Uploaded by ahgaseven

OBL-Module-GIT-Class-Notes-2021-2022

advertisement
MODULE IN
Living in the IT Era
GIT
Computer Science & Computer Applications Department
SCHOOL OF ACCOUNTANCY, MANAGEMENT, COMPUTING
AND INFORMATION STUDIES
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Table of Contents
MODULE 1 .................................................................................................. 3
Unit 01: Information Technology and Emerging Trends ................................ 3
Unit 02: Sustainability of Productivity ......................................................... 9
MODULE 2 ................................................................................................ 14
Unit 3: Systems Analysis and Design ......................................................... 14
Unit 4: Systems Development Life Cycle - Planning .................................... 21
Unit 05: Systems Development Life Cycle - Analysis ................................... 35
Unit 06: Systems Analysis - Data Flow Diagrams ....................................... 45
Unit 07: Systems Development Strategies ................................................. 55
Unit 08: Systems Development Life Cycle - Design .................................... 60
Final Requirement: Business Case ............................................................. 73
MODULE 3 ................................................................................................ 74
Unit 09: Cybercrime Laws .......................................................................... 75
Unit 10: Computer and Data Privacy .......................................................... 75
Unit 11: Copyright Laws ............................................................................ 75
Appendix ................................................................................................... 78
2
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
MODULE 1
Unit 01: Information Technology and Emerging Trends
Objectives: By the end of this lesson, the student will be able to
1. discuss and describe the different industrial revolutions,
2. describe what is the difference between innovation and invention,
3. compute for productivity as an effect of information technology on workers or on the
organization as a whole.
We are living in extraordinary times where extraordinary technologies are within reach from
anywhere, by anyone. We almost always take these technologies for granted because they have
become part of the everyday life of people.
To start with this module, see the presentation for IT Trends: Lesson01GITTechTrends
The rise of information and communication technologies (ICT) – that is, computers,
software, telecommunications and the internet – and the large impact that these new technologies
are having on the way that society functions, have prompted many to claim that we have entered
a new era.
Industrial Revolutions
A period of development in the latter half of the 18th century, where there is change from
one economy to another.
3
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Generally, the term refers to eras when rapid and significant technological changes
fundamentally alter the way that production is carried out in society, affecting not only how people
work but also how they live their lives.
Industrial revolution involves technological, socioeconomic, and cultural aspects. It occurs
when technological change fundamentally transforms the way in which a society carries out the
production and distribution of goods.
The changes could be inventions, innovations, product innovations, or process
innovations. The term ‘invention’ refers to the discovery of new products or processes, while
‘innovation’ refers to the commercialization (bringing to the market) of new products or processes.
Invention is the discovery of new products and processes.
Machines
Telephones
Automobiles
Television
4
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Innovation is the commercialization and improvement of the existing products.
Assembly Lines
CD’s
Flat Screen TV’s
Smartphones
Product innovations result in the production of a new product, such as the change from a
three-wheel car to a four-wheel car, or the change from LP (Long Play/Playing) records to CDs
(Compact Discs). Process innovations increase the efficiency of the methods of production of
existing products, for example the invention of the assembly-line technique.
Here are the different Industrial Revolutions with their products / services,
transportation, production system, and communication.
First Industrial Revolution - 1765
Started in England during the late 18th century, concentrated in Britain and initially focused
on textile manufacturing.
●
●
●
●
●
Significant evolutions: Cort’s puddling; rolling process for making iron, Crompton’s mule
for spinning cotton, Watt steam engine
Products / Services – Vegetables, Coal, Iron, Discovery of chemicals
Transportation – Railroads, Basic farming
Production System – Manual Labor to mechanical
Communication - Printed materials
Second Industrial Revolution - 1870
●
●
Significant evolution: Development of electricity, Internal-combustion engine, Railway,
Chemical industry
Products / Services – electricity, chemicals, petroleum, steel
5
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
●
●
●
Transportation – automobiles, aircrafts
Production System – machine-aided equipment
Communication – telephone, telegraph
Third Industrial Revolution - 1969
●
●
●
Started with the development of transistors and the rise of electronics and digital
technology.
Products / Services – Internet, rise of electronics, source of energy: nuclear power
Production System - Automation
Fourth Industrial Revolution
See Lesson01Video1IndustrialRevolutions.mp4
6
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Klaus Schwab described the fourth industrial revolution as marked by an era of technological
revolution that is blurring the lines between the physical, digital and biological spheres.
Watch Lesson01Video2FourthIndustrialRevolution.mp4
IT and PRODUCTIVITY
Economists interested in the pervasive effects of technological change in different
industrial revolutions have devised the concept of a General Purpose Technology (GPT). It is a
technology of wide application used in various industries and whose impact is strong on their
functioning.
Main Characteristics of a GPT
As you read the list, consider how a new technology such as electricity or information
technology fulfils each criterion.
●
●
●
●
It must have a wide scope for improvement and elaboration - this means that the
technology does not appear as a complete and final solution, but as a technology that can
be improved through the different opportunities for technological change that surround it.
It must be applicable across a broad range of uses - this means that its use is not
restricted, for example, to only one industry but open to many different types of industries
and consumers.
It must have a potential use in a wide variety of products and processes - this means that
the new technology should not result in the creation of only one set of products (such as
a computer), but a wide set of products (such as complex new air-traffic control systems
or new inventory controls).
It must have strong complementarities with existing or potential new technologies - this
means that the technology does not only replace existing methods but also works with
them, ensuring an even broader impact on the systems of production and distribution.
Productivity
Productivity is the quality of producing something. It is a measure of the efficiency of a person,
machine, factory, system, etc., in converting inputs into useful outputs. It is an indication of the
efficiency of production or distribution.
7
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
The Effect of Technology on Productivity
Labor productivity can be measured as output produced per hour of labor. For example, consider
an automobile factory that is able to produce 10 cars per day using 100 hours of labour. If a new
invention permits those same workers to produce 20 cars in the same amount of time, their
productivity has been doubled.
Gross Domestic Product (GDP) - Total monetary or market value of all the finished goods and
services produced within a country's borders in a specific time period. Total output divided by total
labour hours in the year gives us a measure of labour productivity. A 5 per cent growth in UK
productivity over a year means that the UK economy has become 5 percent more productive than
it was in the previous year. This should mean that the economy can produce 5 per cent more
output (GDP) with the same amount of inputs.
Example Computation for Productivity
Question1: If a group of workers produces 10,000 units of output in one year, and 12,000 units
the next year. Calculate the percentage increase in productivity.
Answer:
You want to know the percentage increase represented by the second year's output, 12,000,
over the first year's output, 10,000. Subtracting 10,000 from 12,000 gives us the increase.
Divide the answer by 10,000 to calculate the increase relative to the first year. Then multiply by
100 to turn the answer into a percentage.
12,000 − 10,000 = 2,000 ;
2,000
∗
10,000
100 = 20%
So, output increased by 20 percent. As the number of workers stayed the same, this is also the
increase in productivity.
Question2: Calculate the percentage increase in productivity if the output expands from 12,000
in year 2 to 15,000 in year 3.
Answer:
Division of Labor and Productivity
The division of labor refers to the degree to which the various tasks involved in the
production of a good or service are divided among different workers.
Productivity increases when the division of labor increases. Increases in productivity can
be transmitted throughout the economy for several reasons:
● Productivity – Income
Increases in productivity can lead to higher incomes for an economy's citizens. All output
must be transformed, through the process of production and sale, into someone's income (e.g.
the boss's profits and the workers’ wages). Hence, increases in productivity, which allow more
output to be produced by a given amount of inputs, also lead to more income per head, that is,
greater wealth for society. For example, if more cars can be produced due to increases in the
productivity of car production, more cars are sold, which means that the car manufacturers’
revenues increase.
● Productivity – Cost of Production
8
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
If increases in wages are linked to increases in productivity, then workers’ wages may also
rise (or, at least, their employment prospects may be more secure). Second, increases in
productivity diffused throughout the economy have an effect on prices. Increases in productivity
tend to lower the cost of production, precisely because more output can be produced with the
same amount of inputs. Since cost reductions tend to be translated into price reductions,
increases in productivity eventually tend to reduce prices. Indeed, the introduction of assembly
lines made a substantial contribution to the affordability of consumer durables such as the car.
The increase in income per head and the reduction in prices allow consumers to be better off.
Prices and Industrial Change
How can we look at price changes over time in industries in which the product undergoes
many changes, especially in early stages? We use the concept of the price index. Indices are
used a lot in economics. They are basically a simple way of measuring change.
Price index is a measure of the average level of prices for some specified set of goods
and services, relative to the prices of a specified base period. The most widely used method of
constructing an index is based on the notion of the percentage. An example is provided below.
Suppose that the price of a product is Php 500 in 2000 and Php 750 in 2001 and Php
1000 in 2002. In this simple example, our market basket consists of only one product. Selecting
year 2000 as the base year, we can express the prices in years 2001 and 2002 relative to the
price in year 2000 as follows:
The price in year 2000 (base year) is equal to 100 percent
𝑃 750
𝑃 1000
𝑃𝑟𝑖𝑐𝑒 𝑖𝑛𝑑𝑒𝑥, 𝑦𝑒𝑎𝑟 2001 = (
) ∗ 100 = 150, 𝑦𝑒𝑎𝑟 2002 = (
) ∗ 100 = 200
𝑃 500
𝑃 500
Changes in Industry Structure
Industry structure refers mainly to the way in which power is distributed among firms. This
can be described by factors such as the number of firms in the industry and the distribution of
market shares.
Unit 02: Sustainability of Productivity
Objectives: By the end of this lesson, the student will be able to
1. discuss the impact of game changing technologies on work and employment,
2. summarize the concept of platform economy.
All economies fluctuate in a business cycle. For a few years, growth is quite rapid, output
and incomes rise, and unemployment falls. This is the ‘boom’. Then the cycle turns. Growth slows,
and in a true recession the total output of the economy falls. This is the down-turn of the cycle.
The industry life cycle focuses on those economic mechanisms that cause firms to be born (to
‘enter’ an industry), to grow, and to die (to ‘exit’ an industry).
Industry Life Cycle
The industry structure refers to the characteristics of an industry, such as the number of
firms operating in it, the distribution of power between them (whether some are very large and
others very small, or whether they are all very large), and the degree to which new firms find it
easy to enter the industry).
Mechanisms affecting industry structure include the dynamics of entry/exit, technological
change and falling prices. The industry life cycle is characterized by the following phases:
(examples are set in the year 2018 for reference)
1. A pre-market or hobbyist phase, in which the product is produced more as a hobby or
luxury than for commercial purposes. (e.g. self-driving electric cars)
9
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
2. An introductory phase, in which the product begins to be produced more for commercial
purposes than for hobby reasons. (e.g. self-driving cars)
3. A growth phase, in which the industry grows rapidly due to the emergence of a
standardized product. (e.g. electric cars - Tesla Model S)
4. A mature phase, in which demand slackens and fewer technological opportunities are
available. (e.g. ford focus car)
Game Changing Technologies
See Work-in-the-Digital-Age-1.pdf pages 133-140
● Advanced Industrial Robotics - Involves machines which are designed to perform
industrial tasks automatically, with high programmability and the capacity to interact with
their environment thanks to the use of digital sensors, usually seen in manufacturing or
production lines.
●
Additive Manufacturing - Involving digitally controlled devices to add layer on layer of
material(s) to create objects from 3D digital models. This is usually done in the industrial
sector such as architectural, medical, dental, aerospace, automotive, furniture and jewelry.
●
Industrial Internet of Things - the use of connected sensors attached to different objects
throughout the production process to feed live data to central computers, usually seen on
the factory floor.
10
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
●
Electric Vehicles - vehicles whose main system of propulsion depends on (externally
generated) electricity rather than fuel. (e.g. Tesla)
●
Industrial Biotech - the use of biological processes of living organisms for industrial
purposes, drawing on recent scientific insights such as systems genomics and
metabolomics. Uses enzymes and microorganisms to make bio-based products in sectors
such as chemicals, food ingredients, detergents, paper, textiles and biofuels.
Advanced Industrial Robotics, Additive Manufacturing and Industrial Internet of Things
involve innovations in the manufacturing production process, and have a very wide applicability
across most manufacturing sectors.
Electric Vehicles and Industrial Biotech concern innovations of specific products (and
related processes), and have a more narrow applicability to particular sectors
Effects of Game Changing Technologies
1. Increasing centrality of (digital) information – information as a key source value
2. Mass Customization – flexible production process with interconnecting objects
3. Servitization – technologies involve the gradual replacement of manufacturing as
traditionally understood by a type of economic activity that is closer to the traditional
concept of services
4. Increased Labor/Resource Efficiency – more efficient use of materials and energy in
production
Effects of Game Changing Technologies on Work and Employment
1. Upgrading of occupations
2. Higher level of ICT competence
3. Decline of repetitive and routine industrial work brought about by digital factories
11
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
While there are innumerable positives that can be drawn from these Game
Changing Technologies, it is imperative that we also take a look at the adverse
effects that these technologies cause.
Like many other things, there are always two sides of the story. On one end,
productivity numbers received a massive boost thanks to new technologies. On
the other end, there is a question of whether the same numbers are not telling the
whole story.
While new technologies, even new applications being downloaded, have made an
impact, some of them have caused other people to rely too much on technology
and not develop their own skills anymore. Technology, in some ways, has become
workers of our time instead of serving as a tool to help us.
Quite possibly, the worst effect of it is the accessibility of such technologies. With
only a fraction of the people in the world having the chance to know how to take
advantage of these new technologies, what happens to those who are not as
fortunate?
It matters that we look into all the effects of technology. It is only through looking
at the other side that we can actually discover how to improve what we currently
have and develop new technologies that would benefit everyone.
The Platform Economy
See Work-in-the-Digital-Age-1.pdf pages 163-174
A platform is a business that connects people through technology, making an ecosystem
that allows value to be created and exchanged. This works by matching users to each other in
order to make financial or social transactions that create value.
Platforms don’t own the resources that create value, they can grow much faster than
pipeline businesses. These businesses make up a platform-based economy. Some key features
of a platform will include:
●
●
●
●
Using sophisticated logistics software for matching and payment
Providers on the platforms are independent contractors
Very low barriers to entry for providers on most platforms
Trust is achieved via crowdsourcing of ratings and reputational data.
12
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Platform Model
The platform model shows three (03) components:
●
●
●
platform - controller of the channel or platform and arbiter of the participants in the platform
consumers/customers - buyers or users of the outputs offered through the platform
producers/providers - supplier of the outputs sold through the platform
References
●
●
NEUFEIND, M., RANFT, F., AND O’REILLY, J. (2018) Work in the Digital Age: Challenges
of the Fourth Industrial Revolution. Rowman & Littlefield International Ltd
The Open University (2016). Information Technology: a new era. Walton Hall, Milton
Keynes, MK7 6AA. https://www.open.edu/openlearn/people-politics-law/politics-policypeople/ sociology/information-technology-new-era/content-section-1
GRADED Activity 1
Part 1: Unit 1(10 pts)
1.
2.
3.
4.
5.
What do technologies look like when they are still being discovered?
How did the life of people change back then?
Are we going through a similar change right now?
What’s in store for the future?
Have we actually progressed as a result of the technologies that we have discovered
throughout time? Explain in 2-3 sentences.
Part 2: Unit 1(10 pts)
1. Which technology of the past do you think had the most impact in the way of life of people
today? Discuss in 3-5 sentences.
13
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
2. Did new technologies help in making humans more productive or have these caused a
decrease in the efficiency of work of people? Explain your answer in 3-5 sentences.
Part 3: Unit 2(15 pts)
What do you think is the way forward with the Game Changing Technologies that we
currently have? What are its flaws, and how can these be improved further? Explain your answer
in 8-10 sentences.
Part 4 (25 pts)
Take the Quiz on Lesson 02 Assessment
MODULE 2
Unit 3: Systems Analysis and Design
See video Lesson03InformationSystems.mp4
LESSON OBJECTIVES:
1. Discuss the impact of information technology on business strategy and success.
2. Define an information system and its components.
3. Explain how profiles and models can represent business functions and operations.
4. Explain how the Internet has affected business strategies and relationships.
5. Identify various types of information systems and explain who uses them.
Going over the technologies in the past and how it has evolved to the technologies we
have in the present gave us an idea of what is possible in the future. It is with the creativity and
ingenuity of us, human beings, that we are able to make sense of technological developments
and turn them into productivity boosting tools.
But technologies are not developed to match exactly what every person needs. After all,
each person has something different to do and to work on. It is thus important for these
technologies to be transformed into something that is geared towards making every person
productive despite the difference in their needs. Technologies are being specialized. So how
exactly does these technologies work?
14
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Companies use information as a weapon in the battle to increase productivity, deliver
quality products and services, maintain customer loyalty, and make sound decisions. Information
technology can mean the difference between success and failure. Information technology (IT) is
the application of a combination of hardware and software used to retrieve, store, transmit and
manipulate data, often in the context of a business or other enterprise.
Data are facts that are recorded and stored. Information is processed data used in decision
making. The value of information is the benefit produced by the information minus the cost of
producing it.
A System is a set of two or more interrelated components interacting to achieve a goal.
Information Systems
●
●
●
●
Set of interrelated components
Collect, process, store, and distribute information
Support decision making, coordination, and control
May also help analyze problems, visualize complex subjects and create new
products
Information System Components
●
●
Hardware – tangible aspect of a computer system
●
●
Data - is the raw material that an information system transforms into useful information
Software – programs and other operating information used by a computer (systems,
application, enterprise, horizontal system, vertical systems, legacy systems)
Processes - describes the tasks and business functions that users, managers, and IT staff
members perform to achieve specific results. Processes are the building blocks of an
information system because they represent actual day-to-day business operations.
15
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
●
People - those who have an interest in an information system are called stakeholders.
Stakeholders include the management group responsible for the system, the users
(sometimes called end users) inside and outside the company who will interact with the
system, and IT staff members, such as systems analysts, programmers, and network
administrators who develop and support the system.
Who develops Information Systems?
●
Traditionally, a company either developed its own information systems, called in-house
applications, or purchased systems called software packages from outside vendors.
●
Today, the choice is much more complex. Options include Internet-based application
services, outsourcing, custom solutions from IT consultants, and enterprise-wide software
strategies.
Systems Analysis and Design
Systems Analysis and Design is a step-by-step process for developing high-quality
information systems.
Systems Analyst plans, develops, and maintains information systems.
Business and Information Systems
With the different technological advancements, businesses have adopted newer
processes and have upgraded their business models
●
Brick-and-mortar - refers to a traditional street-side business that offers products and
services to its customers face-to-face in an office or store that the business owns or rents.
●
Click-and-mortar - Click and mortar is a type of business model that has both online and
offline operations, which typically include a website and a physical store.
●
Click - Click-only companies are those companies who have a website/online presence
without a physical store. They sell their products through their website only.
The Internet has drastically reduced the intermediaries within a transaction. Internet-based
commerce is called e-commerce (electronic commerce) or I-commerce (Internet commerce). The
E-commerce includes two main sectors: B2C (business-to-consumer) and B2B (business-tobusiness).
B2C (Business-to-Consumer)
●
Using the Internet, consumers can go online to purchase an enormous variety of products
and services. This new shopping environment allows customers to do research, compare
prices and features, check availability, arrange delivery, and choose payment methods in
a single convenient session.
B2B (Business-to-Business)
●
Business-to-business (B2B), also called B-to-B, is a form of transaction between
businesses, such as one involving a manufacturer and wholesaler, or a wholesaler and a
retailer.
16
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Business and Information Systems
In the past, IT managers divided systems into categories based on the user group the
system served. Categories and users included office systems (administrative staff), operational
systems (operational personnel), decision support systems (middle-managers and knowledge
workers), and executive information systems (top managers). Today, traditional labels no longer
apply. For example, all employees, including top managers, use office productivity systems.
Similarly, operational users often require decision support systems. As business changes,
information use also changes in most companies. Today, it makes more sense to identify a system
by its functions and features, rather than by its users.
Examples of Information Systems according to support provided
●
●
●
Inventory Control (TPS)
Reservations (TPS, MIS)
Customer Order Processing / Point-of-Sale (TPS)
17
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
●
●
●
●
●
●
Warranty Claim Processing (TPS)
Records Management (MIS)
Enrollment System (TPS)
Attendance Monitoring (MIS)
Payroll (TPS)
Queuing (TPS)
WHAT INFORMATION DO USERS NEED?
Corporate organizational structure has changed considerably in recent years. As part of
downsizing and business process reengineering, many companies reduced the number of
management levels and delegated responsibility to operational personnel. Although modern
organization charts tend to be flatter, an organizational hierarchy still exists in most companies.
A typical organizational model identifies business functions and organizational levels, as shown
in the figure below. Within the functional areas, operational personnel report to supervisors and
team leaders. The next level includes middle managers and knowledge workers, who, in turn,
report to top managers. In a corporate structure, the top managers report to a board of directors
elected by the company’s shareholders.
Top managers
●
Strategic plans
Middle Managers and Knowledge Workers
●
Middle managers provide direction, necessary resources, and performance feedback to
supervisors and team leaders
●
Knowledge workers include professional staff members such as systems analysts,
programmers, accountants, researchers, etc.
Supervisors and Team Leaders
●
Oversee operational employees and carry out day-to-day functions
18
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Operational Employees
●
Operational employees include users who rely on TP systems to enter and receive data
they need to perform their jobs.
ROLE IN THE PROJECT PROPOSAL
System Analyst
❏ A systems analyst investigates, analyzes, designs, develops, installs, evaluates, and
maintains a company’s information systems.
❏ On large projects, the analyst works as a member of an IT department team
❏ Smaller companies often use consultants to perform the work
SYSTEM DEVELOPMENT
System development is the process of defining, designing, testing and implementing a
software application.
A system development project includes a number of different phases, such as feasibility
analysis, requirements analysis, software design, software coding, testing and debugging,
installation and maintenance.
System Development Methods
Systems Development Life Cycle
❏ Predictive Approach
❏ Use of Process Models
❏ Process-centered technique
System Development Life Cycle(SDLC)
1.
2.
3.
4.
5.
Planning – Initial stage, conduct preliminary investigation
Analysis – assess the requirements needed and provide documentation
Design – identify all inputs, processes, and outputs
Implementation – proposed system is constructed, all entities have their own functions
Maintenance – verification of the implementation of proposed system
ROLES DEFINED
System Analyst
Responsibilities – Translate business requirements into practical IT projects to meet needs
Required Skills and Background – Solid communication skills and analytic ability
19
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Information Technology Department
The information technology (IT) department develops and maintains a company’s
information systems
The IT group provides technical support
Application Development
●
Team may include users, managers and IT Staff members
Systems Support and Security
● Deployment team
User Support
● Help desk or information center (IC)
Database Administration
● Database design, management, security, backup, and user access
Network Administration
● Includes hardware and software maintenance, support, and security
Web Support
●
Webmasters
Information Technology Department in Project Evaluation
Management leadership and information technology are linked closely, and remarkable
changes have occurred in both areas.
Today, systems development is much more team oriented.
Although team-oriented development is the norm, some companies see the role of the IT
department as a gatekeeper.
Importance of Project Management
Regardless of the development strategy, people, tasks, timetables, and expenses must
be managed effectively.
Complex projects can involve dozens of people, hundreds of tasks, and many thousands,
millions of money.
Systems Development Guidelines
● Stick to a plan
● Involve the users throughout the development process
● Listening is very important
● Use project management tools to identify tasks and milestones
● Remain flexible
● Develop accurate cost and benefit information
For a detailed discussion of the Introduction to Systems Analysis and Design, watch the following:
Lesson 03 Introduction to Systems Analysis and Design Part 1
Lesson 03 Introduction to Systems Analysis and Design Part 2
20
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Unit 4: Systems Development Life Cycle - Planning
This part of the module begins with the discussion of strategic planning. Systems
development typically starts with a systems request, followed by a preliminary investigation, which
includes a feasibility study. Discussions include how systems requests originate, how they are
evaluated, and how to conduct a preliminary investigation and feasibility study. Fact-finding
techniques will be discussed and will be carried over into later development phases. Finally an
examination of the report to management concludes the systems planning phase.
* Activities given in this unit will be related to your business case to help you manage your
business case. You may start doing Chapter 1 of your case if selection of the company is
done.
Lecture Objectives:
At the end of this module, you should be able to:
1. Explain the concept of a business case and how a business case affects an IT
project.
2. Describe the strategic planning process and why it is important to the IT team.
3. Explain the purpose of a mission statement.
4. Describe the SDLC, and explain how it serves as a framework for systems
development and business modeling.
5. Describe risks and risk management features.
6. List the reasons for information systems projects and the factors that affect
such projects.
7. Explain the initial review of systems requests and the role of the systems review
committee
8. Define operational feasibility, technical feasibility, economic feasibility, and
schedule feasibility
9. Describe the steps in a preliminary investigation and the end product of an
investigation
You can read through the notes, or you can open the presentation, Lesson 04
SDLCPlanning Lesson 04 SDLCPlanning with the same content.
Let us recall again the definition of Systems Development Life Cycle which is a
structured analysis that uses a series of phases: to plan, analyze, design, implement, and support
an information system. SDLC is a process-centered technique because it focuses on processes
that transform data into useful information.
SYSTEMS PLANNING
It is the initial stage in the systems development life cycle (SDLC). It is the fundamental
process of understanding why an information system should be built and determine how the
project team will go about building it. It describes how IT projects get started, how systems
21
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
analysts evaluate proposed projects, the feasibility of a project, and the reasoning behind the
proposed system development = business case. Strategic planning starts with a management
review called a SWOT analysis.
SWOT Analysis
It is a planning methodology that helps organizations build a strategic plan to meet goals,
improve operations and keep the business relevant. During SWOT analysis, organizations identify
strengths, weaknesses, opportunities and threats (the four factors SWOT stands for) pertaining
to organizational growth, products and services, business objectives and market competition.
The following are the main steps in performing a SWOT analysis:
1. Collect relevant information and list all current known strengths and weaknesses. This can be
achieved through talking to others in the organization or through larger brainstorming
sessions. You should come prepared with questions pertaining to the SWOT objective and
aim to get thoughtful and insightful responses from your team.
2. Consider all the potential opportunities that exist for the organization, including future trends
and technologies.
3. Review the SWOT matrix to build a plan that addresses each area including everything that’s
working and everything that needs to change.
Questions that needs to be answered:
❏ What are the internal strengths and weaknesses of your company?
❏ What are the external opportunities and threats in your industry and its environment?
❏ Can any weaknesses be converted to strengths? Any threats into opportunities?
❏ How can your company take advantage of strengths and opportunities?
❏ What strategic changes can your company implement as a result of the SWOT analysis?
22
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
SWOT analysis is applied early on in the planning, as soon as the objectives of the project
are clear. In its nature, SWOT is looking at both the internal and external factors that impact the
project and the sooner you can identify these, the sooner you can use them to your advantage.
Activities in the System Planning are:
A. Project Initiation (Project Identification)
B. Preliminary Investigation (Feasibility Analysis)
A. Project Initiation (Project Identification)
It begins when someone in an organization identifies that there is a need to improve an
existing system or a new system is needed to improve business operations. Most ideas come
from outside the IT department such as marketing accounting , and the like, as a form of system
request.
It can be divided into several sub-steps:
1. Reasons for Systems Projects
❏ Improved services
❏ Support for new products and services
❏ Better performance
❏ More information
❏ Reduced cost
❏ Stronger controls (encryption, biometrics)
2. Sources of System Projects
❏ Internal factors (strategic plans, higher management, client satisfaction, existing
systems and processes)
❏ A strategic plan that stresses technology tends to create a favorable climate for IT
projects that extends throughout the organization.
❏ Errors or problems in existing systems can trigger requests for systems projects.
❏ External factors (customers, competition, regulatory agencies, technology,
environment, suppliers)
❏ Changing technology is a major force affecting business and society in
general.
❏ Suppliers- Electronic data interchange. Just-in-time inventory systems.
❏ Information systems that interact with customers usually receive top
priority.
23
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
3. Systems Request
It documents the business reasons for building the system and the value that the
system is expected to provide.
It includes the following elements:
❏ Project sponsor. This is the person who initiated the project and who will
serve as the primary point of contact for the system on the business side.
❏ Business needs. It describes why the information system should be built,
in terms of business point of view, and explains to the approval committee
why the organization should fund the project.
❏ Functionality or Feature of the System. It should be described in a
concise language.
❏ Expected value. It describes the value to be gained from the system that
includes both tangible and intangible values.
Reasons for System Request
❏ Reduced cost. The current system is expensive to operate and maintain
as a result technical problems or the changing demands of the business.
❏ More information. The system might produce information that is
insufficient, incomplete, or unable to provide the company's changing
information needs. So, the business needs to keep track of some key
information that cannot be obtained from the current system.
❏ Better performance. The system might be old and hence slow to respond
to data inquiries, have limited flexibility, and unable to support company
growth. So, it needs to increase the system performance by combining
processes, integration of systems, and the like.
❏ Improved Services. It aimed to improve service to suppliers, customers,
or users within the company.
❏ Stronger Controls. A system may not have all security required by the
company for different users.
24
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Essential Question
1. Why does a systems analyst need to know about strategic planning?
Consider an old story about two stonecutters who were hard at work when a
passerby asked them what they were doing. “I am cutting stones,” said the first worker.
The second worker replied, “I am building a cathedral.” So it is with information technology:
One analyst might say, “I am using a CASE tool,” whereas another might say, “I am helping
the company succeed in a major new business venture.” Systems analysts should focus
on the larger, strategic role of IT as they carry out their day-to-day responsibilities.
2. Consider the interaction between time and costs when doing schedule feasibility. How and
why do you have to consider the cost when doing schedule feasibility?
B. Preliminary Investigation (Feasibility Analysis)
It is an inquiry to determine whether there is sufficient evidence for a system to be
proposed. An analyst from the IT department is assigned to perform the preliminary investigation
through feasibility study.
Feasibility Analysis
The process of confirming that a strategy, plan or design is possible and makes sense.
This can be used to validate assumptions, constraints, decisions, approaches and business
cases. Types of feasibility:
1. Schedule (time)
2. Operational (business)
3. Technical (technology)
4. Economic (monetary)
25
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
1.
Schedule Feasibility
The probability of a project to be completed within its scheduled time limits. If a project
has a high probability to be completed on-time, then its schedule feasibility is appraised as high.
This asks whether a project can be implemented in an acceptable frame. It aims to answer the
questions:
❏ What conditions must be satisfied during the development of the system?
❏ Will an accelerated schedule pose a risk? If so, are the risks acceptable?
May include the following methods or measurements:
❏ Project Estimation
❏ Gantt and PERT Chart
❏ CPM (Critical Path Method)
❏ Change Management
However, this module will focus on the Gantt chart only.
Gantt Chart
A Gantt chart is a timeline of a project. It is one of the most popular and useful ways of showing
activities (tasks or events) displayed against time. It is a horizontal bar chart that represents a set
of tasks that could show planned and actual progress on a project. The position of the bar shows
the planned starting and ending time of each task, and the length of the bar indicates its duration.
This allows you to see at a glance:
❏ What are the various activities?
❏ When each activity begins and ends?
❏ How long each activity is scheduled to last?
❏ Where activities overlap with other activities, and by how much?
❏ The start and end date of the whole project?
Example. In the daily project status Gantt chart below, Task 1 will take place from March 3 to 7
and then March 10 to 14. The due date is Thursday of that week. Each week is color coded.
26
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
2. Operational Feasibility
This is being done to gain an understanding of whether the proposed system will
likely solve the business problems, or take advantage of the opportunities or not.
Operational feasibility means that a proposed system will be used effectively after it has
been developed.
Areas to be assessed:
❏ Project Size – number of users
❏ IPO – inputs, processes, outputs
❏ Management support
❏ Environment assessment – are the users going to change
Questions that needs to be answered:
❏ Will the new system result in a workforce reduction?
❏ Will performance decline in any way?
❏ Will an overall gain to the organization outweigh individual losses?
❏ Will customers experience adverse effects in any way?
❏ Will any risk to the company’s image or goodwill result?
3. Technical Feasibility
Technical feasibility refers to technical resources needed to develop, purchase,
install, or operate the system. Includes evaluating the ability of computer hardware and
software to handle workloads adequately.
Questions to be answered:
❏ Does the company have the necessary hardware, software, and network
resources? If not, can those resources be acquired without difficulty?
❏ Does the company have the needed technical expertise? If not, can it be
acquired?
❏ Does the proposed platform have sufficient capacity for future needs? If
not, can it be expanded?
27
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
4. Economic Feasibility
Economic feasibility is a method for evaluating the effectiveness of a new system.
Its procedure is to determine the benefits and savings that are expected from a candidate
system and compare them with costs, called cost-benefit analysis.
Cost -Benefit Analysis
The purpose of a cost/benefit analysis is to answer questions such as:
1. Is the project justified (benefits outweigh costs)?
2. Can the project be done, within cost constraints?
3. What is the minimal cost to attain a certain system?
Types of Benefits
Benefits may be classified into one of the following categories:
a. Monetary -- when monetary values can be calculated;
b. Tangible (Quantified) -- measured in monetary terms or in tangible assets
(reduced costs, assets not spent on);
c. Intangible -- have significant impact on the company (time saved,
productivity, efficiency, data accuracy)
Types of Costs
1. Project-related costs
❏ Development and purchasing costs;
❏ Installation, training and conversion costs.
2. Operational costs (on-going)
❏ Maintenance: hardware, software, facilities
❏ Personnel: operation, maintenance.
3. For a small business that wants to introduce a PC-based information
system, these cost categories amount to:
❏ Project costs: purchase hardware, software, furniture; customize
software, train, install, file conversion
❏ On-going costs: operating the system (data entry, backups, helping
users, vendors etc.), maintenance (software) and user support,
hardware and software maintenance, supplies,...
Accounting Methods
The two techniques to measure the economic feasibility are the following:
1. Payback Analysis
It determines the amount of time required (usually in years) for an
investment to generate sufficient cash flows to recover initial cost.
a. Averaging Method - even cash inflow
Example 1. Eselyu Corp. is planning to implement a new system by
acquiring both new hardware and software packages. The cost of
investment is estimated to be at Php 400,000. Annual maintenance and
licensing costs are estimated to be at Php 35,000 but the estimated
annual benefits are at Php 115,000. How long would it take for Eselyu
28
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Corporation to recover their investment?
Solution:
Annual net cash inflow = 115,000−35,000 = Php 80,000.00
Payback period = 400,000/80,000=5 years
Meaning, it would take 5 years before Eselyu Corporation recovers its
investment. Hence, Eselyu Corp will start taking profits from its
investment after 5 years.
b. Subtraction Method - uneven cash inflow
Example 2. Eselyu Corp. is planning to implement a new system by
acquiring both new hardware and software packages. The cost of
investment is estimated to be at Php 400,000. Earnings from the
investment starts at Php 55,000 and increases by Php 30,000 every year.
When will Eselyu Corp. recover its investment?
Solution:
Payback Period is at 4 years. That is, it would take 4 years before Eselyu
Corp. recovers its investment. In other words, Eselyu Corp will start taking
profits from its investment after 4 years.
2. Return on Investment Analysis (ROI)
It is a percentage rate that measures profitability by comparing the total net
benefits received from a project to the total costs. It shows investors how efficiently
each dollar invested in a project is at producing a profit.
Where:
❏ Net profit should be determined through communication with the company
(Estimated sales/revenue –Operating Cost)
❏ Total Investment should be determined through the economic feasibility
Example 3. A company’s newly acquired information system cost them about
Php 1,250,000. At the end of the information system’s life cycle, the company
experienced a total revenue of Php 1,950,000. What is the return on investment?
Solution:
Net profit = Revenue − Cost
=1,950,000−1,250,000
Net Profit=PhP 700,000.00
Return on Investment (ROI) = (700,000/1,250,000)100%=56%
NOTE: Companies usually have a minimum ROI goal for a particular project. In
the feasibility stage of a project development, the expected ROI is identified. The
actual ROI can only be determined after the lapse of the use of the project when
29
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
approved for implementation. ROI’s are also used to compare which among two
proposed projects is more beneficial for the company.
Additional Example: ROI or Payback Period? (NewLeaf, 2012). Saving money is great, but if
you are not careful, it can be pretty easy to “go broke saving money.” Payback on an investment
is the amount of time it takes for you to save the amount of money you initially invested. Return
on Investment (ROI) is basically a ratio that tells you how profitable or beneficial an investment
is for you.
You may check the video to guide you on how to compute the return on investment and
payback period of a project to make sustainability investment decisions.: Lesson 04 Video 02
How To Calculate The Return on Investment (ROI) of Real Estate & Stocks.mp4
Steps in Preliminary Investigation
1. Understand the Problem or Opportunity
❏ Determine which departments, users, and business processes are involved.
❏ System requests in general do not reveal the underlying problem, but only
symptoms.
❏ A popular technique for investigating causes and effects is called a Fishbone
diagram.
You can watch a discussion about Fishbone diagram from: Lesson 04 Video 03 Fishbone
Diagram Explained with Example.mp4
Fishbone Diagram
A popular technique for investigating causes and effects is called a Ishikawa Diagram.
It is an analysis tool that represents the possible causes of a problem as a graphical outline.
When using a fishbone diagram, an analyst first states the problem and draws a main bone
with sub-bones that represent possible causes of the problem. An example of a fishbone
diagram is shown below.
Example of Fishbone Diagram
a. Before starting a fishbone diagram as part of any problem solving, the problem statement
must be well defined.
Problem Statement: Customer orders for custom mountain bikes are delivered 4 weeks
later than regular mountain bikes.
b. Once the problem statement has been defined, production, warehouse and supply chain
data relating to the product in question may be collected in this case to better identify
30
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
possible causes. This will make the process of checking the possible causes and theories
a lot easier.
c. The next step is to draw the fishbone diagram including the possible cause and the four
standard problem sources. The four possible sources are:
❏ Machinery and Equipment
❏ Materials
❏ Methods
❏ People
d. For each problem source, the user must brainstorm and think of possible causes and
hypotheses related to that source. The production and supply chain data collected in step
2 can be very helpful in this step.
e. For each of the causes identified, the same thought process is repeated as in step 4 to try
and identify the root cause of each cause. This process is similar to the 5 whys approach
of problem solving.
31
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
f.
Each possible root cause or hypothesis is checked for validity with support from
production, warehouse, and other data collected along the supply chain to verify its validity
or rule the possible cause are credible one. Once this process has been completed a
handful of possible causes will be proved valid. These should provide a focus area to
address in order to eliminate the problem, issue, or seize the opportunity named in the
problem statement.
2. Define the Project Scope and Constraints
❏ Determine the project scope means defining the specific boundaries of the project
❏ Define project scope by creating a list with sections called must do, should do,
could do, and won’t do
❏ Scope is the extent of what a project will produce (product scope) and the work
needed to produce it (project scope). A Guide to the Project Management Body of
Knowledge (PMBOK® Guide)—Fourth edition mentions it is the sum of the
products, services, and results produced in a project (Project Management
Institute, 2008, p. 440).
❏ Beware of scope creep. The PMBOK® Guide describes scope creep as “adding
features and functionality (project scope) without addressing the effects on time,
costs, and resources, or without customer approval” (PMI, 2008, p 440).
❏ A constraint is a requirement or condition that the system must satisfy or an
outcome that the system must achieved
❏ System constraints also define project scope
❏ when examining constraints, analyst should identify their characteristics:
❏ Present versus future
❏ Internal versus External
❏ Mandatory versus Desirable
❏ Regardless of the type, all constraints should be identified as early as
possible to avoid future problems and surprises.
32
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
3. Perform Fact-Finding
a. Analyze company’s processes and operations
b. Conduct Interviews
b.1 Determine the people to interview
b.2 Establish objectives for the interview
b.3 Develop interview questions
b.4 Prepare for the interview
b.5 Conduct the interview
b.6 Document the interview
b.7 Evaluate the interview
c. Review documentation
d. Observe
e. Survey
4. Evaluate Feasibility
Feasibility is evaluated from developer and customer's point of view. Developers
see whether they have the required technology or manpower to build the new system.
Is building the new system really going to benefit the customer.
❏ Does the customer have the required money to build that type of a system?
❏ All these issues are covered in the feasibility study of the system.
The feasibility of the system is evaluated on the four main issues: technical,
economical, and operational. Another issue in this regard is the legal feasibility of the
project.
❏ Schedule feasibility
❏ Technical feasibility
❏ Economic feasibility
❏ Operational feasibility
❏ Legal feasibility. It checks if there are any legal hassle in developing the
system.
33
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
5. Estimate Project Development Time and Cost
a. You should provide an estimate for the overall project, so managers can
understand the full cost impact and timetable
b. What information must you obtain, and how will you gather and analyze the
information?
c. What sources of information will you use, and what difficulties will you encounter
in obtaining information?
d. Will you conduct interviews? How many people will you interview, and how much
time will you need to meet with the people and summarize their responses?
e. Will you conduct a survey? Who will be involved? How much time will it take people
to complete it? How much time will it take to prepare it and tabulate the results?
f. How much will it cost to analyze the information gathered and to prepare a report
with findings and recommendations?
6. Present Results and Recommendations to the Management
a. The final task in the preliminary investigation is to prepare a report to management
b. The format of the preliminary investigation report varies from one company to
another
c. Follow the guidelines provided
Unit Summary
1. Systems planning is the first phase of the systems development life cycle
2. Effective information systems help an organization support its business process, carry out
its mission, and serve its stakeholders
3. Strategic planning allows a company to examine its purpose, vision, and values and
develops a mission statement, which leads to goals, objectives, day-to-day operations,
and business results that affect company stakeholders
4. Systems projects are initiated to improve performance, provide more information, reduce
costs, strengthen controls, or provide better service
5. Various internal and external factors affect systems projects
6. During the preliminary investigation, the analyst evaluates the systems request and
determines whether the project is from an operation, technical, economic, and schedule
standpoint
7. Analysts evaluate systems requests on the basis of their expected costs and benefits,
both tangible and intangible
8. The steps in the preliminary investigation are to understand the problem or opportunity;
define the project scope and constraints; perform fact-finding; estimate the project’s
benefits; estimate project development time and cost; and present results and
recommendations to management
9. The report must include an estimate of time, staffing requirements, costs, benefits, and
expected results for the next phase of the SDLC
Supplementary Videos
You might want to watch the following videos to supplement discussions in the notes. These
videos from Youtube discuss the concepts presented above.
●
●
●
https://www.youtube.com/watch?v=EwxHBuUmN3M&t=577s
https://www.youtube.com/watch?v=QJ6FApfNwiM&t=42s
https://www.youtube.com/watch?v=EwxHBuUmN3M&t=577s&fbclid=IwAR1mK11fEEQVK2I_LSwNIEnC5ks2_6r_g6hcFNpe8IOQoiv3qLeTZHfq6o
34
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Unit 05: Systems Development Life Cycle - Analysis
In this lesson, we describe requirements modeling techniques and team-based methods that
systems analysts use to visualize and document new systems. We also discuss system
requirements and fact-finding techniques, which include interviewing, documentation review,
observation, surveys and questionnaires, sampling, and research.
Objectives:
1. List and describe system requirements, including outputs, inputs, processes,
performance, and controls
2. Explain the importance of scalability in system design
3. Use fact-finding techniques, including interviews, documentation review, observation,
questionnaires, sampling, and research
4. Define total cost of ownership (TCO) and explain the concept
5. Conduct a successful interview
6. Develop effective documentation methods to use during systems development
Systems Analysis
⮚ The overall objective is to understand the proposed project, ensure that it will support
business requirements, and build a solid foundation for system development
⮚ You use models and other documentation tools to visualize and describe the proposed
system
⮚ You will also consider various development strategies for the new system, and plan for
the transition to systems design tasks
⮚ Deliverable for this phase is the system requirements document
35
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Systems Analysis Activities
The systems analysis phase consists of requirements modeling, and process modeling, object
modeling, and consideration of development strategies.
Watch the Lesson 05 Requirements.mp4 video.
Requirements Modeling
⮚ Describes requirements modeling, which involves fact-finding to describe the current
system and identification of the requirements for the new system. These requirements are:
o Inputs refer to necessary data that enters the system, either manually or in an
automated manner.
o Processes refer to system characteristics such as speed, volume, capacity,
availability, and reliability.
o Outputs refer to electronic or printed information produced by the system.
o Performance refers to the logical rules that are applied to transform the data into
meaningful information.
o Security refers to hardware, software, and procedural controls that safeguard and
protect the system and its data from internal or external threats.
Watch the IPO video: Lesson 05 Video 02 IPO.mp4
Example: Consider a TPS
A transaction process system (TPS) is an information processing system for business
transactions involving the collection, modification and retrieval of all transaction data.
36
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
The INPUT-PROCESS-OUTPUT (I-P-O):
Process and Security:
Systems Analysis Skills
o
o
Analytical skills enable you to identify a problem, evaluate the key elements, and develop
a useful solution.
Interpersonal skills are especially valuable to a systems analyst who must work with
people at all organizational levels, balance conflicting needs of users, and communicate
effectively.
Systems Analysis Techniques
o Joint Application Development (JAD)
▪ A group-based systems development where users are active participants in the
development process.
▪ A technique for fact-finding and requirements modeling.
▪ Developers use JAD whenever group input and interaction are desired.
▪ The output is a requirements model or a new information system that best
addresses the needs of a business.
Watch the video on JAD: Lesson 05 JAD.mp4
o
Rapid application development (RAD)
▪
▪
▪
▪
A team-based technique that speeds up information systems development and
produces a functioning information system.
Development where the stages of the SDLC is condensed into a single
development process.
Build while planning.
The output is a requirements model or a new information system that best
addresses the needs of a business.
37
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Watch the video on RAD: Lesson 05 RAD.mp4
Systems Analysis Modeling Tools and Techniques
Models help users, managers, and IT professionals understand the design of a system. Modeling
involves graphical methods and nontechnical language that represent the system at various
stages of development.
o
Functional Decomposition Diagrams (FDD)
▪
▪
▪
▪
A top-down representation of a function or process.
Using an FDD, an analyst can show business functions and breaks them down
into lower-level functions and processes.
Creating an FDD is similar to drawing an organization chart
Working from a functional decomposition diagram, analysts can create data flow
diagrams
Watch: Lesson 05 FDD.mp4 on FDDs
Example: FDD
o
Business Process Modeling (BPM)
▪ Describes one or more business processes
▪ During requirements modeling, analysts often create models that use a standard
language called business process modeling notation (BPMN).
▪ BPMN includes various shapes and symbols to represent events, processes, and
workflows.
o
Data Flow Diagram (DFD)
▪ Graphical representation of the flow of data in a business information system.
▪ A data flow diagram (DFD) uses various symbols to show how the system
transforms input data into useful information.
▪ DFD’s show what the system does, not how it does it.
▪ A DFD shows the boundaries of the system and how the system interfaces with
the outside world.
38
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Example: DFD
o
Unified Modeling Language (UML)
▪
▪
▪
A method of visualizing and documenting software systems design
Provides various graphical tools, such as use case diagrams and sequence
diagrams.
Represents the information system from a user's viewpoint.
❖ Use Case Diagram
●
●
Visually represents the interaction between users and the information
system.
In a use case diagram, the user becomes an actor, with a specific role
that describes how he or she interacts with the system.
❖ Sequence Diagram
●
●
Shows the timing of interactions between objects as they occur.
Use to show all possible outcomes, or focus on a single scenario.
Systems Analysis: Benefits, Costs, and Future Growth
o
Scalability
▪ A scalable system offers a better return on the initial investment
▪ To evaluate, you need information about projected future volume for all outputs,
inputs, and processes
o
Total Cost of Ownership (TCO)
▪ Important if the development team is evaluating several alternatives
▪ One problem is that cost estimates tend to understate indirect costs
▪ Rapid Economic Justification (REJ)
39
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
o
Fact-Finding Overview
▪
▪
▪
▪
o
The first step is to identify the information you need
Develop a fact-finding plan
Involves a series of questions: Who, What, Where, When, How, and Why?
Difference between asking what is being done and what could or should be done
The Zachman Framework
▪
▪
Zachman Framework for Enterprise Architecture
Helps managers and users understand the model and assures that overall
business goals translate into successful IT projects
Fact – Finding Techniques
o
An interview is a planned meeting during which you obtain information from another
person.
Interview Process:
1. Determine the people to interview.
2. Establish objectives for the interview.
3. Develop interview questions.
✔ Creating a standard list of interview questions helps to keep you on track and avoid
unnecessary tangents
✔ Avoid leading questions
●
Kinds of questions:
 Open-ended questions encourage spontaneous and unstructured
responses. These are useful when you want to understand a larger
40
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
process or draw out the interviewee's opinions, attitudes, or
suggestions.
 Closed-ended questions limit or restrict the response. Use closedended questions when you want information that is more specific or
when you need to verify facts.
 Range-of-response questions are closed-ended questions that ask
the person to evaluate something by providing limited answers to
specific responses or on a numeric scale. This method makes it easier
to tabulate the answers and interpret the results.
4. Prepare for the interview.
✔ Careful preparation is essential because interview is an important meeting and not
just a casual chat
✔ Limit the interview to no more than one hour
✔ Send a list of topics
✔ Ask the interviewee to have samples available
5. Develop a specific plan for the meeting
✔ Begin by introducing yourself, describing the project, and explaining interview
objectives
✔ Use engaged listening
✔ Allow the person enough time to think about the question
✔ After interview, summarize the session and seek a confirmation
6. Document the interview.
✔ Note taking should be kept to a minimum
✔ After the interview, record the information quickly
✔ After the interview, send memo expressing appreciation, including the main points
discussed so the interviewee has a written summary and can offer additions or
corrections
7. Evaluate the interview.
o
Observation
 Allows you to verify statements made in interviews and determine whether
procedures really operate as they are described.
 In this technique, you might discover that neither the system documentation
nor the interview statements are accurate
 Many types of research use human research subjects, and the Hawthorne
effect is an unavoidable bias that the researcher must try to take into account
when they analyze the results. The Hawthorne Effect is the tendency,
particularly in social experiments, for people to modify their behaviour because
they know they are being studied, and so to distort (usually unwittingly) the
research findings.
o
Document review
✔ A data collection method for evaluation
41
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
✔ Can help you understand how the current system is supposed to work.
✔ Includes a basic overview of documents and answers the following:
 when to use it
 how to plan and conduct it
 how it affects the system and the business processes
 its advantages and disadvantages
○
Questionnaires and Surveys
 A questionnaire, also called a survey, is a document containing a number of
standard questions that can be sent to many individuals.
 Questionnaires can be used to obtain information about a wide range of topics,
including workloads, reports received, volumes of transactions handled, job
duties, difficulties, and opinions of how the job could be performed better or more
efficiently.
 Can be Structured and Unstructured
 When designing a questionnaire, the most important rule of all is to make sure
that your questions collect the right data in a form that you can use to further your
fact-finding
 A questionnaire can be a traditional paper form, or you can create a fill-in form
and collect data on the Internet or a company intranet.
Ideas to keep in mind when designing your questionnaire:
✔ Keep the questionnaire brief and user-friendly.
✔ Provide clear instructions that will answer all anticipated questions.
✔ Arrange the questions in a logical order, going from simple to more complex
topics.
✔ Phrase questions to avoid misunderstandings; use simple terms and wording.
✔ Try not to lead the response or use questions that give clues to expected
answers.
✔ Limit the use of open-ended questions that are difficult to tabulate.
✔ Limit the use of questions that can raise concerns about job security or other
negative issues.
✔ Include a section at the end of the questionnaire for general comments.
✔ Test the questionnaire whenever possible on a small test group before
finalizing it and distributing to a large group
●
Sampling
 When studying an information system, you should collect examples of actual
documents using a process called sampling.
 Main objective of a sample is to ensure that it represents the overall population
accurately
 Sampling techniques include systematic sampling, stratified sampling, and
random sampling.
Example:
Suppose you have a list of 200 customers who complained about errors in their
statements, and you want to review a representative sample of 20 customers.
●
A systematic sample would select every tenth customer for review.
42
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
●
●
○
If you want to ensure that the sample is balanced geographically, however, you
could use a stratified sample to select five customers from each of four postal
codes.
A random sample selects any 20 customers
Research
 Your research can include the internet, IT magazines, and books to obtain
background information, technical material, and news about industry trends and
developments.
 You can attend professional meetings, seminars, and discussions with other IT
professionals, which can be very helpful in problem solving.
 Research also can involve a visit to a physical location, called a site visit, where
the objective is to observe a system in use at another location.
Interviews versus Questionnaires
o Interview
 A more familiar and personal than a questionnaire.
 During a face-to-face interview, you can react immediately to anything the
interviewee says.
 If surprising or confusing statements are made, you can pursue the topic with
additional questions.
 During a personal interview, you can watch for clues to help you determine if
responses are knowledgeable and unbiased.
 However, an interview is a costly and time-consuming process.
o
Questionnaire
 Gives many people the opportunity to provide input and suggestions.
 Questionnaire recipients can answer the questions at their convenience and do
not have to set aside a block of time for an interview.
 If the questionnaire allows anonymous responses, people might offer more candid
responses than they would in an interview.
o
Brainstorming
 This is another popular method of obtaining input, which refers to a small group
discussion of a specific problem, opportunity, or issue.
 This technique encourages new ideas, allows team participation, and enables
participants to build on each other's inputs and thoughts.
 Brainstorming can be structured or unstructured.
● In structured brainstorming, each participant speaks when it is his or her
turn, or passes.
● In unstructured brainstorming, anyone can speak at any time. At some
point, the results are recorded and made part of the fact-finding
documentation process.
Documentation
Keeping accurate records of interviews, facts, ideas, and observations is essential to successful
systems development.
o
The Need for Recording the Facts
✔ Record information as soon as you obtain it.
✔ Use the simplest recording method.
✔ Record your findings in such a way that they can be understood by someone else.
43
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
✔ Organize your documentation so related material is located easily.
o
Software Tools
o
▪ Software programs that are available to help you record and document information
Example:
1. Graphics modeling software: Microsoft Visio is a popular graphic
modeling tool that can produce a wide range of charts and diagrams.
2. Personal information managers
● A Personal Information Manager (PIM) such as Microsoft Outlook
includes a personal calendar, a to-do list with priorities and features.
Outlook can manage email and appointments, and supports
collaboration and team projects.
● Handheld computers
● Personal digital assistants (PDAs)
3. Wireless communication devices
4. CASE Tools
CASE stands for Computer Aided Software Engineering. It means
development and maintenance of software projects with help of various
automated software tools.
5. Productivity Software
This includes word processing, spreadsheet, database management,
presentation graphics, and collaboration software programs.
Flowchart
 A business flowchart shows the steps that make up a business process, along with
who's responsible for each step.
 They are useful for analyzing current processes, planning improvements, and
crystallizing communication between process participants
44
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Types of Flowchart:
●
Document
• Illustrates the flow of documents and information between areas of
responsibility within an organization.
• A document flowchart is particularly useful in analyzing the
adequacy of control procedures.
●
System
• System flowcharts depict the relationship among the input,
processing, and output of an AIS
●
Program
• A program flowchart describes the specific logic to perform a
process shown on a systems flowchart
Check the following videos for further discussion on the Flowcharting process.
● Lesson 05 FlowCharting.mp4
● Flowchart Tutorial (with Symbols, Guide and Examples)
Importance of the Systems Analysis phase
▪
The systems analysis phase includes three activities: requirements modeling, data and
process modeling, and consideration of development strategies
▪
The main objective is to understand the proposed project, ensure that it will support
business requirements, and build a solid foundation for the systems design phase
The conclusion of the requirements modeling allow systems developers to have a clear
understanding of the business processes and system requirements
▪
▪
▪
The next step is to model the logical design of the system
The fact-finding process includes interviewing, document review,
questionnaires, sampling, and research
▪
Systems analysts should carefully record and document factual information as it is
collected, and various software tools can help an analyst visualize and describe an
information system
observation,
Unit 06: Systems Analysis - Data Flow Diagrams
As mentioned from the previous lecture, system analysts and developers use
models to help visualize an organization’s information system. They often develop two
types of models of the proposed system, a logical model which shows what the system
must do, and a physical model which describes how the system will be constructed. We’ve
also learned that there are a number modeling tools and techniques available for the
development of such models. For this lecture, we’ll go for an in-depth exploration on one
the most commonly used modelling technique, Data Flow Diagrams. We’ll also explore
the use of process description tools, including structured English, decision tables, and
decision trees. And finally, we’ll describe the relationship between logical and physical
models.
45
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Data Flow Diagrams
A Data Flow Diagram, also known as DFD, shows how data moves through an
information system without showing any program logic or processing steps. In much
simpler terms, a DFD will describe what pieces of information (e.g. customer order,
student info) that are involved in a system are produced as well as taken by the different
entities (e.g. customer, student, other existing systems) that are also involved in said
system. Take note that a set of DFD provides a logical model that shows what an
information system does, and not how it does it.
Structure of a Data Flow Diagram
DFDs
are
typically
subdivided
into
successively lower levels depending on the amount
of detail the information system has. Essentially
speaking, the lower the level of the DFD, the more
amount of detail or specificity it has.
● Context Diagram
The highest level of DFD is called a Context
Diagram. As the name implies, it provides context as
to what the information system is all about. It shows
all the pieces of information coming in and out (inputs
and outputs respectively) of the system as well as the
different entities involved in the system, as shown in
the figure.
As you can see, the previous figure illustrates
the context diagram of a grading system of a certain school. Don’t worry about the figure
itself yet, we’ll discuss the different symbols used in the diagram later. But, from what you
can see and from the definition we have for context diagrams, you’re probably able to
infer how to read the diagram. For instance, the Student, Instructor and the Student
Records System are the entities involved from the Grading System. Also, if we’re going
to take a look at the student entity, we can infer that the student will give the submitted
work to the grading system, and in turn will get the graded work. The same is true for the
other entities. As a matter of fact, this and all the lower levels of a DFD are all read the
same. The main difference is that the context diagram will only and always have a single
process - which is the system itself (in this case, the grading system).
● Lower Level Diagrams
The lower level diagrams show all major activity steps on the system. Essentially,
it describes the process one level above it in more detail. For instance, a Level 0 diagram
is the exploded version of the context diagram. This means that the level 0 diagram
describes the lone process in the context diagram (i.e. the system itself), and shows us
what happens to the information coming in and out in a specific detail. Below is the level
0 diagram for the sample context diagram illustrated earlier.
46
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
As you can see, the process named grading system is no longer there, instead
there are now multiple processes (four, in fact) in this level. These processes are the
detailed steps of the grading system process. These are what essentially happen in a
grading system. A gradebook will be created, a student’s work will be graded, a final grade
for the student will be computed, and finally a grade report will be generated. If for
instance you want to explode a process in level 0, let’s say you want to describe what
happens in the produce grade report process, you’ll have to create another level diagram
called level 1. If you want to describe another process in level 1, you’ll create a level 2
diagram, and so on.
Data Flow Diagram Symbols
System analysts and developers often choose from two sets of symbols in
modeling a DFD. We have the Gane and Sarson symbol set and the Yourdon-Coad
symbol, the difference of which can be shown in the figure below. To avoid confusion, it
is advised to use only symbols from a single set.
47
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
As you may have noticed from the previous figures, DFDs have four types of
symbols. The first one is a box containing a meaningful and unique identifier/name,
which represents the external entities of the system. External entities refer to anything
or anyone that can be a source or destination of information which is outside of the
area of study. Examples of these are a student in a grading system, a customer in a
dining management system, and a dentist in an appointment reservation system. Other
terms for entities are terminators, source, and sink. Please take note that only those
entities which originate or receive data are represented on a business process diagram,
and external entities are not only limited to people.
The next symbol is a rounded box which represents a process. A process symbol
should contain the following descriptive elements:
● An identification number appears in the top part to show the process
number.
● A descriptive title is placed in the center of the box. This should be a
simple imperative sentence with a specific verb, for example 'maintain
customer records' or 'find driver'.
A process, also referred to as black box, shows a transformation or manipulation
of data flows within the system. It contains the business logic, also called business rules.
It receives input data and produces output that has a different content, form, or both. A
submitted graded work from a student will be graded (through the grade student work
process) which will produce the student’s grade to be written in the gradebook, as well as
the graded work to be returned to the student (Refer to the Level 0 Diagram above for an
illustration).
The next one is the data store - represented by a long rectangle with a missing
side and a box opposite of it, as shown below.
A data store refers to the holding place for information within the system. Data
stores may be long-term files such as sales ledgers, file cabinets, and databases, or may
be short-term accumulations: for example batches of documents that are waiting to be
processed. Each data store should be given a reference followed by an arbitrary number
written inside the smaller box (e.g. D1, D2, D3, etc).
The last symbol used in DFDs are lines that connect all the previous symbols
together. This represents the actual flow of data in the system. It shows the flow of
information from its source to its destination. A data flow is represented by a line, with
arrowheads showing the direction of flow. For instance, going back to the previous
example, the submitted work data comes from the student entity to the grade student
work process. Since we’re referring to actual data, data flow names must be a noun or in
noun format.
There are rules that are to be followed when connecting data flows. The figure
below shows all the legal connections for entities.
48
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
The following are useful materials in creating and understanding Data Flow Diagrams:




DFD Naming Convention – how to name data flows, processes, entities and data stores
Lecture 06 DFD – explanation of Module 6, Data Flow Diagrams
Decomposition Diagram and Context Diagram – how to construct a Decomposition
Diagram and a Context Diagram
Level 0 Diagram – how to construct a Level 0 Diagram from a Decomposition and a
Context Diagram
For processes, the following are all the legal data flow connections.
49
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
And here’s all the legal data flow connections with data stores.
In essence, entity and data store symbols should not be connected to other similar
symbols without a process between them. Any data coming to an entity or a data store
should come from a process symbol, and in similar terms, any data coming from an entity
or a data store should go to a process symbol. We’ll look into the common mistakes more
in the following section.
Common DFD Mistakes
Most system developers and analysts, even some professionals, often commit
mistakes when drawing their DFD. In this section, we’ll identify the common DFD mistakes
in hopes that you’ll avoid them when creating your own. The following are things you’d
want to keep in mind when drawing a DFD.
● Illegal Data Flows
○ An external entity cannot provide data to another external entity without a
process (Entity-to-Entity).
○ Data cannot move directly from an external entity to a data store without
being processed (Entity-to-Data Store).
○ Data cannot move directly from a data store to an external entity without
being processed (Data Store-to-Entity).
○ Data cannot move directly from one data store to another without being
processed (Data Store-to-Data Store).
● Black Hole - This refers to process symbols that have input data flows but
doesn’t have any output data flow(s).
● Miracle/Spontaneous Generation - This refers to process symbols that have
output data flows but doesn’t have any input data flow(s).
● Grey Hole - This refers to process symbols where the input data flows aren’t
enough to produce the output data flow. Identifying this problem requires a
proper knowledge on the business process.
● Identical names for data flows, data-store, processes, and entities.
50
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
The figure below shows a sample DFD diagram containing common DFD
mistakes. It’s best to avoid these mistakes when creating your own DFD.
The next figure is your cheat sheet for identifying legal and illegal data flows.
51
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
You can watch the video of professor Kapil Shukla explaining the common
mistakes in creating DFD’s as well as the best way to avoid them. Lecture 6 - DFD
Common Mistakes .mp4
You should also keep track of the proper use of symbols and identifiers in your
diagram, and finally you should maintain the balance between your diagrams as
discussed in the following section.
DFD Creation
System analysts and developers usually follow a three-step rule in developing a
set of DFDs:
1. Draw a context diagram,
2. Draw a level 0 diagram, and
3. Draw the lower-level diagrams (If applicable).
In the first step of DFD creation, Identify all the external entities in your system, as
well as the data needed by said entities from the system, and the data produced by the
entities. There is only one process symbol in the context diagram, and that is the name
of the system itself. The number zero (0) is used to identify this process.
In developing the level 0 diagram, all the processes are numbered from 1 to N,
with N being the total number of processes in the diagram. Do take note of the functional
primitivity of your processes as well. Functional primitives refer to the lowest levels of
DFD and can no longer be exploded or decomposed to lower level diagrams. If you can
identify processes that can still be decomposed, then proceed to create the appropriate
lower level diagram.
52
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
When drawing the lower level diagrams (level 1, level 2, and so on), please keep
in mind the proper naming of the identifiers of your processes. If the parent process has
the number one (1) as its identifier, the identifiers of the child processes should be the
parent identifier, followed by a period and an arbitrary number (e.g. 1.1, 1.2, 1.3, etc.), as
shown in the next figure.
If for instance you’re to create another DFD level from the figure above (say,
process 1.1, the level 2 diagram should contain processes that have 1.1.1, 1.1.2, 1.1.3,
etc., as their identifiers. Also, keep in mind that when creating lower level diagrams, you
have to consider its balance. The input and output data flows of the parent DFD should
be maintained on the child DFD.
The following video provides a deeper explanation as well as a demonstration on
how to create a level 0 diagram: Lecture 6 - DFD Diagram 0.mp4 You can watch the video
53
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
until the 3:32 mark of the video, as the succeeding parts are no longer necessary for this
topic. However, you can still choose to watch its entirety if you want to learn how to create
a DFD using CASE tools.
Process Description Tools
Process Description, as the name implies, documents the details of a functional
primitive, and represents a specific set of processing steps and business logic. System
analysts and developers often choose from several approaches when developing a
process description:
● Modular Design - which is based on combinations of three logical structures
(also known as control structures), which serve as building blocks for the
process,
● Structured English - is derived from structured programming language which
gives more understandable and precise description of process. It is based on
procedural logic that uses construction and imperative sentences designed to
perform operation for action.
○ It is best used when sequences and loops in a program must be considered
and the problem needs sequences of actions with decisions.
○ It does not have strict syntax rules. It expresses all logic in terms of
sequential decision structures and iterations.
For example, see the following sequence of actions:
● Decision Tables – which are logical structures that shows every combination
of conditions and outcomes, and
● Decision Trees – which are graphical representations of the conditions,
actions, and rules found in a decision table.
54
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Logical and Physical Models
While structured analysis tools are used to develop a logical model for a new
information system, such tools also can be used to develop physical models of an
information system. A physical model shows how the system’s requirements are
implemented.
Sequence of Models
Many systems analysts create a physical model of the current system and then
develop a logical model of the current system before tackling a logical model of the new
system. Performing that extra step allows them to understand the current system better.
Four-Model Approach
This approach is widely used by many systems analysts and developers when
creating an information system. As the name implies, the analysts first develop a physical
model of the current system, next a logical model of the current system, then a logical
model of the new system, and finally, a physical model of the new system. The only
disadvantage of the four-model approach is the added time and cost.
Unit 07: Systems Development Strategies
The main objective of the systems analysis phase is to build a logical model of the
new information system. Let us evaluate the different alternative solutions, preparation
of the system requirements document, and presentation of the system requirements
document to the management.
Watch the entire video: Lesson7Video1SystemDevelopmentStrategy.mp4
Development Strategies Overview
Selecting the best development path is an important decision that requires
companies to consider three key topics.
1. The impact of the Internet
2. Software outsourcing options
3. In-house software development alternatives
The Impact of the Internet
(Lesson7Video2SoftwareAsSAService.mp4, watch entire video)
Software as a Service
✔ A model of software deployment where an application is hosted as a service
provided to customers over the Internet. SaaS reduces the customer's need for
software maintenance, operation, and support
55
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
✔ The Software and Information Industry Association (SIIA) believes that the concept
of software as a service is redefining the way that companies develop and deploy
their information systems
Watch the entire video: Lesson7Video3TraditionalVsWebSystems.mp4
Traditional vs Web-based Systems Development
✔ Traditional development
o System design is influenced by compatibility issues
o Systems are designed to run on local and wide-area company networks
o Web-based features are treated as enhancements rather than core elements of
the design
o Systems are developed and delivered in an Internet-based framework such as
.NET or WebSphere
o Internet-based development treats the Web as the platform, rather than just a
communication channel
o Web-based software usually requires additional layers, called middleware
✔ WebSphere
✔ Microsoft’s .NET
✔ Many firms rely on traditional systems
Software Outsourcing Options
(Lesson7Video4Outsourcing.mp4, watch the entire video)
Outsourcing
The transfer of information systems development, operation, or maintenance to an
outside firm that provides these services, for a fee, on a temporary or long-term basis
Outsourcing can refer to relatively minor programming tasks, renting software from
a service provider, outsourcing a basic business process (often called business process
outsourcing, or BPO), or handling a company's entire IT function
 The Growth of Outsourcing
✔ Traditionally, firms outsourced IT tasks as a way of controlling costs and dealing with
rapid technological change
✔ Outsourcing has become part of an overall IT strategy for many organizations
✔A firm that offers outsourcing solutions is called a service provider
✔Application service providers (ASP)
✔Internet business services (IBS)
◦ Also called managed hosting

Outsourcing Fees
56
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
✔ A fixed fee model uses a set fee based on a specified level of service and user
support
✔ A subscription model has a variable fee based on the number of users or
workstations that have access to the application
✔ A usage model or transaction model charges a variable fee based on the volume of
transactions or operations performed by the application
 Outsourcing Issues and Concerns
✔ Mission-critical IT systems should be out-sourced only if the result is a costattractive, reliable, business solution that fits the company’s long-term business
strategy
✔ Outsourcing also can affect day-to-day company operations and can raise some
concerns
✔A company must review carefully issues relating to insurance, potential liability,
licensing and information ownership, warranties, and disaster recovery
✔ Mergers and acquisitions also can affect outsourcing clients
✔ Outsourcing can be especially attractive to a company whose volume fluctuates
widely, such as a defense contractor

Offshore Outsourcing
✔ also known as global outsourcing
✔ Practice of shifting IT development, support, and operations to other countries
In-House Software Development Options
Make or Buy Decision
✔ The choice between developing versus purchasing software often is called a make
or buy, or build or buy decision
✔ The company’s IT department makes, builds, and develops in-house software
✔ A software package is obtained from a vendor or application service provider
✔ Software vendors – companies that develop software for sale
✔ Value-added reseller (VAR) – a firm that enhances a commercial package by adding
custom features and configuring it for a particular industry
57
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
✔ Horizontal application – available for every type of activity, separate divisions
✔ Vertical application – for a specific type of business
Software Development Options
IN-HOUSE DEVELOPMENT
Satisfy unique business requirements
PURCHASING A SOFTWARE
PACKAGE
Lower costs
Minimize changes in business procedures Requires less time to implement
and policies
Proven reliability and performance
benchmarks
Meet constraints of existing systems
Meet constraints of existing technology
Requires less technical development staff
Develop internal resources and
capabilities
Future upgrades provided by the vendor
Obtain input from other companies
Customizing a Software Package
1. You can purchase a basic package that vendors will customize to suit your needs
2.
You can negotiate directly with the software vendor to make enhancements to
meet your needs by paying for the changes
3.
You can purchase the package and make your own modifications, if this is
permissible under the terms of the software license
Creating User Applications
(Lesson7Video5SystemDevelopmentStrategiesCont.mp4 watch until 1:35)
✔ User application
✔ User interface
✔ Help desk or information center (IC)
✔ Screen generators
✔ Report generators
✔ Read-only properties

Role of the System Analyst
When selecting hardware and software, part of the evaluation and selection team.
✔ Eliminate system alternatives that will not work.
✔ Rank the system alternatives that will work.
✔ Present the viable alternatives to management for a final decision.
58
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
The Software Acquisition Process
Watch the video: Lesson7Video5SystemDevelopmentStrategiesCont.mp4 (from
5:41 until 16:34)
1. Evaluate the Information System Requirements
2. Identify Potential Vendors or Outsourcing Options
3. Evaluate the Alternatives
4. Perform Cost-Benefit Analysis
5. Prepare a Recommendation
6. Implement the Solution
1. Evaluate the Information System Requirements
 Identify key features
 Prepare a request for proposal or quotation
✔ Request for proposal
✔ Evaluation model
✔ Request for quotation
2. Identify Potential Vendors or Outsourcing Options
 Potential use of the Internet
 Work with a consulting firm
 Source from the Internet bulletin board systems that contain thousands of forums,
called newsgroup
3. Evaluate the Alternatives
 Existing users
 Application testing
 Benchmarking
4. Perform Cost-Benefit Analysis
 Purchase software = software license
5. Prepare a Recommendation
 Recommendation that evaluates and describes the alternatives, together with the
costs, benefits, advantages, and disadvantages of each option
 Document each step and deliver a presentation
6. Implement the Solution
 Implementation tasks will depend on the solution selected
 Before the new software becomes operational, you must complete all
implementation steps, including loading, configuring, and testing the software; training
users; and converting data files to the new system’s format
Completion of Systems Analysis Tasks


System Requirements Document
Presentation to Management
59
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
✔ Implement an outsourcing alternative
✔ Develop an in-house system
✔ Purchase or customize a software package
✔ Perform additional systems analysis work
✔ Stop all further work
Unit 08: Systems Development Life Cycle - Design
Systems Design is the third of five phases in the systems development life cycle (SDLC).
Now you are ready to begin the physical design of the system that will meet the specifications
described in the system requirements document. Systems design tasks include output and user
interface design, data design, and system architecture.
A video by Johnny Khoury has explained how the Design Phase in SDLC (Lesson08
video01 Design Phase in SDLC) works. It is all about the design phase of creating a system.
System Design Guidelines:
The systems analyst must understand the logical design of the system before beginning
the physical design of any one component
• Data design
• User interface
• Architecture
• System design specification
System Design Objectives
• The goal of systems design is to build a system that is effective, reliable, and maintainable
• A system is reliable if it adequately handles errors
• A system is maintainable if it is well designed, flexible, and developed with future modifications
in mind
•User Considerations
❏ Carefully consider any point where users receive output from, or provide input to,
the system
❏ Anticipate future needs of the users, the system, and the organization – hardcoded
❏ Provide flexibility
❏ Parameter, default
• Data Considerations
❏ Data should be entered into the system where and when it occurs because delays
cause data errors
❏ Data should be verified when it is entered, to catch errors immediately
❏ Automated methods of data entry should be used whenever possible
60
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
•Data Considerations
❏ Audit trail
❏ Every instance of entry and change to data should be logged
❏ Data should be entered into a system only once
❏ Data duplication should be avoided
•Design Trade-Offs
❏ Most design trade-off decisions that you will face come down to the basic conflict
of quality versus cost
❏ Avoid decisions that achieve short-term savings but might mean higher costs later
Prototyping
The method by which a prototype is developed. It involves a repetitive sequence of
analysis, design, modeling, and testing. It is a common technique that can be used to design
anything from a new home to a computer network.
Prototyping Methods




System prototyping - produces a full-featured, working model of the information system.
Because the model is “on track” for implementation, it is especially important to obtain user
feedback, and to be sure that the prototype meets all requirements of users and management.
Design prototyping or Throwaway prototyping – method of development that employs
technical mechanisms for reducing risk in a project, when the project needs are vaguely and
poorly laid out. The end product of design prototyping is a user-approved model that
documents and benchmarks the features of the finished system.
Prototyping offers many benefits
Users and systems developers can avoid misunderstandings
Managers can evaluate a working model more effectively than a paper specification
Consider potential problems
The rapid pace of development can create quality problems
In very complex systems, the prototype becomes unwieldy and difficult to manage
Prototyping Tools – systems analysts can use powerful tools to develop prototypes
• CASE tools - Computer-aided systems engineering (CASE), also called computer-aided
software engineering, is a technique that uses powerful software, called CASE tool, to
help systems analysts develop and maintain information systems.
• Application generators -A tool that supports the rapid development of computer programs
by translating a logical model directly into code. Also called a code generator.
• Report generators - a computer program whose purpose is to take data from a source
such as a database, XML stream or a spreadsheet, and use it to produce a document in
a format which satisfies a particular human readership
• Screen generators - or form painter, is an interactive tool that helps you design a custom
interface, create screens forms, and handle data entry format and procedures.
Limitations of Prototypes
❏ A prototype is a functioning system, but it is less efficient than a fully developed system
❏ Systems developers can upgrade the prototype into the final information system by adding
the necessary capability. Otherwise, the prototype is discarded
Future Trends in Software Development
61
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Many software development tools and technologies are in transition
• Web services
• Open source software
• Service-oriented architecture (SOA)
• Loose coupling
• Software quality is more important than ever
Here are some links on how to create prototypes:
Create interactive prototypes with MS PowerPoint
Pencil Project | Free UI Mockup Design Software
Prototyping Tool for Mobile and Websites
Build a WIX Website For FREE in 10 Minutes
User Interface
Describes how users interact with a computer system, and consists of all the hardware,
software, screens, menus, functions, output, and features that affect two-way communications
between the user and the computer.
Graphical User Interface - uses visual objects and techniques that allow users to communicate
effectively with the system.
Usability – user satisfaction, support for business functions, and system effectiveness
❏ Process-control systems – allow users to send commands to the system
❏ User-centered systems – how users communicate with the information system, and how
the system supports the firm’s business operations
User interface requires the understanding of human-computer interactions and user-centered
design principles.
Human-Computer Interaction describes the relationship between computers and people who use
them to perform their jobs
•Electronic health records (EHRs)
Seven Habits of Successful Interface Designers:
1.Understand the Business
The interface designer must understand the underlying business functions and how the
system supports individual, departmental, and enterprise goals. The overall objective is to design
an interface that helps users to perform their jobs.
2.Maximize Graphical Effectiveness
Studies show that people learn better visually. The immense popularity of Apple’s iOS and
Microsoft Windows is largely the result of their GUIs that are easy to learn and use. A welldesigned interface can help users learn a new system rapidly and be more productive.
3.Think Like a User
The designer must learn to think like a user and see the system through a user’s eyes.
The interface should use terms and metaphors that are familiar to users. Users are likely to have
real-world experience with many other machines and devices that provide feedback, such as
62
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
automobiles, ATMs, and microwave ovens. Based on that experience, users will expect useful,
understandable feedback from a computer system.
4.Use Models and Prototypes
From a user’s viewpoint, the interface is the most critical part of the system design
because it is where he or she interacts with the system — perhaps for many hours each day. It is
essential to construct models and prototypes for user approval. An interface designer should
obtain as much feedback as possible, as early as possible.
5.Focus on Usability
The user interface should include all tasks, commands, and communications between
users and the information system. The opening screen should show the main option. Each screen
option leads to another screen, with more options.
6.Invite Feedback
Even after the system is operational, it is important to monitor system usage and solicit
user suggestions. The analyst can determine if system features are being used as intended by
observing and surveying users.
7.Document Everything
All screen designs should be documented for later use by programmers.
User Interface Elements
When designing your interface, try to be consistent and predictable in your choice of
interface elements. Whether they are aware of it or not, users have become familiar with elements
acting in a certain way, so choosing to adopt those elements when appropriate will help with task
completion, efficiency, and satisfaction.
User Interface Input Controls:
63
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
A video by TutorialsPoint has stated the right use of some of these input Controllers. See the
video for more information. Lesson08 video02 UI Controls.
A Handbook for User Interface Design
Rule 01: Create an interface that is easy to learn and use
64
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Rule 02: Enhance user productivity
❏ Consider a natural language feature that allows users to type commands or requests in
normal text phrases (Help)
❏ Group functions
❏ Alphabetize menu lists
❏ Provide shortcuts
Rule 03: Provide users with help and feedback
Rule 04: Create an attractive layout and design
❏ Use appropriate colors
❏ Use hyperlinks that allow users to navigate to related topics
❏ Be consistent with the terminologies
65
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Rule 05: Enhance the Interface
❏
❏
❏
❏
❏
❏
❏
❏
❏
❏
switchboard
command button
menu bars
toolbar
dialog box
toggle button
list boxes
scroll bar
option button
radio button
Rule 06: Focus on data entry screens
66
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Rule 07: Use validation rules
❏
❏
❏
❏
❏
❏
❏
❏
sequence check
existence check
data type check
range check
reasonableness check
validity check
combination check
batch controls
Rule 08: Reduce Input Volume
❏
❏
❏
❏
input necessary data only
do not input data that the user can retrieve from system files or calculate from other data
do not input constant data
use codes
There are other rules in making a proper user interface that were not listed. A video by Elegant
Themes has stated 10 Rules of Good UI Design to Follow (Lesson08 video03 Good UI Design to
Follow.mp4). This video answers the question ‘What makes a User Interface Good’.
In addition to that, there are also common mistakes made by some designers. A video by Visme
has stated the Most Common Design Mistakes (Lesson08 video04 Most Common Design
Mistakes.mp4) that are made by Non-Designers.
Source Document and Form Design
The quality of the output is only as good as the quality of the input
• Garbage in, Garbage out (GIGO)
• source document – collects input data, triggers or authorizes an input action, and
provides a record of the original transaction
• form layout – how the form will appear and how easy it will be to complete
Form Design
●
heading zone – contains the company name/logo and the details of the form
●
control zone – contains codes, identification information, numbers, and dates that are
used for storing completed forms
●
body zone – main part of the form
●
totals zone
●
authorization zone – contains required signatures
67
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Input Design
Input technology has changed dramatically in recent years.
The quality of the output is only as good as the quality of the input.
●
●
●
Garbage in, garbage out (GIGO)
Data capture
Data entry
○ process of transcribing information into an electronic medium such as a computer
or other electronic device
Input and Data Entry Methods
●
●
●
Batch input
○ Batch
Online input
○ Online data entry
○ Source data automation
○ RFID tags or Magnetic data strips
○ POS, ATMs
Tradeoffs
○ Unless source data automation is used, manual data entry is slower and more
expensive than batch input because it is performed at the time the transaction
occurs and often done when computer demand is at its highest
○ The decision to use batch or online input depends on business requirements
Input Volume
Guidelines that will help reduce input volume
●
Input necessary data only
68
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
●
●
●
Do not input data that the user can retrieve from system files or calculate from other data
Do not input constant data
Use codes
Designing Data Entry Screens
●
Most effective method of online data entry is form filling
Guidelines that will help you design data entry screens
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
Restrict user access to screen locations where data is entered
Provide a descriptive caption for ever field, and show the user where to enter the data and
the required or maximum field size
Display a sample format if a user must enter values in a field in a specific format - separator
Require an ending keystroke for every field
Do not require users to type leading zeroes for numeric fields
Do not require users to type trailing zeroes for numbers that include decimals
Design the screen form layout to match the layout of the source document
Allow users to add, change, delete, and view records
Provide a method to allow users to search for specific information
Provide a way to leave the data entry screen at any time without entering the current
record
Provide users with an opportunity to confirm the accuracy of input data before entering it
Provide a means for users to move among fields on the form
Display default values so operators can press the ENTER key to accept the suggested
value
Use a default value when a field value will be constant for successive records or
throughout the data entry session
Display a list of acceptable values for fields, and provide meaningful error messages
Input Errors
●
●
Reducing the number of input errors improves data quality
A data validation check improves input quality by testing the data and rejecting any entry
that fails to meet specified conditions
* At least eight types of data validation checks
●
●
●
●
●
●
●
●
●
●
Field check – character type
Sign check – arithmetic sign
Limit check
Range check – low and high
Size check – within field
Completeness check
Validity check
Check digit verification – computed from input value to catch typo error
Prompting – input requested by the system
Close-loop verification - Uses input data to retrieve and display related data
Source Documents
●
●
Information should flow on a form from left to right and top to bottom to match the way
users read documents naturally
A major challenge of Web-based form design is that most people read and interact
differently with on-screen information compared to paper forms
69
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
●
●
Dr. Jakob Nielson believes that users scan a page, picking out individual words and
sentences
As a result, Web designers must use scan-enabled text to capture and hold a user’s
attention
Input Control
●
●
●
●
●
Every piece of information should be traceable back to the input data
Audit trail
Data security
Records retention policy
Encrypted – encryption
Output Design
Types of Output
●
●
●
●
●
Internet-based information delivery
E-mail
Blogs
Instant messaging
Wireless devices
●
●
●
●
●
Digital audio, images, and video
Podcasts
Automated facsimile systems
Computer Output to Microfilm
Computer Output to Digital Media
Output Design (Printed and Screen Output)
Reports
●
●
Detail reports, exception reports, summary reports
User Involvement in Report Design – design in advance, mock-ups
Report Design Principles
✓ Printed reports must be attractive, professional, and easy to read
✓ Report headers and footers
✓ Page headers and footers
✓ Column heading alignment
✓ Column spacing
✓ Field order
✓ Grouping detail lines
Report Design Issues
✓ Good design standards produce reports that are uniform and consistent
✓ When a system produces multiple reports, each report should share common design
elements
✓ After a report design is approved, you should document the design in a report analysis
form
Designing Character-Based Reports
✓ Many systems still produce one or more character-based reports
✓ When report designers create or modify a character-based report, they use a traditional
tool that still works well, called a printer spacing chart
Printing Volume and Time Requirements
● Length calculations
● Time calculations
○ Ppm (pages per minute)
○ Line printers often use greenbar paper
70
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Output Control and Security
✓ Output must be accurate, complete, current, and secure
✓ The IT department is responsible for output control and security measures
✓ Many companies have installed diskless workstations
For more information on Input and Output Design: Lesson08 video05 Input Output
Mechanisms.mp4
GRADED Activity 2
Part 1: Unit 3(10 pts)
1. What use does the internet have for you? Explain in 3-5 sentences.
2. If you have a phone, a laptop, or any similar kinds of technology, which 2 apps or softwares
do you use often to be more productive? Explain in no more than 3 sentences each how
you think these apps or softwares work and what makes them useful for you.
Part 2: Unit 3 (15 pts)
1. Information is commonly referred to as processed data, data being the raw material. The
key factor here is that data needs to undergo certain processes before it becomes
information. With this in mind, give 5 examples of data being transformed into information.
Present your work in a creative and concise output that organizes the data, the process it
will undergo, and the resulting information.
2. Think of any business around you (your bank, convenience store, etc.) and identify ways
on how you think they can be more productive. Explain in 3-5 sentences.
Part 3: Unit 3 (5 pts)
1. Computers perform many jobs that previously were performed by people. Will computerbased transactions and expanded e-commerce eventually replace person to-person
contact? From a customer’s point of view, is this better? Why or why not?
2. What types of information systems might a large company use?
Part 4: Unit 4 (10 pts)
Solve the following problem applying the method used in the video uploaded in your powerpoint
presentation. You may check: Lesson 04 Video 01 Payback period
Problem. Assume the following cash flow for 2 projects. Assuming that the cash flows are
occurring at the end of the year. Find the payback period for both these projects.
Year
Project 1
Project 2
0
1
2
-1000
600
400
-1000
100
400
71
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
3
4
5
200
200
100
600
600
700
Solution:
Part 5: Unit 5 (15 pts)
Content marketing can be a very hectic mess unless you organize it into clear business
processes. Consider the following process:
The content writer takes up & finishes the first draft of an article. Includes
descriptions of any custom images that are to be used in the article
The marketer gathers influencer contact information, to be used for advertising
and marketing once the article is done
The editor proof-reads the article, makes points on grammar, style, spelling, etc.
The designer creates custom images as asked, sending them over to the content
writer
The writer takes the comments into consideration, fixes any mistakes, and adds
the images to the article
The SEO expert makes sure that the article meets the right optimization bestpractices & publishes the article
The marketer uses a combination of advertising & email outreach to make sure
that the article is read.
Activity: Construct the business process diagram and apply the flowcharting process
discussed.
Note: This example is taken from: https://tallyfy.com/business-process/
Do the above activity using Word or write it in a short bond paper
Part 6: Unit 8 (10 pts)
Open and answer the Lesson-08-Assessment
GRADED Activity: Midterm Examination
72
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
References
 https://explorable.com/hawthorne-effect
 https://methods.sagepub.com/book/key-concepts-in-social-research/n22.xml
 https://online.visual-paradigm.com/diagrams/tutorials/use-case-diagram-tutorial/
 https://sites.google.com/site/2012itcs371devsec3fuzzysystem3/3
 https://www.investopedia.com/terms/c/click_and_mortar.asp
 https://www.mbaskool.com/business-concepts/marketing-and-strategy-terms/2587-clickonly-companies.html
 https://www.sciencedirect.com/topics/computer-science/sequence-diagram
 https://www.slideshare.net/fajarbaskoro/systems-request
 https://www.tutorialspoint.com/software_engineering/case_tools_overview.htm
 https://www.visualparadigm.com/support/documents/vpuserguide/2821/286/7114_drawingbusin.html
 https://www.youtube.com/watch?v=DMPxxijmG7M&fbclid=IwAR0hx6Uo4PSlgqmMmAO
eX4e_R6mq0s4nMw-iwcXUOiixRkvkHeWxK8UTQj8
 https://www.youtube.com/watch?v=rAR5sbaphwU&fbclid=IwAR3EXVa8Rag6iV8zFswXc
FhRFOB_FaiEa7QD6QMukGoyaiQ6cRLH30xiCtY
 McCombes, S. (2020, January 13). How to Do a Case Study: Examples and Methods.
Retrieved June 7, 2020, from https://www.scribbr.com/methodology/case-study/
 NewLeaf. (2012). ROI or Payback Period? Retrieved June 7, 2020, from https://newleafllc.com/2012/08/roi-or-payback-period/
 Requirements Modeling. Part 1 https://www.youtube.com/watch?v=2t0ichoFHG8 Part
2 https://www.youtube.com/watch?v=1u5KQh_B1_U
 ROSENBLATT, H. (2014) Systems Analysis and Design, 10th edition. Shelly Cashman
Series. Cengage Learning
 Top five causes of scope creep ... and what to do about them. A Guide to the Project
Management
Body
of
Knowledge
(PMBOK®
Guide)—Fourth
edition
https://www.pmi.org/learning/library/top-five-causes-scope-creep-6675
Final Requirement: Business Case
The details of the Business Case is found in GIT-BUSINESS-CASE ASSIGNMENT-GUIDEFinal Requirement.pdf and RESEARCH DOCUMENT FOR GIT BUSINESS CASE.pdf
73
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
MODULE 3
With the internet being the center for acquiring information nowadays, and more and more
systems being developed to suit the needs of different businesses, all of which make use of the
internet as a medium for marketing and operations, there is a question of how the security of
everyone is maintained. Having a singular tool used as a platform by different business and
individuals alike has definitely made it easier for everyone to communicate and do transactions.
But it has also made it easier for others to exploit the vulnerability of persons who are not
knowledgeable about the risks of using the internet.
To start with this module, take some time to reflect on the following questions:
1.
2.
3.
4.
Have you ever felt that your security is compromised while using the internet?
Do you think you have done something that might have been illegal?
Have you ever searched anything in Google and used it as part of one of your outputs?
Have you created anything that was used by someone else without your consent
Explore Activity
1. Search for an example of an apparent cybercrime. From this example, give your thoughts on
how you think that could have been prevented.
2. Downloading files through the internet is rampant, whether legal or not. An example of which
is downloading of movies, TV series, or animes via a torrent client. Currently, this is an illegal
act, but authorities have little resources to stop this completely. Do you think this kind of activity
must be stopped, or do you think this is something that must be accepted as legal?
74
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Unit 09: Cybercrime Laws
Study the presentation named GIT Lecture 9 - Cybercrime Laws in the Philippines.pptx
Cybercrime Prevention Act of 2012. The State recognizes the vital role of information and
communications industries such as content production, telecommunications, broadcasting
electronic commerce, and data processing, in the nation’s overall social and economic
development. The State also recognizes the importance of providing an environment conducive
to the development, acceleration, and rational application and exploitation of information and
communications technology (ICT) to attain free, easy, and intelligible access to exchange and/or
delivery of information; and the need to protect and safeguard the integrity of computer, computer
and communications systems, networks, and databases, and the confidentiality, integrity, and
availability of information and data stored therein, from all forms of misuse, abuse, and illegal
access by making punishable under the law such conduct or conducts. In this light, the State shall
adopt sufficient powers to effectively prevent and combat such offenses by facilitating their
detection, investigation, and prosecution at both the domestic and international levels, and by
providing arrangements for fast and reliable international cooperation.
Unit 10: Computer and Data Privacy
Study the presentation named GIT_Lecture 10 Computer and Data Privacy.ppsx
Data Privacy Act of 2012 is the policy of the State to protect the fundamental human right
of privacy, of communication while ensuring free flow of information to promote innovation and
growth. The State recognizes the vital role of information and communications technology in
nation-building and its inherent obligation to ensure that personal information in information and
communications systems in the government and in the private sector are secured and protected.
Unit 11: Copyright Laws
Study the presentation named GIT Lecture 11 Copyright Laws.pptx
75
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
What are considered copyrightable works in the Philippines?
Under Philippine law, original intellectual creations in the literary and artistic domain are
copyrightable. These include books, pamphlets, articles and other writings; periodicals and
newspapers; lectures, sermons, addresses, dissertations prepared for oral delivery; letters;
dramatic or dramatico-musical compositions; choreographic works or entertainment in dumb
shows; musical compositions; drawing, painting, architecture, sculpture, engraving, lithography;
models or designs for works of art; original ornamental designs or models for articles of
manufacture; illustrations, maps, plans, sketches, charts and three-dimensional works relative to
geography, topography, architecture or science; drawings or plastic works of a scientific or
technical character; photographic works including works produced by a process analogous to
photography; lantern slides; audiovisual works and cinematographic works and works produced
by a process analogous to cinematography or any process for making audio-visual recordings;
pictorial illustrations and advertisements and computer programs.
Derivative works are also protected as new works, provided that it does not affect the
existing copyright on original works. Derivative works may include: dramatizations, translations,
adaptations, abridgements, arrangements, and other alterations of literary music work; collections
of literary, scholarly or artistic works, and compilations of data and other materials which are
original by reason of the selection or coordination or arrangement of their contents.
What works are not protected by copyright under Philippine law?
Copyright protection does not cover:
1. Idea, procedure, system method or operation, concept, principle, discovery or mere data
as such, even if they are expressed, explained, illustrated or embodied in a work;
2. News of the day and other miscellaneous facts having the character of mere items of
press information;
3. Official text of a legislative, administrative or legal nature, as well as any official
translation thereof;
4. Work of the Philippine Government, unless there was a prior approval by the appropriate
government agency; and
5. Statutes, rules and regulations, and speeches, lectures, sermons, addresses, and
dissertations, pronounced, read or rendered in courts of justice, before administrative
agencies, in deliberative assemblies and in meetings of public character.
76
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Laws are created to protect the rights and safety of the general public. Unfortunately, the
same laws that are supposed to protect people can also be used to inflict harm on the very
same people they are supposed to protect. Such is the reason why the cybercrime law, RA
10175, was controversial. Some people argued that the law can be used to curtail the rights
of people by threatening them of sanctions. Some people fear that certain parts of the law
can be misinterpreted and thus be used against innocent people. Others see the penalties
as too harsh, while there are those who question the practicality of the law.
GRADED Activity: Final Examination
Exam on Cybercrime Laws, Computer and Data Privacy and Copyright Laws.
References:
•
•
•
•
•
Course notes - Atty Marco Polo E. Cunanan. Public Attorney II, PAO San Fernando (P)
District. Lecturer, Tarlac State University School of Law
Federis & Associates Intellectual Property Firm. (2013). What is Copyright? Retrieved
from FEDERIS Intellectual Property Law: http://www.federislaw.com.ph/faqsresources/copyright/
Lawphil.net and Chanrobles.com
Republic Act No. 10173. (2012). Retrieved from Official
https://www.officialgazette.gov.ph/2012/08/15/republic-act-no-10173/
Gazette:
Republic Act No. 10175. (2012). Retrieved from Official Gazette:
https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/
77
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Appendix
Unit 01 Question2: Calculate the percentage increase in productivity if the output
expands from 12,000 in year 2 to 15,000 in year 3.
Answer:
Take the output in year 3 which is 15,000 and subtract it with the output in year 2 which is
12,000 to get the increase from year 2 to year 3.
15,000-12,000 = 3,000
Then divide it from the output from year 2 which is 12,000 then multiply it by 100 to get the
increase by percentage
3,000/12,000 (100) = 25%
The increase in productivity of output from year 2 to year 3 is 25%
78
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Download