TABLE OF CONTENTS
1 DECLARATION - iii
CERTIFICATION .iv
DEDICATIONv
ACKNOWLEDGMENTS - ..vi
ABSTRACT. vii
TABLE OF CONTENTS - . viii
LIST OF FIGURES - . xiii
CHAPTER ONE: GENERAL INTRODUCTION.1
1.1 Introduction - 1
1.2 Research Motivation and Goals - .2
1.3 Research Question - .2
1.4 Research Objectives .3
1.5 Methodology - .3
1.6 Contributions to Knowledge - .4
1.7 Outline of Thesis - 5
CHAPTER TWO: LITERATURE REVIEW.6
2.1 Introduction - 6
2.2 Related Work - 6
2.3 Student Evaluation of Teaching (SET) ..10
2.4 Modern IS Design ..12
2.4.1 Information System.12
2.4.2 Computer-Supported Cooperative Work 13
2.4.3 Usability..14
2.4.4 Database Design - ..15
2.5 Summary 17
CHAPTER THREE: DESIGN OF WeBAIS18
3.1 Introduction - .18
3.2 Students: WeBAIS-graduate and WeBAIS-undergraduate - 20
3.3 WeBAIS-graduate Specific Functionality - 21
3.3.1 Graduate Admissions - 22
3.4 WeBAIS-undergraduate Specific Functionality - .23
3.4.1 Student Admission Module - .23
3.4.2 Student Registration Module ..23
3.4.3 Student Result Checking Module - 24
3.4.4 Student Evaluation of Teaching (Questionnaire) (SET).24
3.5 Faculty (WeBAIS-faculty) - ..24
3.6 Department Programs and Processes: WeBAIS-department .25
3.7 Staff: WeBAIS – Staff - 25
3.7.1 Staff Module - 25
3.7.2 Level Coordinator (Course Advisor) Module.26
3.7.3 Departmental Examination Officer Module - 26
3.7.4 Head of Department Module ..26
3.8 Summary 27
CHAPTER FOUR: IMPLEMENTATION OF WeBAIS - ..28
4.1 Introduction - .28
4.2 System Design29
4.3 System Architecture - .29
4.4 Application Architecture31
4.5 System Design (Data Flow Diagram – (DFD)) - 36
4.5.1 Difference with Flowcharts - .37
4.6 Web Interface Design - ..38
4.7 Database Design - ..39
4.7.1 User Role Database Structure .40
4.7.2 Content Management DB Structure41
4.7.3 SET – Database Structure - .42
4.8 Code Design - 43
4.8.1 Web Utility Classes 43
4.8.2 Authentication Related Classes - 45
4.8.3 Data Object Related Classes - 46
4.8.4 Tool Related Classes - .46
4.8.5 Summary.47
4.9 System Security - 47
4.9.1 Authentication.48
4.9.2 Authorization ..50
4.9.3 Encryption and Decryption - ..51
4.10 Summary 52
CHAPTER FIVE: DEPLOYMENT and APPRAISAL - 53
5.1 Introduction - 53
5.2 WeBAIS Implementation Status.53
5.2.1 WeBAIS Deployment Requirements56
5.3 Deployment ..57
5.3.1 Questionnaire design - 57
5.3.2 Results Presentation and Analysis - ..58
5.4 Summary - .64
CHAPTER SIX: SUMMARY, CONCLUSION AND RECOMMENDATION.65
6.1 Summary 65
6.2 Conclusion - ..65
6.3 Recommendation - .67
References - ..68
Appendix A: Data Flow Diagram of WeBAIS - ..72
Appendix B: WeBAIS E – R Diagram and Tables - .94
Appendix C: WeBAIS Questionnaire - ..96
.