Tasks: [1]. Develop a MONSU star schema. Identify the fact table, dimensions and attributes required to support the schema. The result of this task is a star schema diagram. You can use any drawing tool, such as Lucidchart, to draw the star schema. [2]. Validate your star schema using the Two-Column Table Methodology. You are required to illustrate the two-column tables for all fact measures and dimensions in your star schema design. [3]. Write the SQL commands to create the fact and dimension tables. You need to create a script file containing the appropriate SQL commands to create the fact and dimension tables. The operational tables are accessible from the MClub account. The result of this task is the SQL commands. You will also need to show the contents of the tables that you have created. [4]. Write the SQL commands to answer the following queries: (you need to make sure that there are records in your fact and dimensions tables. For each of the following queries, write the SQL and show the results): a) Show the number of registered students in each semester for each event size. b) Show the total event fees collected from students in ascending order for each campus location. c) Show the number of registered students in events run by each club category in Clayton. d) Show the total event fees collected for “Special Interest Club” in each course level. Submission checklist: A. A pdf file or word document containing: i. The star schema diagram – Task 1 ii. The Two-Column Table Methodology illustration – Task 2 iii. The SQL commands to create the dimension and fact tables, as well as the contents of these tables (the contents can be in a form of screenshots) – Task 3 iv. The SQL commands to answer the queries in Task 4 and the query results. You can take screenshots of the results. B. The .sql files containing: i. The SQL commands to create the data warehouse. ii. The SQL commands to answer the queries in Task 4. (Notes: The marker of your test will run these files. You need to ensure that the SQL commands are written correctly in the .sql file and runnable).
The following constitutes your assessment task. DUE DATE: Note that the assessment task is released at 9am on Monday, Week 8 and is due at 8.55am on Monday, Week 9 via TurnItIn. TASK: Step 1: Students will choose ONE (1) case study from the list provided below. Step 2: Students will answer the discussion questions (provided below) related to the ONE (1) case study that the student has chosen. Students will draw on relevant empirical literature to analyse the chosen case study and answer the discussion questions. STEP 1: CHOOSE A CASE STUDY Step 1: Choose ONE (1) of the following case studies on which to base your assessment. You are to undertake your own research into the case study you have chosen. You are able to source information about the case study through an Internet search – you can use official reports, law enforcement reports, news media outlets and popular media sites to research your case study. Case Study 1: Data breach – Equifax (2017) Case Study 2: Hacking – British Airways (2018) Case Study 3: Romance fraud - Yoshe Ann Taylor
STEP 2: DISCUSSION QUESTIONS Step 2: You must answer EACH of the discussion questions, provided below, answering the discussion questions in relation to the ONE (1) case study that you have chosen. As part of answering each of the discussion question you must research and integrate relevant empirical literature (ie journal articles) to support your analysis and responses to each of the discussion questions. You need to demonstrate evidence of your knowledge and ability to answer the discussion questions through the use of academic research and appropriate academic referencing (APA reference style). Question 1: Describe the key features of the case study you have chosen. (Approx. 200 words) Include: · Who are the key actors within the case and what was their role? (ie. victims, offenders, context, including relevant guardians/actors/stakeholders) · What is the outcome, cost and/or consequences of the case? Question 2: What is the type of cyber fraud that has perpetrated in the case study? (Approx. 300 words) Include: · Provide an overview and explanation (supported with academic literature) of the category/type of cyber fraud that has been perpetrated in the case study. Question 3: Choose ONE criminological theory discussed in the course (7055CCJ) and use it to analyse the chosen case study (use empirical literature to support your answer to this question). (Approx. 500 words) Include: · What theory have you chosen? · Provide a brief overview/description of the chosen criminological theory, what are its major theoretical tenets? · Describe how the theory and its elements can be used to understand and analyse the chosen case study. Apply the major theoretical tenets of the theory to the elements of the case study. Question 4: Based on the criminological theory (chosen in Question 3, above) identify at least 2 crime prevention strategies that could have been used to prevent or disrupt the cyber fraud identified in the case study (use empirical literature to support your answer to this question). (Approx. 500 words) Include: · Identifies and clearly explains at least 2 crime prevention strategies that have been linked and drawn from the theory and analysis presented in the previous question (Question 3). · Explicit links are drawn from theory to crime prevention strategies and are linked to the case study.
The following constitutes your assessment task. DUE DATE: Note that the assessment task is released at 9am on Monday, Week 8 and is due at 8.55am on Monday, Week 9 via TurnItIn. TASK: Step 1: Students will choose ONE (1) case study from the list provided below. Step 2: Students will answer the discussion questions (provided below) related to the ONE (1) case study that the student has chosen. Students will draw on relevant empirical literature to analyse the chosen case study and answer the discussion questions. STEP 1: CHOOSE A CASE STUDY Step 1: Choose ONE (1) of the following case studies on which to base your assessment. You are to undertake your own research into the case study you have chosen. You are able to source information about the case study through an Internet search – you can use official reports, law enforcement reports, news media outlets and popular media sites to research your case study. Case Study 1: Data breach – Equifax (2017) Case Study 2: Hacking – British Airways (2018) Case Study 3: Romance fraud - Yoshe Ann Taylor
STEP 2: DISCUSSION QUESTIONS Step 2: You must answer EACH of the discussion questions, provided below, answering the discussion questions in relation to the ONE (1) case study that you have chosen. As part of answering each of the discussion question you must research and integrate relevant empirical literature (ie journal articles) to support your analysis and responses to each of the discussion questions. You need to demonstrate evidence of your knowledge and ability to answer the discussion questions through the use of academic research and appropriate academic referencing (APA reference style). Question 1: Describe the key features of the case study you have chosen. (Approx. 200 words) Include: · Who are the key actors within the case and what was their role? (ie. victims, offenders, context, including relevant guardians/actors/stakeholders) · What is the outcome, cost and/or consequences of the case? Question 2: What is the type of cyber fraud that has perpetrated in the case study? (Approx. 300 words) Include: · Provide an overview and explanation (supported with academic literature) of the category/type of cyber fraud that has been perpetrated in the case study. Question 3: Choose ONE criminological theory discussed in the course (7055CCJ) and use it to analyse the chosen case study (use empirical literature to support your answer to this question). (Approx. 500 words) Include: · What theory have you chosen? · Provide a brief overview/description of the chosen criminological theory, what are its major theoretical tenets? · Describe how the theory and its elements can be used to understand and analyse the chosen case study. Apply the major theoretical tenets of the theory to the elements of the case study. Question 4: Based on the criminological theory (chosen in Question 3, above) identify at least 2 crime prevention strategies that could have been used to prevent or disrupt the cyber fraud identified in the case study (use empirical literature to support your answer to this question). (Approx. 500 words) Include: · Identifies and clearly explains at least 2 crime prevention strategies that have been linked and drawn from the theory and analysis presented in the previous question (Question 3). · Explicit links are drawn from theory to crime prevention strategies and are linked to the case study.
ASSESSMENT DESCRIPTION:Case Study:Universal Pathology Ltd.Due to recent demand in health services Universal Pathology is expanded in states and Territories of Australia. Universal Pathology Managing Director strategic planning is to develop new information system to handle all business operation electronically. UPL current system is inadequate to provide real time information to their pathology staff and access to records, and patients need to go to centre to retrieve their test results.System Analyst:Assume you are Systems Analyst, work for Pioneer IT company. You have been asked to consult and begin systems analysis phases by conducting interviews, reviewing existing reports, and observing office operations. Universal Pathology team perform service and test procedure which are coded. Code consist of Four-letter suffix (e.g. ULPT) and Five-digit numeric. The new system aim is to provide opportunity for significant cost saving for Universal Pathology, and will help their staff to go online and update test results, check record and schedule appointment as well as provide convenience for patient. UPL required various report you learned during your fact-finding.• To create hourly appointment report, which shows the patients who are to be reminded of their next day’s test appointments. Information such as patient ID, name, contact, appointment time, need to be recorded• Overall daily appointment list for each patient. Information such as scheduled appointment times, patient name and pathology test to be performed, including the code and description.• Another report showing weekly patient report showing list of each patient and their charges• Patient statement for weekly shall include the date, household name and contact, balance, total charges,total payments, and balance.• Monthly Insurance company report.Addition to all the listed report, the Universal Pathology would like automated e-mail and text messaging capability for sending patient reminders on appointment scheduling time. Finally, the new system needs to track employee schedules, vacation information and payment.For this project prepare report on type of information system, fact finding method most appropriate, system development and draw Use case diagram, DFD, ERD diagram and show their relationship.You are free to make any assumptions, but please mention them clearly in your report.TasksWrite report on following questions:1. What types of system requirements will you focus on for Universal Pathology Ltd? Explain each one in detail.2. What fact-finding methods you think is appropriate for collecting information from employees at Universal Pathology Ltd? Suggest at least three methods and explain the pros and cons of each.3. Describe two systems development tools and two development methods you can used for system development Universal Pathology Ltd.Modelling Exercise1. Create a use case diagram for Universal Pathology Ltd.2. Prepare a context diagram for Universal Pathology Ltd information system.Kent Institute Australia Pty. Ltd. Assessment Brief ABN 49 003 577 302 CRICOS Code: 00161E RTO Code: 90458 Version 2: 11th October, 2019 Page 2 of 4 TEQSA Provider Number: PRV12051 3. Prepare a diagram level 0 DFD for Universal Pathology Ltd. Be sure to show numbered processes for handling patient information, appointments, and report processing.4. Create an initial ERD for the new system that contains at least four entities. 5. Analyze each relationship to determine if it is 1:1, 1: M, or M: N.