System Analysis and Design
System Analysis and Design
and Design
1
Information and paperwork are the most abundant
products generated by modern business.
2
GOVERNMENT. The second reason is the increase of
government regulation and controls. Computers,
particularly, microcomputers are widely used to cope with
this burgeoning paperwork. It fuels information based
upon which large and small decisions are made. It is use
to help management policy and make better decisions
about employment, purchasing, and distribution patterns.
The flow and availability of data has become
indispensable vital element of almost every human
enterprise. It requires planning, people, machines, and
money.
3
Data vs. Information
D Consist of raw facts concerning people,
at events, or other entities collected in vast
quantities from both internal and external
a
sources.
Examples:
employee’s name, number of hours worked
Types of Data:
1. Alphanumeric Data - numbers, letters and other
characters
2. Audio Data - sound, noise, or tones
3. Image Data - graphical images or pictures
4.Video Data - moving images or pictures
[KENDALL & KENDALL, 1999]
4
Information
Data that has been process and presented in a
form suitable for human interpretation and decision
making.
A collection of facts organized in such a way that
they have additional value beyond the value of the
facts themselves.
8
Information Must Be Manage
According to McLeod, Information must be manage
accordingly and correctly, just as other resources found in
the organization. Manager needs to understand that there
are costs associated with production, distribution, security,
storage and retrieval of all information. Although
information is all around, it is not free, and its strategic use
for positioning a business competitively should not be
taken for granted.
[MCLEOD, 1998]
9
Reasons For Information Management
1.Increasing complexity of management task due to:
a.International economic influences
b.Increasing complexity of technology
c.Shrinking time frames
d.Competitive pressures
e.Social pressures
2. Availability of Problem-Solving tools such as
computer
10
Information Resource Management
Concept that information is a major corporate
resource and must be managed using the same
principles being applied in managing other assets of
the organization.
Principles:
1. A business organization is composed of resources
that flow into the organization and then return to the
environment where these resources comes from.
[MCLEOD, 1998]
11
2. There are two basic types of resources:
a.physical resources such as:
i. personnel iv. machines
ii. materials v. money
iii. facilities
b.conceptual resources such as:
i. data ii. Information
13
System
A regularly interacting and interdependent group of
element forming a unified whole.
A set of interacting elements to accomplish a certain
goals or objectives.
Consists of tools, supplies, machine, procedure and
people. Usually requiring some type of orderly
management.
Major attributes of system is that they possess
qualities and capabilities not found in individual
elements. This attribute – the whole producing results
that are greater than the sum of its parts.
Example:
car
[MCLEOD, 1998]
14
Characteristics of a System
1. Component
-an irreducible part or aggregation of parts that
makes a system.
-also called a subsystem
2. Interrelated components
-dependence of one subsystem on one or more
subsystems
3. Boundary
- the line that marks the inside and the outside of
a system and which sets off the system from its
environment.
[MCLEOD, 1998]
15
4. Purpose
-overall goal or function of a system
5. Environment
-refers to anything that is external to a system
that interacts with a system
6. Interface
- point of contact where a system meets its
environment or where subsystems meet each
other
[MCLEOD, 1998]
16
Functions of interfaces:
a.security – protecting the system from undesirable elements
that may want to infiltrate it.
b.filtering – unwanted data both for elements leaving the
system and entering it.
c.coding and decoding – incoming and outgoing messages
d.detecting and correcting errors – in its interaction with the
environment
e.buffering – providing a layer of slack between the system
and its environment, so that the system and its
environment can work on different cycle and at different
speeds.
f.summarizing – raw data and transforming them into the level
of detail and format needed throughout the system(for an
input interface) or in the environment(for an output
interface)
[MCLEOD, 1998]
17
7. Constraints
- limit to what a system can accomplish
- can either be imposed by internal or external
factors
8. Input
-refers to what ever a system takes from its
environment in order to fulfill its purpose.
9. Output
-refers to whatever a system returns to its
environment in order to fulfill its purpose.
[MCLEOD, 1998]
18
Business Systems
A collection of policies, procedures, methods, people
machines, and other elements that interact and
enable the organization to reach each of its goals-
to profit or to render service.
19
Information Systems
Set of interrelated elements or components that collect
(input), manipulate and store(process),
disseminate(output) data and information and provide a
mechanism for feedback
21
SYSTEMS ANALYSIS
The scientific study of systems processes, including
investigation of inputs, and outputs, in order to find
better, more economical, and more efficient
means of processing.
Used to gain an understanding of an existing system
and what is required of it.
[HOFFER, GEORGE & VALACICH, 1999]
SYSTEMS DESIGN
Proposes a new system that meets the requirements
specified. This new system maybe built a new or
by changing the existing system.
[HOFFER, GEORGE & VALACICH, 1999]
22
NEED FOR SYSTEMS ANALYSIS
AND DESIGN
23
ADVANTAGE OF SYSTEMS
ANALYSIS AND DESIGN
1. Greater efficiency
2. Maximizing profit
3. Resources to the best advantage
4. Reduction of human effort
5. Faster turnaround
6. Reduction and elimination of errors in data and
information
7. Consistent operations and procedures
[SILVER & SILVER, 1992]
24
LIMITATIONS OF SYSTEM ANALYSIS AND DESIGN
1.Some business problems are beyond the scope of systems
analysis and design
2.Efforts cost time and money
3.Human element can cause complications
4.Effort is required to sell a system
[HOFFER, GEORGE & VALACICH, 1999]
SYSTEM DEVELOPMENT TEAM
- Systems development is a team effort.
Characteristics of a systems development team:
1.Diversity in backgrounds, skills and goals that comes from
all different groups interested in the system
2.Tolerance diversity, uncertainty, ambiguity
3.Clear and complete communication
4.Trust [HOFFER, GEORGE & VALACICH, 1999]
25
Computer-Based Information System
CBIS is an information system that is composed
CBIS
of hardware, software, databases, telecommunication,
people and procedures that are configured to collect,
manipulate, store, and processed data into information.
[HOFFER, GEORGE & VALACICH, 1999]
Components:
1. Hardware - consists of computer equipments used
top perform input, processing, and output activities
2. Software - consists of programs and instructions
given to the computer and to the user
3. Database - an organized collection of facts and
information
[HOFFER, GEORGE & VALACICH, 1999]
26
4. Telecommunications - allows organization to link
CBIS
computer systems together into effective
networks
5. People - any person involved in information systems
development including information systems
personnel that manages, run, program, and
maintain computer systems
- any person that benefits in the use of the
information system(users)
6. Procedures- includes strategies, policies, methods, and
rules that human use to operate the CBIS
27
Types of CBIS
1. Transaction Processing System
- an organize collection of people,
procedures,
record
CBIS
databases, and devices used to
completed business transaction
- system to process large amount of data for
routine business transactions
- support day-to-day activities of the
business
[KENDALL & KENDALL, 1999]
2. Office Automation Systems
- support data workers
- includes all of the formal and informal
electronic systems primarily concerned with the
communication of information to and from
persons both in and outside the firm
[KENDALL & KENDALL, 1999]
28
Data Workers
CBIS
workers that do not usually create data or new
knowledge but rather analyze information in order
to transform data or manipulate it in some way
before sharing it with, or formally disseminating it
throughout the organization and, sometimes,
beyond.
a. word processing
b. communication
c. spreadsheet
d. desktop publishing
e. electronic scheduling
[HOFFER, GEORGE & VALACICH, 1999]
29
3. Knowledge Work Systems
–support professional workers or knowledge
workers by aiding them in their effort to create new
CBIS
knowledge and by allowing them to contribute it to
their organization or to the society at large.
Examples: CAD/CAM
[KENDALL & KENDALL, 1999]
4. Management Information Systems
– an organize collection of people, procedures,
databases, and devices used to provide routine
information to managers and decision makers
– provide periodic reports, special report and
outputs of mathematical simulation that comes
from transaction processing system
Model Database
Base
user
interface
Rule basic
user User interface
Inference
Knowledge base
[HOFFER, GEORGE & VALACICH, 1999]
34
7. GROUP DECISION SUPPORT SYSTEM
- Intended to bring a group together to solve a
problem with the help of various supports such as
CBIS
polling, questionnaires, brainstorming, and scenario
creation
[KENDALL & KENDALL, 1999]
- Helps middle managers and information workers
collectively plan and decide important business
issues
8.COMPUTER SUPPORTED COLLABORATIVE WORK
- Intended for team collaboration via networked
computers that uses a software called “group
ware” [KENDALL & KENDALL, 1999]
9. EXECUTIVE SUPPORT SYSTEMS
- Support senior managers of the firm in the
strategic planning function.
35
ESS
GDSS
ES
DSS
MIS
Knowledge Work
System Office
Automation System
37
CAUSES OF UNSUCCESSFUL SYSTEM
1.Systems developed did not support business strategies and
policies
2.Poor systems planning and inadequate project management
3.Failure to define or understand user requirements and get
users involved in systems development
4.Negligence in estimating cost and benefit of the system
project
5.Creation of a myriad of design defects and errors
6.Acquisition of computers and soft ware that no one needs or
knows to use
7.Installation of incompatible or inadequate technology
8.Negligence in implementing adequate controls
9.Development of unstructured, unmaintainable software
10.Inadequate implementation tasks
[BURCH, 1992]
38
Problem caused by poorly develop systems can range
from loss of life, to loss of assets, to loss of
customers, and revenues, to management making
wrong decisions based on inaccurate or untimely
information, to wasted time and decreased
productivity.
39
WAYS TO HAVE SUCCESFUL SYSTEMS
1. SYSTEM OWNERS
- Information system’s sponsors and chief advocates
- Usually responsible for budgeting the money and time
to develop and support information systems, and for the
ultimate acceptance o0f the information system.
42
TYPES OF SYSTEM USER
a. CLERICAL WORKERS
-People performing day-to-day activities in the business
-People who initiate or handle the bulk of any organization’s
data. They often make routine decision based on data and
generate information for managers. They are of need of
systems that help them process more data with greater speed
and fewer mistakes.
Examples:
Bookkeeper, clerk, office, clerk, salesperson, secretary
b. TECHNICAL AND PROFESSIONAL STAFF
-Consists largely of business and
industrial specialists who perform highly skilled and
specialized work
-Also called knowledge workers
Examples: Accountant, engineer, lawyer, scientist, statistician
43
[HOFFER, GEORGE & VALACICH, 1999]
c. SUPERIOR
-Lowest level of management who controls the day-to-
day operations of the organization.
-Tend to be interested in “budget for” and “efficiency of”
the operations they supervise
Examples:
Foreman, group leader, project manager, shift leader.
d. MIDDLE MANAGERS
-Concerned with relatively short-term/ tactical planning,
organizing, controlling, and decision-making.
Examples:
Accounts receivable manager, department
head, purchasing manager
3. SYSTEM DESIGNER
– translates user’s business requirement and constraints
business environment
Examples:
45
Systems analyst, data analyst, network analyst
4. SYSTEM BUILDERS
– construct multi-user information system based upon
the design specifications.
Examples:
Application programmer, database programmer,
network administrator
46
The Systems Analyst
Systems Analyst
One who systematically assesses the
functioning of business by examining the input and
processing of data, and the outputs of the
information with the intent of improving
organizational processes.
47
JOB DESCRIPTION OF A SYSTEMS ANALYST
48
DUTIES OF A SYSTEMS ANALYST
49
7.Supervise site preparation
8.Choose hardware and software.
9.Use prototyping technique to develop abbreviated
systems quickly during analysis and design.
10.Evaluate system designs for quality and ease of
maintenance
11.Design input forms, output reports, and display formats.
12.Incorporate security measures into system design.
13.Supervise coding, testing, and quality control.
14.Supervise user documentation and training.
15.Oversee conversion to new system.
16.Supervise maintenance and change control after the
system is in operation.
17.Establish system development standards.
18.Keep current with developments in the field of computer
technology. [KENDALL & KENDALL, 1999]
50
ROLES OF A SYSTEMS ANALYST
1.As a consultant
2.As a supporting expert
3.As a change agent
[KENDALL & KENDALL, 1999]
51
CRICITAL SUCCESS FACTORS OF A SYSTEMS
ANALYST
1.Creativity and innovation
2.Good verbal and written communication skills.
3.Positive attitude towards others.
4.Technical knowledge of computers and information
systems hardware and software.
5.Knowledge of basic business theories and concepts.
6.Willingness to work with others
7.Ability to solve problems.
[SILVER & SILVER, 1992]
1.
52
DOMAIN OF SKILLS
1. Analytical Skills
–Understanding of the organization and its functions, to
identify the opportunities and problems, and to analyze
and solve problems.
a. Systems thinking
b. Organizational knowledge
c. Problem identification
d. Analysis and solving of problems
2. Technical Skills
Understanding the potentials and limitations of
information technology.
53
Knowledge in:
a. Types of computers
b. Programming languages
c. Operating systems
d. Data communication standards and
software for LAN and WAN
e. Systems development tools and
environments
f. Decision support system generators and
data analysis tools.
g.
[HOFFER, GEORGE & VALACICH, 1999]
54
Can be achieve through:
a. Reading computer publications and books
b. Joining professional societies interested in
computer technologies.
c. Attending computer classes or teach at a local
college
d. Attending any courses or training sessions
offered by your organization
e.Attending professional conferences, seminars,
or trade shows
f.Participating in electronic bulletin boards, news
groups or conferences
55
3. Management Skills
Senior Analyst
SDLC
Sequence of steps used to organize a large of
activities needed to build system
2. Systems
Analysis 6. Systems
Implementation
7. Systems
1. Planning
Maintenance
SILVER & SILVER, 1992
59
PHASES OF SYSTEMS DEVELOPMENT LIFE
CYCLE (SDLC)
SDLC
1. SYSTEMS PLANNING
– Initial investigation of the system
– A brief study of the problem to determine
whether the systems project should be
pursued
– Net result is a rough plan for how-and
whether-to proceed with the project.
2. SYSTEMS ANALYSIS
– Its purpose is to understand the existing
system and propose alternate replacement
system at the end.
SDLC
4.SYSTEMS DEVELOPMENT
– Phase where the system is actually being
developed
– Involves programming and testing of system
5.SYSTEMS IMPLEMENTATION
– Phase where system is put into operational use.
6.SYSTEMS MAINTENANCE
- Longest phase and the costliest phase in the SDLC
- Phase where the system is monitored and made
62
Determining Feasibility
PROJECT FUNDAMENTALS
1.Determining project feasibility
2.Scheduling projects
3.Planning and then managing activities and team
members for productivity
[KENDALL & KENDALL, 1999]
Systems Project
Begins with problems or with opportunities for the
improvement within a business that often come up as the
organization adapts to change
[KENDALL & KENDALL, 1999]
63
Business people suggest systems project for two
broad reasons:
1.To experience problem that lend themselves that
systems solutions
2.To recognize opportunities for improvement through
upgrading, altering installing new systems when they
occur
[KENDALL & KENDALL,1999]
1.
The systems analyst serves as catalyst and
supporting expert primarily by being able to see where
processes can be improved.
[KENDALL & KENDALL, 1999]
64
Improvements to systems can be defined as changes
that will result in incremental yet worthwhile benefits:
1.Speeding up a process.
2.Streamlining a process through the elimination of
unnecessary or duplicated steps.
3.Combining processes.
4.Reducing errors in input through changes of forms and
display screens.
5.Reducing redundant output.
6.Improving integration of systems and subsystems.
7.Improving worker’s satisfaction with the system.
8.Improving ease of costumer, supplier, and vendor
interaction with the system.
[KENDALL & KENDALL, 1999]
65
CRITERIA FOR SELECTION OF SYSTEMS PROJECTS
1.Backing from management
2.Appropriate timing of project commitment
3.Possibility of improving attainment of organizational goals
4.Practical in terms of resources for systems analyst and
organization
5.Project is worthwhile compared to other ways that
organization could invest resources
[KENDALL & KENDALL, 1999]
Remember that when a business commits to one
project, it is committing resources that thereby become
unavailable for other projects.
[KENDALL & KENDALL, 1999]
66
SEVERAL ACCEPTABLE OBJECTIVES FOR SYSTEMS
PROJECTS, INCLUDES:
67
ASSESSING PROJECT FEASIBILITY
68
SOME OF THE FEASIBILITY FACTORS ARE
REPRESENTED BY THE FOLOWING CATEGORIES:
1.Technical Feasibility
2.Economic Feasibility
3.Operational Feasibility
4.Schedule Feasibility
5.Legal and Contractual Feasibility
6.Political Feasibility
7.
[HOFFER, GEORGE & VALACICH, 1996]
69
vTECHNICAL FEASIBILITY
The analyst must find out whether current
technical resources can be upgraded or added to in a
70
The potential consequences of not assessing and
managing risks can include the following outcomes:
a.
b.Failure to attain expected benefits from the project.
c.Inaccurate project cost estimates
d.Inaccurate project duration estimates
e.Failure t achieve adequate system performance levels
f.Failure to adequately integrate the new system with
existing hardware, software,or organizational
procedures.
[HOFFER, GEORGE & VALACICH, 1996]
71
v ECONOMIC FEASIBILITY
its purpose is to identify the financial benefits and
costs associated with the development project; it is often
referred to as cost-benefit analysis.
[HOFFER, GEORGE & VALACICH, 1996]
a.Determining Project Benefits
i.Tangible Benefits– refer to items that can be
measured in dollars and with certainty.
Example:
Lower transaction costs/higher profit
margins
77
COMMONLY USED ECONOMIC COST-BENEFIT ANALYSIS
TECHNIQUE
1.Net Present Value(NPV)
–uses a discount rate determined from the company’s cost
of capital to establish the present value of a project.
– the discount rate is used to determine the present of value
of both cash receipts and outlays.
2.Return On Investment(ROI)
–is the ratio of the net cash receipts of the project
divided by the cash outlays of the project.
–tradeoff analysis can be made among
projects competing for investment by comparing their
representative ROI ratios.
3.Break-Even Analysis(BEA)
–finds the amount of the time required for the cumulative
cash flow from a project to equal its initial and ongoing
investments.
[HOFFER,GEORGE & VALACICH, 1996]
78
Formula in figuring out the present value:
_1 _ present value of money
PVn = Y [ ]
n discount rate
(1+i)
years from now
79
Example of TVM:
Suppose you want to buy a used car from an
acquaintance and she asks that you make three payments of
$1,500 for three years, beginning next year, for a total of
$4,500.
Solutions:
_1_ _
PV1 = 1500 x [ 1 ] = 1500 x .9091 = 1363.65
(1+.10)
_1_ _
PV1 = 1500 x [ 2 ] = 1500 x .8264 = 1239.60
(1+.10)
_1_ _
PV1 = 1500 x [ 3 ] = 1500 x .7513 = 1126.95
(1+.10)
where PV1 , PV2 , and PV3 reflect the present value of each
$1,500 payment in year one, two, three, respectively.
[HOFFER, GEORGE & VALACICH, 1996]
80
To calculate the Net Present Value (NPV) of the three
$1,500 payments simply add the calculated present values:
81
v OPERATIONAL FEASIBILITY
82
v SCHEDULE FEASIBILITY
the process of assessing the degree to which the
potential time frame and completion dates for all major
activities within a project meet organizational deadlines
and constraints for affecting change.
[HOFFER, GEORGE & VALACICH, 1996]
the schedule of activities produced during project
initiation and planning will be very precise and detailed
for the analysis phase.
[HOFFER, GEORGE & VALACICH, 1996]
83
KEY ELEMENTS IN DEVELOPING A PROJECT PLAN:
86
ACTIVITY PLANNING AND CONTROL
87
Detailed Activity Weeks
Required
Data Gathering Conduct Interviews 3
Administer Questionnaires 4
Read Company Reports 4
Introduce Prototype 5
Observe Reactions to Prototype 3
Data Flow and Analyze Data Flow 8
Decision Analysis
Proposal Perform Cost / Benefit Analysis 3
Preparation Prepare Proposal 2
Present Proposal 2
Refining the planning and scheduling of analysis activities by
adding detailed tasks and establishing the time required to
complete these tasks. [KENDALL & KENDALL, 1999]
88
2. Gantt Charts for Project Scheduling
It is essentially a chart on which bars represent each
task or activity.
The System analyst will find not only that this
technique is easy to use but also that it lends itself to
worthwhile communication with end users.
[KENDALL & KENDALL, 1999]
Advantages:
1.Its simplicity
2.The bars representing activities or tasks are drawn to
scale; that is the size of the bar indicates the relative
length of time it will take to complete each task.
[KENDALL & KENDALL, 1999]
89
Activity Incomplete Activity
Conduct Completed Activity
Interviews Partially Completed Activity
Administer
Questionnaires [KENDALL & KENDALL, 1999]
Read Company
Records
Analyze Data Flows
Introduce Prototype
Observe reactions
Perform Cost / Benefit
Prepare Proposal
Present proposal
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
q Using a two-dimensional Gantt Chart for planning Weeks
activities that can be accomplished in parallel.
90
3. PERT Diagrams
Was developed in the late 1950s for use in the U.S.
Navy’s Polaris nuclear submarine project
PERT is an acronym for Program Evaluation and
Review Techniques.
is useful when activities can be done in parallel rather
than in sequence.
[KENDALL & KENDALL, 1999]
A program (project) is represented by a network of nodes
and arrows that are then evaluated to determine:
1.Critical activities
2.Improvement of the schedule if necessary
3.And review progress once the project is
undertaken.
93
Activity Predecessor Duration
A Conduct Interviews None 3
B Administer Questionnaires A 4
C Read Company Reports None 4
D Analyze Data Flow B,C 8
E Introduce Prototype B,C 5
F Observe Reactions to Prototype E 3
G Perform Cost / Benefit Analysis D 3
H Prepare Proposal G 2
I Present Proposal H 2
E,4 F,3
40
96
GOALS NEED TO BE FORMULATED AND AGREED
BY THE TEAM SHOULD BE BASED ON:
97
3. Motivating Project Team Members
–motivation is an extremely complex but a good one to
consider.
–setting goals can also motivate team members by clarifying
for them and others what must be done in order to get
results. [KENDALL & KENDALL, 1999]
99
v Political Feasibility
The process of evaluating how key stakeholders within
the organization view the organization.
[HOFFER, GEORGE & VALACICH, 1996]
100
Sampling and Investigating Hard Data
S aThe
m process
p of systematically selecting representative
l ielements
n g of a population
Helps accelerate the process by gathering
selected data rather than all data for the entire
organization
[KENDALL & KENDALL, 1999]
REASONS OF SA TO SELECT REPRESENTATIVE SAMPLE
OF DATA TO EXAMINE:
1.Containing costs
2.Speeding up the data gathering
3.Improving effectiveness
4.Reducing bias
a. Convenience Samples
– the easiest to arrange but it is also the most
unreliable
– unrestricted, non probability samples
Example:
SA put a notice in
a company newsletter asking for everyone interested in the
new sales performance to come to a meeting at 1:00 on
Tuesday.
[KENDALL & KENDALL, 1999]
b.Purposive Sample
– is based on judgment
– still non probability sample but
moderately reliable – SA can choose a
group of individuals who appear knowledgeable and
who are interested in the new[KENDALL information system.
& KENDALL, 1999]
103
c. Simple Random Sample
– not practical, especially when
sampling involves documents and reports
– a numbered list of
population should be obtain to ensure that each document
or person in the population has an equal chance of being
selected.
[KENDALL
d.Complex Random & KENDALL, 1999]
Samples that are most appropriate
for the SA are:
i.Systematic Sampling-simplest method of probability
sampling
ii.Stratified sampling- the process of identifying
subpopulations, or strata, and then selecting objects or
people for sampling within the subpopulations.
109
Qualitative Documents
a.Memos
– are not kept or they are made available only to those
who have “a need to know”, as defined in organizational
policy.
– analysis of memo content will provide you with a clear
idea of the values, attitudes, and beliefs of organizational
members. [KENDALL & KENDALL, 1999]
b.Signs on bulletin boards or in work areas
– serve as subtle reinforces of values to those who
read them.
– it is also instructive to note whom signs are
intended or and to find out through interviews whether
organizational members are held accountable for
acting on the information posted.
112
Interviewing
Opinions
d.Qualities of information
e.Decision-making style
3.Decide Who to Interview
[KENDALL
– when deciding & who
KENDALL, 1999]include key people at all
to interview,
levels who will be affected by the system in some manner.
– strive for balance so that as many user’s needs are
addressed as possible.
115
QUESTION TYPES:
a.Open-Ended Questions
– include those questions such as “what’s” and
“how’s”
that answers most likely their opinions.
[KENDALL & KENDALL, 1999]
b. Closed Questions
– answers finite number, such as ‘none’, ‘one’, or
‘fifteen’.
– limits the response available to the interviewee.
[KENDALL & KENDALL, 1999]
BIPOLAR QUESTION – is special kind of closed question, it
limits the interviewee even further by only allowing a choice
on either pole, such as yes or no, true or false, agree or disagree.
118
BENEFITS OF USING CLOSED QUESTIONS:
i.Saving time
ii.easily comparing interviews
iii.getting to the point
iv.Keeping control over the interview
v.Covering lots of ground quickly
vi.Getting to relevant data
119
DRAWBACKS OF USING CLOSED QUESTION:
i.Being boring for the interviewee
ii.Failing to obtain rich detail( due to the fact that the
interviewer supplies the frame of reference for the
interviewee)
iii.Missing main ideas for the preceding reason
120
Attributes of Open-Ended and Closed Question
Open-ended closed
low Reliability
Reliability of
of data
data high
low Efficient
Efficient use
use of
of time
time high
low Precision
Precision of
of data
data high
much Breadth
Breadth and
and depth
depth little
much Interviewer
Interviewer skill
skill required
required little
difficult Ease
Ease of
of analysis
analysis easy
[KENDALL & KENDALL, 1999]
121
c.Probes
– the strongest “probe” or “follow-up” is the simplest “why”
– if done in a systematic and determined manner, your
probing will be acknowledged as a sign that you are
listening to what’s being said, thinking it through, and
responding appropriately.
– it allows the systems analyst to follow up questions to
get more detailed responses.
EXAMPLES:
§Why?
§What makes you feel that way?
123
2.Avoiding double-barreled questions
– are those that use only one question mark for what
are actually two separate questions.
– double-barreled question is poor choice
because interviewees answers only one question
(purposely or not), or may mistake which question they
are answered and draw the wrong conclusion.
EXAMPLE:
What decisions are made during a typical
day and how do you make them?
124
ARRANGING QUESTIONS IN A LOGICAL SEQUENCE:
1.Pyramid Structure
– inductive organization of interview questions
can be visualized as having a pyramid shape.
– the interviewer begins with very
detailed, often closed, questions.
– should be use if you
believe your interviewee needs to warm up to the
topic. – useful if
the interviewee seems reluctant to address the
topic. [KENDALL & KENDALL, 1999]
EXAMPLE:
If you are interviewing someone who
has told you over the phone that he or she does not need
to talk with you because that person already knows what is
wrong with the forecasting model, you should be probably
structure the interview as a pyramid.
[KENDALL & KENDALL, 1999]
125
[KENDALL & KENDALL, 1999]
start with a what
specific precisely
question is the
problem in your
forecasting model?
characteristics
high Exploratory
Exploratory nature
nature low
high Breadth
Breadth and
and depth
depth low
easy Ease
Ease of
of preparation
preparation Difficult
Difficult Ease
Ease of
of analysis
analysis easy
136
Four different forms of measurement scales:
1.Nominal scale –are used to classify things.
2. Ordinal scale –allows classification and also implies rank
ordering.
3. Interval scale –posses the characteristic that the interval
between each of the numbers are
equal but there is no absolute zero.
4.Ratio scale –when the interval is equal and there is an
absolute zero. used less often by the
systems analyst.
[KENDALL & KENDALL, 1999]
137
Reasons for Scaling
1. Validity –is the degree to which the questions measures
what the analyst intends to measure.
[KENDALL & KENDALL, 1999]
2.Reliability –measures consistency.
138
Observation
Kinds of Information sought activities
when Observing
decision-maker behavior messages relationships
and the office
environment.
influence
142
Analogy between filmic elements for observation
and strobe
FILMIC ELEMENTS ORGANIZATIONAL ELEMENTS
Set location Office location
People position within a Decision maker’s placement in an
frame office (i.e., desk placement)
Stationary objects File cabinets, bookshelves, and
equipment for storing information
Props (movable objects) Calculator, PCs, and other items used
for processing information
144
A summary of decision-maker characteristic that
correspond to observable elements in the physical
environment
Characteristics of Decision- Corresponding Elements in
makers
Gathers information informally the Physical
Warm, Environment
incandescent lighting
Seeks extra organizational and colors
Trade journals present in office
information
Processes data personally Calculators, PCs present in
Stores information personally office
Equipment/files present in office
146
Prototyping user
reactions
user
Kinds of Information sought innovations suggestions
when Prototyping…
revision
plans
Facility 2
Facility 3
154
DISADVANTAGES ADVANTAGES
Difficult to manage Potential exists for changing the
155
THREE MAIN WAYS A USER CAN BE OF HELP IN
PROTOTYPING:
1.Experimenting with the prototype
–allows user the reality of hands-on interaction.
–limited functionality along with the capability to send
comments to the systems team ca be included.
[KENDALL
2.Giving & KENDALL,
open reactions to the1999]
prototype
–making users secure enough to give an
open reaction is part of the relationship between analysts
and users that your team works to build.
–providing a private (relatively
unsupervised) period for users to interact with and
respond to the prototype is one way to insulate them
from unwanted organizational influences.
157
Analysis Phase
158
DATA FLOW DIAGRAM
A graphical representation of data processes
throughout the organization
Advantages of the Data Flow approach:
1.Freedom from committing to the technical implementation of
the system too early.
2.Further understanding of the interrelatedness of the systems
and subsystems.
3.Communicating current system knowledge to users through
data flow diagrams
4.Analysis of a proposed system to determine if the necessary
data and processes have been defined. [KENDALL &
KENDALL, 1999]
159
SYMBOLS MEANING EXAMPLE
Entity Student
2.1
Process Create
Student Student
Record
vFlow of Data
– are the arrow that shows movement of data from
one point to another, with head of the arrow pointing toward
the data’s destination.
vProcess
– A rectangle with rounded corner is used to occurrence of
a transforming process.
[KENDALL & KENDALL, 1999]
161
Process represent work being performed within the system
and should be named using one of the following formats:
162
DEVELOPING DATA FLOW DIAGRAM
1.Creating the context diagram
– is the highest level in a data flow diagram and
contains only one process, representing the entire
system. – the initial context diagram should be
an overview, one including basic inputs, the general
system,diagram
2.Drawing and outputs.
0 (the next level)
– is the explosion of the context
diagram and may include up to nine processes.
3.Creating child diagrams (more detailed levels)
– the process on diagram 0 that is exploded is called the
parent process, and the diagram that results is called the child
diagram.
– the primary rule for creating diagram, vertical balancing,
dictates that child diagram cannot produce output or receive
input that the parent process is not also produce or receive.
[KENDALL & KENDALL, 1999]
163
Input A
Entity 1 0
Output C
System
Entity 3
Input B Name
Entity 2
1 2
Input A General Data Flow B General Output C
Entity 1 Process Process Entity 3
AAA BBB
vContext
01 Data Store 1 02 Data Store 2
Diagrams
3 4 (above)
Input B General Data Flow D General Can be
Process Process “exploded”
Entity 2 CCC DDD
[KENDALL & KENDALL, 1999] into
Diagram
164
0
4.Checking the diagram for errors
Data Flows
2
should not split
11 into two or more
different data
3 flows
167
PHYSICAL DATA FLOW DIAGRAM
Shows how the system will be constructed.
Also have intermediate data stores-often, a transaction file.
168
SIX REASONS FOR PARTIONING DATA FLOW DIAGRAMS:
1.Different user groups – if the processes performed by several
different users groups, often at different physical location
within the company, they should be partitioned in different
computer programs.
2.Timing – examined the timing of the processes. If two
processes execute at different times, they cannot be grouped
into one program.
3.Similar tasks – if two processes performed similar tasks and
both are batch processes, they may be grouped into one
computer program.
4.Efficiency – several batch processes may be combined into
one program for efficient processing.
5.Consistency of data – processes may be combined into one
program for consistency of data.
6.Security – processes may be partitioned for security reasons.
[KENDALL & KENDALL, 1999]
169
DATA DICTIONARY
Is a reference work of data about data(that is, metadata),
one that is compiled by systems analysts to guide them
through analysis and design.
The data dictionary may be used to:
1.Validate the data-flow diagram for completeness and
accuracy.
2.Provide the starting point for developing screens and reports
3.Determine the contents of data stored in files.
4.Develop the logic for data-flow diagram processes.
[KENDALL & KENDALL, 1999]
170
DATA REPOSITORY
While the data dictionary contains information about data
and procedures, a larger collection of project information.
XXX
172
v DATA
-should
FLOW be described first for all input and output,
followed by the intermediate data flow and the data flow to
and from
data stores.
-the detail of each data flow is described using the data
structure, a group of elements sometimes called fields.
v DATA STRUCTURES
v DATA STORES
-all base elements must be stored with in the system.
-are created for each different data entity being stored.
-when data flow base elements are grouped together to
form a structural record, it is created for each unique structural
record.
[KENDALL & KENDALL, 1999]
174
CREATING THE DATA DICTIONARY
175
STRUCTURED DECISION
Conditions, condition alternatives, actions, and
action rules must be known in order to design
systems systems for structured decision.
[KENDALL & KENDALL, 1999]
The analyst first determine the conditions-that is,
occurrence that might affect the outcome of
something else.
[KENDALL & KENDALL, 1999]
176
THREE ALTERNATIVES FOR DECISION ANALYSIS OF
STRUCTURE DECISIONS:
1.Structured English
when structured decisions are not complex, this is the
appropriate technique in analyzing the decision process.
it is based on:
177
Writing Structured English
•Express all logic in terms of sequential structures, decision
structures, case structures, or iterations.
•Use and capitalized accepted keywords such as IF, THEN,
ELSE, DO, UNTIL, and PERFORM.
•Indent blocks of statements to show their hierarchy
(nesting) clearly.
•When words or phrases have been defined in a data
dictionary, underline those words or phrases to signify
that they have a specialized, reserved meaning.
•Be careful when using “and” and “or”, and avoid confusion
when distinguishing between “greater than” and “greater
than or equal to” and like relationships. [KENDALL &
KENDALL, 1999]
178
Calculate
CalculateBase
BasePremium
Premium
IF
IF construction
constructionisisbrick
brick
THEN
THENdeduct
deduct 1010percent
percent ofof base
basetotototal
total
ENDIF
ENDIF
IF
IF owner
owner chooses
chooses$100$100deductible
deductible
THEN
THENaddadd1515 percent
percent ofof subtotal
subtotal
ENDIF
ENDIF
IF
IF home
homehas
hasburglar
burglar alarm
alarm
THEN
THENdeduct
deduct 55percent
percent of
of adjusted
adjustedsubtotal
subtotal
ENDIF
ENDIF
180
Structured English Example
Type Structure
Case IF Case #1 implement Action #1
A
special type of decision,
structure where the cases are ELSE IF Case #2
mutually exclusive (if one implement Action #2
occurs the others cannot) ELSE IF Case #3 implement
Action #3
ELSE IF Case #4 implement
Action #4
ELSE print error
ENDIF
Iteration DO WHILEthere are Customers.
Blocks of Statements Action #1
that are repeated until ENDDO
done
Example of logic expressed in a case structure and an iteration
181
2.Decision Tables
is a table of rows and columns, separated into four
quadrants.
when the it is used to determine which actions need to
be taken, the logic moves clockwise beginning from the
upper left.
182
3.Decision Trees
are used when complex branching occurs in a
structured decision process.
Analyst tree
does not contain probabilities
and outcomes, because in systems analysis trees are
used mainly for identifying and organizing conditions and
actions in a completely structured decision process.
Condition Action 2
Means IF 2
Condition Action 1
2 1
3
can be thought
Action 3 of as meaning
1 1 Condition 2 THEN
Action 4
Condition 2
4
Conventions for drawing a decision tree
2 [KENDALL & KENDALL, 1999]
183
CHOOSING A STRUCTURED DECISION ANALYSIS
TECHNIQUE:
1.Structured English when
a.There are many repetitious actions.
OR b.
Communication to end users is important.
3.Decision Tables when
a. Complex combinations of conditions, actions, and rules are
found. OR b. You require a method
that effectively avoids impossible situations,
redundancies, and contradictions.
4.Decision Trees
a. The sequence of conditions and actions is critical.
OR b. When
not every condition is relevant to every action (the branches
are different). [KENDALL & KENDALL, 1999]
184
SEMI-STRUCTURED DECISION
Are those that are partially programmable but still require
human judgment.
DSS are most powerful when addressing semi-structured
decisions, since the DSS supports the decision maker in
all phases of decision making but does not mandate one
final answer. [KENDALL & KENDALL, 1999]
Decision Support System
Posses many characteristics that differentiate them from
other, more traditional Management Information System.
Supports the decision-making process through the
presentation of information that is designed for the
decision maker’s problem-solving approach and
application needs. [KENDALL & KENDALL, 1999]
185
THREE MAJOR CONCERNS ARISE WHEN ANALYZING
SEMI-STRUCTURED DECISION SUPPORT SYSTEM:
1.Whether decision makers are primarily Analytic or heuristic
2.How decisions are made in the three problem-solving phases
of intelligence, design, and choice
3.The multiple-criteria methods that are useful in solving semi-
structured problems. [KENDALL & KENDALL, 1999]
Analytic Decision Maker Heuristic Decision Maker
Learns by analyzing Learns by acting
Risk
188
DIMENSIONS OF SEMI-STRUCTURED DECISIONS
190
PREPARING THE SYSTEM PROPOSAL
Systems proposal is a destination of all the
systems analyst has learned about the business
and about what is needed to improve its
performance.
[KENDALL & KENDALL, 1999]
In order to address information requirements
adequately, the systems analyst must used systematic
methods for acquiring hardware and software, must
identify and forecast future costs and benefits, and
must perform cost-benefit analysis.
[KENDALL & KENDALL, 1999]
191
Ascertaining Hardware and Software Needs
192
Inventory
computer
hardware
Steps in choosing
hardware and software…
Evaluate Evaluate
hardware Software
Choose
the vendor
Acquire the
computer
equipment
193
If an Updated Computer Hardware is an available,the
systems analyst needs to sit up one quickly and carry
through on it. You need to know:
194
ESTIMATING WORKLOADS
Means that systems analyst formulate numbers
that represent both current and projected
workloads for the system, so that any hardware
obtain well posses the capability to handle current
and future workloads.
[KENDALL & KENDALL, 1999]
195
EVALUATING COMPUTER HARDWARE
Is the share responsibility of management, users, and
systems analysts.
Criteria that the Systems Analysts and Users should use to
evaluate performance of different systems hardware
include:
1.The time required for average transactions(including how long
it takes to input data and how long it takes to receive
output).
2.The total volume capacity of system(how much can be
processed at the sane time before the problem arises).
3.The idle time of the central processing unit.
4.The size of the memory provided.
[KENDALL & KENDALL, 1999]
ACQUISATION OF COMPUTER EQUIPMENT
Advantages Disadvantages
Buying Cheaper that leasing or renting Initial cost is high
over the long run Risk of obsolescence
accelerated depreciation
197
Software Evaluation
1.Performance Effectiveness
a. Able to perform required tasks
b. Able to perform all task that maybe desired at some time
in the future
c. Well design display screens
d. Adequate capacity
2.Performance Efficiency
a. Fast response time d. Efficient storage of data
b. Efficient input e. Efficient back-up
c. Efficient output
3.Ease of Use
a. Satisfactory users interface e. Adequate feedback
b. Help menus available f. Good error recovery
c. Readme files for last minute changes
d. Flexible interface [KENDALL & KENDALL, 1999]
198
4.Flexibility
a. Options for input
b. Options for output
c. Usable with other software
5.Quality of Documentation
a. Good organization
b. Adequate on-line tutorial
c. Web site with FAQ
6.Manufacturer Support
a. Tech support hotline
b. Newsletter or e-mail
c. Web site with downloadable product updates
199
IDENTIFYING BENEFITS AND COSTS
Tangible Benefits
Are advantages measurable in dollars that accrue to the
organization through the use of information system
Examples:
Increase in the speed processing
The advantage of the computer’s superior calculating
power
Intangible Benefits
Include improving the decision making process, in
enhancing accuracy, becoming more competitive in
customer service, maintaining a good business image, and
increasing job satisfaction for employees by eliminating
tedious tasks.
[KENDALL & KENDALL, 1999]
200
Tangible Costs
Are the cost of the equipment such as computers and
terminals, the cost of resources, the cost of systems
analysts’ time, the cost of programmers’ time, and other
employees’ salaries.
Intangible Costs
Include losing a competitive edge, losing the reputation
for being first with an innovation or the leader in a field
declining company image due to increased customer
dissatisfaction, and effective decision making due to
untimely or inaccessible information.
[KENDALL & KENDALL, 1999]
201
Design Phase
202
OUTPUT DESIGN
Is information delivered to users through the information
system by way of intranets, extranets, or the World Wide
Web.
Six objectives for output:
1.Design output to serve the intended purpose.
2.Design output to fit the user.
3.Delivered the appropriate quantity of output.
4.Assure that the output is where it is needed.
5.Provide the output on time.
6.Choose the right output method.
204
Output Method Advantage Disadvantage
207
•CD-ROMS and DVDs
CD-ROMs are being used to output any information that is
voluminous and somewhat stable in content.
DVD(Digital Versatile Disk) is expected to replace the
CD-ROM soon because a DVD has more capacity and a DVD
drive can read CD-ROMs as well as DVDs.
•Microforms
are ideal for large volumes of output such as cataloged parts
or customer lists, and they can significantly reduce the
physical space required for storage.
•Electronic output
in a form of e-mail, faxes and bulletin board messages that
can be sent from one computer to another without the need
for hard copy.
[KENDALL&KENDALL, 1999]
208
Factors to consider when choosing output technology
1.Who will use(see) the output(requisite quality)
2.How many people need the output?
3.Where is the output needed(distribution/logistics)?
4.What is the purpose of the output?
5.What is the speed with which output is needed?
6.How frequently will the output be accessed?
7.How long will(or must) the output be stored?
8.Under what special regulations is the output produced,
stored, and distributed?
9.What are the initial and ongoing costs of maintenance
and supplies?
10.What are the environmental requirements(noise
absorption, controlled temperature, space for equipment, and
cabling) for output technologies?
210
Four general problems with setting limits that may
bias output:
1.Limit set too low.
2.Limit set too high.
3.Range of exceptions output too narrow.
4.Range of exceptions output too wide.
[KENDALL & KENDALL, 1999]
211
Introducing bias through graphics
1.Avoiding bias in the design of output:
212
Designing printed output
1.Report design conventions
Constant information – is information that remains the
same whenever the report is printed.
Variable information – is information
that can vary each time the report is printed out.
2.Paper quality, type, and size
3.Special output forms
4.Functional attributes
a. the heading or title of the report
b. the page number
c. the data preparation
d. the column headings
e. the grouping of related data
items together f. the use of control
breaks [KENDALL & KENDALL, 1999]
213
5.Stylistic/aesthetic attributes
Steps in designing output reports with a computer-
aided software tool
a. determine the need for the report.
b. determine the users.
c. determine the data items
to be included. d. estimate the overall
size of the report. e. title the
report.
[KENDALL & KENDALL, 1999]
214
Steps in designing output reports with a computer-aided
software tool:
a.determine the need for the report.
b.determine the users.
c.determine the data items to be included.
d.estimate the overall size of the report.
e.title the report.
f.number the pages of report.
g.include the preparation date on the report.
[KENDALL & KENDALL, 1999]
215
h.label each column of data appropriately.
i. define variable data, indicating on the screen
whether each space or field is to be used for an
alphabetic, special, or numeric character.
j.indicate the positioning of blank lines used to help
organize information.
k.view prototype reports with users and programmers
for feasibility, usefulness, readability, and aesthetic
appeal.
[KENDALL & KENDALL, 1999]
Designing screen output
Guidelines for screen design
1. Keep the screen simple.
2. Keep the screen presentation consistent.
3. Facilitate user movement among screens.
4. Create an attractive screen.
217
Screen Design Example:
1.Tabular output for decision support systems
information systems that were designed to support
decisions makers in semi-structured decision
systems.
2.Graphical output for decision support systems
to organize information through the use of data
flow diagrams;
and to inform management about
recommendations on the proposed information
system.
[KENDALL & KENDALL, 1999]
218
Designing a web site
1.General guidelines for designing web sites
b.Use professional tools
-use software called a web editor like
Microsoft’s front page or adobe page mill.
c.Study other web sites
-analyze design elements are being used,
and see how they are functioning.
d.Use the resources that the web has to offer
e.Examine the web sites of professional designers
f.Use the tools you’ve learned.
[KENDALL & KENDALL, 1999]
219
a.
g.Consult the books
h.Look at some poor examples of web pages, too
i.Create templates of your own
j.Use plug-ins, audio, and video very sparingly
k.Plan ahead.
[KENDALL & KENDALL, 1999]
220
Web Terms Meaning
book mark A stored address of a web page, (in Microsoft
internet explorer bookmarks are called “favorites.”)
You can jump to a page by clicking on its bookmark.
FAQ “frequently asked question.” Web sites often have a
page devoted to these so the company sales force
or tech support are not inundated with the same
questions over and over again and users can have
FTP “file transfer
24 hour protocol”
access is currently the most common
to answers.
way to move files between computer systems.
223
INPUT DESIGN
The systems analyst is acknowledging that poor input
calls into question the trustworthiness of the entire
system. [KENDALL & KENDALL, 1999]
224
Transaction-Oriented Processing – source data is entered
directly into the processing system at the time the transaction
occurs without intermediate storage. Input is made in real
time. This mode is also known as online data entry.
[SILVER & SILVER, 1989]
Batch Processing – involves preparing data to be input to a
system at a later time. In this mode, source data is
transcribed on to machine-readable storage media. This mode
is also known as offline data entry.
[SILVER & SILVER, 1989]
225
Elements of Data Input
A source document is a record of an original
transaction, generated at a time the transaction takers places.
Source documents contain the about the procedures or
activities initiated during the transaction. The data on source
documents must be made available for processing by the
system. This involves transferring the data on the source
document to another record that is machine readable.
[SILVER & SILVER, 1989]
Input Media
Several methods are used to prepare source data for input
into a system. The purpose of all input devices is to convert
media into electronic pulses that can be stored and
manipulated by computers or other devices.
[SILVER & SILVER, 1989]
226
Most Common Input Media
1.Keyboard Terminals
a.Smart terminal – have an integrated microprocessor
2. b.Dumb Terminals – Do not have integrated microprocessor.
3.
4.Manual
a.LongData
handEntry
or onDevices
a typewriter
5.
6.Optical Scanning Devices
7. a.Mark Sense Readers
8. b.Optical Character Readers
9.Magnetic ink Character Readers
10. a.Magnetic Ink Character Recognition
11.Voice Recognition Devices
12.Other Input Devices ( mice, wands, joysticks, digitizers, and
light pens.)
[SILVER & SILVER, 1989]
227
Design of Source Document
A source document should capture data in the
sequence in which it will be entered to the system. It
should have adequate space for the user to fill in the
data. Filled should be labeled, and explanatory notes
should be included in the form to make sure that data
is entered correctly.
[SILVER & SILVER, 1989]
228
Input Verification Control
Well-designed information systems have transaction
controls that monitor input data to make sure it is correct, in the
proper range, and complete.
229
Verification
Involves making comparisons to check the
accuracy of the data transferred from one document
to another.
•Keyboard Information Twice
•Batch Totals – some of all values in a given field in
a batch.
[SILVER & SILVER, 1989]
230
Input Design Guidelines
•Design input screens for operator convenience. Place related
items close together. Avoiding shifting between capital letters
and lower case and between figures and numbers unless
necessary.
•Use a consistent style. Don’t call for a date to be entered one
way, for instance 1/29/89, and later ask for it to be entered
as January 29, 1989.
•Only variable data should be entered, not constants. Structure
records, for example, so that the operator enters “6723,” not
“EMPLOYEE NUMBER 6723.”
•Use common expressions to identify fields: ADDRESS rather
than LOCATION or DOMICILE, LAST NAME rather than
SURNAME, and so on.
[SILVER & SILVER, 1989]
231
• Enter data in a logical sequence. For instance, name,
address, phone number, is more logical than name, phone
number, address.
232
Four guidelines for form design should be
observed in order to design useful forms:
[KENDALL&KENDALL, 1999]
233
Incident Report
Types of incident Data Time
Good Form
Location Investigating Officer
3.Captioning
– another technique that can make easy work of filling
out a form.
– tell the person completing the form what to put
on the blank line, space, or box.
[KENDALL & KENDALL, 1999]
235
Good screen and web forms design
good form design is
transferable to screen design and eventually to the good
design of Web sites and their pages.
Four guidelines for screen design:
1.Keep the screen simple.
– the first guideline for good screen design is to keep
the screen display simple.
– the display screen should show only that
which is necessary for the particular action being
undertaken.
2.Keep the screen presentation consistent.
3.Facilitate user movement among screens.
4.Create an attractive screen.
[KENDALL & KENDALL, 1999]
236
Keeping the screen consistent
the second guideline for good screen design is to
keep the screen display consistent.
Facilitating movement
the third guideline for good screen design is to make it
easy to move fro one screen to another.
Scrolling
this is an extremely easy way for inexperienced users
to change screens.
Calling up more detail
another general approach to movement between
screens allows users to call up another screen quickly
by using cursor positioning along with a specific
command
[KENDALL & KENDALL, 1999]
237
On-screen dialog
Displaying prompts facilitate of user movement between
screens.
Designing an attractive screen
the fourth guideline for good screen design is to create an
attractive screen for the user.
Three screen sections
this method is useful because it simplifies
interactions with screens.
the top of the screen features a “heading”
section, part which is written into the software to describe to
the user where he or she is in the package.
the middle section is called the “body”of the screen
this can be used for data entry and is organized from
left to right and top to bottom.
[KENDALL & KENDALL, 1999]
238
Using windows hyperlinks
another way to keep the screen display simple is to list a
few basic commands that, when used, will overlay windows to
partially or totally fill the current screen with new information.
239
Attributes
attribute characters control the characteristics of the
screen field to the right of them and include the following
qualities:
1.Protection
-determines whether the user may
enter data into the screen field or not.
2.Intensity
-is how bright a screen field will appear
244
Data concepts
245
Records
is a collection of data items that have
something in common with the entity.
Keys
is one of the data items in a record that is used
to identify report
when a key uniquely identifies a record, it is
called a primary key.
is called a secondary key if it cannot uniquely
identify a record.
246
File Organization
•File types
-files can be used for storing data for an
indefinite period of time, or they can be used to
store data temporarily for a specific purpose.
•Master files
-contain records for a group of entities.
-if the master file is stored using conventional file
methods, an expansion area is reserved at the end
of each record.
•Table files
-contains data used to calculate more data or
performance measures.
Example: tax table
[KENDALL & KENDALL, 1999]
247
• Transaction files
-is used to enter changes that update the master file
and
produce reports.
-may contain several different kinds of records such as the
three used for updating the newspaper subscription master,
with a code on the transaction file indicating the type of
•Worktransaction.
files
-a program can work efficiently if a work file is used.
•Report files
-is used when it is necessary to run a program but no
printer is available(busy).
vIndexed-Sequential Organization
also called ISAM(indexed-sequential access
method).
a widely used method of file organization
allow program to read records directly without reading
other records in the file.
ISAM – the records are arrange in blocks.
VSAM – or virtual storage access method, a more
modern and efficient method for handling
indexed-sequential files. [KENDALL & KENDALL,
1999]
250
DATABASE ORGANIZATION
251
Normalization of a relation User
is accomplished in three Views
major steps……….
Unnormalized
relationship
Step 1 Remove repeating groups
Normalized
relations(1NF)
Step 2 Remove partial dependencies
Second normal
form
(2NF)relations
Step 3 Remove transitive dependencies
Third normal
form(3NF)
[KENDALL & KENDALL, 1999] relations
252
GUIDELINES FOR FILE OR DATABASE RELATION
DESIGN
253
Eight steps in the retrieval and presentation of data:
254
USER INTERFACE
OBJECTIVES
1.Effectiveness is achieved through the design of interfaces
that allow users to access the system in a way that is
congruent with their individual needs.
2.Efficiency as demonstrated through interfaces that both
increase the speed of data entry and reduce errors.
3.User consideration as demonstrated in the design of
suitable interfaces and by providing appropriate feedback
to user from the system.
4.Productivity as measured by ergonomically sound principles
of design for user interfaces and work spaces.
2.Question-and-answer interfaces
– the computer displays a question to the user on the
screen.
3.Menus
– this interface appropriately borrows its name from the
list of dishes that can be selected in the
restaurant.
– provides the user with an on-screen list of available
selections.
[KENDALL & KENDALL, 1999]
256
4.Form-fill interfaces(input/output forms)
– consist of on-screen forms or web-based forms
displaying fields containing data items or parameters
that need to be communicated to the users.
5.Command-language interfaces
– allows the users to control the application with a
series of key strokes, commands, phrases, or some
sequence of these three methods.
– manipulate the computer as a tool by allowing the
user to control the dialog.
– require memorization of syntax rules that may
prove to be obstacles for inexperienced users.
257
6. Graphical user interfaces(GUIs)
– allow direct manipulation of the graphical
representation on the screen, which can be
accomplished with keyboard input, joystick, or a
mouse – its creation poses a challenge, since an
appropriate model of reality or an acceptable
conceptual model of the representation must
be invented.
258
Dialog
Is the communication between the computer and a
person.
Well designed dialog makes it easier for people to use a
computer and leads to less frustration with the computer
system.
Guidelines for dialog design:
259
Communication
presenting an appropriate title on each screen,
minimizing the use of abbreviations, and providing clear
user feedback.
get it)
[KENDALL&KENDALL, 1999]
261
STRUCTURED QUERY LANGUAGE(SQL)
is a popular way to implement queries.
It uses a series of keywords and commands to select
the rows and columns that should be displayed in the
resulting table. [KENDALL & KENDALL, 1999]
DATA MINING
its concept came from the desired to use the database
for a more selective targeting of customers. [KENDALL
& KENDALL, 1999]
Diagram below
262
Warranty card
customer sent
in
External
Data
Prospects or mailing list
from other companies Information from survey
that customer filled out
Data
External Maintained
Data Internally
Customer purchased
history from credit card
Customer profile obtained
when customer made
purchase from the web
External Customer
Special promotion offer
Data demographics
for customer
from
municipality [KENDALL & KENDALL,1999]
263
Quality Assurance Through
Software Engineering
264
APPROACHES
SQA
APPROACHES TO QUALITY
265
TOTAL QUALITY MANAGEMENT
vResponsibility
•The full organizational support of management must exist
SQA
•Early commitment to quality from the analyst and the
business is necessary to achieve the goal of quality
•Providing on-the-job time for Information System quality
circles for implementations of improvements.
•Reshaping a new system or modification of the
information system
•Encouraging users to crystallize their expectations about
SQA
system’s programming and over-all development, to
point out problems and to allow the programmer or
analyst responsible for that portion of the system to
make suitable changes [KENDALL & KENDALL, 1999]
267
Systems Design and Development
vBottom-Up Design
- identifying the process that need computerization
as they arise, analyzing them as systems and either
SQA
coding the process of or purchasing package software to
meet the immediate problem. [KENDALL & KENDALL,
1999]
Limitations:
a. Interface bugs are enormously costly to correct and many of
them are not uncovered until programming is complete.
b. There is a duplication of effort in purchasing software and
even in entering data
c. Much worthless data are entered into the system.
d. Overall organizational objectives are not considered and
hence cannot be met. [KENDALL & KENDALL, 1999]
268
vTop-Down Design
- allows the systems analyst to ascertain overall
organizational objectives first, as well as to ascertain
how they are best met in an overall system
Advantages: SQA
[KENDALL & KENDALL, 1999]
269
Pitfalls:
• The system would be divided into a “wrong”
subsystems.
• Once systems division are made, their interfaces
SQA
maybe neglected or ignored.
• Eventually subsystems must be reintegrated.
[KENDALL & KENDALL, 1999]
Total quality management and the top-down approach
to design can go hand in hand. The top-down approach
provides the systems group with a ready-made division
of users into task forces for subsystem.
[KENDALL & KENDALL, 1999]
270
ORGANIZATIONAL
OBJECTIVES LEVEL
(coordinating systems to
meet company objectives)
FUNCTIONAL
SYSTEMS LEVEL
(e.g., payroll, accounting,
and product systems)
OPERATIONAL SYSTEMS
LEVEL (e.g., manage
editing, updating, and
printing)
PROGRAM
MODULE LEVEL (e.g.,
read data, sort, write to
files and printer)
SQA
- involves breaking the programming into logical,
manageable potions or modules.
[KENDALL & KENDALL, 1999]
Advantages:
a.Modules are easier to write and debug because they
are virtually self-contained.
b.Modules are easier to maintain.
c.Modules are easier to grasp, since they are self-
contained subsystems.
[KENDALL & KENDALL, 1999]
272
Guidelines for modular programming:
a.Keep each module to manageable size
SQA
b.Pay particular attention to the critical
interfaces
c.Minimize the number of modules the user
must modify when making
changes.
d.Maintain the hierarchical relationships set
up into the top-down phases.
[KENDALL & KENDALL, 1999]
273
Modularity in the Windows Environment
Two systems to link programs:
1. Dynamic Data Exchange(DDE)
- shares code by using Dynamic Link Library(DLL)
SQA
files.
Server - programs that contain the original data
Client - programs that uses the data
Advantage:
a.Programs will have the same look and feel as other
Windows programs.
b.It speeds development because common DLL files
have code contained.
[KENDALL & KENDALL, 1999]
274
Disadvantage:
a. It is limited in features
SQA
b. Programs tend to use the least common
nominator rather than take advantage of
potentially powerful features.
4. Object Linking and Embedding(OLE)
- it is superior to DDE because it ties in application
data and graphics, it retains all of the properties of
the originally created data.
[KENDALL & KENDALL, 1999]
Structure Charts
-recommended tool for designing a
modular, top-down system.
- a diagram consisting of
rectangular boxes, which represents the modules
and connecting arrows. [KENDALL & KENDALL,
1999]
Two types of Arrow:
a.data couples – arrows with the empty circles
b.control flags/switches – arrows with the field-in circles
[KENDALL & KENDALL, 1999]
Drawing a Structure Chart
- are meant to be drawn from the top down,
the data- flow diagram [KENDALL & KENDALL,
1999]
276
1
The higher level
module calls the
lower module
278
Types of Modules
a. Control modules – contain the logic performing the
lower-level modules. It may or may not be represented
on data flow diagram.Types of statements for control
modules are ‘if’, ‘perform’ and ‘do’.
[KENDALL & KENDALL, 1999]
b.Transformational modules – are those created from a
data-flow diagram. They usually perform only one task,
although several secondary tasks may be associated
with the primary task. [KENDALL & KENDALL, 1999]
c.Functional or specialized modules – are the lowest in the
structure, with a rare subordinate module beneath them.
Perform only one task. [KENDALL & KENDALL, 1999]
279
Module Subordination
Subordination of module is one of the lower on the
structure chart called by another module higher in the
structure. Allowing the lower-level module to perform a task
not required by the calling module is called improper
subordination. [KENDALL & KENDALL, 1999]
Even when a structure chart accomplishes all of the
purposes for which it was drawn, the structure chart cannot
stand alone as the sole design/ documentation technique.
[KENDALL & KENDALL, 1999]
280
DOCUMENTATION
Is the primary source of information about the system
and the current state of development. It provides an
overview of the system itself. The documentation should
record all essential facts and decision about the system.
[KENDALL & KENDALL, 1999]
Includes all management and quality assurance
materials, specification which are the product for
analysis and design operations, source code and
technical guides and user manual use to describe the
finished system. [KENDALL & KENDALL, 1999]
A good documentation is clear, concise, consistent and
accurate. A document must be accurate, as its value
decreases rapidly with every error it contains.
[KENDALL & KENDALL, 1999]
281
Nassi- Shneiderman Charts
Advantage:
a.it adopts the philosophy of structured programming.
b.it uses a limited number of symbols so that the flowchart
takes up less space.
c.it can be read by someone unfamiliar with symbols used in
other of flowcharts.
[KENDALL & KENDALL, 1999]
Process
Iteration
282
Pseudocode
-similar to structured English because it is not a particular
type of programming code, but it can be used as
intermediate step for developing program code.
[KENDALL & KENDALL,1999]
Procedures Manuals
-they may contain background comments, steps required
to accomplish different transactions, instruction on how to
recover from problems, and what to do next if something is
not working(troubleshooting). [KENDALL & KENDALL,
1999]
283
Biggest complaints
a.they are poorly organized
b.it is hard to find needed information in them.
c.the specific case in question does not appear in the
manual
d.the manual is not written in the English
[KENDALL & KENDALL, 1999]
284
The Folklore Method
is a system documentation technique that was created to
supplements some of the techniques just covered. It gathers
information that is often shared among users but is seldom
written down. [KENDALL & KENDALL, 1999] is a
systematic techniques, based on traditional methods used in
gathering folklore about people and legends.It requires the
system analyst to:
a.interview users
b.investigate existing documentation in files
c.and observe the processing of information
SAYINGS
SAYINGS“Do
“Dothis
thisand
andititworks.”
works.”
TALES
TALES Stories
Storiesabout
abouthow
howusers
userswere
wereable
abletotoget
getth
t
287
CODE GENERATION AND DESIGN
Code Generation -is the process of using software–often a
lower or integrated CASE product to create all or part of
computer program.
•Full Code Generatorsrequires a full methodology for:
entering all data, business rules, screen designs and so on.
•Partial Code Generators generate only specific pieces of
code that maybe incorporated into program being constructed
by the programmers.
One advance approach to code generation is a set of
program called XperCASE by Siemens AG österreich., with
this sophisticated set of tools, the system analyst cannot only
generate program code, but also reengineer existing code.
[KENDALL & KENDALL, 1999]
288
Design
Specification requirement reflected in software design,
modularity effective, functional independence software well
structured, loose coupling interfaces for modules and external
elements defined data structures consistent with specification
and information consideration given to maintenance and
documentation state to design and plan reconcilable.
[KENDALL & KENDALL, 1999]
Coding
Design verified in the coding compliance with any
coding standards and conventions code readily readable
(including typing and data declarations) state of code and plan
reconcilable. [KENDALL & KENDALL, 1999]
289
REENGINEERING (Reverse Engineering)
Refers to the complete process of converting program
code to the CASE design, modifying the design, and
generating the new program code
Reverse engineering is the opposite of code generation.
The computer source code is examined, analyst, and
converted into repository entities.
modify the logic and output it as computer code in a
different language.
Once the program has been reverse engineered, the
design may be modified, eliminating unused features and
adding new features to the program.
[KENDALL & KENDALL, 1999]
290
Corporation Product Name
Bachman Information Systems, Inc. Analyst Capture
Cadre Technologies, Inc,. CGI Teamwork
Systems, Inc.
PacReverse
Intersolv
XL Recovery
Siemens AG XperCASE
291
Reverse engineering concepts
Do process records
Reverse
Add 1 to counter
Engineering
Add amt. to Total
Toolset
………..
ENDDO
294
v Testing is accomplished on sub systems or program
modules as work progresses.It is done on many different levels
at various intervals.before system is put into production, all
programs must be desk-checked,checked with test data, and
check to see if the modules work together with one another as
planned. [KENDALL & KENDALL, 1999]
The system as working whole must also be tested, this
includes:
a.testing the interfaces between subsystems
b.the correctness of output, and the usefulness
c.understandability of system documentation and output.
Programmers Analyst
Testing
Operators Users
298
Full Systems Testing with Live Data
- data that have been successfully processed through
the existing system. It allows an accurate comparison of the
new system’s output with what you know to be correctly
processed output, as well as good feel for how actual data will
be handled. [KENDALL & KENDALL, 1999]
Maintenance Practices
- is performed most often to improve the existing software
rather than to respond to a crisis or system failure. It is also
done to update software in response to the changing
organization. [KENDALL & KENDALL, 1999]
Auditing
- is another way of assuring the quality of information
contained in the system. It refers to having an expert who is not
involved in setting up or using a system examine information in
order to ascertain its reliability. [KENDALL & KENDALL, 1999]
299
Implementing The Information
System
300
IMPLEMENTING APPROACHES
The process of translating logical design into a physical
implementation is the implementation phase.
It is also the process of assuring that the information system
is operational and then allowing users to take over its
operation for use and evaluation.
[KENDALL & KENDALL, 1999]
301
Second Approach -using different strategies for training users
and personnel, including taking them in their own level, using
a variety of training techniques and making sure that each
user understand any new role that he or she must take on
because of the information system.
[KENDALL & KENDALL, 1999]
Third Approach -choosing a conversion strategy, the system
analyst needs to weigh the situation and propose a conversion
plan that is appropriate for particular organization and
information system. [KENDALL & KENDALL, 1999]
Fourth Approach-involves evaluating the new or modified
information system, the analyst need to formulate
performance measures on which to evaluate the system,
evaluation comes from users, management, and analyst
themselves. [KENDALL & KENDALL, 1999]
302
Process-oriented
-translation of module specification into
program specifications, the program development cycle
can then be applied: this involves specification review,
design, coding, testing and integration.
[KENDALL & KENDALL, 1999]
Data-oriented
-information system still need to concentrate
on system’s data requirements. Translating a logical
data model expressed in terms of entities, attributes,
domains and relationships into a physical data
implementation. This translation process can be
considered into a mapping of one model.
[KENDALL & KENDALL, 1999]
303
Implementing Distributed System
- if the reliability of a telecommunication
network is high, it is possible to have distributed
systems for businesses, a setup which can be
conceived of as an application of telecommunications.
[KENDALL & KENDALL, 1999]
- the concept of distributed systems is used in many
different ways, it will be taken in a broad sense so
that it includes workstation that can communicate
with each other and data processors, as well as
different hierarchal architectural configuration of
data processors that can communicate with each
other and that have differing data storage
capabilities.
[KENDALL & KENDALL, 1999]
304
Client/Server Technology
-the client/server (C/S) model.
-client/server computing
-client/server technology
-
client/server architecture
This refer to a design model that can be thought of as
applications running on a local area network (LAN).
Client/ server network- is performing its distributed
processing,.since it should have the look and feel of a
unified system.
Peer-to-peer network - PCs can act as either the server or
the client , depending on the requirements of the
applications.
[KENDALL & KENDALL, 1999]
305
Client as Part of the Client/Server Model using a LAN
Client – refers to the network machines which are
typically points of entry to the client/server system.that is
used by human. It could be a network desktop computer; a
workstations or laptop computers; or any way in which the
user can enter the system. [KENDALL & KENDALL, 1999]
Client Workstations used smaller programs that stay
resident in the client to do “front-end processing”(as
opposed to back-end processing), including communicating
with the user. [KENDALL & KENDALL, 1999]
Client-based application means that the applications
resides in a client computer and cannot be access by other
users on network. It requires separate installation on each
workstation if the LAN has not purchased a site license.
[KENDALL & KENDALL, 1999]
306
A client/server system configuration
Microsof
Local t
User-specific
data Application Powerpo
int
Visible Visio
Analyst
Microsoft Microsoft
Excel Word
Clients
Microso
ft
Access
General
Application
Enterpris
e
Data Server
307
File server- is the term used to denote a computer
on a LAN that stores on its hard disk the application
programs and data files for all of the clients on the
network. Server-based applications are types of client
processing capabilities that permits the user to
request network applications(program stored on a
network server rather than on users computer) from
the server.
[KENDALL & KENDALL, 1999]
Print Server- on a LAN is accessible to all
workstations. It is a PC dedicated to receiving and
(temporarily) storing files to be printed.
[KENDALL & KENDALL, 1999]
308
Advantages of Client/Server Model
a.there are well-documented high start-up or
switch-over cost associated with a movement
to a C/S architecture.
b.it affords greater computer power end greater
opportunity to customize applications.
Disadvantages of Client/Server Model
a.systems are not always the best solution to an
organization problem.
b.it is more expensive than other options
[KENDALL & KENDALL, 1999]
309
Types of distributed system networks:
Standard types of network:
a.Local Area Network(LAN)
b.Wide Area Network(WAN)
[KENDALL & KENDALL, 1999]
Main Types of Distributed Systems Networks
1.Hierarchical Networks
2.Star Networks
3.Ring Networks
4.Bus configuration
[KENDALL & KENDALL, 1999]
310
Advantages of Distributed Systems
Allow data storage out of the way of on-line, real-time
transactions.
Allow less expensive media for data storage when all data
manufacturer.
Less expensive than large systems initially since
311
Disadvantages of Distributed Systems
Difficulty in achieving a reliable system
312
TRAINING USERS
Systems analysts engage in an educational process
with users. Throughout the system development life
cycle, the user has been involved, so that by now the
analyst should possess an accurate assessment of the
users who must be trained.
[KENDALL & KENDALL, 1999]
In the implementation of large projects, the analyst
will often be managing the training rather than be
personally involved in it. the analyst can bring to any
training situation is the ability to see the system from
users viewpoint.
[KENDALL & KENDALL, 1999]
313
Training Strategies are determined by who is
being trained and by who will train them.
[KENDALL & KENDALL, 1999]
Who to train
- all people who will have
secondary or primary use of the system must
be trained. This includes everyone from data-
entry personnel to those who will use output to
make decisions without personally using a
computer. [KENDALL & KENDALL, 1999]
314
vPeople who train users. Possible training sources
include:
1. Vendors
2. Systems Analysts
3. External Paid Trainers
4. In-House trainers
5. Other System user
Guidelines For Training
1.Establishing measurable objectives
2.Using appropriate training methods
3.Selecting suitable training sites
4.Employing understandable training materials
[KENDALL & KENDALL, 1999]
315
Elements Relevant Factors
Training objectives Depend on requirements of user’s job.
Training methods Depend on user’s job, personality,
Training sites background,
Depend and experience;
on training objectives,use cost,
Training materials combination
Depends
availability; of lecture,
onfree
user’s demonstration,
needs;
vendors operating
sites with
hands-on,
manuals, and study.
cases,
operable equipment; prototypes
in-house of
equipments and output;on-line
installation; rented facilities tutorials
317
Conversion Strategies
1.Direct changeover
-it means that on specified date, the old system is dropped
and the new system is put into use.
Advantage:
Users has no possibility of using the old system rather the new
one.
Disadvantage:
a.It is considered as risky approach because long delays might
ensue if errors occur since there is no alternate way to
accomplish processing.
b.Users may resent being force into using an unfamiliar
system without recourse. [KENDALL
& KENDALL, 1999]
318
2.Parallel conversion
-refers to running the old system and the new
system at the same time, in parallel. This is the most
frequently use approach but its popularity maybe
declined because it works best when a computerized
system replaces a manual one.
Advantages:
a. Possibility of checking new data against old data in
order to catch any errors in processing in the new
system.
b. Offers a feeling of security to users, who are not
forced to make an abrupt change to the new system.
[KENDALL & KENDALL, 1999]
319
Disadvantages
a.the cause of running two systems at the same time
and the burden on employees of virtually doubling
their workload during conversion.
b.unless the system being replaced is a manual one, it
is difficult to make comparison between outputs of a
new system and the old one
[KENDALL & KENDALL, 1999]
320
3.Phased or gradual conversion
- attempts to combine the best features of
the earlier two plans, without incurring all of the risk.
Advantage:
Allows users to get involved with the
system gradually and the possibility of detecting and
recovering from errors without a lot of down time.
Disadvantage:
It takes too long to get the new system in place
and its inappropriateness for conversion of small,
uncomplicated systems.
[KENDALL & KENDALL, 1999]
321
4.Modular prototype conversion
This approach to conversion uses the building of modular,
operational prototypes to change from old systems to new
in a gradual manner.
Advantage:
a.each module is thoroughly tested before being used.
322
5.Distributed conversion
-refers to a situation in
which many installations of the same systems are
contemplated, as is the case in banking or in
franchises such as restaurants or clothing stores
Advantages:
Problems can be detected and contained rather than
inflicted simultaneously on all sites.
Disadvantage:
Even when one conversion is successful, each site
will have its own peculiarities to work through, and
this must be handled accordingly.
[KENDALL & KENDALL, 1999]
323
Direct
DirectChangeover
Changeover
Parallel
ParallelConversion
Conversion
Gradual
GradualConversion
Conversion
Modular
ModularPrototype
Prototype
Conversion
Conversion
Distributed
DistributedConversion
Conversion
325
2.Logical Security – refers to logical controls
within software itself. These are
passwords or authorization codes of some
sort. Special encryption software has been
develop to protect commercial transaction
from the Web, and business transactions
are from the proliferating.
[KENDALL & KENDALL, 1999]
326
3. Behavioral security– behavioral expectations of an
organization are encoded in its policy manuals and even
on signs posted in bulletin boards. But the behavior that
the organization members internalized is also critical to
the success of security efforts. Security can begin with
the screening of employees who will eventually have
access to computers, data, and information in order to
ensure that their interest are consistent with the
organization’s interests and they fully understand the
importance of carrying through on security procedures.
327
Other conversion considerations
1.Ordering equipment(up to three months ahead of
planned conversion).
2.Ordering any necessary materials that are externally
supplied to the information system, such as toner
cartridges, paper, preprinted forms, and magnetic
media.
3.Appointing a manager to supervise or personally
supervising the preparation of the installation site.
328
Organizational Metaphors and Their relationship to
Successful Systems
Be aware of organizational metaphors when you attempt to
implement a system you have just developed.
1.When the predominant metaphoris war, journey, or jungle, the
environment is chaotic, like the zoo. However, the war and the
journey metaphors are oriented toward an organizational goal,
while the zoo and jungle are not.
2.In addition to the machine metaphorssuch as society, family,
and the game, all signify orders and rules.the society and the
zoo do not stress the company’s goal but instead allow the
individuals in the corporation to set their own standards
3.Another metaphor, the organism, appears balanced between
order and chaos, corporate and individual goals.
[KENDALL & KENDALL, 1999]
329
Success less Type of Information system Success more
likely with this likely with this
metaphors metaphors
War jungle Traditional Family society
TraditionalMIS
MIS
machine
War journey Decision Family society
DecisionSupport
SupportSystems
Systems
organism
Game organism
Jungle zoo Expert
ExpertSystems/AI
Systems/AI machine
331
Types of evaluation
1.Revised decision evaluation approach presents difficulty
since all variables involved with the design, development
and evaluation of the information system cannot be
calculated or quantified.
2.The user involvement approach yields some insight for
new projects by providing a checklist of potentially
dysfunctional behavior by various organizational members.
332
The information system utility approach is a workable and
straight forward framework for evaluating large-scale
information systems,projects and ongoing efforts.
Utilities of information
a.Possession utility (Who should receive output?)
b.Form utility (What kind of output?)
c.Place utility (Where the information is distributed?)
d.Time utility (When information is delivered?)
e.Actualization utility (How the information is introduced and
used by the decision maker?)
f.Goal utility (answers ‘why’ information systems by asking
whether the output has value in helping the organization
obtain its objective. [KENDALL & KENDALL, 1999]
333
Evaluating the system an
information system can be evaluated as successful if
it possesses all six utilities.
a.“poor” the entire module will be the destined to
failure.
b.partial/ “fair” will result in a partially successful
module.
c.“good” the module is a success
The information utility approach is a workable and
straightforward framework for evaluating large scale
information systems projects and on-going efforts.
[KENDALL & KENDALL, 1999]
334