G&W Chapter 12: The Project’s Name Software Specification Lecture 19

Slides:



Advertisements
Similar presentations
1 of 15 Information Access Internal Information © FAO 2005 IMARK Investing in Information for Development Information Access Internal Information.
Advertisements

Your Interactive Guide to the Digital World Discovering Computers 2012.
Challenges in Using IT for Learning and Teaching in Saudi Arabian Universities Present by : Fahad Alturise Supervisor : Dr. Paul Caldor.
SCIENCE FAIR 2010.
Copyright (c) 2003 by Prentice Hall. All rights reserved. Understanding the Internet CHAPTER ONE How the Internet is Changing the World.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
KU Leuven - COSIC Info Session ERC Advanced Grants- 1June 2016 ERC – ADG Cathedral: Post-Snowden Circuits and Design Methods for Security Ingrid.
Information Technology Planning
The aims Show how design & evaluation are brought together in the development of interactive products. Show how different combinations of design & evaluation.
Internet Protocol Address
Planning Business Messages
AP CSP: Data Assumptions & Good and Bad Data Visualizations
G&W Chapter 5: Starting Points Software Specification Lecture 12
G&W Chapter 22: Test Cases Software Specification Lecture 29
Prepared by Stephen M. Thebaut, Ph.D. University of Florida
Project Points Software Specification Lecture 8
Prepared by Stephen M. Thebaut, Ph.D. University of Florida
Overview of VAdata Virginia’s Sexual and Domestic Violence Data Collection System.
Simile poems for kids by Lawraine Guichard
Anna Długosz Central Statistical Office of Poland
Critical Reading Strategy
Using the Kilgore College Library Online Resources
The Visible Computer Chapter 3.
Intercepting Communications
Prepared by Stephen M. Thebaut, Ph.D. University of Florida
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Internet Basics.
U.S. Department of Justice
Prepared by Stephen M. Thebaut, Ph.D. University of Florida
Using the Kilgore College Library Online Resources
Saad Ahmad Jola Bolaji Melvin Chien Maxwell Taylor
Prepared by Stephen M. Thebaut, Ph.D. University of Florida
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
G&W Chapter 24: Making Agreements Software Specification Lecture 31
G&W Chapter 17: Preferences Software Specification Lecture 24
doc.: IEEE <doc#>
Prepared by Stephen M. Thebaut, Ph.D. University of Florida
The Process of Writing Whole Pieces on the CATS Test
Spyware. By: Katheryn L. Gaston.
Integrated Airman Certification and/or Rating Application
Using the Kilgore College Library Online Resources Speech
Thebaut’s Guaranteed Method Software Specification Lecture 5
Prepared by Stephen M. Thebaut, Ph.D. University of Florida
Introduction to Information Systems
G&W Chapter 19: Ambiguity Metrics Software Specification Lecture 26
G&W Chapter 25: Ending Software Specification Lecture 32
G&W Chapter 16: Constraints Software Specification Lecture 23
Software Specification
G&W Chapter 20: Technical Reviews Software Specification Lecture 27
Strongly Agree Agree Disagree Strongly Disagree.
Part Three: Topic Sentences & Evidence
Chapter 23 Deciding how to collect data
PHYS 202 Intro Physics II Catalog description: A continuation of PHYS 201 covering the topics of electricity and magnetism, light, and modern physics.
Getting Practical Science transition project
<month year> <doc.: IEEE doc> Julyl 2015
2008 Workshop AHEPA District 3 Website Presentation
Prepared by Stephen M. Thebaut, Ph.D. University of Florida
Black-Box Testing Techniques III
Prepared by Stephen M. Thebaut, Ph.D. University of Florida
Customer Satisfaction Survey: Volunteer Training Overview
Robertson & Robertson: Chapter 2 Software Specification Lecture 10
G&W Chapter 11: Software Specification Lecture 18
G&W Preface Software Specification Lecture 4
G&W Chapter 14: Functions Software Specification Lecture 21
Prepared by Stephen M. Thebaut, Ph.D. University of Florida
COMPUTER NETWORKS AND THE INTERNET Chapter 6
G&W Chapter 15: Attributes Software Specification Lecture 22
Prepared by Stephen M. Thebaut, Ph.D. University of Florida
Critical Reading Strategy
Technology 101 Changing the way, we work, live, play and learn.
Presentation transcript:

G&W Chapter 12: The Project’s Name Software Specification Lecture 19 Prepared by Stephen M. Thebaut, Ph.D. University of Florida

What’s in a Name? When Juliet asked: “What’s in a name? That which we call a rose By any other name would smell as sweet.” Romeo should have responded: “But sooth, a name foretells. It doth beckon what we see in a thing Before its true nature comes to light.” Software Specification: G&W Chapter 12

Software Specification: G&W Chapter 12 Anyone interested in smelling the slime-gag choke-warts from my garden? Software Specification: G&W Chapter 12

Software Specification: G&W Chapter 12 E-Super-Snoop? You are the CEO of a software company that develops electronic surveillance applications. Your soon-to-be-launched new product enables eavesdropping on internet connections. It basically collects information about e-mail or other electronic communications to or from specific users. What would you name it? Why? Software Specification: G&W Chapter 12

Software Specification: G&W Chapter 12 Carnivore In 2000, the FBI announced the development of their “state of art” electronic eavesdropping software, “CARNIVORE”. Their explanation of the name was: “Carnivore chews all the data on the network, but it only actually eats the information authorized by a court order.” What do you think of this name? What do you think happened? Software Specification: G&W Chapter 12

Carnivore Under Attack Even before its release, Carnivore was the subject of several lawsuits brought about by civil liberties / privacy advocacy groups. Public concern about government surveillance increased dramatically. Software Specification: G&W Chapter 12

Carnivore Under Attack (cont’d) At the end of a review conducted by the Justice Department, the first recommendation was: “change the name”. Carnivore was subsequently renamed “DCS (Digital Collection System) 1000. Software Specification: G&W Chapter 12

Just When We’re Convinced that Names ARE Important G&W tell us: “the important thing is not the name, but the naming” Software Specification: G&W Chapter 12

Software Specification: G&W Chapter 12 The Naming Heuristic Propose a name. Offer three reasons why the name is not adequate / desirable. Propose another name that eliminates these problems. Repeat the naming process until you develop a usable name. Don’t go on forever looking for the perfect name. It doesn’t exist. Software Specification: G&W Chapter 12

Helpful Hints and Variations A face-to-face naming session early in the project has many side benefits. If offers a relatively innocent task as an excuse for the major players to get acquainted. If the players don’t act as if it’s an innocent task, it may be indicative of problems to come. Have a dictionary and thesaurus available when meeting to explore names. Software Specification: G&W Chapter 12

Helpful Hints and Variations (cont’d) Consider choosing a name and subtitle. The name can be an acronym or a symbol, while the subtitle is the actual working title. E.g., Liberty: A Tool to Assist ISP’s with Court-Mandated Data Collection “Backronyms” often lead to inaccurate and/or ambiguous titles, but can be used as an idea generating device. Software Specification: G&W Chapter 12

G&W Chapter 12: The Project’s Name Software Specification Lecture 19 Prepared by Stephen M. Thebaut, Ph.D. University of Florida