Uploaded by noviarahma586

Scott Tilley, 2020, Systems Analysis and Design, Cengage-USA. (ST) CH 2

advertisement
Chapter 2 Analyzing the Business Case
Analyzing the
Business Case
Chapter 2 explains how to analyze a business case.This
chapter also explains why it is Important to understand
business operations and requirements, how IT projects
support a company's overall strategic plan, how systems
projects get started, and how systems analysts conduct
a feasibility study and perform preliminary investigations, which concludes with a report to management.
Fact-finding techniques that begin at this point and carry
over into later development phases are also described.
The chapter includes three "Case in Point"
discussion questions to help contextualize the concepts
described in the text. The "Question of Ethics" asks the
systems analyst to consider the Implications of granting
preferential treatment to a system enhancement
request when the request originates with a friend of the
project's manager.
LEARNING OB ECTIVES
Wl1e11 you fi11isb this d1apter, you s/Jould be able
to:
CONTENTS
I . Describe the strategic planning process.
2. Conduct a SWOT analysis.
3. Explam how cools can support strategic
planning.
4. Explain the concept of a business case.
5. Summarize the ~ix main rea~ons for systems
requests.
6. Describe the two factors affecting systems
projects.
7. Explain how systems requests are processed.
8. Explain how systems request feasibility is
assessed.
2. 1 Strategic Planning
Case in Point 2. 1: Pets for Rent
2.2 Strategic Planning Tools
2 .3 The Business Case
2 .4 Systems Requests
2 .5 Factors Affecting Systems Projects
2 .6 Processing Systems Reque~cs
Case in Point 2.2: Actaway Airlines, Part One
2 .7 Assessing Request Feasibility
2 .8 Setting Priorities
Case in Point 2.3: Arra way Airlines, Parr Two
2 .9 The Preliminary Investigation
A Question of Ethics
2 . 10 Summary
Key Term~
Exercises
9. Explain how systems requests arc prioritized.
I 0. Conduct a preliminary invesrigarion.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,...... 111>_... ........ _ .. ~ ........................._ .... ._
Phase I
Systems Planning
2.1 Strategic Planning
2 I
45
STRATEGIC PLANNING
Strategic planning is the process of identifying long-term organizational goals, strategies, and resources. A strategic plan looks beyond day-to-day activities and focuses on
a horizon that is three, five, ten, or more years in the forure. The IT ream must deliver
IT resources ro support the firm's long-term strategic goals. Therefore, IT managers
and systems analysts must understand and participate in strategic planning acriviries.
IT managers ha\'e ro prepare for long-range needs, such as a new darn warehouse,
even as they handle immediate problems, such as a logic bug in the payroll system. In
mosr companies, the IT ream reviews each IT-rela ted proposal, project, and systems
request ro determine if it presents a strong business case, or justification.
T he following sections provide an overview o f strategic planning, a description of
SWOT analysis, and a look at the role of the IT d epartment.
2. 1. 1 Strate gic Planning Ove rview
Strategic plan ning starts with a missio n ~tatemen t that reflects rhe firm's vision, purpose, and v:ilues. Mission statements usually focus o n lo ng-term cha llenges and goa ls,
the importance of the firm's stakeholders, :rn d a commitment to the fi rm's ro le as a
corporate citizen. For example, Google's mission statement posted on their website is
stated succinctly as," ... to organize the world's information and make it universally
accessible and useful."
\Vi ch the mission statement as a backdrop, a f'irm develops short-ter m goals and
objectives. For example, the company might establish one-year, three-year, and fiveyear goals for expanding market share. To achieve those goals, the company might
develop a list of shorter-term objecrives. lf it wants to increase online orders by
30% next year, a company might sec quarterly objectives with monthly milestones.
High-priority objectives arc called crirical success factors. A critical success facto r is
one that must be achie\'ed to fulfill the company's mission.
Objccti\•cs also might include tactical plans, such as creating a new website and
training a special customer support group to answer email inquiries. Finally, the objectives translate into day-to-day business operations, supported by IT and other corporate
resources. The outcome is a sec of business resulcs thar affect company stakeholders.
Pets for Rent is an innovative company that brings puppies to corporate meetings.
The company's CEO says that having puppies in a room with employees in an informal setting
helps break down communication barriers and fosters. a greater sense of teamwork and comradery. Since this is a new company, the CEO has asked you if a mission statement is necessary.
After you review the chapter material, write a brief memo with your views. Be sure to include
good (and not-so-good) examples of actual mission statements that you find on the web.
2. 1.2 SWOT Analysis
The letters SWOT stand for st rengths, weaknesses, opportunities, and threats. A SWOT a na lysis can focus
on a specific product or project, an operating division, the entire company, or the mission statement itself.
The overall aim is to avoid seeking goals that are unrealistic, unprofitable, or unachievable.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
.. ~ ........................._ .... ._
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _
Chapter 2 Analyzing the Business Case
2.1 Strategic Planning
46
An enterprise SWOT analysis us ually begins with these questions:
•
•
•
•
What are our strengths, and how can we use them to achieve our business goals?
What are our weaknesses, and how can we reduce or eliminate chem?
\'Qhac arc our opportunities, aod how do we plan ro rake advanragc of them?
\'Qhat are our threats, and ho\V can we assess, manage, and respond m the possible risks?
STRENGTHS
A SWOT analysis examines a
firm's technical, human, and financial resources. In Figure 2-1, the
butlered lists show samples of rypical
strengths, wca kncsscs, opportu nities,
and threats for an organization considering cxp:tnding their web-based
online operations.
As the SWOT process conrinues, management reviews specific
resources, business operations, and
valm1blc assets. For example, suppose
rhat the company owns an imporranr
patent. A SWOT review for rhe parent
might resemble Figure 2-2.
There is no srandard approach to
WEAKNESSES
• Excellent web design staff
• low systems analyst
• Still using 58\/eral legacy
systems
• Budget Increase was turned
down
• Documentation needs updaUng
turnover
• Recently upgraded notwork
THREATS
OPPORTUNmES
• Well-pos1Uoned for expansion
• Can be first with new
software
• High potenbal tor B2B
growth
• Aggressiv e new web
competition
• Impact ol new FCC rules
strategic planning. Some managers
• Other firms oller bener
benefits
believe that a firm's mi sion sratement !.hould contain an inspirational
message to its stakeholders. Others
feel that unless a firm starts with a
FIGURE 2 - 1 A SWOT analysis might produce l"e$Ults similar to those
realistic SWOT assessment, ic might
shown here.
develop a mission statement that is
unachievable. Most companies view
the strategic planning process as a dynamic iorcraction, where the company's mission
statement reflects a long-term horizon, but sets forch goals that arc achievable and
consistent with real-world conditions.
2. 1.3 The Ro le of the IT De partme nt
A systems analyst should be interested in strategic planning because it reflects a
higher level of involvement in supporring the direcrion of rhe project. For example,
while working on rhe same project, one analyst might say, "I am using a CASE cool,"
while another might say, "I am helping the company succeed in a major new business
venture." Systems ana lysts should focus on the larger, strategic role of the IT department even as they carry out their day-to-da y technical tasks.
Experienced analysts know that planning is essentia l for IT project success, and it
must srarr as early as possible. Ca reful planning can help assure chat:
• The proiect supports overall business strategy and operarional needs.
• The project scope is well defined and clearly stated.
• The project goals are realistic, achievable, and tied ro specific statements,
assumptions, constraints, factors, and other inpucs.
(....,..... J:gi( . . . . .
I_,.. 4111.,.. .................,.t11ru
-Woip-M ._..,..
..
r..a...w...,..._...., ..
~- )U,
..,...,.......,..~
-·~•-fllllie<'f•,...
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
__.~~c.....,..~
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I
Systems Planning
47
2.3 The Business Case
SWOT Analysis of a Corporate Patent
During the planning process, management and IT should be closely linked. In
the past, a typical IT department handled
Strengths
Weaknesses
all aspects of systems development and
• Our patent has a hmrted Me
• Our patent covers valuable
consulted uc;er~ only when, and if, the
Whetl 11 expires. the technology
technology that we can use in
depamnent wanted user input. Today,
will no longer be prot8C1ed
popular products
systems development 1c; much more
team-onenred. New approaches to systems
Patent
development, such as agile methods,
typically involve groups of users, managers,
Opportunities
Threats
and IT staff working together right from
• We can use the technology on
• A compehtor might develop
the start of the project.
more products, license 11 to
similar technology thal does
Although ream-oriented development
others, or seek more patents.
not legally lnfnnge our patent.
is the norm, some companies still sec the
role of the IT department as a gatekeeper,
responsible for screening and evaluating
FIGURE 2-2 This SWOT analysis example focuses on a specific asset: a
systems requests. Should the IT department
company patent.
perform the initial evaluation, or shouJd
a cross-functional team do it? The answer
probably depends on rhc company's size, the nature of the system request, and the
scale of the project. For example, in smaller companies or firms where only one person has IT skills, that person acts as a coordinator and consults closely with users and
managers to evaluate systems requests. Larger firms are more likely to use an cvaluarion team or a srsrems review committee.
22
STqATEGIC PLAl'INING TOOLS
Irrespective of the development strategy used, many organizations still rely on the IT
group to provide guidance when it comes to selecting tools to support strategic planning activities. Some analyses srick to tradicional text-based methods, using tvl icrosofc
\'(lord rabies, to pro,•ide srrucrure and clarity. Ochers prefer a spreadsheet, such as
t..1icrosoft Excel, because it is easy to display prioriries and the relative importance of
planning assumptions.
A more sophisticated approach is co use a CASE tool to define and document the
overall environment. Such tools can integrate various statements, entities, data elemencs, and graphical models into an overall structure. The result is more consistency,
better quality, and much less effort for the system analyst. Figure 2-3 shows a cloudbased road mapping software product from Aha! chat provides inccgraced support for
product scracegy visioning and strategy develop1nent.
There arc other strategic planning "cools" that are not CASE tools, bur more techniques that ore sometimes supported by software programs. For example, mind maps,
balanced scorecards, and gap analysis are all valuable techniques thac can be parr of strategic planning in an organizarion. An imporrant role for the systems ana lyst is to know
when each of these rools and cechniques can best be used in particular project conwxcs.
2.3
THE BUSINESS CASE
During the systems planning phase, the IT ream reviews a request co determine if
it presents a strong businesc; case. The term business case refers co the reasons, or
.........""_.. ... .-.................
_..__
("..,_...,llll!O( ...... . . - - . .\) ....... ~
...................
--......
"->-"'Allf'W ~- ...............,.. o-....._ ...... _ ... ,..,...,...,~..,._.. .............. ~..
__....
~~·~---- ···---~~-.,.-"~
...........
Chapter 2 Analyzing the Business Case
2.3 The Business Case
48
Ahal - - _, -
_,, .....
- -0
-
Strategy first
-
- -
.. ...,............. .,,... ... .......... I"'
....
· -~--
-
....-.;,~
-=---
·- - .--
••• • •
=
-
-..
--
. ._..,_,
............
_.,.
..........
.,_, ..
,_
...,., -"«.,...
.,............,..........
c.....
~
FIGURE 2-l Aha! provides Integrated support for product strategy visioning.
·~• .&.1\. 1
,_
jusrificarion, for a proposal. To perform rhe review, the analysr muse consider rhe
company's overall mission, objectives, and IT needs.
A business case shouJd be comprehensive yet easy to understand. It should
describe rhe project clearly, provide the juscificarioa to proceed, and estimate the project's financial impact. SpecificaUy, che business case should answer questions such as
the following:
•
Why are we doing this project?
•
What is the project about?
•
How docs this solution address key business issues?
•
•
I low much will it cost and how long will it rake?
Will we suffer a productivity loss during the transition?
•
What is the return
•
What arc the risks of doing rhe project? What are the risks of nor doing the
projccr?
•
How will we measure success?
•
What alternatives exist?
OJl
investment and payback period?
Examples of business cases, borh good and bad, can be found on line. Just search
for "sample business case" and examine the structure and content of some of rhe samples available. It is particularly instructive to compare and contrast business cases for
different areas, such as chose for go\•emmenr contracts versus private enterprises.
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U,
..,...,.......,..~
r..a...w...,..._...., ..
-Woip-M ._..,.. -·~•-fllllie<'f•,...
.................,.t11ru ..
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
__.~~c.....,..~
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I
Systems Planning
49
2.4 Systems Requests
2.4
SYSTEMS REQUESTS
Stronger
The starting point for most information
systems projects is called a systems request,
which is a formal way of asking for IT
support. A srsrems requesr might propose
enhancements for an existing system, the
correction of problems, the replacemenr
of an older sy rem, or rhe developmenr of
an enrirel)• new informarion sysrem char is
needed ro support a company's cur renr and
future busine s need .
As Figure 2-4 shows, rhe six main reasons
for ~ystems request are stronger controls,
reduced cost, more information, bener performance, improved service to customers, and
more support for new produces and services.
STRONGER CONTROLS: A system must
Controls
Reduced
Cos1
More
Suppo<1
Systems
Request
Improved
Service
t/
More
_J
I
lnlormatt~
Better
Performance
J
FIGURE 2-4 Six main reasons for systems requests.
have effective controls to ensure that data
is secure and accurate. This is becoming
increasingly important given the number
of darn breaches that seem to occur on a
daily ba!.i . ome common securiry con-
trols include passwords, various levels
of user acces~, and encryption, or coding
data to keep it safe from unauthorized
users. l lardware-based security conrrols
include biometric devices that can identify
a person by a retina scan or b>• mapping
a fingerprint pattern. The technology uses
infrared scanners that create images with
thousands of measurements of personal
physical characteristics, as shown in
Figure 2-5, which displays Apple's Face ID
security mechanism on the iPhonc.
In addition to being secure, data also
must be accurate. Controls ~hou ld minimize data entry errors whenever possible.
For example, if a user enters an invalid
FIGURE 2-5 Apple Face ID uses advanced machine leamirig co recognize users.
customer number, the order processing
system should reject the entry immediately and prompt the user to enter a valid
number. Darn entry controls must be effective without being excessive. If a !.)'Stem
requires users to confirm every item with an "Are you sure? YIN" message, internal
users and customers might complain that the system is not user-friendly.
REDUCED COST: The current system could be expensive ro operate or maintain
as a result of rechnical problems, design weaknesses, or the changing demands of che
busine s. Ir might be possible to adapr the system co newer technology or upgrade
it. On the other hand, cost-benefit analysis might show that a new system would be
more cost effective and provide bener supporr for long-term objectives.
.........""_.. ... .-.................
_..__
("..,_...,llll!O( ...... . . - - . .\) ....... ~
...................
--......
"->-"'Allf'W ~- ...............,.. o-....._ ...... _ ... ,..,...,...,~..,._.. .............. ~..
__....
~~·~---- ···---~~-.,.-"~
...........
Chapter 2 Analyzing the Business Case
so
2.5 Factors Affecting Systems Projects
MORE INFORMATION: The syscem mighc produce informacion char is insuf-
ficienc, incomple re, or unable ro supporc the company's changing informarion
needs. For example, a syscem chat tracks customer orders mighr nor be capable of
analy1.1ng and predicring marketing rrends. In the face of intense compericion and
rapid product development cycles, managers need the best po~s1ble informacion
to make major decisions on planning, designing, and marketing new products and
services.
BETTER PERFORMANCE: The current system mjght not meec performance require-
mencs. For example, ic n1ighc respond slowly co data inquiries at certain times, or it
mighc be unable co support company growth. Performance limicarions also result
when a system that was designed for a specific hardware configuration becomes
obsolete when new hardware is introduced.
IMPROVED SERVICE: Systems requests often are aimed ac improving service ro cus-
tomers or users within the company. For instance, allowing mutual fund investors ro
check their acco unt balances on a website, storing data on rental car customer preferences, or creating an online college registration system arc all examples of providing
valuable services and increased cusromer satisfaction.
MORE SUPPORT FOR NEW PRODUCTS AND SERVICES: New products and
services often require new types or levels of IT supporc. For example, a sofrware
vendor might offer an a utomacic upgrade service for subscribers; or a package delivery company might add a special service for RFID-tagged shipment!>. In situations like
rhe!>e, it is most likely that addjtional IT support will be required. At the other end of
the speetrum, product obsolescence can also be an important factor in IT planning. As
new products enter the marketplace, vendors often announce that they will no longer
provide support for older versions. A lack of vendor support would be an important
consideracion in deciding whether or not to upgrade.
2.5 f ACTORS AFFECTING
SYSTEMS PROJECTS
internal and external factors affecc every business decision that a company makes,
and IT projects are no exception. Figure 2-6 shows internal and external factors that
shape corporate IT choices.
2.S. I Internal Factors
Internal focrors include the strategic plan, top managers, user requests, information
technology deparcment, existing systems and data, and company finances.
STRATEGIC PLAN: A company's srrategic plan sets the overall direction for the
firm and has an importa nt impact on IT projects. Company goals and objectives rhat
need IT support will generate sysrems requests and influence IT priorities. A strategic
plan that stresses technology rends to create a favorable climate for IT projects that
extends throughout the organization.
TOP MANAGERS: Because significant resources arc required, top management usu-
ally initiates large-scale projects. Those decisions often result from strategic business
goals that require new IT systems, more information for decision making processes,
or better supporr for mission-critical information systems.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U,
..,...,.......,..~
r..a...w...,..._...., ..
-
Woip-M ._..,.. - ·~•-fllllie<'f •,...
.................,.t11ru ..
0w.,,,.._.._,..."-,.._..,.,_,.,_.,.. ..,. - ~---tfta111&....-.~~ij
__.~~c.....,..~
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I
Systems Planning
51
2.5 Factors Affecting Systems Projects
External Fact ors
Lr------...
Teclinology
l..__ _ _ _~J
Suppliers
Government
The Economy
l.
------
Custome~
Competitors
JL- - - - - -
FIGURE 2·6 Internal and CKternal factors that affect IT projecrs.
As users rely more heavily on information systems to perform
their jobs, they arc likely to request even more IT services and support. For example,
USER REQUESTS:
sales rep might request improvemencs to the company's web ire, a more powerful
sales analysis report, a network ro link all sales locations, or an on line S)'Stem that
allows customers to obrain the status of their orders instantly. Or, users might nor
be satisfied with the current system because it is difficult to learn or lacks flexibtliry.
They might want 111formation S)'Stems support for business requirement!> that did nor
even exist when the S)'Stem was first developed.
Systems project requests come also
&om the IT department itself. TT staff members often make recommendations based
on their knowledge of business operations and cechno1ogy trends. IT proposals might
be strictly technical matters, such as replacement of certain nenvork components, or
suggestions might be more business oriented, such as proposing a new reporting or
data collection srstem.
INFORMATION TECHNOLOGY DEPARTMENT:
Errors or problems in existing systems can trigger
requests for sysrcms projects. When dealing with older systems, analyses sometimes
spend coo much rime reacting ro day-to·day problems without looking at underlying
causes. This approach can curn an iniormarion system into a patchwork of corrections and changes that cannot support the company's overa ll business needs. This
problem typically occurs with legacy systems, which are older systems rhat are less
technologically advanced. When migrating ro a new system, IT pl:inners must plan
the conversion of existing data, which is described in detai l in Chapter I I.
EXISTING SYSTEMS AND DATA:
COMPANY FINANCES:
A company's financial status can affect systems projects.
If rhe company is going through a difficult time, the project may be postponed until
there is more cash available to finance the effort. On the other hand, if the company
is enjoying financ ial success, the decision ro embark on a new project may be easier to
make.
.........""_.. ... .-.................
_..__
("..,_...,llll!O( ...... . . - - . .\) ....... ~
...................
--......
"-> - "'Allf'W ~- ...............,.. o-....._ ...... _ ... ,..,...,..., ~ ..,._.. ..... ...... ... ~..
__....
~~·~---- ···---~~ - .,.-" ~
...........
Chapter 2 Analyzing the Business Case
52
2.5 Factors Affecting Systems Projects
2.S.2 External Factors
Exrernal facrors include technology, suppliers, cusromers, comperiror<;, the economy,
and government.
Changing technology is a major force affecting business and society in general. For example, the rapid growth of telecommunications, coupled with
increased computing power and continuous miniaturization of electronic components, has created entire new industries and technologies, including the proliferarion
of smarrphones and the app ecosysrem.
Technology also dramatically reshapes existing business opcrarions .
The success of scanner technology resulted in universal bar coding rhat
now affects vi rtually all products. Some industry experts predict that
bar code technology, which is over 40 years o ld, will be overshadowed
in the furure by electronic product code (EPC) technology that uses
RF ID rags to identify and monitor the movement of each individual
product, from the factory floor to the rernil checkout counter.
Quick Response codes (QR Codes), as shown in Figure 2-7, are like
bar codes bur square in shape. T hey contain more information than
traditional ba r codes, but less than RF ID rags. T hey do ha vc the advantage of being less expensive to use than RFID rags, and they can be
printed o n a lmost an ything-including online advertisements.
The Internet-of-Things (JOT) is a newer development that involves
almost all electronic devices con1municating with one another over a comFIGURE 2·7 QR Code.
puter network. The communication can use radio signal~, as with RFID
cags, digical messages, or other means. loT devices can act as sensors, sending important information to centralized data storage and procetising nodes. IoT devices
also raise new security and privacy concerns that the systems analyst must coru.ider.
TECHNOLOGY:
•
SUPPLIERS: With the growth of clcctroaic data interchange (EDI), relationships with
suppliers arc crirically importanr. For example, an automobile company might require
t hat suppliers code their parts in a certain manner to march rhc auto company's inventor)' conrrol system. EDI also enables just-in-time UIT ) inventory ystems that rely on
computer-to-computer data exchange to minimize unneces ary inventory. The purpose
of a JIT system is to provide the right products at the right place at rhc right rime.
Blockchain technology is a promising mechanism for managing upply chains more
powerfully rhan before. Blockchain provides a distributed ledger ysrem that is efficient, secure, transparent. Large companies such as 181\ll are already using blockchain
to improve operarions for their customers, such as the Food Trust product shown in
Figure 2-8 rhar \'<'almart uses for tracking food safety from grower to consumer.
IBM Blockchaln at work
......
,....~.....nc:rwe,..;
-..............
---·--
__...._,.,._...,..,.
----~-----
_........
,.._..___,.
......._.___..........
._.. ...__
..__ .......
...
._
FIGURE 2·8 IBM 81ockcha1n.
Sourt•
(....,..... J:gi ( . . . . .
_,..._
. ..............
....-......."..__
-
.-
»1(
I_,.. 4111.,.. .................,.t11ru
-Woip-M ._..,..
..
r..a...w...,..._...., ..
-------..... ......
.....--------.
~- )U,
..,...,...... .,..~
-·~•-fllllie<'f•,...
0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~--- t fta111&....-.~~ ij
__.~~ c.....,..~
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I
Systems Planning
53
2.5 Factors Affecting Systems Projects
Customers are virally important 1to any business. Information S)'Stcm
that interact with customers usually receive top prioriry. Many companies implement
customer relationship management (C RM ) systems char integrate all customer-related
event<; and transactions, including marketing, sales, and customer service acnvines.
Vendor-oriented CRNI systems often interconnect with supply chain management
(SCM) systems, which were discu sed in Chapter 1. CR;\it components can provide
automated responses to sales inquiries, online order processing, and inventory tracking. Some suppliers use robots for order fulfillment, such as the Kiva robots shown in
Figure 2-9 rhar Amazon.com uses in their warehouses.
CUSTOMERS:
FIGURE l -9 Amnon Roboucs' Krva robots.
Another RFID application is called electronic proof of delivery (EPOD). Using
EPOD, a supplier uses RFID tags on each crate, case, or shipping unit ro create a digital shipping list. The customer receives the list and scans rbe incoming shipment. If a
discrepancy is detected, iris reported and adjusted automatically. Because they would
be expensive ro invesrigare manually, small shipping inconsistencies might nor otherwise be traced. This is an example of technolog)r- related cost control.
Competition drives many information systems decisions. For
example, if one cellula r telephone provider offers a new cype of digiral service, orher
firm s musr match rhe plan in order to remai n competitive. New product research and
developmcnr, marketing, sales, and service all require IT support.
COMPETITORS:
Economic activity bas a powerful influence on corporate
information management. In a period of economic expansion, firms need to be rea<ly
with i.calable systems that can handle additional volume and growth. Predicting the
business cycle is not an exact science, and careful research and planning are important.
THE ECONOMY:
Federal, stare, and local government regulations directly affect
the design of corporate information systems. For example, up-to-dare fRS reporting
requiremenrs must be designed into a payroll package.
GOVERNMENT:
.........""_.. ... .-.................
_..__
("..,_...,llll!O( ...... . . - - . .\) ....... ~
...................
--......
"->-"'Allf'W ~- ...............,.. o-....._ ...... _ ... ,..,...,...,~..,._.. .............. ~..
__....
~~·~---- ···---~~-.,.-"~
...........
Chapter 2 Analyzing the Business Case
2.6 Processing Systems Requests
54
2.6
PROCESSING SYSTEMS REQUESTS
In most organizacions, che IT deparcment receives more systems requests than it can hancUe.
Many organizations assign responsibility for evaluating systems requests to a group of
key managers and users. tvlany companies call this group a systems rC\ iew com mince
or a computer resources committee. RegardJess of che name, che objective 1s to use the
combined judgn1ent and experience of severaJ analysts co evaluate project requests.
2.6. 1 Systems Request Forms
Many organizations use a special form for systems requests, similar to the online sample hown in Figure 2-10. A properly designed form streamlines che request process and
ensures consistency. The form must be easy to understand and include clear instructions. It shou ld include enough space for all required information and )hould indicate
what supporting documents
Tech Support Request Sysleni
1/••r1,.:.. ·"~' ::..·, ~· ,,, "'·'"''· 1
are needed. Most companies
use onJine systems request
Submit Roqueet
forms rh:H users submit electronically because the form can
be processed automatically.
When a systems request
form is received, a systems analyst or IT manager examines it
o-awio . . ~
_ _ ., olllllO Cl•
co determine what IT resources
arc required for the preliminary
investigation. A designated
person or a committee then
decides whether m proceed
wirh a prelimmary inve tigation. omerimes, a situation
o a - .... o ...
requires an immediate response.
For example, if the problem
involves a mission-critical sysFIGURE 2- 10 Example of an onhne systems request form.
tem, an IT maintenance team
must restore normal operacions
immediately. \'Qhen the sysrem is functioning properly, die ream conduce a review and
prepares a systems request to docwnent the work that was perfom1ed.
7
•
)
2.6.2 Systems RequestTools
\Xfhen the number of requests su bmitted throug h automated fo rms becomes significant,
or if the requests can origi nate from intern al sou rces as well as extern a I customers,
special-purpose systems request tools can be used to help manage t he work flow. For
example, Figure 2-'l 1 ill ustrates the service request capa bilities from l'nregrify that captures, manages, a nd routes requests to systems analysts based on definable business
rules. In th is way, req uests are tracked and analyzed for improved performance.
2.6.3 Systems Review Committee
Most large companies use a systems review comminee to evaluate systems requests.
Instead of relying on a single individual, a committee approach provides a variety of
experience and knowledge. \Vith a broader viewpoint, a committee can establish priorities more effectively t ban an individual, and one person's bias is less likely ro affect
the decisions.
(....,..... J:gl( . . . . . I_,.. 41 11.,.. ~- )U,
..,...,.......,..~
r..a...w...,..._...., ..
-Woip-M ._..,.. -·~•-fllllie<'f•,...
.................,.t11ru ..
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
__.~~c.....,..~
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I
Systems Planning
SS
2.6 Processing Systems Requests
A rypical committee consists of
C
.
··• •' "'
.... c
•
•
• •
'·'
the IT director and several managers or representarives from other
Service Request Management
departmencs. The IT dirccror usuall)' serve:. as a technical consultant
co ensure that committee members
are aware of crucial issues, prob~
....
&"!ilil• ~ ---·-----~---- .... · - lems, and opportunities.
- ........ - - -..... ,..._ ...................... ~o..
...,.._,___...,
_..
,...
_...
Although a committee offers
._
many advantages, some disadvan--~
s..1.....-r .. tagei. exist. For example, action
.........
on requescs must wait unri l the
committee meets. Another potential disadva ntage of a committee is
that members might favor projects
req uested by their own departments,
and internal polit ical differences
could delay important decisio ns.
M any sma ller companies re ly
FIGURE 2- 11 A service request management system from lntegrify.
on one person to evaluate sysrem
requests instead of a committee. If
only one person has the necessary IT skills and ex perience, t hat person must consult
closely with users and managers throughout t he company to ensure that bu5iness and
operational needs arc considered carefully.
p
::::.
GM11o.rno
-·----_...................
...........
.... .............. ......
---
.. ............. ........ -.........................
...
~
. . . . . . . . . ;ill . . . . . . . . . _ . . . . . . . . . . . ..,.
_ __
--
-- -
--
\Vherher one person or a commitrec is responsible, the goal is to evaluate the
requests and ser priorities. Suppose four requests must be reviewed:
1. The marketing group wanes to analyze current customer spending habits and
forecast future trends.
2. The technical supporr group wanes a cellular link, so sen•ice representatives can
download rechnical dara instantly.
3. The account ing department wanes ro redesjgn customer starements and allow
Internet access.
4. The producrion sraff wants an inventory control system that can exchange dara
wirh major suppliers.
\'<lhich projects should che firm pursue? What criteria should be applied? I low
should p riorities be determined? To answer chose questions, the individual or the
commirtce m use assess rhc feasibiliry of each request.
__ ,
.
.
.
.CASEJN;.P.OINfl:,.2.2:
..
.
,ATITAWAY AIRLINES, ~ RART:: O;,a·>
~
--
----
'
·.:4
You are the IT director at Attaway Airlines, a small regional air carrier.You chair the
company's systems review committee. and you currently are dealing with strong
disagreements about two key projeets. The marketing manager says it is vital to have a new
computerized reservation system that can provide better customer service and reduce operational costs.The vice president of finance is equally adamant that a new accounting system
is needed immediately because it will be very expensive to adjust the current system to new
federal reporting requirements.The VP outranks the marketing manager. and the VP is your
boss.The next meeting, which promises to be a real showdown, is set for 9:00 a.m. tomorrow. How will you prepare for the meeting! What questions and issues should be discussed!
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _
.. ~ ........................._ .... ._
-
Chapter 2 Analyzing the Business Case
56
2. 7 Assessing Request Feasibility
2. 7
ASSESSING REQUEST FEASIBILITY
As described in Chapter 1, a sysrerns request must pass several tests to see whether
it is worthwhile to proceed further. The first step is to identify and weed out systems requests that arc not feasible. For example, a request would not be feasible if it
required hardware or software that the company al ready had rejected.
Even if the request is feasible, it might not be necessary. For example, a request
for multiple versions of a report could require considerable design and programming
effort. A bencr alternarive might be to download the server dara ro a personal compurerbased sofnvare package and show users how to produce their own reports. In this
case, rraming users would be a bener investment than producing reports for them.
Somerimes assessing request feasibility is quite simple and can be done in a few
hours. If rhc request involves a new system or a major change, however, extensive
fact-finding and investigation in rhe form of feasibility studies are reqwred.
2.7. I Feasibility Studies
As shown in Figure 2- 12, a feasibi lity study uses four main yardsticks ro measure a
proposal: operational feasibi lity, eco111omic feasibi lity, technical feasibility, and schedule fcasibil icy.
How much effort should go into a feasibility study depends on nature of the
request. For example, if a deparunent wants an existing report sorted in a different
o rder, the analyst can decide quickly whether the request is feasible. On the other
hand, a proposal by the marketing department for a new market research system to
predict sales trends would require much more effort. Jn either case, the systems analyst should ask these important questions:
•
ls the proposal desirable in an operational sense? Is it a practical approach char will
soh·e a problem or rake advantage of an opporruniry to achieve company goals?
•
Is the proposal technically feasible? Are the necessary technical resources and
people available for the project?
• Is rhe proposal economically desirable?
What are the projected saving~ and costs?
Are ocher intangible factors involved, such
as customer satisfocrion or company image?
ls the problem worrh solving, and will
the request result in a sound business
investment?
0pe1"8tlonal
• WiH If be easy to
team and vse?
Schedule
• Can we do 11in
time?
Fualble?
=:=a •
Economic
Will b enefits
e'Kceed costs?
Technlcel
• Do we have the
tech resources?
FIGURE l -1l A feasibility study examines operational, technical, economic,
and schedule factors.
(....,..... J:gi( . . . . .
I_,.. 41 11.,.. .................,.t11ru
-Woip-M ._..,..
..
r..a...w...,..._...., ..
~- )U,
..,...,.......,..~
-·~•-fllllie<'f•,...
• Can the proposal be accomplished
within an acceptable rime frame?
To obtain mo re information about a
systems request, ini tial fact-finding migh t
be accomplished by stud ying o rganization
charts, performing interviews, reviewing
current d ocumentation, observing operations, and surveying users. Sometimes,
developing prototypes can provide additional insight into the feasibility of the
request. If the systems request is approved,
more intensive face-finding will continue
during the systems analysis phase.
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
__.~~c.....,..~
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I
Systems Planning
57
2.7 Assessing Request Feasibility
2.7.2 O perational Feasibility
Operational feasibi lity means that a proposed system will be used effectively after ir
has been developed. If users have difficulry with a new sysrem, it will nor produce the
expected benefits. Orgamtarional culture can also affect operational feasibility. For
instance, a system that works well in a highly structured workplace might be very
unpopular in a more relaxed corporate culture. Operational feas ibility is difficult ro
measure wirh precision but must be studied very carefully. The follo·wing questions
would help predict a system's operational feasibility:
•
•
•
•
•
•
Does management support the project? Do users support the pro1ecr? ls rhe current !>yi.cem well liked and effectively used? Do users see the need for change?
\Xfill the new system result in a workforce reduction? lf so, what will happen to
the affected employees?
Will the new system require training for users? lf so, is the company prepared
to provide the necessary resources for training current employees?
Will users be involved in planning rhe new system right from the start?
Will rhc new system place any new demands on users or require any operaring
changes? For example, will any information be less accessible or produced less
frequencly? Will performance decJjne in any way? lf so, will an overall gain co
the organizarion outweigh individual losses?
Will customers experience adverse effects in any way, either temporarily or
permanently?
•
Will any risk co rhe company's image or goodwill resulc?
•
Does the development schedule conflict with other company priorities?
•
Do legal or ethical issues need to be considered?
2.7.l Economic Feasibility
Economic feasibility means thar the projected benefits of the proposed !>ystem outweigh the est11nated coses usually considered the total cost of o wnenhip ( fCO),
whic h includes ongoing support and maintenance cosrs, as well as acquisition co~ts.
To determine TCO, the analyst must estimate coses in each of the folio\\ mg a reas:
•
People, including IT staff and users
•
J lardwarc and equipment
•
Software, including in-house development as well as purchases from vendors
•
Formal :.tnd informal craining, including peer-to-peer support
•
•
Licenses and fees
Consulting expenses
•
Facility costs
•
The e~timatcd cost of not developing the system or postponing the project
Tangible co~ts, such as those listed above, usually can be measured in dollars. But
intangible co~ts also must be considered. For exainple, low employee morale might not
have an immediate dollar impact, bur certainly will affect the company's performance.
In addition to costs, tangible and inrangible benefits to the company must be assessed.
The systems review commirtee will use those figures, along with the cost estimates, to
decide whether ro pursue rhe project beyond the preliminary investigation phase.
.........""_.. ... .-.................
_..__
("..,_...,llll!O( ...... . . - - . .\) ....... ~
...................
--......
"->-"'Allf'W ~- ...............,.. o-....._ ...... _ ... ,..,...,...,~..,._.. .............. ~..
__....
~~·~---- ···---~~-.,.-"~
...........
Chapter 2 Analyzing the Business Case
2. 7 Assessing Request Feasibility
58
Tangible benefi ts are benefits that can be measured in dollars. Tangible benefits
result from a decrease in expenses, an increase in revenues, or both. Examples of tangible benefits include the following:
•
•
•
A new scheduling l>ysrem that reduces overtime
An online package tracking system that improves service and decreases the
need for clerical staff
A sophisticated inventory control system that curs excess inventory and eliminates production delays
lniangible benefits are advantages tbat are difficult to measure in dollars but are
important to the company. Examples of intangible benefits include rhe following:
•
•
A user-friendly system that improves employee job satisfaction
A sales tracking system that supplies berter information for marketing decisions
•
A new website that enhances the company's image
The development timetable must also be considered, because some benefits mighr
occur as soon as rhe system is operational, but others might not rake place until later.
2.7.4 Technical Feasibility
Technical feasibility refers to the technical resources needed to develop, purchase,
install, or operate the system. When assessing technical feasib ility, an analyst should
consider the following points:
•
Does the company have the necessary hardware, software, and network
resources? If not, can those resources be acquired without difficult)•?
•
Docs the company have the needed technical expertise? If not, can it be acquired?
•
Does rhe proposed platform have sufficient capacit} for future needs? If not,
can it be expanded?
Will a prototype be required?
•
•
\Xfill the hardware and software environment be reliable? \Xfill tt integrate with
ocher company information systems, both now and in the future? Will ir mrerface properl y with external systems operated by customer~ and suppliers?
•
Will the combination of hardware and software supply adequate performance?
Do clear expecta tions and performance specifications exist?
•
Will rhe system be able to handle future transaction volume and company
growth?
Keep in mind that systems requests that are not currently technically feasible cao
be resubmitted as new ha rdware, software, or expertise becomes available. Development costs might decrease, or the val ue of benefits might increase enough that a systems request eventua lly becomes feasible. Conversely, an initially feasible project can
be rejected later.
2. 7 .S Schedule Feasibility
Schedule feasibility means rhar a project can be implemented in an acceptable rime
frame. \'V'hen assessing schedule feasibility, a systems analyst must consider the inter·
action between time and costs. For example, speeding up a project schedule might
make a project feasible, but much more expensive.
(....,..... J:gi( . . . . . I_,.. 4111.,.. ~- )U,
..,...,.......,..~
r..a...w...,..._...., ..
-Woip-M ._..,.. -·~•-fllllie<'f•,...
.................,.t11ru ..
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- t fta111&....-.~~ ij
__.~~c.....,..~
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I
Systems Planning
59
2.8 Setting Priorities
Other issues that relate ro schedule feasibiliry include the following:
•
•
•
•
•
•
Can the company or the IT ream control the factors chat affect schedule
feasibiliry?
Has management established a firm cimetable for the project?
\Xlhar condition~ must be satisfied during the development of the system?
\Xlill an accelerated schedule pose any risks? If so, arc the risks acceptable?
\Xl11l project management techniques be available to coordinate and control the
project?
Will a project manager be appointed?
Chapter 3 describes various project management tools and techniques.
2.8
SFTTING PRIORITIES
After rejecting systems requests that are not feasible, the systems review committee
must establish priorities for the remaining items. lf tools are used as part of the review
process, the requests may already be in a partially or fully sorted order. The highest
priority goes to project requests that provide the greatest benefit, at the lowest cost, in
the shortest period of rime. Many faccors, however, influence project evaluation.
2.8.1 Dynamic Priorities
It's important to note that many projects are dynamic in nature. For example, projects
chat have adopted an agile merhodology are prone ro rapid changes rhroughout the system development lifecycle. These changes can cause request priorities to change as well.
For example, acquisition costs mighc increase over time, making the project more
expensive than anticipated. This can affect the economic feasibility of a number of
requests. In addition, managers and users somecimes lose confidence in a project. For
all those reasons, feasibiliry anal)•sis and priority setting are ongoing rask that must
be performed throughout the S)'Stems development process.
2.8.2 FactorsThatAffect Priority
When assessing a project's priority, a systems analyst should consider the following:
•
•
•
•
•
•
•
Will the proposed system reduce costs? Where? When? How? By how much?
Will the system increase revenue for the company? Where? When? How? By
how much?
Will the systems project res ul t in more information or produce better results?
I low? Are the results measurable?
Will rhe system serve customers better?
\'(fill the system serve the organization berrer?
Can the project be implemented in a reasonable time period? How long will
the results last?
Are the necessary financial, human, and technical resources available?
Few projects will score high in all areas. Some proposals might not reduce costs
but will provide important new features. Other systems might reduce operating costs
.........""_.. ... .-.................
_..__
("..,_...,llll!O( ...... . . - - . .\) ....... ~
...................
--......
"->-"'Allf'W ~- ...............,.. o-....._ ...... _ ... ,..,...,...,~..,._.. .............. ~..
__....
~~·~---- ···---~~-.,.-"~
...........
Chapter 2 Analyzing the Business Case
2.9 The Preliminary Investigation
60
substantially but require che purchase or lease of additional hardware. Some systems
might be very desirable but require several years of development before producing
significant benefits.
\'<lhenever possible, the analyst should use tangible costs and benefits that can be
measured in dollars. However, the proposal might invoh·e intangible benefits, such as
enhancing the organization's image, raising employee morale, or improving customer
service. These examples are harder to measu re but should aJ50 be considered.
2.8.3
Disc~tionary
and Nondiscretionary Projects
Pro1eccs where management has a choice in implementing chem are called
di~crecion ary project!;. Projects where no choice exists are called nondiscretionary
projects. Creating a new report for a user is an example of a discretionary project;
adding a reporc required by a new federal law is an example of a nondiscretionary
project.
If a particular project is not discretionary, the systems analyst should ask if it is
really necessary for the systems review committee to evaluate it. Some people believe
th:i t waiting for com111irtee approval delays critical nondiscrecionary projects unnecessarily. Others believe t bat submitting all requests to the systems review keeps the committee aware of all projects that compete for IT resources. As a resul t, the committee
can review priorities and create realistic schedules.
Many nondiscrerionary projects are predictable. Examples include annual updates
ro payroll, cax percentages, or quarterly changes in reporting requirements for an
insurance processing system. By planning ahead for predictable projects, the IT
department manages its resources berrer and keeps the systems review committee fully
informed without needing prior approval in every case.
Back at Ar.u.way Airlines, the morning meeting ended with no agreement between the VP
of finance and the marketing manager. In fact, a new issue arose.The VP now says that the
new accounting system is entided to the highest priority because the federal government
soon will require the reporting of certain types of company-paid health insurance premiums. Because the current system will not handle this report. the VP insists that the entire
accounting system is a nondiscretionary project. As you might expect. the marketing
manager Is upset. Can pare of a project be nondiscretionary? What issues need co be
discussed/ The committee meets again tomorrow. and the members will look to you. as the
IT director, for guidance.
2. 9
THE PRELIMINARY INVESTIGATION
A systems analyst conducts a prelimina ry investigation to study the systems request
and recommend specific action. After obtain ing an authorization to proceed, the
analyst interacts wirh managers, users, and other stakeholders, as shown in the
model in Figure 2-13. The analyst garhers faces about the problem or opportunity, project scope and constraints, project benefits, and estimated development
rime and coses. T he end produce of the preliminary investigation is a report to
management.
r..,,...JID)r-..1-.. 4•11_.. •...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
.. ~ ........................._ .... ._
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _
Phase I
Systems Planning
61
2.9 The Preliminary Investigation
2.9.1 Planning the Preliminary Investigation
Before starting a preliminary inve rigarion, iris importanr co let
Problem or
people know about chc invcstigarion and explain the role of the
Benefits
Opportunity
system analyst. 1\lleetings with key managers, users, and ocher
stakeholders such as the rT staff should be scheduled, to describe
the proiect, e'<plain roles and responsibilities, answer questions,
and invite comments. Interactive communication with users
starts at this point and continues throughout the development
Projec1 Scope
Costs
and Cons1ra1nts
process.
A systems project often produces significant changes in
company operarions. Employees may be curious, concerned, or
even opposed to those changes. It is not surprising ro encounter some user resistance during a preliminary investigation.
Report to Management J
Employee attitudes and reactions arc important and must be
considered.
FIGURE 2- 13 Model ofa preliminary
When interacting with users, use t he word problem careInvestigation. Note the Importance of fact-finding
fully, because ir has a negative meaning. When users are asked
In each of the four areas.
about problems, some will stress current system limita tions
rather than desirable new features or enha ncements. Instead
of focusing on difficulties, question users about additional capabi lity they would
like to have. This approach highlights ways to improve the user's job, provides a
better understanding of operations, and builds better, more positive relationships
with users.
2.9.2 Pe rforming the Preliminary Investigation
During a preluninary investigation, a systems analyst typically follows a series of
steps, as ~hown in Figure 2-14. The exact procedure depends on the nature of the
request, the size of the project, and the degree of urgency.
Step I: Understand t he Problem or O pportunity
lf the systems request mvolves a new informacion system
or a substantial change 111 an existing syscem, sysre1ns
analysts might need co develop a business profile chat
descnbes current business processes and funcrioos, as
explained in Chapter I. Even where the request involves
relatively minor changes or enhancements, how chose
modifications will affect business operations and ocher
information systems must be understood. Often a change
in one system has an unexpected ripple effect on another
system. When a systems request is analyzed, which
departmen ts, users, and business processes are involved
must be determined.
Jn many cases, the systems request does not reveal
the underlying problem, bur only a symptom. For
example, a request to invest igate centralized processing delays might reveal improper scheduling practices
rather than hardware problems. Similarly, a request
for analysis of customer complaints might disclose a
lack of sales representative training, rather than problems with the product.
.........""_.. ... .-.................
_..__
("..,_...,llll!O( ...... . . - - . .\) ....... ~
...................
•
•
•
0
Undersland the problem or opponun11y
_J
Dehne fhe pro1ect sc;ope and consframts
Perform lact-fond1ng
• Analyze organlzauon charts
• Review documentauon
• Observe operaflons
• Conducf a user survey
Study usablhty, cost, benefit. and schedule data
Evaluate feaslbllity
0
• Operational
• Technical
• Economic
• Schedule
FIGURE 2- 1 ~ Five main steps in a typical preliminary
invesug~uon.
--......
"-> - "'Allf'W ~- ...............,.. o-....._ ...... _ ... ,..,...,..., ~ ..,._.. ..... ...... ... ~..
__....
~~·~---- ···---~~ - .,.-" ~
...........
Chapter 2 Analyzing the Business Case
2. 9 The Preliminary Investigation
62
A popular rechnique for investigaring causes and effecrs is called a fi 5hbone
diag ram, a shown in Figure 2-15. A fishbone diagram is an analysis cool rhar
represenrs the possible causes of a problem as a graphical ourline. \Vhen using a
fish bone diagram, an analyse firsr scares rhe problem and draws a main bone wirh
sub-bones chat rcpresenr possible causes of rhe problem. In rhe example shown in
Figure 2-15, rhe problem is Low M orale, and rhe analyst has identified four areas
to investigate: £11vironme11t, People, Management, and Mac/1111es. In each area,
the analyst idenrifies possible causes and draws chem as horizontal sub-bones.
For example, Temp too hot or cold is a possible cause in rhe £11viro11me11t bone.
For each cause, the analyse muse dig deeper and ask rhe quesrion: Whar could be
causing this symprom co occur? For example, why is it too hoc? If the answer is a
Faulty thermostat, rhe analyst indicates this as a sub-bone co rhe Temp too hot or
cold cause. In ch is manner, the anal yst adds addirional sub-bones to the diagram,
until he or she uncovers root causes of a problem, rather than just the symptoms.
fl!
••
~- -
---~--
·-
•• , ••
_....... ·--·-
....
•
-
--
•
:.
-
...
FIGURE l - 1S A fishbone diagram displays the causes of a problem.Typically, you must dig deeper to identify
anual causes rather than just symptoms
Step 2: Define the Project Scope and Constraints
Determining the project scope means defining the specific boundaries, or extent, of
the project. For example, a statemen't that, payroll is not being produced accurate/)'
is very general, compared with the statement, overtime pay is 1101 being calc11/ated
correctly (or production workers on the second shift at the Yorktown pla11t. Similarly,
the statement, the project scope is to modify the accounts receivable system, is not
as specific as the sta tement, the project scope is to allow customers to inquire 011/i11e
about acco1111t balances and recent transactions.
Some analysrs find it helpful ro define project scope by creating a list with sections
called Nfust Do, Should Do, Could Do, and W/011't Do. T his list can be reviewed
later, during the systems analysis phase, when the systems requirements document is
developed.
Projects with very general scope definitions are at risk of expanding gradually,
without specific au thorization, in a process called project creep. To avoid thi~
problem, project scope should be defined as clearly as possible. A graphical model
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U,
..,...,.......,..~
r..a...w...,..._...., ..
-Woip-M ._..,.. -·~•-fllllie<'f•,...
.................,.t11ru ..
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
__.~~c.....,..~
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I
Systems Planning
63
2.9 The Preliminary Investigation
that shows the systems, people, and business processes that will be affected is sometimes useful. The scope of the project also establishes the boundaries of the preliminary investigation itself. A systems analyst should limit the focus to the problem at
hand and avoid unnecessary expendirure of time and money.
Along with defining the scope of the project, any constraincs on the '>)'Stem must
be identified. A con~traint is a requirement or condition that the system must .,arisfy
or an outcome that the system must achieve. A constraint can im·olve hardware,
software, rime, policy, law, or cosr. System constraints also define project cope. For
example, if the system must operate with cxisring hardware, that is a constraint that
affects porential solutions. Other examples of consrraincs are:
•
The order entry sy!.rem must accept input from 15 remote site .
•
The human resources information system must produce statistics on hiring
practices.
The new website must be operational by March 1.
•
When examining constraints, their characteristics should be identified, as follows.
PRESENTVERSUS FUTURE: Is t he constraint something that must be met as soon as
the system is developed or modified, or is the constraint necessary ar some fucure time?
Ls the consrrainr due ro a requirement within the
organization, or docs some external force, such as government regulation, impose it?
INTERNAL VERSUS EXTERNAL:
MANDATORY VERSUS DESIRABLE: Is the coosuaint mandatory? ls it absolutely
essential to meet rhe constraint, or is ir merely desirable?
Figure 2-16 shows five examples of constraints. Notice rhar each constraint has
three characterisrics, which arc indjcarcd by ics position in the figure and by the srmbol thac represents the consrrainr, as follows:
Sample Constrai nts Shown byTlming, Type, and Urgency
("'E;';'mple A: New IRS
I ~must be used 1n
!he payroll system as
I
Example B: Sometime neX1
year our largest cus1omer wdl
require a seounty code for all
onhne transactlOlls
as poSSlble
Future
Present
I • Mandatory constraint
•
£ • Desirable constraint
Internal
Example 0 : Starting next
week, the marketing system
must track all repeat visits
to the webslle.
Example C: Managemen1
prefers that the project be
completed now rather
than next quarter
FIGURE
Example E: To reduce raw material
costs. we should build supply chain
management capabthty Into lhe next
versoo of our purcnasmg system
l - t 6 Examples of v.1nous types of constraints.
.........""_.. ... .-.................
_..__
("..,_...,llll!O( ...... . . - - . .\) ....... ~
...................
--......
"->-"'Allf'W ~- ...............,.. o-....._ ...... _ ... ,..,...,...,~..,._.. .............. ~..
__....
~~·~---- ···---~~-.,.-"~
...........
Chapter 2 Analyzing the Business Case
2. 9 The Preliminary Investigation
64
•
•
The consrraint in Example A is presenr, external, and mandatory.
The constraint in Example B is future, external, and mandatory.
•
The constraint in Example C is present, internal, and desirable.
•
The constrJint in Example D is present, internal, and mandatory.
•
The con rrainr in Example Eis future, interna~ and desirable.
Regardless of the type, all constraints should be identified as early as possible
to avoid future problems and surprises. A clear definition of project scope and constraints avoids misunderstandings that arise when managers assume that the system
will have a certain feature or support for a project, but later find that the feature is
nor included.
Ste p 3: Pe rform Fact-Finding
The object ive of face- finding is to gather data about project usability, costs, benefits, ;ind schedules. Fact-finding involves various techniques, which arc described
below. Depending on what info rmation is need ed to investigate the systems
request, fact-finding mig ht cons ume several hours, days, or weeks. For example, a
change in a report forma t o r data entry screen might requ ire a single telephone call
or emai l message to a use r, whereas a new inventory system wou ld involve a series
of interviews. During fact- finding, the analyst might analyze organization charts,
conduct interviews, review current d ocumentation, observe operations, and carry
out a user survey.
ANALYZE ORGANIZATIO N CHARTS: An analyst will not alway~ know the organi-
.tational structure of departments involved in the study. Organization charts should be
obtained to understand the functions and identify people to interview.
If organization charts are not available, or are out-of-date, the necessary information should be obtained from department personnel and construct the charts, as
shown in Figure 2-17.
Even when c harts are available, their accuracy should be ve rified. Keep in mind
t hat an organization chart shows formal reporting relationships but nor the informal
alignment of a group, which also is important.
CONDUCT INTERVIEWS: The
Customer Service Department
primary merhod of obraining
informatio n during the preliminary
investigation is the interview. The
interviewing process involves a
series of steps:
1. Determine the people to
interview.
2. Establish objecri vcs for t he
interview.
-
3. Develop interview questions.
~
FIGURE 2- 17 Specialo:z.ed tools such as MlcrosoftVisoo an be used to draw
organizational charu. but general purpose presentation tools such as Microsoft
PowerPoint shown here can also be used.
(....,..... J:gi( . . . . .
I_,.. 41 11.,.. .................,.t11ru
-Woip-M ._..,..
..
r..a...w...,..._...., ..
~- )U,
..,...,.......,..~
-·~•-fllllie<'f•,...
4. Prepare for the interview.
5. Conduct the interview.
6. Document the interview.
7. Evaluate rhe interview.
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
__.~~c.....,..~
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I
Systems Planning
65
2.9 The Preliminary Investigation
These seven steps arc discussed in derail in Chapter 4, which describes fact-finding
techniques that occur during the systems analysis phase of the SDLC.
Rememher that the purpose of the interview, and of che preliminary mvestiganon itself, is co uncover facts, nor ro convince others char che project is justified. The
analyst's primary role in an interview is co ask effective questions and listen carefully.
If several people will be asked about the same topic, a standard set of questions for all
the interviews should be prepared. Also be sure to include open-ended que ttons, such
as " \Xlhat else do you think I should know about the system?" or .. Is there any other
relevant information that we have not discussed?"'
\'(!hen conducting interviews during the preliminary investigation, interview managers and supervisors who have a broad knowledge of the system and can provide an
overview of the business processes involved. Depending on the situation, talking to
operational personnel to learn how the system functions on a day-to-day basis may
also be helpful.
REVIEW DOCUMENTATION: Although interviews are an extremely important
method of obtaining information, investigating the current system documentation is
also useful. The documentation might nor be up ro dare, so check with users co confirm that the informa tion is accurate a nd complete.
Another fact-finding method is to observe the current
system in operation. Observe how workers carry out typical tasks. Trace or follow
the actual paths taken by input source documents or output reports. ln addition to
observing operations, consider sampling the inputs or outputs of the system. Using
sampling techniques described in Chapter 4, valuable information about the nature
and frequency of the problem can be obtained.
OBSERVE OPERATIONS:
Interviews can be rime consuming. Sometimes information from a larger group can be obtained by conducting a user survey. In this
case, design a form that users complete and reru rn for cabularion. A survc}' is nor as
Aexible as a series of interviews, bur ir is
less expensive, generally rakes less time,
and can involve a broad cross-secrion of
Pareto Chart: Inventory System Errors
people.
CONDUCT A USER SURVEY:
ANALYZE THE DATA: Systems analysts
use many techniques to locate the source
of a problem. For example, the Pareto
chart is a widely used tool for visualizing
issues that need attention. Named for a
nineteenth century economist, a Pareto
chart is drawn as a vertical bar graph, as
shown in Figure 2- J 8. The bars, which
represent various causes of a problem, are
arranged in descending order, so the team
can focus on the most important causes.
ln the example shown, a systems analyst
mighr use a Pareto chart to learn more
about the causes of inventory system
problems, so that necessary improvements
can be made.
.........""_.. ... .-.................
_..__
("..,_...,llll!O( ...... . . - - . .\) ....... ~
-
--
-
-.....
FIGURE l -18 A Pareto chart displays the causes ofa problem. in priority
order. so an analyst can tackle the most lmpon:ant cases first. In this example.
the part number issue would be the obvious starting point.
...................
--......
"->-"'Allf'W ~- ...............,.. o-....._ ...... _ ... ,..,...,...,~..,._.. .............. ~..
__....
~~·~---- ···---~~-.,.-"~
...........
Chapter 2 Analyzing the Business Case
2. 9 The Preliminary Investigation
66
The XY chart, somerimes called a scatter diagnim, is anorher problem-solving root.
Often, an :malysr looks for a correlation becween two variables. For example, suppose complainrs are received about network response time, and rhe cause needs robe
derermined. The analyst would rry to identify variables, such as rhe number of users,
to see whecher there is a correlation, or pan ern. Figure 2- 19 shows rwo XY charts
wirh dara samples. The firsr chart sample would suggest thar rhere is no corrclacion
...
-
__ .. .•
.
~-
•
............... --..._
·-
..
0-. .... _
•
-
.A
.
..
II
'
-
•
-
...........
- ....
• .. •
I
- ·- p
~
•
Network Response Time vs. Number of Users
.. .
..
••
..
••
---
•
n ...... t
n...,...1
•
.,..
---
•
•
•
--
••
• p
•
I
. ...
•
......_
Network Response Time vs. Number of Users
..
..
•.....
-1
...
..
"
•
•
- - ..
... r -
•
•
-~·
•
..
FIGURE 2- 19 An XY chart shows correlation between variables, which is very important in
problem solving. Conversely, a lack of correlation suggests that the vari:lbles are independent.
and that you should look elsewhere for the cause.
(....,..... J:gi ( . . . . . I_,.. 41 11.,.. ~- )U,
..,...,...... .,..~
r..a...w...,..._...., ..
-Woip-M ._..,.. -·~•-fllllie<'f•,...
.................,.t11ru ..
0w.,,,.._.._,..."-,.._..,.,_, .,_.,....,. -~--- t fta111&....-.~~ ij
__.~~ c.....,..~
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I
Systems Planning
67
2.9 The Preliminary Investigation
between the delays and the number of users, so the analyst would look elsewhere for
the source of the problem. However, if the data resembles the second XY sample, it
indicates a strong relationship between the number of users and the longer response
rimes. Thar informanon would be extremely valuable in the problem-solving process.
Step 4:Analyze Project Usability, Cost, Be nefit, and Schedule Data
During fact-finding, data is gathered about the project's predicted cosrs, anticipated
benefits, and chedule issues that could affect implementation. Before feasibilit y can
be evaluated, this data must be analyzed carefuUy. If interviews were conducted or
surveys used, the data should be tabulated to make it easier to understand. If current
operations were observed, the results should be reviewed and key facts that will be
useful in the feasibihry analysis highlighted. If cost and benefit data were gathered,
financial analysis and impact statements can be prepared using spreadsheets and
other decision-support tools.
Also, time and cost estimates should be developed for the requirements modeling
tasks for the next SDLC phase, systems analysis. Specifically, the following should be
considered:
•
What informa tion must be obta ined, and how will it be gathered and analyzed?
•
Who will conduct the interviews? How many people will be interviewed, and
how much time will be needed to meet with the people and i.umnrnrize their
responses?
\'(fill a survey be conducted? Who will be involved? How much time will it cake
people to complete it? How much rime will it take to tabulate the results?
•
•
How much will it cost to :rnalyze che information and prepare a report with
findings and recommendations?
Step S: Evaluate Feasibility
At chis point, the problem or opportunity has been analyzed, the proiect scope and
consrraincs have been defined, and fact-finding has been performed ro evaluate
project usab1liry, costs, benefits, and time constraints. The next step is to as ess the
project'!> feasibility, beginning wi th reviewing che answers to the questions listed in
Section 2.7. The following guidelines should also be considered:
OPERATIONAL FEASIBILITY: Fact-finding should have included a review of user
needs, requirements, and expectations. When this data is analyzed, look for areas that
might present problems for system users and how chey might be resolved. Because
operational feasibility mea ns that a system will be used effectively, this is a vital area
of concern.
ECONOMIC FEASIBILITY: Using che fact-findi ng data, financia l ana lysis tools can
be applied to :i~sess feas ihiliry. The cost-benefit da ra will be an important factor fo r
management co consider. Also, a cost estimate for the project development ream wi ll
be built into the project management plan.
TECHN ICAL FEASIBILITY: The fact-finding data should identify the hardware, soft-
ware, and network resources needed co develop, install, and operate the system. \~ith this
data, a checklist can be developed that will highlight technical costs and concerns, if any.
SCHEDULE FEASIBILITY: The fact-finding data should include stakeholder expec-
tations regarding acceptable timing and completion dares. As mentioned previously,
.........""_.. ... .-.................
_..__
("..,_...,llll!O( ...... . . - - . .\) ....... ~
...................
--......
"->-"'Allf'W ~- ...............,.. o-....._ ...... _ ... ,..,...,...,~..,._.. .............. ~..
__....
~~·~---- ···---~~-.,.-"~
...........
Chapter 2 Analyzing the Business Case
2. 9 The Preliminary Investigation
68
often a trade-off exisrs berween a project's schedule and its cosrs. For example,
compressing a projecr schedule mighr be possible, but only if the budget is increased
accordingly co add ext ra personnel. The schedule data will be incorporated into the
pro1cct plan in che form of task durations and milestones.
At rhis stage of the preliminary investigation, there are several alrernarives. It
might be rhat no action is necessary or thar some other srrateg)', such as addirional
training, is needed. To solve a minor problem, a simple solurion might be chosen
wirhour performing further analysis. In other situations, it will be recommended that
rhe project proceed to the next phase, which is systems analysis.
2.9.3 Summarizing the Preliminary Investigation
The fina l cask in the preliminary investigation is to summarize the results and recommendations, which can be conveying to management in a report and/or in a presentation. The written report and the oral presentation are examples of the need for
systems analysts to develop strong conu11unicacions skills. The report includes an
evaluation of the systems request, ao estimate of costs and benefits, and a case for
actio n, which is a summary of che pi:oject reques t and a specific recommenda tion.
T he spcci fie format of a preliminary investigation report varies. A typical report
might consist of the fo llowing sections:
•
/ntroductio11-tbe fi rst section is an overview of che reporc. The introduction
contains a brief description of the system, the name of the person or group
who performed the investigation, and the name of the person or group who
initiated the investigation.
• Systems Request Summary-the summary describes the basis of the systems
request.
•
•
•
•
•
•
findings-the findings section contains the res ults of che preliminar)' investigation, including a descriptjoa of the project's scope, constraints, and
feasibiliry.
Recommendations-a summary of the project request and a specific recommendation. Management will make the final dec1s1on, but the IT department's
input is an important factor.
Pro1ect Roles-this section lists the people who will participate in the project
and describes each person's role.
Time and Cost Estimates- this section describes the cost of acquiring and
installing the system, and che coral cost of ownership during the system's useful
life. Intangible costs a lso shou ld be noted.
Expected Benefits-this section incl udes anticipated tangible and intangible
benefits and a timetable that shows when they are to occur.
Appendix- an ap pendix is included in the report if supporting information
must be attac hed. For example, the interviews conducted might be listed, the
documencacion reviewed, and other sources for the information obtained.
Detailed interview reporrs do not need to be included, but those documents
that support t he report's findings should be retained for future reference.
(....,..... J:gi( . . . . . I_,.. 41 11.,.. ~- )U,
..,...,.......,..~
r..a...w...,..._...., ..
-Woip-M ._..,.. -·~•-fllllie<'f•,...
.................,.t11ru ..
0w.,,,.._.._,..."-,.._..,.,_,.,_.,....,. -~--- tfta111&....-.~~ij
__.~~c.....,..~
........ .,..,. .. ._.,.,.,.......c:-..•~-".....-""'*"....,.._...,.. ..
Phase I
Systems Planning
2. 10 Summa ry
As a new systems analyst at Premier Financial Services. you are getting quite an education.
You report to the IT manager, who also chairs the systems review committee. Several
months ago. the committee rejected a request from the finance director for an expensive
new accounts payable system because the benefits did not appear to outweigh the costs.
Yesterday. the IT manager's boss asked the IT manager to reconsider the finance director's request. and to persuade the other members to approve it. The IT manager wanted
to discuss the merits of the request, but the discuss ion was cut off rather abruptly. It turns
out the IT manager's boss and the finance director are longtime friends.
The IT manager is now very uncomfortable meeting with her boss. She believes the
directive to reconsider the finance director's request would undermine the integrity of the
systems review process. She feels it would be unethical to grant preferred treatment just
because a friendship is involved. She is thinking of submitting a request to step down as
review committee chair, even though that might harm her career at the company.
Is this an ethical question, or just a matter of office politics? What would you do if you
were the IT manager!
2. I 0
SUMMARY
Systems plann ing is rhe firsr phase of rhe systems development life cycle. Effective
information systems help an organization support irs business processes, carry out its
mission, and serve its stakeholders. During strategic planning, a company examines
its purpose, vision, and values and develops a mission scacement, which leads to goals,
objecttve!>, day-to-day operauons, and business resulcs that affect compan)' stakeholders. SWOT analysis exammes strengths, weaknesses, opponumries, and threats.
S\XIOT analysis can be u ed at the enterprise level and for mdividual pro1ect~.
During the }'Stems planning phase, an analyse reviews the busines~ case, which is
the basis, or reason, for a proposed system. A business case should de cribe the project clearly, provide the jusrificarion to proceed, and estimate rhe project's financial
impact.
Sy~tem~ projects are initiaced co improve performance, provide more information,
reduce costs, strengthen controls, or provide bener service. Various internal and external factors affect syscems projects, such as user requests, top management directives,
existing sy~tems, the IT depa rtment, software and hardware vendors, technology, cu~­
tomers, competitors, the economy, and government.
Duri ng the preliminary investigation, the analyst evaluates the systems request and
determine~ whether the project is feasible from an o perational, technical, economic,
and schedule standpoi nt. Analysts evaluate systems requests on the basis of their
expected costs and benefits, both tangible and intangible.
The steps in the preliminary in vestigation are to understand the problem or opportunity; define the project scope and constraints; perform fact-finding; analyze project
usability, cost, benefit, and schedule dara; evaluate feasibility; and present results and
recommendations to management. During the preliminary investigation, analysts
often use investigative rools such as fishbone diagrams, Pareto charts, and XY charts.
The last cask in a preliminary invescigarion is to prepare a report to management. The
report must include an estimate of time, staffing requirements, cosrs, benefits, and
expected results for the next phase of the SDLC.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _
.. ~ ........................._ .... ._
69
Chapter 2 Analyzing the Business Case
Key Terms
70
Ke y Te rms
biomclric de' kes A mech3ntSm used co uniquely identify a per~n by J rcuna scan or b> mJpping J
fa"al panern.
blod..-h.un A distributed ledger srstem. The technology underl}1ng B11corn.
bu'"''"'' ""'" Refer' to the rca>On>, or ju.cification, for a propo"11.
ca\c: for a•"l1on A part of the prd1m111ary 1n\'e>t1gat1on report to mdna11c:ment that \ummar11e> pro1c.t
rcque\r. and make> ,pcxific recommendation,.
computer resources commim~e A group oi key managers and users responsible for cvaluanng systems
requests. Inc rcrm "systems review commircee ~ is also used.
constraint A requirement or a condirion rhar rhe sysrem must satisf>' or an ourcomc chat 1he system muse
achieve.
critical \Uccc" focwrs Viral objectives that mu>t be achieved for rhe entcrpri>e m fulfill ir' mi,,,ion.
cu,ttuncr rdatiomhip nurna11ement (CRM) l\fany companie; implement 'Y'len1' to mtci;rotc all
cU\lomer·rdarcd event> and tran,action'> including mnrkcrin11, >ale,, and ""l<>mer wrvicc activitics.
discrc1i0Mry projects Where managemenr has a cboice in implementing a pro1ect, rhey arc c;11ied d1screrionJry. l·or example, cre:iring a new reporr for a user is .111 example of .1 discreuonary pro1ccr.
economic fcas1b1lit)' Achieved if the projecred benefits of rhe proposed system ou1we1gh rhc csrirnarcd
cosrs involved in acquiring, installing, and operating ir.
clcccrnnic darn interchange !EDT) The exchange of busine's document\ hctwccn compute" ll'ing a scan·
Jard clcctronk format.
dcuronic produu ~ode (EPCJ Technology char U!>l"> RFID la);) co idcntit) and monicor chc movement of
each 1nd1ndual product, from rhc factory Aoor ro the retail chc~kolll counter.
dcctron1c proof of dcli''l'f} (U'OO) A supplier uses RHD t.igs 011 e.ich cr.ite. case, or shipping unu ro
crearc J d1giral shipping hsr ro verify receipt oi goods.
cncrypuon A process where data is coded (oonverted into unrc.idable char.1cters) so char only those wnh
the required authorization can access the da1a.
fi,hhonc diagram \n analy-;is rool rhar represenrs rhe pos'>ible cau<e<> of a problem a< a graphical nm·
line. ""'.:ailed an bhikawa <liah'l"am.
intang1hlc hencfih Po\1ll•c ouKomcs that a~ difficult to mea~ure 1n dollars. Howc\'cr, intangible hcne·
fib can he very important m che calculation of economic fca>1b1hry. An c'<amplc of an intan111blc hen·
cfir m1ghr he a new wch<ite rhar improve-; a company'' ima11e.
intangible co-.s lrems that are difficulr ro measure in dollar remlS, such a~ employee d1~sa11~focnon.
ln1emc1 of Thing~ (IOT) Devices connected to one anorhcr over a computer nerwork.
j1M m·rimc (]TT) The exchange or dclh·ery of informanon when and where It i< needed. For c-camplc,
just·m·rimc 11wcntory sysrcms rely on compmer-co-compurer darn exchange rn minimize unncccs"3ry
111ven1ory.
111i,)io11 ~1a1c111cnt 1\ documcnr or >ratcmenr rbar <lc;c1·ibes 1hr.: company for Ill• stakeholder; and bricny
' rare' the company's overall purpose, produces, services, and value,.
nond1scrctionary pro1ccts Where managemem has no choice in 1mplemcnt111g a pro1ccr, they ore called
nond1screrionar)'· For example, adding a report required by a new fedcrJI law.
operational
fca~ib1lit)'
A •y,rcm char that will be used effecth•cly afrcr i1 has hccn developed.
Parero chart \vertical har graph named for a nineceench century economist. The bar<, which rcpre<cm
'arn>u., cau~e~ of a problem, are arranged in descending order, o;o rhe reJm can focu< on rhc mmr
11nport.1nt cau>e>.
prd1minal"} 10\C\llga11on An mmal :malysIS to clearly 1dennfy the namre and scope of the business
opportumry or problem. Al,o called a feasibilicy study.
~JD»(".............. .-\l ........... .,.... _.,."'flllll.~-....-..-"*-·,..,_o.:
.........,. _ _ .._ ......... ..,
..
..,,.........,..~_.......,_,_,_._....~~
...
...............
_ .... ~---11rt~
-,..~---~ ~
....._
.......... _ _ _ , _ • .......,.. ....................
C'ftlpll"&.-..,~fw
Phase I
Systems Planning
71
Key Terms
pro1cct cr•-ep !"he procco~ b> which projects with ,.et) general scope definirions exp.ind gradual!)." 11h·
out ~pcc1ftc .1u1horua11on.
proi«t \.:ope A ~pc..1fic dctcrmmanon of a pro1en's boundaries or extent.
\c.ttter diagram A tool u\cd hy 'Y'lem anal)\"' co graphicall) show the corrd;mon between two variabl~. Al'-<> c..1llcd an XY chart.
\cbcdulc fcas1biliry A proiect can be 1mplcmemed in an acceptable rune frame.
str.1t1:111c planomg Inc process o( 1dennfy1ng long-rerm orga nizanonal goals. s1rateg1es, and resource.
'iWOT analy\1' An c~ammarion of a company'• srreni,'ths (S), wcaknc•scs (W ), oppnrruni11c' (0), and
threat• (T).
\}'>tern\ rcquc•t A formal appeal m rhe IT departmem rhar describes problem\ or de\ired chanitc' in an
information •>''lean ur hu\lnes• proces;. Ti mighr propose t.>nham:emenl:!> for an exi;uni; 'Y>tem, the
corrcx:1iun of problem,, 01 the devdvpment vf an entirely new system.
systems renew commiuee A group of key nunagers and users responsible for cvalu.11mg systems
requests. The term computer resources committee is somerimes J!so used.
tangible benefit~ Pomivc o utcomes that can be measured in dollars. The)' can resulr from
expenses. an increase in revenues, or botb.
,1
decrc.1se 1n
tangible cmi. f.xpen•cs that haven ~pecific dollar value. Examples include employee o;al.iric• and hard
ware pun.. ha>c,.
U!thnital fca.,ihilil) \Vhcn an ori:ani1:1ri11n ha~ the resources to develop or purcha_,e, 1mtall, and operate
rhc ~JMcm.
101.il co~1 of o" ocrsh1p (TCO) A number used in assessing costs. which tndudes oogomg suppon .ind
numrenJnct costs, .1s well a~ acqu1sinon cosrs.
XY chart A tool used b> S)Stcm analysts 10 graphie<1lly show rhe corrcla1ion between mo \ar1.1hlcs. Also
called J scancr diagram.
~JD»(".............. .-\l ........... .,.... _.,."'flllll.~-....-..-"*-·,..,_o.:
.........,. _ _ .._ ......... ..,
..
..,,.........,..~_.......,_,_,_._....~~
...
...............
_ .... ~---11rt~
-,..~---~ ~
....._
.......... _ _ _ , _ • .......,.. ....................
C'ftlpll"&.-..,~fw
Chapter 2 Analyzing the Business Case
Exercises
72
Exercises
Questions
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Why should a S)'Stems analyst be interested in strategic planmng?
Lisr the four factors invoked in a S\'V'OT analysis.
Describe how CASE rools can support strategic planning.
List five que~tions rhe business case should answer.
What arc the six main reasons for sysrems requests?
Explain the two main factors affecting systems requescs.
Describe the role of rhc sy~rems review committee in processing systems requests.
Define operational, economic, technical, and schedule feasibility.
List seven questions the sysrcms analyst should consider when assessing project priorities.
What are rhe five seeps of :i prel iminary investigation?
Discussion Topics
1. One of your coworkers says, "Mission statements are nice, but rhey really don'r change things down
2.
3.
4.
5.
here where rhc work gets done." How would you reply?
Discuss how a company's financial status can affect systems projects.
The vice prc~idenr of accounting ~ays to you, the IT direcror, "This request procedure takes too long.
My people know what they are doing, and their systems requests are necessary and important." She
~uggcsts char the IT deparrmenr bypass rhe initial seeps and immediately get ro work on her requesrs.
What would you say ro her?
When setting prioriries for system requests, the highest priority goes to projects that provide rhe great·
e~t benefit, at the lowest cost, in rhe shortest period of time. H ow would you reconcile projects thar
can produce good results in che shorr rerm versus projects rbac can produce excellent resulcs in rhe
long term?
The final cask 1n rhe preliminar)' invesngation is to summan1e chc r~ults and recommendations in a
report and/o r 1n a presenrarion. Which form of communicarion, wrirren or oral, do you chink is rhe
most effci.-ri'e for come)·ing your findings co managemenc?
Projects
1. Use rhe lnrcrncr rn find rluec examples of corporare mission stacemcncs.
2. Prepare a SWOT anal)·sis of your school or your employer.
3. A mind map is a diagram used ro visua ll y organize information. ldencify a tool rhat supports the crcacion of mind maps and explain how they can be a valuable part of srraregic planning.
4. Visit che website for an IT magazine and find an article chac discusses business cases. Summarize rhe
article and what you learned from it.
5. Think of a problem you have experienced ar school or at work and draw a sample fishbone diagram
with at lease two levels.
r..,,...JID)r-..1-.. 4•11_.. • ...__. ~....... .,...~ • ........._ ......_.,.,.. o-... ..,._.,,.,.._..,.~ ,........., ................. .._... ..,.,...,.~"
................... ..., .......................... -..,.n..-.....-ik-sc~ c....,a..-.,.,....,. ..... 111>_... ........ _
.. ~ ........................._ .... ._
Download