INNOTECH 19, Falcon Street Contents 1.0 Use Case Diagrams....................................................................................................................2 1.1. Site Owner UCD.....................................................................................................................2 1.2. Security Company UCD..........................................................................................................2 1.3. Security Supervisor UCD........................................................................................................3 1.4. Security Response Team UCD................................................................................................3 1.5. Guard UCD.............................................................................................................................4 1.6. Input Fingerprint UCD............................................................................................................4 2.0. Use Case Specifications...................................................................................................................5 Table 1: Use Case Specification for Register......................................................................................5 Table 2: Use Case Specification for Log In..........................................................................................6 Table 3: Use Case Specification for Manage Staff..............................................................................7 Table 4: Use Case Specification for Sign Out......................................................................................8 3.0. Class Diagram.................................................................................................................................9 4.0 Activity Diagram............................................................................................................................10 4.1 Site Owner.................................................................................................................................10 4.1.1 Site Owner (With Security Company).................................................................................10 4.1.2 Site Owner (With Private Guard)........................................................................................10 4.2 Security Admin...........................................................................................................................11 4.3 Security Supervisor....................................................................................................................12 4.4 Security Response Team............................................................................................................13 4.5 Guard.........................................................................................................................................13 5.0 Entity Relationship Diagram (ERD).................................................................................................14 1.0 Use Case Diagrams 1.1. Site Owner UCD 1.2. Security Company UCD
1.3. Security Supervisor UCD
1.4. Security Response Team UCD
1.5. Guard UCD
1.6. Input Fingerprint UCD 2.0. Use Case Specifications
Table 1: Use Case Specification for Register
Use Case Name Register
Summary Allow user to register to use the system
Actor(s) Site Owner, Security Admin
Preconditions Webpage must be loaded
Post Conditions User is redirected to Homepage
Attribute Priority Very High
Main Scenario Step Attribute
1 User clicks “Sign Up” and is
redirected to Sign Up page 2 User inputs valid details in relevant fields 3 User clicks “Sign Up” Button
Alternative Flow In the case User inputs invalid information,
the input validators of the website will show error messages based on the scenario. Table 2: Use Case Specification for Log In Use Case Name Login Summary Allows all users to access the system Actor(s) Site Owner, Security Admin, Security Supervisor, Security Response Team, Guard Preconditions Webpage must be loaded Post Conditions Attribute Priority Very High Main Scenario Step Attribute 1 User clicks “Sign In” and is redirected to Sign In page 2 User inputs valid details in relevant fields 3 User clicks “Sign In” Button
Alternative Flow In the case the user inputs invalid
information, the input validators of the website will show error messages based on the scenario. Table 3: Use Case Specification for Manage Staff Use Case Name Manage Users Summary The Security Admin can create, read, update and delete Supervisor and Guard from the system. Actor(s) Security Admin Preconditions Security Admin is Logged into the system as well as on Dashboard. Post Conditions New user is registered to system Selected user details are modified Selected user details are removed/deleted Attribute Priority Medium Main Scenario Step Attribute 1 Security Admin must go to settings and click “Staff” 2 Security Admin clicks on user they want to edit 3 Edit page for the user opens up 4 Security Admin performs required task Alternative Flows Table 1: Use Case Specification for Sign Out Use Case Name Sign Out Summary User is able to terminate session Actor(s) Site Owner, Security Admin, Security Supervisor, Security Response Team, Guard Preconditions User must be logged into system Post Conditions Attribute Priority Medium Main Scenario Steps Attributes 1. Click “Log Out” button 2. System will display “Are you sure?” 3. Click “Sign Out” button Alternative Flow _ 3.0. Class Diagram 4.0 Activity Diagram