment workflows. Steps and ratings for self-learning Vercel The following is a list of steps you need to carry out to meet the goals of this report. For each step you must provide evidence that you have successfully carried out that step, as described in Section 4. above. OK Rating To achieve an “OK” rating you will need to self-learn how to do and demonstrate all of the following using Vercel: 1. Create a new project, name it something of your choice related to the Strata Management scenario which your website will be about. 2. Deploy a simple web application using Next.js, React, or another framework / template of your choice. Modify it to suit the scenario. 3. Connect a GitHub repository to Vercel for automatic deployments. 4. Set up environment variables in the Vercel project. 5. Upload static assets to the project (eg, images, PDFs) STRONG Rating To achieve a “STRONG” rating in addition to the above you will need to self-learn how to do and demonstrate all of the following using Vercel: 6. Configure the project settings, using the vercel.json file. Explain what the different options are, their effects and uses cases. Look into deployment regions, cron jobs and custom build commands. 7. Investigate serverless edge functions and make 3 functions that achieve something related to the strata scenario. How are edge functions different from regular serverless functions? 8. Make at least 5 new webpages on your website and demonstrate some basic features of HTML, CSS and JavaScript. 9. Create a HTML form. to receive information from users through POST and GET requests. Explain the difference between these types of HTTP requests. Also, investigate HTTP status codes and how you can implement a redirect in a serverless function. 1. Background 1.1. Motivations for self-learning: Complete the Self-learning survey: motivations to reflect what motivates you to self-learn (i.e. to teach yourself to know something or to do something). In this section, please decide what your goal for this project will be – what will be the purpose of your web application deployed on Vercel? 1.2. Effective self-learning and its challenges: 1.2.1. What is the most effective way you currently self-learn? Write ~50 words describing what works best for you when self-learning. 1.2.2. What is the most difficult challenge for you when you are self-learning? Write ~50 words describing what you find difficult when self-learning. 2. Journal of self-learning activities and reflections. Use the template Journal of self-learning activities and reflections to record each of your activities as you do them, along with your thoughts about the activity. Submit this journal weekly to show and discuss in each week’s tutorial. Use the Journal as a source of information for sections 5 and 6 of this template. 3. Self-learning Plan 3.1. Goals: Your goals for this report are to: 1. Demonstrate your knowledge (understanding) of Vercel by carrying out the steps 1-9 in the instructions. 2. Demonstrate your skill in applying that knowledge to creating a website project using Vercel by carrying out the steps 1-9 in the instructions. 3. Evaluate your self-learning processes. 3.2. Schedule 3.2.1. List and describe the steps you will take to execute your plan and when you will complete them. STEPS NO DESCRIPTION DATE 1 4. Results: evidence of the steps you have attempted from the instructions Provide evidence for each step you have completed (e.g. in the form. of screenshots with annotations that explain what you have done in this screenshot and how it represents that). Document your process of accomplishing the requirements step by step, including how you achieved each one. 5. Evaluation 5.1. Knowledge and skills QUESTIONS YOUR ANSWER 1. To what extent did you reach the goals for this report? 2. What barriers did you face in reaching the goals? 3. What worked well for you in doing the report? 4. What was frustrating? 5. Other?..... 5.2. Reflect on your use of generative AI. Keep in mind, for this assignment any use of AI to write code and help with your learning is allowed an encouraged, however the University does not condone the use of the DeepSeek AI model. All students have access to Microsoft Copilot for free, read more here: How to use generative artificial intelligence in the classroom - The University of Sydney. You may also choose to use an AI-powered code editor (IDE) like Cursor or Windsurf. QUESTIONS YOUR ANSWER 1. To what extent did you use generative AI in this task? Provide an example of where you used AI. 2. What kinds of prompts were helpful? Did you ask follow-up questions? For what kinds of things? 3. What kinds of prompts were not helpful? Were there any instances of the AI model giving output which did not work or was not expected? 4. Imagine that AI was unavailable or its use was prohibited. Do you think you would you have been able to achieve the goals for this task? Why / why not? 5. Do you think that this task has improved your confidence with using AI? What new use cases of generative AI did you discover, and what applications do you think they will have for you in the future? 6. Identify and compare the aspects of the task that AI could help with, and the aspects that AI could not help with. Do you think that in the future, AI capabilities might expand even further to cover more of those things? How would you expect your role to adapt, if you imagine that this task was part of your job? 7. Other?..... 5.3. General self-learning learning processes QUESTIONS YOUR ANSWER 1. What worked? 2. What didn’t? 3. What would you do differently? 4. What did you learn about yourself? 5. What recommendations would you make to your future self? What about your past self (before you started the task)? 6. What would you recommend to someone else? 7. Other?..... 6. Learning sources Learning Source - What source did you use? (Note: Include source details such as links to websites, videos etc.). Contribution to Learning - How did the source contribute to your learning (i.e. what did you use the source for?). You may use information from your Journal for this. Learning Source - What source did you use? (Note: Include source details such as links to websites, videos etc.). Contribution to Learning - How did the source contribute to your learning (i.e. what did you use the source for)? Bibliography [1] The University of Sydney, _Referencing and citation styles: IEEE,_ 2022, see https: //libguides.library.usyd.edu.au/c.php?g=508212.
2024/25 ASSIGNMENT REMIT - DOCUMENT UPLOAD Programme Title BA (Hons) Business Enterprise/FdA Business Enterprise Module Title Intellectual Property, Law and Business Practices Module Code 2145 ASSIGNMENT TITLE Coursework 2 Level 5 Weighting 50% W/C Hand Out Date 21/02/2025 Due Date By 17:00 on 22/05/2025 Cut-off Date for Late Submissions (10 working days after the due date) By 17:00 on 09/06/2025 Feedback Post Date 23/06/2025 ASSIGNMENT FORMAT FILE UPLOAD (DOCUMENT) Essay/Report Format Other (please state in "Assignment Task" below) Assignment Word Count 1500 words Submission Format e-Submission Individual Permitted use of Artificial Intelligence within this assessment For this assignment, Artificial Intelligence can ONLY be used as stated within Using AI Ethically within Assignments document. https://rise.articulate.com/share/4h250QmyY8hNnsQ9HS7B702dJedhlsM6 . ASSIGNMENT TASK: This report is based on the case study of Supportify, a mental health support platform. You are to explore consumer law in relation to the trading of goods and services, focusing on considerations such as product liability, product safety, and the Consumer Rights Act, with recommendations for Supportify in this area. In addition, evaluate intellectual property protection and provide recommendations on any IP considerations the company should take into account. Finally, assess the regulatory requirements for e-commerce transactions, including aspects like electronic contracts, secure payments, data protection, and more, offering guidance on how these factors may impact the business. Here is the case study business as below: Case Study: "Supportify" - A Mental Health Support Platform Business Name: Supportify Business Slogan: Support is just one call away — We got you. Business Concept: Supportify is a platform. designed to connect individuals with mental health professionals for quick consultations via an app. Similar to Uber, it operates on an on-demand, gig-based model, aiming to provide immediate access to mental health support. About the entrepreneurs: • A team of three friends, Jake, Josh, and Anna, has come together to establish the company, Jake Josh Anna Jake, aged 19, is the only person to have contributed Josh, 27, has developed an app designed to connect Anna, 23, is currently unemployed but has known money into the business of £12,000 of his own savings to help establish the company. Jake has saved this money for one year having worked in DPD as a factory worker. mental health specialists with the public through an Uber-like platform. Using his advanced coding skills, he has created a working prototype that he believes is ready for market. Currently employed as a computer coder in the civil service with a salary of £38,500, Josh has built the app alongside his full-time job. However, due to significant financial commitments, including a large mortgage and other expenses, he finds it difficult to save money and feels unable to commit to the business full-time at this stage. Jake and Josh for some time. She is willing to dedicate her time and effort to running the business during daytime operating hours, as both Jake and Josh have decided to keep their jobs due to the lack of sufficient funds in the business to support them full-time. Launch Plans: • The three entrepreneurs plan to launch the app in London and Birmingham on 7 June 2025, with ambitions for steady expansion into international markets within the first few months of its launch. • Their current plan is to invest £8,000 in promotion within the first year, believing this will help generate a predicted turnover of £120,000. • The remaining £4000 will be kept as contingency. The problem: The main problem the three entrepreneurs are currently facing is a lack of knowledge in business and business law. As a result, they have approached you for assistance. They are open to offering you a stake in the company for your expertise and advice, or alternatively, a fixed fee for your services. They believe your input will be valuable to the business in the years ahead. MARKING CRITERIA: • Introduction to the report and the business (10 marks) • Evaluate and provide recommendations on consumer law considerations for the trading of goods and services for the case study business (30 marks) • Evaluate and provide recommendations on intellectual property protection and select regulatory requirements for e-commerce transactions providing relevant recommendations for the case study business in this area. (50 marks) • Adhere to the report structure and include and apply appropriate references throughout your work, the expectation is 10-20 references. (10 marks) TASK AND DOCUMENT FORMAT GUIDANCE: 1. Introduction to the Chosen Business and Purpose of the Report Provide a brief introduction to Supportify, explaining its business model and objectives. Outline the purpose of the report—examining the legal aspects of trading services, consumer rights, and intellectual property regulations relevant to Supportify. Mention why legal knowledge is essential for the business, given the entrepreneurs ' lack of expertise in business law. 2. Application of Consumer Law to Supportify Discuss UK Consumer Law and how it applies to service-based digital platforms like Supportify. Key areas to cover: • Consumer Rights Act 2015 – How it protects users of Supportify’s services. • Digital Services Regulations – Compliance in handling customer complaints, refunds, and service quality. • Data Protection (GDPR) – How user data should be stored and protected. Explain the importance of terms and conditions, service disclaimers, and a refund policy for a mental health platform. 3. Intellectual Property (IP) and Relevant Regulations for Supportify Identify key Intellectual Property (IP) rights related to Supportify: • Trademark Protection – Securing the business name, slogan, and logo. • Copyright – Protecting the app’s design, content, and any unique software elements. • Patent Considerations – Whether Supportify’s business model or any unique technology can be patented. Discuss the importance of licensing agreements with mental health professionals using the platform. Consider relevant laws such as the Copyright, Designs and Patents Act 1988. 4. Report Structure and References The report should follow a clear business report format, and may include: • Title Page - Report title, student details, and date. • Executive Summary - A brief overview of key findings. • Introduction - Background of Supportify and report purpose. • Main Body - Application of Consumer Law and IP regulations. • Conclusion & Recommendations - Summary of findings and suggested legal actions. • References - Properly cited sources using Harvard Referencing. E-SUBMISSION GUIDANCE: ● This assignment will require you to submit your work by uploading a document in Word or PDF format to Canvas. Please follow this online guide on document submissions and contact the DICE team on [email protected] if you need any further support. LEARNING OUTCOMES: 3. Explore consumer law for the trading of goods and services. 4. Evaluate intellectual property protection and select regulatory requirements for e-commerce transactions. ACADEMIC SKILLS OUTCOMES: ● The Academic Skills Outcomes to be developed by completing this assignment can be found here. ● For Apprenticeship programmes, identify the applicable Knowledge, Skills and Behaviours the assignment seeks to test. SKILLS OUTCOMES: ● The skills outcomes to be developed by completing this assignment can be found here.
Department of Computer Science Semester 2, 2024-2025 CHC5226 Foundation of Security Coursework (50%) The coursework is divided into two parts, which together account for 50% of your total module score: Part 1: Seminar Assessment (10%) Students are required to demonstrate their progress on seminar-related tasks. Marks will be awarded during designated assessment weeks by the module instructor. Only completed tasks will receive full marks during the seminar. Failure to complete the seminar task will result in a score of zero. Make sure your computer/laptop is fully functional for each seminar session. Part 2: Secure Scheme Design or Analysis Task (40%) Students must prepare a report on one (1) of the following topics: 1. Design a secure cryptographic scheme to protect against existing threats in various application environments such as IoT, cloud computing, smart cities, ad hoc vehicular networks, wireless sensor networks, and medical information systems. 2. Analyze at least three recent papers (published within the last five years) focusing on the same research direction. Prepare a report highlighting the differences and assess which approach offers the most promising advancements. Detailed Instructions for Part 2: • Submission Deadline: May 16, 2025, 2:00 PM • Word Limit: 3000 words, excluding title page, abstract, contents, acknowledgements, and references. • Penalty: Reports exceeding the word limit by 30% will be penalized. • Academic Integrity: This task is an individual piece of work. Adherence to the university's rules on plagiarism, syndication, and cheating is mandatory. • Report Components: Include an explanation of your results, with supporting graphs and diagrams where appropriate. • Referencing: Use IEEE style for all sources. Learning Outcomes: • Demonstrate understanding of computer and information security fundamentals. • Evaluate the security of existing authentication schemes and identify security flaws. • Apply knowledge in secure coding, cryptography, and security analysis. • Utilize self-awareness and communication strategies in team-based work. Important Information for Paper Selection • Requirements: Choose a recent paper(s) (last five years) from the provided list attached to this document. If you do not observe any potential improvements (Scheme Design), alignment with other papers (Analysis Task), you may have to select a different paper(s). • Research Focus: If selecting multiple papers, ensure they align in research focus and assess which offers the most promising advancements. • Procedure Compliance: Failure to follow these steps will render your submission incomplete. Avoid duplicating selections with peers. To ensure transparency and prevent overlap, after selecting your paper, you must upload the title to the link (Wechat Mini Program) that will be provided. This will allow all students to view the titles already chosen, thereby facilitating unique selections.You have to change your selection if it matches with any other student. • First Come, First Served: The student who uploads a title first will secure that topic. Ifa title is already listed when you check, you must choose another paper. Regularly check the updated list of chosen titles before finalizing your selection to ensure it remains unique. Journal List for Paper Selection: Attached to this document, is a file containing a list of journals from which you can download papers relevant to your chosen topic, provided they have been published within the last five years. While you may select papers from any journal listed in the file, it is recommended that you focus your search on Pages 17 to 23, as these pages primarily list journals related to security, which is the central theme of our module. This will help you find the most pertinent and high-quality resources for your research and analysis. To get an idea of what you should consider, have a look at some papers from the journal and conference papers (from the list attached). These papers can be downloaded through the CDUT library portal. You have to carefully read some papers, and choose one which is best suited for you. Scrutinize the paper to find the security flaws of their proposed scheme. • Describe the functionality of your designed scheme in detail. • Perform. background research on your chosen scheme. This should focus on the associated risks and vulnerabilities of similar schemes. • Perform a complete Threat Analysis of the scheme. • Write a secure design specification that mitigates risks and includes data use recommendations. Marking Scheme: • Given the broad scope of the assignment, a detailed marking scheme is difficult to define. However, performance will be evaluated based on the thoroughness of the threat analysis, the clarity of the report, and adherence to the specified structure. Things to look for in your report: Ensure your report is well-organized and follows the structure outlined below, with each section clearly labeled: Abstract (5%): • Provide a brief explanation of what you have done in your report. • Include a short summary of the existing problems your research addresses, the background of your research, and the objectives of your work. Introduction (10%): • Introduce the research domain and its importance. • Discuss the problems of the existing schemes and the specific objectives of your report. Related Works (5%): • Review and discuss relevant literature that informs and supports your research. Preliminaries (5%): • Outline the basic concepts, definitions, and background information necessary for understanding your design or analysis. Design Scheme/Analysis of Different Schemes (45%): • Present your cryptographic scheme or analyze the different schemes you've studied. • Detail the methodologies, technologies, and processes utilized in the design or analysis. Comparison Analysis (20%): • Compare and contrast the different schemes or methodologies analyzed. • Highlight key differences, strengths, and weaknesses. Conclusion and Personal Reflection (5%): • Summarize your findings and contributions. • Reflect on the research process, what you learned, and potential future work. References (5%): • List all sources cited in your report following the IEEE referencing style.
COM00189M MEng Degrees in Computer Science MSc in Advanced Computer Science MSc in Artificial Intelligence MSc in Cyber Security MSc in Human-Centred Interactive Technologies Open Assessment Department Computer Science Module Technology in Context (TECC-M) Title Individual Coursework Assessment Issued: Monday 17th February 2025 Submission due: 12 noon, Monday 19th May 2025 Feedback and Marks due: Monday 23rd June 2025 Word limit Page limits for each element of each question are given in the text of the questions below. The total limit for the assessment is 15.5 pages of A4, excluding reference list. Please note that. For Question 1, the page limits given are generous, to allow for diagrams, screenshots etc. Allocation of Marks Please see the detailed description for each question below. Instructions This is an anonymous assessment. Do not include your name, student number or any other identifying information in the submitted material (including metadata). Answer all questions. The assessment consists of three questions, each of which has multiple subparts. After each question, you will find a mark breakdown. At the end of the paper, you will find detailed marking criteria for each question. You should read these elements carefully while answering each question. All submissions must be presented in Arial font, font size 12, single-spaced. All pages must be numbered. You must include a reference list at the end of the assessment. All students must submit their answers through the appropriate VLE submission point in the Assessment area of the VLE site by 12:00 noon on Monday, 19th May 2025. An assessment submitted after this deadline will be marked initially as if it had been handed in on time, but the Board of Examiners will normally apply a lateness penalty. Your attention is drawn to the section about Academic Misconduct in your Departmental Handbook. Any queries you may have on this assessment must be posted on the Discussion Board on the Virtual Learning Environment (VLE) page for TECC in the appropriate discussion area. No questions will be answered after Friday 9th May 2025. Question 1 [50 marks] Question 1.1 [6 marks] (i) Identify an interactive system that you use regularly which is known (from your experience or that of other people) to have usability problems that provoke errors. The system should be sufficiently complex that it supports multiple functionalities by which users can achieve their goals. It can be either a software- based system or the interface to a domestic appliance (such as, for example, a cooker or microwave). (ii) Provide a short description of the system and its basic functionality, including any photographs, screenshots or illustrations necessary for the examiners to understand the functionality and context of use, as well as key tasks that a user would wish to carry out with the system. NOTE: There is no requirement for your chosen system to be a safety-critical or safety- related system. What is important is that it is a system that you use regularly and are familiar with. NOTE: Please ensure that you understand the whole of Question 1 before you choose your interactive system. Your answer to Question 1.1 should not exceed 3 A4 pages, including illustrations but excluding references. Question 1.2 [10 marks] (i) Write a list of FOUR significant human factors concerns in the design of the interactive elements of the system you describe in Question 1.1 (ii). (ii) For EACH of the concerns you list, explain how the design would cause a human user to make errors in attempting to use the system. You should indicate the type of the problem, and the types of the errors provoked, using the human error classification introduced during the module, and should briefly indicate the consequences of the errors. You should refer to the literature in your answer. Your answer to Question 1.2 should not exceed 1 A4 pages, excluding references. Question 1.3 [10 marks] (i) Give a brief account of the required characteristics (i.e. any physical constraints on the user required by the system, cognitive requirements, any training) for a target user of this system and identify a high-level task which a user would use the system you describe in Question 1.1 (ii) to achieve. (ii) Decompose this task into a series of actions, using a Hierarchical Task Model. You should present your model graphically, using the notation introduced during the module. Your model should show at least three levels of decomposition from the user goal you identify in Question 1.3 (i). The objective of the Hierarchical Task Model is to identify individual actions which the user undertakes (individual button pushes etc), and these should form. the lowest level of your analysis. Your answer to Question 1.3 (i) should not exceed ½ of an A4 page. Your answer to Question 1.3 (ii) should not exceed 3 A4 pages. Note that landscape pages are a good idea. One A3 page counts as 2 A4 pages. Question 1.4 [18 marks] (i) Undertake a HEART analysis of the interactive system for the task that you identified in Question 1.3 (ii). Your answer should include the following: a. Any assumptions you make about the characteristics of the user; b. Any assumptions you make about the context in which the task is being undertaken; c. Your initial task classification, and why you consider this to be appropriate; d. What performance-shaping factors you choose to include in your analysis, and why you consider them to be appropriate; e. Your rationale for the relative weightings of the performance shaping factors you included; f. Your calculation of the probability of failure for the target user for the task identified in Question 1.3 (ii). (ii) Do you think the figure for the probability of failure produced in your HEART analysis is reasonable, given the usual expectations for human error occurrence in tasks of this kind? Are there issues with the HEART technique which might account for some problems with the final figure? Explain your answer. Your answer to Question 1.4 should not exceed 1.5 A4 pages. Question 1.5 [6 marks] Imagine that you have been asked to perform. a human factors analysis of a new system, where a doctor (skilled in medical knowledge, and in general IT, but not familiar with the workings of AI) uses an AI-based recommender system to ascertain the most likely medical diagnosis from a series of symptoms. The interface the doctor uses is voice-based: the doctor describes the symptoms to the system, and the system responds with an on-screen, prioritised list of likely conditions. You are not sure that HEART is suitable for analysis of this type of system, and decide to investigate other techniques for human factors analysis. (i) Give a brief description of TWO other techniques for human factors analysis that you have identified in the literature. Explain the key features of the techniques and give brief examples to illustrate your discussion. (ii) Which of these techniques do you think is most appropriate for analysis of the AI-based recommender system described above? You should justify your answer with respect to the kind of human factors issues the technique is likely to uncover, and why these are particularly significant for the safety of the system in the context described above. You should refer to the literature relating to safety analysis techniques for human factors to support and justify your answer and should also provide references for any additionalinformation you provide about the nature of the system introduced in this scenario. Your answer to Question 1.5 should not exceed 1 A4 page. Allocation of Marks for Question 1: Question 1.1 (i) and (ii): Up to 6 marks will be awarded for the selection and description of an appropriate interactive system, which is sufficiently scoped to allow for appropriate analysis. Up to 1 mark will be awarded for the use of illustrations (screenshots, photographs, schematics etc) to support the description. Up to 1 mark will be awarded for the identification and explanation of appropriate user tasks relating to the system. These explanations should be very general (detail of a task comes in later!) Question 1.2 (i) and (ii): Up to 10 marks (2.5 for each concern) will be awarded for four correctly-identified human factors concerns relevant to the interactive system, and for a description of how the design of the system provokes errors in the user groups. Human errors described should be appropriately classified using the terminology introduced during the module. Question 1.3 (i): Up to 2 marks will be awarded for a clear description of several relevant user characteristics, closely linked to the interactive system. Up to 1 mark will be awarded for a clear description of an appropriately scoped user task. Question 1.3 (ii): Up to 7 marks will be awarded for a clearly presented Hierarchical Task Model, which decomposes the user task to an appropriate level for analysis to be carried out. Marks are awarded for the accurate use of the HTM notation, and for phraseology of the subtasks, actions and plans. Question 1.4 (i): Up to 4 marks will be awarded for a well-presented HEART analysis. Up to 8 marks wiII be awarded for the justification of the methodoIogy adopted - assumptions made, initiaI task cIassification and performance-shaping factors. Question 1.4 (ii) Up to 6 marks wiII be awarded for a cIear, weII-reasoned discussion of the finaI human error probabiIity, with reference to Iiterature and assumptions reIating to probabiIities for simiIar tasks. Marks wiII be awarded for a consideration of whether the way in which the method has been appIied has Ied to any issues with the finaI caIcuIated figure, and of the suitabiIity of the HEART technique for the target system. Question 1.5 (i) Up to 4 marks (2 marks for each technique) wiII be awarded for a weII- researched and cIearIy presented description of two human factors safety anaIysis techniques, supported by cIear reference to reIevant Iiterature. Question 1.5 (ii) Up to 2 marks wiII be awarded for a weII-reasoned discussion, which makes reference to the human factors issues which are IikeIy to be encountered in the question scenario. Question 2 [24 marks] Background This question is based on the ransomware attack on Synnovis Limited in June 2024. Synnovis is a pathoIogy Iaboratory which provides bIood tests to severaI Iarge NationaI HeaIth Service (NHS) and private hospitaIs in South-East London. These incIude some of the Iargest hospitaIs in London, with many thousands of patients, data being stored by Synnovis and transmitted when required to hospitaIs. It is essentiaI that hospitaIs have timeIy access to the bIood test information, for diagnosis of conditions, to inform. treatment decisions and to ensure that stocks of bIood of the correct type are avaiIabIe for patients undergoing surgery. Throughout this question, imagine that you are the Chief Executive Officer (CEO) at Synnovis. You have been contacted at home, Iate at night, by IT technicians at work in the company, and toId that Synnovis has been the subject of a ransomware attack. The computer system has been encrypted, and the hackers require a ransom to be paid. If you pay, they wiII suppIy you with a decryption key so that you can regain controI of the system and the data. If the ransom is not paid, the hackers have made cIear that patients, data wiII be pubIished on the Dark Web in four hours, time. Question 2.1 [6 marks] You have two basic choices, in response to the ransomware attack: either you pay the ransom, or you don,t. For EACH of these choices, expIain the impact on Synnovis, on the hospitaIs and on individuaI patients. Your answer shouId consider safety, privacy, operationaI and sociaI factors. Your answer to Question 2.1 shouId not exceed ½ of an A4 page, excIuding any references. Question 2.2 [10 marks] Make a choice - either you pay the ransom, or you do not. FOR THE CHOICE YOU HAVE MADE: Write a short essay discussing your decision, from an ethicaI point of view. You must make cIear which choice you have made, and shouId state why you consider it to be ethicaIIy defensibIe. Your answer shouId refer to at Ieast one of the professionaI ethics frameworks introduced during the moduIe, and shouId expIain which ethicaI principIes in the framework(s) are vioIated by your chosen course of action, and which are upheId. You shouId justify why you have prioritised the ethicaI principIes that you have in your decision. Your answer to Question 2.2 shouId not exceed 1.5 A4 pages, excIuding any references. Question 2.3 [8 marks] (i) Write a short press reIease, in which you expIain the ransomware attack to the generaI pubIic (incIuding patients), the impIications for them and any actions that they shouId take in response to the situation. Your answer to Question 2.3(i) shouId not exceed 1 A4 page, excIuding any references. (ii) Write an emaiI to the other members of the Executive Board of Synnovis, in which you expIain what has occurred, the decisions and actions you have taken and their impact. You shouId expIain why you feeI that what you have done is in the best interests of the company. Your answer to Question 2.3(ii) shouId not exceed ½ of an A4 page, excIuding any references. Allocation of Marks for Question 2 Question 2.1: Up to 3 marks are available for a discussion of the safety, privacy, operational and social implications of EACH of the choices – to pay the ransom, and not to pay the ransom. (Total of 6 marks for the question) Question 2.2: 1 mark is available for a clear statement of the decision made by the CEO. Up to 9 marks are available for a nuanced discussion of the ethical duties of the CEO (and, by implication, Synnovis as a company), which justifies why their decision can be considered ethical. The answer should refer to at least one of the professional ethics frameworks introduced during the module, and should explain how the ethical principles are interpreted in the context of the scenario and why they can be considered to be upheld. The discussion should also make clear the decision-making process: i.e. the relative weightings of particular ethical principles from the frameworks, and why they have been prioritised. The discussion should be supported by well-scoped examples from the scenario. Question 2.3 (i) Up to 3 marks are available for an appropriately-phrased press release which explains the ransomware attack and how this affects the general public. Of the 3 marks, 1 are reserved for the style. and tone of the press release – i.e. choice of words, level of detail, suitability for the audience. Question 2.3 (ii) Up to 3 marks are available for an appropriately-phrased email, which explains the ransomware attack and its impact, and provides a justification of the decisions and actions taken by the COE. Of the 3 marks, 1 are reserved for the style. and tone of the press release – i.e. choice of words, level of detail, suitability for the audience. Question 3 [26 marks] The Freedonian People’s Health Service (FPHS) was impacted by the ransomware attack on Synnovis, and has commissioned you, as an independent cybersecurity advisor, to carry out an initial risk assessment study of FPHS’s own systems in order to identify other security risks which may be present. Freedonia, as a small independent nation, about the size of Liechtenstein, has a national network of GPs and 4 main hospitals, sharing patient data via a central national database. All Freedonian medical providers have equipment and software provided by the FPHS and running over a private closed network. External providers, some in other countries, are permitted to connect to the FPHS system in order to provide care for Freedonian citizens who are resident in other countries via a web interface provided via a globally accessible portal. External providers are required to register in advance for access, but only require a HTTPS capable browser to interact with the system. Using the process outlined in ISO/IEC 27005:2022, or similar, you have been tasked with identifying the top 5 risks to the FPHS IT system and proposing appropriate treatments, with a recommendation for preferred treatment in each case. You need to include a statement of any assumptions that you have made, and give an indication of how you have evaluated relative risk in order to establish your list. FPHS management have stated that you must include references to relevant literature about threats and vulnerabilities. You do not need to consider other external providers (e.g. lab services such as Synnovis), but should consider only the main FPHS patient data system. You are to produce a short report (a single page of text), summarising your process and findings, but should also include up to 2 pages of lists and/or tables showing intermediate results from the stages of analysis process, and a further 1 page of bibliographic entries (list of references cited in your report). Your answer to Question 3 should not exceed 2 A4 pages, excluding references. Allocation of Marks for Question 3 Up to 25 marks in total are available for the security risk assessment report. The marks are broken down as follows: - Up to 6 marks are available for a clear identification of FPHS security assets, which indicates the assumptions made and justifies the selection and prioritisation of the assets. - Up to 5 marks are available for a discussion of the risk identification process, with clear relevance to the scenario in the question, and with reference to relevant literature. - Up to 5 marks are available for a clear account of the risk analysis methodology, including a justification of the method chosen and a discussion of the limitations of other available methodologies in the context of the scenario. - Up to 5 marks are available for a clear account of the risk analysis results, including the consequences and likelihood of identified incident scenarios, with reference to relevant literature. - Up to 5 marks are available for well-considered suggestions for treatment options for the risks that do not meet the risk acceptance criteria, including alternative options.
FIT5147 Data Exploration and Visualisation Semester 1, 2025 Programming Exercise 3: D3 (5%) Please carefully review all the requirements below to ensure you have a good understanding of what is required for your assessment. 1. Instructions & Brief 2. Assessment Resources 3. Assessment Criteria 4. How to Submit 5. Late Penalty 1. Instructions & Brief In this assignment, you are required to demonstrate the ability to complete the source code of an interactive visualisation built using D3. Relevant learning outcomes for FIT5147: 6. Implement interactive data visualisations using R and other tools The final visualisation: The expected final visualisation is about a small subset of AusStage data (like in PE1 and PE2). This subset focuses on the contributor Kelly Abbey and their events and collaborators. The final visualisation is a web page containing a network diagram that shows an “event contribution network diagram”, which contains event personnel and their contribution to different events. The network diagram shows both events and contributors as network nodes, and the links between them. A legend explains the visual variables used for each node. A distinction is made between those nodes representing contributors and those for events, whether a contributor is male or female is also identifiable. An interactive checkbox in the legend allows the user to change the network diagram. When the checkbox is unchecked, the event nodes are removed and a new diagram appears - the “collaboration network diagram” . This shows which contributors have collaborated with each other and how often. To the left of both network diagrams is a text box that describes the visual narrative and provides information about the data source (this is filled in for you). The template: For this task you are provided an incomplete file of source code for the final visualisation. Your task is to complete the code by following the provided instructions. We refer to this incomplete source code as the template. You are expected to not remove any aspect of this template. The template is a single HTML document. All references to external libraries, datasets, CSS, and the layout are already provided in the template. The webpage uses a side-bar layout. The left side-bar contains basic information about the visualisation, some data insights and information relating to the data source. The main canvas on the right is where the visualisation is placed. The HTML elements of tooltips are also provided in the template (note that this screenshot is zoomed out to see the full network): To help you better understand the template structure, comprehensive comments are provided in the HTML elements as well as the javascript. Most of the javascript. code required to finish the visualisations is provided in the template, and is accompanied by descriptions. Most of the descriptions are represented as the #TASK and #END TASK block of comments in the code. About the data: There are two dataset files used in this project containing attributes from the AusStage dataset that we have been using in the programming exercises throughout the unit. In this assignment, the data are in .json format and hosted on GitHub for you (you can see the data if you visit the url). The AusStage subset focuses on the collaborator involved in the most events, Kelley Abbey. We have already cleaned and transformed the data into the format you need. In wrangling the data we have removed duplicates, removed events not in Victoria and, if a collaborator has played various roles in different events, we have simplified this information to a single combined string property under “Role”, e.g., a collaborator may have been an Actor but also a Director. The two files contain the following attributes and example values. 1) event_contribution_network.json to create the “event contribution network diagram” . In this network, there are two types of nodes (indicated by the “type” property): ”event” and “contributor”: “nodes” contain the following properties, with an example: "id": "event_158557", "type": "event", "name": "Jesus Christ Superstar", "first_date": "2017-07-29", "last_date": "2017-08-13", "venue_id": "21", "venue_name": "The State Theatre", "suburb": "Melbourne" “edges” : "source": "event_28513", "target": "contributor_564388" 2) collaboration_network.json to create the “collaboration network diagram” . In this network, there are only “contributor” node types: “nodes” : "id": "contributor_1840", "type": "contributor", "name": "Eamon D'Arcy", "nationality": "Australian", "sex": "Male", "role": "Set Designer", "number_of_collaborators": 43 “edges” : "source": "contributor_3060", "target": "contributor_4070", "weight": 1 Detailed tasks: You will only need to complete the javascript parts. These parts are indicated by a comment line: “ADD YOUR CODE HERE FOLLOWING THE INSTRUCTION” and a short indication of instruction and reference to #TASK 1-7. There are 7 tasks that you need to complete. These tasks are based and graded on the criteria described in Section 4: Assessment Criteria. The following is the list of these tasks: #Task 1: Add all nodes to the network diagram ● Take the node variable specified in the code and use it to create a symbol representing each contributor and event in the network diagram; ● The symbol and visual variable used should be an appropriate design choice: ○ Choose a visual variable to distinguish between event and contributor nodes; ○ Use a different visual variable to differentiate between male and female contributors. #Task 2: Make the node symbols proportional to the data ● Map the size of the contributor nodes to the “number_of_collaborators” (i.e., the node’s degree). ● This should be visible in both network diagrams. #Task 3: Make the collaboration network diagram links proportional to the data ● Map the thickness of the links on the collaboration network using the “weight” property. #Task 4: Label all nodes ● Take the node variable and use it to create a suitable label; ● The label should be either the full name of the contributor, or the name of the event; ● The label should be placed in a suitable location above the node so that it is associated with the node it belongs to; ● Set the class attribute of the label to "label"; ● Use a suitable design choice to differentiate between events and contributor labels, such as the use of bold for events. #Task 5: Modify the legend ● Modify the legend to show the visual variables for nodes you have chosen in Task 1. (Note: for a complete visualisation we would also recommend you provide a legend to show both the proportional size of the node symbols and the link width, but this is not a requirement for this programming exercise.) #Task 6: Show the tooltip on mouse hover, when: ● Show and hide the tooltip when the mouse pointer is on or leaving a node; ● The tooltip should show relevant attributes associated with the node being hovered including: ○ for event nodes: "id", "name", "first_date", "last_date", "venue_id”, "venue_name”, "suburb"; ○ for contributor nodes: id", "name", "nationality", "sex", "role", "number_of_collaborators”. ● Ensure each attribute and relevant information is on a new line. #Task 7: Highlighting nodes and links: ● When the mouse pointer is on a node, highlight both the node and neighbouring links; ● Choose an appropriate highlighting option, which may include changing the node/link color, size, or the opacity of other network elements; ● Remove the highlighting / return the network diagram to the original state, when the mouse pointer leaves the node. Remember, you are only asked to complete the tasks above. We have provided hints for the location of a task within the template after “ADD YOUR CODE HERE FOLLOWING THE INSTRUCTION”. General Help Notes: ● The template has been tested in Chrome, Firefox and Safari. The checkbox that should be in the legend appears in the wrong location in Safari, but still functions. Try a different browser, such as Chrome / Firefox / Edge if this occurs. If you have issues with the template in other browsers, contact the team with a screenshot on Ed. ● The template uses D3 v7. This is important when referencing online resources which may use older or newer versions of D3. ● You are allowed to make some changes to the template, such as to add your own CSS rules, and adjust fonts and styling. However, any issues which arise from this (e.g., network graph no longer working, layout changes, poor visual changes to the visualisation) may result in marks being deducted, even if not part of the given task. ● The datasets are stored on an online repository and are referenced via URL in the template. The data is stored in the collaborationNetwork and eventContributionNetwork variables. You do not need to reference these variables directly as they are encoded in the graph variable which selects the correct network depending on the checkbox. You must NOT change the data paths, nor should you download and use a local copy in your submission. ● Your code will be run through similarity detection software during the marking process. Be sure to acknowledge any reference sources in your code comments to avoid breaching academic integrity. ● Generative Artificial Intelligence (Generative AI) software or systems cannot be used for any part of this assessment task, including (but not limited to) generating written or visual components of your submitted work or the programming code you use. Further Visualisation Improvement Ideas: Note: these are NOT required nor will they gain extra marks for your PE3 submission. Whilst none of these are a requirement of this assessment task, further improvements to the visualisation might include: ● adding the minimum and maximum values for the proportional symbols and lines to the legend; ● removing the non-highlighted node labels upon interaction; ● adding further highlighting and exploration options; ● setting the zoom to default to fitting in the opening window aspect ratio; ● increasing the subset of the data to show many more collaborations across Australia and over time, perhaps being able to filter the network on the fly. 3. Assessment Resources ● The template is provided in the assessment page on Moodle. The code to access the data is embedded in the template; no separate data file is needed. 4. Assessment Criteria The following outlines the criteria which you will be assessed against. ● Ability to create simple visualisations using D3 [3%] o Demonstrated ability to create basic SVG elements using D3 [1%] o Demonstrated ability to link data to visual properties [1%] o Demonstrated ability to choose appropriate visual variables to encode data [1%] ● Ability to create interactive visualisations using D3 [2%] o Demonstrated ability to create an interactive visualisation in D3: tooltip [1%] o Demonstrated ability to create an interactive visualisation in D3: highlight on mouse over [1%] Please note that marks will be deducted if the provided template is not used, or if your submission uses modified and/or local copies of the datasets. Remember that you are allowed to improve the template with improved aesthetics (e.g., CSS) and adding more advanced interactions and/or layouts if you wish, but this is not required. 5. How to Submit The code for the final interactive visualisation should be submitted through Moodle. Ensure that all necessary files for the visualisation are included. The code’s components (i.e., HTML, CSS, JS) should be in one .html file. Data files should not be included as these are accessed via the URLs provided in the template. Submit a zip file (not alternative compression formats) containing the one .html file required to run your work. This must be a zip file as Moodle does not allow you to submit html files. Name the zip file in this format: [STUDENT ID]_[FIRST NAME]_[LAST NAME].zip 6. Late penalty Following the Monash late penalty policy, late submissions will receive 5% deduction per day late. After 7 days, the assignment will not be graded or receive feedback.
ECON20532 Macroeconomic Analysis 4 Spring 2019 1 Tutorial 1 1.1 Question 1 Consider an economy with a constant population of N = 100. Each person is endowed with y = 20 units of the consumption good when young and nothing when old. a. What is the equation for the feasible set of this economy? Portray the feasible set on a graph. With arbitrarily drawn indifference curves, illustrate the stationary combination of c1 and c2 that maximizes the utility of future generations. b. Now look at a monetary equilibrium. Write down equations that represent the constraints on first- and second-period consumption for a typical individual. Combine these constraints into a lifetime budget constraint. c. Suppose the initial old are endowed with a total of M = 400 units of fiat money. What condition represents the clearing of the money market in an arbitrary period t? Use this condition to find the real rate of return of fiat money. For the remaining parts of this exercise, suppose preferences are such that each person wishes to hold real balances of money worth goods. This demand for fiat money, it can be shown, comes from the utility function [c1;t]1/2 + [c2;t+1]1/2. d. What is the value of money in period t, vt? Use the assumption about preferences and your answer in part c to find an exact numerical value. What is the price of the consumption good pt? e. If the rate of population growth increased, what would happen to the rate of return of fiat money, the real demand for fiat money, the value of a unit of fiat money in the initial period, and the utility of the initial old? Explain your answers. (Hint: Answer these questions in the order asked.) f. Suppose instead that the initial old were endowed with a total of 800 units of fiat money. How do your answers to part d change? Are the initial old better off with more units of fiat money?
LMCR2412 - LEADERSHIP AND INTERPERSONAL SKILLS SEMESTER 1 SESSION 2024/2025 FINAL REPORT 1. INTRODUCTION (Approximately 2 pages only) [Note: This final report is approximately 30 pages long, typed-written, 1.5 spacing in Times New Roman font in size 12. The format is in accordance with this provided format.] This section introduces your assignments in general. - Start by answering the question of what, why and how. o What does leadership mean? What does interpersonal skills mean? o Why leadership and interpersonal skills? o How can interpersonal skills help a person’s leadership? o How can we learn leadership from the experiences of other leaders? In the final paragraph of the Introduction section, indicate the focus of your report: - This report discusses the case study of a leader named _____________ who is (stating his position) in (specify his organization). This organization is (student body / school / corporate office / specify the type of organization). As a (the position of leader), he (specify his role briefly in a sentence). - The discussion in this report focuses on the experience of the case study leader in terms of advantages and challenges as a leader; as well as the skills required in carrying out leadership responsibilities. At the end of the report, we discuss key take aways or advice from of our case study leader and share group members’ reflections of this case study assignment. 2. LITERATURE REVIEW (approximately 5 pages) 2.1 Theories and Concepts of Leadership and Interpersonal Skills 2.1.1 Leadership theories and concepts - Definition of leadership - The main theories of leadership - Leadership style. to be used in your case study discussion 2.1.2 Leadership skills - Interpersonal skills - Other skills relevant to your case study 2.2 Leadership in the context of a specific organization related to your case study (Example: Students’ leadership at the university / Academic leadership at the university / Administration and leadership at the university) In this section, discuss past studies on leadership or specific issues related to your case studies. o If your case study is about a student leader, then discuss past studies related to students’ leadership at the university and related issues. o If your case study is about a lecturer who is holding an administrative post, then discuss past studies related to academic leadership at the university and related issues. o If your case study is about an executive or a manager at the university, then discuss past studies related to administration of a university and related issues. 2.3 Other things that are specific to your case study (Example: Leadership and gender / Leadership and Gen Z) This section deals with the specific context that is broad-based related to your case study. o Examples such as gender and leadership, youth and young people’s leadership, leadership in the face of the Covid-19 crisis, online business leadership, new media and leadership, or others that fit your case study. 3. METHODS & OBJECTIVES (Approximately 2 pages only) The study used a qualitative approach with in-depth interview method for data collection and analysis. A leader was chosen as a case study after discussion among group members. The leader is interviewed using the interview protocol provided. The interview was conducted for approximately 1 hour and 30 minutes and was audio recorded with the permission of the leader. Interview recordings are listened several times and transcript is prepared for the purpose of theme analysis to answer the objectives ofthe study. The objectives ofthe study are as follows: 1. To discuss the advantages of being a leader according to the experience of the case study leader. 2. To discuss the challenges of being a leader according to the experience of the case study leader. 3. To discuss the skills needed to be a leader according to the experience of the case study leader. TABLE 1: INTERVIEW PROTOCOL StudyKey QuestionsFurther Questions1.Background oftheleader and his/herorganisationPlease tell us about your backgr zationyou’re leading?Whatisthenameofthepositionthat Areasoffocusof a leader accordingtotheexperienceof ?-Be able to buildyour ownskills?-Help others?-Financial rewardsorotheradvantages?-Expanding thenetwork ofcontactsofvarious backgrounds?3.Discuss thechallengesofbeing the casestudyleader.According to your own experience, what arethechallengesofbeingaleader ge?-Managing timeand energy?-Managing others?-Protocol /bureaucracy?-Technology?-Skills training?4.Discuss thenecessary skillsincarrying out theresponsibilities asaleader.According to your own experience, what skills do you need to become ?Thank you and appreciation f 4. RESULTS AND DISCUSSIONS (approximately 15 pages) 4.1 BACKGROUND OF THE LEADER AND ORGANISATION Discuss the background of the leader, the positions held and the organisation s/he leads. Also share the appropriate photos during the interview or photos provided by the leader herself / himself. 4.2 OBJECTIVE 1: ADVANTAGES OF BEING A LEADER Explain the advantages of being a leader based on the transcript analysis. Use excerpts from the transcript. to strengthen the writing. Also, explain using the materials from your Literature Review section. Example: The interview with Mr. / Mrs. xxxxx concluded three advantages or the benefits of being a leader, i.e. (1) financial and other incentives, (2) xxxx, and (3) xxxx. Mr. xxxxx explained, “So … as a leader I get many advantages... the easiest thing to see is the advantages such as the extra allowance I have every month. On top of that I also have a PA who helps with my work schedule and a driver to drive me around for work purposes.” 4.3 OBJECTIVE 2: CHALLENGES AS A LEADER AND HOW TO DEAL WITH THE CHALLENGES Explain the challenge of being a leader based on your transcript analysis. Use excerpts from the transcript. to strengthen the writing. Also, explain using the materials from your Literature Review section. 4.4 OBJECTIVE 3: SKILLS ASA LEADER Explain the skills required by a leader based on your transcript. analysis. Use excerpts from the transcript to strengthen the writing. Also, explain using the materials from your Literature Review section. 5. CONCLUSION (approximately 5 pages) - The main conclusions from the case study. - Reflection by each member of the group: TABLE 2: REFLECTION ON CASE STUDY OF A LEADER mber.Shareyour thoughts on what you have learne study leader and how you improve you le 6. REFERENCE (Approximately 1 page only) List at least 5 references from books/chapters, journal articles, reports or other authoritative sources. The list of references is according to the author-date system and is sorted alphabetically.
COMPX341-25A Assignment Three: Software Development Due date: 11:59 pm Friday 16th May, 2025 Submission: LaTeX PDF via Moodle and Software via UoW GitLab Weight in overall grade: 20% Abstract You work as a Software Engineer for SoTech, a software engineering company. A new and emerging Smart Home development company, called Encost, has approached your company with a proposed project called The Encost Smart Graph Project (ESGP). ESGP is a software system that enables the visualisation of Encost’s devices using a graph data structure. Introduction You still work as a Software Engineer for SoTech, a software engineering com- pany. While you were busy completing your testing documentation, a different team was working on an alternative test plan, which the client has accepted. Your company (SoTech) and the client (Encost) have agreed on the Software Requirements Specifications (SRS) document, the Software Design Specifica- tions (SDS) document, and the Functional Software Test Plan document. Your task now is to continue with the Software construction. Your task is to study the SRS, SDS, and test plan documents that have already been accepted by the client and develop the ESGP software. Five Functional Software Test Plan documents (along with their correspond- ing SDS document) will be uploaded to Moodle. You must select one of these Test Plan documents as the ‘client accepted version’. Overall, in the assignment, you are required to do the following. 1 Complete a Development Planning Document The construction phase of your project should follow a SCRUM process, which includes developing a Product Backlog and breaking your work down into so- called Sprints. A LaTeX template has been provided. Your task is to create a development planning document, including your Product Backlog and the Sprints that were undertaken throughout the construction phase of your project. Your planning document must meet the following requirements: • Product Backlog: - Write a Product Backlog that covers all High Priority functional requirements in the SRS, based on the design laid out in the SDS, and the tests laid out in the Functional Test Plan. • Sprints: Your Planning Document should include information about each of your sprints, including but not limited to: - The product backlog items that were selected for each sprint - The tasks that were planned at the start of each sprint (extracted from the product backlog items) - Design decisions that were made during each sprint - Proof of tests being passed and/or failed in this sprint - The status of each task at the end of the sprint. For each task, was it completed, in progress, or not started? Are any tasks being rolled over into the next sprint? 2 Develop the ESGP software Your task is to develop the ESGP software. Your software should cover all High Priority functional requirements in the SRS, based on the design laid out in the SDS, and the tests laid out in the Functional Test Plan. Your software must be submitted via GitLab (https://courses-git.cms.waikato.ac.nz). Please keep in mind the importance of Software Quality and Code Quality. Notes 1. You are required to submit your software using UoW GitLab (https: //courses-git.cms.waikato.ac.nz). Please ensure that you commit to GitLab (providing good commit messages) throughout, not just at the end. 2. The use of the Planning Document template is uncommon in industry. Once out in industry, you are more likely to use “Agile-development” software (e.g. Jira). The template is used in this assignment to give you some experience handling a Product Backlog and Sprints without having to learn additional software systems.
BAFI1002 Financial Markets and Institutions Assessment Task 2 – Stage 2 FX report (Group Project) Weight: 20% Length: 2500 words (+/-10%, excluding references, appendices, tables and figures) Due date: Week 10 – Friday, May 16th, 2025, by 5:00 pm. (Melbourne time) Report Instructions: Your team is assigned both short-term and long-term trading objectives. Based on the primary and secondary objectives, your team is invited to help clients to form and implement the strategy in achieving their specific objectives. At the end of the project, your team is required to submit a report and present it to the management team. The report needs to address the issues faced by the client as mentioned in the case, covering at least the following aspects: 1. Outline the trading strategy that you planned to achieve the objectives. 2. Explain the transactions you made. 3. Analyse the profit and loss of your trading. 4. Trading reflection. For the primary objective, you are expected to explain the specific trading strategies you used in detail, demonstrate the currencies you buy or sell to achieve your trading objective and the quotation you accept for implementing the trading strategy. In addition, you could also explain the transactions that contribute to achieving the trading objective. The secondary objective is linked with your stage 1 individual market view. Based on the individual market views each member of your team has completed in Stage 1, develop a market outlook and provide the Forex trading strategies you intend to undertake. Given your views (developed in Stage 1) about current and future market conditions, you (as a team) should devise a trading objective and strategy that you will try to implement. Strategies will specify how you will go about achieving your objective in a way that benefits your corporations – which currencies you will buy or sell. Where appropriate you should also devise a speculation strategy that will allow you to create a portfolio of currencies that will enable your organisation to take advantage of your predicted changes in the exchange rates. In the trading reflection, you are required to reflect on the experience of each member of the team during the trading. What was the outcome of the trading relative to each objective? What could you have done differently? How does this experience shape your view about the determinants of foreign exchange you have analysed? The strategies and strategy implementations are critically important components of the report. You will not get a passing grade on the report without any of these components. For this stage, you will present a consolidated team report including your portfolio summary and profit/loss.