Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Systems Analysis and Design Chapter 10.

Similar presentations


Presentation on theme: "Information Systems Analysis and Design Chapter 10."— Presentation transcript:

1 Information Systems Analysis and Design Chapter 10

2 10 Chapter 10: Information Systems Analysis and Design2 Chapter Contents  Section A: Information Systems  Section B: Systems Analysis  Section C: System Design  Section D: Implementation and Maintenance  Section E: Corporate Data Security

3 10 SECTION A Chapter 10: Information Systems Analysis and Design3 Information Systems  Information Systems in Organizations  Transaction Processing Systems  Management Information Systems  Decision Support Systems  Expert Systems and Neural Networks

4 10 Chapter 10: Information Systems Analysis and Design4 Information Systems in Organizations information system data information  An information system collects, stores, and processes data to provide useful, accurate, and timely information essential  An organization’s information is essential to its ability to accomplish a goal –Business operating for profit –Nonprofit organization support and sustain the mission  Information systems must support and sustain the mission of the organization

5 10 Chapter 10: Information Systems Analysis and Design5 Information Systems in Organizations  Information systems can: –Automate –Automate routine tasks –Solvesupport decisions –Solve problems, analyze information to support decisions Structured problem Semi-structured problem Unstructured problem –Collect and store –Collect and store internal or external information

6 10 Chapter 10: Information Systems Analysis and Design6 Information Systems in Organizations  Organizational charts depict the hierarchy of employees in an organization

7 10 Chapter 10: Information Systems Analysis and Design7 Transaction Processing Systems transactions  Provide a way to collect, process, store, display, modify, or cancel transactions –Payroll –Accounting –Inventory –Point of sale  Batchinteractive  Batch processing vs. online (interactive) processing –OnLine Transaction Processing (OLTP) system reports  Provide detail reports

8 10 Chapter 10: Information Systems Analysis and Design8 Transaction Processing Systems transaction processing system A transaction processing system (TPS) is characterized by its ability to: Collect, display, and modify transactions Store transactions List transactions

9 10 Chapter 10: Information Systems Analysis and Design9 Management Information Systems (MIS) management information A management information system system is characterized by its ability to: reportsProduce routine and on- demand reports Provide useful information for managerial activities Increase managerial efficiency decisionsProvide information used for structured, routine decisions

10 10 Chapter 10: Information Systems Analysis and Design10 Management Information Systems

11 10 Chapter 10: Information Systems Analysis and Design11 Decision Support Systems  Help people various scenarios  Help people make decisions by directly manipulating data, analyzing data from external sources, generating statistical projections, and creating data models of various scenarios –Executive information system decision models  DSSs design decision models and make decision queries

12 10 Chapter 10: Information Systems Analysis and Design12 Decision Support Systems

13 10 Chapter 10: Information Systems Analysis and Design13 Expert Systems and Neural Networks  Expert systems  Expert systems are designed to analyze data and produce a recommendation, diagnosis, or decision based on a set of facts and rules –Knowledge base domain –Knowledge base for a particular area or domain Inference engine: if this, then that Knowledge engineering shell –Expert system shell: guides creation of knowledge base –Fuzzy logic: confidence –Fuzzy logic: imprecise data to establish confidence levels neural network simulate  A neural network uses computer circuitry to simulate the way a brain might process information, learn, and remember

14 10 Chapter 10: Information Systems Analysis and Design14 Expert Systems and Neural Networks An expert system is characterized by its ability to: Replicate the reasoning of a human expertReplicate the reasoning of a human expert Work with internal or external data Produce a recommendation or decision

15 10 SECTION B Chapter 10: Information Systems Analysis and Design15 Systems Analysis  System Development Life Cycle  Planning Phase  Analysis Phase  Documentation Tools

16 10 Chapter 10: Information Systems Analysis and Design16 System Development Life Cycle  Waterfall SDLC  Modified Waterfall SDLC  Iterative SDLC

17 10 Chapter 10: Information Systems Analysis and Design17 Planning Phase  Create a Project Development Plan –description, justification, team members, decision process, schedule, costs, etc.  Project management software –What tools will be used to track progress against objectives  Joint application design (JAD) –End users and systems analysts working together to identify problems and potential solutions to those problems

18 10 Chapter 10: Information Systems Analysis and Design18 Planning Phase: why change? serious problem with the current system  Justification for new system usually emerges from a serious problem with the current system Michael Porter’s Five Forces model Michael Porter’s Five Forces model illustrates the factors that affect competition among business rivals.

19 10 Chapter 10: Information Systems Analysis and Design19 Planning Phase: Identify Problems and Solutions  An organization must be able to: –Make improvements –Change the industry –Create new products  The PIECES framework helps classify problems in an information system PerformanceInformationEconomicsControlEfficiencyService

20 10 Chapter 10: Information Systems Analysis and Design20 Planning Phase: Methods and Tools to Use methodologies  Development methodologies –Structured methodology: processes –Information engineering methodology: data –Object-oriented methodology: objects  PERT  PERT (Program Evaluation and Review Technique): time required per task and overall  WBS  WBS (Work Breakdown Structure): cost for each complex task and its subtasks  Gantt  Gantt chart: timing and dependencies

21 10 Chapter 10: Information Systems Analysis and Design21 Planning Phase: Tools PERT Chart WBS ChartGantt Chart

22 10 Chapter 10: Information Systems Analysis and Design22 Analysis Phase list of requirements  Produce a list of requirements for a new or revised information system  Analysis phase activities current system –Study the current system –Determine system requirements –Write requirements report  System requirements  System requirements are the criteria for successfully solving problems identified in an information system –Success factors: how do we know if/when we are successful?

23 10 Chapter 10: Information Systems Analysis and Design23 Documentation Tools data flow diagram  The core documentation tool for project teams using structured methodology is the data flow diagram (DFD) –External entity –Data store –Process –Data flow

24 10 Chapter 10: Information Systems Analysis and Design24 Documentation Tools

25 10 Chapter 10: Information Systems Analysis and Design25 Documentation Tools object-oriented documentationUML  The current standard for object-oriented documentation is called UML (Unified Modeling Language) use case diagram  A use case diagram documents the users of an information system and the functions they perform –Actors class diagram  A class diagram provides the name of each object, a list of each object’s attributes, a list of methods, and an indication of the cardinality between objects sequence diagram  A sequence diagram depicts the detailed sequence of interactions that take place for a use case

26 10 Chapter 10: Information Systems Analysis and Design26 Documentation Tools CASE tools CASE tools help project team members manage all the details of system documentation. In this example, the project team is developing a course registration system. The top screen shows how the CASE tool helps developers create a complete CASE tool generates program code specification by pointing out missing elements in the design. The second screen shows how the CASE tool generates program code.

27 10 SECTION C Chapter 10: Information Systems Analysis and Design27 System Design  Design Phase  Evaluation and Selection  Application Specifications

28 10 Chapter 10: Information Systems Analysis and Design28 Design Phase how the new system will fulfill the requirements  The project team must figure out how the new system will fulfill the requirements specified in the System Requirements Report –Level of automation required –Technologies to use –Build-Buy

29 10 Chapter 10: Information Systems Analysis and Design29 Design Phase  Consider the following when evaluating hardware alternatives –Level of automation and computerization –Processing methodology Centralized processing Distributed processing –Network technology

30 10 Chapter 10: Information Systems Analysis and Design30 Design Phase  Software alternatives –Programming language –Application development tool –Commercial –Commercial software –Turnkey –Turnkey system Buy Build

31 10 Chapter 10: Information Systems Analysis and Design31 Evaluation and Selection  Decision support worksheet Note: This is one step in the Kepner- Tregoe Decision Analysis Model.

32 10 Chapter 10: Information Systems Analysis and Design32 Evaluation and Selection RFP  A request for proposal (RFP) describes the information system problem and the requirements for the solution

33 10 Chapter 10: Information Systems Analysis and Design33 Evaluation and Selection RFQ  A request for quotation (RFQ) is a request for a formal price quotation on a list of hardware and software

34 10 Chapter 10: Information Systems Analysis and Design34 Application Specifications main output  The main output from the design phase  Describes the way the information system’s software should interact with users, store data, process data, and format reports  Feature creep  Feature creep refers to the failure to constrain change  Changes should be managed formally, including written change requests

35 10 SECTION D Chapter 10: Information Systems Analysis and Design35 Implementation and Maintenance  Implementation Phase  Development and Testing  Documentation and Training  Conversion and Cutover  Maintenance Phase

36 10 Chapter 10: Information Systems Analysis and Design36 Implementation Phase construct  Project team supervises the tasks necessary to construct the new information system –Hardware purchase and configuration –Software programming/testing –Preparing user documentation –User Training –Etc.

37 10 Chapter 10: Information Systems Analysis and Design37 Development and Testing  Software customization is the process of modifying a commercial application to reflect an organization’s needs testing  Application testing is performed in three ways: –Unit testing –Integration testing Test area –System testing

38 10 Chapter 10: Information Systems Analysis and Design38 Development and Testing

39 10 Chapter 10: Information Systems Analysis and Design39 Documentation and Training  System documentation system’s features –Describes a system’s features, hardware architecture, and programming  User documentation accomplish specific tasks –Describes how to interact with the system to accomplish specific tasks –Procedure handbook Contains step-by-step instructions for performing specific tasks

40 10 Chapter 10: Information Systems Analysis and Design40 Conversion and Cutover conversion  System conversion –Deactivating an old information system and activating a new one conversion strategies –Several conversion strategies: Direct conversion Parallel conversion Phased conversion Pilot conversion  Acceptance testing  Acceptance testing is designed to verify that the new information system works as required

41 10 Chapter 10: Information Systems Analysis and Design41 Maintenance Phase  Involves day-to-day operation of the system, making modifications to improve performance, and correcting problems  The term quality of service (QoS) refers to the level of performance a computer system provides

42 10 Chapter 10: Information Systems Analysis and Design42 Maintenance Phase  The system operator is responsible for operating the computer on a day-to-day basis  The systems programmer installs new versions of the operating system and modifies settings to maximize performance  The help desk is staffed by technical support specialists who are familiar with the information system and record problems and solutions

43 10 Chapter 10: Information Systems Analysis and Design43 Maintenance Phase  Maintenance phase costs

44 10 SECTION E Chapter 10: Information Systems Analysis and Design44 Corporate Data Security  Information System Data Vulnerabilities  Information System Data Security  Corporate Identity Theft

45 10 Chapter 10: Information Systems Analysis and Design45 Information System Data Vulnerabilities  Threats to a corporate information system can affect thousands of people –Natural disasters –Power outages –Hardware breakdowns –Human errors –Software failures –Security breaches –Acts of war –Viruses

46 10 Chapter 10: Information Systems Analysis and Design46 Information System Data Security  No computer system can be completely risk- free, but several proactive measures can protect information systems from threats –Deterrents –Preventative countermeasures –Corrective procedures –Detection activities

47 10 Chapter 10: Information Systems Analysis and Design47 Information System Data Security  A data center is a specialized facility designed to hold and protect computer systems and data  A disaster recovery plan is a step-by-step plan that describes the methods used to secure data against disaster and explains how an organization will recover lost data if and when a disaster occurs

48 10 Chapter 10: Information Systems Analysis and Design48 Corporate Identity Theft  When a company’s brand is used without authorization, the company has become a victim of identity theft  The Internet makes it easy to steal corporate identities and use them for phishing scams and fake Web sites  Savvy consumers are on the lookout for phishing attacks and avoid clicking links embedded in e-mail messages

49 10 Chapter 10: Information Systems Analysis and Design49 Corporate Identity Theft  Guidelines help corporations deal with identity theft

50 Chapter 10 Complete Information Systems Analysis and Design


Download ppt "Information Systems Analysis and Design Chapter 10."

Similar presentations


Ads by Google