Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 14-1 Introduction to Information Technology.

Slides:



Advertisements
Similar presentations
Information Systems Systems Development Chapter 6.
Advertisements

ACCOUNTING INFORMATION SYSTEMS
Acquiring Information Systems and Applications
Chapter 8 Information Systems Development & Acquisition
6.1 Copyright © 2014 Pearson Education, Inc. publishing as Prentice Hall Building Information Systems Chapter 13 VIDEO CASES Video Case 1: IBM: Business.
© Prentice Hall CHAPTER 9 Application Development by Information Systems Professionals.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
Effective systems development requires a team effort from stakeholders, users, managers, systems development specialists, and various support personnel,
Chapter9 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
POKOK BAHASAN Pertemuan 4 Matakuliah: Sistem Informasi Manajemen Tahun: 2008.
Fundamentals of Information Systems, Second Edition
Chapter 12: Intelligent Systems in Business
Chapter 1 Assuming the Role of the Systems Analyst
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
© Copyright 2011 John Wiley & Sons, Inc.
SDLC. Information Systems Development Terms SDLC - the development method used by most organizations today for large, complex systems Systems Analysts.
Introduction to Systems Analysis and Design
Acquiring Information Systems and Applications
Acquiring Information Systems and Applications
Acquiring Information Systems and Applications
Introduction to Computer Technology
University of Northern Iowa
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Systems.
Chapter 161 Information Technology For Management 4 th Edition Turban, McLean, Wetherbe Lecture Slides by A. Lekacos, Stony Brook University John Wiley.
13-1 Information Technology Economics Information Technology: Economic and Financial Trends Internal IT versus outsourcing Expanding power / declining.
A Technical View of System Analysis and Design
Systems Analysis and Design with UML Version 2
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design, 2 nd Edition Copyright 2003 © John Wiley & Sons, Inc. All rights reserved.
Moving into Design SYSTEMS ANALYSIS AND DESIGN, 6 TH EDITION DENNIS, WIXOM, AND ROTH © 2015 JOHN WILEY & SONS. ALL RIGHTS RESERVED. 1 Roberta M. Roth.
Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Twenty-first Lecture for ITEC A Professor G.E. Denzel.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design, 2 nd Edition Copyright 2003 © John Wiley & Sons, Inc. All rights reserved.
Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
ACCOUNTING INFORMATION SYSTEMS
Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Eighteenth Lecture for ITEC A Professor G.E. Denzel.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design, 2 nd Edition Copyright 2003 © John Wiley & Sons, Inc. All rights reserved.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Acquiring Information Systems and Applications
AIS Development Strategies. Lecture 4-2 ©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart Introduction This.
Acquiring Information Systems and Applications
CHAPTER 13 Acquiring Information Systems and Applications.
14-1 Systems Development Concept of Systems Development Life Cycle (SDLC) Definition of SDLC Stages of SDLC Traditional versus modern SDLCs.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Information Technology Economics
Faculty of Arts Atkinson College ITEC 1010 A F 2002 Welcome Seventeenth Lecture for ITEC A Professor G.E. Denzel.
Slide 2-1 Chapter 2 Information Systems in Organizations Introduction to Information Systems Judith C. Simon.
Slide 1 Systems Analysis and Design with UML Version 2.0, Second Edition Alan Dennis, Barbara Wixom, and David Tegarden Chapter 9: Moving on to Design.
Chapter 9: Introduction to Internal Control Systems
PowerPoint Presentation for Dennis, Wixom, & Roth Systems Analysis and Design, 3rd Edition Copyright 2006 © John Wiley & Sons, Inc. All rights reserved.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc 2-1 Introduction to Information Technology 2.
Slide 10-1 Chapter 10 Systems Development Procedures Introduction to Information Systems Judith C. Simon.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Systems.
10-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
PowerPoint Presentation for Dennis, Wixom, & Roth Systems Analysis and Design, 3rd Edition Copyright 2006 © John Wiley & Sons, Inc. All rights reserved.
Information Systems Development
Information Systems Development
Information Technology Economics
Information Systems Development
Fundamentals of Information Systems, Sixth Edition
Fundamentals of Information Systems, Sixth Edition
Introduction to Information Technology
Systems Development Chapter 6
Information Systems Development
CHAPTER 10 METHODOLOGIES FOR CUSTOM SOFTWARE DEVELOPMENT
Acquiring Information Systems and Applications
Presentation transcript:

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. Chapter 14: Information Systems Development Prepared by: Roberta M. Roth, Ph.D. University of Northern Iowa

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Chapter Preview  In this chapter, we will study:  Planning process for IS application development  The process of developing systems as outlined in the SDLC  Alternatives to the SDLC and why they are useful  Ways to obtain applications from outside the organization  Methods that are useful in developing Internet/intranet applications

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Information Systems Planning Process IS Development Projects Organization Mission Business Assessment Organization Strategic Plan Current Information Technology Architecture IS Strategic Plan New Information Technology Architecture IS Operational Plan

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc IS Strategic Plan  Objectives  Align with the organization’s strategic plan  Provide for an IT architecture that enables users, applications, and databases to be seamlessly networked and integrated  Allocate IS development resources efficiently among competing projects, so the projects can be completed on time, within budget, and have required functionality ( NEVER HAPPENS SO DON’T COUNT ON IT )  Issues - efficiency; effectiveness; competitiveness

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc IS Operational Plan  Mission - the mission of the IS function  IS environment - the summary of the information needs of the functional areas and of the organization as a whole  Objectives - the IS function’s current best estimate of its goals  Constraints - technological, financial, and personnel limitations on the IS function  Long-term systems need - a summary of the processes needed by a company and the IS projects selected to support them and reach organizational goals  Short-range plan - an inventory of current projects, and a detailed plan of projects to be developed or continued during the current year  Information Systems Planning – The process of translating an organizations’ goals into the systems development initiatives

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc  SDLC - the development method used by most organizations today for large, complex systems  Systems Analysts - IS professionals who specialize in analyzing and designing information systems  Software Developers – IS Professionals who develop computer programs  Programmers - IS professionals who modify existing computer programs or write new computer programs to satisfy user requirements  Technical Specialists - experts in a certain type of technology, such as databases or telecommunications, who help create information systems Information Systems Development Terms

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc The Traditional SDLC (1) Systems Investigation (2) Systems Analysis (3) Systems Design (4) Programming (5) Testing (6) Implementation (7) Operation (8) Maintenance Go Back to a previous Stage or Stop An eight-stage systems development life cycle (SDLC)

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc  System Investigation  Feasibility study determines the probability of success of proposed system’s development project. Includes … Technical feasibility (will we be able to build the system?) Economic feasibility (how much will it cost to build the system and how much will it benefit us?) Behavioral feasibility (if we build the system, will it be accepted and used?)  Systems Analysis  Examines the business problem(s) that the organization plans to solve with information systems  Determines what the new system must do by examining: Strengths and weaknesses of the existing system Functions that the new systems must have to solve the business problem(s) User information requirements for the new system Phases in SDLC

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc  Systems Design  Describes how the system will fulfill the user requirements  Develop both logical design and physical design  Output => technical design or system specification… system outputs, inputs, and user interfaces hardware, software, databases, telecommunications, personnel, and procedures how these components are integrated  Programming  the translation of the design specifications into computer code  structured programming techniques improve the logical flow of the program by decomposing the computer code into modules Phases in SDLC (continued)

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc  Testing  Checks to see if the computer code will produce the expected and desired results under certain conditions  Implementation  The process of converting from the old system to the new system  Four major conversion strategies Parallel conversion : the old and new systems operate simultaneously for a period of time Direct conversion : the old system is cut off and the new systems is turned on at a certain point in time Pilot conversion : introduces the new system in one part of the organization Phased conversion : introduces components of the new system in stages Phases in SDLC (continued)

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc  Operation  the new system will operate for a period of time, until it no longer meets its objectives  Maintenance (simultaneous with Operation)  debugging the programs  updating the system to accommodate changes in business conditions  adding new functionality to the system SDLC Phases

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc  Prototyping  Starts with only a general idea of user requirements, and develops models of the system ‘until it’s right’.  Advantages :  Speeds up the development approach  Gives the users the opportunity to clarify their information requirements  Useful in the development of decision support systems and executive information systems  Helps to enable early detection of logic, UI, & function errors.  Disadvantages :  Replaces the systematic analysis and design stages of the SDLC - quality may be sacrificed  Can result in an excess of iterations Alternatives to the SDLC

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc  Joint Application Design (JAD)  A group-based method for collecting user requirements and creating staged designs  Advantages :  Saves time  Greater support for, and acceptance of new systems  Produces higher quality systems  Easier implementation  Lower training costs  Disadvantages :  Very difficult to get all users to JAD meetings  All the problems that may be caused by any group process Alternatives to the SDLC

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc  Rapid Application Development (RAD)  A method that can combine JAD, prototyping, and integrated CASE tools, to rapidly produce a high-quality system  Advantages :  Active involvement of users in the development process  Speeds the development process  Reduces development costs  Can create applications that are easier to maintain and modify  Disadvantages :  May result in systems with limited functionality and adaptability for change Alternatives to the SDLC

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc  Integrated Computer-Assisted Software Engineering (ICASE) Tools  Automate many of the tasks in the SDLC  Advantages :  Produces systems with a longer effective operational life  Speeds up the development process and result in systems that are more flexible and adaptable to changing business conditions  Results in excellent documentation  Disadvantages :  More expensive to build and maintain initial system  Requires more extensive and accurate definition of user needs and requirements  Difficult to customize and may be difficult to use with existing systems Alternatives to the SDLC

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc  Object-Oriented Development  A fundamentally different view of computer systems  Advantages:  Reduces the complexity of systems development and leads to systems that are easier and quicker to build and maintain by allowing the reuse of existing objects in multiple applications which had been previously developed and debugged.  Improves programmers’ productivity and quality  More flexible  Allows systems analysts to think as users do about the system  Ideal for developing Web applications  Depicts the system in user terms, increasing understanding of what the new system does and how it meets its objectives  Disadvantages  Runs more slowly (REALLY?)  Need to retrain the programmers in OO methodology Alternatives to the SDLC

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Development Outside the IS Department  End User Development  Users perform ad hoc programming to solve business problems  Factors that drive the trends toward increased end-user computing and end-user development More powerful, inexpensive desktop hardware Increasingly diverse software capabilities Increasingly computer literate population Backlog of IS projects Apparent cost savings  End-users (usually) don’t produce adequate documentation or perform adequate testing resulting in hidden costs, inability to evaluate functionality of software, & verifying the results  Security may be breached

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc  External Acquisition of Prewritten Software  Factors to consider during make-or-buy decision On-time On-budget Full functionality User acceptance Favorable costs-to-benefits ratio Low maintenance Scalability Integration with other systems Minimal negative cross-impacts Reusability Development Outside the IS Department

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc  Application Service Providers (ASPs)  Software obtained via subscription  Software resides on ASP’s systems  Software is accessed via Web or VPN  Subscriber does not have to host software on existing computer systems  Updates and bug fixes are provided by the ASP  ASP can provide help-desk support Development Outside the IS Department

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc  Outsourcing  Using third parties to provide some or all functions and services of the IT department  IT may not be a core competency of the firm; better to hire outside specialists  Advantages:  Outsourcer can obtain hardware capabilities less expensively due to economies of scale  Outsourcer can hire needed technical staff  Outsourcer specializes in providing computer services  Ability to expense outsourcing fees provides tax benefits Development Outside the IS Department

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc  Outsourcing (continued)  Disadvantages:  Economies of scale may be of limited value  Staffing depends on outsourcers needs, not client’s  Lack of familiarity with business/industry  Contract problems  Internal cost reduction opportunities could eliminate the advantage of outsourcers  Guidelines:  Write short-period contracts or have flexibility since business needs are dynamic  Use of subcontractors should be controlled  Use selective outsourcing only for those functions where it makes sense Development Outside the IS Department

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Building Internet & Intranet Applications  Much future development will likely be Web-based due to its relative simplicity and ease of development  SDLC probably not followed due to simplified Web development  A Strategy for Internet/Intranet Development  Identify the objectives for organizational Web site(s) and pages  Include infrastructure requirements as well as security and legal issues in plans  Obtain/assign necessary personnel and provide oversight  Identify and prioritize potential projects

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Building Internet & Intranet Applications  JAVA - A Promising Tool  Important programming language for putting extra features into Web pages  An object-oriented language designed for implementation on networks  Includes numerous security features to prevent downloaded programs from damaging files or creating other problems on the receiving computer

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Chapter Summary  IS Strategic and Operational Plans derive from the organization’s strategic plan and current IT architecture  The SDLC provides a basic framework for the process of development information system applications  There are several alternatives to the SDLC, including prototyping and RAD  IS applications can also be obtained outside the IS organization, including end user development, package purchases, ASPs, and outsourcing  Development for Internet/intranet applications generally follows prototyping process

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. Chapter 15: Implementing IT: Ethics, Impacts, and Security Prepared by: Roberta M. Roth, Ph.D. University of Northern Iowa

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Chapter Preview  In this chapter, we will study:  Types of ethical issues that arise in relation to information systems  Impacts that information systems have had on organization, jobs, individuals, and society  Various threats that may damage computer and information systems  Ways to protect computer and information systems from hazards and threats

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc IT Ethical Issues  Ethics – branch of philosophy that deals with what is considered to be right and wrong  Code of ethics – principles that guide members of an organization to promote fair and responsible use of IS  Types of ethical issues  Privacy – what is collected, stored, and shared about others  Accuracy – what is done to assure authentic and accurate data  Property – who owns intellectual property and how are they compensated for it  Accessibility – who can obtain information

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Privacy Issues  Information privacy – the right to determine what information about oneself can be shared with others  Electronic surveillance – computer users ’ actions can be monitored without knowledge both at work and at home  Storage of personal information in databases:  What is stored? How can be we sure it ’ s accurate? Who will it be shared with? How will it be used?

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Privacy Issues (continued)  Many organizations are developing and enforcing privacy policies  Internationally, countries vary widely regarding their concerns about privacy. Adds complexity to global commerce.  Generally, an organization should … Only collect data that can be obtained legally and fairly Make sure data is accurate, complete, and kept up to date Know why we are collecting data and be sure there is a reason to have it Make sure data is used just for its intended purpose Safeguard the data to ensure its quality Enable those about whom we store data know what we plan to do with the data and can verify its accuracy

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Intellectual Property Issues  Intangible property created by people or organizations, protected by trade secret, patent, and copyright laws  Trade secret – intellectual work - not public  Patent – exclusive rights to invention granted to inventor for 20 years  Copyright – creators of intellectual property granted ownership for their lives plus 50 years. Owners have right to collect fees for use. Software is generally copyrighted.  What are the negative consequences of illegally copying software?  Wide variation in the way different countries protect intellectual property – globalization issue

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc IT and Organizations  IT has the potential to significantly change organizations.  Structures can be flatter, eliminating middle layers, with broader span of control  More extensive supervision is possible electronically, even for those working remotely  Power shifts are likely as knowledge is captured, stored, and shared.

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc IT and Jobs  Some jobs will be eliminated, especially intermediaries (e.g., travel agents)  BPR will cause many jobs to be redesigned; more emphasis on computing capabilities  Experience and seniority may become less important in job advancement  Managers ’ approach to decision making may change  Computer-based communication skills may be more in demand

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc IT and Individuals  Fears of dehumanization and loss of social contact  Increasing workload and demand for computer skills can be threatening  Certain aspects of using computers can be physically damaging  Job stress & Anxiety due to an increase in workload and/or responsibilities  Video display terminals causes concern relating to radiation exposure  Repetitive strain injuries caused by poorly designed work environments

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc IT and Society  Some will say that IT has improved our quality of life  Improvements for people with disabilities  Improvements in health care system  Improved consumer information  Robots performing in dangerous situations  Improvements in crime fighting  Concern about deepening divide between those with and without IT access  Internet communities provide social contact for people with common interests  Telecommuting adds flexibility for workers and organizations

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Security Concerns  Information systems are subject to many threats  Unintentional threats Human error – in design or use of system Environmental hazards – acts of God and other Computer system failures – faulty products  Intentional threats Theft of data Deliberate manipulation in processing of data Destruction from viruses and denial of service (DOS) attacks

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Computer Crimes  Computers may be the target of criminal activity or the means by which criminal activity is carried out  Methods of attack:  Data tampering is most common attack on computer systems  Deliberate programming fraud also common Viruses are a highly visible form of programming attack Denial of service attacks target e-commerce web sites

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Protecting IT  Individuals and organizations must actively establish protection mechanisms  Prevent and deter damage  Detect errors, attacks, and and unauthorized access before damage is widespread  Limit loss from threat  Plan for recovery in event of attack  Correct system to prevent recurrence

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Protecting IT (continued)  General protection strategies:  Physical security of facilities and resources  Control access to system  Protect data from unauthorized access  Application control strategies:  Ensure quality of inputs  Verify quality of processing  Ensure quality and accessibility of outputs

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Protecting IT (continued)  Network control strategies:  Control access to network resources  Protect data on network with encryption  Monitor and detect intruders  Protect with firewalls  Verifying quality through audits  Regular evaluation of records and procedures  May be performed by internal and external auditors

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Protecting IT (continued)  Disaster Prevention and Recovery Plans  Organizations need to think through how various disasters will be handled  Key people should know exactly what to do in the event of a disaster  Disaster plans should be tested through practice drills  Critical component is back-up procedures  Discipline is needed to ensure that protection plans are implemented (how often do you back up your hard drive?)

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Chapter Summary  Information systems pose a number of ethical challenges for businesses and individuals  Information systems have changed organizations, jobs, individual workers, and society  Information systems are vulnerable to a number of hazards  Individuals and organizations must take steps to protect their systems from threats

Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Copyright © 2003 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United Stated Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information herein.