SlideShare una empresa de Scribd logo
1 de 29
Systems Analysis and Design
CIS 2303
Learning Outcome 1:
Describe the evolution of software development with emphasis
on the processes that outline different methodologies. - Ch. 1
Learning Objectives
1. Introduction to Information Systems
 Discuss the impact of information technology on
business strategy and success
 Define an information system and describe its
components
 Explain how profiles and models can represent
business functions and operations
2. Systems Development Methods
3. Overview of Structured Analysis and
SDLC
4. SDLC MODEL Phases
2
1. Introduction to Information Systems
A. Chapter Introduction Case: Mountain View College
Bookstore
B. Discuss the impact of information technology on
business strategy and success
C. What is IT?
D. What is Systems analysis and design?
E. Define an information system and describe its
components
F. Explain how profiles and models can represent
business functions and operations
3
B. Impact of IT on business strategies
• Companies use
information as a
weapon in the battle to
increase productivity,
deliver quality
products and services,
maintain customer
loyalty, and make
sound decisions
• Information technology
can mean the
difference between
success and failure
• Figure 1-1
4
C. What is IT?
 Information Technology (IT)
◦ Combination of ___________and
___________ products and ___________
that ___________ use to manage, access,
communicate, and share ____________
5
companies hardwar
e
informatio
n
softwar
e
service
s
D. Systems Analysis and Design
 Systems Analysis and Design
 Step-by-step process for developing high-
quality information systems
 Roles of the Systems Analyst
 Plan, develop, and maintain information
systems
 See the next slides to have a detailed
list of the Systems analyst.
6
Roles of the Systems Analyst
 The primary objective of any system analyst
is to identify the need of the organization by
acquiring information by various means and
methods.
 The system analyst has to coordinate with
the:
◦ _________________,
◦ _________________,
◦ ___________________________________
____________________________________.
 Following are the tasks performed by the
systems analyst:
7
Tasks Performed By the Systems Analyst
Defining Requirement:
Prioritizing Requirements
Gathering Facts, data and
opinions of Users
Evaluation and Analysis
Drawing Specifications
8
Defining Requirement:
 The basic step for any system analyst
is to understand the requirements of
the users. This is achieved by various
fact finding techniques like:
◦ interviewing,
◦ observation,
◦ questionnaire
◦ etc.
9
Prioritizing Requirements
 Number of users use the system in the
organization, and each one has a
different requirement and retrieves
different information.
 Due to certain limitations in computing
capacity it may not be possible to satisfy
the needs of all the users.
 Hence it is important to create list of
priorities according to users
requirements.
10
Gathering Facts, data and opinions of
Users
 After determining the necessary needs
and collecting useful information, the
analyst starts the development of the
system with active cooperation from the
users of the system.
 Time to time, the users update the
analyst with the necessary information
for developing the system.
 The analyst while developing the system
continuously consults the users and
acquires their views and opinions.
11
Discussion
 As a System’s Analyst, why do you need to
continuously consult the users and acquires
their views and opinions?
Evaluation and Analysis
 The analyst must constantly change
and modify the system to make it
better and more user friendly for the
users
13
Drawing Specifications
 The analyst must draw certain
specifications which will be useful for
the manager.
 The analyst should lay the
specification which can be easily
understood by the manager and they
should be purely non-technical.
 The specifications must be in detailed
and in well presented form
14
E. Information System Components
• Information systems have five key
components:
• hardware,
• software,
• data,
• processes, and
• People
15
E. Information System Components –Cont.
1. Hardware
◦ Is the physical layer of the information
system
◦ Moore’s Law
2. Software
◦ System software
◦ Application software
16
E. Information System Components –Cont.
3. Data
◦ Tables store data
◦ Linked tables work
together to supply
data
17
E. Information System Components –Cont.
4. Processes
◦ Describe the tasks
and business
functions that
users, managers, an
d IT staff members
perform to achieve
specific results
5. People
◦ Stakeholders
◦ Users, or end users
18
Information System Components
Exercise
Microsoft
Windows
Number of
Hours Worked
Register a
Student
Microsoft Excel
Storage Server Withdraw Cash
System Users Employee No
Hardware
Software
Data
Processes
People
19
2. Systems Development Methods
 Systems Development Methods
◦ Structured Analysis
◦ Object-Oriented Analysis
◦ Agile/adaptive methods
In this course, we will only concentrate on
the Structured Analysis.
20
3. Overview of Structured Analysis
and SDLC Model
 A traditional systems development technique that is
time-tested and easy to understand.
 Uses a series of phases, called the systems
development life cycle (SDLC ), to plan, analyze,
design, implement, and support an information
system.
 A Predictive approach
 Structured analysis is called a process-centered
technique
21
3. Overview of Structured Analysis
and SDLC Model –Cont.
 In the waterfall model , the result of each phase is
called a deliverable , or end product , which flows
into the next phase.
 Disadvantage in the built-in structure of the SDLC,
because the waterfall model does not emphasize
interactivity among the phases
 This criticism can be valid if the SDLC phases are
followed too rigidly
 Adjacent phases usually interact
 See Figure 1-27
22
4. SDLC MODEL Phases
The SDLC model usually includes five
steps
1) Systems planning
2) Systems analysis
3) Systems design
4) Systems implementation
5) Systems support and security
See Figure 1-27 in the next slide
23
Figure 1-27: SDLC – The Waterfall
Model
24
Phase 1
Systems planning
Phase 2
Systems Analysis
Phase 3
Systems Design
Phase 4
Implementation
Phase 5
Operation, Support
& Security
Planning and Modeling
a Systems Development Project
 Systems planning
◦ Systems request
◦ Purpose of this phase is to perform a
preliminary investigation whose key part is a
feasibility study
 Systems Analysis
◦ The purpose is to build a logical model of the
new system.
◦ The first step is requirements modeling ,
where you investigate business processes and
document what the new system must do to
satisfy users.
◦ Requirements modeling continues the
investigation that began during the systems
planning phase.
◦ Deliverable is the System requirements
document which describes management and
Preliminary
Investigation
Report
System
Requirements
Document
Planning and Modeling
a Systems Development Project
 Systems Design
◦ The purpose is to create a physical model that will satisfy
all documented requirements for the system.
◦ At this stage, you design the user interface and identify
necessary outputs, inputs, and processes
◦ Deliverable is system design specification
◦ Management and user involvement is critical
 Systems Implementation
◦ New system is constructed
◦ Programs are written, tested, and documented, and the
system is installed
◦ The objective is to deliver a completely functioning and
documented information system
◦ Final preparations include converting data to the new
system's files and training users
◦ This stage also includes an assessment, called a systems
evaluation
System
Design
Specs
Functional
IS
Planning and Modeling
a Systems Development Project
 Systems
Operation, Support, and
Security
◦ A well-designed system must be
secure, reliable, maintainable, and
scalable
◦ After several years of
operation, systems need extensive
changes
◦ During this phase, the IT staff
maintains, enhances, and protects the
system
◦ Security controls safeguard the
system from both external and internal
threats
Operational
IS
 I am designing the user interface of the system and the
database that the system will use to store the user’s
data! (______________________)
 I am gathering the system requirements of the user
through interviews, questionnaires, and observation at
work! (______________________)
 I am adding more forms and reports to the system that
users asked me to add because they have new
requirements!
(______________________)
 I am doing a Preliminary Investigation and a Feasibility
Study to investigate the “Worthiness” of the proposed
system! (______________________)
 I am writing the programming code of the system!
(______________________) 28
Which SDLC Model Phase am I in?!
Review Questions
(Answer on BB-Learn)
 What is IT, and why is it important to a
business?
 What is the role of the System Analyst?
 What are three different Systems
Development Methods?
 What are the different functions of a
business?
 What are the phases of the SDLC?
 What are the different activities within an IT
department?
 What is an IS, and what are its components?

Más contenido relacionado

La actualidad más candente

Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement AnalysisSADEED AMEEN
 
SYSTEM ANALYSIS AND DESIGN Assignment help
SYSTEM ANALYSIS AND DESIGN Assignment helpSYSTEM ANALYSIS AND DESIGN Assignment help
SYSTEM ANALYSIS AND DESIGN Assignment helpjohn mayer
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Chapter17 system implementation
Chapter17 system implementationChapter17 system implementation
Chapter17 system implementationDhani Ahmad
 
System engineering
System engineeringSystem engineering
System engineeringLisa Elisa
 
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptxChapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptxanumayived
 
Information system implementation, change management and control
Information system implementation, change management and controlInformation system implementation, change management and control
Information system implementation, change management and controlShruti Pendharkar
 
HCI - Chapter 3
HCI - Chapter 3HCI - Chapter 3
HCI - Chapter 3Alan Dix
 
Decision tree- System analysis and design
Decision tree- System analysis and designDecision tree- System analysis and design
Decision tree- System analysis and designProf.Nilesh Magar
 
System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)Showkot Usman
 
System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)fentrekin
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship DiagramShakila Mahjabin
 
Chapter 1 - Introduction to System Integration and Architecture.pdf
Chapter 1 - Introduction to System Integration and Architecture.pdfChapter 1 - Introduction to System Integration and Architecture.pdf
Chapter 1 - Introduction to System Integration and Architecture.pdfKhairul Anwar Sedek
 
Role of system analyst
Role of system analystRole of system analyst
Role of system analystShaileshModi9
 
analysis and design of information system
analysis and design of information systemanalysis and design of information system
analysis and design of information systemRenu Sharma
 
Systems Analysis And Design 2
Systems Analysis And Design 2Systems Analysis And Design 2
Systems Analysis And Design 2MISY
 
HCI - Chapter 1
HCI - Chapter 1HCI - Chapter 1
HCI - Chapter 1Alan Dix
 

La actualidad más candente (20)

Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement Analysis
 
SYSTEM ANALYSIS AND DESIGN Assignment help
SYSTEM ANALYSIS AND DESIGN Assignment helpSYSTEM ANALYSIS AND DESIGN Assignment help
SYSTEM ANALYSIS AND DESIGN Assignment help
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Chapter17 system implementation
Chapter17 system implementationChapter17 system implementation
Chapter17 system implementation
 
System engineering
System engineeringSystem engineering
System engineering
 
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptxChapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
Chapter 1- INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN by DEEPA (1).pptx
 
Behavioural modelling
Behavioural modellingBehavioural modelling
Behavioural modelling
 
Information system implementation, change management and control
Information system implementation, change management and controlInformation system implementation, change management and control
Information system implementation, change management and control
 
HCI - Chapter 3
HCI - Chapter 3HCI - Chapter 3
HCI - Chapter 3
 
Decision tree- System analysis and design
Decision tree- System analysis and designDecision tree- System analysis and design
Decision tree- System analysis and design
 
System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)
 
System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
 
Chapter 1 - Introduction to System Integration and Architecture.pdf
Chapter 1 - Introduction to System Integration and Architecture.pdfChapter 1 - Introduction to System Integration and Architecture.pdf
Chapter 1 - Introduction to System Integration and Architecture.pdf
 
SDLC Models
SDLC ModelsSDLC Models
SDLC Models
 
Role of system analyst
Role of system analystRole of system analyst
Role of system analyst
 
8 system models (1)
8 system models (1)8 system models (1)
8 system models (1)
 
analysis and design of information system
analysis and design of information systemanalysis and design of information system
analysis and design of information system
 
Systems Analysis And Design 2
Systems Analysis And Design 2Systems Analysis And Design 2
Systems Analysis And Design 2
 
HCI - Chapter 1
HCI - Chapter 1HCI - Chapter 1
HCI - Chapter 1
 

Destacado

CIS 2303: System Planning Part 1
CIS 2303: System Planning Part 1CIS 2303: System Planning Part 1
CIS 2303: System Planning Part 1Ahmad Ammari
 
CIS 2303 LO2 Part 2
CIS 2303 LO2 Part 2CIS 2303 LO2 Part 2
CIS 2303 LO2 Part 2Ahmad Ammari
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and DesignJoel Briza
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and DesignAamir Abbas
 
Cis 2303 lo1 part 1_weeks_1_2 - student ver
Cis 2303 lo1 part 1_weeks_1_2 - student verCis 2303 lo1 part 1_weeks_1_2 - student ver
Cis 2303 lo1 part 1_weeks_1_2 - student verAhmad Ammari
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)raszky
 
A&D - Introduction to Analysis & Design of Information System
A&D - Introduction to Analysis & Design of Information SystemA&D - Introduction to Analysis & Design of Information System
A&D - Introduction to Analysis & Design of Information Systemvinay arora
 
System Analysis And Design 2011
System Analysis And Design  2011System Analysis And Design  2011
System Analysis And Design 2011tgushi12
 
Libary management system
Libary management system Libary management system
Libary management system praladh timsina
 
Structure system analysis and design method -SSADM
Structure system analysis and design method -SSADMStructure system analysis and design method -SSADM
Structure system analysis and design method -SSADMFLYMAN TECHNOLOGY LIMITED
 
System Analysis and Design slides by Belew yenealem DTU Ethiopia
System Analysis and Design slides by Belew yenealem DTU EthiopiaSystem Analysis and Design slides by Belew yenealem DTU Ethiopia
System Analysis and Design slides by Belew yenealem DTU EthiopiaDebre Tabor University
 
System analysis and design Part2
System analysis and design Part2System analysis and design Part2
System analysis and design Part2Joel Briza
 
Chapter 8 system analysis and design
Chapter 8   system analysis and designChapter 8   system analysis and design
Chapter 8 system analysis and designPratik Gupta
 
Final presentation of tools and techniques of structure analysis (Management ...
Final presentation of tools and techniques of structure analysis (Management ...Final presentation of tools and techniques of structure analysis (Management ...
Final presentation of tools and techniques of structure analysis (Management ...Rohan Naik
 
System Development Life Cycle & Implementation of MIS
System Development Life Cycle & Implementation of MISSystem Development Life Cycle & Implementation of MIS
System Development Life Cycle & Implementation of MISGeorge V James
 
Kajian literatur
Kajian literaturKajian literatur
Kajian literaturDwi Karyani
 

Destacado (20)

CIS 2303: System Planning Part 1
CIS 2303: System Planning Part 1CIS 2303: System Planning Part 1
CIS 2303: System Planning Part 1
 
CIS 2303 LO2 Part 2
CIS 2303 LO2 Part 2CIS 2303 LO2 Part 2
CIS 2303 LO2 Part 2
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
Cis 2303 lo1 part 1_weeks_1_2 - student ver
Cis 2303 lo1 part 1_weeks_1_2 - student verCis 2303 lo1 part 1_weeks_1_2 - student ver
Cis 2303 lo1 part 1_weeks_1_2 - student ver
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)
 
A&D - Introduction to Analysis & Design of Information System
A&D - Introduction to Analysis & Design of Information SystemA&D - Introduction to Analysis & Design of Information System
A&D - Introduction to Analysis & Design of Information System
 
System Analysis And Design 2011
System Analysis And Design  2011System Analysis And Design  2011
System Analysis And Design 2011
 
Libary management system
Libary management system Libary management system
Libary management system
 
Structure system analysis and design method -SSADM
Structure system analysis and design method -SSADMStructure system analysis and design method -SSADM
Structure system analysis and design method -SSADM
 
System Analysis and Design slides by Belew yenealem DTU Ethiopia
System Analysis and Design slides by Belew yenealem DTU EthiopiaSystem Analysis and Design slides by Belew yenealem DTU Ethiopia
System Analysis and Design slides by Belew yenealem DTU Ethiopia
 
System analysis and design Part2
System analysis and design Part2System analysis and design Part2
System analysis and design Part2
 
Chapter 8 system analysis and design
Chapter 8   system analysis and designChapter 8   system analysis and design
Chapter 8 system analysis and design
 
Final presentation of tools and techniques of structure analysis (Management ...
Final presentation of tools and techniques of structure analysis (Management ...Final presentation of tools and techniques of structure analysis (Management ...
Final presentation of tools and techniques of structure analysis (Management ...
 
System Development Life Cycle & Implementation of MIS
System Development Life Cycle & Implementation of MISSystem Development Life Cycle & Implementation of MIS
System Development Life Cycle & Implementation of MIS
 
Kajian literatur
Kajian literaturKajian literatur
Kajian literatur
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
Russian Neurosurgical Journal; Volume 3, No. 2, 2011
Russian Neurosurgical Journal; Volume 3, No. 2, 2011Russian Neurosurgical Journal; Volume 3, No. 2, 2011
Russian Neurosurgical Journal; Volume 3, No. 2, 2011
 
Neurocirugía; Marzo 2011, Volume 16
Neurocirugía; Marzo 2011, Volume 16Neurocirugía; Marzo 2011, Volume 16
Neurocirugía; Marzo 2011, Volume 16
 
My EduWorld
My EduWorld My EduWorld
My EduWorld
 

Similar a CIS 2303 LO1: Introduction to System Analysis and Design

PTTKHTTT_part 1.pdf
PTTKHTTT_part 1.pdfPTTKHTTT_part 1.pdf
PTTKHTTT_part 1.pdfTmTri
 
Unit 2 Classical Systems Development Methodology.pptx
Unit 2 Classical Systems Development Methodology.pptxUnit 2 Classical Systems Development Methodology.pptx
Unit 2 Classical Systems Development Methodology.pptxVrundaPatadia
 
Mis system analysis and system design
Mis   system analysis and system designMis   system analysis and system design
Mis system analysis and system designRahul Hedau
 
2015-HNDIT1212 Lecture 3.pptx
2015-HNDIT1212  Lecture 3.pptx2015-HNDIT1212  Lecture 3.pptx
2015-HNDIT1212 Lecture 3.pptxusama537223
 
management system development and planning
management system development and planningmanagement system development and planning
management system development and planningmilkesa13
 
System Analysis and Design Project documentation
System Analysis and Design Project documentationSystem Analysis and Design Project documentation
System Analysis and Design Project documentationMAHERMOHAMED27
 
Software Development Life Cycle & Its Models
Software Development Life Cycle & Its ModelsSoftware Development Life Cycle & Its Models
Software Development Life Cycle & Its ModelsDr.Purushottam Petare
 
Information Systems Development.pptx
Information Systems Development.pptxInformation Systems Development.pptx
Information Systems Development.pptxOsamaRehman10
 
mis ch2.pptx
mis ch2.pptxmis ch2.pptx
mis ch2.pptxTeshome48
 
Class - Approaches to the development of information systems
Class - Approaches to the development of information systemsClass - Approaches to the development of information systems
Class - Approaches to the development of information systemsJonathanCovena1
 
lake city institute of technology
lake city institute of technology lake city institute of technology
lake city institute of technology RaviKalola786
 
mis ch2.pptx
mis ch2.pptxmis ch2.pptx
mis ch2.pptxhabte11
 
Software Development Life Cycle (SDLC).pptx
Software Development Life Cycle (SDLC).pptxSoftware Development Life Cycle (SDLC).pptx
Software Development Life Cycle (SDLC).pptxsandhyakiran10
 
Information Systems Development and Acquisition
Information Systems Development and AcquisitionInformation Systems Development and Acquisition
Information Systems Development and AcquisitionYonathan Hadiputra
 
system development life cycle
system development life cyclesystem development life cycle
system development life cycleSuhleemAhmd
 

Similar a CIS 2303 LO1: Introduction to System Analysis and Design (20)

PTTKHTTT_part 1.pdf
PTTKHTTT_part 1.pdfPTTKHTTT_part 1.pdf
PTTKHTTT_part 1.pdf
 
System analysis 1
System analysis 1System analysis 1
System analysis 1
 
Sdlc1
Sdlc1Sdlc1
Sdlc1
 
Presentation2
Presentation2Presentation2
Presentation2
 
Unit 2 Classical Systems Development Methodology.pptx
Unit 2 Classical Systems Development Methodology.pptxUnit 2 Classical Systems Development Methodology.pptx
Unit 2 Classical Systems Development Methodology.pptx
 
Mis system analysis and system design
Mis   system analysis and system designMis   system analysis and system design
Mis system analysis and system design
 
Lec01.pptx
Lec01.pptxLec01.pptx
Lec01.pptx
 
2015-HNDIT1212 Lecture 3.pptx
2015-HNDIT1212  Lecture 3.pptx2015-HNDIT1212  Lecture 3.pptx
2015-HNDIT1212 Lecture 3.pptx
 
management system development and planning
management system development and planningmanagement system development and planning
management system development and planning
 
System Analysis and Design Project documentation
System Analysis and Design Project documentationSystem Analysis and Design Project documentation
System Analysis and Design Project documentation
 
Software Development Life Cycle & Its Models
Software Development Life Cycle & Its ModelsSoftware Development Life Cycle & Its Models
Software Development Life Cycle & Its Models
 
Information Systems Development.pptx
Information Systems Development.pptxInformation Systems Development.pptx
Information Systems Development.pptx
 
mis ch2.pptx
mis ch2.pptxmis ch2.pptx
mis ch2.pptx
 
Class - Approaches to the development of information systems
Class - Approaches to the development of information systemsClass - Approaches to the development of information systems
Class - Approaches to the development of information systems
 
S D L C
S D L CS D L C
S D L C
 
lake city institute of technology
lake city institute of technology lake city institute of technology
lake city institute of technology
 
mis ch2.pptx
mis ch2.pptxmis ch2.pptx
mis ch2.pptx
 
Software Development Life Cycle (SDLC).pptx
Software Development Life Cycle (SDLC).pptxSoftware Development Life Cycle (SDLC).pptx
Software Development Life Cycle (SDLC).pptx
 
Information Systems Development and Acquisition
Information Systems Development and AcquisitionInformation Systems Development and Acquisition
Information Systems Development and Acquisition
 
system development life cycle
system development life cyclesystem development life cycle
system development life cycle
 

Más de Ahmad Ammari

CIS 2303 LO3 Process Modeling
CIS 2303 LO3 Process ModelingCIS 2303 LO3 Process Modeling
CIS 2303 LO3 Process ModelingAhmad Ammari
 
CIS 2303 LO2 Part 3
CIS 2303 LO2 Part 3CIS 2303 LO2 Part 3
CIS 2303 LO2 Part 3Ahmad Ammari
 
ITEC N466: Project initialization
ITEC N466: Project initializationITEC N466: Project initialization
ITEC N466: Project initializationAhmad Ammari
 
Challenges in is development
Challenges in is developmentChallenges in is development
Challenges in is developmentAhmad Ammari
 
CIB 3103: Requirements Capture
CIB 3103: Requirements CaptureCIB 3103: Requirements Capture
CIB 3103: Requirements CaptureAhmad Ammari
 
Itecn453 social media
Itecn453 social mediaItecn453 social media
Itecn453 social mediaAhmad Ammari
 
Itecn453 cloud computing
Itecn453 cloud computingItecn453 cloud computing
Itecn453 cloud computingAhmad Ammari
 
Itec410 e busness_case_lec
Itec410 e busness_case_lecItec410 e busness_case_lec
Itec410 e busness_case_lecAhmad Ammari
 
Itecn453 it infrastructure
Itecn453 it infrastructureItecn453 it infrastructure
Itecn453 it infrastructureAhmad Ammari
 
Itecn453 porter competitive_forces_model
Itecn453 porter competitive_forces_modelItecn453 porter competitive_forces_model
Itecn453 porter competitive_forces_modelAhmad Ammari
 
Itecn453 business strategy
Itecn453 business strategyItecn453 business strategy
Itecn453 business strategyAhmad Ammari
 
Itecn453 organizations student_ver
Itecn453 organizations student_verItecn453 organizations student_ver
Itecn453 organizations student_verAhmad Ammari
 

Más de Ahmad Ammari (13)

CIS 2303 LO3 Process Modeling
CIS 2303 LO3 Process ModelingCIS 2303 LO3 Process Modeling
CIS 2303 LO3 Process Modeling
 
CIS 2303 LO2 Part 3
CIS 2303 LO2 Part 3CIS 2303 LO2 Part 3
CIS 2303 LO2 Part 3
 
ITEC N466: Project initialization
ITEC N466: Project initializationITEC N466: Project initialization
ITEC N466: Project initialization
 
Challenges in is development
Challenges in is developmentChallenges in is development
Challenges in is development
 
CIB 3103: Requirements Capture
CIB 3103: Requirements CaptureCIB 3103: Requirements Capture
CIB 3103: Requirements Capture
 
Itecn453 social media
Itecn453 social mediaItecn453 social media
Itecn453 social media
 
Itecn453 cloud computing
Itecn453 cloud computingItecn453 cloud computing
Itecn453 cloud computing
 
Itec410 e busness_case_lec
Itec410 e busness_case_lecItec410 e busness_case_lec
Itec410 e busness_case_lec
 
Itecn453 it infrastructure
Itecn453 it infrastructureItecn453 it infrastructure
Itecn453 it infrastructure
 
Itecn453 porter competitive_forces_model
Itecn453 porter competitive_forces_modelItecn453 porter competitive_forces_model
Itecn453 porter competitive_forces_model
 
Itecn453 business strategy
Itecn453 business strategyItecn453 business strategy
Itecn453 business strategy
 
Itecn453 organizations student_ver
Itecn453 organizations student_verItecn453 organizations student_ver
Itecn453 organizations student_ver
 
Itec410 lec2
Itec410 lec2Itec410 lec2
Itec410 lec2
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

CIS 2303 LO1: Introduction to System Analysis and Design

  • 1. Systems Analysis and Design CIS 2303 Learning Outcome 1: Describe the evolution of software development with emphasis on the processes that outline different methodologies. - Ch. 1
  • 2. Learning Objectives 1. Introduction to Information Systems  Discuss the impact of information technology on business strategy and success  Define an information system and describe its components  Explain how profiles and models can represent business functions and operations 2. Systems Development Methods 3. Overview of Structured Analysis and SDLC 4. SDLC MODEL Phases 2
  • 3. 1. Introduction to Information Systems A. Chapter Introduction Case: Mountain View College Bookstore B. Discuss the impact of information technology on business strategy and success C. What is IT? D. What is Systems analysis and design? E. Define an information system and describe its components F. Explain how profiles and models can represent business functions and operations 3
  • 4. B. Impact of IT on business strategies • Companies use information as a weapon in the battle to increase productivity, deliver quality products and services, maintain customer loyalty, and make sound decisions • Information technology can mean the difference between success and failure • Figure 1-1 4
  • 5. C. What is IT?  Information Technology (IT) ◦ Combination of ___________and ___________ products and ___________ that ___________ use to manage, access, communicate, and share ____________ 5 companies hardwar e informatio n softwar e service s
  • 6. D. Systems Analysis and Design  Systems Analysis and Design  Step-by-step process for developing high- quality information systems  Roles of the Systems Analyst  Plan, develop, and maintain information systems  See the next slides to have a detailed list of the Systems analyst. 6
  • 7. Roles of the Systems Analyst  The primary objective of any system analyst is to identify the need of the organization by acquiring information by various means and methods.  The system analyst has to coordinate with the: ◦ _________________, ◦ _________________, ◦ ___________________________________ ____________________________________.  Following are the tasks performed by the systems analyst: 7
  • 8. Tasks Performed By the Systems Analyst Defining Requirement: Prioritizing Requirements Gathering Facts, data and opinions of Users Evaluation and Analysis Drawing Specifications 8
  • 9. Defining Requirement:  The basic step for any system analyst is to understand the requirements of the users. This is achieved by various fact finding techniques like: ◦ interviewing, ◦ observation, ◦ questionnaire ◦ etc. 9
  • 10. Prioritizing Requirements  Number of users use the system in the organization, and each one has a different requirement and retrieves different information.  Due to certain limitations in computing capacity it may not be possible to satisfy the needs of all the users.  Hence it is important to create list of priorities according to users requirements. 10
  • 11. Gathering Facts, data and opinions of Users  After determining the necessary needs and collecting useful information, the analyst starts the development of the system with active cooperation from the users of the system.  Time to time, the users update the analyst with the necessary information for developing the system.  The analyst while developing the system continuously consults the users and acquires their views and opinions. 11
  • 12. Discussion  As a System’s Analyst, why do you need to continuously consult the users and acquires their views and opinions?
  • 13. Evaluation and Analysis  The analyst must constantly change and modify the system to make it better and more user friendly for the users 13
  • 14. Drawing Specifications  The analyst must draw certain specifications which will be useful for the manager.  The analyst should lay the specification which can be easily understood by the manager and they should be purely non-technical.  The specifications must be in detailed and in well presented form 14
  • 15. E. Information System Components • Information systems have five key components: • hardware, • software, • data, • processes, and • People 15
  • 16. E. Information System Components –Cont. 1. Hardware ◦ Is the physical layer of the information system ◦ Moore’s Law 2. Software ◦ System software ◦ Application software 16
  • 17. E. Information System Components –Cont. 3. Data ◦ Tables store data ◦ Linked tables work together to supply data 17
  • 18. E. Information System Components –Cont. 4. Processes ◦ Describe the tasks and business functions that users, managers, an d IT staff members perform to achieve specific results 5. People ◦ Stakeholders ◦ Users, or end users 18
  • 19. Information System Components Exercise Microsoft Windows Number of Hours Worked Register a Student Microsoft Excel Storage Server Withdraw Cash System Users Employee No Hardware Software Data Processes People 19
  • 20. 2. Systems Development Methods  Systems Development Methods ◦ Structured Analysis ◦ Object-Oriented Analysis ◦ Agile/adaptive methods In this course, we will only concentrate on the Structured Analysis. 20
  • 21. 3. Overview of Structured Analysis and SDLC Model  A traditional systems development technique that is time-tested and easy to understand.  Uses a series of phases, called the systems development life cycle (SDLC ), to plan, analyze, design, implement, and support an information system.  A Predictive approach  Structured analysis is called a process-centered technique 21
  • 22. 3. Overview of Structured Analysis and SDLC Model –Cont.  In the waterfall model , the result of each phase is called a deliverable , or end product , which flows into the next phase.  Disadvantage in the built-in structure of the SDLC, because the waterfall model does not emphasize interactivity among the phases  This criticism can be valid if the SDLC phases are followed too rigidly  Adjacent phases usually interact  See Figure 1-27 22
  • 23. 4. SDLC MODEL Phases The SDLC model usually includes five steps 1) Systems planning 2) Systems analysis 3) Systems design 4) Systems implementation 5) Systems support and security See Figure 1-27 in the next slide 23
  • 24. Figure 1-27: SDLC – The Waterfall Model 24 Phase 1 Systems planning Phase 2 Systems Analysis Phase 3 Systems Design Phase 4 Implementation Phase 5 Operation, Support & Security
  • 25. Planning and Modeling a Systems Development Project  Systems planning ◦ Systems request ◦ Purpose of this phase is to perform a preliminary investigation whose key part is a feasibility study  Systems Analysis ◦ The purpose is to build a logical model of the new system. ◦ The first step is requirements modeling , where you investigate business processes and document what the new system must do to satisfy users. ◦ Requirements modeling continues the investigation that began during the systems planning phase. ◦ Deliverable is the System requirements document which describes management and Preliminary Investigation Report System Requirements Document
  • 26. Planning and Modeling a Systems Development Project  Systems Design ◦ The purpose is to create a physical model that will satisfy all documented requirements for the system. ◦ At this stage, you design the user interface and identify necessary outputs, inputs, and processes ◦ Deliverable is system design specification ◦ Management and user involvement is critical  Systems Implementation ◦ New system is constructed ◦ Programs are written, tested, and documented, and the system is installed ◦ The objective is to deliver a completely functioning and documented information system ◦ Final preparations include converting data to the new system's files and training users ◦ This stage also includes an assessment, called a systems evaluation System Design Specs Functional IS
  • 27. Planning and Modeling a Systems Development Project  Systems Operation, Support, and Security ◦ A well-designed system must be secure, reliable, maintainable, and scalable ◦ After several years of operation, systems need extensive changes ◦ During this phase, the IT staff maintains, enhances, and protects the system ◦ Security controls safeguard the system from both external and internal threats Operational IS
  • 28.  I am designing the user interface of the system and the database that the system will use to store the user’s data! (______________________)  I am gathering the system requirements of the user through interviews, questionnaires, and observation at work! (______________________)  I am adding more forms and reports to the system that users asked me to add because they have new requirements! (______________________)  I am doing a Preliminary Investigation and a Feasibility Study to investigate the “Worthiness” of the proposed system! (______________________)  I am writing the programming code of the system! (______________________) 28 Which SDLC Model Phase am I in?!
  • 29. Review Questions (Answer on BB-Learn)  What is IT, and why is it important to a business?  What is the role of the System Analyst?  What are three different Systems Development Methods?  What are the different functions of a business?  What are the phases of the SDLC?  What are the different activities within an IT department?  What is an IS, and what are its components?

Notas del editor

  1. The headlines in Figure 1-1 offer dramatic examplesof how information technology affects our society.Companies use information as a weapon in the battleto increase productivity, deliver quality productsand services, maintain customer loyalty, and makesound decisions. In a global economy with intensecompetition, information technology can mean thedifference between success and failure.
  2. The headlines in Figure 1-1 offer dramatic examplesof how information technology affects our society.Companies use information as a weapon in the battleto increase productivity, deliver quality productsand services, maintain customer loyalty, and makesound decisions. In a global economy with intensecompetition, information technology can mean thedifference between success and failure.
  3. More than ever, business success depends on information technology. IT is driving a new digital economy, where advances in hardware, software, and connectivity can provide enormous benefits to businesses and individuals. Although economic trends affect IT spending levels, most firms give IT budgets a high priority, in good times or bad. The reason is simple — during periods of growth, companies cannot afford to lag behind the IT curve. Conversely, when the economy slows down, firms often use IT to reduce operating costs and improve efficiency.
  4. Systems analysis and design  is a step-by-step process for developing high-quality information systems. An information system  combines information technology, people, and data to support business requirements. For example, information systems handle daily business transactions, improve company productivity, and help managers make sound decisions. The IT department team includes systems analysts  who plan, develop, and maintain information systems.
  5. Hardware purchasers today face a wide array of technology choices and decisions. In 1965, Gordon Moore, a cofounder of Intel, predicted that the number of transistors on an integrated circuit would double about every 24 months. His concept, called Moore's Law , has remained valid for more than 50 years. Fortunately, as hardware became more powerful, it also became much less expensive. Large businesses with thousands or millions of sales transactions require company-wide information systems and powerful servers.
  6. System software  manages the hardware components, which can include a single workstation or a global network with many thousands of clients. Either the hardware manufacturer supplies the system software or a company purchases it from a vendor. Examples of system software include the operating system, security software that protects the computer from intrusion, device drivers that communicate with hardware such as printers, and utility programs that handle specific tasks such as data backup and disk management. System software also controls the flow of data, provides data security, and manages network operations. In today's interconnected business world, network software is vitally important.Application software  consists of programs that support day-to-day business functions and provide users with the information they require. Application software can serve one user or thousands of people throughout an organization. Examples of company-wide applications, called enterprise applications , include order processing systems, payroll systems, and company communications networks. On a smaller scale, individual users increase their productivity with tools such as spreadsheets, word processors, and database management systems.
  7. Data is the raw material that an information system transforms into useful information. An information system can store data in various locations, called tables. By linking the tables, the system can extract specific information. Figure above shows a payroll system that stores data in four separate tables. Notice that the linked tables work together to supply 19 different data items to the screen form. Users, who would not know or care where the data is stored, see an integrated form, which is their window into the payroll system.
  8. Processes  describe the tasks and business functions that users, managers, and IT staff members perform to achieve specific results. Processes are the building blocks of an information system because they represent actual day-to-day business operations. To build a successful information system, analysts must understand business processes and document them carefully.People who have an interest in an information system are called stakeholders . Stakeholders include the management group responsible for the system, the users  (sometimes called end users ) inside and outside the company who will interact with the system, and IT staff members, such as systems analysts, programmers, and network administrators who develop and support the system.Each stakeholder group has a vital interest in the information system, but most experienced IT professionals agree that the success or failure of a system usually depends on whether it meets the needs of its users. For that reason, it is essential to understand user requirements and expectations throughout the development process.
  9. Structured analysis is a traditional systems development technique that is time-tested and easy to understand. Structured analysis uses a series of phases, called the systems development life cycle (SDLC ), to plan, analyze, design, implement, and support an information system. Although structured analysis evolved many years ago, it remains a popular systems development method. Structured analysis is based on an overall plan, similar to a blueprint for constructing a building, so it is called a predictive  approach.Structured analysis uses a set of process models to describe a system graphically. Because it focuses on processes that transform data into useful information, structured analysis is called a process-centered  technique. In addition to modeling the processes, structured analysis also addresses data organization and structure, relational database design, and user interface issues.A process model shows the data that flows in and out of system processes. Inside each process, input data is transformed by business rules  that generate the output.
  10. Some analysts see a disadvantage in the built-in structure of the SDLC, because the waterfall model does not emphasize interactivity among the phases. This criticism can be valid if the SDLC phases are followed too rigidly. However, adjacent phases usually interact,and interaction among several phases is not uncommon. Other analysts regard the waterfall model as a two-way water flow model, with emphasis on iteration and user input. Used in this manner, the traditional model is not as different from agile methods as it might appear to be.To have a brief about the major differences between the three methodologies. See the textbook (Ch.1 Page 21)
  11. The SDLC model usually includes five steps, which are described in the following sections: systems planning, systems analysis, systems design, systems implementation, and systems support and security.
  12. The purpose of the systems analysis phase  is to build a logical model of the new system. The first step is requirements modeling , where you investigate business processes and document what the new system must do to satisfy users. Requirements modeling continues the investigation that began during the systems planning phase. To understand the system, you perform fact-finding using techniques such as interviews, surveys, document review, observation, and sampling. You use the fact-finding results to build business models, data and process models, and object models.  The deliverable for the systems analysis phase is the system requirements document . The system requirements document describes management and user requirements, costs and benefits, and outlines alternative development strategies.
  13. The purpose of the systems design phase  is to create a physical model that will satisfy all documented requirements for the system. At this stage, you design the user interface and identify necessary outputs, inputs, and processes. In addition, you design internal and external controls, including computer-based and manual features to guarantee that the system will be reliable, accurate, maintainable, and secure. During the systems design phase, you also determine the application architecture, which programmers will use to transform the logical design into program modules and code.The deliverable for this phase is the system design specification , which is presented to management and users for review and approval. Management and user involvement is critical to avoid any misunderstanding about what the new system will do, how it will do it, and what it will cost.---------During the systems implementation phase , the new system is constructed. Whether the developers use structured analysis or O-O methods, the procedure is the same — programs are written, tested, and documented, and the system is installed. If the system was purchased as a package, systems analysts configure the software and perform any necessary modifications. The objective of the systems implementation phase is to deliver a completely functioning and documented information system. At the conclusion of this phase, the system is ready for use. Final preparations include converting data to the new system's files, training users, and performing the actual transition to the new system.The systems implementation phase also includes an assessment, called a systems evaluation , to determine whether the system operates properly and if costs and benefits are within expectations.
  14. SYSTEMS SUPPORT AND SECURITYDuring the systems support and security phase , the IT staff maintains, enhances, and protects the system. Maintenance changes correct errors and adapt to changes in the environment, such as new tax rates. Enhancements provide new features and benefits. The objective during this phase is to maximize return on the IT investment. Security controls safeguard the system from both external and internal threats. A well-designed system must be secure, reliable, maintainable, and scalable. A scalable  design can expand to meet new business requirements and volumes. Information systems development is always a work in progress. Business processes change rapidly, and most information systems need to be updated significantly or replaced after several years of operation.