ENG501 Software Design and Development for Data Science

ENG501 Software Design and Development for Data Science

Subject Title

Software Design and Development for Data Science

 

Subject CodeENG501
Assessment

Assessment 3 – Final Project (Individual):

 

Individual/Group

Individual

 

Length

2,500 words (±10%)

 

Use of AI Category (A/B/C/D) 

 Category B – Limited and Transparent Use of AI

 

Learning OutcomesSLO-3,4
SubmissionWeek 12
Weighting40%
Total Marks40

Context

In this assessment, students take the design and recommendations of their group from assessment 2 and prepare a report discussing processes and issues relating to security, reliability and testing, including issues relating to the data the system is utilising, and recommend specific processes that must be included when the system is implemented.

 
Instructions

 

SectionDescriptionApprox. Words
1. Introduction & System ContextOverview of system from Assessment 2 and purpose of report250–300
2. Security ConsiderationsSecurity risks, controls, compliance, and processes500–550
3. Reliability & AvailabilityFault tolerance, monitoring, backups, resilience400–450
4. Data Issues & GovernanceData quality, bias, drift, lifecycle, governance processes400–450
5. Testing & ValidationSoftware, data, model testing, UAT, continuous testing350–400
6. Recommended Implementation ProcessesGovernance, change management, training, monitoring350–400
7. ConclusionSummary and reflection on implementation readiness200–250
References APA styleWill not be counted in word limit
Total ~2,500 words

 

Submission Instructions

 

·   Submit one individual report via Open Learning 

·   File format: Word 

·   Usea cover sheet, logical section headings, and explicit references guidance, aligned with ENG501 and academic expectations.

·   Late submissions are subject to Institutional penalties.

CriterionHD (85–100%)D (75–84%)C (65–74%)P (50–64%)F (<50%)Marks
1. System Understanding & Context (SLO 3)Excellent understanding; strong continuity with Assessment 2; context clearly articulatedClear understanding with good continuityAdequate understanding; minor gapsBasic summary; limited linkagePoor or unclear system understanding6
2. Security Analysis & RecommendationsComprehensive, well‑justified security analysis with realistic processesStrong analysis with appropriate recommendationsSound but limited depthBasic discussion; mostly descriptiveWeak or inaccurate analysis6
3. Reliability & Availability (SLO 4)Insightful analysis of resilience, fault tolerance, and monitoringClear and relevant discussionAdequate but surface‑levelLimited consideration of reliabilityMinimal or incorrect discussion6
4. Data Quality & GovernanceExcellent treatment of data issues, bias, lifecycle, and governanceStrong understanding with good examplesCompetent discussionBasic coverage onlyPoor understanding of data issues6
5. Testing & ValidationComprehensive, realistic testing strategy including AI modelsWell‑structured testing discussionAdequate but incompleteLimited testing coverageInadequate or missing testing6
6. Implementation Processes & PracticalityHighly practical, well‑reasoned processesClear and feasible recommendationsGenerally appropriate processesVague or generic recommendationsUnrealistic or missing processes4
7. Conclusion & IntegrationExcellent synthesis of key points; clearly demonstrates how processes support secure and reliable implementationClear and coherent conclusion summarising insightsAdequate summary with limited integrationWeak or repetitive conclusion

Missing or irrelevant conclusion

 

2
8. References & Academic SourcesHigh‑quality, credible sources; consistently and correctly referenced using an academic styleAppropriate sources with minor referencing issuesAdequate sources; some inconsistenciesLimited or weak sources; formatting issuesMissing, incorrect, or uncited references2
9. Use of AI & Academic Integrity, References Appropriate, transparent, critical use with clear declarationAppropriate use declaredDeclaration present but limited detailMinimal complianceNo declaration or misuse2
Total     40

 

 

Note: This report is provided as a sample for reference purposes only. For further guidance, detailed solutions, or personalized assignment support, please contact us directly.

ENG501 – Assessment 3 Final Project (Sample Solution)

Title

Secure and Reliable AI-Based Student Performance Prediction System: Security, Reliability, Data Governance and Testing Framework

1. Introduction & System Context

The proposed system developed in Assessment 2 was an AI-driven Student Performance Prediction and Recommendation System designed for higher education institutions. The purpose of the system is to analyse student academic records, attendance, LMS activity, assessment performance, and behavioural engagement data to predict students at risk of poor academic outcomes. Based on these predictions, the system generates personalised intervention recommendations for educators and academic advisors.

The project was developed to address increasing concerns regarding student retention, academic underperformance, and delayed institutional intervention. Traditional monitoring methods often fail to identify struggling students early enough. Therefore, integrating machine learning and predictive analytics enables institutions to proactively support students and improve academic success rates.

The system architecture includes a cloud-hosted web application connected to a centralised student database and machine learning engine. The platform collects structured and semi-structured data from institutional systems such as Learning Management Systems (LMS), student information systems, and assessment repositories. The AI model processes the collected data and generates risk scores and intervention suggestions.

While the system offers substantial operational and educational benefits, implementing such a data-driven intelligent system introduces critical challenges related to cybersecurity, system reliability, ethical data governance, testing accuracy, and operational sustainability. Educational data contains highly sensitive personal information, making security and privacy essential requirements. In addition, AI-based systems are vulnerable to issues such as data drift, algorithmic bias, incorrect predictions, and infrastructure failures.

This report critically evaluates the processes and implementation requirements necessary to ensure that the proposed system operates securely, reliably, ethically, and effectively. The report discusses security risks and controls, reliability mechanisms, data governance concerns, testing strategies, and implementation processes required for successful deployment in a real-world educational environment.

2. Security Considerations

Security is one of the most critical aspects of implementing an AI-driven student analytics platform because the system processes confidential academic and personal data. If security vulnerabilities are not properly managed, institutions may face data breaches, legal penalties, reputational damage, and loss of stakeholder trust.

2.1 Key Security Risks

One major risk is unauthorised access to student records. Attackers may exploit weak authentication systems or compromised credentials to gain access to sensitive information such as grades, attendance records, and personal identifiers.

Another risk is data interception during transmission between users, databases, and cloud services. Without secure communication channels, attackers could capture confidential information using man-in-the-middle attacks.

The AI model itself also introduces security concerns. Adversarial attacks may manipulate input data to generate inaccurate predictions. Furthermore, malicious users may attempt data poisoning attacks during model retraining processes, which could reduce model accuracy and reliability.

Insider threats are another important issue. Employees with excessive access privileges may intentionally or unintentionally misuse institutional data. In educational institutions, improper handling of student information by staff members remains a common cybersecurity concern.

Cloud infrastructure vulnerabilities also present risks. Since the proposed system operates within a cloud-based environment, misconfigured storage services, insecure APIs, or weak access controls could expose sensitive data publicly.

2.2 Security Controls and Safeguards

To reduce these risks, the system should implement multi-factor authentication (MFA) for all administrative and academic users. MFA significantly improves identity verification by requiring users to provide additional authentication factors beyond passwords.

Role-Based Access Control (RBAC) should also be implemented. Under RBAC, users only receive access permissions necessary for their responsibilities. For example, lecturers may access only their assigned students’ records, while system administrators manage infrastructure without viewing academic performance details.

Data encryption is essential for protecting information both at rest and in transit. The system should use AES-256 encryption for database storage and Transport Layer Security (TLS) protocols for network communication.

Secure API gateways should be deployed to protect communication between system modules. API rate limiting, authentication tokens, and request validation mechanisms can reduce risks associated with API abuse and unauthorised access attempts.

The institution should also implement regular penetration testing and vulnerability scanning. Security assessments help identify weaknesses before attackers can exploit them. Automated monitoring tools can continuously analyse suspicious activities and generate security alerts.

2.3 Compliance and Legal Considerations

Educational institutions must comply with data protection regulations and ethical standards. Depending on the country of implementation, regulations such as GDPR, FERPA, or the Australian Privacy Act may apply.

The system should follow privacy-by-design principles, ensuring that personal information is collected only when necessary and stored for limited periods. Students must also be informed about how their data is used for predictive analysis.

Audit logging should be implemented to maintain accountability. Every access attempt, modification, and prediction activity should be logged and reviewed periodically to detect suspicious behaviour.

2.4 Recommended Security Processes

Several operational processes are necessary to maintain long-term security:

  • Regular password rotation policies
  • Employee cybersecurity awareness training
  • Incident response planning
  • Backup and disaster recovery procedures
  • Security patch management
  • Third-party vendor security assessments

Continuous monitoring and governance are essential because cybersecurity threats constantly evolve. Security should therefore be treated as an ongoing operational responsibility rather than a one-time implementation activity.

3. Reliability & Availability

Reliability and availability are essential for ensuring uninterrupted system performance and maintaining user trust. Educational institutions rely heavily on digital systems, and system failures during academic periods could severely disrupt operations.

3.1 Fault Tolerance

The proposed system should incorporate fault-tolerant architecture to minimise downtime. Redundant servers and load balancing mechanisms should be deployed across multiple cloud regions. If one server fails, another server can automatically continue operations without interrupting user access.

Database replication should also be implemented to ensure data availability. Real-time replication ensures that backup databases remain synchronised with the primary database.

Microservices architecture can improve system resilience because individual services operate independently. If one module experiences issues, the entire system will not necessarily fail.

3.2 Monitoring and Performance Management

Continuous monitoring tools such as cloud monitoring dashboards and automated alert systems should be implemented. These tools monitor:

  • Server health
  • CPU and memory utilisation
  • API response times
  • Database performance
  • AI model inference latency

Predictive monitoring can identify performance degradation before service outages occur.

Log management systems should also centralise system logs for troubleshooting and incident analysis. Automated anomaly detection tools can detect unusual patterns that may indicate failures or cyberattacks.

3.3 Backup and Disaster Recovery

Data backup is essential because student records represent mission-critical institutional assets. Daily incremental backups and weekly full backups should be scheduled automatically.

Disaster recovery plans should define procedures for restoring operations after infrastructure failures, ransomware attacks, or natural disasters. Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) must be clearly established.

Cloud-based disaster recovery solutions can improve business continuity by enabling rapid system restoration from remote environments.

3.4 Scalability and Availability

The system must handle increasing student populations and growing data volumes. Cloud-native scalability allows computing resources to expand dynamically during high-demand periods such as examination seasons.

High availability architecture should target uptime levels of at least 99.9%. Achieving this requires redundant infrastructure, automatic failover systems, and continuous operational monitoring.

4. Data Issues & Governance

Data quality directly impacts the accuracy and fairness of AI predictions. Poor data governance can lead to biased recommendations, inaccurate risk assessments, and ethical concerns.

4.1 Data Quality Challenges

The system relies on data collected from multiple institutional sources. Inconsistent data formats, missing values, duplicate records, and outdated information may reduce prediction accuracy.

For example, incomplete attendance data may incorrectly classify students as disengaged. Similarly, inconsistent grading formats across departments may distort analytical outcomes.

Data validation rules should therefore be implemented during data ingestion processes.

4.2 Algorithmic Bias and Fairness

AI systems may unintentionally produce biased predictions if training data reflects historical inequalities. Students from disadvantaged backgrounds may be unfairly classified as high-risk due to socioeconomic correlations present in historical datasets.

Bias mitigation strategies should include:

  • Diverse training datasets
  • Fairness testing
  • Bias auditing
  • Human oversight during decision-making

Predictions should support educators rather than replace human judgment.

4.3 Data Drift and Model Degradation

Student behaviours and educational environments change over time. As a result, machine learning models may experience data drift, where prediction accuracy gradually declines.

Continuous model monitoring is necessary to detect performance degradation. Periodic retraining using updated datasets can improve long-term model effectiveness.

Performance metrics such as accuracy, precision, recall, and false positive rates should be monitored continuously.

4.4 Data Lifecycle Management

Effective governance requires clear policies for data collection, storage, usage, retention, and deletion.

The institution should establish:

  • Data ownership policies
  • Retention schedules
  • Consent management processes
  • Data access procedures
  • Secure deletion protocols

Metadata management and data cataloguing can improve transparency and accountability.

4.5 Governance Framework

A dedicated Data Governance Committee should oversee compliance, ethics, security, and quality management. The committee may include:

  • IT administrators
  • Academic staff
  • Legal advisors
  • Data scientists
  • Student representatives

Governance frameworks ensure that AI implementation aligns with institutional values and ethical responsibilities.

5. Testing & Validation

Testing and validation ensure that the system performs correctly, securely, and reliably before deployment.

5.1 Software Testing

Traditional software testing methods should include:

  • Unit testing
  • Integration testing
  • System testing
  • Regression testing

These tests verify that application components function correctly and interact properly.

Performance testing should evaluate system responsiveness under heavy user loads.

5.2 Security Testing

Security testing should include:

  • Penetration testing
  • Vulnerability scanning
  • Authentication testing
  • Access control verification

Ethical hacking exercises can identify exploitable weaknesses before attackers discover them.

5.3 AI Model Testing

AI models require specialised validation processes. The model should be tested using separate training, validation, and testing datasets.

Evaluation metrics should include:

  • Accuracy
  • Precision
  • Recall
  • F1-score
  • ROC-AUC

Bias testing should also be conducted to identify unfair outcomes across demographic groups.

Explainable AI techniques should be implemented to improve transparency and user trust.

5.4 User Acceptance Testing (UAT)

User Acceptance Testing ensures that educators and administrators can effectively use the system in practical environments.

End users should evaluate:

  • Dashboard usability
  • Report accuracy
  • Recommendation usefulness
  • Workflow compatibility

Feedback collected during UAT should guide final refinements before deployment.

5.5 Continuous Testing

Continuous testing pipelines should be integrated into DevOps workflows. Automated testing ensures that future updates do not introduce new defects or vulnerabilities.

Continuous monitoring and validation are especially important in AI systems because model behaviour can evolve over time.

6. Recommended Implementation Processes

Successful implementation requires strong governance, organisational readiness, and operational planning.

6.1 Governance and Oversight

A cross-functional governance team should supervise implementation activities. Responsibilities should include:

  • Risk management
  • Compliance monitoring
  • Ethical review
  • Project oversight
  • Policy enforcement

Clear accountability structures improve implementation consistency.

6.2 Change Management

Educational institutions often face resistance when introducing AI technologies. A structured change management strategy is therefore essential.

The organisation should:

  • Communicate implementation goals clearly
  • Involve stakeholders early
  • Address concerns transparently
  • Provide implementation timelines

Stakeholder engagement improves adoption and reduces resistance.

6.3 Staff Training and Awareness

Academic staff and administrators require training to interpret AI predictions responsibly. Training programs should cover:

  • System usage
  • Data privacy obligations
  • Ethical AI principles
  • Security awareness
  • Incident reporting procedures

Technical staff should also receive specialised cybersecurity and cloud infrastructure training.

6.4 Monitoring and Continuous Improvement

Post-deployment monitoring is necessary to evaluate operational performance and identify improvement opportunities.

Key performance indicators may include:

  • Prediction accuracy
  • System uptime
  • User satisfaction
  • Security incidents
  • Student retention improvements

Regular audits and review cycles should support continuous improvement initiatives.

6.5 Ethical and Responsible AI Practices

The institution must ensure that AI recommendations remain transparent, explainable, and accountable.

Students should have opportunities to challenge incorrect predictions or request clarification regarding automated decisions.

Human oversight should remain central to all critical academic decisions.

7. Conclusion

The AI-based Student Performance Prediction and Recommendation System offers significant potential to improve student success, institutional efficiency, and proactive academic intervention. However, implementing such a system requires careful consideration of security, reliability, governance, testing, and ethical responsibilities.

This report identified key cybersecurity threats, reliability challenges, and data governance concerns associated with intelligent educational systems. Appropriate controls such as encryption, access management, monitoring, fault tolerance, disaster recovery, and governance frameworks are essential to ensuring secure and sustainable operations.

The report also highlighted the importance of data quality management, bias mitigation, continuous testing, and responsible AI practices. Since AI systems directly influence educational decision-making, transparency and accountability remain critical implementation priorities.

Ultimately, successful deployment depends not only on technical capabilities but also on organisational readiness, stakeholder engagement, ethical governance, and continuous operational improvement. By implementing the recommended processes, institutions can build secure, reliable, and trustworthy AI systems that support both educators and students effectively.

Example invalid form file feedback

Join our 150К of happy users

Get original papers written according to your instructions and save time for what matters most.