SlideShare a Scribd company logo
MANAGEMENT




  Chapter 4 Development technology ........ 114
  Chapter 5 Project management .............. 130
  Chapter 6 Service management ............. 140
Chapter


                           4

Development technology
    Chapter 4 explains system development processes
    and test techniques, as well as software development
    processes and development methods.




    4-1 System development technology ..... 115
    4-2 Software development management techniques .. 126
    4-3 Chapter quiz .................................... 129
4-1                                 System development technology

                                                        4-1-1 Process of system development
                                                   Systems used in business operations are expected to perform the necessary
                                                   functions properly, but must also be easy for the user (system user depart-
                                                   ment) to utilize.
                                                   It is important for the department developing a system to survey/analyze
                                                   requirements in cooperation with the various departments that will use the
                                                   system, and reflect the results into the system under development.
                                                   System development does not necessarily have to be carried out internally,
                                                   and may also be outsourced to a company that specializes in system devel-
                                                   opment.
        Reference                                  A “service contract” is a typical method for forming an agreement when
      Service contract                             system development is outsourced to another company.
      A “service contract” is a contract that is   The general procedure for developing a system is as shown below.
      formed when the party placing the order
      presents terms to the contractor regard-
                                                    Requirements definition   Determine the functions required of the system.
      ing what they want to be delivered and
      when, as well as the remuneration for
      the finished product, and the contractor
      accepts those terms.
                                                    System design             Design the system based on the requirements definition.

        Reference
      Need for review
      For each system development process,          Development
                                                                              Develop the system based on the design details.
                                                    (Programming)
      a “review” must be conducted. Reviews
      check/confirm that there are no bugs
      (errors) in the system or design, and
      serve the purpose of improving quality                                  Check that the designed/developed system operates
                                                    Testing
      by finding any potential bugs and recti-                                 properly.
      fying them.
      Reviews may be conducted by the indi-
      vidual developer, a small project team,                                 Verify that the designed system operates according to the
                                                    System acceptance
      or by all those concerned.                                              requirements.
      Although it is effective for the developer
      to conduct a review, it is beneficial for
      persons other than the developer to           System operation/         Resolve any issues the user (system user department)
      conduct a review as well. An outside          maintenance               encounters during system operation.
      perspective allows for an objective
      check, which makes it possible to catch
      bugs that go unnoticed by the develop-
      er.




115
1   Requirements definition
A “requirements definition” clarifies the function, performance, and con-
tent required of the system and software, and includes a “system require-
ments definition” and a “software requirements definition.” The de-
mands of the user (system user department) are surveyed/analyzed to de-
termine whether they are technologically feasible, and the requirements for
achieving the demands are then defined in detail.
This is the first step in system design, which plays a critical role in deter-
mining the success or failure of the subsequent system.
In order to develop a better system, the requirements are defined in coop-
eration with the various departments that will use the system.
●System requirements definition
In a “system requirements definition,” the types of functions that are re-
quired for computerization are clearly stipulated.
In general, factors that determine system reliability such as operating con-
ditions, security performance, and hardware used are stipulated. Accord-
ingly, it is necessary to set priorities in order to maximize results within a




                                                                                      Chapter 4
limited budget, and determine whether the content described in the system
requirements definition is worth the cost.
●Software requirements definition




                                                                                      Development technology
In a “software requirements definition,” the required software content is
specified on the basis of the actual business content.
In general, details such as the system interface, operability, functions re-
quired for business, operation, and maintenance are stipulated. At such
time, hearings are conducted with the users (system user department) in
order to gather as many opinions as possible, although it is also necessary
to analyze/consider whether those requirements can be realized.

 2   System design
The system is designed based on the requirements definition.
The procedure for designing a system is summarized below.

                            The user (system user department) designs the
 Systems architecture
                            components of the system that can be seen from the
 design (External design)
                            outside.



                            The system development department designs the
 Software architecture      internal functions required by the system in order to
 design (Internal design)   realize the functions determined in the system
                            architecture design.



                            The system development department designs the internal
 Software detailed design
                            structure of the programs based on the software
 (Program design)
                            architecture design.




                                                                                     116
(1)Systems architecture design (External design)
                                               In a systems architecture design, components that are visible to the user
                                               (system user department) are designed.
                                               The functions required for the system are identified by considering how
                                               operations will change if the system is developed, and human interfaces
                                               such as input/output screens and forms/slips are designed. System archi-
                                               tecture design is also referred to as an “outline design” as it outlines the
                                               type of system that will be used.
                                               In system architecture design, “human interface design” such as input/
                                               output screens and forms/slips, as well as “data design” and “code de-
                                               sign” are implemented.

        Reference                              ●Human interface design
      Human interface design                   “Human interfaces” are points of contact between people and computers.
      Refer to “Chapter 9-1-1 Human inter-     They are also referred to as “user interfaces.” In human interface design,
      face technology.”                        the input/output screens of the system and print images such as forms/slips
                                               are designed.

        Reference                              ●Data design
      Data normalization                       In data design, table data is designed in order to utilize relational databas-
      Refer to “Chapter 9-3-2 Database de-     es. By extracting all data items used in operations and normalizing the
      sign.”                                   data, redundant data is removed.
                                               ●Code design
                                               In a system, various codes such as product numbers and customer numbers
                                               are handled. As these codes require regularity, the rules and items to be en-
                                               coded are determined by the code design.
                                               (2)Software architecture design (Internal design)
                                               In software architecture design, an internal system is designed, which con-
                                               siders “how to implement” the necessary functions of the system. In other
                                               words, it is designed from the perspective of using programming to imple-
                                               ment the functions determined in the system architecture design.
                                               The user (system user department) does not participate in software archi-
                                               tecture design since it is a design of the system’s internal functions.
                                               (3)Software detailed design (Program design)
                                               The internal structure of programs is designed based on the software archi-
                                               tecture design.
                                               In software detailed design, function details in programs are defined, and
                                               detailed processing units of the program structure such as database access
        Reference                              methods (SQL statements) are designed.
      SQL                                      The user (system user department) does not participate in software detailed
      Refer to “Chapter 9-3-3 Data manipula-   design since it is design of the system’s internal functions.
      tion.”




117
3   Development (Programming)                                                     Reference

Individual programs are created based on the content designed during the         Programming
                                                                                 “Programming” involves describing al-
system design stage. In order to run the system, it is important to create the   gorithms ( processing procedures for
individual program processing procedures, processing details, and process-       problem resolution ) according to the
ing results according to the design.                                             rules and syntax of programming lan-
Furthermore, “unit testing (module testing)” is conducted to confirm that         guages, as well as conducting opera-
                                                                                 tion tests.
the individual modules created operate normally according to the “pro-
gram design specification.” Unit testing is conducted in order to discover         Reference
logical errors in modules one by one, and to check whether the modules           Module
function as per the established specifications. In unit testing, verification is   A “module” is the smallest unit that
conducted by using “white box tests” and “compilers.”                            comprises a program. In general, a sin-
                                                                                 gle program is comprised of more than
(1)White box test                                                                one module.
A “white box test” is a technique for checking the internal structure and
logic of a program, focusing on program control and flow.                           Reference
                                                                                 Debugging
      Internal structure of a program                                            “Debugging” is the task of searching for
                                              In scrutinizing the internal       bugs in a computer program and re-
                 ①                            structure, test cases to cover     moving them. Unlike unit testing, if a




                                                                                                                                Chapter 4
                                              all instructions and branch
                                                                                 bug is found to exist, its location is nar-
              ②                               conditions are considered.
                          ③                                                      rowed down and the program is modi-
                 ④                                                               fied.

              ⑤




                                                                                                                                Development technology
                          ⑥
                 ⑦




      ①      ②       ④      ⑤      ⑦        Statement coverage                     Reference
      ①      ③       ④      ⑤      ⑦
      ①      ②       ④      ⑤      ⑦       Condition coverage                    Statement coverage
      ①      ③       ④      ⑥      ⑦       (All test cases are tested)           “Statement coverage” is a method for
      ①      ②       ④      ⑥      ⑦                                             creating test cases so that all instruc-
                                                                                 tions are executed at least once. It is
(2)Compiler                                                                      one of the white box tests.
A “compiler” is software that transforms code created using a program-
                                                                                   Reference
ming language into a program executable by a computer.
Using a compiler, it is possible to confirm bugs (errors) in the created pro-     Condition coverage
                                                                                 “Condition coverage” is a method for
grams.
                                                                                 creating test cases so that both true
                                                                                 and false cases for all decision condi-
                                                                                 tions are covered. It is one of the white
                                                                                 box tests.




                                                                                                                               118
4   Testing
                                               When unit testing is completed, the modules are integrated and testing is
                                               carried out to confirm that the designed/developed system operates nor-
                                               mally and is fit for operation. Testing is an important process for confirm-
                                               ing program and system quality.
                                               Tests are conducted according to test plans, and work continues to proceed
                                               while performance is evaluated.
                                               (1)Test execution procedure
                                               The procedure for conducting each test is as follows.

        Reference                                                            Determine items such as test schedule, participants, and
                                                                             evaluation criteria.
      Program quality                           Test plan creation
                                                                             Tests with the aim of improving the quality of the program
      Program quality improvement should be                                  are not repeated.
      encouraged at the program design
      stage, rather than by repeating tests.

                                                                             Design items such as test data and response to predicted
                                                Test specifications design
                                                                             results according to the design specifications.




                                                                             Create test data and prepare the test environment
                                                                             including apparatus to be used in the test. If the program
                                                                             creator prepares the test data or designs the test
                                                Test environment setting     environment, unexpected errors that could occur are less
                                                                             likely to actually occur. Therefore, it is best if someone
                                                                             other than the program creator is responsible for
                                                                             preparing the test environment.




                                                                             Execute the test according to the test specifications.
                                                                             If the program is modified after completing the test,
                                                Test execution               repeat the test. When doing so, supplement the original
                                                                             test data with data containing modifications that can be
                                                                             confirmed.




                                                                             Evaluate the system on the basis of the test results, and
                                                Test result evaluation
                                                                             determine whether there are any problems.




119
(2)Testing techniques
One of the main testing techniques in system development is the “black
box test.”
A “black box test” is a technique for checking whether functions are in
accordance with specifications, focusing on the output results of input data.
It is a technique used in many test processes.

                                System or program




               Data                                             Result




                              Considered a black box

(3)Test planning
In test planning, data is prepared in order to verify whether the expected
output results are obtained for the input data. However, it is not sufficient




                                                                                       Chapter 4
to end testing when the results for correctly inputted data are confirmed. In
reality, correct data is not always inputted during tasks, and systems are
not necessarily used in a normal state. Therefore, a variety of cases are as-




                                                                                       Development technology
sumed, and the following kinds of test data are prepared.
 Normal data     Confirms that tasks are processed normally.

 Exception       Confirms whether exception data generated by tasks are processed
 data            as exceptions.

 Error data      Confirms whether erroneous data are properly detected as errors.

* After first testing with normal data, testing is conducted with exception data and
  error data.

Two of the main methods used to create test data for conducting black box
tests are “equivalence partitioning” and “boundary value analysis.”




                                                                                      120
●Equivalence partitioning
      “Equivalence partitioning” is a method that divides input data into a
      “valid equivalence class” or an “invalid equivalence class,” and adopts
      values that are representative of each class as test data. A characteristic of
      this method is that test data can be created easily.
       Valid equivalence class            Range of values that are processed normally as input
                                          data
       Invalid equivalence class          Range of values that are errors as input data


             Conditions                                                        Value
           Age of 20 years or over   Valid equivalence class   20 years or over, and, 49 years or under
              Under 50 years         Invalid equivalence class 19 years and under, or 50 years and over

          Age

                  1 2 3              18 19     20 21 22 23            47 48 49         50 51 52


                                                    Valid equivalence class

                          Invalid equivalence class

      ●Boundary value analysis
      “Boundary value analysis” is a method that adopts values at the bounda-
      ries of the equivalence partitioning classes as test data. Due caution is re-
      quired for complex boundary conditions as omissions can easily occur.

             Conditions
                                             19 years, 20 years     Lower limit
           Age of 20 years or over
              Under 50 years                 49 years, 50 years     Upper limit taken as test data

          Age

                   1 2 3             18 19 20 21 22 23                 47 48 49 50 51 52



      (4)Test execution
      The following types of testing are conducted in system development.
      ●Integration testing (Consolidated testing)
      In “integration testing,” modules and programs are integrated and veri-
      fied whether they can be executed correctly according to the software ar-
      chitecture design. Integration testing is conducted between modules and
      between programs for which unit testing is complete. It can confirm
      whether screen transition and data passing between programs is carried out
      correctly. Integrated testing is utilized by the system development depart-
      ment.




121
The following types of testing are included in integration testing.
•Top-down testing                                                                   Reference
“Top-down testing” is a method of testing in sequence starting from the           Sandwich testing
higher-level modules. In many cases, however, the lower-level modules             “Sandwich testing” is a method that
are not all complete. “Stubs” are then prepared, which are temporary              combines top-down and bottom-up test-
                                                                                  ing. It is a type of integration testing.
modules that are called upon by the higher-level modules.
                                                                                    Reference
                         Module A                         Test in sequence from
                    (testing complete)                    higher-level modules    Big bang testing
                                                                                  “Big bang testing” is a method in which
                                                                                  all of the modules are integrated and
                  Module under test                                               tested at once. It is a type of integration
                                                                                  testing.



          Stub                             Stub


•Bottom-up testing
“Bottom-up testing” is a method of testing in sequence starting from the




                                                                                                                                 Chapter 4
lower-level modules. If the higher-level modules are not complete, “driv-
ers,” which are temporary modules that call upon the lower-level modules
are prepared.




                                                                                                                                 Development technology
                            Driver



                   Module under test



           Module B                      Module C
       (testing complete)            (testing complete)   Test in sequence from
                                                          lower-level modules

●System testing (Comprehensive testing)
“System testing” verifies whether the overall functions fulfill the require-
ments specification designed with the system architecture design. It is con-
ducted after integrating programs for which integration testing is complete,
and utilized in cooperation by the system development department and the
user (system user department).




                                                                                                                                122
Reference                                In system testing, the following types of testing may be conducted depend-
      Response time/Turnaround                   ing on the purpose.
      time/Throughput                                   Name                                     Description
      Refer to “Chapter 8-2-2 System evalua-
                                                  Function testing      Verifies that all of the required functions are included.
      tion indexes.”
                                                  Performance           Verifies that the processing performance, including response
                                                  testing               time, turnaround time, and throughput, fulfills the require-
                                                                        ments.
                                                  Exception handling    Verifies that error processing functions and recovery functions
                                                  testing               operate normally.
                                                  Load testing          Applies a load to the system through such means as inputting
                                                  (Rush testing)        a large amount of data and simultaneously increasing the
                                                                        number of operating computer terminals, and verifies that the
                                                                        system can withstand the load.
                                                  Operability testing   Verifies that the system is easy to operate for the user (system
                                                                        user department).
                                                  Regression testing    Verifies that no other programs were affected when errors dis-
                                                                        covered in any of the test processes were modified or when
                                                                        changes were made to the specifications.
                                                  Penetration testing   Detects the system’s security holes and firewall weak points
                                                  (Intrusion testing)   (vulnerability) by actually attempting an attack or intrusion
                                                                        from outside.

                                                 ●Operational testing
                                                 “Operational testing” uses real business data to verify whether the sys-
                                                 tem is appropriate for the realities of the business and whether it can be
                                                 operated in accordance with the operation manual. It is conducted mainly
                                                 by the user (system user department).
                                                 In operational testing, the following items are tested.
                                                         Item                                    Description
                                                  Business function     Verifies that functions required in conducting business are ful-
                                                                        filled.
                                                  Operability           Verifies that the system is easy to operate for the user (system
                                                                        user department).
                                                  Anomaly measures      Verifies that measures have been taken in case of anomalies
                                                                        such as data anomalies, abnormal operation, and equipment
                                                                        anomalies.
                                                  Throughput            Verifies that throughput is sufficient using the current equip-
                                                                        ment configuration.
                                                  Processing time       Verifies that response times are within the acceptable range.


                                                 (5)Test result evaluation
        Reference                                In order to receive system inspection, satisfactory test results must first be
      Receiving inspection                       achieved. At such time, it is necessary to consider the criteria for evaluat-
      “Receiving inspection” refers to testing   ing the system based on the test results.
      and acceptance of a system by the user
      (system user department).




123
Typical evaluation criteria include “bug control charts.” A bug control
chart is a graph showing the relationship between test time and cumulative
number of bugs detected.
An ideal bug control chart forms a curve referred to as a “Gompertz
curve (reliability growth curve).”




                                                                 Cumulative number of bugs
Cumulative number of bugs




                                                                                                   Number of bugs increases and
                              Number of bugs does not increase
                                                                                                   testing has not progressed
                                  Testing can be stopped                                                Problems such as poor
                                                                                                        program quality exist

                                               Test time                                                     Test time
                              Gompertz curve                                                 Not a Gompertz curve



      5                     Software acceptance                                                                                     Reference

Software acceptance occurs when system development is outsourced to an                                                            User manual
                                                                                                                                  A “user manual” is a manual that ex-
external specialist and software is delivered from the outsourcer (develop-
                                                                                                                                  plains how to use the software and sys-
er) to the customer (user). It involves confirming whether all of the re-                                                         tem.




                                                                                                                                                                               Chapter 4
quirements of the user (system user department) are fulfilled, and whether                                                         Before operation, the user manual is
the software operates normally. If there are no problems, the software is                                                         used to provide a tutorial of basic oper-
                                                                                                                                  ations, and after the system is in opera-
delivered and educational and training programs for the user (system user
                                                                                                                                  tion, it is referenced to learn specific




                                                                                                                                                                               Development technology
department) are conducted. It is also referred to as an “approval test (ac-                                                       operations according to the respective
ceptance test).”                                                                                                                  content of work.


      6                     System operation and maintenance
When system development is complete, the user (system user department)
starts utilizing the system. The usage status and operation status of the sys-
tem are then observed, and any issues that arise are resolved. In order to
respond to developments in information technology or changes in business
strategy, programs may also be modified or changed.
(1)Precautions about operation and maintenance                                                                                      Reference
Precautions about system operation and maintenance are listed below.                                                              Document storage
                                                                                                                                  It is important to leave documentation in
             • When performing any modification work, first backup the system before di-                                            each system development process.
               rectly modifying a program in operation. After making the modification, con-
                                                                                                                                  Specific documents include “require-
               duct testing in an environment that is equivalent to the actual environment.
                                                                                                                                  ments definition documents,” “design
             • When any changes are made to a program, always record them in a modifi-
               cation log. This information may prove to be useful when investigating mat-                                        specifications,” “developed programs,”
               ters such as fault causes. A regression test should also be conducted to                                           “test execution plans,” and “test execu-
               confirm that other programs are not affected by the changes.                                                        tion reports.”
             • Always keep the complete set of documents concerning system develop-                                               For example, design specifications can
               ment (such as specifications and operating procedures) up-to-date.                                                  be used as a design drawing for the
             • Monitor issues such as whether there is insufficient disc space due to an in-                                       system under development, which
               crease in data volume, and whether there is a decrease in performance, and                                         those in charge can reference to check
               make improvements/address issues as necessary.                                                                     progress and advance development.
                                                                                                                                  Furthermore, if any changes to the pro-
                                                                                                                                  gram must be made at the operation/
                                                                                                                                  maintenance stage, the test execution
                                                                                                                                  report becomes the only document that
                                                                                                                                  can provide an adequate understanding
                                                                                                                                  of the existing system.




                                                                                                                                                                              124
(2)System maintenance
                                                The following are key maintenance tasks for preventing failures.
                                                     Type of
                                                                                                Description
                                                   maintenance
                                                 Preventative          Remove the causes for future failures before they occur.
                                                 maintenance
                                                 Scheduled             Perform daily checks. Also, enter into a maintenance agree-
                                                 maintenance           ment with a specialist and request hardware checks once a
                                                                       month, for example.
                                                 Remote                Enter into a maintenance agreement with a specialist, and re-
                                                 maintenance           move causes of failure remotely (remote operation) by con-
                                                                       necting the specialist and the user (system user department)
                                                                       via communication lines.

                                                (3)System failure
                                                In terms of maintaining system operation, it is important to take preventive
                                                measures so that failures do not occur. However, for reasons such as sys-
                                                tem modification as a result of tax rate changes, workflow changes, or
                                                hardware lifespan, failures in the existing system could occur and further
                                                modification may be unavoidable.
                                                During system development, it is necessary to consider the occurrence of
                                                failures as unavoidable. The key is to be well-prepared with effective
                                                countermeasures that will prevent failures from adversely affecting the en-
                                                tire system or stopping operations.




                                                      4-1-2 Software estimation
        Reference                               Computerizing operations requires an awareness of cost when determining
      FP                                        which functions to incorporate into the system.
      Abbreviation for “Function Point.”        The following are methods for estimating system development costs.
                                                       Type                    Description                    Characteristics
        Reference
                                                 Program step          A method for estimating the       Suited to estimations for de-
      GUI                                        method                number of program steps           velopment of core business
      Refer to “Chapter 9-1-1 Human inter-                             (number of lines) in the entire   systems with significant ac-
      face technology.”                                                system from past records.         cumulation from the past.
                                                 FP (Function Point)   A method for estimating sys-      Suited to estimations for de-
        Reference                                method                tem development person-           velopment using GUI and ob-
                                                                       hours and development costs       ject orientation.
      Object orientation
                                                                       by quantifying the number of
      Refer to “Chapter 4-2-1 Software devel-                          input/output screens and files
      opment process and methods.”                                     to be used, and the level of
                                                                       difficulty of functions to be
                                                                       developed. Quantified items
                                                                       are referred to as “function
                                                                       points.”




125
Software development
4-2                           management techniques

      4-2-1 Software development
            process and methods
When developing software, a development process and methods that suit
the processing content and scale of the entire system must be determined.

 1    Software development methods
“Software development methods” are methods for advancing the soft-
ware development process. The following are typical development meth-
ods.
      Method                  Description                     Characteristics
 Structured method    A method of programming           Dividing the program into in-
                      that divides the program into     dividual processes makes it




                                                                                                                                       Chapter 4
                      individual processes and          easy to verify or modify oper-
                      forms a hierarchical structure.   ations, and perform mainte-
                      Also referred to as “structured   nance.
                      programming.




                                                                                                                                       Development technology
 Object orientation   A method for modeling a           Business data ( properties )       Reference
                      business and creating a pro-      and roles (behavior) are         Agent orientation
                      gram by considering what          treated as groups of objects
                                                                                         “Agent orientation” is a developed form
                      items (objects) are required      ( components ) , which facili-
                      to advance the business, and      tates partitioning into compo-   of object orientation. An “agent” is soft-
                      defining the object character-     nents and reuse.                 ware that operates and processes tasks
                      istics.                                                            independently in order to accomplish a
 Data oriented ap-    A method of carrying out sys-     The structure of the core data   purpose without detailed instructions
 proach               tem development based on          will not change even if the      from the user. Agent orientation refers
                      databases created by focus-       business content changes,        to that approach and function.
                      ing on the structure of data      which makes it easy to carry
                      used in the business.             out system modifications.
 Process oriented     A method of carrying out sys-     Each system is created
 approach             tem development by focusing       based on the business con-
                      on business processes and         tent and if it changes, the
                      functions.                        system must be significantly
                                                        modified.




                                                                                                                                      126
Reference                                   2   Software development models
      Precautions about the wa-                    The typical software development models are summarized below.
      terfall model
      Since it is impossible to advance differ-         Model                       Description                          Characteristics
      ent processes in parallel, it is necessary    Waterfall model      A development model that ad-              This is the most common de-
      to shorten the time period of the proc-                            vances each process in se-                velopment model. Costs can
      esses themselves by working on the                                 quence without backtracking,              be estimated relatively easily,
      components of a single process that                                similar to the flow of a water-           and this model is often used in
                                                                         fall. Also, dividing the system           large scale developments.
      can be performed in parallel. However,
                                                                         into a number of subsystems               However, the amount of work
      in such cases, people and time are re-
                                                                         and repeatedly carrying out re-           that must be repeated if the
      quired to coordinate the parallel work,                            quirements analysis, design,              system specifications change
      and costs tend to be higher than when                              development, testing, and im-             is extremely large.
      parallel work is not carried out.                                  plementation is called an “in-
                                                                         cremental model.”
        Reference                                   Spiral model         A development model that di-              It can shorten the period until
      RAD                                                                vides the system into a number            the first subsystem is operated.
                                                                         of subsystems and repeats the             Each subsystem is verified by
      “RAD” is a type of development that di-
                                                                         cycle from “requirements anal-            the user (system user depart-
      vides the system to be developed into a
                                                                         ysis” to “operation” for each             ment), making it possible to in-
      number of subsystems, and proceeds                                 subsystem. It develops the                corporate their opinions into
      to develop them starting from the items                            system by allowing it to evolve           the next cycle.
      with the highest priority. The goal is to                          as it grows.
      develop the system in a short time and        Prototyping          A development model that cre-             It can identify any potential
      at low cost using sophisticated software      model                ates prototypes from an early             misunderstandings about the
      development tools. RAD is often used                               stage of system development               system between the user (sys-
      in a prototyping model.                                            and obtains confirmation from              tem user department) and the
      Abbreviation for “Rapid Application De-                            the user (system user depart-             developer at an early stage. It
      velopment.”                                                        ment) as development advanc-              also has the effect of raising
                                                                         es.                                       the awareness of the user
                                                                                                                   (system user department) re-
        Reference
                                                                                                                   garding the system. However,
      Reverse engineering                                                                                          if prototypes are created re-
      “Reverse engineering” is a technique                                                                         peatedly, cost management
      for creating new software by breaking                                                                        can become an issue.
      down and analyzing existing software. It
      may include studying the relationship
      between modules and analyzing the                 Waterfall model
      system’s basic specifications. It is often
      carried out to maintain compatibility with
                                                   Requirements definition
      the existing software.
                                                              Systems architecture design

                                                                          Software architecture design

                                                                                        Software detailed design

                                                                                                     Development (Programming)

                                                                                                                          Testing

                                                                                                                                 Operation and maintenance




127
Spiral model



                 Development (Programming)                                             Testing and evaluation




                                                                                                           Completion




                     Design                                                                       Analysis




     Prototyping model


Requirements definition       Systems architecture design      Creation of prototype




                                                                                                                                                                     Chapter 4
                                                              Execution of prototype
                                                    Confirmation by user (System user department)

                                                                                  OK




                                                                                                                                                                     Development technology
                                                                     Evaluation            Software architecture design
                                                               NG



               Software detailed design     Development (Programming)        Testing        Operation and maintenance




 3      Common frame
A “common frame” is a frame that standardizes the terminology and con-                                                      Reference
tent of work in software development, including planning, development,                                                    SLCP
operation, and maintenance. With a common frame, a system vendor and a                                                    “SLCP” is a common frame for transac-
user can clarify the details of their transaction such as their respective                                                tions and software development cen-
                                                                                                                          tered on software.
roles, scope of business, work content, and scope of responsibilities. This
                                                                                                                          Abbreviation for “Software Life Cycle
enables both parties to share a mutual understanding, which prevents mis-                                                 Process.”
understandings and problems from occurring.                                                                               In Japan, the “SLCP-JCF98 (Common
                                                                                                                          Frame 98)” was established based on
                                                                                                                          the ISO/IEC international standards,
                                                                                                                          which takes into account the character-
                                                                                                                          istics of Japanese commerce and Ja-
                                                                                                                          pan’s software industry. In September
                                                                                                                          2007, the contents of the SLCP-JCF98
                                                                                                                          were reinforced and expanded, and the
                                                                                                                          “SLCP-JCF2007 ( Common Frame
                                                                                                                          2007)” was published.
                                                                                                                          Abbreviation for “SLCP-Japan common
                                                                                                                          frame.”




                                                                                                                                                                    128
4-3             Chapter quiz

       4-1   When the information system department performs the procedure of the requirements defi-
             nition, system design, programming, and testing in the flow of software development,
             which of the following most needs the participation of the user departments?

                a)   Requirements definition
                b)   System design
                c)   Programming
                d)   Unit test


       4-2   When the scale of software development is estimated, which of the following is an appro-
             priate element that should be considered?

                a)   Developer’s skills
                b)   Development organization
                c)   Number of screens
                d)   Schedule


       4-3   Which of the following shows part of the phases of software development in the order of
             implementation?

                a)   System design, testing, programming
                b)   System design, programming, testing
                c)   Testing, system design, programming
                d)   Programming, system design, testing


       4-4   Which of the following is the software development model that performs the requirements
             definition, system design, programming, and testing in that order, and checks carefully so
             as not to return to the previous phase when each phase is completed?

                a)   RAD (Rapid Application Development)
                b)   Waterfall model
                c)   Spiral model
                d)   Prototyping model




129
Chapter


                           5

Project management
   Chapter 5 explains the processes of project manage-
   ment and techniques of project scope management.




   5-1 Project management ......................... 131
   5-2 Chapter quiz ...................................... 138
5-1                          Project management

                                                5-1-1 Project management
                                           In pursuing various corporate activities such as the development of new
                                           information systems and services, it is important for a corporation to exe-
                                           cute plans in unison with a sense of purpose that is shared throughout the
                                           corporation. In general, it is efficient to execute a plan by assembling a
       Reference                           project organization and executing the project as an organization, while
      Project organization                 managing various aspects such as progress of the project, cost, quality, and
      Refer to “Chapter 1-1-1 Management   members.
      and organization.”

                                            1   Project
                                           A “project” is temporarily assembled in order to execute activities and
                                           achieve a specific purpose within a specified time.
                                           The main characteristics of a project are summarized below.

                                            • A clear purpose is defined before the project is initiated.
                                            • A series of activities is undertaken to achieve the purpose.
                                            • Activities are executed by a temporary group.
                                            • Persons with specialized knowledge from various fields are assembled.
                                            • Work that is non-routine and non-repetitive is executed.
                                            • Activities are undertaken using defined resources.
                                            • The project is disbanded after achieving the purpose.

                                           A project is engaged for the purpose of executing non-routine work instead
                                           of simple and routine work. An example is the development of a new in-
                                           formation system. In order to achieve such purposes, it is important to
                                           manage the project using defined management resources (people, materi-
                                           als, money, and information).

                                            2   Project management
                                           “Project management” is a management technique to facilitate every
                                           process of a specified project within the corporation from initiation to
                                           completion.




131
The typical processes for a project are summarized below.

                                  Initiate the project and plan the course of
       Initiation and planning
                                  action.



                                                                                                   Reference
                                  Execute the project and monitor the work
       Execution and monitoring   schedule, costs, and quality.                                  Milestone
                                                                                                 A “milestone” is a term used in project
                                                                                                 management to denote an important
                                  Close the project once the purpose is achieved, and evaluate   point in the work schedule such as the
       Closing and evaluation
                                  the work performance and deliverables (finished product).      integration testing date or customer re-
                                                                                                 view date.

(1)Project initiation and planning                                                                 Reference
The “project manager” plays a central role in initiating the project. The                        Project manager
project is usually initiated after the client (commissioning party) that re-                     A “project manager” is an individual who
quests the systems development approves the documentation that describes                         manages and oversees projects or is
                                                                                                 nationally certified to manage a project.
the project outline. At that point, a “kick-off” meeting is conducted with
                                                                                                 In the case of the former, a project man-
the “project members” to discuss various aspects such as the framework                           ager organizes project members, man-
and key points of the project, progress (schedule), and management meth-                         ages the project schedule, and makes
od. Afterwards, a detailed plan is formulated and a “project plan” is pre-                       decisions concerning work processes.
pared.
                                                                                                   Reference
(2)Project execution and monitoring                                                              Project member




                                                                                                                                              Chapter 5
After the project plan is completed, the project moves into the execution                        A “project member” refers to one of the
phase and work begins. During project execution, the project manager                             members of a project.

makes sure to communicate with project members and the client, and mon-
                                                                                                   Reference
itors the performance of the project including the progress of the project,




                                                                                                                                              Project management
                                                                                                 Stakeholder
cost, and quality. The project manager makes adjustments as the need aris-                       In the context of project management, a
es.                                                                                              “stakeholder” refers to an individual who
                                                                                                 is variously impacted by the project or
(3)Project closing and evaluation                                                                has a stake in its success or failure.
After the target system is completed, the project is closed and disbanded.                       Project stakeholders include the project
Once the client has accepted the system, a “project completion report” is                        client, project manager, project mem-
                                                                                                 bers, and users. It is important to man-
prepared.
                                                                                                 age each respective stakeholder in an
The project completion report includes a performance evaluation of all                           appropriate manner.
work such as the actual cost and progress, and a list of the final delivera-
bles (finished product). The evaluation contains information that will be
useful for the next project such as variance between the plan and actual
performance, changes occurred and their causes, and risks encountered and
their countermeasures.




                                                                                                                                             132
5-1-2 Project scope management
                                               “Project scope management” is a management technique that analyzes
                                               the final deliverables of the project and the work scope required, and man-
                                               ages the relationship between the deliverables and work scope.
        Reference                              The “Project Management Body of Knowledge (PMBOK)” is an inter-
      PMBOK                                    national standard that provides guidelines for project managers to execute
      Abbreviation for “Project Management     projects in an integrated manner using project scope management tech-
      Body of Knowledge,” which is a stand-    niques.
      ard framework for project scope man-
                                               PMBOK recognizes the nine knowledge areas listed below.
      agement based on a body of knowledge
      advocated by the U.S.-based Project       Scope               Define the deliverables and work scope.
      Management Institute (PMI).               Time                Coordinate the work processes and schedule.
                                                Cost                Determine the budget.
                                                Quality             Define the quality targets and inspect the quality.
                                                Human resources     Procure and train the project members.
                                                Communication       Achieve mutual understanding and share information between
                                                                    the project members and teams.
                                                Risk                Predict the risks and determine countermeasures to avoid and
                                                                    address the risks.
                                                Procurement         Select the necessary resources, issue orders, and sign agree-
                                                                    ments.
                                                Integration         Integrate the other knowledge areas and manage the overall
                                                                    project.

                                               The key characteristic of PMBOK is that it achieves an overall balance of
                                               these knowledge areas to enable flexibility in response, even if there are
                                               significant changes to the deliverables or work scope.

                                                1      Scope
        Reference                              “Scope” refers to the final deliverables of the project, and the work scope
      WBS                                      required to produce the deliverables. The scope is defined using a “WBS
      Abbreviation for “Work Breakdown         (Work Breakdown Structure).”
      Structure.”
                                               ●Work breakdown structure
        Reference                              A “WBS (Work Breakdown Structure)” is a chart that breaks down the
      OBS                                      work scope of the project into detailed items, and organizes the items into
      Abbreviation for “Organization Break-    a hierarchy. The procedure for preparing a WBS is outlined below.
      down Structure.” OBS is a chart that
      breaks down the project member or-
                                                          Determine the individual deliverables of the project.
      ganization into parts and organizes
      them into a hierarchical structure.

        Reference                                   Determine the work scope required to achieve the deliverables.
      CBS
      Abbreviation for “Cost Breakdown
      Structure.” CBS is a chart that breaks        Break down the work scope into parts, and determine the work.
      down the project cost into components
      and organizes it into a hierarchical
      structure.




133
WBS chart

                   Deliverable A


                            Work scope 1


                                      Work (1)


                                      Work (2)


                            Work scope 2

                                      Work (1)


                                      Work (2)


                   Deliverable B


                            Work scope 1

                                      Work (1)


                                      Work (2)




Once the WBS is prepared, it becomes the foundation for all work areas
under PMBOK.
In addition, if any excesses or deficiencies are found in the WBS or while




                                                                                                                           Chapter 5
the project is in progress, the scope is reviewed to ensure that it is always
up-to-date, and it is updated as any changes arise.

      Time




                                                                                                                           Project management
 2                                                                                 Reference

The work content identified by WBS is used as the basis for estimating the        Arrow Diagram, PERT chart,
approximate number of days required. The estimated number of days is             Gantt chart
                                                                                 Refer to “Chapter 1-1-2 OR (Operations
used to divide the schedule for each piece of work according to the
                                                                                 Research) and IE (Industrial Engineer-
planned delivery dates in order to manage progress.                              ing).”
The schedule plan is determined based on the calculated number of operat-
ing days, clarifying the confirmation of progress, completion date, and
handover of each individual piece of work.
“Arrow diagrams” and “PERT ( Program Evaluation and Review
Technique ) ” charts are used to prepare the schedule plan. A “Gantt
chart” is used to illustrate the planned schedule.
Since there is a variety of work for each project, it is necessary to estimate
the number of days required for each piece of work.




                                                                                                                          134
In the following arrow diagram example, work E can be started when work
      C and work D are both finished. In other words, work E can be processed
      seven days after the work is started.




           Work A                          Work C
                    2 days       5 days

              Work B              Work D             Work E
               2 days             3 days             2 days




       Example
       In the following arrow diagram, calculation for the overall number
       of days required if work C can be shortened to three days is illus-
       trated.




           Work A                          Work C
                    2 days       5 days               Shortened to 2 days


              Work B              Work D             Work E
              2 days              3 days             2 days



      The overall number of days required is calculated as follows (before work
      C is shortened to three days).
      Work A (2 days) + Work C (5 days) = 7 days
      Work B (2 days) + Work D (3 days) = 5 days
      Seven days are needed until both work C and work D are finished, so the
      overall number of days required is: 7 days + Work E (2 days) = 9 days.
      If work C is shortened to three days, at most five days are needed until
      work C and work D are finished. Therefore, the overall number of days re-
      quired is: 5 days + Work E (2 days) = 7 days.




135
3   Cost
The work content identified by WBS is used to estimate the approximate
cost required. The estimated cost is used as the basis to define and manage
the budget. An “EVMS (Earned Value Management System)” is used for
cost management.
●Earned value management system                                                  Reference
An “EVMS (Earned Value Management System)” is a technique for                  EVMS
quantitatively evaluating the progress of a project by comparing it with the   Abbreviation for “Earned Value Man-
budget and work schedule.                                                      agement System.”
EVMS is used to prepare a cost plan based on the estimated person-hours
                                                                                 Reference
derived from the breakdown of work from the WBS, and the variance of
                                                                               Person-hours
the schedule and cost is measured. The measured results are then analyzed
                                                                               “Person-hours” represent the volume of
to forecast work delays and over-budgeting, and adjustments are made to        work required for activities such as sys-
the schedule and budget.                                                       tem development. Person-hours are
                                                                               typically indicated in person-month
                                                                               units.
 4   Quality
Quality is maintained and improved by defining and managing the desired           Reference

quality targets of the deliverables, which are based on the deliverables       Person-months
identified by WBS. The following items are reviewed and summarized in a         “Person-months” are a unit of person-
                                                                               hours. One person-month equals the
“quality management plan:” targets, quality maintenance and improve-           amount of work performed by one per-
ment plan, quality inspection technique, review plan, and testing method.




                                                                                                                            Chapter 5
                                                                               son in a single month.
                                                                               Example Work that takes one person
 5   Human resources                                                           three months to accomplish represents
                                                                               three person-months of work.
Project members are procured based on the deliverables identified by           Example Work that takes two persons




                                                                                                                            Project management
WBS, as well as work scope, time, cost, and quality. The project team is       three months to accomplish represents
                                                                               six person-months of work.
also structured and trained according to the deliverables and work scope.
The success of the project hinges on manpower and teamwork. In order to
effectively capitalize on the capabilities of all persons involved in the
project, it is necessary to prepare an optimum environment and assign the
right project members to the right positions.

 6   Communication
It is necessary to manage communication so that there is sharing of infor-
mation, and mutual understanding between working project members and
the project manager. E-mail is typically used for communication, but other
methods are also used to share information within the project such as pre-
paring mailing lists and using groupware. In addition, regular meetings are      Reference

held to encourage mutual understanding between project members, infor-         Mailing list
mation sharing, and reporting on progress.                                     Refer to “Chapter 9-4-3 Network appli-
                                                                               cation.”

                                                                                 Reference
                                                                               Groupware
                                                                               Refer to “Chapter 3-1-2 Concept of busi-
                                                                               ness process.”




                                                                                                                           136
7   Risk
      The deliverables and work scope identified by WBS are used as the basis
      for predetermining the possible locations and types of risks that may occur,
      as well as the extent of the losses and the degree of impact that those risks
      may entail. The predetermined risks should be ranked – starting with the
      highest rate of occurrence and the largest loss impact – to determine which
      risks should be prioritized and dealt with. In addition, it is integral to the
      process that sufficient countermeasures are prepared in advance for the
      predetermined risks.
      If a risk actually arises, it is dealt with according to the course of action
      that has been devised based on the risk analysis and countermeasures. It is
      also necessary to be prepared to deal with legal issues due to the possibili-
      ty of various contractual risks that could arise.

       8   Procurement
      Necessary technologies and services are procured from an external source
      in order to execute a project.
      The deliverables and work scope identified by WBS are used as the basis
      for examining the technologies and services that need to be externally pro-
      cured, followed by the selection of candidate suppliers. This process is re-
      ferred to as “solicitation.” Suppliers are typically chosen through bidding
      or quotation, or they are directly designated. The workflow from process-
      ing orders and contracts to receiving inspection is managed in a compre-
      hensive manner.

       9   Integration
      All of the work areas are comprehensively managed to achieve unity in the
      entire project. Overall policies and plans for the project are formulated,
      and any changes that occur during the execution of the project are ad-
      dressed. In some cases, new or more efficient technologies are developed
      during the course of a long-term project, requiring the ability to flexibly
      adapt when necessary. Accordingly, any new developments such as major
      schedule delays, delivery date extensions, and cost increases should be
      thoroughly discussed. In short, the overall project should be managed in a
      manner that ultimately yields the desired deliverables.




137
5-2                            Chapter quiz
*See page 9 in the “Answers and Explanations” booklet for the correct answers.


     5-1          When one day is reduced for Activity C and three days are reduced for Activity B in the ar-
                  row diagram shown below, how many days can be reduced in total?


                               A               C


                                                          Legend
                                                              Activity name
                                   B       D
                                                              Days required



                      a)   1
                      b)   2
                      c)   3
                      d)   4


     5-2          A project with 50 work items of equivalent labor was planned to be finished in 10 days.
                  The fifth day is now over, and only 20 work items have been completed so far. By how




                                                                                                                 Chapter 5
                  many days is the project delayed at this point? Here, the delay is given by the difference
                  from the number of days it should have taken to complete the work items that are currently
                  finished.




                                                                                                                 Project management
                      a)   1
                      b)   2
                      c)   4
                      d)   5




                                                                                                                138
5-3   Which of the following is described in a project plan?

               a)   Screen layout
               b)   Workflow
               c)   Schedule
               d)   Program structure


      5-4   It takes 24 days for Mr. A to complete a certain software development and 12 days for Mr.
            B. When both Messrs. A and B work together, 25% of all the working hours in a day are
            needed for preliminary discussion. When both Messrs. A and B work together, how many
            days does it take to complete the development?

               a)   6
               b)   8
               c)   11
               d)   12




139
Chapter


                           6

Service management
   Chapter 6 explains the basic roles and components of
   IT service management including the management of
   information system operations, service support, the
   concept of system environment development, and the
   basic principles of system audits.




   6-1 Service management ........................ 141
   6-2 System audit ..................................... 147
   6-3 Chapter quiz ..................................... 152
6-1                               Service management

                                                       6-1-1 Service management
                                                 “Service management” is the act of operating an information system in a
                                                 stable and efficient manner to maintain and improve the quality of user
                                                 services.

                                                  1   IT Service management
                                                 “IT service management” is a method of management that associates the
                                                 operation of information systems with the provision of IT service in order
                                                 to facilitate stable and efficient operations.
                                                 For example, by providing various IT services, entities such as financial
                                                 institutions and transportation companies are supporting business manage-
                                                 ment and society overall. If trouble arises in those IT services, it could
                                                 have a major impact not only on those companies themselves but also on
                                                 the entire society, leading to accidents and confusion.
                                                 For that reason IT services are managed in such a way as to ensure effi-
                                                 cient operation and to maintain and improve the quality of the services
                                                 themselves.

                                                  2   ITIL
        Reference                                “ITIL” is a framework of know-how, best approaches, best practices, etc.
      ITIL                                       designed to create a successful business utilizing IT services. It was put to-
      Abbreviation for “Information Technolo-    gether in the form of a series of books published by the “OGC,” a UK
      gy Infrastructure Library.”                government agency, in the late 1980s and serves as the “de facto stand-
                                                 ard” of IT service management.
        Reference
                                                 ITIL is a comprehensive set of guidelines for IT services, but not all IT
      OGC
                                                 service operations need to be brought into line with it. It is best to compare
      Abbreviation for “Office of Government
      Commerce.”                                 the actual work against the framework and use the relevant parts as a refer-
                                                 ence for operations.
        Reference
      De facto standard
      A “de facto standard” is an industry
      standard that is established not through
      formal approval, but through widely-ac-
      cepted use within the industry.




141
(1)ITIL system diagram
The ITIL framework can be expressed with the following diagram.

                        Service management implementation planning



                                     IT service management




                                                                                          Technology
       Business




                                      Service                                 ICT
                   Business                         Service              infrastructure
                  perspective         support       delivery             management


                                                Security management

                                    Application management


(2)ITIL framework
ITIL is summarized in the following seven books.
 Service support            Guidelines for daily operations and support. Explains the
                            method how to provide support to users so that they can ap-
                            propriately use IT services.
 Service delivery           Guidelines for formulating a medium- to long-term plan and
                            making improvements to it. Explains the method how to ap-
                            propriately provide IT services, touching on things like invest-
                            ment effects and availability.
 Service manage-            Explains the method how to formulate a plan for implement-
 ment implementa-           ing IT service management.
 tion planning
 Business perspec-          Explains the best practices for service support and service
 tive                       delivery, focusing on the business perspective.
 Application man-           Explains the life cycle and investment effect of software.




                                                                                                        Chapter 6
 agement
 ICT infrastructure         Explains the best practices for infrastructure management.
 management
 Security manage-           Explains how to ensure the security and confidentiality of




                                                                                                        Service management
 ment                       data.

“Service support” and “service delivery,” which are components of “IT
service management,” form the core of ITIL.
These two items can be broken down into the processes listed below.
                     Service support                      Service delivery

                    Incident management                Service level management
                    Problem management                 IT service financial management
                    Configuration management           Capacity management
                    Change management                  IT service continuity management
                    Release management                 Availability management
                    Service desk




                                                                                                       142
6-1-2 Service support
                                                    “Service support” is a set of processes for supporting service operations
                                                    and is one part of the ITIL framework. It consists of five processes and a
                                                    service desk. IT services are managed in an integrated fashion by execut-
                                                    ing these processes.
                                                    The processes of service support are summarized below.
                                                    (1)Incident management (fault management)
        Reference                                   “Incident management” minimizes the length of service interruptions
      Incident                                      and the external impact when incidents occur in IT services, and takes
      An “incident” is a failure, accident or un-   steps to restore normal service as quickly as possible and resolve the inci-
      expected occurrence that happens              dent. An incident that is resolved before it becomes serious is known as a
      within the computer system.
                                                    “close call,” and management is exercised in such a way as to utilize these
                                                    lessons as well.
                                                    (2)Problem management
                                                    “Problem management” treats the causes of incidents as “problems”
                                                    and looks for the root cause. Measures to resolve the problems are re-
                                                    viewed and carried over into change management.
                                                    (3)Configuration management
                                                    “Configuration management” involves managing assets that comprise IT
                                                    services such as hardware and software, and keeping them in top shape in
                                                    order to provide better IT services.
                                                    (4)Change management
                                                    “Change management” involves reviewing the solutions produced by
                                                    problem management and changes to configuration made necessary by life
                                                    cycles, and performing an evaluation to determine whether to proceed to
                                                    release management.
                                                    (5)Release management
                                                    “Release management” implements the changes decided upon in the
                                                    process of change management.
                                                    (6)Service desk
                                                    The “service desk” is the point of contact where user inquiries are handled.
                                                    Other names for it include “help desk”, “call center”, and “user support.”
                                                    In general, the service desk accepts inquiries on how to use products and
                                                    services and how to fix problems and deals with repair requests and com-
                                                    plaints. Inquiries may be accepted in the form of phone calls, e-mails, faxes,
                                                    etc., but if multiple points of contact are set up depending on the contents of
                                                    the inquiry, it can become difficult to determine the appropriate point of con-
                                                    tact, which results in wasted time. It is then necessary to implement measures
                                                    such as consolidating the points of contact.
                                                    If the inquiries received are registered in a database, they can be published as
                                                    a FAQ on a website or analyzed and used to improve products and services.




143
6-1-3 Service delivery
“Service delivery” is a set of processes for implementing long-term plans
for and improvements to IT services, and is one part of the ITIL frame-
work. It consists of five processes, and by executing them, stable IT serv-
ices can be provided.
The processes of service delivery are summarized below.
(1)Service level management
“Service level management” is the process of maintaining and making
improvements to the service level based on the agreement between the IT
service provider and user.
The “service level agreement (SLA)” and “service level management
(SLM)” are executed and managed in order to ensure quality and provide
stable IT services.
●Service level agreement (SLA)                                                 Reference
A “service level agreement” is a “quality assurance agreement” formed        SLA
between the IT service provider and user with respect to the management      Abbreviation for “Service Level Agree-
of operations, and it defines the quality and scope of the IT services. The   ment.”
agreement includes the scope of the system services, pricing, support
hours, target recovery time for system failures, etc.
This form of contract was originally popularized by telecommunications
carriers to guarantee the quality of communications in network services.
Standards are set for things like minimum data transfer speeds and maxi-
mum downtimes, and rules for penalties and compensation are stipulated




                                                                                                                       Chapter 6
for instances where the standards are not met. These agreements are cur-
rently utilized in a wide range of IT services.




                                                                                                                       Service management




                                                                                                                      144
3 management
3 management
3 management
3 management
3 management
3 management
3 management
3 management
3 management

More Related Content

What's hot

SE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration ManagementSE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration Management
Amr E. Mohamed
 
Ch21-Software Engineering 9
Ch21-Software Engineering 9Ch21-Software Engineering 9
Ch21-Software Engineering 9Ian Sommerville
 
System engineering
System engineeringSystem engineering
System engineeringSlideshare
 
Ch 12 describing information system
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information systemKhan Yousafzai
 
Ch25 configuration management
Ch25 configuration managementCh25 configuration management
Ch25 configuration management
software-engineering-book
 
OMNITRACKER Requirement Management
OMNITRACKER Requirement ManagementOMNITRACKER Requirement Management
OMNITRACKER Requirement ManagementOMNINET USA
 
461361 1013243 chapter_2_dec__11
461361 1013243 chapter_2_dec__11461361 1013243 chapter_2_dec__11
461361 1013243 chapter_2_dec__11
anup4704
 
Software configuration items
Software configuration itemsSoftware configuration items
Software configuration items
ashok kumar
 
Embedded Systems Q and A M.Sc.(IT) PART II SEM III
Embedded Systems Q and A M.Sc.(IT) PART II SEM IIIEmbedded Systems Q and A M.Sc.(IT) PART II SEM III
Embedded Systems Q and A M.Sc.(IT) PART II SEM III
Ni
 
Software Engineering unit 4
Software Engineering unit 4Software Engineering unit 4
Software Engineering unit 4
Abhimanyu Mishra
 
Requirements analysis
Requirements analysisRequirements analysis
Requirements analysis
asimnawaz54
 
software configuratiom management role n resposnbilities
software configuratiom management role n resposnbilitiessoftware configuratiom management role n resposnbilities
software configuratiom management role n resposnbilities
Mahesh Panchal
 
Requirement analysis and specification, software engineering
Requirement analysis and specification, software engineeringRequirement analysis and specification, software engineering
Requirement analysis and specification, software engineering
Rupesh Vaishnav
 
Software (requirement) analysis using uml
Software (requirement) analysis using umlSoftware (requirement) analysis using uml
Software (requirement) analysis using umlDhiraj Shetty
 
Ch2-Software Engineering 9
Ch2-Software Engineering 9Ch2-Software Engineering 9
Ch2-Software Engineering 9Ian Sommerville
 

What's hot (19)

SE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration ManagementSE2_Lec 22_Software Configuration Management
SE2_Lec 22_Software Configuration Management
 
Ch21-Software Engineering 9
Ch21-Software Engineering 9Ch21-Software Engineering 9
Ch21-Software Engineering 9
 
System Design
System DesignSystem Design
System Design
 
System engineering
System engineeringSystem engineering
System engineering
 
Ch 12 describing information system
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information system
 
Ch25 configuration management
Ch25 configuration managementCh25 configuration management
Ch25 configuration management
 
OMNITRACKER Requirement Management
OMNITRACKER Requirement ManagementOMNITRACKER Requirement Management
OMNITRACKER Requirement Management
 
461361 1013243 chapter_2_dec__11
461361 1013243 chapter_2_dec__11461361 1013243 chapter_2_dec__11
461361 1013243 chapter_2_dec__11
 
Chap12
Chap12Chap12
Chap12
 
Software configuration items
Software configuration itemsSoftware configuration items
Software configuration items
 
Embedded Systems Q and A M.Sc.(IT) PART II SEM III
Embedded Systems Q and A M.Sc.(IT) PART II SEM IIIEmbedded Systems Q and A M.Sc.(IT) PART II SEM III
Embedded Systems Q and A M.Sc.(IT) PART II SEM III
 
Chap02
Chap02Chap02
Chap02
 
Software Engineering unit 4
Software Engineering unit 4Software Engineering unit 4
Software Engineering unit 4
 
Requirements analysis
Requirements analysisRequirements analysis
Requirements analysis
 
software configuratiom management role n resposnbilities
software configuratiom management role n resposnbilitiessoftware configuratiom management role n resposnbilities
software configuratiom management role n resposnbilities
 
Requirement analysis and specification, software engineering
Requirement analysis and specification, software engineeringRequirement analysis and specification, software engineering
Requirement analysis and specification, software engineering
 
Transition to System Design
Transition to System DesignTransition to System Design
Transition to System Design
 
Software (requirement) analysis using uml
Software (requirement) analysis using umlSoftware (requirement) analysis using uml
Software (requirement) analysis using uml
 
Ch2-Software Engineering 9
Ch2-Software Engineering 9Ch2-Software Engineering 9
Ch2-Software Engineering 9
 

Similar to 3 management

ccs356-software-engineering-notes.pdf
ccs356-software-engineering-notes.pdfccs356-software-engineering-notes.pdf
ccs356-software-engineering-notes.pdf
VijayakumarKadumbadi
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
MuhammadTalha436
 
Lecture - 7-10.pptx
Lecture - 7-10.pptxLecture - 7-10.pptx
Lecture - 7-10.pptx
FarHana74914
 
Online movie ticket booking
Online movie ticket bookingOnline movie ticket booking
Online movie ticket bookingmrinnovater007
 
Software process
Software processSoftware process
Software process
Jennifer Polack
 
3Audit Software & Tools.pptx
3Audit Software & Tools.pptx3Audit Software & Tools.pptx
3Audit Software & Tools.pptx
jack952975
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
Zahoorali Khan
 
Softwareenggineering lab manual
Softwareenggineering lab manualSoftwareenggineering lab manual
Softwareenggineering lab manual
Vivek Kumar Sinha
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
Zahoor Khan
 
Software Engineering UPTU
Software Engineering UPTUSoftware Engineering UPTU
Software Engineering UPTU
Rishi Shukla
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
Mohamed Essam
 
SE
SESE
software engineering
software engineeringsoftware engineering
software engineeringparamalways
 
Software engineering
Software engineeringSoftware engineering
Software engineering
Stella526835
 
Software developement life_cycle_v1.1
Software developement life_cycle_v1.1Software developement life_cycle_v1.1
Software developement life_cycle_v1.1
Ganapathi M
 
Software Engineering Process Models
Software Engineering Process Models Software Engineering Process Models
Software Engineering Process Models
Satya P. Joshi
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
RobinsonObura
 

Similar to 3 management (20)

ccs356-software-engineering-notes.pdf
ccs356-software-engineering-notes.pdfccs356-software-engineering-notes.pdf
ccs356-software-engineering-notes.pdf
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
Lecture - 7-10.pptx
Lecture - 7-10.pptxLecture - 7-10.pptx
Lecture - 7-10.pptx
 
Online movie ticket booking
Online movie ticket bookingOnline movie ticket booking
Online movie ticket booking
 
Software Engineering
Software  EngineeringSoftware  Engineering
Software Engineering
 
Software process
Software processSoftware process
Software process
 
3Audit Software & Tools.pptx
3Audit Software & Tools.pptx3Audit Software & Tools.pptx
3Audit Software & Tools.pptx
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Softwareenggineering lab manual
Softwareenggineering lab manualSoftwareenggineering lab manual
Softwareenggineering lab manual
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
Software Engineering UPTU
Software Engineering UPTUSoftware Engineering UPTU
Software Engineering UPTU
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
SE
SESE
SE
 
software engineering
software engineeringsoftware engineering
software engineering
 
Sdlc
SdlcSdlc
Sdlc
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Software developement life_cycle_v1.1
Software developement life_cycle_v1.1Software developement life_cycle_v1.1
Software developement life_cycle_v1.1
 
Computers in management
Computers in managementComputers in management
Computers in management
 
Software Engineering Process Models
Software Engineering Process Models Software Engineering Process Models
Software Engineering Process Models
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 

More from Ratchanee Sangkaew

รูปแบบคำถามใน Google docs
รูปแบบคำถามใน Google docsรูปแบบคำถามใน Google docs
รูปแบบคำถามใน Google docs
Ratchanee Sangkaew
 
GoogleDocs
GoogleDocsGoogleDocs
GoogleDocs
Ratchanee Sangkaew
 
Tab10 1 manual
Tab10 1 manualTab10 1 manual
Tab10 1 manual
Ratchanee Sangkaew
 

More from Ratchanee Sangkaew (8)

Pinterest regis
Pinterest regisPinterest regis
Pinterest regis
 
รูปแบบคำถามใน Google docs
รูปแบบคำถามใน Google docsรูปแบบคำถามใน Google docs
รูปแบบคำถามใน Google docs
 
GoogleDocs
GoogleDocsGoogleDocs
GoogleDocs
 
Tab10 1 manual
Tab10 1 manualTab10 1 manual
Tab10 1 manual
 
MetatagAnalyzer
MetatagAnalyzerMetatagAnalyzer
MetatagAnalyzer
 
4 technology
4 technology4 technology
4 technology
 
2 strategy
2 strategy2 strategy
2 strategy
 
1 contents about_book
1 contents about_book1 contents about_book
1 contents about_book
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

3 management

  • 1. MANAGEMENT Chapter 4 Development technology ........ 114 Chapter 5 Project management .............. 130 Chapter 6 Service management ............. 140
  • 2.
  • 3. Chapter 4 Development technology Chapter 4 explains system development processes and test techniques, as well as software development processes and development methods. 4-1 System development technology ..... 115 4-2 Software development management techniques .. 126 4-3 Chapter quiz .................................... 129
  • 4. 4-1 System development technology 4-1-1 Process of system development Systems used in business operations are expected to perform the necessary functions properly, but must also be easy for the user (system user depart- ment) to utilize. It is important for the department developing a system to survey/analyze requirements in cooperation with the various departments that will use the system, and reflect the results into the system under development. System development does not necessarily have to be carried out internally, and may also be outsourced to a company that specializes in system devel- opment. Reference A “service contract” is a typical method for forming an agreement when Service contract system development is outsourced to another company. A “service contract” is a contract that is The general procedure for developing a system is as shown below. formed when the party placing the order presents terms to the contractor regard- Requirements definition Determine the functions required of the system. ing what they want to be delivered and when, as well as the remuneration for the finished product, and the contractor accepts those terms. System design Design the system based on the requirements definition. Reference Need for review For each system development process, Development Develop the system based on the design details. (Programming) a “review” must be conducted. Reviews check/confirm that there are no bugs (errors) in the system or design, and serve the purpose of improving quality Check that the designed/developed system operates Testing by finding any potential bugs and recti- properly. fying them. Reviews may be conducted by the indi- vidual developer, a small project team, Verify that the designed system operates according to the System acceptance or by all those concerned. requirements. Although it is effective for the developer to conduct a review, it is beneficial for persons other than the developer to System operation/ Resolve any issues the user (system user department) conduct a review as well. An outside maintenance encounters during system operation. perspective allows for an objective check, which makes it possible to catch bugs that go unnoticed by the develop- er. 115
  • 5. 1 Requirements definition A “requirements definition” clarifies the function, performance, and con- tent required of the system and software, and includes a “system require- ments definition” and a “software requirements definition.” The de- mands of the user (system user department) are surveyed/analyzed to de- termine whether they are technologically feasible, and the requirements for achieving the demands are then defined in detail. This is the first step in system design, which plays a critical role in deter- mining the success or failure of the subsequent system. In order to develop a better system, the requirements are defined in coop- eration with the various departments that will use the system. ●System requirements definition In a “system requirements definition,” the types of functions that are re- quired for computerization are clearly stipulated. In general, factors that determine system reliability such as operating con- ditions, security performance, and hardware used are stipulated. Accord- ingly, it is necessary to set priorities in order to maximize results within a Chapter 4 limited budget, and determine whether the content described in the system requirements definition is worth the cost. ●Software requirements definition Development technology In a “software requirements definition,” the required software content is specified on the basis of the actual business content. In general, details such as the system interface, operability, functions re- quired for business, operation, and maintenance are stipulated. At such time, hearings are conducted with the users (system user department) in order to gather as many opinions as possible, although it is also necessary to analyze/consider whether those requirements can be realized. 2 System design The system is designed based on the requirements definition. The procedure for designing a system is summarized below. The user (system user department) designs the Systems architecture components of the system that can be seen from the design (External design) outside. The system development department designs the Software architecture internal functions required by the system in order to design (Internal design) realize the functions determined in the system architecture design. The system development department designs the internal Software detailed design structure of the programs based on the software (Program design) architecture design. 116
  • 6. (1)Systems architecture design (External design) In a systems architecture design, components that are visible to the user (system user department) are designed. The functions required for the system are identified by considering how operations will change if the system is developed, and human interfaces such as input/output screens and forms/slips are designed. System archi- tecture design is also referred to as an “outline design” as it outlines the type of system that will be used. In system architecture design, “human interface design” such as input/ output screens and forms/slips, as well as “data design” and “code de- sign” are implemented. Reference ●Human interface design Human interface design “Human interfaces” are points of contact between people and computers. Refer to “Chapter 9-1-1 Human inter- They are also referred to as “user interfaces.” In human interface design, face technology.” the input/output screens of the system and print images such as forms/slips are designed. Reference ●Data design Data normalization In data design, table data is designed in order to utilize relational databas- Refer to “Chapter 9-3-2 Database de- es. By extracting all data items used in operations and normalizing the sign.” data, redundant data is removed. ●Code design In a system, various codes such as product numbers and customer numbers are handled. As these codes require regularity, the rules and items to be en- coded are determined by the code design. (2)Software architecture design (Internal design) In software architecture design, an internal system is designed, which con- siders “how to implement” the necessary functions of the system. In other words, it is designed from the perspective of using programming to imple- ment the functions determined in the system architecture design. The user (system user department) does not participate in software archi- tecture design since it is a design of the system’s internal functions. (3)Software detailed design (Program design) The internal structure of programs is designed based on the software archi- tecture design. In software detailed design, function details in programs are defined, and detailed processing units of the program structure such as database access Reference methods (SQL statements) are designed. SQL The user (system user department) does not participate in software detailed Refer to “Chapter 9-3-3 Data manipula- design since it is design of the system’s internal functions. tion.” 117
  • 7. 3 Development (Programming) Reference Individual programs are created based on the content designed during the Programming “Programming” involves describing al- system design stage. In order to run the system, it is important to create the gorithms ( processing procedures for individual program processing procedures, processing details, and process- problem resolution ) according to the ing results according to the design. rules and syntax of programming lan- Furthermore, “unit testing (module testing)” is conducted to confirm that guages, as well as conducting opera- tion tests. the individual modules created operate normally according to the “pro- gram design specification.” Unit testing is conducted in order to discover Reference logical errors in modules one by one, and to check whether the modules Module function as per the established specifications. In unit testing, verification is A “module” is the smallest unit that conducted by using “white box tests” and “compilers.” comprises a program. In general, a sin- gle program is comprised of more than (1)White box test one module. A “white box test” is a technique for checking the internal structure and logic of a program, focusing on program control and flow. Reference Debugging Internal structure of a program “Debugging” is the task of searching for In scrutinizing the internal bugs in a computer program and re- ① structure, test cases to cover moving them. Unlike unit testing, if a Chapter 4 all instructions and branch bug is found to exist, its location is nar- ② conditions are considered. ③ rowed down and the program is modi- ④ fied. ⑤ Development technology ⑥ ⑦ ① ② ④ ⑤ ⑦ Statement coverage Reference ① ③ ④ ⑤ ⑦ ① ② ④ ⑤ ⑦ Condition coverage Statement coverage ① ③ ④ ⑥ ⑦ (All test cases are tested) “Statement coverage” is a method for ① ② ④ ⑥ ⑦ creating test cases so that all instruc- tions are executed at least once. It is (2)Compiler one of the white box tests. A “compiler” is software that transforms code created using a program- Reference ming language into a program executable by a computer. Using a compiler, it is possible to confirm bugs (errors) in the created pro- Condition coverage “Condition coverage” is a method for grams. creating test cases so that both true and false cases for all decision condi- tions are covered. It is one of the white box tests. 118
  • 8. 4 Testing When unit testing is completed, the modules are integrated and testing is carried out to confirm that the designed/developed system operates nor- mally and is fit for operation. Testing is an important process for confirm- ing program and system quality. Tests are conducted according to test plans, and work continues to proceed while performance is evaluated. (1)Test execution procedure The procedure for conducting each test is as follows. Reference Determine items such as test schedule, participants, and evaluation criteria. Program quality Test plan creation Tests with the aim of improving the quality of the program Program quality improvement should be are not repeated. encouraged at the program design stage, rather than by repeating tests. Design items such as test data and response to predicted Test specifications design results according to the design specifications. Create test data and prepare the test environment including apparatus to be used in the test. If the program creator prepares the test data or designs the test Test environment setting environment, unexpected errors that could occur are less likely to actually occur. Therefore, it is best if someone other than the program creator is responsible for preparing the test environment. Execute the test according to the test specifications. If the program is modified after completing the test, Test execution repeat the test. When doing so, supplement the original test data with data containing modifications that can be confirmed. Evaluate the system on the basis of the test results, and Test result evaluation determine whether there are any problems. 119
  • 9. (2)Testing techniques One of the main testing techniques in system development is the “black box test.” A “black box test” is a technique for checking whether functions are in accordance with specifications, focusing on the output results of input data. It is a technique used in many test processes. System or program Data Result Considered a black box (3)Test planning In test planning, data is prepared in order to verify whether the expected output results are obtained for the input data. However, it is not sufficient Chapter 4 to end testing when the results for correctly inputted data are confirmed. In reality, correct data is not always inputted during tasks, and systems are not necessarily used in a normal state. Therefore, a variety of cases are as- Development technology sumed, and the following kinds of test data are prepared. Normal data Confirms that tasks are processed normally. Exception Confirms whether exception data generated by tasks are processed data as exceptions. Error data Confirms whether erroneous data are properly detected as errors. * After first testing with normal data, testing is conducted with exception data and error data. Two of the main methods used to create test data for conducting black box tests are “equivalence partitioning” and “boundary value analysis.” 120
  • 10. ●Equivalence partitioning “Equivalence partitioning” is a method that divides input data into a “valid equivalence class” or an “invalid equivalence class,” and adopts values that are representative of each class as test data. A characteristic of this method is that test data can be created easily. Valid equivalence class Range of values that are processed normally as input data Invalid equivalence class Range of values that are errors as input data Conditions Value Age of 20 years or over Valid equivalence class 20 years or over, and, 49 years or under Under 50 years Invalid equivalence class 19 years and under, or 50 years and over Age 1 2 3 18 19 20 21 22 23 47 48 49 50 51 52 Valid equivalence class Invalid equivalence class ●Boundary value analysis “Boundary value analysis” is a method that adopts values at the bounda- ries of the equivalence partitioning classes as test data. Due caution is re- quired for complex boundary conditions as omissions can easily occur. Conditions 19 years, 20 years Lower limit Age of 20 years or over Under 50 years 49 years, 50 years Upper limit taken as test data Age 1 2 3 18 19 20 21 22 23 47 48 49 50 51 52 (4)Test execution The following types of testing are conducted in system development. ●Integration testing (Consolidated testing) In “integration testing,” modules and programs are integrated and veri- fied whether they can be executed correctly according to the software ar- chitecture design. Integration testing is conducted between modules and between programs for which unit testing is complete. It can confirm whether screen transition and data passing between programs is carried out correctly. Integrated testing is utilized by the system development depart- ment. 121
  • 11. The following types of testing are included in integration testing. •Top-down testing Reference “Top-down testing” is a method of testing in sequence starting from the Sandwich testing higher-level modules. In many cases, however, the lower-level modules “Sandwich testing” is a method that are not all complete. “Stubs” are then prepared, which are temporary combines top-down and bottom-up test- ing. It is a type of integration testing. modules that are called upon by the higher-level modules. Reference Module A Test in sequence from (testing complete) higher-level modules Big bang testing “Big bang testing” is a method in which all of the modules are integrated and Module under test tested at once. It is a type of integration testing. Stub Stub •Bottom-up testing “Bottom-up testing” is a method of testing in sequence starting from the Chapter 4 lower-level modules. If the higher-level modules are not complete, “driv- ers,” which are temporary modules that call upon the lower-level modules are prepared. Development technology Driver Module under test Module B Module C (testing complete) (testing complete) Test in sequence from lower-level modules ●System testing (Comprehensive testing) “System testing” verifies whether the overall functions fulfill the require- ments specification designed with the system architecture design. It is con- ducted after integrating programs for which integration testing is complete, and utilized in cooperation by the system development department and the user (system user department). 122
  • 12. Reference In system testing, the following types of testing may be conducted depend- Response time/Turnaround ing on the purpose. time/Throughput Name Description Refer to “Chapter 8-2-2 System evalua- Function testing Verifies that all of the required functions are included. tion indexes.” Performance Verifies that the processing performance, including response testing time, turnaround time, and throughput, fulfills the require- ments. Exception handling Verifies that error processing functions and recovery functions testing operate normally. Load testing Applies a load to the system through such means as inputting (Rush testing) a large amount of data and simultaneously increasing the number of operating computer terminals, and verifies that the system can withstand the load. Operability testing Verifies that the system is easy to operate for the user (system user department). Regression testing Verifies that no other programs were affected when errors dis- covered in any of the test processes were modified or when changes were made to the specifications. Penetration testing Detects the system’s security holes and firewall weak points (Intrusion testing) (vulnerability) by actually attempting an attack or intrusion from outside. ●Operational testing “Operational testing” uses real business data to verify whether the sys- tem is appropriate for the realities of the business and whether it can be operated in accordance with the operation manual. It is conducted mainly by the user (system user department). In operational testing, the following items are tested. Item Description Business function Verifies that functions required in conducting business are ful- filled. Operability Verifies that the system is easy to operate for the user (system user department). Anomaly measures Verifies that measures have been taken in case of anomalies such as data anomalies, abnormal operation, and equipment anomalies. Throughput Verifies that throughput is sufficient using the current equip- ment configuration. Processing time Verifies that response times are within the acceptable range. (5)Test result evaluation Reference In order to receive system inspection, satisfactory test results must first be Receiving inspection achieved. At such time, it is necessary to consider the criteria for evaluat- “Receiving inspection” refers to testing ing the system based on the test results. and acceptance of a system by the user (system user department). 123
  • 13. Typical evaluation criteria include “bug control charts.” A bug control chart is a graph showing the relationship between test time and cumulative number of bugs detected. An ideal bug control chart forms a curve referred to as a “Gompertz curve (reliability growth curve).” Cumulative number of bugs Cumulative number of bugs Number of bugs increases and Number of bugs does not increase testing has not progressed Testing can be stopped Problems such as poor program quality exist Test time Test time Gompertz curve Not a Gompertz curve 5 Software acceptance Reference Software acceptance occurs when system development is outsourced to an User manual A “user manual” is a manual that ex- external specialist and software is delivered from the outsourcer (develop- plains how to use the software and sys- er) to the customer (user). It involves confirming whether all of the re- tem. Chapter 4 quirements of the user (system user department) are fulfilled, and whether Before operation, the user manual is the software operates normally. If there are no problems, the software is used to provide a tutorial of basic oper- ations, and after the system is in opera- delivered and educational and training programs for the user (system user tion, it is referenced to learn specific Development technology department) are conducted. It is also referred to as an “approval test (ac- operations according to the respective ceptance test).” content of work. 6 System operation and maintenance When system development is complete, the user (system user department) starts utilizing the system. The usage status and operation status of the sys- tem are then observed, and any issues that arise are resolved. In order to respond to developments in information technology or changes in business strategy, programs may also be modified or changed. (1)Precautions about operation and maintenance Reference Precautions about system operation and maintenance are listed below. Document storage It is important to leave documentation in • When performing any modification work, first backup the system before di- each system development process. rectly modifying a program in operation. After making the modification, con- Specific documents include “require- duct testing in an environment that is equivalent to the actual environment. ments definition documents,” “design • When any changes are made to a program, always record them in a modifi- cation log. This information may prove to be useful when investigating mat- specifications,” “developed programs,” ters such as fault causes. A regression test should also be conducted to “test execution plans,” and “test execu- confirm that other programs are not affected by the changes. tion reports.” • Always keep the complete set of documents concerning system develop- For example, design specifications can ment (such as specifications and operating procedures) up-to-date. be used as a design drawing for the • Monitor issues such as whether there is insufficient disc space due to an in- system under development, which crease in data volume, and whether there is a decrease in performance, and those in charge can reference to check make improvements/address issues as necessary. progress and advance development. Furthermore, if any changes to the pro- gram must be made at the operation/ maintenance stage, the test execution report becomes the only document that can provide an adequate understanding of the existing system. 124
  • 14. (2)System maintenance The following are key maintenance tasks for preventing failures. Type of Description maintenance Preventative Remove the causes for future failures before they occur. maintenance Scheduled Perform daily checks. Also, enter into a maintenance agree- maintenance ment with a specialist and request hardware checks once a month, for example. Remote Enter into a maintenance agreement with a specialist, and re- maintenance move causes of failure remotely (remote operation) by con- necting the specialist and the user (system user department) via communication lines. (3)System failure In terms of maintaining system operation, it is important to take preventive measures so that failures do not occur. However, for reasons such as sys- tem modification as a result of tax rate changes, workflow changes, or hardware lifespan, failures in the existing system could occur and further modification may be unavoidable. During system development, it is necessary to consider the occurrence of failures as unavoidable. The key is to be well-prepared with effective countermeasures that will prevent failures from adversely affecting the en- tire system or stopping operations. 4-1-2 Software estimation Reference Computerizing operations requires an awareness of cost when determining FP which functions to incorporate into the system. Abbreviation for “Function Point.” The following are methods for estimating system development costs. Type Description Characteristics Reference Program step A method for estimating the Suited to estimations for de- GUI method number of program steps velopment of core business Refer to “Chapter 9-1-1 Human inter- (number of lines) in the entire systems with significant ac- face technology.” system from past records. cumulation from the past. FP (Function Point) A method for estimating sys- Suited to estimations for de- Reference method tem development person- velopment using GUI and ob- hours and development costs ject orientation. Object orientation by quantifying the number of Refer to “Chapter 4-2-1 Software devel- input/output screens and files opment process and methods.” to be used, and the level of difficulty of functions to be developed. Quantified items are referred to as “function points.” 125
  • 15. Software development 4-2 management techniques 4-2-1 Software development process and methods When developing software, a development process and methods that suit the processing content and scale of the entire system must be determined. 1 Software development methods “Software development methods” are methods for advancing the soft- ware development process. The following are typical development meth- ods. Method Description Characteristics Structured method A method of programming Dividing the program into in- that divides the program into dividual processes makes it Chapter 4 individual processes and easy to verify or modify oper- forms a hierarchical structure. ations, and perform mainte- Also referred to as “structured nance. programming. Development technology Object orientation A method for modeling a Business data ( properties ) Reference business and creating a pro- and roles (behavior) are Agent orientation gram by considering what treated as groups of objects “Agent orientation” is a developed form items (objects) are required ( components ) , which facili- to advance the business, and tates partitioning into compo- of object orientation. An “agent” is soft- defining the object character- nents and reuse. ware that operates and processes tasks istics. independently in order to accomplish a Data oriented ap- A method of carrying out sys- The structure of the core data purpose without detailed instructions proach tem development based on will not change even if the from the user. Agent orientation refers databases created by focus- business content changes, to that approach and function. ing on the structure of data which makes it easy to carry used in the business. out system modifications. Process oriented A method of carrying out sys- Each system is created approach tem development by focusing based on the business con- on business processes and tent and if it changes, the functions. system must be significantly modified. 126
  • 16. Reference 2 Software development models Precautions about the wa- The typical software development models are summarized below. terfall model Since it is impossible to advance differ- Model Description Characteristics ent processes in parallel, it is necessary Waterfall model A development model that ad- This is the most common de- to shorten the time period of the proc- vances each process in se- velopment model. Costs can esses themselves by working on the quence without backtracking, be estimated relatively easily, components of a single process that similar to the flow of a water- and this model is often used in fall. Also, dividing the system large scale developments. can be performed in parallel. However, into a number of subsystems However, the amount of work in such cases, people and time are re- and repeatedly carrying out re- that must be repeated if the quired to coordinate the parallel work, quirements analysis, design, system specifications change and costs tend to be higher than when development, testing, and im- is extremely large. parallel work is not carried out. plementation is called an “in- cremental model.” Reference Spiral model A development model that di- It can shorten the period until RAD vides the system into a number the first subsystem is operated. of subsystems and repeats the Each subsystem is verified by “RAD” is a type of development that di- cycle from “requirements anal- the user (system user depart- vides the system to be developed into a ysis” to “operation” for each ment), making it possible to in- number of subsystems, and proceeds subsystem. It develops the corporate their opinions into to develop them starting from the items system by allowing it to evolve the next cycle. with the highest priority. The goal is to as it grows. develop the system in a short time and Prototyping A development model that cre- It can identify any potential at low cost using sophisticated software model ates prototypes from an early misunderstandings about the development tools. RAD is often used stage of system development system between the user (sys- in a prototyping model. and obtains confirmation from tem user department) and the Abbreviation for “Rapid Application De- the user (system user depart- developer at an early stage. It velopment.” ment) as development advanc- also has the effect of raising es. the awareness of the user (system user department) re- Reference garding the system. However, Reverse engineering if prototypes are created re- “Reverse engineering” is a technique peatedly, cost management for creating new software by breaking can become an issue. down and analyzing existing software. It may include studying the relationship between modules and analyzing the Waterfall model system’s basic specifications. It is often carried out to maintain compatibility with Requirements definition the existing software. Systems architecture design Software architecture design Software detailed design Development (Programming) Testing Operation and maintenance 127
  • 17. Spiral model Development (Programming) Testing and evaluation Completion Design Analysis Prototyping model Requirements definition Systems architecture design Creation of prototype Chapter 4 Execution of prototype Confirmation by user (System user department) OK Development technology Evaluation Software architecture design NG Software detailed design Development (Programming) Testing Operation and maintenance 3 Common frame A “common frame” is a frame that standardizes the terminology and con- Reference tent of work in software development, including planning, development, SLCP operation, and maintenance. With a common frame, a system vendor and a “SLCP” is a common frame for transac- user can clarify the details of their transaction such as their respective tions and software development cen- tered on software. roles, scope of business, work content, and scope of responsibilities. This Abbreviation for “Software Life Cycle enables both parties to share a mutual understanding, which prevents mis- Process.” understandings and problems from occurring. In Japan, the “SLCP-JCF98 (Common Frame 98)” was established based on the ISO/IEC international standards, which takes into account the character- istics of Japanese commerce and Ja- pan’s software industry. In September 2007, the contents of the SLCP-JCF98 were reinforced and expanded, and the “SLCP-JCF2007 ( Common Frame 2007)” was published. Abbreviation for “SLCP-Japan common frame.” 128
  • 18. 4-3 Chapter quiz 4-1 When the information system department performs the procedure of the requirements defi- nition, system design, programming, and testing in the flow of software development, which of the following most needs the participation of the user departments? a) Requirements definition b) System design c) Programming d) Unit test 4-2 When the scale of software development is estimated, which of the following is an appro- priate element that should be considered? a) Developer’s skills b) Development organization c) Number of screens d) Schedule 4-3 Which of the following shows part of the phases of software development in the order of implementation? a) System design, testing, programming b) System design, programming, testing c) Testing, system design, programming d) Programming, system design, testing 4-4 Which of the following is the software development model that performs the requirements definition, system design, programming, and testing in that order, and checks carefully so as not to return to the previous phase when each phase is completed? a) RAD (Rapid Application Development) b) Waterfall model c) Spiral model d) Prototyping model 129
  • 19. Chapter 5 Project management Chapter 5 explains the processes of project manage- ment and techniques of project scope management. 5-1 Project management ......................... 131 5-2 Chapter quiz ...................................... 138
  • 20. 5-1 Project management 5-1-1 Project management In pursuing various corporate activities such as the development of new information systems and services, it is important for a corporation to exe- cute plans in unison with a sense of purpose that is shared throughout the corporation. In general, it is efficient to execute a plan by assembling a Reference project organization and executing the project as an organization, while Project organization managing various aspects such as progress of the project, cost, quality, and Refer to “Chapter 1-1-1 Management members. and organization.” 1 Project A “project” is temporarily assembled in order to execute activities and achieve a specific purpose within a specified time. The main characteristics of a project are summarized below. • A clear purpose is defined before the project is initiated. • A series of activities is undertaken to achieve the purpose. • Activities are executed by a temporary group. • Persons with specialized knowledge from various fields are assembled. • Work that is non-routine and non-repetitive is executed. • Activities are undertaken using defined resources. • The project is disbanded after achieving the purpose. A project is engaged for the purpose of executing non-routine work instead of simple and routine work. An example is the development of a new in- formation system. In order to achieve such purposes, it is important to manage the project using defined management resources (people, materi- als, money, and information). 2 Project management “Project management” is a management technique to facilitate every process of a specified project within the corporation from initiation to completion. 131
  • 21. The typical processes for a project are summarized below. Initiate the project and plan the course of Initiation and planning action. Reference Execute the project and monitor the work Execution and monitoring schedule, costs, and quality. Milestone A “milestone” is a term used in project management to denote an important Close the project once the purpose is achieved, and evaluate point in the work schedule such as the Closing and evaluation the work performance and deliverables (finished product). integration testing date or customer re- view date. (1)Project initiation and planning Reference The “project manager” plays a central role in initiating the project. The Project manager project is usually initiated after the client (commissioning party) that re- A “project manager” is an individual who quests the systems development approves the documentation that describes manages and oversees projects or is nationally certified to manage a project. the project outline. At that point, a “kick-off” meeting is conducted with In the case of the former, a project man- the “project members” to discuss various aspects such as the framework ager organizes project members, man- and key points of the project, progress (schedule), and management meth- ages the project schedule, and makes od. Afterwards, a detailed plan is formulated and a “project plan” is pre- decisions concerning work processes. pared. Reference (2)Project execution and monitoring Project member Chapter 5 After the project plan is completed, the project moves into the execution A “project member” refers to one of the phase and work begins. During project execution, the project manager members of a project. makes sure to communicate with project members and the client, and mon- Reference itors the performance of the project including the progress of the project, Project management Stakeholder cost, and quality. The project manager makes adjustments as the need aris- In the context of project management, a es. “stakeholder” refers to an individual who is variously impacted by the project or (3)Project closing and evaluation has a stake in its success or failure. After the target system is completed, the project is closed and disbanded. Project stakeholders include the project Once the client has accepted the system, a “project completion report” is client, project manager, project mem- bers, and users. It is important to man- prepared. age each respective stakeholder in an The project completion report includes a performance evaluation of all appropriate manner. work such as the actual cost and progress, and a list of the final delivera- bles (finished product). The evaluation contains information that will be useful for the next project such as variance between the plan and actual performance, changes occurred and their causes, and risks encountered and their countermeasures. 132
  • 22. 5-1-2 Project scope management “Project scope management” is a management technique that analyzes the final deliverables of the project and the work scope required, and man- ages the relationship between the deliverables and work scope. Reference The “Project Management Body of Knowledge (PMBOK)” is an inter- PMBOK national standard that provides guidelines for project managers to execute Abbreviation for “Project Management projects in an integrated manner using project scope management tech- Body of Knowledge,” which is a stand- niques. ard framework for project scope man- PMBOK recognizes the nine knowledge areas listed below. agement based on a body of knowledge advocated by the U.S.-based Project Scope Define the deliverables and work scope. Management Institute (PMI). Time Coordinate the work processes and schedule. Cost Determine the budget. Quality Define the quality targets and inspect the quality. Human resources Procure and train the project members. Communication Achieve mutual understanding and share information between the project members and teams. Risk Predict the risks and determine countermeasures to avoid and address the risks. Procurement Select the necessary resources, issue orders, and sign agree- ments. Integration Integrate the other knowledge areas and manage the overall project. The key characteristic of PMBOK is that it achieves an overall balance of these knowledge areas to enable flexibility in response, even if there are significant changes to the deliverables or work scope. 1 Scope Reference “Scope” refers to the final deliverables of the project, and the work scope WBS required to produce the deliverables. The scope is defined using a “WBS Abbreviation for “Work Breakdown (Work Breakdown Structure).” Structure.” ●Work breakdown structure Reference A “WBS (Work Breakdown Structure)” is a chart that breaks down the OBS work scope of the project into detailed items, and organizes the items into Abbreviation for “Organization Break- a hierarchy. The procedure for preparing a WBS is outlined below. down Structure.” OBS is a chart that breaks down the project member or- Determine the individual deliverables of the project. ganization into parts and organizes them into a hierarchical structure. Reference Determine the work scope required to achieve the deliverables. CBS Abbreviation for “Cost Breakdown Structure.” CBS is a chart that breaks Break down the work scope into parts, and determine the work. down the project cost into components and organizes it into a hierarchical structure. 133
  • 23. WBS chart Deliverable A Work scope 1 Work (1) Work (2) Work scope 2 Work (1) Work (2) Deliverable B Work scope 1 Work (1) Work (2) Once the WBS is prepared, it becomes the foundation for all work areas under PMBOK. In addition, if any excesses or deficiencies are found in the WBS or while Chapter 5 the project is in progress, the scope is reviewed to ensure that it is always up-to-date, and it is updated as any changes arise. Time Project management 2 Reference The work content identified by WBS is used as the basis for estimating the Arrow Diagram, PERT chart, approximate number of days required. The estimated number of days is Gantt chart Refer to “Chapter 1-1-2 OR (Operations used to divide the schedule for each piece of work according to the Research) and IE (Industrial Engineer- planned delivery dates in order to manage progress. ing).” The schedule plan is determined based on the calculated number of operat- ing days, clarifying the confirmation of progress, completion date, and handover of each individual piece of work. “Arrow diagrams” and “PERT ( Program Evaluation and Review Technique ) ” charts are used to prepare the schedule plan. A “Gantt chart” is used to illustrate the planned schedule. Since there is a variety of work for each project, it is necessary to estimate the number of days required for each piece of work. 134
  • 24. In the following arrow diagram example, work E can be started when work C and work D are both finished. In other words, work E can be processed seven days after the work is started. Work A Work C 2 days 5 days Work B Work D Work E 2 days 3 days 2 days Example In the following arrow diagram, calculation for the overall number of days required if work C can be shortened to three days is illus- trated. Work A Work C 2 days 5 days Shortened to 2 days Work B Work D Work E 2 days 3 days 2 days The overall number of days required is calculated as follows (before work C is shortened to three days). Work A (2 days) + Work C (5 days) = 7 days Work B (2 days) + Work D (3 days) = 5 days Seven days are needed until both work C and work D are finished, so the overall number of days required is: 7 days + Work E (2 days) = 9 days. If work C is shortened to three days, at most five days are needed until work C and work D are finished. Therefore, the overall number of days re- quired is: 5 days + Work E (2 days) = 7 days. 135
  • 25. 3 Cost The work content identified by WBS is used to estimate the approximate cost required. The estimated cost is used as the basis to define and manage the budget. An “EVMS (Earned Value Management System)” is used for cost management. ●Earned value management system Reference An “EVMS (Earned Value Management System)” is a technique for EVMS quantitatively evaluating the progress of a project by comparing it with the Abbreviation for “Earned Value Man- budget and work schedule. agement System.” EVMS is used to prepare a cost plan based on the estimated person-hours Reference derived from the breakdown of work from the WBS, and the variance of Person-hours the schedule and cost is measured. The measured results are then analyzed “Person-hours” represent the volume of to forecast work delays and over-budgeting, and adjustments are made to work required for activities such as sys- the schedule and budget. tem development. Person-hours are typically indicated in person-month units. 4 Quality Quality is maintained and improved by defining and managing the desired Reference quality targets of the deliverables, which are based on the deliverables Person-months identified by WBS. The following items are reviewed and summarized in a “Person-months” are a unit of person- hours. One person-month equals the “quality management plan:” targets, quality maintenance and improve- amount of work performed by one per- ment plan, quality inspection technique, review plan, and testing method. Chapter 5 son in a single month. Example Work that takes one person 5 Human resources three months to accomplish represents three person-months of work. Project members are procured based on the deliverables identified by Example Work that takes two persons Project management WBS, as well as work scope, time, cost, and quality. The project team is three months to accomplish represents six person-months of work. also structured and trained according to the deliverables and work scope. The success of the project hinges on manpower and teamwork. In order to effectively capitalize on the capabilities of all persons involved in the project, it is necessary to prepare an optimum environment and assign the right project members to the right positions. 6 Communication It is necessary to manage communication so that there is sharing of infor- mation, and mutual understanding between working project members and the project manager. E-mail is typically used for communication, but other methods are also used to share information within the project such as pre- paring mailing lists and using groupware. In addition, regular meetings are Reference held to encourage mutual understanding between project members, infor- Mailing list mation sharing, and reporting on progress. Refer to “Chapter 9-4-3 Network appli- cation.” Reference Groupware Refer to “Chapter 3-1-2 Concept of busi- ness process.” 136
  • 26. 7 Risk The deliverables and work scope identified by WBS are used as the basis for predetermining the possible locations and types of risks that may occur, as well as the extent of the losses and the degree of impact that those risks may entail. The predetermined risks should be ranked – starting with the highest rate of occurrence and the largest loss impact – to determine which risks should be prioritized and dealt with. In addition, it is integral to the process that sufficient countermeasures are prepared in advance for the predetermined risks. If a risk actually arises, it is dealt with according to the course of action that has been devised based on the risk analysis and countermeasures. It is also necessary to be prepared to deal with legal issues due to the possibili- ty of various contractual risks that could arise. 8 Procurement Necessary technologies and services are procured from an external source in order to execute a project. The deliverables and work scope identified by WBS are used as the basis for examining the technologies and services that need to be externally pro- cured, followed by the selection of candidate suppliers. This process is re- ferred to as “solicitation.” Suppliers are typically chosen through bidding or quotation, or they are directly designated. The workflow from process- ing orders and contracts to receiving inspection is managed in a compre- hensive manner. 9 Integration All of the work areas are comprehensively managed to achieve unity in the entire project. Overall policies and plans for the project are formulated, and any changes that occur during the execution of the project are ad- dressed. In some cases, new or more efficient technologies are developed during the course of a long-term project, requiring the ability to flexibly adapt when necessary. Accordingly, any new developments such as major schedule delays, delivery date extensions, and cost increases should be thoroughly discussed. In short, the overall project should be managed in a manner that ultimately yields the desired deliverables. 137
  • 27. 5-2 Chapter quiz *See page 9 in the “Answers and Explanations” booklet for the correct answers. 5-1 When one day is reduced for Activity C and three days are reduced for Activity B in the ar- row diagram shown below, how many days can be reduced in total? A C Legend Activity name B D Days required a) 1 b) 2 c) 3 d) 4 5-2 A project with 50 work items of equivalent labor was planned to be finished in 10 days. The fifth day is now over, and only 20 work items have been completed so far. By how Chapter 5 many days is the project delayed at this point? Here, the delay is given by the difference from the number of days it should have taken to complete the work items that are currently finished. Project management a) 1 b) 2 c) 4 d) 5 138
  • 28. 5-3 Which of the following is described in a project plan? a) Screen layout b) Workflow c) Schedule d) Program structure 5-4 It takes 24 days for Mr. A to complete a certain software development and 12 days for Mr. B. When both Messrs. A and B work together, 25% of all the working hours in a day are needed for preliminary discussion. When both Messrs. A and B work together, how many days does it take to complete the development? a) 6 b) 8 c) 11 d) 12 139
  • 29. Chapter 6 Service management Chapter 6 explains the basic roles and components of IT service management including the management of information system operations, service support, the concept of system environment development, and the basic principles of system audits. 6-1 Service management ........................ 141 6-2 System audit ..................................... 147 6-3 Chapter quiz ..................................... 152
  • 30. 6-1 Service management 6-1-1 Service management “Service management” is the act of operating an information system in a stable and efficient manner to maintain and improve the quality of user services. 1 IT Service management “IT service management” is a method of management that associates the operation of information systems with the provision of IT service in order to facilitate stable and efficient operations. For example, by providing various IT services, entities such as financial institutions and transportation companies are supporting business manage- ment and society overall. If trouble arises in those IT services, it could have a major impact not only on those companies themselves but also on the entire society, leading to accidents and confusion. For that reason IT services are managed in such a way as to ensure effi- cient operation and to maintain and improve the quality of the services themselves. 2 ITIL Reference “ITIL” is a framework of know-how, best approaches, best practices, etc. ITIL designed to create a successful business utilizing IT services. It was put to- Abbreviation for “Information Technolo- gether in the form of a series of books published by the “OGC,” a UK gy Infrastructure Library.” government agency, in the late 1980s and serves as the “de facto stand- ard” of IT service management. Reference ITIL is a comprehensive set of guidelines for IT services, but not all IT OGC service operations need to be brought into line with it. It is best to compare Abbreviation for “Office of Government Commerce.” the actual work against the framework and use the relevant parts as a refer- ence for operations. Reference De facto standard A “de facto standard” is an industry standard that is established not through formal approval, but through widely-ac- cepted use within the industry. 141
  • 31. (1)ITIL system diagram The ITIL framework can be expressed with the following diagram. Service management implementation planning IT service management Technology Business Service ICT Business Service infrastructure perspective support delivery management Security management Application management (2)ITIL framework ITIL is summarized in the following seven books. Service support Guidelines for daily operations and support. Explains the method how to provide support to users so that they can ap- propriately use IT services. Service delivery Guidelines for formulating a medium- to long-term plan and making improvements to it. Explains the method how to ap- propriately provide IT services, touching on things like invest- ment effects and availability. Service manage- Explains the method how to formulate a plan for implement- ment implementa- ing IT service management. tion planning Business perspec- Explains the best practices for service support and service tive delivery, focusing on the business perspective. Application man- Explains the life cycle and investment effect of software. Chapter 6 agement ICT infrastructure Explains the best practices for infrastructure management. management Security manage- Explains how to ensure the security and confidentiality of Service management ment data. “Service support” and “service delivery,” which are components of “IT service management,” form the core of ITIL. These two items can be broken down into the processes listed below. Service support Service delivery Incident management Service level management Problem management IT service financial management Configuration management Capacity management Change management IT service continuity management Release management Availability management Service desk 142
  • 32. 6-1-2 Service support “Service support” is a set of processes for supporting service operations and is one part of the ITIL framework. It consists of five processes and a service desk. IT services are managed in an integrated fashion by execut- ing these processes. The processes of service support are summarized below. (1)Incident management (fault management) Reference “Incident management” minimizes the length of service interruptions Incident and the external impact when incidents occur in IT services, and takes An “incident” is a failure, accident or un- steps to restore normal service as quickly as possible and resolve the inci- expected occurrence that happens dent. An incident that is resolved before it becomes serious is known as a within the computer system. “close call,” and management is exercised in such a way as to utilize these lessons as well. (2)Problem management “Problem management” treats the causes of incidents as “problems” and looks for the root cause. Measures to resolve the problems are re- viewed and carried over into change management. (3)Configuration management “Configuration management” involves managing assets that comprise IT services such as hardware and software, and keeping them in top shape in order to provide better IT services. (4)Change management “Change management” involves reviewing the solutions produced by problem management and changes to configuration made necessary by life cycles, and performing an evaluation to determine whether to proceed to release management. (5)Release management “Release management” implements the changes decided upon in the process of change management. (6)Service desk The “service desk” is the point of contact where user inquiries are handled. Other names for it include “help desk”, “call center”, and “user support.” In general, the service desk accepts inquiries on how to use products and services and how to fix problems and deals with repair requests and com- plaints. Inquiries may be accepted in the form of phone calls, e-mails, faxes, etc., but if multiple points of contact are set up depending on the contents of the inquiry, it can become difficult to determine the appropriate point of con- tact, which results in wasted time. It is then necessary to implement measures such as consolidating the points of contact. If the inquiries received are registered in a database, they can be published as a FAQ on a website or analyzed and used to improve products and services. 143
  • 33. 6-1-3 Service delivery “Service delivery” is a set of processes for implementing long-term plans for and improvements to IT services, and is one part of the ITIL frame- work. It consists of five processes, and by executing them, stable IT serv- ices can be provided. The processes of service delivery are summarized below. (1)Service level management “Service level management” is the process of maintaining and making improvements to the service level based on the agreement between the IT service provider and user. The “service level agreement (SLA)” and “service level management (SLM)” are executed and managed in order to ensure quality and provide stable IT services. ●Service level agreement (SLA) Reference A “service level agreement” is a “quality assurance agreement” formed SLA between the IT service provider and user with respect to the management Abbreviation for “Service Level Agree- of operations, and it defines the quality and scope of the IT services. The ment.” agreement includes the scope of the system services, pricing, support hours, target recovery time for system failures, etc. This form of contract was originally popularized by telecommunications carriers to guarantee the quality of communications in network services. Standards are set for things like minimum data transfer speeds and maxi- mum downtimes, and rules for penalties and compensation are stipulated Chapter 6 for instances where the standards are not met. These agreements are cur- rently utilized in a wide range of IT services. Service management 144