The document discusses various techniques for fact finding and requirement discovery in systems analysis. It describes sampling existing documentation, observation, questionnaires, interviews, prototyping, and joint requirements planning as key methods. It provides guidelines for conducting interviews and JRP sessions effectively. The overall goal of requirement discovery is to identify business and system requirements through formal research and information gathering processes.
Unit 1
Introduction to software engineering, the software as product and a process
software process models – waterfall model, incremental development, reuse
oriented software engineering, introduction to agile.
Systems approach vs engineering approach,
case studies to explain 1) the importance of information systems, 2) availability
and reliability of information systems, 3) flexibility of information systems.
Unit 2
A. Software Development process : SDLC
B. Requirements Engineering – characteristics of requirement, requirement
elicitation and analysis, validation and verification
C. Identification of attributes.
D. Feasibility Analysis : technical and economic
Unit 3
3.1Data Flow Diagrams : Symbols, describing a good system with DFD
3.2DFD : leveling of DFD, logical and physical DFD
3.3Process Specification, Decision Tables.
3.4Introduction to ER Diagrams and Data Dictionary.
Unit 4
4.1Data Input Methods : Data input, coding techniques.
4.2Designing outputs : objectives of output design, design of output reports.
4.3Software development – introduction to project and modules, coupling
and cohesion
4.4 Case studies on DFD, ERD
Unit 5.
5.1Introduction and importance of software testing
5.2Software Security concept and software maintenance
5.3Control of information system
5.4Audit of information system
Unit 6
6.1Introduction to software development and deployment environment
6.2Introduction to component based software engineering
6.3Introduction to distributed software engineering
6.4Introduction to service oriented architecture
Adbms 3 main characteristics of the database approachVaibhav Khanna
Self-describing nature of a database system:
A DBMS catalog stores the description of a particular database (e.g. data structures, types, and constraints)
The description is called meta-data.
This allows the DBMS software to work with different database applications.
Insulation between programs and data:
Called program-data independence.
Allows changing data structures and storage organization without having to change the DBMS access programs.
Unit 1
Introduction to software engineering, the software as product and a process
software process models – waterfall model, incremental development, reuse
oriented software engineering, introduction to agile.
Systems approach vs engineering approach,
case studies to explain 1) the importance of information systems, 2) availability
and reliability of information systems, 3) flexibility of information systems.
Unit 2
A. Software Development process : SDLC
B. Requirements Engineering – characteristics of requirement, requirement
elicitation and analysis, validation and verification
C. Identification of attributes.
D. Feasibility Analysis : technical and economic
Unit 3
3.1Data Flow Diagrams : Symbols, describing a good system with DFD
3.2DFD : leveling of DFD, logical and physical DFD
3.3Process Specification, Decision Tables.
3.4Introduction to ER Diagrams and Data Dictionary.
Unit 4
4.1Data Input Methods : Data input, coding techniques.
4.2Designing outputs : objectives of output design, design of output reports.
4.3Software development – introduction to project and modules, coupling
and cohesion
4.4 Case studies on DFD, ERD
Unit 5.
5.1Introduction and importance of software testing
5.2Software Security concept and software maintenance
5.3Control of information system
5.4Audit of information system
Unit 6
6.1Introduction to software development and deployment environment
6.2Introduction to component based software engineering
6.3Introduction to distributed software engineering
6.4Introduction to service oriented architecture
Adbms 3 main characteristics of the database approachVaibhav Khanna
Self-describing nature of a database system:
A DBMS catalog stores the description of a particular database (e.g. data structures, types, and constraints)
The description is called meta-data.
This allows the DBMS software to work with different database applications.
Insulation between programs and data:
Called program-data independence.
Allows changing data structures and storage organization without having to change the DBMS access programs.
Fingerprint Alert System A Solution for Effective Management Systemijtsrd
This document gives a write up about the necessity of a device, one which is the Management System of employees. Nowadays, maintaining punctuality has become a tedious job for employees. We know that the presence of an employee in an office is collected from the fingerprint or biometric system, as per the technical reviews we are clear that it is a time bound machine.. A biometric device is a security identification and authentication device. Such devices use automated methods verifying or recognising the identity of a living person based on a physiological behavioral characteristic. These characteristics include fingerprints, or facial images, iris and voice recognition. In this report we are introducing a solution for this problem, a Fingerprint Alert System. Rafi. P | Thoukheer Ibnu Ali Ashraf. A "Fingerprint Alert System: A Solution for Effective Management System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52414.pdf Paper URL: https://www.ijtsrd.com/computer-science/other/52414/fingerprint-alert-system-a-solution-for-effective-management-system/rafi-p
Since the spread of IT systems has made it a pre-requisite that auditors as well as management have the ability to examine high volumes of data and transaction in order to determine patterns and trends. In addition, the increasing need to continuously monitor and audit IT systems has created an imperative for the effective use of appropriate data mining tools.
While a variety of powerful tools are readily available today, the skills required to utilize such tools are not. Not only must the correct testing techniques be selected but the effective interpretation of outcomes presented by the software is essential in the drawing of appropriate conclusions based on the data analysis. This 6 webinar series, based on Richard Cascarino’s book “Data Analytics for Internal Auditors” covers these skills and techniques.
Webinar 3 Analytics Techniques
Conducting the Audit
Obtaining Information from IT Systems for Analysis
Use of Computer Assisted Audit Techniques
Analysis of Big Data
Results Analysis and Validation
Fraud Detection using Data Analysis
Root Cause Analysis
Software Engineering REQUIREMENTS ANALYSIS AND SPECIFICATIONDr Anuranjan Misra
Software Requirements: Functional and Non-Functional, User requirements, System requirements, Software Requirements Document – Requirement Engineering Process: Feasibility Studies, Requirements elicitation and analysis, requirements validation, requirements management-Classical analysis: Structured system Analysis, Petri Nets- Data Dictionary
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
1. Fact Finding for Requirement
Discovery
Organized By: Vinay Arora
Assistant Professor
CSED, Thapar University
www.slideshare.net/aroravinay
2. Disclaimer
This is NOT A COPYRIGHT MATERIAL
Content has been taken mainly from the following books:
System Analysis and Design Methods By Jeffrey L Whitten & Lonnie D Bentley , Analysis &
Design of Information Systems By James A. Senn,
System Analysis & Design By Elias M. Awad,
Modern System Analysis & Design By Jeffrey A. Hoffer, Joey F.George & Joseph S. Valacich
Vinay Arora
CSED
3. Requirement Discovery
Requirements Discovery – The Process and Techniques used by system
analysts to Identify or Extract System Problems and Solution
Requirements from the User community.
System Requirement – Something that the Information System must do
or a Property that it must have.
Also called a Business Requirement.
Vinay Arora
CSED
5. Result of Incorrect Requirement
The system may Cost more than projected.
The system may be Delivered Later than promised
.
The system may not meet the users’ expectations and that Dissatisfaction
may cause them not to use it.
Once in production, the costs of maintaining and enhancing the system
may be excessively high.
The system may be Unreliable and prone to errors and downtime.
The Reputation of the IT staff on the team is tarnished because any
failure, regardless of who is at fault, will be perceived as a mistake by the
team.
Vinay Arora
CSED
7. Criteria to Define System Requirement
Consistent – Requirements are not conflicting or ambiguous.
Complete – Requirements describe all possible system inputs and
responses.
Feasible – Requirements can be satisfied based on the available resources
and constraints.
Required – Requirements are truly needed and fulfill the purpose of the
system.
Accurate – Requirements are stated correctly.
Vinay Arora
CSED
8. Criteria to Define System Requirement
Traceable – Requirements directly map to the functions and features of
the system.
Verifiable – Requirements are defined so they can be demonstrated
during testing.
Vinay Arora
CSED
9. Process of Requirement Discovery
Problem Discovery and Analysis
Requirements Discovery
Documenting and Analyzing Requirements
Requirements Management
Vinay Arora
CSED
10. Ishikawa Diagram
The Ishikawa Diagram is a graphical tool used to identify, explore,
and depict problems and the causes and effects of those problems. It
is often referred to as a cause-and-effect diagram or a fishbone
diagram.
Vinay Arora
CSED
13. Fact Finding
Fact-Finding –
The Formal Process of using Research, Meetings, Interviews,
Questionnaires, Sampling, and other techniques to collect Information
about SYSTEM PROBLEMS, REQUIREMENTS and PREFERENCES.
It is also called Information Gathering or Data Collection.
Vinay Arora
CSED
14. Fact Finding
FACT-FINDING often brings Systems Analysts into contact with sensitive
information.
Company Plans
Employee Salaries or Medical History
Customer Credit Card, Social Security, or Other Information
ETHICAL BEHAVIOR includes:
Systems Analysts must not misuse that Information.
Otherwise:
Systems Analyst loses Respect, Credibility, and Confidence of Users and
management, Impairing ability to do job
Organization and Systems Analyst could have LEGAL LIABILITY
Systems Analyst could lose job
Vinay Arora
CSED
15. 7 Fact Finding Methods
Sampling of Existing Documentation, Forms and Databases
Research and Site Visits
Observation of the Work Environment
Questionnaires
Interviews
Prototyping
Joint Requirements Planning (JRP)
Vinay Arora
CSED
16. Documenting and Analyzing
Requirements
Documenting the Draft Requirements with Various Tools:
Use Cases
Decision Tables
Requirements Tables
Analyzing Requirements to Resolve Problems of:
Missing Requirements
Conflicting Requirements
Infeasible Requirements
Vinay Arora
CSED
17. Documenting and Analyzing
Requirements
Analyzing Requirements to Resolve Problems of:
Overlapping Requirements
Ambiguous Requirements
Formalizing Requirements
Requirements Definition Document
Communicated to Stakeholders or Steering Body
Vinay Arora
CSED
18. Sampling of Existing Documentation,
Forms and Databases
SAMPLING – The Process of Collecting a Sample (representative data)
of Documents, Forms and Records.
Organization Chart
Memos and Other Documents that describe the Problem
Standard Operating procedures for Current System
Completed Forms
Manual and Computerized Screens and Reports
Samples of Databases
Flowcharts and other System Documentation
Vinay Arora
CSED
19. Why to Sample Completed Rather than
Blank Forms
Can determine the Type of Data going into each blank
Can determine the Size of Data going into each blank
Can determine which blanks are not used or not always used
Can see Data Relationships
Vinay Arora
CSED
20. Sampling Techniques
RANDOMIZATION –
A Sampling Technique characterized by having NO PREDETERMINED
PATTERN or PLAN for selecting Sample Data.
STRATIFICATION –
A Systematic Sampling Technique that attempts to reduce the variance of
the estimates by spreading out the sampling — For Example,
CHOOSING DOCUMENTS OR RECORDS BY FORMULA and by avoiding
very high or low estimates.
Vinay Arora
CSED
23. Observation
OBSERVATION – A Fact-Finding Technique wherein the Systems
Analyst either Participates In or Watches a person perform activities to
learn about the System.
Advantages – Reliable Information, Identify tasks that are inaccurately
described or missed, Work Measurements.
Disadvantages – People feel uncomfortable, Perform Differently,
Scheduling Inconvenience.
WORK SAMPLING - A Fact-Finding Technique that involves a large
number of Observations taken at random Intervals.
Vinay Arora
CSED
24. Observation Guidelines
Determine the who, what, where, when, why, and how of the observation.
Obtain permission from appropriate supervisors or managers.
Inform those who will be observed of the purpose of the Observation.
Keep a Low Profile.
Take notes during or immediately following the Observation.
Review Observation notes with appropriate Individuals.
Don't Interrupt the Individuals at Work.
Don't Focus heavily on Trivial Activities.
Don't make Assumptions.
Vinay Arora
CSED
25. Questionnaire
Questionnaire – A Special-purpose Document that allows the Analyst to
collect Information and Opinions from Respondents.
Free-Format Questionnaire – A Questionnaire designed to offer the
respondent GREATER LATITUDE in the answer. A question is asked,
and the respondent records the answer in the space provided after the
question.
Fixed-Format Questionnaire – A Questionnaire Containing Questions
that require Selecting an answer from Predefined Available Responses.
Vinay Arora
CSED
26. Types of Fixed Format Questions
Multiple-Choice Questions
Is the current accounts receivable report that you receive useful?
A). Yes
B). No
Rating Questions
The implementation of quality discounts would cause an increase in
customer orders.
Strongly agree Agree No opinion Disagree Strongly Disagree
Ranking Questions
Rank the following transactions according to the amount of time you spend
processing them.
___ % new customer orders ___ % order cancellations
___ % order modifications ___ % payments
Vinay Arora
CSED
27. Interviews
INTERVIEW - A Fact-Finding Technique whereby the Systems
Analysts collect Information from Individuals through Face-to-Face
INTERACTION.
Can be Used To:
Find Facts
Verify Facts
Clarify Facts
Generate Enthusiasm
Get the End-User Involved
Identify Requirements
Solicit Ideas and Opinions
Vinay Arora
CSED
28. Types of Interview & Questions
Unstructured Interview – An Interview that is conducted with only a
general Goal or Subject in mind and with few, if any, Specific
Questions.
The Interviewer Counts on the Interviewee to provide a Framework and
direct the Conversation.
Structured Interview – An Interview in which the Interviewer has a
Specific Set Of Questions to ask of the Interviewee.
Open-Ended Question – Question that allows the Interviewee to
RESPOND IN ANY WAY that seems appropriate.
Closed-Ended Question – A Question that RESTRICTS ANSWERS to
either Specific Choices or Short, Direct Responses.
Vinay Arora
CSED
29. Procedure to Conduct Interview
1. Select Interviewees
End Users
Learn about Individual prior to the Interview
2. Prepare for the Interview
An INTERVIEW GUIDE is a Checklist Of Specific Questions the
Interviewer will ask the Interviewee.
3. Conduct the Interview
Summarize the Problem
Offer an Incentive for Participation
Ask the Interviewee for assistance
4. Follow Up on the Interview
Memo that summarizes the Interview
Vinay Arora
CSED
31. Do Avoid
Be Courteous Continuing an Interview
unnecessarily
Listen Carefully
Assuming an answer is Finished
or Leading nowhere
Maintain Control
Revealing your Personal Biases
Observe mannerisms and
Nonverbal Communication
Talking instead of Listening
Be Patient
Assuming anything about the
topic and the Interviewee
Keep Interviewee at ease
Vinay Arora
CSED
32. Body Language
BODY LANGUAGE - The Nonverbal Information we communicate.
Facial Disclosure
Eye Contact
Posture
Vinay Arora
CSED
39. Discovery Prototyping
DISCOVERY PROTOTYPING –
The Act of building a Small-scale, REPRESENTATIVE or WORKING
MODEL of the users’ requirements in order TO DISCOVER OR
VERIFY those Requirements.
Advantages:- Ease in Determining Feasibility & Usefulness, Serve as
Training Mechanism, Building Test Plans, More Stable Requirements.
Disadvantages:- Trained Developer for Prototyped Approach, Increased
Development Cost.
Vinay Arora
CSED
40. JRP & Participants
JOINT REQUIREMENTS PLANNING (JRP) – A Process whereby highly
Structured group meetings are conducted for the purpose of ANALYZING
PROBLEMS AND DEFINING REQUIREMENTS.
JRP is a Subset of a more comprehensive Joint Application Development or
JAD Technique that encompasses the Entire Systems Development Process.
Sponsor
Facilitator
Users and Managers
Scribes
IT staff
Vinay Arora
CSED
41. Steps to Plan JRP Session
1. Selecting a Location
Away from workplace when possible
Requires Several Rooms
Equipped with Tables, Chairs, Whiteboard, Overhead Projectors
Needed Computer Equipment
2. Selecting the Participants
Each Needs release from Regular Duties
3. Preparing the Agenda
Briefing Documentation
Agenda distributed before each Session
Vinay Arora
CSED
43. Guidelines for Conducting JRP Session
Do not unreasonably deviate from the Agenda
Stay on Schedule
Ensure that the SCRIBE is able to take notes
Avoid the use of Technical Jargon
Apply Conflict Resolution Skills
Allow for ample BREAKS
Encourage group Consensus
Encourage User and Management Participation without allowing Individuals to
dominate the Session
Make sure that attendees abide by the established ground Rules for the Session
Vinay Arora
CSED
44. A Fact Finding Strategy
1. Learn from Existing Documents, Forms, Reports and Files.
2. If appropriate, Observe the System in action.
3. Given all the facts that already collected, design and distribute
questionnaires to clear up things that aren’t fully understood.
4. Conduct Interviews (or Group Work Sessions).
5. (Optional) Build Discovery Prototypes for any Functional
Requirements that are not understood or for requirements that need to
be validated.
6. Follow up to Verify Facts.
Vinay Arora
CSED
45. Reference List
1. System Analysis and Design Methods By Jeffrey L Whitten & Lonnie D Bentley
2. Analysis & Design of Information Systems By James A. Senn
3. System Analysis & Design By Elias M. Awad
4. Modern System Analysis & Design By Jeffrey A. Hoffer, Joey F.George & Joseph S. Valacich
etc…….
Vinay Arora
CSED