SlideShare a Scribd company logo
1 of 10
TRADITIONAL DESIGN METHOD
BY DR. SOLOMON EDIRIVERERE ESOMU
INTRODUCTION
In order to understand and assess a design method it is necessary to have an evaluation
guide or reference frame to compare it with. Consequently, in this paper we are going to
be discussing five criteria which I consider crucial for assessing Traditional Design
Methods (TDM’s) for Information System Design (ISD).
As a case study, I will be assessing the Information System work and Analysis Changes
(ISAC) traditional design method based on these five assessment criteria. I will also
discuss the strengths and weaknesses of this design method, as well as how the evaluation
of the method has changed my initial impression of traditional design methods.
Finally, I will be discussing the ISAC TDM for information system development in the
light of Critical Systems Heuristics (CHS): how ISAC propositions support and
contradict CSH, the shortcoming of ISAC, how to overcome these shortcomings, how my
understanding of TDM has changed as I studied it and how I intend applying CSH in the
future.
CRITERIA FOR ASSESSING TDM FOR INFORMATION SYSTEM DESIGN
The criteria I consider important for the assessment of a TDM are listed as follows:
1. User Involvement
2. Change/Process Analysis and Data Modelling
3. Test-running
4. Post Implementation Review and Maintenance
5. Interconnectivity between Design Stages
1. USER INVOLVEMENT OR PARTICIPATION
In designing an IS, the involvement of the user, which is often known as the expert-user,
cannot be overemphasized. This is because every design method ought to be user- or
client-oriented, as the IS is being created for the users. Getting the users involved will
help the analyst understand the business processes, needs, terms and relationship, which
are normally provided by the users. Not only does this provide the analyst with the
understanding of the business process and its requirements/needs but also from different
perspectives, provided by different users. This helps the analyst to model the business
process up-front of the IS implementation. Without such user participation, the analyst is
not able to create the data model, because the analyst cannot presume to know the user's
business. The analyst is simply recording the knowledge that the user-expert conveys
(Ahmed, 2009).
Some analysts may argue that its not just possible for the users to know, think of
everything or foresee all the needs of an IS from the beginning of the project or, if they
do, their wishes could be unrealistically stated. Stig Holmberg (2009) put it this way:
TDM’s do stress the importance of user involvement, and they do support it very well
(consider strict requirements of documenting user requirements) but only in the
beginning of the project. Newer methods promote user involvement throughout the whole
system development cycle, which is considered much better, from the obvious point that
more communication you have between customer (“problem-maker”, in a way) and
developer (“problem-solver”), it will be easier to find proper solution. To address this
problem, I would recommend that a TDM that does not involve the userS all round the
development life cycle of an IS should go beyond just getting them involved only at the
beginning stage of IS development to as far as through the whole system’s development,
deployment, operation and post-implementation life cycle. The whole design and
development should be participatory and all-involving, as it is in the third generation of
design method, with all stakeholders (users, analysts, designers, implementers, sponsors
etc) making inputs at each of the stages: design, implementation, operation and
evaluation.
Motivation for Choosing Criteria:
The very success or failure of an information system may be measured by the level of
satisfaction of its basic users in the organization.Besides being very important to get the
user involved in the IS development process to enable the analyst/modeller design and
model the business process, defined by the user, it is also very important and much more
beacause, the goal of every IS, in the first place, is to meet and satisfy the needs of its
users. This can only be achieved by finding out what these needs and requirements are
from the users; by having them make their inputs. No one else knows another’s problem
more than the one who has the problem.
2. CHANGE/PROCESS ANALYSIS AND DATA MODELLING
Information System (IS) is the interaction between processes and technology within an
organization or/and across organizational boundaries. Another criterion for assessing a
design method for the development of such an IS is whether that design method gives
room for the business processes analysis and data modeling. The aim of an IS is to solve
a business problem (process)—not just to solve it but in a better way (by use of
technology) than the existing solution does. This necessitates a change analysis: a process
of finding what the existing way of doing things (processes) was and looking for a better
way to get those same things (processes) done. There is need to formulate a problem
before it is solved. In solving the problem identified in the organization or with its
existing solution, a proper process analysis of the organizational activities is done and
documented. The way the IS is going to be developed (and/or the steps) before
embarking on the actual development is also done and documented. This is followed by a
graphical representation of the solution proposed to the problem, which is known as data
modeling - usually done by the analysis/modeller. A Traditional Design Method ought to
have this stage as part of its development life circle because, in the course of this stage,
many ways of solving the business problem as well as models will be arrived at; out of
which the best will be chosen. Fig. 1 shows the steps involved in this stage.
Fig. 1 Change/Process Analysis and Data Modelling
Motivation for Choosing Criteria
The reason I chose this as one of the criteria for assessing a design method is that, for a
quality IS to be developed, there must be an identification and understanding of the
business processes and problems involved in an organization, which the IS is met to
addresss. These processes and problems must be thoroughly analysed and modelled for
Review Existing
Business Process
Solution
Develop Better
Business Process
Solution from
Process Analysis
Model
Business
Process
easy development/impementation of the IS. In project management, there is need to test-
run a project and carry out the necessary tests to ensure they meet the requirements
before moving on to project acceptance and commissioning and, finally, handover to
users and operations personnel, who will use and maintain the system respectively.
Another reason I chose this as a criterion is that, there is need in the design of an IS, to
look out for the poossibility of developing an IS that solves a business problem in a better
way than the existing solution by choosing the best from the various alternatives put
forward.
3. TEST-RUNNING
Testing of proposed Information System is vital in the development life cycle of the
system. Before an IS can be deployed for full operation, there is need for the system to be
test-run to ensure that it meets all the requirements and needs spelt out in the
specification at design stage over a given period of time. This can be gone by feeding the
system with real-world input (data) and ensuring the required output (information) is
churned out. If, at the time of test-run, it is found out that all the requirements and needs
are not met, there is one shortcoming or the other in the IS, and so on, there is need to
improve on (redesign, adjust and add on) the system to ensure it meets the set goals and
objectives. The test-runing should involve the users such that they can make their
observations, comments and suggestions to ensure that the goals and objectives of the IS
are met as closely as possible. This will go a long way in ensuring users get maximum
satisfaction when the IS is eventually swung into full operation. Fig. 2 shows a simple
flowchat depicting the various steps and actions in the test-running stage of an IS over a
period of time.
Fig. 2 Flowchat for Test-Running Information System
Test-run
Information System
START
Does Test-
run meet
requirement
s?
Acceptance,
Commission and Full
Operation/Maintenance
STOP
Fix Problems,
Repair, and Make
Adjustment on
Information System
NO
YES
4. POST IMPLEMENTATION REVIEW AND MAINTENANCE
In business, from time to time, new opportunities come up, organizations diversify, new
business processes come up, new user and customer needs and requirements which were
not initially forseen also come to limelight. This brings about the need for a review of the
current IS, just as it is important to maintain it to ensure any problems (errors and bugs)
that might come up in the course of operation are fixed and that the IS is functioning to
full capacity in meeting the organizational needs. This review is continually and
constantly done to find out whether the operational IS is meeting the new business
processes, needs and requirements of its users and customers in the organization. Any
traditional design method that does not include this into the life cycle of an Information
System is incomplete. This is because, the ultimate aim of an IS is to solve the business
problems of the organization in the best possible way, in order to make the running of the
organization easy for its staff and ensure quality service delivery to its customers; which
eventually will culminate in increased productivity that will, in turn, yield high return on
investment or profitability.
Motivation for Choosing Criteria
There is always the need to review things from time to time, just as humans reflect from
time to time especially at the end of the year and make resolution.The development life
cycle must always involve a stage that focuses on the review of business processess and
problems and finding better ways to solve them.
5. INTERCONNECTIVITY BETWEEN DESIGN STAGES
In carrying out the stages in the development life cycle of an Information System, there
has to be an interconnection between one stage and the following stage in such a way that
the later continues from where the former left off. The SDLC represents a sequence of
stages in which the output of each stage becomes the input for the next. (Centre for
Technology in Government, 2005).
Motivation for Choosing Criteria:
Coherence between design phases is very important in the development of IS. Design of
IS will be easily realized if one phase is directly linked to the other. It gives an idea of
where to start from in the next stage or phase
RESULT OF ASSESSMENT ON AM-ISDM
From the discussion in the foregoing, I will now make a profile curve (Fig. 3) for the
ISAC method, based on the following percentage rating for each criterion or property on
the profile:
1. User Involvement: 30 %
2. Change/Process Assessment: 60 %
3. Test-running: 0 %
4. Post-Implementation Review/Maintenance: 0 %
5. Intercontection of Stages: 10 %
Fig. 3 Profile for ISAC TDM Using Five Assessment Criteria
The rating is a personal one which I arrived at from the study of the ISAC TDM.
INFORMATION SYSTEM WORKS AND ANALYSIS CHANGES (ISAC)
THEORETICAL BASIS
ISAC is a TDM developed in the 1970’s at the ADB department, (in Swedish;
“Administrative databehandling”), Stockholm University/Royal Institute of Technology.
ISAC was later renamed Information System work and Analysis of Changes. By the
ADB Department which was also changed to DSV. ISAC is a systematic user or client
oriented traditional information design method developed by Mats Lundeberg,
G.Goldkuhl and A. Nilsson at University of Stockholm, Sweden in 1979 inspired by the
famous Swedish professor, Börje Langefors.
ISAC worked in what was called “problem oriented systems development” or in
langeforsian terms “infologically oriented systemeering”. The methodology was created
for a much broader coverage of stages in the information systems development life cycle
than the requirements determination stage. ISAC methodology emphasized on user
orientation in its’ early stages of development.
It is a change driven approach made of linear and sequential steps that proceed from
change analysis, activity study, information analysis and culminate with implementation.
The analyst or stakeholders attempt to ask and answer certain questions at each phase that
ends up with the deliverables of that step. The phases are now listed below:
1. Change Analysis
2. Activity Study
3. Information Analysis
4. Implementation
User Involvement
Change/Process
Analysis
Test-running
Post
implementation
Review and
Maintenance
Interconnectivity
of Stages
0 20 40 60 80 100
%
ISAC Method
Profile
ASSESSMENT OF ISAC BASED ON THE FIVE CRITERIA
1. Change/Process Analysis and Data Modelling: It is a process-oriented approach
rather than technology-oriented. In other words, it focuses on the business
processes, events and activities of an organization and the possibility of making
changes to existing IS’s. In this respect, I think ISAC meets the Change/Process
analysis criterion, except that it does not emphasize Data Modelling as it is
process analysis.
2. User Involvement: ISAC is a design method that focuses on the problems and
needs of the organization and consequently sets out to find solution to these
problems by doing business processes analysis as in the Change Analysis phase
by emphasizing cooperation between the users, developer and sponsors. I think
ISAC is a method that incorporates the involvement of the users but does not
emphasize it enough to the extent of defining and specifying the role of the users
in realizing the IS.
3. Test-running: I think test-running IS as a part of the System Life Cycle (SLC) is
not included in the development life cycle proposed by ISAC.
4. Post Implementation Review and Maintenance: ISAC does not also include or
emphasize post implementation review and maintenance of IS’s. This is a very
important phase in the SLC.
5. Interconnectivity between Design Stages: There is little or no coherence or
interconnection between one stage and the next. The output of one stage is not the
input to the next stage.
STRENGTHS OF ISAC
1. Emphasizes change/process analysis
2. Analyzes problems and involves problems owners
3. Uses cause-effect analysis and eliminate solution-oriented problems to get to
underlying causes
4. Generate and evaluate change alternatives to choose the best alternative solution
5. Emphasizes cooperation between users, developers and sponsors
WEAKNESSES OF ISAC
1. Not iterative
2. Does not involve testing
3. No clear connection between design phases
4. Not adaptable or flexible
5. Does not emphasize post implementation review and maintenance
CHANGE OF SPONTANEOUS IMPRESSION GOT FROM EVALUATION OF
TDM ASSESSMENT METHOD
This study highlights the different traditional design methods (TDM’s) with different
stages or phases in the system life cycle that are inadequate for the development of an
information system. And as such, there is need to combine two or more traditional
methods that will complement one another to come about a better design method, e.g.
MoIST—Method of Incorporating Systems Thinking into Information Systems Design.
CRITICAL SYSTEMS HEURISTICS
Critical Systems Heuristics is a name applied by Ulrich to a set of 12 questions he
devised to encourage critical thinking about the value judgements that underlie planning
decisions (Ulrich, 1993; 1996).
EVIDENCE FROM ISAC DESIGN METHOD THAT SUPPORTS CRITICAL
SYSTEMS HEURISTICS CONCLUSIONS
The following can be extracted from ISAC design method as evidence that seems to
support part of the framework of boundary categories of CSH, which translates into a
checklist of twelve critical boundary questions:
1. In the change analysis phase of ISAC, the designers of the IS attempt to analyze
business processes, the existing IS for solving the organizational business
problems, and seek way by which it (existing IS) can be improved upon. This
keys in with the third boundary question in CSH’s sources of motivation
boundary category: What is (ought to be) the measure of improvement? That is,
how can (should) we determine that the consequences, taken together, constitute
an improvement?
2. Another requirement ISAC and CSH share in common is that of the purpose of an
IS. In ISAC, the purpose of an IS is to meet the business needs and requirements
of the users, customers as well as the sponsors. This answers the second question
in the sources of motivation boundary category: What is (ought to be) the
purpose? That is, what are (should be) the consequences?
3. Another thing they share in common is the system analysts, designers,
programmers and implementers etc: the professional stakeholders involved in the
development of an IS. This answers the first question in the sources of
knowledge boundary category of CSH: Who is (ought to be) considered a
professional? That is, who is (should be) involved as an expert, e.g. as a systems
designer, researcher, or consultant?
EVIDENCE FROM ISAC DESIGN METHOD THAT CONTRADICTS
CRITICAL SYSTEMS HEURISTICS CONCLUSIONS
ISAC does not take into consideration the people and environment that will be adversely
affected by the deployment of a particular IS as does CSH in the second of the sources of
legitimation boundary category questions: What secures (ought to secure) the
emancipation of those affected from the premises and promises of those involved? That
is, where does (should) legitimacy lie? CSH ensures changes made to systems are
ethically correct, not affecting anyone negatively. ISAC, on the other hand, is limited to
analyzing problems and solving them for the problem owners (a self-serving concern).
Put differently, ISAC does not consider the third reference system, referred to as context
of application (A) in CSH, which is one of the contexts that matter when assessing the
merits and defects of a claim; and defined thus as that part of the universe in which the
consequences of our actions or claims arise. Rather it adopts conventional systems
thinking, which takes the context of environment (E) into consideration because it
conditions the success of what we do, in spelling out the do’s in a system’s life cycle
(SLC). E embodies a strategic concern for the success of the systems designs or action
proposals, considering A embodies, an ethical concern for the consequences that a design
or proposal may impose upon third parties, including the natural environment.
MOST SEVERE SHORTCOMINGS OF ISAC TDM IN THE LIGHT OF CSH
ISAC does not seem to address the the following boundary questions that dwell on
legitimacy as in Ulrich ’s proposed sources of legitimacy boundary questions in CSH:
1. Emancipation (Victim: Who or what could fall victim or be negatively affected
by the system? This could be marginalized stakeholders, future generations, non-
human nature, or ideas associated with beliefs, values, morals, ideologies.
2. Witnesses: who is representing the interests of the system potential or actual
victims, particularly those interests that cannot speak for themselves? That is,
whose voices (should voice) the concerns of stakeholders, who are not involved
or cannot speak for themselves, including future generations and non-human
nature?
3. World view: What is the source of the tension between the standpoint of”
system” and the negative effects of the system? And how can that tension be
reconciled?
POSSIBLE WAYS OF OVERCOMING SHORTCOMINGS
To overcome the shortcoming of the self-serving objective, ISAC should adopt the third
reference system—context of application—among its steps/phases in the development
and deployment of IS’s. True, as some analysts may argue, practically Ulrich’s
propositions are difficult to achieve in the real world, as they are “built on philosophy”;
however to a large extent, considering the negative impact of an IS on third parties as
well as the environment at the design phase, will go a long way to reducing such impact,
as alternative and better ways will be found in deploying the IS. For instance, in
providing power for an IS, a generating plant (hardware) which emits toxic fume and
noise may be deployed when there is power failure; however, in going for an industrial
UPS or solar power, the immediate environment and neighbours (third parties) must have
been spared of toxic gas and noise pollution as well as the world at large (environment) in
reducing green-house gas emission, and ultimately, global warming
WAYS BY WHICH THIS STUDY CHANGED MY UNDERSTANDING OF TDM
1. I realized that there are many TDM’s for the development of IS’s, with each
having its advantage s and disadvantages in such a way that different TDM’s suit
different IS’s, as perceived (convenient and appropriate) by the users (analysts
and designers) of these methods.
2. No TDM has a fit-it-all solution for the development of IS’s. Rather, one design
method complements another, while at the same time serving as a base on which
new or modern design methods build, e.g. MoIST.
3. Finally, I came to know and understand the third reference system by which the
deployment of a system will be assessed against: context of application—in the
study of CSH. This I never knew before in previous studies, neither in my/the
design of IS’s. I also got to know the checklist of boundary questions (which are
twelve) for assessing claims.
WAYS IN WHICH CSH IN CAN BE APPLIED IN FUTURE WORK WITH
INFORMATION SYSTEM DESIGN
When designing IS, I will ensure I assess it using the twelve boundary questions in CSH,
especially as regards its purpose, benefits to the owners and the effects on third parties
and the environment, just as it is claimed that the use of CSH enables researchers to elicit
rich qualitative data that captured different world-views, values and boundary judgments
of social actors representing the different groups of stakeholders involved in or affected
by a policy (Luckett, 2006).
REFERENCES
http://www.systeminformatik.se/medwik/index.php?title=User_involvement
http://eprints.hud.ac.uk/352/1/NwakoPhdThesis.pdf
http://tarpit.rmc.ca/phillips/courses/583-2000/lectures/05-modeling-enterprises-and-
goals.ppt#265,8,ISAC
http://en.wikipedia.org/wiki/Information_Systems
http://www.systeminformatik.se/isd/keyUlrich.pdf
http://epubl.luth.se/1404-5508/2000/125/index.html
http://www.ingentaconnect.com/content/klu/spaa/2006/00000019/00000006/00009040
http://users.actrix.co.nz/bobwill/CSH.pdf
of social actors representing the different groups of stakeholders involved in or affected
by a policy (Luckett, 2006).
REFERENCES
http://www.systeminformatik.se/medwik/index.php?title=User_involvement
http://eprints.hud.ac.uk/352/1/NwakoPhdThesis.pdf
http://tarpit.rmc.ca/phillips/courses/583-2000/lectures/05-modeling-enterprises-and-
goals.ppt#265,8,ISAC
http://en.wikipedia.org/wiki/Information_Systems
http://www.systeminformatik.se/isd/keyUlrich.pdf
http://epubl.luth.se/1404-5508/2000/125/index.html
http://www.ingentaconnect.com/content/klu/spaa/2006/00000019/00000006/00009040
http://users.actrix.co.nz/bobwill/CSH.pdf

More Related Content

What's hot

DIFFERENCE BETWEEN CONTRACT FORM JKR 203A & PAM
DIFFERENCE BETWEEN CONTRACT FORM JKR 203A & PAMDIFFERENCE BETWEEN CONTRACT FORM JKR 203A & PAM
DIFFERENCE BETWEEN CONTRACT FORM JKR 203A & PAMAnep Botak
 
Variations in works contracts
Variations in works contractsVariations in works contracts
Variations in works contractsDr K M SONI
 
Cad Portfolio
Cad PortfolioCad Portfolio
Cad PortfolioRogerC62
 
Pp2 group assignment
Pp2 group assignmentPp2 group assignment
Pp2 group assignmentlohwenjun
 
50451783 taking-off-quantity
50451783 taking-off-quantity50451783 taking-off-quantity
50451783 taking-off-quantityhlksd
 
Jaya supermarket presentation 2011 latest
Jaya supermarket presentation 2011 latestJaya supermarket presentation 2011 latest
Jaya supermarket presentation 2011 latestKartini Ibrahim
 
Building information modeling
Building information modelingBuilding information modeling
Building information modelingPradeepa M
 
Procurement Methods and their Application.
Procurement Methods and their Application.Procurement Methods and their Application.
Procurement Methods and their Application.Lilian Nwachukwu
 
Guide to Construction Procurement Strategies
Guide to Construction Procurement StrategiesGuide to Construction Procurement Strategies
Guide to Construction Procurement StrategiesSarah Fox
 
PORTAL FRAME- Structural systems
PORTAL FRAME- Structural systemsPORTAL FRAME- Structural systems
PORTAL FRAME- Structural systemsGrace Henry
 
Smm2 second edition
Smm2 second editionSmm2 second edition
Smm2 second editionBt Lee
 
Construction Planning and Scheduling of Residential Building by MS Project by...
Construction Planning and Scheduling of Residential Building by MS Project by...Construction Planning and Scheduling of Residential Building by MS Project by...
Construction Planning and Scheduling of Residential Building by MS Project by...Shabaz Khan
 
BIM Presentation
BIM PresentationBIM Presentation
BIM PresentationOmer Syed
 
5 Steps to Fabric Structure Success
5 Steps to Fabric Structure Success5 Steps to Fabric Structure Success
5 Steps to Fabric Structure Successsamarmijos
 

What's hot (20)

Application of BIM
Application of BIMApplication of BIM
Application of BIM
 
DIFFERENCE BETWEEN CONTRACT FORM JKR 203A & PAM
DIFFERENCE BETWEEN CONTRACT FORM JKR 203A & PAMDIFFERENCE BETWEEN CONTRACT FORM JKR 203A & PAM
DIFFERENCE BETWEEN CONTRACT FORM JKR 203A & PAM
 
Automobile design final
Automobile design finalAutomobile design final
Automobile design final
 
Variations in works contracts
Variations in works contractsVariations in works contracts
Variations in works contracts
 
122 value engineering
122 value engineering122 value engineering
122 value engineering
 
Cad Portfolio
Cad PortfolioCad Portfolio
Cad Portfolio
 
Pp2 group assignment
Pp2 group assignmentPp2 group assignment
Pp2 group assignment
 
50451783 taking-off-quantity
50451783 taking-off-quantity50451783 taking-off-quantity
50451783 taking-off-quantity
 
Jaya supermarket presentation 2011 latest
Jaya supermarket presentation 2011 latestJaya supermarket presentation 2011 latest
Jaya supermarket presentation 2011 latest
 
Pp2 final report
Pp2 final reportPp2 final report
Pp2 final report
 
Building information modeling
Building information modelingBuilding information modeling
Building information modeling
 
Procurement Methods and their Application.
Procurement Methods and their Application.Procurement Methods and their Application.
Procurement Methods and their Application.
 
Guide to Construction Procurement Strategies
Guide to Construction Procurement StrategiesGuide to Construction Procurement Strategies
Guide to Construction Procurement Strategies
 
Building Information Modeling (BIM)
Building Information Modeling (BIM)Building Information Modeling (BIM)
Building Information Modeling (BIM)
 
PORTAL FRAME- Structural systems
PORTAL FRAME- Structural systemsPORTAL FRAME- Structural systems
PORTAL FRAME- Structural systems
 
Smm2 second edition
Smm2 second editionSmm2 second edition
Smm2 second edition
 
Construction Planning and Scheduling of Residential Building by MS Project by...
Construction Planning and Scheduling of Residential Building by MS Project by...Construction Planning and Scheduling of Residential Building by MS Project by...
Construction Planning and Scheduling of Residential Building by MS Project by...
 
Procurement Methods
Procurement MethodsProcurement Methods
Procurement Methods
 
BIM Presentation
BIM PresentationBIM Presentation
BIM Presentation
 
5 Steps to Fabric Structure Success
5 Steps to Fabric Structure Success5 Steps to Fabric Structure Success
5 Steps to Fabric Structure Success
 

Similar to TRADITIONAL DESIGN METHOD

Management information system
Management information systemManagement information system
Management information systemAjilal
 
System development life cycle
System development life cycleSystem development life cycle
System development life cyclerelekarsushant
 
Business analysis
Business analysis Business analysis
Business analysis Gautam Kumar
 
Business analysis
Business analysis Business analysis
Business analysis Gautam Kumar
 
396849 developing-business-it-solutions
396849 developing-business-it-solutions396849 developing-business-it-solutions
396849 developing-business-it-solutionsMd. Mahabub Alam
 
Part7-updated.pptx descrription of lectures
Part7-updated.pptx descrription of lecturesPart7-updated.pptx descrription of lectures
Part7-updated.pptx descrription of lecturesmohammedderriche2
 
MIS.pptx
MIS.pptxMIS.pptx
MIS.pptxU V
 
System Analysis and Design (Health Informatics)
System Analysis and Design (Health Informatics)System Analysis and Design (Health Informatics)
System Analysis and Design (Health Informatics)Zulfiquer Ahmed Amin
 
Innovation and System Design
Innovation and System DesignInnovation and System Design
Innovation and System DesignIJOAEM Editor
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentSharing Slides Training
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems Developmentsharing notes123
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptMarissaPedragosa
 
Business Systems Analyst Interview Questions and Answers
Business Systems Analyst Interview Questions and AnswersBusiness Systems Analyst Interview Questions and Answers
Business Systems Analyst Interview Questions and AnswersHireQuotient
 
Table of ContentsIntroduction. 2Summary of the busines.docx
Table of ContentsIntroduction. 2Summary of the busines.docxTable of ContentsIntroduction. 2Summary of the busines.docx
Table of ContentsIntroduction. 2Summary of the busines.docxjohniemcm5zt
 
Requirments Collection techniques - SDLC.pptx
Requirments Collection techniques - SDLC.pptxRequirments Collection techniques - SDLC.pptx
Requirments Collection techniques - SDLC.pptxRidmiSakura
 

Similar to TRADITIONAL DESIGN METHOD (20)

Mis analysis
Mis analysisMis analysis
Mis analysis
 
Bsa 411 preview full class
Bsa 411 preview full classBsa 411 preview full class
Bsa 411 preview full class
 
Management information system
Management information systemManagement information system
Management information system
 
System development life cycle
System development life cycleSystem development life cycle
System development life cycle
 
Sdlc1
Sdlc1Sdlc1
Sdlc1
 
Business analysis
Business analysis Business analysis
Business analysis
 
Business analysis
Business analysis Business analysis
Business analysis
 
396849 developing-business-it-solutions
396849 developing-business-it-solutions396849 developing-business-it-solutions
396849 developing-business-it-solutions
 
Part7-updated.pptx descrription of lectures
Part7-updated.pptx descrription of lecturesPart7-updated.pptx descrription of lectures
Part7-updated.pptx descrription of lectures
 
Business Use Case Paper
Business Use Case PaperBusiness Use Case Paper
Business Use Case Paper
 
MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
 
System Analysis and Design (Health Informatics)
System Analysis and Design (Health Informatics)System Analysis and Design (Health Informatics)
System Analysis and Design (Health Informatics)
 
Sadchap3
Sadchap3Sadchap3
Sadchap3
 
Innovation and System Design
Innovation and System DesignInnovation and System Design
Innovation and System Design
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems Development
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems Development
 
System_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.pptSystem_Analysis_and_Design_Assignment_New2.ppt
System_Analysis_and_Design_Assignment_New2.ppt
 
Business Systems Analyst Interview Questions and Answers
Business Systems Analyst Interview Questions and AnswersBusiness Systems Analyst Interview Questions and Answers
Business Systems Analyst Interview Questions and Answers
 
Table of ContentsIntroduction. 2Summary of the busines.docx
Table of ContentsIntroduction. 2Summary of the busines.docxTable of ContentsIntroduction. 2Summary of the busines.docx
Table of ContentsIntroduction. 2Summary of the busines.docx
 
Requirments Collection techniques - SDLC.pptx
Requirments Collection techniques - SDLC.pptxRequirments Collection techniques - SDLC.pptx
Requirments Collection techniques - SDLC.pptx
 

TRADITIONAL DESIGN METHOD

  • 1. TRADITIONAL DESIGN METHOD BY DR. SOLOMON EDIRIVERERE ESOMU INTRODUCTION In order to understand and assess a design method it is necessary to have an evaluation guide or reference frame to compare it with. Consequently, in this paper we are going to be discussing five criteria which I consider crucial for assessing Traditional Design Methods (TDM’s) for Information System Design (ISD). As a case study, I will be assessing the Information System work and Analysis Changes (ISAC) traditional design method based on these five assessment criteria. I will also discuss the strengths and weaknesses of this design method, as well as how the evaluation of the method has changed my initial impression of traditional design methods. Finally, I will be discussing the ISAC TDM for information system development in the light of Critical Systems Heuristics (CHS): how ISAC propositions support and contradict CSH, the shortcoming of ISAC, how to overcome these shortcomings, how my understanding of TDM has changed as I studied it and how I intend applying CSH in the future. CRITERIA FOR ASSESSING TDM FOR INFORMATION SYSTEM DESIGN The criteria I consider important for the assessment of a TDM are listed as follows: 1. User Involvement 2. Change/Process Analysis and Data Modelling 3. Test-running 4. Post Implementation Review and Maintenance 5. Interconnectivity between Design Stages 1. USER INVOLVEMENT OR PARTICIPATION In designing an IS, the involvement of the user, which is often known as the expert-user, cannot be overemphasized. This is because every design method ought to be user- or client-oriented, as the IS is being created for the users. Getting the users involved will help the analyst understand the business processes, needs, terms and relationship, which are normally provided by the users. Not only does this provide the analyst with the understanding of the business process and its requirements/needs but also from different perspectives, provided by different users. This helps the analyst to model the business process up-front of the IS implementation. Without such user participation, the analyst is not able to create the data model, because the analyst cannot presume to know the user's business. The analyst is simply recording the knowledge that the user-expert conveys (Ahmed, 2009). Some analysts may argue that its not just possible for the users to know, think of everything or foresee all the needs of an IS from the beginning of the project or, if they do, their wishes could be unrealistically stated. Stig Holmberg (2009) put it this way: TDM’s do stress the importance of user involvement, and they do support it very well (consider strict requirements of documenting user requirements) but only in the beginning of the project. Newer methods promote user involvement throughout the whole system development cycle, which is considered much better, from the obvious point that more communication you have between customer (“problem-maker”, in a way) and
  • 2. developer (“problem-solver”), it will be easier to find proper solution. To address this problem, I would recommend that a TDM that does not involve the userS all round the development life cycle of an IS should go beyond just getting them involved only at the beginning stage of IS development to as far as through the whole system’s development, deployment, operation and post-implementation life cycle. The whole design and development should be participatory and all-involving, as it is in the third generation of design method, with all stakeholders (users, analysts, designers, implementers, sponsors etc) making inputs at each of the stages: design, implementation, operation and evaluation. Motivation for Choosing Criteria: The very success or failure of an information system may be measured by the level of satisfaction of its basic users in the organization.Besides being very important to get the user involved in the IS development process to enable the analyst/modeller design and model the business process, defined by the user, it is also very important and much more beacause, the goal of every IS, in the first place, is to meet and satisfy the needs of its users. This can only be achieved by finding out what these needs and requirements are from the users; by having them make their inputs. No one else knows another’s problem more than the one who has the problem. 2. CHANGE/PROCESS ANALYSIS AND DATA MODELLING Information System (IS) is the interaction between processes and technology within an organization or/and across organizational boundaries. Another criterion for assessing a design method for the development of such an IS is whether that design method gives room for the business processes analysis and data modeling. The aim of an IS is to solve a business problem (process)—not just to solve it but in a better way (by use of technology) than the existing solution does. This necessitates a change analysis: a process of finding what the existing way of doing things (processes) was and looking for a better way to get those same things (processes) done. There is need to formulate a problem before it is solved. In solving the problem identified in the organization or with its existing solution, a proper process analysis of the organizational activities is done and documented. The way the IS is going to be developed (and/or the steps) before embarking on the actual development is also done and documented. This is followed by a graphical representation of the solution proposed to the problem, which is known as data modeling - usually done by the analysis/modeller. A Traditional Design Method ought to have this stage as part of its development life circle because, in the course of this stage, many ways of solving the business problem as well as models will be arrived at; out of which the best will be chosen. Fig. 1 shows the steps involved in this stage. Fig. 1 Change/Process Analysis and Data Modelling Motivation for Choosing Criteria The reason I chose this as one of the criteria for assessing a design method is that, for a quality IS to be developed, there must be an identification and understanding of the business processes and problems involved in an organization, which the IS is met to addresss. These processes and problems must be thoroughly analysed and modelled for Review Existing Business Process Solution Develop Better Business Process Solution from Process Analysis Model Business Process
  • 3. easy development/impementation of the IS. In project management, there is need to test- run a project and carry out the necessary tests to ensure they meet the requirements before moving on to project acceptance and commissioning and, finally, handover to users and operations personnel, who will use and maintain the system respectively. Another reason I chose this as a criterion is that, there is need in the design of an IS, to look out for the poossibility of developing an IS that solves a business problem in a better way than the existing solution by choosing the best from the various alternatives put forward. 3. TEST-RUNNING Testing of proposed Information System is vital in the development life cycle of the system. Before an IS can be deployed for full operation, there is need for the system to be test-run to ensure that it meets all the requirements and needs spelt out in the specification at design stage over a given period of time. This can be gone by feeding the system with real-world input (data) and ensuring the required output (information) is churned out. If, at the time of test-run, it is found out that all the requirements and needs are not met, there is one shortcoming or the other in the IS, and so on, there is need to improve on (redesign, adjust and add on) the system to ensure it meets the set goals and objectives. The test-runing should involve the users such that they can make their observations, comments and suggestions to ensure that the goals and objectives of the IS are met as closely as possible. This will go a long way in ensuring users get maximum satisfaction when the IS is eventually swung into full operation. Fig. 2 shows a simple flowchat depicting the various steps and actions in the test-running stage of an IS over a period of time. Fig. 2 Flowchat for Test-Running Information System Test-run Information System START Does Test- run meet requirement s? Acceptance, Commission and Full Operation/Maintenance STOP Fix Problems, Repair, and Make Adjustment on Information System NO YES
  • 4. 4. POST IMPLEMENTATION REVIEW AND MAINTENANCE In business, from time to time, new opportunities come up, organizations diversify, new business processes come up, new user and customer needs and requirements which were not initially forseen also come to limelight. This brings about the need for a review of the current IS, just as it is important to maintain it to ensure any problems (errors and bugs) that might come up in the course of operation are fixed and that the IS is functioning to full capacity in meeting the organizational needs. This review is continually and constantly done to find out whether the operational IS is meeting the new business processes, needs and requirements of its users and customers in the organization. Any traditional design method that does not include this into the life cycle of an Information System is incomplete. This is because, the ultimate aim of an IS is to solve the business problems of the organization in the best possible way, in order to make the running of the organization easy for its staff and ensure quality service delivery to its customers; which eventually will culminate in increased productivity that will, in turn, yield high return on investment or profitability. Motivation for Choosing Criteria There is always the need to review things from time to time, just as humans reflect from time to time especially at the end of the year and make resolution.The development life cycle must always involve a stage that focuses on the review of business processess and problems and finding better ways to solve them. 5. INTERCONNECTIVITY BETWEEN DESIGN STAGES In carrying out the stages in the development life cycle of an Information System, there has to be an interconnection between one stage and the following stage in such a way that the later continues from where the former left off. The SDLC represents a sequence of stages in which the output of each stage becomes the input for the next. (Centre for Technology in Government, 2005). Motivation for Choosing Criteria: Coherence between design phases is very important in the development of IS. Design of IS will be easily realized if one phase is directly linked to the other. It gives an idea of where to start from in the next stage or phase RESULT OF ASSESSMENT ON AM-ISDM From the discussion in the foregoing, I will now make a profile curve (Fig. 3) for the ISAC method, based on the following percentage rating for each criterion or property on the profile: 1. User Involvement: 30 % 2. Change/Process Assessment: 60 % 3. Test-running: 0 % 4. Post-Implementation Review/Maintenance: 0 % 5. Intercontection of Stages: 10 %
  • 5. Fig. 3 Profile for ISAC TDM Using Five Assessment Criteria The rating is a personal one which I arrived at from the study of the ISAC TDM. INFORMATION SYSTEM WORKS AND ANALYSIS CHANGES (ISAC) THEORETICAL BASIS ISAC is a TDM developed in the 1970’s at the ADB department, (in Swedish; “Administrative databehandling”), Stockholm University/Royal Institute of Technology. ISAC was later renamed Information System work and Analysis of Changes. By the ADB Department which was also changed to DSV. ISAC is a systematic user or client oriented traditional information design method developed by Mats Lundeberg, G.Goldkuhl and A. Nilsson at University of Stockholm, Sweden in 1979 inspired by the famous Swedish professor, Börje Langefors. ISAC worked in what was called “problem oriented systems development” or in langeforsian terms “infologically oriented systemeering”. The methodology was created for a much broader coverage of stages in the information systems development life cycle than the requirements determination stage. ISAC methodology emphasized on user orientation in its’ early stages of development. It is a change driven approach made of linear and sequential steps that proceed from change analysis, activity study, information analysis and culminate with implementation. The analyst or stakeholders attempt to ask and answer certain questions at each phase that ends up with the deliverables of that step. The phases are now listed below: 1. Change Analysis 2. Activity Study 3. Information Analysis 4. Implementation User Involvement Change/Process Analysis Test-running Post implementation Review and Maintenance Interconnectivity of Stages 0 20 40 60 80 100 % ISAC Method Profile
  • 6. ASSESSMENT OF ISAC BASED ON THE FIVE CRITERIA 1. Change/Process Analysis and Data Modelling: It is a process-oriented approach rather than technology-oriented. In other words, it focuses on the business processes, events and activities of an organization and the possibility of making changes to existing IS’s. In this respect, I think ISAC meets the Change/Process analysis criterion, except that it does not emphasize Data Modelling as it is process analysis. 2. User Involvement: ISAC is a design method that focuses on the problems and needs of the organization and consequently sets out to find solution to these problems by doing business processes analysis as in the Change Analysis phase by emphasizing cooperation between the users, developer and sponsors. I think ISAC is a method that incorporates the involvement of the users but does not emphasize it enough to the extent of defining and specifying the role of the users in realizing the IS. 3. Test-running: I think test-running IS as a part of the System Life Cycle (SLC) is not included in the development life cycle proposed by ISAC. 4. Post Implementation Review and Maintenance: ISAC does not also include or emphasize post implementation review and maintenance of IS’s. This is a very important phase in the SLC. 5. Interconnectivity between Design Stages: There is little or no coherence or interconnection between one stage and the next. The output of one stage is not the input to the next stage. STRENGTHS OF ISAC 1. Emphasizes change/process analysis 2. Analyzes problems and involves problems owners 3. Uses cause-effect analysis and eliminate solution-oriented problems to get to underlying causes 4. Generate and evaluate change alternatives to choose the best alternative solution 5. Emphasizes cooperation between users, developers and sponsors WEAKNESSES OF ISAC 1. Not iterative 2. Does not involve testing 3. No clear connection between design phases 4. Not adaptable or flexible 5. Does not emphasize post implementation review and maintenance CHANGE OF SPONTANEOUS IMPRESSION GOT FROM EVALUATION OF TDM ASSESSMENT METHOD This study highlights the different traditional design methods (TDM’s) with different stages or phases in the system life cycle that are inadequate for the development of an information system. And as such, there is need to combine two or more traditional methods that will complement one another to come about a better design method, e.g. MoIST—Method of Incorporating Systems Thinking into Information Systems Design.
  • 7. CRITICAL SYSTEMS HEURISTICS Critical Systems Heuristics is a name applied by Ulrich to a set of 12 questions he devised to encourage critical thinking about the value judgements that underlie planning decisions (Ulrich, 1993; 1996). EVIDENCE FROM ISAC DESIGN METHOD THAT SUPPORTS CRITICAL SYSTEMS HEURISTICS CONCLUSIONS The following can be extracted from ISAC design method as evidence that seems to support part of the framework of boundary categories of CSH, which translates into a checklist of twelve critical boundary questions: 1. In the change analysis phase of ISAC, the designers of the IS attempt to analyze business processes, the existing IS for solving the organizational business problems, and seek way by which it (existing IS) can be improved upon. This keys in with the third boundary question in CSH’s sources of motivation boundary category: What is (ought to be) the measure of improvement? That is, how can (should) we determine that the consequences, taken together, constitute an improvement? 2. Another requirement ISAC and CSH share in common is that of the purpose of an IS. In ISAC, the purpose of an IS is to meet the business needs and requirements of the users, customers as well as the sponsors. This answers the second question in the sources of motivation boundary category: What is (ought to be) the purpose? That is, what are (should be) the consequences? 3. Another thing they share in common is the system analysts, designers, programmers and implementers etc: the professional stakeholders involved in the development of an IS. This answers the first question in the sources of knowledge boundary category of CSH: Who is (ought to be) considered a professional? That is, who is (should be) involved as an expert, e.g. as a systems designer, researcher, or consultant? EVIDENCE FROM ISAC DESIGN METHOD THAT CONTRADICTS CRITICAL SYSTEMS HEURISTICS CONCLUSIONS ISAC does not take into consideration the people and environment that will be adversely affected by the deployment of a particular IS as does CSH in the second of the sources of legitimation boundary category questions: What secures (ought to secure) the emancipation of those affected from the premises and promises of those involved? That is, where does (should) legitimacy lie? CSH ensures changes made to systems are ethically correct, not affecting anyone negatively. ISAC, on the other hand, is limited to analyzing problems and solving them for the problem owners (a self-serving concern). Put differently, ISAC does not consider the third reference system, referred to as context of application (A) in CSH, which is one of the contexts that matter when assessing the merits and defects of a claim; and defined thus as that part of the universe in which the consequences of our actions or claims arise. Rather it adopts conventional systems thinking, which takes the context of environment (E) into consideration because it conditions the success of what we do, in spelling out the do’s in a system’s life cycle (SLC). E embodies a strategic concern for the success of the systems designs or action proposals, considering A embodies, an ethical concern for the consequences that a design or proposal may impose upon third parties, including the natural environment.
  • 8. MOST SEVERE SHORTCOMINGS OF ISAC TDM IN THE LIGHT OF CSH ISAC does not seem to address the the following boundary questions that dwell on legitimacy as in Ulrich ’s proposed sources of legitimacy boundary questions in CSH: 1. Emancipation (Victim: Who or what could fall victim or be negatively affected by the system? This could be marginalized stakeholders, future generations, non- human nature, or ideas associated with beliefs, values, morals, ideologies. 2. Witnesses: who is representing the interests of the system potential or actual victims, particularly those interests that cannot speak for themselves? That is, whose voices (should voice) the concerns of stakeholders, who are not involved or cannot speak for themselves, including future generations and non-human nature? 3. World view: What is the source of the tension between the standpoint of” system” and the negative effects of the system? And how can that tension be reconciled? POSSIBLE WAYS OF OVERCOMING SHORTCOMINGS To overcome the shortcoming of the self-serving objective, ISAC should adopt the third reference system—context of application—among its steps/phases in the development and deployment of IS’s. True, as some analysts may argue, practically Ulrich’s propositions are difficult to achieve in the real world, as they are “built on philosophy”; however to a large extent, considering the negative impact of an IS on third parties as well as the environment at the design phase, will go a long way to reducing such impact, as alternative and better ways will be found in deploying the IS. For instance, in providing power for an IS, a generating plant (hardware) which emits toxic fume and noise may be deployed when there is power failure; however, in going for an industrial UPS or solar power, the immediate environment and neighbours (third parties) must have been spared of toxic gas and noise pollution as well as the world at large (environment) in reducing green-house gas emission, and ultimately, global warming WAYS BY WHICH THIS STUDY CHANGED MY UNDERSTANDING OF TDM 1. I realized that there are many TDM’s for the development of IS’s, with each having its advantage s and disadvantages in such a way that different TDM’s suit different IS’s, as perceived (convenient and appropriate) by the users (analysts and designers) of these methods. 2. No TDM has a fit-it-all solution for the development of IS’s. Rather, one design method complements another, while at the same time serving as a base on which new or modern design methods build, e.g. MoIST. 3. Finally, I came to know and understand the third reference system by which the deployment of a system will be assessed against: context of application—in the study of CSH. This I never knew before in previous studies, neither in my/the design of IS’s. I also got to know the checklist of boundary questions (which are twelve) for assessing claims. WAYS IN WHICH CSH IN CAN BE APPLIED IN FUTURE WORK WITH INFORMATION SYSTEM DESIGN When designing IS, I will ensure I assess it using the twelve boundary questions in CSH, especially as regards its purpose, benefits to the owners and the effects on third parties and the environment, just as it is claimed that the use of CSH enables researchers to elicit rich qualitative data that captured different world-views, values and boundary judgments
  • 9. of social actors representing the different groups of stakeholders involved in or affected by a policy (Luckett, 2006). REFERENCES http://www.systeminformatik.se/medwik/index.php?title=User_involvement http://eprints.hud.ac.uk/352/1/NwakoPhdThesis.pdf http://tarpit.rmc.ca/phillips/courses/583-2000/lectures/05-modeling-enterprises-and- goals.ppt#265,8,ISAC http://en.wikipedia.org/wiki/Information_Systems http://www.systeminformatik.se/isd/keyUlrich.pdf http://epubl.luth.se/1404-5508/2000/125/index.html http://www.ingentaconnect.com/content/klu/spaa/2006/00000019/00000006/00009040 http://users.actrix.co.nz/bobwill/CSH.pdf
  • 10. of social actors representing the different groups of stakeholders involved in or affected by a policy (Luckett, 2006). REFERENCES http://www.systeminformatik.se/medwik/index.php?title=User_involvement http://eprints.hud.ac.uk/352/1/NwakoPhdThesis.pdf http://tarpit.rmc.ca/phillips/courses/583-2000/lectures/05-modeling-enterprises-and- goals.ppt#265,8,ISAC http://en.wikipedia.org/wiki/Information_Systems http://www.systeminformatik.se/isd/keyUlrich.pdf http://epubl.luth.se/1404-5508/2000/125/index.html http://www.ingentaconnect.com/content/klu/spaa/2006/00000019/00000006/00009040 http://users.actrix.co.nz/bobwill/CSH.pdf