E. Wainright Martin Carol V. Brown Daniel W. DeHayes Jeffrey A. Hoffer William C. Perkins MANAGINGINFORMATIONTECHNOLOGY FIFTH EDITION CHAPTER 9 (part b)

Slides:



Advertisements
Similar presentations
Logical and Physical Design of an Information System
Advertisements

E. Wainright Martin Carol V. Brown Daniel W. DeHayes Jeffrey A. Hoffer William C. Perkins MANAGINGINFORMATIONTECHNOLOGY FIFTH EDITION CHAPTER 10 M ETHODOLOGIES.
Pertemuan - 15 Matakuliah: M0304/Corporate Information System Management Tahun: 2008.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall 1 Managing Information Technology 6 th Edition CHAPTER 9 BASIC INFORMATION SYSTEMS.
Using Data Flow Diagrams
Chapter 10 The Traditional Approach to Design
Systems Documentation Techniques
Pertemuan 3 Konsep Dasar Teknologi Informasi
Chapter 22 Object-Oriented Systems Analysis and Design and UML Systems Analysis and Design Kendall and Kendall Fifth Edition.
Software Design Deriving a solution which satisfies software requirements.
Chapter 9: Basic Information Systems Concepts. Definitions u A system is a set of interrelated components that must work together to achieve some common.
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 8-1 MANAGING INFORMATION TECHNOLOGY 7 th EDITION CHAPTER 8 BASIC SYSTEMS CONCEPTS.
Copyright 2002 Prentice-Hall, Inc. Chapter 4 Automated Tools for Systems Development 4.1 Modern Systems Analysis and Design Third Edition.
Chapter 7 Using Data Flow Diagrams
Copyright 2002 Prentice-Hall, Inc. Chapter 4 Automated Tools for Systems Development 4.1 Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer.
E. Wainright Martin Carol V. Brown Daniel W. DeHayes Jeffrey A. Hoffer William C. Perkins MANAGINGINFORMATIONTECHNOLOGY FIFTH EDITION CHAPTER 5 T HE D.
E. Wainright Martin Carol V. Brown Daniel W. DeHayes Jeffrey A. Hoffer William C. Perkins MANAGINGINFORMATIONTECHNOLOGY FIFTH EDITION CHAPTER 9 (part a)
Chapter 9 Using Data Flow Diagrams
Chapter 7 Using Data Flow Diagrams
© Copyright 2011 John Wiley & Sons, Inc.
Systems Analysis and Design in a Changing World, 6th Edition
SE 555 Software Requirements & Specification Requirements Analysis.
©TheMcGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 1 Introduction to Object-Oriented Programming and Software Development.
1 A Student Guide to Object- Orientated Development Chapter 9 Design.
Structured Vs. Object Oriented Analysis and Design SAD Vs. OOAD
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 10 Structuring.
6 Systems Analysis and Design in a Changing World, Fourth Edition.
Chapter 6: The Traditional Approach to Requirements
System Analysis Overview Document functional requirements by creating models Two concepts help identify functional requirements in the traditional approach.
PHASE 3: SYSTEMS DESIGN Chapter 7 Data Design.
Systems Analysis and Design in a Changing World, Fifth Edition
2 Approaches to Requierements Engineering Reference: Systems Analysis and Design in a Changing World, 3 rd Edition, chapter 2 and chapter 6.
Chapter 6 The Traditional Approach to Requirements
Systems Analysis and Design in a Changing World, Fifth Edition
Systems Analysis – Analyzing Requirements.  Analyzing requirement stage identifies user information needs and new systems requirements  IS dev team.
Phase 2: Systems Analysis
Data Flow Diagram A method used to analyze a system in a structured way Used during: Analysis stage: to describe the current system Design stage: to describe.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 7 Slide 1 System models l Abstract descriptions of systems whose requirements are being.
Chapter 7 Structuring System Process Requirements
Chapter 7 Using Data Flow Diagrams
Information Systems Analysis and Design
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
1 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 12 Designing Systems Interfaces, Controls, and Security.
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 20 Object-Oriented.
5 Systems Analysis and Design in a Changing World, Fourth Edition.
Chapter 9 Moving to Design
Copyright 2002 Prentice-Hall, Inc. Chapter 2 Object-Oriented Analysis and Design Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey.
E. Wainright Martin Carol V. Brown Daniel W. DeHayes Jeffrey A. Hoffer William C. Perkins MANAGINGINFORMATIONTECHNOLOGY FIFTH EDITION CHAPTER 5 T HE D.
Modified by Juan M. Gomez Software Engineering, 6th edition. Chapter 7 Slide 1 Chapter 7 System Models.
Systems Analysis and Design in a Changing World, 3rd Edition
6 Systems Analysis and Design in a Changing World, Fifth Edition.
Sommerville 2004,Mejia-Alvarez 2009Software Engineering, 7th edition. Chapter 8 Slide 1 System models.
1 6 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 6 The Traditional Approach to Requirements.
Computing and SE II Chapter 9: Design Methods and Design Models Er-Yu Ding Software Institute, NJU.
CS223: Software Engineering
6 Systems Analysis and Design in a Changing World, Fourth Edition.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 12 Exploring Information System Development.
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 10 Structuring.
Systems Analysis and Design in a Changing World, Fourth Edition
Chapter 11 Designing Inputs, Outputs, and Controls.
Modern Systems Analysis and Design Third Edition
Architecture Concept Documents
Modern Systems Analysis and Design Third Edition
Modern Systems Analysis and Design Third Edition
Public Management Information Systems System Analysis & Design Tuesday, December 04, 2018 Hun Myoung Park, Ph.D. Public Management & Policy Analysis.
Modern Systems Analysis and Design Third Edition
Public Management Information Systems System Design Monday, July 01, 2019 Hun Myoung Park, Ph.D. Public Management & Policy Analysis Program Graduate.
Modern Systems Analysis and Design Third Edition
Lecture 23 CS 507.
CHAPTER 5 THE DATA RESOURCE
Presentation transcript:

E. Wainright Martin Carol V. Brown Daniel W. DeHayes Jeffrey A. Hoffer William C. Perkins MANAGINGINFORMATIONTECHNOLOGY FIFTH EDITION CHAPTER 9 (part b) B ASIC I NFORMATION S YSTEMS C ONCEPTS

© 2005 Pearson Prentice-Hall Chapter Page 366 Figure 9.10 Physical Model of a System BoxesMajor modules CylindersDatabases ArrowsFlow of data

© 2005 Pearson Prentice-Hall Chapter Page 366 Tools for the As-Is Model Must identify existing processes, external participants, other databases or applications, and inputs and outputs Tools used:   Procedures, policies, manuals, forms, reports   Other documentation   Group interviews

© 2005 Pearson Prentice-Hall Chapter Page 367 Context diagram – positions the system as a whole with regard to other entities and activities with which it interacts Work process flow diagram – identifies the existing information sources, information sources that are updated, order in which steps occur, and some of the dependencies Tools for the As-Is Model

© 2005 Pearson Prentice-Hall Chapter Page 367 Figure 9.11 Context Diagram for Accounts Payable Tools for the As-Is Model

© 2005 Pearson Prentice-Hall Chapter Page 368 Figure 9.12 Work Process Flow Diagram for Accounts Payable

© 2005 Pearson Prentice-Hall Chapter Page 367 Tools for the Logical To-Be Model High-level model of a nonexistent new system Identifies processes and data Does not identify who does activity, where accomplished, or type of hardware or software Describes “what” rather than “how” Most closely associated with data flow diagrams (DFDs)

© 2005 Pearson Prentice-Hall Chapter Page 369 Tools for the Logical To-Be Model Figure 9.13(A) Top-Level DFD for Accounts Payable System

© 2005 Pearson Prentice-Hall Chapter Page 369 Figure 9.13(A) Top-Level DFD for Accounts Payable System External Entity Data Flow Processes Data Store

© 2005 Pearson Prentice-Hall Chapter Page 369 Tools for the Logical To-Be Model Process of creating a DFD:   Identify entities that supply or use system information   Distinguish processes from data they use or produce   Explicate business rules that affect transformation of data to information   Identify logical relationships   Pinpoint duplicate storage and movement of data

© 2005 Pearson Prentice-Hall Chapter Page 370 Lower-level explosion DFD for Process 1.0

© 2005 Pearson Prentice-Hall Chapter Page 370 Figure 9.13(B) Second-Level DFD for Accounts Payable System Note process numbering scheme

© 2005 Pearson Prentice-Hall Chapter Page More logical modeling required after DFDs Need to define system’s data elements and relationships:   Data dictionary/directory (DD/D) used to define data elements   Entity-relationship diagram (ERD) used to define relationships between entities Tools for the Logical To-Be Model

© 2005 Pearson Prentice-Hall Chapter Page 371 Figure 9.14 Data Dictionary Sample Entry

© 2005 Pearson Prentice-Hall Chapter Page 372 Figure 9.15 Entity-Relationship Diagram for Invoice and PO Tools for the Logical To-Be Model

© 2005 Pearson Prentice-Hall Chapter Page 372 Figure 9.16 Key Terms for Logical Data Modeling Relational Database Terminology

© 2005 Pearson Prentice-Hall Chapter Page Tools for Documenting the Physical To-Be System Tools for physical design represent how:   processes and data stores partitioned   program control handled   database organized Tools include:   Program structure chart   Database design   System interface layouts

© 2005 Pearson Prentice-Hall Chapter Page 373 Figure 9.17 Program Structure Chart Program Structure Chart

© 2005 Pearson Prentice-Hall Chapter Page 374 Figure 9.18 Relationships for Data Elements in Accounts Payable Database Design (data relationships) (Screen shot reprinted with permission from Microsoft Corporation)

© 2005 Pearson Prentice-Hall Chapter Page 375 Figure 9.19 Input Form Layout for Vendor Invoice System Interface Input Layout Form (Screen shot reprinted with permission from Microsoft Corporation)

© 2005 Pearson Prentice-Hall Chapter Page 375 Figure 9.20 Check Register Report Layout with Sample Data Output Report Layout

© 2005 Pearson Prentice-Hall Chapter Page 374 Object-Oriented Techniques Object approach well suited for client/server applications, graphical interfaces, and multimedia data Primary advantage is ability to reuse objects programmed by others P ROCESSES AND T ECHNIQUES TO D ELIVER I NFORMATION S YSTEMS

© 2005 Pearson Prentice-Hall Chapter Page 376 Object-Oriented Techniques P ROCESSES AND T ECHNIQUES TO D ELIVER I NFORMATION S YSTEMS Figure 9.21 The Promise of Object-Oriented Approaches

© 2005 Pearson Prentice-Hall Chapter Page 376 Core Concepts P ROCESSES AND T ECHNIQUES TO D ELIVER I NFORMATION S YSTEMS Figure 9.22 Message Passing Object Encapsulation Inheritance Objects communicate with each other through messages that specify what should be done, not how it should be done

© 2005 Pearson Prentice-Hall Chapter Page 376 Unified Modeling Language (UML) For O-O Modeling P ROCESSES AND T ECHNIQUES TO D ELIVER I NFORMATION S YSTEMS Figure 9.22 Message Passing UML is standardization for O-O analysis and design modeling techniques and notations UML diagrams:   Use-case diagrams   Extended relationship use-case diagram   Sequence diagram   Class diagram Logical modeling begins with use-cases – diagrams and text forms

© 2005 Pearson Prentice-Hall Chapter Page 376 Figure 9.23 Use Case Diagram Use Case Diagram

© 2005 Pearson Prentice-Hall Chapter Page 376 Figure 9.24 Become Member Use Case Use Case – Text Form

© 2005 Pearson Prentice-Hall Chapter Page 377 I NFORMATION S YSTEMS C ONTROLS TO M INIMIZE B USINESS R ISKS Common system security risks:   Human error   Criminal acts   Due to staffing changes and project management deficiencies   Natural disasters

© 2005 Pearson Prentice-Hall Chapter I NFORMATION S YSTEMS C ONTROLS TO M INIMIZE B USINESS R ISKS Management policies Operating procedures Auditing function Types of Control Mechanisms Page

© 2005 Pearson Prentice-Hall Chapter Page 380 I NFORMATION S YSTEMS C ONTROLS TO M INIMIZE B USINESS R ISKS Controls built into the information system itself:   To maintain data integrity   Allow only authorized access   Ensure proper system operation   Protect against malfunctions, power outages, and disasters Types of Control Mechanisms

© 2005 Pearson Prentice-Hall Chapter Page 380 I NFORMATION S YSTEMS C ONTROLS TO M INIMIZE B USINESS R ISKS IS Organization  Backup power supplies  Network access control  Firewall protection Business Organization  Ensure accurate data entry and handling  Identify procedural errors Types of Control Mechanisms

© 2005 Pearson Prentice-Hall Chapter Page 380 Types of Control Mechanisms Figure 9.26 Pre- and Post-Installation Controls INFORMATION SYSTEMS CONTROLS TO MINIMIZE BUSINESS RISKS