CHAPTER 13: Acquiring Information Systems and Applications Chapter Outline 13.1 13.2 13.3 13.4 13.5 Planning for and Justifying IT Applications Strategies for Acquiring IT Applications The Traditional Systems Development Life Cycle Alternative Methods and Tools for Systems Development Vendor and Software Selection Learning Objectives 1. Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. 2. Discuss the four business decisions that companies must make when they acquire new applications. 3. Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. 4. Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. 5. Analyze the process of vendor and software selection. Teaching Tools and Tips This chapter discusses the process whereby an organization develops a new information system. I would suggest spending time discussing the opportunities and pitfalls of systems development. Among the key points is to ensure that students gain an appreciation for the human relations side of the process. Remind students that people are an extremely important component of any information system. Once a development project is underway, many people from different disciplines are involved in the effort. Emphasize that project management and communications skills are extremely important for this process to be successful. It is important that students understand that when companies are planning new information systems, sometimes the concerned parties hit a stone wall regarding development and implementation processes. Managers from different areas may have different (and often hidden) agendas for the new system. Some times these hidden agendas may not become apparent until it is too late. Spend some time describing how companies struggle to bring order to the system development life cycle (SDLC) process. In some cases companies actually allow their users to develop their own applications. Explain that these islands of information and private databases maintained by users must be integrated into a well-designed, enterprisewide information strategy. This is especially true in cases where IS failed to determine the applications that users should and should not develop, as well as the tools they should and should not use. Chapter 13: Acquiring Information Systems and Applications (4th edition) Page 2 Companies usually embark on a systematic development of information systems when they find out they are losing competitive advantage because they have an inefficient business process or no IS at all. In such cases, top management frequently initiates an impetus for change and throws their unwavering support behind the effort. Consequently, the project gets off to a great start. Unfortunately, this same sense of urgency causes project managers to take inappropriate shortcuts. It is imperative for top management to inform their employees that the project plan is the blueprint for successful development. A successful approach to systems development is to rely on modular methodology and to exercise sound technical judgment. The key to successful project completion, however, is human relations and communications techniques. Therefore, it is prudent to mix the study of information systems development with sociological and psychological topics! Review Questions Section 13.1 … Before you go on… 1. What are some problems associated with assessing the costs of IT? One problem is the allocation of fixed costs among different IT projects. Another difficulty is that system costs continue after the system is installed. It is important to calculate the Total Cost of Ownership – a formula for calculating the cost of acquiring, operating, and controlling an IT system. 2. What difficulties accompany the intangible benefits from IT? By definition, intangible benefits are very difficult to place an accurate monetary value on. It is important not to ignore these benefits, however, because they are real and are valuable to the organization. Therefore, they must be approximated. Overestimating the value of intangible benefits will cause organizations to initiate projects that do not produce the expected benefits. Conversely, underestimating their value can result in valuable projects being rejected. 3. Describe the NPV, ROI, breakeven analysis, and business case approaches. The NPV method compares the present value of a project’s cash inflows with the present value of its cash outflows, discounted at the organization’s cost of capital. An NPV that is $0 or greater suggests the project is acceptable. The ROI method computes a rate of return that is generated by the project based on the project’s net income divided by the average assets invested in the project. Breakeven analysis provides an estimated date when the money spent on the systems development process is recouped from the benefits earned in the business it is used in. Chapter 13: Acquiring Information Systems and Applications (4th edition) Page 3 A business case is a written document that is used by managers to garner funding for one or more specific applications or projects. Its major emphasis is the justification for a specific required investment. The business case helps to clarify how the organization can best use its resources to accomplish the IT strategy. Section 13.2 … Before you go on… 1. Describe the four fundamental business decisions that organizations must make when acquiring information systems. 1. How much computer code does the company want to write? A company can choose to use a totally pre-written application (to write no computer code); to customize a pre-written application (to write some computer code); or to custom-write an entire application (write all new computer code). 2. How will the company pay for the application? For pre-written and customized pre-written applications, the payment options are to buy or to lease. For complete custom applications, the company may use internal funding. 3. Where will the application run? The company may choose to run the application on the company’s own platform or on someone else’s platform (e.g., Software-as-a-Service vendor or an application service provider). 4. Where will the application originate? Pre-written applications can be open source or proprietary software (i.e., from a software vendor). These applications may be further customized in-house or outsourced. Completely customized applications can be either written in-house or outsourced. 2. Discuss each of the seven development methods in this section with regard to the four business decisions that organizations must make. Development Methods Amount Of Code Written None Funding/ Operating Payment Platform Owner Buy or Company’s Lease platform Customize a pre-written application Some Buy or Lease Lease the applications None Lease Application service providers and softwareas-a-service vendors None Lease Purchase a pre-written application Program Source Code Opensource or Proprietary Company’s Openplatform source or Proprietary Company’s or OpenVendor’s source or platform Proprietary Vendor’s Openplatform source or Proprietary Chapter 13: Acquiring Information Systems and Applications (4th edition) Use open-source software Outsourcing Some Custom development Most None Internal funding Internal funding Internal funding Company’s platform Company’s platform Company’s platform Page 4 Opensource Outsource In-house or outsource Section 13.3 … Before you go on… 1. Describe the feasibility study. The feasibility study involves defining the business problem or new opportunity, investigating options available for the best solution, making a recommendation and estimating the probability of success. 2. What is the difference between systems analysis and systems design? Systems analysis is the detailed study and documentation of the “as is” situation and the requirements for the new system. Systems design is the development of a technical specification that details the system inputs, outputs and interfaces as well as the hardware, software, databases, telecommunications, personnel and procedures needed to provide a solution for the requirements developed in the analysis stage. Systems design also provides a blueprint for integrating these various components. 3. Describe structured programming. Structured programming techniques are used to establish a uniform approach to programming that successive iterations of staff can understand. Each module has only one function. Each module has only one entrance and one exit. GO TO statements are not allowed. 4. What are the four conversion methods? Parallel - running old and new systems concurrently for a period of time. Direct – moving the new system into production at the same time the old system is being made inaccessible. Pilot – introducing the new system in one part of the organization, determining that it is stable, and then rolling it out to other areas. Phased – introducing select components of the new system in stages. When the organization determines that these components are stable, it rolls out other components. Chapter 13: Acquiring Information Systems and Applications (4th edition) Page 5 Section 13.4 … Before you go on… 1. Describe the tools that augment the traditional SDLC. Prototyping involves building a model of the system based on user feedback. It is an iterative approach that helps users visualize what the new system will look like. Joint application development (JAD) involves a meeting attended by all of the end users meeting and the IS project team to develop requirements and reach a consensus. It can save a lot of time, but it is intense, and it will work well only if all departments are represented. CASE tools are specialized tools that automate many of the tasks in the SDLC. Long-term maintenance on systems developed with CASE tools can be less expensive; however, initial development can cost more. Rapid application development is a systems development method that can combine JAD, prototyping, and ICASE tools to rapidly produce a high-quality system. In the first RAD stage, developers use JAD sessions to collect system requirements. This strategy ensures that users are intensively involved early on. The development process in RAD is iterative, similar to prototyping. That is, requirements, designs, and the system itself are developed and then undergo a series, or sequence, of improvements. RAD uses ICASE tools to quickly structure requirements and develop prototypes. As the prototypes are developed and refined, users review them in additional JAD sessions. RAD produces the functional components of a final system, rather than prototypes. 2. Describe the alternate methods that can be used for systems development, other than the SDLC. The two methods are end-user development and object-oriented development. End-user development is very popular today because of the availability and familiarity with small databases such as Access and spreadsheet applications. As long as these databases are relatively small and the users document what they have done, end-user development can work well. If not, the IS department is usually called on to rewrite and rework. Object-oriented development is based on a different view of computer systems. OO systems are based on the aspects of the real world that must be modeled to perform a task. Consequently, these systems can be used to perform related tasks that involve the same real-world entities. Section 13.5 … Before you go on… 1. List the major steps of selection of a vendor and a software package. a. Identify potential vendors b. Determine the evaluation criteria Chapter 13: Acquiring Information Systems and Applications (4th edition) c. d. e. f. Page 6 Evaluate vendors and packages Select a vendor and a package Negotiate a contract Establish a service-level agreement 2. Describe a request for proposal (RFP). A request for proposal (RFP) is a document that a company sends to potential vendors inviting them to submit a proposal that describes their software package and explains how it would meet the company’s needs. 3. Explain why SLAs play an important role in systems development. Service-level agreements are formal contracts that specify the division of work and responsibilities between vendors and the company. These divisions are based on a set of agreed-upon milestones, quality checks, and what-if situations – all of which need to be specified in the SLA. They describe how quality checks will be made and what is to be done in case disputes and quality standards are specified “IT’s About Business” Questions IT’s About Business 13.1 Anniston Orthopaedics and Greenway Medical Technologies 1. Would acquiring a new information system for a small organization be a longer or shorter process than acquiring one for a large organization? Why or why not? Support your answer. It some ways it may take longer due to the possible lack of understanding of the process, the systems, and the expectations of the acquiring organization. However, these factors can also speed up the process under some circumstances. 2. What is the purpose of the contract between the two parties? When acquiring a new information system, both parties (purchasing organization and service provider) normally sign a contract outlining the project scope and other aspects of the project. A typical contract for a system development project includes — but is not limited to — the final system functionalities, stakeholders and their responsibilities with proper contact information, reporting/communication channel for the project progress, system costs, service charges, training and consulting fees, payment terms and procedures, contract and system effective dates, conflict of interest, change orders procedures, implementation procedures and timeline, stakeholder penalty for violating the contract terms, project termination, insurance, and warranty. In this case, the contract will specify the responsibilities of both Anniston and Greenway. If the two parties cannot agree on terms, then Anniston must resume its search for a new IS vendor. Chapter 13: Acquiring Information Systems and Applications (4th edition) Page 7 IT’s About Business 13.2 A Disastrous Development Project 1. Debate the lawsuit from the point of view of Deloitte and SAP. Deloitte filed a counterclaim over Marin county’s failure to pay more than $550,000 in fees and interest. In its counterclaim, Deloitte maintained that it had fulfilled all of its obligations under the contract, as evidenced by the fact that all of Deloitte’s work was approved by the county officials who were responsible for the project. 2. Debate the lawsuit from the point of view of Marin County. The complaint alleged that Deloitte used the county’s SAP project as a training ground to provide young consultants with public sector SAP experience, at the county’s expense. Further, the complaint charged that Deloitte (1) intentionally failed to disclose its lack of SAP and public sector skills; (2) withheld information about critical project risks; (3) falsely represented to the county that the SAP system was ready to “go live” as originally planned; (4) conducted inadequate testing; and (5) concealed the fact that it had failed to perform necessary testing, thereby insuring that system defects would remain hidden prior to the “golive” date. The county further maintained that, despite the consulting fees it had paid to Deloitte, the system continued to experience crippling problems. IT’s About Business 13.3 The State of Virginia’s Outsourcing Contract Proves Costly 1. What are some reasons why Virginia’s IT problems can be considered the result of poor state oversight of Northrop Grumman? What are some reasons, if any, why the state might not be overseeing Northrop effectively? The IT problems at the State of Virginia could stem from the state’s — or, in this case, the VITA taskforce’s — poor agreement (i.e., contract) and inadequate oversight of the contractor. The project contract did not cover such items as backup or a disaster recovery plan. There is no penalty for Northrop Grumman if the project milestone is delayed or fails. Furthermore, the project scope is so large that a relatively small, 16-member VITA committee simply cannot oversee the entire $2.4 billion, 10-year project development for the state. 2. What are some reasons why Virginia’s IT problems can be considered the result of poor execution by Northrop Grumman? What are some reasons, if any, why Northrop might be executing this project poorly? Northrop Grumman did not have any prior experience. There was not a disaster recovery plan in effect in the event of a system outage. The state’s critical databases were backed up properly. Discussion Questions Chapter 13: Acquiring Information Systems and Applications (4th edition) Page 8 1. Discuss the advantages of a lease option over a buy option. Leasing has the advantages of lower upfront costs and more flexibility to change and adapt the applications used over time as needs change. 2. Why is it important for all business managers to understand the issues of IT resource acquisition? Because information systems are so critical to competitive advantage, a system’s timely and careful development is a very high priority. Systems acquisition and development is a team effort that should involve the entire organization. 3. Why is it important for everyone in business organizations to have a basic understanding of the systems development process? End users possess the business knowledge the IS staff needs to develop all of the components of the system’s design. For this reason, user input is critical to the acquisition and/or design of a successful IS. 4. Should prototyping be used on every systems development project? Why or why not? The SDLC provides the basic structure of the development process. Prototyping can be used within that structure to experiment with new technology or clarify requirements. It should not replace the traditional SDLC for highly complex systems. 5. Discuss the various types of feasibility studies. Why are they all needed? Technical, economic, behavioral, and organizational feasibilities are different facets of the analysis. Technical – determines if the current hardware and software platform is appropriate as well as whether the system should be developed in house or purchased from a vendor. Economic – determines if the project has an acceptable financial risk and whether the organization can afford it. Behavioral – determines if the corporate culture is open to the change. Organizational – determines whether the organization has any external issues that would preclude the project from being successful and whether the project meshes with the company’s strategic plan. 6. Discuss the issue of assessing intangible benefits and the proposed solutions. Chapter 13: Acquiring Information Systems and Applications (4th edition) Page 9 Intangible benefits are often very hard to quantify. IS staff responsible for the cost benefit analysis should collaborate with users of the system to place a value on the benefit, even if their analysis is less than scientific. Very often, it is the quantifying of the intangible benefit that will make the biggest impact on the decision to move ahead with a new system. 7. Discuss the reasons why end-user-developed information systems can be of poor quality. What can be done to improve this situation? Putting development tools in the hands of end-users can result in some very innovative work. One of the biggest problems, however, is that in many cases the end users do not know the most efficient way to design a system. Therefore, when working with a small amount of data, it may seem like everything is okay, but as soon as they try to function in a full-blown production environment, the application grinds to a halt or stops completely. One way that this problem can be avoided is through education. If, for example, the users know how to design a relational database, then, they have a better chance of developing an efficient application. Another way would be to have the applications run through a quality assurance process with IS to ensure that they are not only developing software that can be used, but also documenting their work. Problem-Solving Activities Students will research as directed and prepare a thoughtful report on their findings. 1. Access www.ecommerce-guide.com. Find the product review area. Read reviews of three software payment solutions. Assess the payment solutions as possible components. Students will visit the Web sites and look for reviews on three software payment solutions of their choice. Note that some product information was submitted by the company representatives and may not provide the “true” review of the product. 2. Use an Internet search engine to obtain information on CASE and ICASE tools. Select several vendors and compare and contrast their offerings. A list of CASE tool vendors can be found at this Web site http://www.unl.csi.cuny.edu/faqs/software-enginering/vendor.html. Students may choose a few vendors and compare and contrast their features. 3. Access www.ning.com, www.coghead.com, www.teglo.com, and www.dabbledb.com. Observe how each site provides components for you to use to build applications. Build a small application at each site. Ning is an educational network site that helps people integrate social media into education. Students will visit www.ning.com and learn how to use it to build an application. There are Chapter 13: Acquiring Information Systems and Applications (4th edition) Page 10 resources available in many different formats (e.g., printed information, blog, interactive demo, etc.) to help users get started. Note that dabbledb.com no longer provides support for its users. Web Activities Results of the various on-line activities should be organized into report format and submitted after research activities are completed. 1. Enter www.ibm.com/software. Find its WebSphere product. Read recent customers’ success stories. What makes this software so popular? Students will develop and submit or present a report on their findings. 2. Enter the Web sites of the GartnerGroup (www.gartnergroup.com), the Yankee Group (www.yankeegroup.com) and CIO (www.cio.com). Search for recent material about ASPs and outsourcing, and prepare a report on your findings. Students will develop and submit or present a report on their findings. 3. StoreFront (www.storefront.net) is a vendor of e-business software. At its site, the company provides demonstrations illustrating the types of storefronts that it can create for shoppers. The site also provides demonstrations of how the company’s software is used to create a store. a. Run the StoreFront demonstration to see how this is done. Students may need to register with the Web site in order to view the demo. b. What features does StoreFront provide? Features of the StoreFront e-commerce software include various software tools for store building, product management, order processing, marketing and promotions, shopper features, and store management. c. Does StoreFront support smaller or larger stores? The software provides services for smaller stores with additional add-on modules for larger stores. d. What other products does StoreFront offer for creating online stores? What types of stores do these products support? In addition to software solutions, StoreFront offers services that help customers build e-commerce stores including design, custom development, marketing, setup and implementation, training, hosting, payment processing, and support. Click the View Client Gallery link to see examples of client applications. Chapter 13: Acquiring Information Systems and Applications (4th edition) Page 11 Team Assignments 1. Assessing the functionality of an application is part of the planning process (Step 1) Select three to five Web sites that cater to the same type of buyer (for instance several Web sites that offer CDs or computer hardware), and divide the sites among the teams. Each team will assess the functionality of its assigned Web site by preparing an analysis of the different sorts of functions provided by the sites. In addition, the team should compare the strong and weak points of each site from the buyer’s perspective. Students will follow the directions for the group project. Note that students will have to search the Internet to locate information, and some Web sites might require them to register and provide contact information. 2. Divide into groups, with each group visiting a local company (include your university). At each firm, study the systems acquisition process. Find out the methodology or methodologies used by each organization and the type of application each methodology applies. Prepare a report and present it to the class. Students will research and develop report on their findings. 3. As a group, design an information system for a startup business of your choice. Describe your chosen IT resource acquisition strategy, and justify your choices of hardware, software, telecommunications support, and other aspects of a proposed system. Students will follow the directions for the group project. The project outcome may include a written report (e.g., a project proposal), a class presentation, or both. To help students prepare for the presentation, set up a scenario where the city has some funding to help a local startup business. Each project team is working for a local company. Stage the presentation as though the groups are presenting the selected company’s information system to the city’s Board of Commerce as a part of the city grant/funding application process. Closing Case The City of Lincoln, Nebraska: Developing Systems for the Taxpayers The Business Problem The City of Lincoln and the County of Lancaster, Nebraska, have a history of innovative systems development projects. In 2001, the municipality deployed Palm handheld computers to its animal control officers in an effort to streamline the processes involved in managing the area’s growing pet population. The initial deployment was very successful and provided the animal control officers with real-time access to a wealth of useful field information, including contact information for pet owners, vaccination data, bite and attack history, previous dispatch history, citations written, and impoundment data. Chapter 13: Acquiring Information Systems and Applications (4th edition) Page 12 As a growing city/county government, Lincoln/Lancaster was concerned about providing the highest level of governmental services possible given its specific budgetary constraints. In 2008, the City and County wanted to again effectively use technology, this time involving the city police, county sheriffs, and firefighters. The IT Solution The Lincoln/Lancaster government’s IT staff undertook an enterprise-wide systems development project that would enable the governmental staff and citizens to utilize smartphones to access a variety of governmental services. The initial project was the development of a smartphoneenabled system for parking services. Follow-up projects subsequently expanded into the sanitation and weed control departments. In addition, the city/county government developed a multi-use web portal to serve two purposes. First, the portal facilitates employee access to email and calendaring systems. Second, the portal provides citizens with realtime access to animal tag lookup, fire runs, property tax information, a geographical information system (GIS) for navigating the area’s streets, 29 traffic cameras, and a lookup service for government employee phone numbers. The system also enables smartphone subscribers to receive real-time alerts from the National Weather Service, the Department of Homeland Security, and Amber Alerts (missing persons) from the State of Nebraska. For the first time, the local police, fire, sheriff, public health officials, and emergency coordinators can send needed information within seconds to desktops or smartphones. The Results Citizens’ responses to the systems developed by the Lincoln/Lancaster government and deployed via smartphones have been very positive. In a recent ranking published by the Center for Digital Government, Lincoln/Lancaster was ranked the second most technologically progressive municipal/county government in the United States. Questions 1. Is this use of information technology an appropriate use of tax-payer dollars? Why or why not? The technology based projects have enabled the city to provide better service to the tax payers and also made the city employees more efficient in their job. These benefits can be quantified in financial terms and show that the tax payers are benefiting from these projects. So, these projects are appropriate use of tax payer dollars. 2. Can you think of any other possible uses for this type of technology in local or state government? There are many potential projects. Involving the citizens in the governance process and means of interacting with the city are useful projects that can be based on technology.