Professional Documents
Culture Documents
Business Case Group 4
Business Case Group 4
SWOT Analysis:
Software Components:
Functional Requirements:
Non-Functional Requirements:
1. Problem Definition:
Clearly articulate the problem statement, goals, and objectives of
PRALS, including the need for a secure, efficient, and reliable voting
system.
2. Requirements Gathering:
Collect and document the functional, non-functional, and technical
requirements of the system, including:
- Voter registration and verification
- Voting and results management
- Security and encryption
- Scalability and performance
- Usability and accessibility
- Interoperability and compatibility
3. Solution Alternatives:
Identify and evaluate potential solution alternatives, including:
- Fingerprint scanning technology
- Biometric identification
- Smart card-based systems
- Online voting platforms
- Hybrid solutions
4. Evaluation Criteria:
Establish a set of evaluation criteria to assess each solution
alternative, including:
- Security and integrity
- Accuracy and reliability
- Scalability and performance
- Usability and accessibility
- Cost and feasibility
- Compliance with legal and regulatory requirements
5. Solution Evaluation:
Evaluate each solution alternative against the evaluation criteria,
using techniques such as:
- SWOT analysis
- Cost-benefit analysis
- Risk assessment
- User acceptance testing
- Technical feasibility studies
6. Solution Selection:
Select the most suitable solution alternative based on the evaluation
results, considering factors such as:
- Best fit with requirements
- Highest security and integrity
- Optimal scalability and performance
- User acceptance and ease of use
- Cost-effectiveness and feasibility
7. Solution Design:
Develop a detailed design of the selected solution, including:
- System architecture
- Component specifications
- Interface design
- Data management and storage
- Security and encryption protocols
8. Prototype Development:
Develop a prototype of the solution to test and validate its
functionality, performance, and security.
These sum up the main characteristics and features of the fingerprint scanning system.
PRALS will rank them in order of impact on the system's general operation and ensure that
the following is true:
1. Security Requirements:
PRALS believes that security is critical for voter confidence. Thus the business will prioritize
requirements related to data protection, encryption, and access control: Data Encryption:
Encrypt fingerprint data during transmission and storage. How? Access Control: Restrict
system access to authorized personnel only. Audit Trail that PRALS will use include
prioritizing logging and auditing features to track system usage.
PRALS is to consider the system's scalability to handle a large number of voters during
elections: Throughput: Prioritize high throughput to accommodate peak voting times.
Response Time: Ensure quick response times for voter authentication. Load Testing: Test
the system's performance under heavy loads.
Putting requirements first means improving accessibility and user experience. User
Interface: To create a user-friendly interface for voters and poll staff. Multilingual Support:
Because PRALS considers South Africa to be a rainbow nation, it will take into account the
country's linguistic variety and make sure that voters are contacted in the language of their
preference. The Accessibility Features of PRALS: are to guarantee that all voters, including
those with disabilities, can utilize the system.
PRALS will give precedence to the following requirements for failover strategies and system
reliability: Use backup servers to avoid system outages, particularly in remote places. Make
sure the system has fault tolerance so it can bounce back from errors with ease. Backup
Power: Giving built-in battery backup systems a priority, particularly during load shedding.
Sort requirements into priority lists according to available funds and cost-effectiveness.
Price: Select options that fit the budget that has been set aside. Maintenance Costs: Take
into account the costs of continuing upkeep and assistance.
Setting the following priorities for the needs of voters' and poll workers' support and
training: Training Resources: PRALS is tasked with creating easily navigable training
resources. Assistance Desk Support: During elections, PRALS will ensure support in a timely
manner especially for poll workers and voters.
In closing the professional judgment and stakeholder input play a crucial role in prioritizing
requirements. Thus, PRALS will collaborate with election officials, technology experts, and
voters to make informed decisions.
In the final analysis, interviews are essential for obtaining first-hand knowledge, confirming
presumptions, and forming solutions. Business analysts can reduce the risk of fraud, suggest
changes to the voter registration procedure, and build a more effective system by
conducting interviewees.
Business analysts evaluate the feasibility, cost, and strategic fit of building a voter database.
In this step, the readiness of the organization for the suggested change is evaluated. Are
interested parties prepared to switch to a new system?
Analysts confirm that the solution satisfies requirements and resolves recognized obstacles
prior to execution. Therefore, assessing the idea of creating a voter database would be part
of the solution assessment. Take into account elements like price, usability, and
compatibility with the objective of streamlining the registration procedure.
3. Allocation of Requirements
o Functional Requirements:
1. User Registration: The system must allow voters to register and provide their fingerprints.
2. Fingerprint Capture: The system must capture and store voters' fingerprints accurately.
3. Voter Verification: The system must verify voters' identities using their fingerprints.
4. Secure Voting: The system must ensure secure and private voting.
5. Results Calculation: The system must calculate and display voting results accurately.
o Non-Functional Requirements:
User Requirements:
Expected Outcomes:
1. Accurate calculation of votes
2. Display of results in real-time
3. Generation of reports and statistics
4. Successful completion of the electoral process
Use Case 4: System Administration
Actor: System Administrator
Actions:
1. Log in to the system
2. Monitor system performance
3. Perform maintenance tasks (software updates, etc.)
4. Manage user access and permissions
Expected Outcomes:
1. Smooth system operation
2. Timely software updates and maintenance
3. Secure user access and data protection
4. Efficient system management
1. Data Analysis:
Data Entities:
- Voters
- Votes
- Political Parties
- Candidates
- Voting Stations
- Voter Registrations
- Election Results
Data Relationships:
- A voter can cast one vote.
- A vote is associated with one candidate and one political party.
- A political party can have multiple candidates.
- A voting station can have multiple voters.
- A voter registration is associated with one voter.
- An election result is associated with one political party and one candidate.
Data Structures and Storage Needs:
- Relational database management system (e.g., MySQL)
- Data storage requirements: 1 TB (estimated)
- Data entities will be stored in separate tables with relationships established through
foreign keys
- Indexing and caching will be used to improve query performance
Process Design:
Business Processes and Workflows:
- Voter Registration
- Voting
- Results Calculation
- Voter Verification
Steps, Inputs, Outputs, and Expected Outcomes:
- Voter Registration:
- Input: Voter information (name, ID number, etc.)
- Output: Registered voter ID
- Expected Outcome: Successful registration
- Voting:
- Input: Voter ID, candidate selection
- Output: Cast vote
- Expected Outcome: Successful vote casting
- Results Calculation:
- Input: Votes cast
- Output: Election results
- Expected Outcome: Accurate results
- Voter Verification:
- Input: Voter ID
- Output: Verification of voter registration
- Expected Outcome: Successful verification
User Interface Design:
Wireframes or Prototypes:
- Voter Registration Screen
- Voting Screen
- Results Screen
- Voter Verification Screen
User-Friendly and Easy to Use:
- Intuitive interface
- Clear instructions
- Minimal errors
- Responsive design for various devices
Deployment Plan:
- Hardware installation
- Software installation
- Training for users
- Data migration from manual voter rolls
Smooth Transition:
- Minimal downtime
- Effective training
- Support team available for assistance
Post-Implementation Review:
Success Metrics:
- Improved efficiency
- Increased accuracy
- User satisfaction
Work breakdown structure
Activity list
1. Voter goes to their nearest voting stations and enters voting booth.
2. Voting polls (employee) ask for Identity smartcard /book.
3. Voter provides personal details (name, address, etc.).
4. Voter’s fingerprint is captured by employees using a scanner through algorithms
5. System validates the fingerprint against existing records.
6. If valid, voter is added to the voters roll.
7. If not valid the finger print scanner will turn red and employee provides reason why the system
in rejecting the fingerprint scan process such as:
1. Age restriction: As you mentioned, if the voter is under 18, the system may flag their fingerprint
and prevent them from voting.
2. Ineligible voter: If the voter is not registered or is not eligible to vote in the specific election, the
system may block their fingerprint.
3. Duplicate registration: If the voter is registered multiple times or has multiple identities, the
fingerprint scanner may detect the duplicate registration and prevent voting.
4. Felony or criminal record: In some jurisdictions, individuals with felony convictions or certain
criminal records may be ineligible to vote; the fingerprint scanner may identify these individuals and
prevent them from voting.
5. Citizenship status: If the voter is not a citizen or is not eligible to vote due to citizenship status,
the fingerprint scanner may prevent them from proceeding.
6. Voter impersonation: If the fingerprint scanner detects a mismatch between the voter's
fingerprint and the one on record, it may indicate attempted voter impersonation and prevent
voting.