Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Part B: Case study and ethical analysis marks Case study: Organic Boxes You are

ID: 3908426 • Letter: P

Question

Part B: Case study and ethical analysis marks Case study: Organic Boxes You are contracted to provide IT consultation to Organic Boxes, an Australia-wide organisation sourcing certified organic, locally grown, seasonal food and delivering it to their customer's homes. The food comes in several different box types: carnivore, omnivore, herbivore and raw. Each box type comes in six different sizes and each size indicates how many people can be fed from the box (the smallest size has sufficient food for one person for one week and the largest size has sufficient food for a family of six for one week). There are additional boxes called juicer and tropical the tropical box is only available in Brisbane and Darwin). For each box type, suitable recipes are printed and provided in the box. The founder and manager of Organic Boxes is Anne Thornton and she is based in Byron Bay. Sydney, Brisbane, Melbourne, Perth and Adelaide each have a manager who is a part of the local growers' community and who manages a very small team of people sourcing, packing and delivering the boxes. However, Anne manages Organic Boxes for Byron Bay, Darwin and Hobart. Each manager knows the growers community so well, they don't need to write down their contacts. But Anne keeps a list of the growers in Darwin and a list of the growers in Hobart and she tries to call each grower once a month for a chat. Anne set up a website when she first started Organic Boxes. Customers choose which box they want, they enter their delivery address and payment details. Then, Anne emails each city's orders to the manager on a daily basis. However, the business has grown to the extent that Anne would like to update the information systems. She would like systems to provide deeper insight into the cities she does not directly manage: which growers provide the freshest food, what food items customers prefer, how many novel food items customers can tolerate, etc. Also, she thinks there might be ways of making day to day business operation a little more efficient and the customers in Hobart have asked if there is a way for them to share cooking tips and advice. 12. With reference to 20 marks The Organic Boxes case stud tu Mellor (2006) .Lange, Chaudron & Muskens (2006) Pa which Discuss the strengths and weaknesses of the UML. Make arguments for and against using the UML to model a small system such as this one

Explanation / Answer

12) As mentioned in the question the system of organic box studies is a small scale business. Considering the case study these could be the possible advantages and disadvantages.

Advantages of UML:

1) Easy to understand the system.
2) Used by most of the people and it is flexible to design the system.
3) These can generate code from design and apply design patterns.
4) Perform reverse engineering

Disadvantages of UML:

1) Can't be used in indifferent designs.
2) Have ascending degree of complexity.
3) Have effect with box-line diagrams.

13) I would like to choose duty-based ethics to resolve this issue.

14) This approach covers the major impacts to assess the data possession. In the normal scenarios, the point of trust plays a major role in saving the data. In the organic case study, the data has been under people possession. Even though the issue is small but in some cases, it might lead to a dangerous situation where the company might lose many people. This indirectly affects the business and also the status of the company.

15) To resolve the issue that had been raised in an organic company. In this case, each and every employee of the company must be given proper training on the data security and its importance. Different things need to be considered while ensuring this data security.

a) The proper ethical rule defined in the system.
b) Guidance to the rules.
c) Making proper understandability on the rules.
d) Ensuring the data security.