SlideShare a Scribd company logo
1 of 54
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Information Systems Today
Eighth Edition, Global Edition
Chapter # 7
Developing and Acquiring
Information Systems
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Learning Objectives
• 9.1 Describe how to formulate and present the business case for technology
investments.
• 9.2 Describe the systems development life cycle and its various phases.
• 9.3 Explain how organizations acquire systems via external acquisition and
outsourcing.
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Electronic Business: E-Commerce and
E-Government
• Learning Objective: Describe
how to formulate and present the
business case for technology
investments
• Business Case Objects
• The Productivity Paradox
• Making a Successful Business Case
• Presenting the Business Case
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Business Case Objectives
• The business case sells an investment
– Build a strong, integrated set of arguments
– Show how an IS adds value to the organization
– Lays out the costs and benefits
– Used to make a “go” or “no-go” decision
– May be used to justify continued funding
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
The Productivity Paradox
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Making a Successful Business Case
(Table 9.1)
Type of
Argum
ent
Description
Faith Arguments based on beliefs about
organizational strategy,
competitive advantage, industry
forces, customer perceptions,
market share, and so on
Fear Arguments based on the notion
that if the system is not
implemented, the firm will lose out
to the competition, or worse, go
out of business
Fact Arguments based on data,
quantitative analysis, and/or
indisputable factors
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Identifying Costs and Benefits
• Identifying Costs
– Tangible costs—total cost of ownership (TCO)
 Non-recurring costs (acquisition)
 Recurring costs (use and maintenance)
– Intangible costs (e.g., loss of customers)
• Identifying Benefits
– Tangible benefits (e.g., estimated sales gains)
– Intangible benefits (e.g., improved customer
service)
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Performing Cost-Benefit Analyses
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Comparing Competing Investments
• Weighted Multicriteria Analysis
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Presenting the Business Case
• Know the Audience
– Know who you are presenting to, what their back-
ground is, and what they care about
• Convert Benefits to Monetary Terms
– Show benefits as $ per time period, often annual
• Devise Proxy Variables
• Measure What Is Important to Management
– Know management “hot-button” issues
– Describe how the system impacts them
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Stakeholders and Factors (Table 9.2)
Stakeholder Focus and Project
Characteristics
Management Greater strategic focus; largest
project sizes; longest project
durations
Steering
Committee
Cross-functional focus; greater
organizational change; formal
cost-benefit analysis; larger
and riskier projects
User
department
Narrow, no-strategic focus;
faster development
IS Executive Focus on integration with
existing systems; fewer
development delays; less
concern with cost-benefit
analysis
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
The Systems Development Process (1 of 2)
• Learning Objective: Describe
the systems development life
cycle and its various phases
• Custom Versus Off-the-Shelf Software
• Open Source Software
• Systems Integration: Combining Custom, Open Source,
and Off-the-Shelf Systems
(Subject headings continued on the next slide)
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
The Systems Development Process (2 of 2)
• IS Development in Action
• The Role of Users in the Systems Development Process
• Systems Development Controls
• Steps in the Systems Development Process
– Phase 1: Systems Planning and Selection
– Phase 2: Systems Analysis
– Phase 3: Systems Design
– Phase 4: Systems Implementation and Operation
• Repeating the SDLC: Systems Maintenance
• Other Approaches to Designing and Building Systems
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Custom Versus Off-the-Shelf Software
• Customized Software
– Customizability—tailored to unique needs
– Problem specificity—pay only for what is needed
• Off-the-Shelf Software (Packaged Software)
– Less costly than customized systems
– Faster to procure than customized systems
– Of higher quality than customized systems
– Less risky than customized systems
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Off-the-Shelf Software: Examples
(Table 9.3)
Commercial off-the-shelf (COTS) software—typically developed by software
companies that spread the development costs over a large number of customers
Category Application Description Examples
Business
information
systems
Payroll Automation of payroll
services, from the optical
reading of time sheets to
generating paychecks
ZPAY
Intuit Payroll
Inventory Automation of inventory
tracking, order processing,
billing, and shipping
Intuit QuickBooks
NetSuite
Office
Automation
Personal
productivity
Support for a wide range of
tasks from word processing
to graphics to e-mail
OpenOffice
Corel
Microsoft Office
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Open Source Software
• Program’s source code is freely available for use
and/or modification
– Linux and MySQL are prevalent examples
• Free to use, but “hidden” support costs
– Typically no support for the free version
– Commercial vendors may offer commercial-grade
support to industry users for a fee
• MySQL database is used by Yahoo!, Facebook,
and Associated Press
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Combining Customized, Open Source, and
Off-the-Shelf Systems
• Off-the-Shelf systems can often be
customized
• Off-the-Shelf systems may interact with
open-source systems (e.g., the MySQL
open source database can be used to store
data for a small business ERP system)
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
IS Development in Action (1 of 2)
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
IS Development in Action (2 of 2)
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
The Role of Users in the Systems
Development Process
• System analysts design the system
• System users know what is needed
• System analysts depend on system users
• System users are key throughout the
process
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Steps in the System Development Process
1.Systems planning
and selection
2.Systems analysis
3.Systems design
4.Systems
implementation
and operation
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Phase 1: Systems Planning and Selection
• Resources are limited so projects must be limited
• Analyst gathers information and builds the case
• Multiple approaches to selecting projects
– Formal IS planning process
– Ad-hoc planning process
• The business case role
– Business cases for different projects compared
– Multiple selection criteria
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Phase 2: Systems Analysis: Collecting
Requirements
• Collecting Requirements
– Most important part of system development
– Requirements Collection is the process of gathering
and organizing information from users by the following
means:
 Interviews
 Questionnaires
 Observations
 Document Analysis
 Joint Application Design (JAD) – A group meeting—based
process for requirements collection (see next slide)
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Joint Application Design
The JAD room below is a perfect example of the
Joint Application Design meeting
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Phase 2: Systems Analysis: Modeling Data
• The diagram above shows an entity-relationship diagram
(data modeling) pertaining to students
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Phase 2: Systems Analysis: Modeling
Processes and Logic
• The figure on the right
shows the four key
elements in the
development of a
system as follows:
– Requirements
– Data
– Data flows
– Processing logic
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Phase 3: Systems Design
• The system is designed during this phase from
the chosen design during Phase 2 as follows:
– Processing and Logic
 Modeled using one of many techniques
 Models converted into code in Phase 4
– Database and files
– Human-computer interface
 Point of contact between the user and the system
 Data entry and management forms
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Human—Computer Interface
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Phase 4: Systems Implementation and
Operation
• Convert design into a working system
– Software programming and software testing
– System conversion, documentation, training,
and support
 User and reference guides
 User training manuals and tutorials
 Installation procedures and troubleshooting
suggestions
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Types of Software Testing (Table 9.4)
Testing Type Focus Performed by
Developmental Testing the correctness of
individual modules and the
integration of multiple modules
Programmer
Alpha Testing of overall system to see
whether it meets design
requirements
Software tester
Beta
Testing of the capabilities of the
system in the user environment
with actual data
Actual system users
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Conversion Strategies
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Repeating the SDLC: Systems Maintenance
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Systems Maintenance Activities
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Other Approaches to Designing and
Building Systems
• Prototyping
– Trial-and-error
– Works even when the desired endpoint isn’t known, if there
is a basis for determining when one prototype is better than
another
• RAD & Extreme Programming
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Acquiring Information Systems
• Learning Objective: Explain
how organizations acquire
systems via external acquisition
and outsourcing.
• External Acquisition
• Outsourcing Systems Development
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Reasons for External Acquisition
• Possible situations:
– Situation 1: Limited IS staff
– Situation 2: IS staff has limited skill set
– Situation 3: IS staff is overworked
– Situation 4: Problems with performance of IS staff
• When this is the case, there are two options:
– External acquisition of a prepackaged system
– Outsourcing systems development
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Steps in External Acquisition
• Most competitive external acquisition
processes have at least five steps
1. Systems planning and selection
2. Systems analysis
3. Development of a request for proposal
4. Proposal evaluation
5. Vendor selection
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Development of a Request for Proposal
• A summary of existing systems and applications
• Requirements for system performance and features
• Reliability, backup, and service requirements
• The criteria that will be used to evaluate proposals
• Timetable and budget constraints (how much you can
spend)
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Proposal Evaluation
• Evaluation may include:
– Viewing system documentations
– Evaluating system performance
– Judging how system stacks up to important criteria
• Use of system benchmarks
– Response time given a specified number of users
– Time to sort records
– Time to retrieve a set of records
– Time to produce a given report
– Time to read in a set of data
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Commonly Used Evaluation Criteria
(Table 9.8)
Hardware Criteria Software Criteria Other Criteria
Brand/manufacturer Business alignment Installation/Training
Speed/Storage Required/desired
features
Vendor characteristics
(years in business,
flexibility, reputation, etc.)
Reliability Reliability Price
Scalability for growth Operation integration
Ease of installation Scalability for growth
Ease of integration Support model
Warranty Usability
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Vendor Selection
• Typically multiple feasible solutions
• Prioritize or rank competing proposals
• Weighted scoring system works well for this
• Other approaches include:
– Simple checklists
– Subjective processes
• Once vendor is selected, external acquisition is
complete
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Managing the Software License
• Varying degrees of restrictiveness or freedom
• Types of licenses
– Shrink-wrap or click-wrap licenses
 Typical for off-the-shelf and system software
– Enterprise or volume licenses
 Usually negotiated
• Software asset management
– Performing a software inventory
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Why Outsourcing?
Outsourcing Reasons Description
Cost and Quality Concerns Vendors have economies of scale, and can develop
better systems at a lower cost
Problems in IS Performance Outsourced vendors are more reliable and consistent
Supplier Pressure Aggressive sales forces
Simplifying, Downsizing, and
Reengineering
Companies retreating to core competencies,
outsourcing functions not core to value creation
Financial Factors An arm’s-length relationship with vendors scan create
more efficient use, IT assets can be liquidated
Organizational Culture Internal politics may block IT from moving forward
Internal Irritants If the IS staff and users are not interacting well together,
removing that source of tension can be a relief
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Managing the IS Outsourcing Relationship
• Outsourced relationships take continuous
management
• Realistic, tangible measures of performance
should be developed and tracked
• Multiple levels of interaction based on the
type of interaction
– Operational and tactical
– Policy and relationship
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
END OF CHAPTER CONTENT
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Managing in the Digital World:
The Maker Movement
• Maker movement refers to the increase of do-it-
yourself (DIY) and do-it-with-others (DIWO) as makers
• Key technologies include: inexpensive computing
devices, rapid prototyping machinery, and stream-
lined software development platforms
• Previous objects required many expensive tools
• Same objects can be 3D printed at much less cost
• Open source hardware, software, and standard
interfaces make it easy for anyone to learn
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Green IT: Project Natick—Microsoft’s
Underwater Data Centers
• Data centers require massive amounts of space
usually located in remote areas
• Largest located in China with 6.3 million square feet
• Data centers need water to cool the computer servers
• Project Natick is a Microsoft idea of building a large
data center that can reside 100s of feet underwater
– Cooling costs would be zero (no heat impact)
– Need to use materials that would not rust and last
for 5 years
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Coming Attractions:
Harvesting Human Energy
• Smartwatch or fitness tracker can see a battery
deplete in just a few days
• MIT researchers are experimenting how to power our
gadgets by our body movements
– A sandwich of metal and polymer are put together
that acts like a lithium battery
– If this material is bent, electrochemical processes
create an electrical current to supply by our
gadgets
– Challenge is for user to exercise or be active
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Ethical Dilemma:
Ethical App Development
• Nowadays anyone can build an app, not just major software
companies
• Mobile apps are especially prevalent, with opportunities to build
the next “killer app”
• This leads to possible ethical issues, especially related to
privacy concerns
– Facebook privacy policies always changing, often violating privacy
preferences of users
– iOS social media Path app secretly sends users’ complete
address list to Path’s servers
• Apps can easily retrieve user data, but can does not imply
ought
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Who’s Going Mobile:
Creating Mobile Apps
• Smartphone apps are being rapidly developed and deployed
• In 2015, Google and Apple announced more than 1.5 million
apps in their app stores
• Only a relatively few are highly successful
– Flappy Bird took only three days to complete, but netted $50K per day
– Game templates are available for as low as $199 for developers, not even
needing code
• Other app possibilities
– Productivity tools for students
– Managing your passwords
– Plenty of other ideas
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Security Matters:
Mobile Cybercrime
• E-mail is a big source for hackers
– Can pretend to be your bank, getting private information they can use
• Mobile users who install apps can be targeted
• 2016, Security researchers discovered a type of mobile malware that
was targeting banks
• This malware was designed to circumvent two-factor authentication
systems
– User’s one-time code SMD code was forwarded to the hackers
– Then gained access into their accounts
• Mobile users not immune from malware hacks
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
When Things Go Wrong:
Top Security Threats
• In 2015, 500 million records stolen by cyber thieves
• Most legitimate software contains vulnerabilities
• Cybercriminals try to discover these vulnerabilities
• Cybercriminals use sophisticated software tools to
discover these vulnerabilities
• Cybercriminals use same system development
process to test their malware
• Experts believe things are going to get worse before
they get better
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved
Industry Analysis:
Broadcasting
• Broadcasters of radio and television are facing
dwindling viewership
– The Internet has opened new entertainment sources
and competition to viewers
– Advertisers are willing to pay less for smaller
audiences
– Broadcasters now use the Internet as another
distribution channel, and can charge for online show
advertising
– Some formats are requiring shorter broadcast formats
to cater to online audiences
Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved

More Related Content

Similar to Chapter 7.pptx

laudon-traver_ec13_ppt_chapter_3_Building Website.pptx
laudon-traver_ec13_ppt_chapter_3_Building Website.pptxlaudon-traver_ec13_ppt_chapter_3_Building Website.pptx
laudon-traver_ec13_ppt_chapter_3_Building Website.pptx
DivyaAggarwal91
 
manajemen komputer dan sistem informasi.
manajemen komputer dan sistem informasi.manajemen komputer dan sistem informasi.
manajemen komputer dan sistem informasi.
HermanTusiadi
 
ARCHIBUS White Paper - Creating an IWMS Implementation Plan
ARCHIBUS White Paper - Creating an IWMS Implementation PlanARCHIBUS White Paper - Creating an IWMS Implementation Plan
ARCHIBUS White Paper - Creating an IWMS Implementation Plan
Michael Willette
 
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your TechnologyStrategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
Paul Osterberg
 

Similar to Chapter 7.pptx (20)

Chapter 8.pptx
Chapter 8.pptxChapter 8.pptx
Chapter 8.pptx
 
Technology for HR Shared Services
Technology for HR Shared ServicesTechnology for HR Shared Services
Technology for HR Shared Services
 
laudon-traver_ec13_ppt_chapter_3_Building Website.pptx
laudon-traver_ec13_ppt_chapter_3_Building Website.pptxlaudon-traver_ec13_ppt_chapter_3_Building Website.pptx
laudon-traver_ec13_ppt_chapter_3_Building Website.pptx
 
The Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsThe Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management Systems
 
Maintaining informatio sysyems_ch 14.pptx
Maintaining informatio sysyems_ch 14.pptxMaintaining informatio sysyems_ch 14.pptx
Maintaining informatio sysyems_ch 14.pptx
 
ch13.pptx
ch13.pptxch13.pptx
ch13.pptx
 
SCM CRP ERP Decision Support
SCM CRP ERP Decision SupportSCM CRP ERP Decision Support
SCM CRP ERP Decision Support
 
Building cbis, mis, csvtu
Building cbis, mis, csvtuBuilding cbis, mis, csvtu
Building cbis, mis, csvtu
 
manajemen komputer dan sistem informasi.
manajemen komputer dan sistem informasi.manajemen komputer dan sistem informasi.
manajemen komputer dan sistem informasi.
 
ARCHIBUS White Paper - Creating an IWMS Implementation Plan
ARCHIBUS White Paper - Creating an IWMS Implementation PlanARCHIBUS White Paper - Creating an IWMS Implementation Plan
ARCHIBUS White Paper - Creating an IWMS Implementation Plan
 
A Brief Introduction to Enterprise Architecture
A Brief Introduction to  Enterprise Architecture A Brief Introduction to  Enterprise Architecture
A Brief Introduction to Enterprise Architecture
 
module_1_chapter_1.pptx
module_1_chapter_1.pptxmodule_1_chapter_1.pptx
module_1_chapter_1.pptx
 
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your TechnologyStrategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
 
Energy Central Webinar on June 14, 2016
Energy Central Webinar on June 14, 2016Energy Central Webinar on June 14, 2016
Energy Central Webinar on June 14, 2016
 
marketing information system-chapter five
marketing information system-chapter five marketing information system-chapter five
marketing information system-chapter five
 
krajewski_om12 _01.pptx
krajewski_om12 _01.pptxkrajewski_om12 _01.pptx
krajewski_om12 _01.pptx
 
krajewski_om12 _01.pptx
krajewski_om12 _01.pptxkrajewski_om12 _01.pptx
krajewski_om12 _01.pptx
 
chap18.ppt
chap18.pptchap18.ppt
chap18.ppt
 
Chapter 1 erp
Chapter 1 erpChapter 1 erp
Chapter 1 erp
 
Mba ii ewis u iv erp
Mba ii ewis u iv erpMba ii ewis u iv erp
Mba ii ewis u iv erp
 

More from NMohd3 (8)

Chap1_Part2.pptx
Chap1_Part2.pptxChap1_Part2.pptx
Chap1_Part2.pptx
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Chapter 4.pptx
Chapter 4.pptxChapter 4.pptx
Chapter 4.pptx
 
08-Resolution & Value.pdf
08-Resolution & Value.pdf08-Resolution & Value.pdf
08-Resolution & Value.pdf
 
05- Presentation Tools - Part 1.pdf
05- Presentation Tools - Part 1.pdf05- Presentation Tools - Part 1.pdf
05- Presentation Tools - Part 1.pdf
 
Chapter 2.ppt
Chapter 2.pptChapter 2.ppt
Chapter 2.ppt
 
TOPIC 10-FUTURE ICT TRENDS.pptx
TOPIC 10-FUTURE ICT TRENDS.pptxTOPIC 10-FUTURE ICT TRENDS.pptx
TOPIC 10-FUTURE ICT TRENDS.pptx
 
12- Presentation Tools.pdf
12- Presentation Tools.pdf12- Presentation Tools.pdf
12- Presentation Tools.pdf
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Chapter 7.pptx

  • 1. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Information Systems Today Eighth Edition, Global Edition Chapter # 7 Developing and Acquiring Information Systems
  • 2. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Learning Objectives • 9.1 Describe how to formulate and present the business case for technology investments. • 9.2 Describe the systems development life cycle and its various phases. • 9.3 Explain how organizations acquire systems via external acquisition and outsourcing.
  • 3. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Electronic Business: E-Commerce and E-Government • Learning Objective: Describe how to formulate and present the business case for technology investments • Business Case Objects • The Productivity Paradox • Making a Successful Business Case • Presenting the Business Case
  • 4. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Business Case Objectives • The business case sells an investment – Build a strong, integrated set of arguments – Show how an IS adds value to the organization – Lays out the costs and benefits – Used to make a “go” or “no-go” decision – May be used to justify continued funding
  • 5. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved The Productivity Paradox
  • 6. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Making a Successful Business Case (Table 9.1) Type of Argum ent Description Faith Arguments based on beliefs about organizational strategy, competitive advantage, industry forces, customer perceptions, market share, and so on Fear Arguments based on the notion that if the system is not implemented, the firm will lose out to the competition, or worse, go out of business Fact Arguments based on data, quantitative analysis, and/or indisputable factors
  • 7. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Identifying Costs and Benefits • Identifying Costs – Tangible costs—total cost of ownership (TCO)  Non-recurring costs (acquisition)  Recurring costs (use and maintenance) – Intangible costs (e.g., loss of customers) • Identifying Benefits – Tangible benefits (e.g., estimated sales gains) – Intangible benefits (e.g., improved customer service)
  • 8. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Performing Cost-Benefit Analyses
  • 9. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Comparing Competing Investments • Weighted Multicriteria Analysis
  • 10. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Presenting the Business Case • Know the Audience – Know who you are presenting to, what their back- ground is, and what they care about • Convert Benefits to Monetary Terms – Show benefits as $ per time period, often annual • Devise Proxy Variables • Measure What Is Important to Management – Know management “hot-button” issues – Describe how the system impacts them
  • 11. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Stakeholders and Factors (Table 9.2) Stakeholder Focus and Project Characteristics Management Greater strategic focus; largest project sizes; longest project durations Steering Committee Cross-functional focus; greater organizational change; formal cost-benefit analysis; larger and riskier projects User department Narrow, no-strategic focus; faster development IS Executive Focus on integration with existing systems; fewer development delays; less concern with cost-benefit analysis
  • 12. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved The Systems Development Process (1 of 2) • Learning Objective: Describe the systems development life cycle and its various phases • Custom Versus Off-the-Shelf Software • Open Source Software • Systems Integration: Combining Custom, Open Source, and Off-the-Shelf Systems (Subject headings continued on the next slide)
  • 13. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved The Systems Development Process (2 of 2) • IS Development in Action • The Role of Users in the Systems Development Process • Systems Development Controls • Steps in the Systems Development Process – Phase 1: Systems Planning and Selection – Phase 2: Systems Analysis – Phase 3: Systems Design – Phase 4: Systems Implementation and Operation • Repeating the SDLC: Systems Maintenance • Other Approaches to Designing and Building Systems
  • 14. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Custom Versus Off-the-Shelf Software • Customized Software – Customizability—tailored to unique needs – Problem specificity—pay only for what is needed • Off-the-Shelf Software (Packaged Software) – Less costly than customized systems – Faster to procure than customized systems – Of higher quality than customized systems – Less risky than customized systems
  • 15. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Off-the-Shelf Software: Examples (Table 9.3) Commercial off-the-shelf (COTS) software—typically developed by software companies that spread the development costs over a large number of customers Category Application Description Examples Business information systems Payroll Automation of payroll services, from the optical reading of time sheets to generating paychecks ZPAY Intuit Payroll Inventory Automation of inventory tracking, order processing, billing, and shipping Intuit QuickBooks NetSuite Office Automation Personal productivity Support for a wide range of tasks from word processing to graphics to e-mail OpenOffice Corel Microsoft Office
  • 16. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Open Source Software • Program’s source code is freely available for use and/or modification – Linux and MySQL are prevalent examples • Free to use, but “hidden” support costs – Typically no support for the free version – Commercial vendors may offer commercial-grade support to industry users for a fee • MySQL database is used by Yahoo!, Facebook, and Associated Press
  • 17. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Combining Customized, Open Source, and Off-the-Shelf Systems • Off-the-Shelf systems can often be customized • Off-the-Shelf systems may interact with open-source systems (e.g., the MySQL open source database can be used to store data for a small business ERP system)
  • 18. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved IS Development in Action (1 of 2)
  • 19. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved IS Development in Action (2 of 2)
  • 20. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved The Role of Users in the Systems Development Process • System analysts design the system • System users know what is needed • System analysts depend on system users • System users are key throughout the process
  • 21. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Steps in the System Development Process 1.Systems planning and selection 2.Systems analysis 3.Systems design 4.Systems implementation and operation
  • 22. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Phase 1: Systems Planning and Selection • Resources are limited so projects must be limited • Analyst gathers information and builds the case • Multiple approaches to selecting projects – Formal IS planning process – Ad-hoc planning process • The business case role – Business cases for different projects compared – Multiple selection criteria
  • 23. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Phase 2: Systems Analysis: Collecting Requirements • Collecting Requirements – Most important part of system development – Requirements Collection is the process of gathering and organizing information from users by the following means:  Interviews  Questionnaires  Observations  Document Analysis  Joint Application Design (JAD) – A group meeting—based process for requirements collection (see next slide)
  • 24. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Joint Application Design The JAD room below is a perfect example of the Joint Application Design meeting
  • 25. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Phase 2: Systems Analysis: Modeling Data • The diagram above shows an entity-relationship diagram (data modeling) pertaining to students
  • 26. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Phase 2: Systems Analysis: Modeling Processes and Logic • The figure on the right shows the four key elements in the development of a system as follows: – Requirements – Data – Data flows – Processing logic
  • 27. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Phase 3: Systems Design • The system is designed during this phase from the chosen design during Phase 2 as follows: – Processing and Logic  Modeled using one of many techniques  Models converted into code in Phase 4 – Database and files – Human-computer interface  Point of contact between the user and the system  Data entry and management forms
  • 28. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Human—Computer Interface
  • 29. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Phase 4: Systems Implementation and Operation • Convert design into a working system – Software programming and software testing – System conversion, documentation, training, and support  User and reference guides  User training manuals and tutorials  Installation procedures and troubleshooting suggestions
  • 30. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Types of Software Testing (Table 9.4) Testing Type Focus Performed by Developmental Testing the correctness of individual modules and the integration of multiple modules Programmer Alpha Testing of overall system to see whether it meets design requirements Software tester Beta Testing of the capabilities of the system in the user environment with actual data Actual system users
  • 31. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Conversion Strategies
  • 32. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Repeating the SDLC: Systems Maintenance
  • 33. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Systems Maintenance Activities
  • 34. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Other Approaches to Designing and Building Systems • Prototyping – Trial-and-error – Works even when the desired endpoint isn’t known, if there is a basis for determining when one prototype is better than another • RAD & Extreme Programming
  • 35. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Acquiring Information Systems • Learning Objective: Explain how organizations acquire systems via external acquisition and outsourcing. • External Acquisition • Outsourcing Systems Development
  • 36. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Reasons for External Acquisition • Possible situations: – Situation 1: Limited IS staff – Situation 2: IS staff has limited skill set – Situation 3: IS staff is overworked – Situation 4: Problems with performance of IS staff • When this is the case, there are two options: – External acquisition of a prepackaged system – Outsourcing systems development
  • 37. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Steps in External Acquisition • Most competitive external acquisition processes have at least five steps 1. Systems planning and selection 2. Systems analysis 3. Development of a request for proposal 4. Proposal evaluation 5. Vendor selection
  • 38. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Development of a Request for Proposal • A summary of existing systems and applications • Requirements for system performance and features • Reliability, backup, and service requirements • The criteria that will be used to evaluate proposals • Timetable and budget constraints (how much you can spend)
  • 39. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Proposal Evaluation • Evaluation may include: – Viewing system documentations – Evaluating system performance – Judging how system stacks up to important criteria • Use of system benchmarks – Response time given a specified number of users – Time to sort records – Time to retrieve a set of records – Time to produce a given report – Time to read in a set of data
  • 40. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Commonly Used Evaluation Criteria (Table 9.8) Hardware Criteria Software Criteria Other Criteria Brand/manufacturer Business alignment Installation/Training Speed/Storage Required/desired features Vendor characteristics (years in business, flexibility, reputation, etc.) Reliability Reliability Price Scalability for growth Operation integration Ease of installation Scalability for growth Ease of integration Support model Warranty Usability
  • 41. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Vendor Selection • Typically multiple feasible solutions • Prioritize or rank competing proposals • Weighted scoring system works well for this • Other approaches include: – Simple checklists – Subjective processes • Once vendor is selected, external acquisition is complete
  • 42. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Managing the Software License • Varying degrees of restrictiveness or freedom • Types of licenses – Shrink-wrap or click-wrap licenses  Typical for off-the-shelf and system software – Enterprise or volume licenses  Usually negotiated • Software asset management – Performing a software inventory
  • 43. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Why Outsourcing? Outsourcing Reasons Description Cost and Quality Concerns Vendors have economies of scale, and can develop better systems at a lower cost Problems in IS Performance Outsourced vendors are more reliable and consistent Supplier Pressure Aggressive sales forces Simplifying, Downsizing, and Reengineering Companies retreating to core competencies, outsourcing functions not core to value creation Financial Factors An arm’s-length relationship with vendors scan create more efficient use, IT assets can be liquidated Organizational Culture Internal politics may block IT from moving forward Internal Irritants If the IS staff and users are not interacting well together, removing that source of tension can be a relief
  • 44. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Managing the IS Outsourcing Relationship • Outsourced relationships take continuous management • Realistic, tangible measures of performance should be developed and tracked • Multiple levels of interaction based on the type of interaction – Operational and tactical – Policy and relationship
  • 45. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved END OF CHAPTER CONTENT
  • 46. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Managing in the Digital World: The Maker Movement • Maker movement refers to the increase of do-it- yourself (DIY) and do-it-with-others (DIWO) as makers • Key technologies include: inexpensive computing devices, rapid prototyping machinery, and stream- lined software development platforms • Previous objects required many expensive tools • Same objects can be 3D printed at much less cost • Open source hardware, software, and standard interfaces make it easy for anyone to learn
  • 47. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Green IT: Project Natick—Microsoft’s Underwater Data Centers • Data centers require massive amounts of space usually located in remote areas • Largest located in China with 6.3 million square feet • Data centers need water to cool the computer servers • Project Natick is a Microsoft idea of building a large data center that can reside 100s of feet underwater – Cooling costs would be zero (no heat impact) – Need to use materials that would not rust and last for 5 years
  • 48. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Coming Attractions: Harvesting Human Energy • Smartwatch or fitness tracker can see a battery deplete in just a few days • MIT researchers are experimenting how to power our gadgets by our body movements – A sandwich of metal and polymer are put together that acts like a lithium battery – If this material is bent, electrochemical processes create an electrical current to supply by our gadgets – Challenge is for user to exercise or be active
  • 49. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Ethical Dilemma: Ethical App Development • Nowadays anyone can build an app, not just major software companies • Mobile apps are especially prevalent, with opportunities to build the next “killer app” • This leads to possible ethical issues, especially related to privacy concerns – Facebook privacy policies always changing, often violating privacy preferences of users – iOS social media Path app secretly sends users’ complete address list to Path’s servers • Apps can easily retrieve user data, but can does not imply ought
  • 50. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Who’s Going Mobile: Creating Mobile Apps • Smartphone apps are being rapidly developed and deployed • In 2015, Google and Apple announced more than 1.5 million apps in their app stores • Only a relatively few are highly successful – Flappy Bird took only three days to complete, but netted $50K per day – Game templates are available for as low as $199 for developers, not even needing code • Other app possibilities – Productivity tools for students – Managing your passwords – Plenty of other ideas
  • 51. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Security Matters: Mobile Cybercrime • E-mail is a big source for hackers – Can pretend to be your bank, getting private information they can use • Mobile users who install apps can be targeted • 2016, Security researchers discovered a type of mobile malware that was targeting banks • This malware was designed to circumvent two-factor authentication systems – User’s one-time code SMD code was forwarded to the hackers – Then gained access into their accounts • Mobile users not immune from malware hacks
  • 52. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved When Things Go Wrong: Top Security Threats • In 2015, 500 million records stolen by cyber thieves • Most legitimate software contains vulnerabilities • Cybercriminals try to discover these vulnerabilities • Cybercriminals use sophisticated software tools to discover these vulnerabilities • Cybercriminals use same system development process to test their malware • Experts believe things are going to get worse before they get better
  • 53. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved Industry Analysis: Broadcasting • Broadcasters of radio and television are facing dwindling viewership – The Internet has opened new entertainment sources and competition to viewers – Advertisers are willing to pay less for smaller audiences – Broadcasters now use the Internet as another distribution channel, and can charge for online show advertising – Some formats are requiring shorter broadcast formats to cater to online audiences
  • 54. Copyright © 2018, 2016, 2014 Pearson Education, Ltd. All Rights Reserved

Editor's Notes

  1. Slide 2 is list of textbook LO numbers and statements
  2. A business case is, quite simply, a complete justification for making or continuing to make an investment in a new or ongoing information system. It demonstrates how the investment is justified and better than the possible alternatives.
  3. The Productivity Paradox stems from the difficulty many early professionals had showing that worker productivity, measured as worker output per employee hour, was increasing due to investments in information technologies. There are, however, many reasons for this apparent dilemma that have come to light since the initial research. One problem has been in measurement. Companies typically focus on efficiency, or doing something with few resources, over effectiveness, or doing something well, and information systems sometimes increase effectiveness over efficiency. Hence businesses are doing things better, which can then impact competitiveness and product quality and lead to other changes, but initial efficiency measurements may show little or no improvement. There is also a timing issue; many information systems take years to hit the bottom line, so any measurement immediately after implementation may show no, or even a negative, productivity impact. Some industries have a limited size, so the first mover in the industry may get a bigger slice of the pie, but overall it is a zero-sum game, so once everyone has implemented the new technology to catch up, overall it looks like there is no improvement across the industry. Finally, some IS implementations are the result of mismanagement and aren’t appropriate, so the investment actually has a negative return.
  4. Arguments based on faith or fear can be the most compelling and can drive the decision to invest in an information system despite the lack of any hard data on system costs. Arguments based on faith should clearly describe the firm’s mission and objectives, the strategy for achieving them, and the types of information systems that are needed. An argument based on fear may go something like this: “If we don’t implement this enterprise resource planning system, we’ll get killed by our competitors because they’re all implementing these kinds of systems—we either do this or we die.” Arguments based on fact involve rigorous cost-benefit analysis.
  5. The business case needs to have system costs and benefits at its heart. Costs and benefits can be tangible or intangible, with all tangible costs being rolled up using an approach of total cost of ownership.
  6. Here is an example cost-benefit analysis for a project starting in 2014 and running through 2018, which is a reasonable time frame for an IS development project. Costs are divided into recurring and non-recurring, and benefits are shown here as recurring, with sales benefits growing slowly over time. The bottom line is the net of costs and benefits, and is suitable for a return on investment (ROI) analysis.
  7. Sometimes the justification for a system has more intangibles then tangibles, or a financial analysis doesn’t paint a clear picture between alternatives. In these cases a weighted multicriteria analysis can be performed instead, showing which alternatives meet organizational goals and priorities more completely than others. Weights indicate the importance of each criterion. Because these can be subjective, they should be arrived at through extensive discussion among decision makers, including the analysis team, users, and managers.
  8. Although the financials may speak for themselves, it is still important to make the business case. The first rule is know your audience—you don’t want to talk above or below them, you want to know what they care about, you want to make sure you are presenting what they need to hear. Once you know your audience, make sure you put everything into financial terms; translate benefits into a uniform measure such as an annual cost savings. This allows your audience to readily grasp what you are saying and compare it to other alternatives. A proxy variable is a variable that is relevant to the audience if your normal metrics aren’t. For example, if spending hours with the customer is important, you could translate hours saved planning each days sales stops to annual additional customer contact hours. Finally, be sure to address any specifics that management considers key and would want to hear something about.
  9. There are at least four different perspectives among stakeholders. Managers and user groups may come from different functional units within the firm, and therefore have narrower interests. The steering committee is made of representatives from all across the organization, so will have broader focus. And the IS executive has a better view of the costs and benefits of IS projects, and the likelihood of how much time and resources will be required. Making a business case requires looking at multiple factors, and based on these there may be a variety of decisions for any particular project.
  10. Customized software is unique, customized, focused, and expensive. Off-the-shelf software is typically cheaper, easier, faster, more thoroughly tested, and less likely to fail.
  11. This chart includes both business information systems and office automation systems, but there are many more types of off-the-shelf software.
  12. Open source software can be a boon, as the up-front costs can be very low, but there can be many hidden support costs since there is no vendor to call when a problem arises. Companies typically have to internalize the support or sometimes hire a commercial vendor to provide support for the open source software.
  13. There is no reason companies can’t use all three types of software where it makes sense. However, using all three types will mean integrating them, which could require additional custom code. Some commercial applications are designed to work with specific open source products.
  14. There are a variety of sources for any new information system initiative a company is considering. Which one makes the most sense will depend on many factors, and a structured approach is necessary to ensure a suitable solution is found and implemented.
  15. Large organizational problems may require large solutions, but decomposing the large problem down into manageable problems that can be readily addressed makes the overall process manageable. It’s like working with LEGO blocks. The systems analyst (SA) has primary responsibility in a systems development project. The SA studies the problems and needs of an organization in order to determine how people, methods, and information technology can best be combined to bring about improvements in the organization. A systems analyst helps systems users and other business managers define their requirements for new or enhanced information systems. And the systems analyst sometimes manages projects, as a project manager.
  16. Although system analysts have the background to design new systems, they typically aren’t the subject-matter experts in every aspect of the business. That honor generally goes to the users, who know what the current system does, and often what the new system needs to accomplish, even if they aren’t versed on the latest technologies that might be implemented to accomplish it. As such, system user involvement is critical throughout the process.
  17. The systems development life cycle is a four-step structured process starting with systems planning and selection, going through analysis, design, and ending with implementation and operation. Note that this is a cyclical process. At any phase, you may return to an earlier phase. For example, during design there may be the recognition that more analysis is needed.
  18. All organizations face resource constraints of one kind or another, and hence they need to limit their IS projects to those that can succeed given the resources at hand. This may take place through a very formal IS planning process, or organizations may have a more informal ad-hoc process for generating and approving IS investments. Regardless of the approach, each project typically has its own business case that is used to justify the resources necessary to go forward with it, and often this business case is compared with the other business cases for competing IS projects. The criteria for selecting from competing projects can be varied, but ideally will be based on core criteria such as alignment with the firm’s objectives, or strategic alignment, as well as tangible benefits. Additional factors such as intangible benefits, risk, project size, and resource availability will all also play a role.
  19. Systems analysis involves determining what the optimal approach will be. This requires gathering requirements and performing modeling at a deeper level than in Phase 1, but not at the level that will be required in Phase 3. This is almost an iterative step, where the goal is just to gather enough information and put together enough models that an optimal final direction can be chosen and pursued.
  20. This room is where the Requirements collection takes place. Note the technology used in the room with each participant having everything needed to conduct a successful meeting.
  21. A data model, as seen here, will show the relationships between the main entities. Notice that a Class is related to the Student, Major, and Room. The Student entity includes the Name, ID, and Local Address attributes.
  22. Notice that the process flow of this figure begins with a Requirements meeting consisting of IT people and Users. Once this meeting takes place, then they reveal the Data and Data Flows. The Processing Logic is then created which is developed in a code format using English instructions. Usually meetings are held with the users once this is done to verify the data flow and processing logic.
  23. The systems design phase takes the output of Phase 2, the analysis phase. This includes the Phase 2 models and optimal architecture or system design. In this phase the system is completely modeled based on those decisions, the prior knowledge from the analysis phase, and the additional work being done to complete the design.
  24. This is a report designed as part of the Human—Computer interface. In this example we see the salespersons annual report showing the region, salesperson, social security number, and quarterly sales of each.
  25. The final phase is implementation and operation, which involves converting the design to a system, implementing the database, creating the user guides, conducting the training, and switching over to the new system.
  26. These three tests are key to making sure the system has been developed correctly. First, you test each individual program, then how that program interacts with the other programs, and finally with the users of the proposed new system. The users must agree that it runs correctly to sign off and go live with the new system.
  27. There are multiple strategies available for converting from an organization’s old software to a new system, including parallel, direct, phased, and pilot. Most organizations choose a pilot or phased implementation, due to the large resource requirements of a parallel conversion and the large risk involved in a direct conversion. However, a parallel conversion has the lowest risk, and as such is sometimes implemented. A direct conversion may be mandated where for one reason or another it isn’t possible to have a phased or pilot implementation with different parts of the organization running on different systems.
  28. Once the system is implemented it enters a maintenance phase. At this point in time there will still be regular changes, upgrades, and maintenance activities to perform. Change management is necessary to ensure that the system remains stable and functional, and that change requests are appropriate and justified. Each change request is like a miniature SDLC.
  29. As you can see, each phase of the maintenance process maps directly to an SDLC phase. Because the system maintenance processes are repeated over and over, the total amount of development during the systems maintenance phase typically exceeds the amount of development during the original SDLC implementation.
  30. The SDLC isn’t always a practical approach to every problem. It requires the output be known up front, for example, and that isn’t always possible. One alternative is prototyping, where after the analyst learns some core needs, a prototype is developed and evaluated. Good features are retained and problematic ones replaced with candidate alternatives. As prototypes are iterated the process will ideally converge on a working solution. There are also processes such as rapid application development and extreme programming, which are applicable to a limited set of situations. They won’t be covered here, but they do have their place.
  31. There are many reasons to go outside a corporation for a system. Often the IS staff doesn’t have the resources or expertise to attempt the systems development effort in-house. Systems development takes dedicated resources with the project management, system analyst, database design and management, systems architecture, programming, testing, and training skills necessary to make it a success. These skills are often specialized, and they may not exist or be available within the organization.
  32. The first two steps of an external acquisition are the same as the first two steps in the SDLC. The third step is where the paths diverge. We’ll cover them in the next three slides.
  33. Creating a request for proposal, or RFP, can be an involved process in and of itself. In fact, some companies outsource the RFP development to a consulting firm, which then helps them select and manage the vendor that will perform the systems development work. The RFP needs to include enough information that vendors can submit an informed proposal that will meet the company’s needs. This includes the current situation, all the requirements for the new system, how the new system will be evaluated, and any constraints on the proposal. It is important to determine ahead of time how you plan to evaluate each proposal so that it becomes more of a objective determination than a subjective one.
  34. The evaluation of the proposal will involve looking at all the financials, but it will also involve comparing the proposed solution to the requested features and noting differences and capabilities. Some variations may be insignificant, whereas others could be deal-breakers. Finally, each proposal should be looked at in terms of risk—the probability that things won’t work out, and the impact if that is the case.
  35. The system involves both hardware and software components, so these need to be accounted for. In addition, there are issues about the vendor to consider, as well as financial factors.
  36. Once all the proposals are in and evaluated, those that meet your needs should be scored and ranked against your previous evaluation template to provide a solid basis for comparison.
  37. Licenses can vary from full rights such as public domain to no rights such as trade secret software. In between includes non-protective open source, protective open source, and proprietary software. Linux is an example of protective open source software. Windows is an example of proprietary software.
  38. There are many different reasons to outsource systems; often the driving factor is the limitations of the internal IT staff. Many companies aren’t systems development companies and hence have limited resources and skillsets in that area. Beyond that, an organization may see outsourcing as an opportunity to streamline the business, remove liabilities, or eliminate ongoing problems.
  39. The outsourced IT relationship needs continuous monitoring and management. The company doing the outsourcing cannot simply let all its internal IT staff go and just assume the vendor will do “good” things. A solid CIO, working with the legal team and IT staff members, needs to manage the relationship.