Web Base Executive Information System for Administration of

advertisement
A .NET Framework for University Administration
R.V.S.P.K. Ranatunga and R.G.N. Meegama
Centre for Computer Studies, Sabaragamuwa University
Belihuloya, Sri Lanka
{spkr},{rgn}@sab.ac.lk
Abstract: - Presently, all official work related to human resource management in a majority of
Universities in Sri Lanka is done manually. This results in plenty of paper work, unavailability of
information when required in a timely manner and conflictions spread over the staff and administration.
An Executive Information System (EIS) is developed for the University Administration to establish an
efficient, productive and a well-informed administration structure that will provide timely information
to the decision makers to carry out administrative functions promptly and efficiently. Initially, the
requirements are identified to investigate the existing administration procedures. Object oriented
methodologies are used to analyze the system while Unified Modeling Language (UML) is utilized to
modularize the system behavior. Then, the existing data in handwritten forms and letters in the files are
entered into a database for the purpose of analysis. Subsequently, these analyzed data sets are fed into a
computerized database using the software, based on VB.Net, ASP.Net and SQL Server technologies.
The proposed system is web-based that can be accessed via the campus-wide local area network with
access control permission. All administrative staff can interactively work and most of the paper
documents are handled electronically.
Key-Words: - .Net, EIS, TPS, University administration
1. Introduction
Although the universities have a good
information
infrastructure,
administration
processes are conducted using the traditional
paper-based manual system at the moment.
Because of this manual system, administration
often faces a lot of problems.
The overall goal of this paper is to
develop a functioning, well documented, web
based Executive Information System (EIS) that
meets almost all administration requirements,
following current standards in software design,
engineering and planning.
There are three main problems that can be
introduced by the University administration:
They are: (a) maintaining employee details of
both academic and non-academic staff (b)
controlling their activities and (c) maintaining
lecture schedules, non-academic work schedules,
leave, increments, conformation and promotions,
etc. The administration should provide necessary
information to the University Senate and to the
Council. In order to eliminate the existing
problems, this .Net EIS framework is proposed
for the administration of the University that will
facilitate: (a) providing online information of
establishment branch of the University (staff
appointments, automating salary increments,
automating promotion structure, generating
reports of staff who have taken study leave, etc.),
(b) providing online information on day-to-day
activities of employee (daily lecture schedules,
daily work schedules, daily overtime schedules,
leave information, etc.), (c) providing necessary
information and evidence for making decisions
at the Senate and Council and (d) providing
necessary information for making financial
decisions.
The administration staff will be the main
users of the system who will have access to the
information via the university intranet. Main
database is handled by an authorized person and
distributed through the intranet.
The development process of dynamic webbased systems poses very specific problems that
do not appear in other distributed software
applications, such as the need for mechanisms to
model sophisticated navigational structures,
interactive behaviors, interfaces with external
applications, security constraints, network and
client server architecture, session management
and state management. When implementing this
type of systems distributed discrete-event
simulation are becoming extremely important.
Basically Object Oriented Analysis and Design
(OOAD) provides much facilities to design such
systems. User interactivity and ease of
communication with the system is an essential
requirement. Rapid Application Development
(RAD) methodology provides incremental and
iterative process to carry out such functionality.
2. Requirements Analysis
2.1.
Domain Analysis
An analysis module will be used to generate
various kinds of required reports in tabular as
well as in graphical forms to the users. At the
first stage, a web-based Transaction Processing
System (TPS), is implemented to enter data into
the SQL database where access rights have been
granted to clerical staff. Subsequently, a
Dashboard Interface (DS) for the EIS is
programmed for all administrative and executive
staff in the university.
Top Executives get the information they
need from many sources, including letters,
memos, periodicals and reports produced
manually as well as by computer systems. Other
sources of EIS are meetings telephone calls, and
social activities. A majority of executive’s
information comes from non-computerized
sources.
The goal of a computer based EIS, as in
Fig. 1, is to provide management with immediate
and easy access to selective information about
factors that are critical to accomplishing top level
activities such as approving and monitoring.
Therefore, an EIS is easy to operate and
understand.
The domain for this software, in terms of
the software market, fits into the EIS which
includes the capabilities of tailored to executive
users, extract, filter, compress, and track critical
data, provide online status access, reports, and
drill down capabilities, access and integrated a
broad range of data, user friendliness and require
minimal training at all.
The system consists of application
software written in a visual programming
language which forms most of the user interface,
and a database which is used to store and analyse
the data.
The software is installed on the web
server and users are able to interactively use it on
the web browser. It follows the standard database
pattern of data entry, editing of data,
administration of users and data type tables, and
output in the forms of reports and graphs. Users
can dynamically carry out database activities
through the local area network.
Figure 1: Sample EIS
2.2 Requirement Specifications of the
Product
The software product performs the following
activities: employee registration, on time
increment approvals and calculations, on time
promotion
approvals,
calculating
carder
provision for the whole university, generating
various kinds of reports and letters pertaining to
the
university
administration,
retrieve
summarized information that is tailored to the
users, which directly helps administration
purposes. Except for these functions, includes
drilldown capabilities of the information, various
cross tabulations and graphic presentations of the
information, interchange that information among
the top level administration and interactive work
environment.
Since the University does not maintain a
computerized information system, according to
the literature survey, this product includes not
only the EIS but also a part of the system
containing the Transaction Processing System.
2.3 User Characteristics and Objectives
2.3.1 High Level Users
High Level Users have their own rights to access
the system and are limited to access, edit, update,
and delete the data of the system. They are
Council Members, Vice Chancellor, Registrar,
Senior Asst. Registrar and Asst. Registrars,
Bursar, Senior Asst. Bursar Asst. Bursars, Deans,
Directors, and Heads.
2.3.2 Low Level Users
Low Level Users too have their own rights to
access the system and are limited to access, edit,
update, and delete the data of the system. They
are clerk (data entry operator) and authorized
employees of the establishment branch.
2.3.3 Methods of Requirement Capturing
Used
<<communicate>>
In order to capture the requirements, the
following methods have been used to sample
existing documents: observations of the work
environment, research and site visits, interviews,
questionnaires, joint requirements planning, and
prototyping [2, 12].
Autorization
Low Level Users
<<include>>
<<include>>
<<communicate>>
Login to System
Profile Selecting
<<include>>
3. Modelling and Logical System
Design
The Unified Process is a software development
technique that transforms a user’s requirements
into a software system [7]. The Unified Process
uses the Unified Modeling Language (UML)
[3,4] when preparing all blueprints of the
software system [13].
According
to
the
requirements
specifications of the system, three Use Case
diagrams specify the software requirements
logically.
3.1.
Login Use Case Model
Security is an increasingly prominent and critical
concern for all software systems. Compared to
traditional software, new Internet applications
face new security issues which are too complex
to deal with without effective models and
decision support tools. When relevant actors for
a given software system belong to a closed
community, security is comparatively easy to
enforce and control. For flexible sharing among
members of dynamic and open groups such as
those on the Internet, different parts of networks
and systems may be operated by parties with
conflicting interests or even malicious intent.
Threats of varying technical difficulty targeting
different levels of a network infrastructure exist
everywhere [10].
This model specifies the authorization
profile, as in Fig. 2, selecting and log recording
requirements of the system that protects the
security and correctly updates the information in
the database.
3.1.1 Use Cases with Descriptions
Each Use Case should be documented with a
flow of events. The flow of events for a Use
Case is a description of the events needed to
accomplish the required behaviour of the Use
Case. It is written in terms of what the system
should do, not how the system does it [8,13].
High Level User
Update Login
Figure 2. Authorization Use Case Model
3.1.2 Low Level User Use Case model
This should include when and how the Use Case
starts and ends, what interaction the Use Case
has with the actors, what data is needed by the
Use Case, the normal sequence of events for the
Use Case, the description of any alternative or
exceptional flows.
4. IMPLEMENTAION
Since this research was to initiate on an iterative,
incremental framework, the best RAD tool in the
industry "Visual Studio.Net” was selected in the
application development process. The .NET
framework is the plumbing of .NET. It provides
the services necessary to develop and deploy
applications
for
the
loosely
coupled,
disconnected Internet environment [1,9].
It was identified from the available
versions in the market that Windows XP to be
the most appropriate operating system for the
implementation process. Embedded web-server
with Windows XP, IIS 5 is used as the web
server to implement the system.
Microsoft SQL Server was chosen as the
Database Management System for the system.
The key reasons for this selection were the
reliability, security and its compatibility with the
development tool and the operating system
selected. MS SQL server provides sophisticated
interfaces for implementing databases and gives
more facilities to manipulate data. Stored
procedures, user defined data structures, query
analysers are the very essential features for
developing this type of systems.
4.1 Implementation Framework
A framework was developed initially to
implement the basic functionality of a user
interface. The framework was tested thoroughly
before implementation within all user interfaces
[5].
4.1.2 Security Frame Work
A well-structured security system is an essential
for this application. The system uses its inbuilt
security system other than the operating system
or server provided security, because of the
following reasons:
1. the web and the database servers are running
on the same machine, it is technically easy to
maintain Integrated Security with Windows
Authentication to access the SQL Server
[14].
2. University local area network is the
implementation environment of the system
and it should use the facilities given by the
network. Thus, the system uses Windows
Authentication facility other than the
Anonymous Users to provide the web
services.
4.1.3 User Access to the system
Any user who needs access to the system gets the
user name and the password provided by the
system administrator. The user name and the
password is generated by the system using
encryption method with the provided information
by the system administrator. Once a user
receives the password from the system
administrator, he is able to change the password
by using change password option in the user
profile.
The server identifies the appropriate
profile and displays it, if the username and the
password is correct.
4.1.4 Access to Web Pages
Any unauthorized person is not allowed to use
other web page addresses in the system, directly
typing on the browser other than the login.aspx
web page. When implementing this security
details, session variables are used to transfer the
variables to the pages from the login.aspx.
Without the required session state variable
values, pages do not open up with established
functionality on the browser.
Web controls defined in the pages are
used to edit or change when the user has no
rights to change it. The annual increment form,
as an example, the head or dean is not allowed to
change values that the user had already filled and
submitted without the approval of the Vice
Chancellor. The officer at the Establishment
branch is not authorized to update the increment
of the employee without the approval of the Vice
Chancellor. An Asp label web control is used to
achieve this where an unauthorized user is
restricted from modifying the control values
when displayed it in the browser.
4.1.5 Profile Framework
As mentioned in the design phase, users can be
divided as high level users and low level users.
Profiles too are categorized as low level profiles
and high level profiles. All employees and clerks
fall into low level profiles and all administrative
staff (academic and non academic) belong to
high level profiles. The system first checks the
user authentication with login page and then
automatically selects the profile according to the
given user name and password. Higher degree of
user friendliness and interaction with other users
are applied with the user profiles.
4.1.6 Forms Framework
University employees use standard form sets to
request their increments, promotions, and
confirmations manually. Since these formats are
created in accordance with rules and regulations
mentioned in government circulars, the
administration is not empowered to change its
formats. These standard forms are implemented
in the system in the same format with a higher
degree of user friendliness. The user needs to fill
only very few data items and the system
automatically fills most of the fields in the
standard forms.
In order to display the submitted form on
a high level user profile (administration staff),
the system will provide necessary proofing tools
such as tables, charts to verify the entered data
by the submitted person.
4.1.7 Message/Letter Framework
The system has an inbuilt message and a mail
system. All users are able to send or receive
messages or letters. A maximum 8 Kb texts can
send to the registered users within the system.
The user-friendliness in this scenario is attributed
to the fact that a user need only to type his
message or letter. Other fields, such as sender
name, recipient name and date will be
automatically filled by the system or the user can
select them. The other important facility given
by this framework is automation of retrieving
standard letter formats in to the message or letter
body without typing it in the body [6].
4.1.8 Report Framework
Although Visual Stdio.NET provides embedded
report generating facilities for its applications,
the Crystal Report software system does not
support this functionality since it uses Integrated
security to login to the SQL Server and does not
use any user name password. One of the
technical problem that arises with this technique
is that VB.NET Crystal Report Viewer requires
the user id and password to read data from the
SQL Server [11].
To avoid this technical problem, the system
uses Crystal Report 9.0 version. When a user
requests a report from the web server, it first
selects the appropriate data into the dataset and
writes in the temporary XML file. The built in
crystal report function retrieves data from USER
DSN pertaining to the written XML file.
5. Conclusion
Most of the universities use manual information
systems for administration purposes in Sri
Lanka. Manual information systems do not
support the proper decision making structure and
as a result, these systems often come across
severe administration problems with the
increased number of students and staff members.
This paper provides the solution for this
problem with a web based executive information
system that works in a campus-wide local area
network. This framework mainly divides into
two: TPS and EIS. All data generated by the
university administration is stored in the data
base using TPS and other administration
activities are saved in the EIS. Most of the
documents are delivered electronically and it is
more useful to minimize wastage of time. The
system has the capabilities of a modern EIS such
as drill down facilities, user friendliness, dash
board concepts, and interactively work.
[1] B. Evjen and J. Beres, Visual Basic .net
Programming Bible, Wiley-Dreamtech India
Pvt. Ltd, 2003.
[2] Bentley and Dittman, Systems Analysis and
Design Methods, 5th edition, Prentice-Hall,
2004.
[3] G. Booch and J. Rumbaugh, The Unified
Modeling Language User Guide, 1st edition,
Person Education Ltd, Delhi, 1999.
[4] G. Booch, J. Rumbaugh, I. Jacobson, Unified
Modeling Language – Users Guide,
Addison Wesley, 1999.
[5] H. Igor, Introduction to Systems Analysis and
Design, 4th edition, Prentice Hall, 1998.
[6] Q. Jarry, Visual Modeling with Rational
Rose 2000 and UML, Reason Education Pvt.
Ltd, 2001.
[7] I. Jacobson, G. Booch and J. Rumbaugh, The
Unified Software Development Process,
Addision Wesley, 1999.
[8] I. Jacobson, M. Christerson, P. Jonson and
G.Overgaard, Object Oriented Software
Engineering: A Use Case Dirven Approch,
Addison Wesley, 1993.
[9] B. Jim, Web Database Development Step-byStep, Prentice-Hall, 2000.
[10] L. Liu, E.Yu and J. Mylopoulos, Analyzing
Security Requirements as Relationships
Among Strategic Actors, 2nd Symposium
on
Requirements
Engineering
for
Information Security (SREIS’02), Raleigh
North Carolina, 2002
[11] T. Quatrani, Visual Modelling with Rational
Rose 2000 and UML, Addision Wesley,
2000.
[12] L. Whitten, L. D. Bentley, Dittman and C.
Kevin,
Systems analysis and design
methods, 6th edition, McGraw-Hill, 2004.
[13] (www1) http://www.rational.com
[14] (www2)
http://msdn2.microsoft.com/enUS/library/ht43wsex(VS.80).aspx
Download