Suburban Homes Construction Project Case Study

Continuing with the Suburban Homes Construction Project case study found at the end of chapter 6 (and reviewing previous chapters 1 through 5), CPM 4e, complete the following individual assignment:

(20 points) Stakeholder identification and prioritization matrix (Exhibit 6-2)

(20 points) Stakeholder Matrix (Exhibit 6-4)

(20 points) Stakeholder Engagement Matrix (Exhibit 6-5)

(20 points) Communication Matrix (Exhibit 6-9)

(20 points) Mechanics

You will be assessed on content and mechanics.

Content (80 points):  The content must be based on the case study materials and reading assignments.  The PMBOK 6e and CPM 4e, along with other reputable resources can be used to supplement the responses through summarizing, paraphrasing and quoting those sources. Each matrix should be followed by a discussion of the matrix and how to use/interpret it.

Mechanics (20 points):  The total assignment length should be at least 3 pages, not to exceed 4 pages.  This is not an academic paper, therefore you do not need to follow APA guidelines.  You should review the assignment rubric in Moodle to ensure that you address all aspects of each component to this assignment.

Your Instructor will use Turn-it-in to ensure your paper is authentic work. To avoid plagiarism, see the course home page for more information and use the Purdue Online Writing Lab to learn how to paraphrase, summarize and cite the references you use in all academic writing assignments

Information RIsk Management Worksheet

I need the following assignment done for Information Risk Mangement. I need this assignment completed by tonight!  The work must be 100% original and must be in APA format to include no use of past tense or words that end in “ed”. Work will be checked in plagarism checker for orginality before final payment is made. Include at least 2 to references. Use the format in the attached worksheet to answer the questions in the worksheet and using the scenario contained in the background information below. Attached Risk Management worksheet must contain at least at least five risks that might be encountered during the conversion. Anyone applying to do this homework must have at least 10 reviews and review must be positive

 

Background information:

Assignment: The Stevens Company is converting from the SQL Server database to the Oracle® database.

 

Using the sample shown below, create a Risk Information Sheet for at least five risks that might be encountered during the conversion. See attahed worksheet for addtional

The Failure Of Healthcare

Hi,

– Will be using Turn It in, Must be 100% original work.

– 5 pages, double-spaced, follow outline below, add table of contents (6th page)

– $20 offers only, all other will be rejected.

——————————————————————————————–

You will write a 5-page short article on the failure of healthcare.gov initial launch from the Systems Analysis and Design perspective (e.g. take a look at the table of contents of the text book. Essentially you can address its failure for each chapter in the text book. You need to identify the most significant causes of its failure.)

Outline:

(1) Overview

Tell us some background of the Affordable Care Act (ACA) and its mandates

(2) Identify the scope. highlight the main points.

(3) Vendor selection How the general contractor was selected?

(4) Development Strategies, Architecture, Testing, and Deployment Issues What strategies did they pick? Who are “they”?

(5) Early Warning Signs of Failure – Where was the Management “The Emperor’s new clothes”?

(6) Lesson Learned and Concluding Remarks List 3 major causes you identified above that are fatal errors.

 

Here are some resources to get you started, try to utilize them. Otherwise, use credible sources!

book: attached.

http://www.cio.com/article/2380827/developer/developer-6-software-development-lessons-fromhealthcare-gov-s-failed-launch.html

https://www.theverge.com/us-world/2013/12/3/5163228/healthcare-gov-obamacare-website-shows-how-government-can-do-tech-better

https://www.bloomberg.com/news/articles/2013-10-16/why-the-obamacare-website-was-destined-to-bomb

1 – Office of Inspector General, HealthCare.gov: CMS management of the federal marketplace: a case study, Available at: https://oig.hhs.gov/oei/reports/oei-06-14-00350.pdf [Accessed November 18, 2016].

2 – Goldstein, A., 2016. HHS failed to heed many warnings that HealthCare.gov was in trouble. Washington Post. Available at: https://www.washingtonpost.com/national/health-science/hhs-failed-to-heed-many-warnings-that-healthcaregov-was-in-trouble/2016/02/22/dd344e7c-d67e-11e5-9823-02b905009f99_story.html [Accessed November 18, 2016].

3 – Healthcare.gov. Wikipedia. Available at: https://en.wikipedia.org/wiki/Healthcare.gov [Accessed November 18, 2016].

4 – Johnson, C. & Reed, H., 2013. Why the Government Never Gets Tech Right. The New York Times. Available at: http://www.nytimes.com/2013/10/25/opinion/getting-to-the-bottom-of-healthcaregovs-flop.html [Accessed November 18, 2016].

https://oig.hhs.gov/testimony/docs/2016/bliss-testimony-032016.pdf

https://search.proquest.com/docview/1708019028?pq-origsite=gscholar

Systems Analysis and Design Eighth Edition: Video Enhanced

Maximize your learning experience with Systems Analysis & Design Video Learning Sessions!

The Video Learning Sessions are your personal tutor for the Shelly Cashman Series Systems Analysis & Design, Eighth Edition: Video Enhanced text.

• Fourteen multimedia Video Learning Sessions cover many challenging topics and concepts in the text.

• The self-paced Video Learning Sessions also include sample tasks and suggested solutions so you can practice your skills and check your work.

• All videos contain closed captioning and meet accessibility standards.

The Video Learning Sessions are accessible via streaming Web from the Systems Analysis & Design, Eighth Edition: Video Enhanced Online Companion at www.scsite.com/sad8e/vls.

The PIN to access the streaming video via the Online Companion can be found inside the Student Study Tool envelope at the back of this text.

 

www.scsite.com/sad8e/vls

 

SYSTEMS ANALYSIS AND DESIGN

Eighth Edition: Video Enhanced

Gary B. Shelly Harry J. Rosenblatt

A u s t r a l i a • B r a z i l • J a p a n • K o r e a • M e x i c o • S i n g a p o r e • S p a i n • U n i t e d K i n g d o m • U n i t e d S t a t e s

Shelly Cashman Series®

An imprint of Course Technology, Cengage Learning

 

 

Systems Analysis and Design, Eighth Edition: Video Enhanced Gary B. Shelly Harry J. Rosenblatt

Executive Editor: Kathleen McMahon

Associate Acquisitions Editor: Reed Curry

Associate Product Manager: Jon Farnham

Editorial Assistant: Lauren Brody

Director of Marketing: Cheryl Costantini

Marketing Manager: Tristen Kendall

Marketing Coordinator: Stacey Leasca

Print Buyer: Julio Esperas

Content Project Manager: Lisa Weidenfeld

Development Editor: Deb Kaufmann

Proofreaders: Karen Annett, Kim Kosmatka

Art Director: Marissa Falco

Interior and Text Design: Joel Sadagursky

Cover Photos: Jon Chomitz

Compositor: GEX Publishing Services

Indexer: Rich Carlson

© 2011 Course Technology, Cengage Learning

ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, elec- tronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher.

ISBN-13: 978-0-538-47443-6

ISBN-10: 0-538-47443-2

Course Technology 20 Channel Center Street

Boston, MA 02210

USA

Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil, and Japan. Locate your local office at: www.cengage.com/global

Cengage Learning products are represented in Canada by Nelson Education, Ltd.

To learn more about Course Technology, visit www.cengage.com/coursetechnology

To learn more about Cengage Learning, visit www.cengage.com.

Purchase any of our products at your local college store or at our preferred online store www.CengageBrain.com

Printed in the United States of America 1 2 3 4 5 6 7 15 14 13 12 11 10

For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706

For permission to use material from this text or product, submit all requests online at cengage.com/permissions

Further permissions questions can be emailed to permissionrequest@cengage.com

 

www.cengage.com/global
www.cengage.com/coursetechnology
www.cengage.com
www.CengageBrain.com

 

BRIEF CONTENTS PHASE 1: SYSTEMS PLANNING 1

Chapter 1 Introduction to Systems Analysis and Design 2

Chapter 2 Analyzing the Business Case 48

Chapter 3 Managing Systems Projects 96

PHASE 2: SYSTEMS ANALYSIS 135

Chapter 4 Requirements Modeling 136

Chapter 5 Data and Process Modeling 196

Chapter 6 Object Modeling 246

Chapter 7 Development Strategies 282

PHASE 3: SYSTEMS DESIGN 331

Chapter 8 Output and User Interface Design 332

Chapter 9 Data Design 386

Chapter 10 System Architecture 446

PHASE 4: SYSTEMS IMPLEMENTATION 497

Chapter 11 Managing Systems Implementation 498

PHASE 5: SYSTEMS SUPPORT AND SECURITY 555

Chapter 12 Managing Systems Support and Security 556

THE SYSTEMS ANALYST’S TOOLKIT 613

Toolkit 1 Communication Tools 614 Toolkit 2 CASE Tools 632 Toolkit 3 Financial Analysis Tools 654 Toolkit 4 Internet Resource Tools 674

Glossary/Index 703

Photo Credits 732

iii

 

 

iv

PHASE 1: SYSTEMS PLANNING

Objectives 2

Introduction 2

The Impact of Information Technology 4 The Future of IT 4 The Role of Systems Analysis and Design 4 Who Develops Information Systems? 5

Information System Components 5 Hardware 6 Software 6 Data 7 Processes 7 People 7

Understanding the Business 8 Business Profile 8 Business Models 8 New Kinds of Companies 9

Case in Point 1.1: Cloud Nine Financial Advisors 9

Impact of the Internet 9 B2C (Business-to-Consumer) 10 B2B (Business-to-Business) 10 Web-Based System Development 11

How Business Uses Information Systems 12 Enterprise Computing Systems 12 Transaction Processing Systems 12 Business Support Systems 13 Knowledge Management Systems 14 User Productivity Systems 14 Information Systems Integration 14

Information System Users and Their Needs 15 Top Managers 15 Middle Managers and Knowledge Workers 15 Supervisors and Team Leaders 16 Operational Employees 16

Systems D evelopment Tools 16 Modeling 16 Prototyping 17 Computer-Aided Systems Engineering (CASE) Tools 17

Overview of Systems Development Methods 18 Structured Analysis 19 Object-Oriented Analysis 21 Agile Methods 22 Other Development Methods 24

Systems Development Guidelines 25 Develop a Project Plan 25 Involve Users and Listen Carefully to Them 25 Use Project Management Tools to Identify Tasks and Milestones 25 Develop Accurate Cost and Benefit Information 26 Remain Flexible 26

Information Technology Department 26 Application Development 26

Case In Point 1.2: Global Hotels and Momma’s Motels 27 Systems Support and Security 27

User Support 27 Database Administration 27 Network Administration 28 Web Support 28 Quality Assurance (QA) 28

Case In Point 1.3: What Should Lisa Do? 28

The Systems Analyst Position 28 Responsibilities 29 Required Skills and Background 29 Certification 29 Career Opportunities 30

Case In Point 1.4: Just-in-Time Airfreight, Inc. 31

A Question of Ethics 31

Chapter Summary 30

Key Terms and Phrases 34

Learn It Online 35

Case-Sim: SCR Associates 36

Chapter Exercises 37

Apply Your Knowledge 38

Case Studies 40 New Century Health Clinic 40 Personal Trainer, Inc. 41 Original Kayak Adventures 42

Chapter Capstone Case: SoftWear, Limited 44

Objectives 48

Introduction 48

Strategic Planning — A Framework for IT Systems Development 50 Strategic Planning Overview 50 From Strategic Plans to Business Results 51

Case in Point 2.1: Lo Carb Meals 53 A CASE Tool Example 53 The Role of the IT Department in Project Evaluation 53 The Future 54

Case in Point 2.2: Attaway Airlines, Part One 55

What is a Business Case? 55

Information Systems Projects 56 Main Reasons for Systems Projects 56

Case in Point 2.3: Trent College 58 Factors that Affect Systems Projects 58 Internal Factors 59 External Factors 59 Project Management 61

Evaluation of Systems Requests 62 Systems Request Forms 62 Systems Review Committee 63

Overview of Feasibility 63 Operational Feasibility 64 Technical Feasibility 64 Economic Feasibility 65 Schedule Feasibility 66

TABLE OF CONTENTS

Chapter 1 Introduction to Systems Analysis and Design

Chapter 2 Analyzing the Business Case

 

 

Table of Contents

Evaluating Feasibility 66

Setting Priorities 66 Factors that Affect Priority 67 Discretionary and Nondiscretionary Projects 67

Case in Point 2.4: Attaway Airlines, Part Two 68

Preliminary Investigation Overview 68 Interaction with Managers and Users 68 Planning the Preliminary Investigation 69 Step 1: Understand the Problem or Opportunity 70 Step 2: Define the Project Scope and Constraints 71 Step 3: Perform Fact-Finding 73 Step 4:Analyze Project Usability, Cost, Benefit, and Schedule Data 74 Step 5: Evaluate Feasibility 75 Step 6: Present Results and Recommendations to Management 76

A Question of Ethics 77

Chapter Summary 77

Key Terms and Phrases 78

Learn It Online 79

Case-Sim: SCR Associates 80

Chapter Exercises 81

Apply Your Kno wledge 82

Case Studies 84 New Century Health Clinic 84 Personal Trainer, Inc. 84 Original Kayak Adventures 85 Town of Eden Bay 86

Chapter Capstone Case: SoftWear, Limited 88

Objectives 96

Introduction 96

Project Management Overview 98

Case in Point 3.1: Spring Forward Products 99

Project Planning 99 Identifying Tasks 100

Case in Point 3.2: Parallel Services 101 Estimating Task Completion Time and Cost 101 Factors Affecting Time and Cost Estimates 102

Case in Point 3.3: Sunrise Software 103

Project Scheduling 103

Gantt Charts 104

PERT/CPM Charts 105 PERT/CPM Tasks 106 Task Patterns 106 Complex Task Pa tterns 107 A PERT/CPM Example with Five Tasks 108 Critical Path 109 Transforming a Task List into a PERT/CPM Chart 110 Comparing Gantt Charts and PERT/CPM Charts 111

Project Risk Management 112 Steps in Risk Management 112 Risk Management Software Tools 113

Project Monitoring and Control 113 Monitoring and Control Techniques 113 Maintaining a Schedule 114

Project Reporting 114 Project Status Meetings 115 Project Status Reports 115

Project Management Software 115 Project Management Software Examples 116 A Sample Project Using Microsoft Project and Open Workbench 116

Case in Point 3.4: Census 2010 119

Software Change Control 119

Keys To Project Success 120 Business Issues 120 Budget Issues 120 Schedule Issues 121 Successful Project Management 121

A Question of Ethics 122

Chapter Summary 122

Key Terms and Phrases 124

Learn It Online 125

Case-Sim: SCR Associates 126

Chapter Exercises 127

Apply Your Knowledge 128

Case Studies 130 New Century Health Clinic 130 Personal Trainer, Inc. 130

Chapter Capstone Case: SoftWear, Limited 132

PHASE 2: SYSTEMS ANALYSIS

Objectives 136

Introduction 136

Systems Analysis Phase Overview 138 Systems Analysis Activities 138 Systems Analysis Sk ills 139 Team-Based Techniques: JAD, RAD, and Agile Methods 139

Joint Application Development 139 User Involvement 140 JAD Participants and Roles 140 JAD Advantages and Disadvantages 141

Rapid Application Development 141 RAD Phases and Activities 142 RAD Objectives 143 RAD Advantages and Disadvantages 143

Agile Methods 143 Agile Method Advantages and Disadvantages 145

Case in Point 4.1: North Hills College 146

Modeling Tools and Techniques 146 CASE Tools 146 Functional Decomposition Diagrams 146 Data Flow Diagrams 147 Unified Modeling Language 147

System Requirements Checklist 149 Output Examples 149 Input Examples 150 Process Examples 150 Performance Examples 150 Control Examples 150

v

Chapter 3 Managing Systems Projects

Chapter 4 Requirements Modeling

 

 

vi

Future Growth, Costs, and Benefits 151 Scalability 151 Total Cost of Ownership 151

Fact-Finding 152 Fact-Finding Overview 152 Who,What,Where,When, How, and Why? 153 The Zachman Framework 154

Interviews 155 Step 1: Determine the People to Interview 155 Step 2: Establish Objectives for the Interview 155 Step 3: Develop Interview Questions 156 Step 4: Prepare for the Interview 157 Step 5: Conduct the Interview 158 Step 6: Document the Interview 158 Step 7: Evaluate the Interview 159

Case in Point 4.2: Deep River College 159 Unsuccessful Interviews 159

Case in Point 4.3: FastPak Overnight Package System 160

Other Fact-Finding Techniques 160 Document Review 160 Observation 160 Questionnaires and Surveys 162 Sampling 163 Research 164 Interviews versus Questionnaires 165

Case in Point 4.4: CyberStuff 166

Documentation 166 The Need for Recording the Facts 166 Software Tools 166

Preview of Logical Modeling 171

A Question of Ethics 171

Chapter Summary 171

Key Terms and Phrases 173

Learn It Online 174

Case-Sim: SCR Associates 175

Chapter Exercises 176

Apply Your Kno wledge 177

Case Studies 179 New Century Health Clinic 179 Personal Trainer, Inc. 180 Baxter Community College 181 Town of Eden Bay 181

Chapter Capstone Case: SoftWear, Limited 182

Objectives 196

Introduction 196

Overview of Data and Process Modeling Tools 198

Data Flow Diagrams 198 DFD Symbols 198

Creating a Set of DFDs 204 Guidelines for Drawing DFDs 204 Step 1: Draw a Context Diagram 205 Step 2: Draw a Diagram 0 DFD 207 Step 3: Draw the Lower-Level Diagrams 210

Case in Point 5.1: Big Ten University 215

Data Dictionary 215 Using CASE Tools for Documentation 216 Documenting the Data Elements 216 Documenting the Data Flows 218 Documenting the Data Stores 219 Documenting the Processes 220 Documenting the Entities 221 Documenting the Records 221 Data Dictionary Reports 221

Process Description Tools 222 Modular Design 222 Structured English 223 Decision Tables 224

Case in Point 5.2: Rock Solid Outfitters (Part 1) 226 Decision Trees 226

Case in Point 5.3: Rock Solid Outfitters (Part 2) 227

Logical Versus Physical Models 227 Sequence of Models 227 Four-Model Approach 228

Case in Point 5.4: Tip Top Staffing 228

A Question of Ethics 228

Chapter Summary 229

Key Terms and Phrases 230

Learn It Online 231

Case-Sim: SCR Associates 232

Chapter Exercises 233

Apply Your Knowledge 234

Case Studies 236 New Century Health Clinic 236 Personal Trainer, Inc. 237

Chapter Capstone Case: SoftWear, Limited 238

Objectives 246

Introduction 246

Overview of Object-Oriented Analysis 248 Object-Oriented Terms and Concepts 248 Objects 249 Attributes 251 Methods 252 Messages 253 Classes 254

Relationships Among Objects and Classes 256 Object Relationship Diagram 256

Object Modeling with the Unified Modeling Language 257 Use Case Modeling 257

Case in Point 6.1: Hilltop Motors 259 Use Case Diagrams 259 Class Diagrams 260

Case in Point 6.2: Train the Trainer, Inc. 262 Sequence Diagrams 262 State Transition Diagrams 263 Activity Diagrams 264

Table of Contents

Chapter 5 Data and Process Modeling

Chapter 6 Object Modeling

 

 

Table of Contents

Case in Point 6.3: TravelBiz 264 CASE Tools 264

Organizing the Object Model 265

Case in Point 6.4: Cyber Associates 265

A Question of Ethics 265

Chapter Summary 266

Key Terms and Phrases 267

Learn It Online 268

Case-Sim: SCR Associates 269

Chapter Exercises 270

Apply Your Kno wledge 271

Case Studies 273 New Century Health Clinic 273 Personal Trainer, Inc. 273

Chapter Capstone Case: SoftWear, Limited 274

Objectives 282

Introduction 282

Development Strategies Overview 284

The Impact of the Internet 284 Software as a Service 284 Traditional vs.Web-Based Systems Development 285 Looking to the Future:Web 2.0 and Cloud Computing 287

Outsourcing 288 The Growth of Outsourcing 288 Outsourcing Fees 289 Outsourcing Issues and Concerns 289 Offshore Outsourcing 290

Case in Point 7.1: Turnkey Services 291

In-House Software Development Options 291 Make or Buy Decision 291 Developing Software In-House 292 Purchasing a Software Package 293 Customizing a Software Package 294 Creating User Applications 295

Role of the Systems Analyst 296

Analyzing Cost and Benefits 297 Financial Analysis Tools 297

Case in Point 7.2: Sterling Associates 297 Cost-Benefit Analysis Checklist 298

The Software Acquisition Process 299 Step 1: Evaluate the Information System Requirements 299 Step 2: Identify Potential Vendors or Outsourcing Options 302 Step 3: Evaluate the Alternatives 304 Step 4: Perform Cost-Benefit Analysis 305 Step 5: Prepare a Recommendation 305 Step 6: Implement the Solution 306

Case in Point 7.3: Doug’s Sporting Goods 306

Completion of Systems Analysis Tasks 307 System Requirements Document 307 Presentation to Management 307

The Transition to Systems Design 308 Preparing for Systems Design Tasks 308 The Relationship Between Logical and Physical Design 309

Systems Design Guidelines 309 Systems Design Objectives 310

Case in Point 7.4: Downtown! 312 Design Trade-Offs 313

Prototyping 314 Prototyping Methods 314 Prototyping Tools 315 Limitations of Prototypes 316

Software Development Trends 316

A Question of Ethics 317

Chapter Summary 318

Key Terms and Phrases 320

Learn It Online 321

Case-Sim: SCR Associates 322

Chapter Exercises 323

Apply Your Knowledge 324

Case Studies 326 New Century Health Clinic 326 Personal Trainer, Inc. 327 Cutting Edge 328

Chapter Capstone Case: SoftWear, Limited 329

PHASE 3: SYSTEMS DESIGN

Objectives 332

Introduction 332

Output Design 334 Types of Output 334

Printed and Screen Output 337 Overview of Report Design 337 Types of Reports 338 User Involvement in Report Design 340 Report Design Principles 341 Report Design Example 343

Case in Point 8.1: Lazy Eddie 344 Output Control and Security 345

User Interface Design 346 Evolution of the User Interface 346 Human-Computer Interaction 348

Case in Point 8.2: Casual Observer Software 350 Basic Principles of User-Centered Design 351 Guidelines for User Interface Design 352 User Interface Controls 358

Case in Point 8.3: Trustworthy Insurance Company 360

Input Design 360 Input and Data Entry Methods 360 Input Volume 362 Designing Data Entry Screens 363 Input Errors 365 Source Documents 366 Input Control 368

Case in Point 8.4: Boolean Toys 369

A Question of Ethics 369

Chapter Summary 369

vii

Chapter 7 Development Strategies

Chapter 8 Output and User Interface Design

 

 

viii

Key Terms and Phrases 371

Learn It Online 372

Case-Sim: SCR Associates 373

Chapter Exercises 374

Apply Your Kno wledge 375

Case Studies 377 New Century Health Clinic 377 Personal Trainer, Inc. 377 Video Superstore 378

Chapter Capstone Case: SoftWear, Limited 379

Objectives 386

Introduction 386

Data Design Concepts 388 Data Structures 388 Overview of File Processing 389 The Evolution from File Systems to Database Systems 390

DBMS Components 392 Interfaces for Users, Database Administrators, and

Related Systems 392 Data Manipulation Language 393 Schema 393 Physical Data Repository 394

Web-Based Database Design 394 Characteristics of Web-Based Design 395 Internet Terminology 395 Connecting a Database to the Web 396 Data Security 397

Data D esign Terminology 397 Definitions 397 Key Fields 398 Referential Integrity 400

Entity-Relationship Diagrams 401 Drawing an ERD 402 Types of Relationships 402 Cardinality 404

Case in Point 9.1: TopText Publishing 406

Normalization 406 Standard Notation Format 407 Repeating Groups and Unnormalized Designs 407 First Normal Form 408 Second Normal Form 409 Third Normal Form 411 A Normalization Example 413

Case in Point 9.2: CyberToys 415

Using Codes During Data Design 417 Overview of Codes 417 Types of Codes 418 Developing a Code 419

Case in Point 9.3: DotCom Tools 421

Steps in Database Design 421

Database Models 422 Relational Databases 422 Object-Oriented Databases 424

Data Storage and Access 425 Strategic Tools for Data Storage and Access 425 Logical and Physical Storage 427 Data Coding and Storage 428

Data Control 430

Case in Point 9.4: SoccerMom 431

A Question of Ethics 431

Chapter Summary 432

Key Terms and Phrases 434

Learn It Online 435

Case-Sim: SCR Associates 436

Chapter Exercises 437

Apply Your Knowledge 438

Case Studies 440 New Century Health Clinic 440 Personal Trainer, Inc. 440 FastFlight Airlines 441

Chapter Capstone Case: SoftWear, Limited 442

Objectives 446

Introduction 446

System Architecture Checklist 448 Enterprise Resource Planning 448

Case in Point 10.1: ABC Systems 449 Initial Cost and TCO 449 Scalability 450 Web Integration 451 Legacy System Interface Requirements 451 Processing Options 452 Security Issues 452

Planning the Architecture 452 Servers 453 Clients 454

Client/Server Architecture 455 Overview 455 Client/Server Design Styles 457 Fat and Thin Clients 458 Client/Server Tiers 458 Middleware 459 Cost-Benefit Issues 459 Client/Server Performance Issues 460

Internet-Based Architecture 461 Developing E-Commerce Solutions In-House 462

Case in Point 10.2: Small Potatoes, Inc. 463 Packaged Solutions and E-Commerce Service Providers 463 Corporate Portals 464 Cloud Computing 465 Web 2.0 467

Processing Methods 468 Online Processing 468 Batch Processing 469

Case in Point 10.3: R/Way Trucking Company 469 Combined Online and Batch Processing 469

Network Models 470 The OSI Reference Model 470 Network Modeling Tools 471

Table of Contents

Chapter 9 Data Design

Chapter 10 System Architecture

 

 

Table of Contents

Network Topology 471 Routers 475 Network Protocols 475 Network Licensing Issues 476

Wireless Networks 476 Wireless Network Standards 476 Wireless Network Topologies 477 Wireless Trends 478

Case in Point 10.4: Spider IT Services 479

Systems Design Completion 479 System Design Specification 479 User Approval 480 Presentations 481

A Question of Ethics 482

Chapter Summary 482

Key Terms and Phrases 485

Learn It Online 486

Case-Sim: SCR Associates 487

Chapter Exercises 488

Apply Your Kno wledge 489

Case Studies 491 New Century Health Clinic 491 Personal Trainer, Inc. 491

Chapter Capstone Case: SoftWear, Limited 493

PHASE 4: SYSTEMS IMPLEMENTATION

Objectives 506

Introduction 506

Software Quality Assurance 500 Software Engineering 500 International Organization for Standardization (ISO) 501

Overview of Application Development 503 Review the System Design 503 Application Development Tasks 503 Systems Development Tools 504 Project Management 506

Structured Application Development 506 Structure Charts 506 Cohesion and Coupling 507 Drawing a Structure Chart 509

Object-Oriented Application Development 510 Characteristics of Object-Oriented Application Development 510 Implementation of Object-Oriented Designs 511 Object-Oriented Cohesion and Coupling 511

Agile Application Development 512 An Extreme Programming (XP) Example 512 The Future of Agile Development 513

Coding 514 Programming Environments 514 Generating Code 514

Testing the System 515 Unit Testing 515

Case in Point 11.1: Your Move, Inc. 516

Integration Testing 516 System Testing 517

Case in Point 11.2: WebTest, Inc. 518

Documentation 518 Program Documentation 519 System Documentation 519 Operations Documentation 519 User Documentation 520

Management Approval 523

System Installation and Evaluation 524

Operational and Test Environments 524

Training 525 Training Plan 525 Vendor Training 526 Webinars, Podcasts, and Tutorials 527 Outside Training Resources 527 In-House Training 528

Data Conversion 531 Data Conversion Strategies 531 Data Conversion Security and Controls 531

System Changeover 531 Direct Cutover 532 Parallel Operation 532 Pilot Operation 533 Phased Operation 533

Case in Point 11.3: Global Cooling 534

Post-Implementation Tasks 534 Post-Implementation Evaluation 534

Case in Point 11.4: Yorktown Industries 536 Final Report to Management 537

A Question of Ethics 537

Chapter Summary 537

Key Terms and Phrases 540

Learn It Online 541

Case-Sim: SCR Associates 542

Chapter Exercises 543

Apply Your Knowledge 544

Case Studies 546 New Century Health Clinic 546 Personal Trainer, Inc. 546 Fanciful Crystal 547

Chapter Capstone Case: SoftWear, Limited 548

PHASE 5: SYSTEMS SUPPORT AND SECURITY

Objectives 556

Introduction 556

Overview 558

User Support 558 User Training 558 Help Desks 558

ix

Chapter 11 Managing Systems Implementation

Chapter 12 Managing Systems Support and Security

 

 

Maintenance Tasks 560 Corrective Maintenance 561 Adaptive Maintenance 562 Perfective Maintenance 562 Preventive Maintenance 563

Case in Point 12.1: Outback Outsourcing, Inc. 564

Maintenance Management 564 The Maintenance Team 564

Case in Point 12.2: Brightside Insurance, Inc. 566 Maintenance Requests 566 Establishing Priorities 568 Configuration Management 568 Maintenance Releases 568 Version Control 569 Baselines 570

System Performance Management 571 Fault Management 571 Performance and Workload Measurement 571 Capacity Planning 574 System Maintenance Tools 576

System Security Overview 576 System Security Concepts 576 Risk Management 576 Attacker Profiles and Attacks 578

Security Levels 580 Physical Security 580

Case in Point 12.3: Outer Banks County 583 Network Security 583 Application Security 587 File Security 588 User Security 588 Procedural Security 591

Case in Point 12.4: Chain Link Consulting, Inc. 591

Backup and Recovery 592 Backup Policies 592 Business Continuity Issues 594

System Obsolescence 594

Future Challenges and Opportunities 595 Predictions 595 Strategic Planning for IT Professionals 596 IT Credentials and Certification 597

A Question of Ethics 598

Chapter Summary 598

Key Terms and Phrases 600

Learn It Online 601

Case-Sim: SCR Associates 602

Chapter Exercises 603

Apply Your Kno wledge 604

Case Studies 606 New Century Health Clinic 606 Personal Trainer, Inc. 606 Tarheel Industries 607 Mills Imports 608

Chapter Capstone Case: SoftWear, Limited 609

THE SYSTEMS ANALYST’S TOOLKIT

Objectives 614

Introduction 614

Successful Communication Strategies 616 Why,Who,What,When, and How 616 Cultural Context 616 Know Your Subje ct 617

Written Communications 617 Writing Style and Readability 617 E-Mail, Memos, and Letters 618 Netiquette 619 Workgroup Software 621 Reports 621

Oral Communications 623 Define the Audience 623 Define the Objectives 623 Organize the Presentation 624 Define Any Technical Terms 624 Prepare Presentation Aids 624 Practice 625 The Presentation 626 Delivering Online Presentations 627

Managing Your Communication Skills 627

Toolkit Summary 629

Key Terms and Phrases 630

Toolkit Exercises 631

Objectives 632

Introduction 632

Overview of CASE Tools 634 CASE Tools H istory 634 The Marketplace for CASE Tools 634

CASE Terms and Concepts 637 Repository 637 Individual Tools 637

Integrated Development Environments 640 Examples of Integrated Development Environments 640 Pros and Cons of Integrated Development Tools 640

CASE Tool Examples 641 Visible Analyst 641 System Architect 643 Rational Software 644

CASE Tool Trends 645 New Products and Features 646 Method-Specific C ASE Tools 649

Table of Contents

Toolkit 2 CASE Tools

Toolkit 1 Communication Tools

x

 

 

Table of Contents

Toolkit Summary 650

Key Terms and Phrases 651

Toolkit Exercises 652

Objectives 654

Introduction 654

Describing Costs and Benefits 656 Cost Classifications 658 Managing Information Systems Costs and Charges 659 Benefit Classifications 660

Cost-Benefit Analysis 660 Payback Analysis 661 Using a Spreadsheet to Compute Payback Analysis 663 Return on Investment Analysis 664 Using a Spreadsheet to Compute ROI 666 Present Value Analysis 666 Using a Spreadsheet to Calculate Present Value 669

Toolkit Summary 670

Key Terms and Phrases 671

Toolkit Exercises 672

Objectives 674

Introduction 674

Overview 676

Planning an Internet Research Strategy 676 Step 1. Review Your Information Requirements 676 Step 2. Use the Proper Search Tools and Techniques 677 Step 3. Evaluate the Results 677 Step 4. Consider Copyright and Data Integrity Issues 677

Search Basics 678

Search Engines 679 Search Engine Concepts 679 Search Techniques 680 Advanced Search Techniques 681 Search Checklist 683

Subject Directories 684 A Subject Directory Example 684 Advantages and Disadvantages of Subject Directories 685

The Invisible Web 685 Invisible Web Examples 686 Navigation Tools for the Invisible Web 686

Internet Communication Channels 688 Newsgroups 689 Newsletters, Blogs, and Podcasts 690 RSS Feeds 690 Webinars 691 Mailing Lists 691 Web-Based Discussion Groups 692 Chat Rooms 692 Instant Messaging and Text Messaging 692

Information Technology Community Resources 695 Corporate Resources 695 Government Resources 696 Professional Resources 696 Online Learning Resources 696

Toolkit Summary 699

Key Terms and Phrases 700

Toolkit Exercises 701

Glossary/Index 703

Photo Credits 732

xi

Toolkit 4 Internet Resource Tools

Toolkit 3 Financial Analysis Tools

 

 

xii Preface

PREFACE The Shelly Cashman Series® offers the finest textbooks in computer education. We are proud that our previous editions of Systems Analysis and Design have been so well received by instructors and students. Systems Analysis and Design, Eighth Edition: Video Enhanced continues with the innovation, quality, and reliability you have come to expect from the Shelly Cashman Series.

Overview

Systems Analysis and Design, Eighth Edition: Video Enhanced includes exciting new Video Learning Sessions, developed to maximize the learning experience. The Video Learning Sessions combined with the text present a practical, visually appealing approach to informa- tion systems development. Many two- and four-year colleges and schools use this book in information systems, computer science, and e-commerce curriculums. The textbook emphasizes the role of the systems analyst in a dynamic, business-related environment.

Facing a challenging global marketplace, companies need strong IT resources to sur- vive and compete effectively. Many of today’s students will become the systems ana- lysts, managers, and IT professionals of tomorrow. This textbook will help prepare students for those roles.

Using this book, students learn how to translate business requirements into informa- tion systems that support a company’s short- and long-term objectives. Case studies and assignments teach analytical and problem-solving skills. Students learn about traditional structured analysis, object-oriented concepts, and agile methods. Extensive end-of-chapter exercises emphasize critical-thinking skills.

Features new to the Eighth Edition include a new chapter on project management, a new IT ethics feature, greater emphasis on IT security, and an overall update that explains new systems development methods and trends.

Objectives of This Textbook

Systems Analysis and Design, Eighth Edition: Video Enhanced is intended for a three credit-hour introductory systems analysis and design course. This textbook is designed to:

• Explain systems analysis and design using an appealing full-color format, numerous screen shots and illustrations, and an easy-to-read style that invites students to learn.

• Introduce project management concepts early in the systems development process, with a new chapter that explains project management tools and techniques.

• Challenge students with a Question of Ethics mini-case in each chapter that asks them to respond to real-life ethical issues in an IT environment.

• Provide multi-method coverage, including a comparison of structured, object- oriented, and agile systems development methods.

• Emphasize the importance of planning, implementing, and managing an effective IT security program.

• Explain how IT supports business requirements in today’s intensely competitive environment, and describe major IT developments and trends.

• Provide case studies and exercises that promote critical-thinking skills and encourage students to apply their skills and knowledge.

• Describe a systems analyst’s job in a typical business organization, and show stu- dents how to use various tools and techniques to improve their skills and manage their careers.

 

 

Preface xiii

• Provide students with a comprehensive Systems Analyst’s Toolkit that highlights four major cross-functional tools, including: Communications Tools, CASE Tools, Financial Analysis Tools, and Internet Resource Tools.

New Video Learning Sessions

Fourteen Video Learning Sessions enhance the textbook and describe important systems analysis skills and concepts. The sessions provide step-by-step explanations that are easy to follow and understand.

• Topics include DFDs, data normalization, entity-relationship diagrams, decision tables, financial tools, and project management.

• A Your Turn feature in every Video Learning Session challenges students to apply their skills and check their work against sample answers. This hands-on practice can help students better handle actual assignments and tasks.

• The Video Learning Sessions offer a self-paced multimedia format that students can review at their convenience.

• Instructors may use the Video Learning Sessions as classroom presentations, distance-education support, student review tools, and exam preparation.

New and Updated Features in This Text

Systems Analysis and Design, Eighth Edition: Video Enhanced offers these exciting new and expanded features:

• Each development phase opens with an eye-catching Dilbert© cartoon and a multicolor Gantt chart that provides a visual roadmap for students.

• New Project Management chapter adds coverage of project management tools, techniques, and a full set of practice tasks and activities. A link is provided to Open Workbench, open-source project management software that students can download and install. Each Chapter Capstone case now includes a Gantt chart example, showing concurrent and dependent tasks, and each Chapter Opener case also includes a Gantt chart.

• New Question of Ethics mini-case in each chapter challenges students with real- life ethical issues in an IT environment.

• Multi-method coverage provides comparison of structured, object-oriented, and agile development methods, starting in Chapter 1. New material on agile methods includes examples of extreme programming, scrum, spiral models, and related topics.

• New coverage of risk management, both in a project management context and as a key element of IT security planning.

• Extensive update of networking coverage, including new material on switches, routers, and multistation access units. New coverage of wireless networks, including wireless standards, topologies, and trends.

• Major expansion of IT security material, including risk management, fault man- agement, backup and recovery, wireless security issues, and a six-level security framework.

• Expanded coverage of IT trends, including cloud computing, Web 2.0, RFID, wireless networks, mobile computing, offshore outsourcing, e-business, ERP, Web hosting, client/server architecture, network concepts, Webinars, podcasts, RSS feeds, Web-based applications, and others.

 

 

xiv Preface

• Revised Systems Analyst’s Toolkit teaches students IT support skills in four cross- functional areas, including Communication Tools, CASE Tools, Financial Analysis Tools, and Internet Resource Tools.

Organization of This Textbook

Systems Analysis and Design, Eighth Edition: Video Enhanced contains 16 learning units in twelve chapters and a four-part Systems Analyst’s Toolkit that teaches valuable cross-functional skills.

Chapter 1 – Introduction to Systems Analysis and Design Chapter 1 provides an up- to-date overview of IT issues, major trends, and various systems development approaches, including structured, object-oriented, and agile methods. The chapter emphasizes the important role of systems analysis and design in supporting business objectives.

Chapter 2 – Analyzing the Business Case Chapter 2 offers a business-related starting point for successful systems analysis. Topics include strategic planning, review of systems requests, how to conduct a feasibility study, and the steps in a preliminary investigation.

Chapter 3 – Managing Systems Projects Chapter 3 explains project management, cost estimating, and change control for information systems. This chapter includes hands-on skills that systems analysts can use to create Gantt charts and PERT charts.

Chapter 4 – Requirements Modeling Chapter 4 describes fact-finding techniques and team-based modeling methods, including JAD and RAD, that systems analysts use to model and document a new system.

Chapter 5 – Data and Process Modeling Chapter 5 explains how systems analysts create a logical model for the new system by using data flow diagrams and process description tools, including structured English, decision tables, and decision trees.

Chapter 6 – Object Modeling Chapter 6 explains object-oriented tools and techniques, including use case diagrams, class diagrams, sequence diagrams, state- transition diagrams, activity diagrams, and the Unified Modeling Language.

Chapter 7 – Development Strategies Chapter 7 focuses on software acquisi- tion options, including outsourcing and offshore outsourcing options, applica- tion service providers, and other trends that view software as a service rather than a product.

Chapter 8 – Output and User Interface Design Chapter 8 highlights output and report design, the interaction between humans and computers, including usability issues, graphical screen design, input issues, and data entry guidelines.

Chapter 9 – Data Design Chapter 9 describes data design terms, con- cepts, and skills including entity-relationship diagrams, cardinality, data normalization rules, data warehousing, data mining, a comparison of logi-

cal and physical records, and data control measures. Chapter 10 – System Architecture Chapter 10 explains the elements of system architec-

ture, with emphasis on RFID, ERP, supply chain management, client/server architecture, and network topology, including wireless networking standards and trends.

Chapter 11 – Managing Systems Implementation Chapter 11 includes coverage of application development and implementation topics, including structure charts, docu- mentation techniques, system testing, user training, data conversion, changeover meth- ods, and post-implementation evaluation.

Chapter 12 – Managing Systems Support and Security Chapter 12 describes user sup- port, maintenance techniques, and factors that indicate the end of a system’s useful life. This chapter explains IT security concepts, techniques, and tools, and specifically addresses six security levels: physical, network, application, file, user, and procedural security. Chapter 12 also describes risk management, data backup and disaster recovery, and explains future challenges and opportunities that IT professionals will face in a dynamic workplace.

SYSTEM S PLAN

NING

1

PHASE

As the D ilbert car

toon sug gests, it i

s always a good id

ea to kno w wheth

er a proj ect fits th

e

company ’s overall

strategy . You wil

l learn m ore abou

t the rela tionship

between systems

projects

and corp orate str

ategies in the syst

ems plan ning pha

se.

Systems planning

is the firs t of five p

hases in the syste

ms devel opment

life cycle . After a

n intro-

duction t o system

s analysis and desi

gn, you w ill learn h

ow syste ms proje

cts get st arted, ho

w to

evaluate a project

proposa l to dete

rmine its feasibilit

y, and ho w to use

project managem

ent tools

and tech niques.T

he delive rable for

this pha se is the

prelimina ry invest

igation re port.

1 DELIVER

ABLE

Prelimina ry invest

igation re port

TOOLKI T SUPPO

RT

Primary tools: Co

mmunica tions and

financial analysis t

ools

Other to ols as re

Into To Info System & Data Analytics

Class:  Into to Info System & Data Analytics

 

 

Please read instructions carefully….the first attachment are the instructions and the second attachment is the excel sheet.

 

 

 

Reply to these two questions and REPLY to 2 other students post. Word count on initial posting must be 75 and reply must be 45. I also have an excel spreadsheet that needs some correcting I have attached the spreadsheet and instructions. These assignments need to be completed by 4pm EST TODAY.

 

 

 

 

 

 

 

1. Discuss:    How do systems serve the various levels of management in a business?

 

 

 

2. How is information systems transforming business, and what kind of career opportunities exist in relatively new field ?

 

View and comment on the Slide Presentation that I have attached below.  Also do a search on the internet and find another site that discusses IS career opportunities and comment on your findings and thoughts about this career field.

Chapter 2 Hands-on MIS Application

Problem Statement

IMPROVING DECISION MAKING: USE A SPREADSHEET TO SELECT SUPPLIERS

Software skills: Spreadsheet date functions, data filtering, DAVERAGE function

Business skills: Analyzing supplier performance and pricing 2- 11

In this exercise, you will learn how to use spreadsheet software to improve management decisions about selecting suppliers. You will filter transactional data on suppliers based on several different criteria to select the best suppliers for your company. You run a company that manufactures aircraft components. You have many competitors who are trying to offer lower prices and better service to customers, and you are trying to determine whether you can benefit from better supply chain management. In the BlackBoard “Learning Module” folder you will find a spreadsheet file that contains a list of all of the items that your firm has ordered from its suppliers during the past three months. The fields in the spreadsheet file include vendor name, vendor identification number, purchaser’s order number, item identification number and item description ( for each item ordered from the vendor), cost per item, number of units of the item ordered ( quantity), total cost of each order, vendor’s accounts payable terms, order date, and actual arrival date for each order. Prepare a recommendation of how you can use the data in this spreadsheet database to improve your decisions about selecting suppliers. Some criteria to consider for identifying preferred suppliers include the supplier’s track record for on- time deliveries, suppliers offering the best accounts payable terms, and suppliers offering lower pricing when the same item can be provided by multiple suppliers. Use your spreadsheet software to prepare reports to support your recommendations.

Hint on Excel Skills and Usage (See Excel Tutorial Links Below)

This exercise requires some student knowledge of spreadsheet database functions. At a minimum, students should know how to sort the database by various criteria such as item description, item cost, vendor number, vendor, name, or A/P terms. Students may need to be told that A/P Terms is expressed as the number of days that the customer has to pay the vendor for a purchase. In other words, 30 designates net 30 days. The vendor that allows customers the longest amount of time to pay for an order would, of course, offer the most favorable payment terms.

Students will need to add additional columns for calculating the delivery time for each order. The delivery time can be calculated by subtracting the Order Date from the Arrival Date. Vendors with the shortest delivery times are obviously desirable.

These numbers are useful when trying to determine who is the vendor with the best on-time delivery track record. Students can use the DAVERAGE or the SUMIF and COUNTIF functions to determine the average delivery time for each vendor. Students can also use one of the database functions to determine the vendor with the best accounts payable terms. To determine the vendor with the lowest prices for the same item when it is supplied by multiple vendors, students can filter the database using the item description. This filtered list can then be sorted by item cost and vendor number.

Excel Tutorials Links

Choose Link below Based on Your current Excel Version:

http://www.gcflearnfree.org/excel2013/27 For MS Excel 2013 users – 28 Lessons in all subjects needed

http://www.tutorialspoint.com/excel/ For MS Excel 2010 users – Lessons with examples in all subjects needed – click on training of interest from the Left Side Menu.

http://www.gcflearnfree.org/excel2007 For MS Excel 2007 users – Lessons in all subjects needed – avoid the Ads, the training material is there as you scroll down the pages.