Topics Module 5 Logical And Physical Design User Interface Design

Slides:



Advertisements
Similar presentations
Software Quality Assurance Plan
Advertisements

Systems Analysis and Design Feasibility Study. Introduction The Feasibility Study is the preliminary study that determines whether a proposed systems.
ATTENTION This presentation breaks down the purchasing process into 6 steps, which are then detailed in the subsequent slides. While responding from either.
The System Development Life Cycle
Network Design and Implementation
Designing new systems or modifying existing ones should always be aimed at helping an organization achieve its goals State the purpose of systems design.
6.1 Copyright © 2014 Pearson Education, Inc. publishing as Prentice Hall Building Information Systems Chapter 13 VIDEO CASES Video Case 1: IBM: Business.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Fundamentals of Information Systems, Second Edition
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 18-1 Accounting Information Systems 9 th Edition Marshall.
Systems Design, Implementation, Maintenance, and Review
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
7.2 System Development Life Cycle (SDLC)
Principles of Information Systems, Tenth Edition
Concepts of Database Management Seventh Edition
13.1 © 2007 by Prentice Hall 13 Chapter Building Systems.
1 Principles of Information Systems, Ninth Edition Chapter 13 Systems Development: Design, Implementation, Maintenance, and Review.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
Chapter 8: Systems Development Please turn your cell phone off.
Designing new systems or modifying existing ones should always be aimed at helping an organization achieve its goals The primary emphasis of systems implementation.
Systems Investigation and Analysis
Concepts of Database Management Sixth Edition
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Concepts of Database Management, Fifth Edition Chapter 8: Database Administration.
Concepts of Database Management Eighth Edition
Chapter 14 Information System Development
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Fundamentals of Information Systems, Third Edition1 Systems Design Answers the question “How will the information system do what it must do to solve a.
Principles of Information Systems Eighth Edition
Systems Development: Design, Implementation, Maintenance, and Review
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Systems Analysis and Design
Systems Life Cycle A2 Module Heathcote Ch.38.
Topics Covered Phase 1: Preliminary investigation Phase 1: Preliminary investigation Phase 2: Feasibility Study Phase 2: Feasibility Study Phase 3: System.
Fundamentals of Information Systems, Second Edition 1 Systems Development.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 12 The Network Development Life Cycle
GCSE ICT 3 rd Edition The system life cycle 18 The system life cycle is a series of stages that are worked through during the development of a new information.
Principles of Information Systems Eighth Edition Chapter 13 Systems Development: Design, Implementation, Maintenance, and Review.
The System Development Life Cycle
Principles of Information Systems Eighth Edition
Information Security Policy
The Network Development Life Cycle
Chapter 1 The Systems Development Environment
System Design, Implementation and Review
Information Systems Development
Chapter 11 Designing Inputs, Outputs, and Controls.
Fundamentals of Information Systems, Sixth Edition
Principles of Information Systems Eighth Edition
Fundamentals of Information Systems, Sixth Edition
Chapter 1 The Systems Development Environment
Initiating systems development
Processing Integrity and Availability Controls
Developing Information Systems
Chapter 1 The Systems Development Environment
The System Development Life Cycle
CLINICAL INFORMATION SYSTEM
Introduction to Systems Analysis and Design
Modern Systems Analysis and Design Third Edition
Information Systems, Ninth Edition
Introduction to Systems Analysis and Design Stefano Moshi Memorial University College System Analysis & Design BIT
Principles of Information Systems Eighth Edition
MANAGING THE DEVELOPMENT AND PURCHASE OF INFORMATION SYSTEMS
Modern Systems Analysis and Design Third Edition
Information Systems Development (ISD) Systems Development Life Cycle
Modern Systems Analysis and Design Third Edition
Chapter 1 The Systems Development Environment
Chapter 13 Building Systems.
Presentation transcript:

Topics Module 5 Logical And Physical Design User Interface Design Disaster Recovery System Controls Evaluating Alternatives

Systems Design

Systems design Logical design presents the functional or business requirements of an application solution independent of physical or technical considerations. It presents a model for solving a problem from an end-user or business standpoint. Logical data-flow diagrams (DFDs) are good tools to confirm the business models with end-users.

Logical Design Output design: types, format, content, frequency Input design: types, format, content, frequency Processing design: calculations, comparisons, manipulations File & database design: capabilities and organization

Logical Design Telecommunications design: high-level network description Procedures design: automated & manual Controls & security design Personnel & job design

Systems design Physical design consists of detailed specifications for hardware, software, processing logic, input/output methods and media, manual procedures, and controls. Physical design will be shaped by the requirements of the logical design and existing technical, economic, or operational constraints. Physical DFDs are created from logical DFDs.

Physical Design Hardware design Software design Database design Telecommunications design Personnel design Procedures & controls design

Special System Design Considerations Sign-on procedures Interactive processing Interactive dialog Preventing, detecting, and correcting errors

Interface Design and Controls Figure 13.2: The Levels of the Sign-On Procedure Principles of Information Systems, Eighth Edition

Interface Design and Controls Figure 13.3: Menu-Driven System Principles of Information Systems, Eighth Edition

User interfaces Designing the user interface is one of the most important IS considerations. The interface should be user-friendly. If multiple applications are used, the interface should be consistent so that the users are not confused when switching between applications.

Interface Design and Controls Table 13.1: The Elements of Good Interactive Dialogue Principles of Information Systems, Eighth Edition

User interfaces Some user interface considerations include: procedures for signing on — by group, by level, by individual password interactive processing, including help menus, lookup tables, restart procedures interactive dialogue considerations and rules preventing and detecting errors by designing automatic tests and procedures for correction of errors, such as methods for reversing errors

Features For User Interface Design Screen type Screen size Resolution Fonts Color Keyboard layout Shortcut keys versus mouse

Emergency procedures and disaster recovery Disasters can and do occur, whether a natural disaster such as a flood, or a human-related problem such as sabotage or strikes. Plans must be developed to ensure the integrity of the corporate data and to keep the information systems running until things resume to normal.

Emergency procedures and disaster recovery Planning includes identifying potential problems, prioritizing both the problems and the need to maintain automated systems (for example, some processes can be handled manually in an emergency), identifying key personnel, reviewing options, assessing risk versus cost, and developing a plan. The business resumption plan is called different names, such as the contingency plan or the disaster recovery plan.

Emergency procedures and disaster recovery Disaster recovery is the implementation of the business resumption/disaster plan. The major tool used for disaster recovery is backup — of data, programs, hardware, software, telecommunications, and personnel. Options include: another company that has identical hardware and software a hot site that has all the requisite hardware and software and can be turned on instantly to replace the damaged computing site.

Emergency procedures and disaster recovery (cont.) a cold site or shell that consists of a computer environment with rooms, telecommunications, and devices to which a mainframe can be brought and to which data and programs can be transferred via telecommunications selective backup, where only critical files are backed up every night incremental backup, where only changes made to files during the last day or week are backed up, using an image log — a separate file containing only changes which is created whenever an application is used

Emergency Alternate Procedures & Disaster Recovery Telecommunications backup Personnel backup Hardware backup Software & database backup

Hardware backup Disaster recovery plans Hot site Cold site

Software & Database Backup Selective backups Incremental backups Image log

Systems controls Internal controls must be applied to protect IS from errors and irregularities. General controls and application controls are two types of internal controls. General controls include: hardware controls software controls data security controls operations controls management controls

Systems controls Complete user, system, and operational documentation is essential for maintaining a sound general control environment. Application controls include: input controls — a commonly used technique to detect input error is batch control totals processing controls — examples include built-in processing error-detection and range tests for reasonableness and check digit tests

Systems controls (cont.) output controls — examples include distribution lists, verification of output results, and protection of confidential output data controls — examples include backing up of data and program files and the custody of data by the data librarian

Systems controls There is far greater access to corporate data than ever before as users enhance their productivity by using the computer. An appropriate balance must be struck between access to data and the proper care and security of data for individuals who are not data processing professionals. A corporate policy must be established to control end-users’ access to company data. Internal control measures are needed to ensure that data are used effectively and updated correctly.

Generating systems design alternatives When new hardware and software are to be acquired, the appropriate document is prepared: Request for Quotation (RFQ) Request for Information (RFI) Request for Proposal (RFP)

Generating Systems Design Alternatives Figure 13.5: A Typical Table of Contents for a Request for Proposal Principles of Information Systems, Eighth Edition

Generating Systems Design Alternatives Figure 13.6: The Stages in Preliminary and Final Evaluations Principles of Information Systems, Eighth Edition

Evaluating and selecting systems design There are generally two steps in evaluating proposed designs — preliminary evaluation and final evaluation: The preliminary evaluation is held to eliminate those proposals that clearly do not meet the minimum criteria, and to compare the remainder to the criteria so as to reduce them down to a small number or short list.

Evaluating and selecting systems design (cont.) The vendors on the short list will be required to make a formal presentation and conduct demonstrations of their system, preferably with real (but not live) data as part of the final evaluation, a much more comprehensive and time-consuming process.

Evaluating and selecting systems design (cont.) Evaluation techniques include four processes, not mutually exclusive: group consensus cost-benefit analysis benchmark tests point evaluations

Table 13.4

Evaluation Techniques Figure 13.7: An Illustration of the Point Evaluation System Principles of Information Systems, Eighth Edition

Freezing Design Specifications User agrees in writing that design is acceptable Figure 13.8: Freezing Design Specifications Principles of Information Systems, Eighth Edition

The Contract Vendors provide standard contracts to protect themselves Organizations often use outside consultants and legal firms to develop contracts that state: All equipment specifications, software, training, installation, maintenance, etc. Deadlines for various stages Actions that vendor will take in case of delays or problems Penalty clauses Principles of Information Systems, Eighth Edition

Design report The final result is the design report and recommendations. The design report contains technical specifications in terms of characteristics of systems components.

Questions (?)