Use Cases
Systems Analysis and Development: ATM Service Software Development
Overview
An Automated Teller Machine or ATM is a faster way that has been developed in making a faster bank transaction. ATM has been part of new generation’s banking system and a new way of having instant cash-on-hand using our own ATM card. This study will discuss about the development of Automated Teller Machine as well as the simple process on how a person can easily have his or her bank transaction in just a matter of minutes. The process includes ATM account withdrawals, account deposits and account transfers. Using an ATM, customers can access their banking records to help make money distributions, debit card cash advance, and check their account balance out as well as purchase pre-paid cell phone credit. ATMs often provide one of the best possible formal forex rates for foreign tourists, and are also commonly used for this purpose. In addition to this study, we will include some various requirements modeling techniques involving the Automated Teller Machine. This research study will also include the ethical issue that the use case exposes in connection with the development or even the use of Automated Teller Machine systems.
ATM Account Withdraw
This is the step-by-step procedure in withdrawing in ATM Machine. First, the client will insert the ATM (Automated Teller Machine) card to the ATM. After the ATM validates the card, the client would enter his PIN (Personal Identification Number) password to verify his credentials. Make sure that he enters the correct pin. The client will choose what transaction account he will do either to check for his balance inquiry or to proceed to withdraw from his account. If the client chooses to check his balance inquiry, he will see how much money was left in his account for him to proceed with another transaction account. If he chooses to get amount directly the client will type the amount that he wish to withdraw. Wait for the machine to process the transaction from his account. His account transaction can either be rejected because the amount he wants to withdraw is bigger than the amount left in his account or the transaction can proceed because of the amount he wants to withdraw is smaller than the amount left in his account. The transaction will be successful if the client has successfully withdraws a money from his account. From then, he can collect the cash, and perhaps count it. His transactions will be recorded to his account. An official receipt will be issue to the client after the withdrawing is done. He can either continue with another transaction or end the transaction. If the client chooses to continue with another transaction he will go back from choosing what transaction he will do. If he chooses to end the transaction, the card will be ejected from the ATM and the client’s credentials will no longer be available on the ATM machine for further transaction.
ATM Account Deposit
ATM Account Transfer
In transferring money, the client would insert his card to the ATM (Automated Teller Machine). The client is required to enter his PIN (Personal Identification Number) password for verification of his account’s credentials. Check the balance in the account that you want to transfer from to ensure you have the money available to transfer to other account. The machine will give options for the transaction he wants to make. The client must choose the transfer transaction in order to make a transfer of money from his account to another. The client will enter the amount he wants to transfer from his account. Then, he will choose on what account he will be transfering his money. The client will input the account number of the person he has a transaction with. He will send the transaction. The machine will print out an official receipt. To finish account transaction, the card will be ejected from the machine and the client’s credential will no longer be available.
Modeling Techniques
Odoni et al. (1997), asserts that in order to research, assess and confirm such new ideas, the ATM community will have to depend intensely on designs and computer-based tools/utilities, protecting a variety of problems and analytic relevant to safety, potential and performance. State of the art in such modeling support is sufficient in some aspects, but clearly lacking in others. The evaluation of the strong points and weaknesses of current fast-time designs and resources for the research of ATM systems and ideas and determining and showing priority for the requirements for the growth of more modeling abilities in the long run should be considered (Odoni, et al., 1997).
Vasumathi and Dhanavanthan (2012) said that according to Pieter Tjerk de Boer (1983), significant focus has been devoted to the evaluation of overflow possibilities in lining up in networks. A different flexible method has used to lining up problems than in the existing work with few simple designs been considered. Article of S. S. Lavenberg (1989) has mentioned that duration of simulation is sufficient in learning a complicated confidence estimate of intervals. Average simulator time periods are discovered to be adequate to acquire accurate assurance period reports. As existing settings at each step of benefits or savings techniques is possibly infeasible, thus the substitute configuration is one that results in the biggest savings in some requirements features with these techniques can be discovered in Clarke and Wright (1964) or in Solomon (1987) (Vasumathi & Dhanavanthan, 2012).
Another modeling technique for Automated Teller Machine is the use of biometric or finger print scanning. Oko and Oruh (2012) say that biometrics-based verification offers several advantages over other verification. Finger marks technological innovation in particular, can provide a much more precise and efficient user verification method. Biometrics is a quickly improving field that is involved with determining a person depending on his or physical or behavior features. As the Computerized Teller Machines (ATM) technological innovation is improving, scammers are creating different skills to defeat the security of ATM functions. Various types of scams are perpetuated, varying from: ATM cards robbery, going over, pin robbery, cards audience methods, pin pad methods, power distributions and lot more. Handling the risk associated with ATM scams as well as reducing its effect is an important issue that encounters banking organizations as scams methods have become more innovative with improved situations (Oko & Oruh, 2012). The primary reason for presenting fingerprint techniques is to increase overall protection. Biometrics provides greater protection and comfort than conventional methods of personal identification. In some programs, biometrics can substitute or complement the current technological innovation. In others, it is the only practical strategy. Decision-makers need to understand the level of protection assured through the use of fingerprint techniques and the distinction that can are available between the understanding and the truth of the feeling of protection offered.
Ethical Issue
Using an ATM or banking services are targeted at those associates in community that have a frequent non-reusable income. They have, over the past 30 years, become more customers friendly and have increased their opportunity to a range of expenses and other money services. These services are not available to individuals who do not have access city centers. The service do not include contact with individuals some clients are less satisfied about working completely with a machine. There are effects of tele banking, Internet banking, especially Automated Teller Machine.
Withdrawing from ATM
ATM
ACCOUNT TRANSFER
ATM
ACCOUNT DEPOSIT
References
Burpadel.es (n.d.). flowchart of atm - flowchart of asynchronous transfer mode. Retrieved May 4, 2013, from http://burpadel.es/or-flowchart-of-atm.phtml
Creately.com (n.d.). ATM System (Use Case) ( Use Case Diagram (UML)) | Creately. Retrieved May 4, 2013, from http://creately.com/diagram/example/gsxncbyb1/ATM%2BSystem%2B%2528Use%2BCase%2529
Epf.eclipse.org (n.d.). Example: Use-Case Specification. Retrieved May 4, 2013, from http://epf.eclipse.org/wikis/openup/core.tech.common.extend_supp/guidances/examples/use_case_spec_CD5DD9B1.html
Etutorials.org (n.d.). 4.4 Dependencies :: Chapter 4. Use-Case Diagrams :: Part II: Structural Modeling :: Learning UML :: Programming :: eTutorials.org. Retrieved May 4, 2013, from http://etutorials.org/Programming/Learning+uml/Part+II+Structural+Modeling/Chapter+4.+Use-Case+Diagrams/4.4+Dependencies/
Odoni, A., Bowman, J., Delahaye, D., Deyst, J., Feron, E., Hansman, J., Khan, K., Kuchar, J., Pujet, N., & Simpon, R. (1997, March). Existing and Required Modeling Capabilities for Evaluating ATM System Concepts. Retrieved from http://catsr.ite.gmu.edu/ATSE/OdoniModelingResearchReview.pdf
Oko, S., & Oruh, J. (2012). ENHANCED ATM SECURITY SYSTEM USING BIOMETRICS. Retrieved from http://ijcsi.org/papers/IJCSI-9-5-3-352-357.pdf
Vasumathi, A., & Dhanavanthan, P. (2012, October). Application of Simulation Technique in Queuing Model for Atm Facility - Term Papers - Cschan88. Retrieved from http://www.studymode.com/essays/Application-Of-Simulation-Technique-In-Queuing-1120694.html
Wang, Y. (n.d.). The Formal Design Model of an Automatic Teller Machine. Retrieved from http://enel.ucalgary.ca/People/wangyx/Courses/SENG523/Tutorials/ATM%20Architecture.pdf