bis-m5-planning and implementing information systems
TRANSCRIPT
![Page 1: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/1.jpg)
Module 5Planning and
Implementing Information Systems
![Page 2: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/2.jpg)
SDP(Software Development
Process)
![Page 3: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/3.jpg)
Waterfall Model
![Page 4: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/4.jpg)
4
SDLC (Systems Development Life
Cycle)• SDLC is usually used in large information
systems development• SDLC is also known as waterfall method• During each phase, verification activities (e.g.
reviews) are done to ensure quality
![Page 5: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/5.jpg)
5
SDLC Phases
• Requirements Analysis
• System Design
• Construction & Unit Testing
• Functionality Testing (System Testing & User Acceptance Testing)
• Implementation
• Support & Maintenance
![Page 6: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/6.jpg)
6
Requirements Analysis• Defines the functional and technical
characteristics of the system• Systems analysis: five-step process
– Investigation
– Technical feasibility study (h/w, s/w)
– Economic feasibility study (Cost/benefit analysis, Return on investment (ROI))
– Operational feasibility study
– Requirements Definition
• Output: Requirements specification document
![Page 7: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/7.jpg)
7
Requirements Analysis (continued)
Figure 12.3: Phases in systems analysis
![Page 8: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/8.jpg)
8
Requirements Analysis (continued)
Figure 12.4: Estimated benefits and costs of an IS ($000)
![Page 9: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/9.jpg)
9
System Design• Define
– Software architecture
– Data structures
– Interface requirements
– Algorithms
• Tools used– Data Flow Diagrams
– Unified modeling language (UML), which consists of use-cases and actors
• Output: System Design Document
![Page 10: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/10.jpg)
10
Construction & Unit Testing• Construction
– Programming
– Unit Testing of completed modules
![Page 11: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/11.jpg)
11
FunctinalTesting• System testing
– Test the entire integrated system for system functionality (includes the verification of the integrated software system, system interfaces, databases, performance, security etc)
• User Acceptance Testing– The business user will test whether his
requirements are met, by testing the business processes provided in the new system
![Page 12: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/12.jpg)
12
Implementation
• Do Data Conversion (if required)• Move the new system to production• Training to client (users, operators etc)
![Page 13: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/13.jpg)
13
Support & Maintenance
• Support– Service Desk (User Support)
– Production Support (Technical Support)
• Maintenance– Post-implementation debugging
– Updates
– Adding postponed features
• Longest phase of system life cycle
![Page 14: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/14.jpg)
14
V-Shaped SDLC Model
• A variant of the Waterfall that emphasizes the verification and validation of the product.
• Testing of the product is planned in parallel with a corresponding phase of development
![Page 15: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/15.jpg)
15
V-Shaped SDLC Model
![Page 16: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/16.jpg)
Other Software Development Methods
![Page 17: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/17.jpg)
17
Other Software Development Methods
– Treat software development as series of contacts with users
– Fast development of software
– Improve software after user specifications received
– Iterative programming
![Page 18: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/18.jpg)
18
Other Software Development Methods
– Agile software development
– Rapid Application Development
– Extreme programming (XP)
– Adaptive software development (ASD)
– Lean development (LD)
– Rational unified process (RUP)
– Feature driven development (FDD)
– Dynamic systems development method (DSDM)
– Scrum
– Crystal
![Page 19: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/19.jpg)
19
Other Software Development Methods
• Risks– Analysis phase limited or eliminated
• Risk of incompatibilities
– Less documentation• Difficult to modify
• Manifesto for Agile Software Development prioritizes individuals and interactions over processes
• Light but sufficient development process
![Page 20: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/20.jpg)
20
Other Software Development Methods
Figure 12.10: Agile methods emphasize continuous improvement basedon user requests
![Page 21: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/21.jpg)
21
Other Software Development Methods
• User involvement encouraged throughout process
• Test modules immediately after completion• Communication with users informal• Two programmers per module• Dominoes Pizza successfully implemented agile
method
![Page 22: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/22.jpg)
22
Spiral SDLC Model
• Adds risk analysis, and 4gl RAD prototyping to the waterfall model
• Each cycle involves the same sequence of steps as the waterfall process model
![Page 23: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/23.jpg)
23
Spiral SDLC Model
![Page 24: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/24.jpg)
System Integration
![Page 25: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/25.jpg)
25
Systems Integration• Systems integration: combine disparate
systems– Examines needs of entire organization
– Allows data to flow between units
– Some service companies specialize in this
– Integration more challenging than development
– Interface legacy systems with new systems
![Page 26: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/26.jpg)
26
Systems Integration (continued)
Figure 12.12: Situations calling for systems integration
![Page 27: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/27.jpg)
27
Systems Integration (continued)
• Systems integrators must be skilled in hardware and software
• Difficult to overcome incompatibility issues• Systems integration may span several
organizations• Integration with telecommunications
![Page 28: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/28.jpg)
Summary
![Page 29: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/29.jpg)
29
Summary• IT planning important because of high
investment rate• Standardization important part of IT planning• Systems development life cycle (SDLC) has
well-defined phases• Purpose of systems analysis is to determine
needs the system will satisfy
![Page 30: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/30.jpg)
30
Summary (continued)• Feasibility studies determine if system is
possible and desirable• System requirements detail features needed• Developers outline system components
graphically• Unified Modeling language used to create model
of desired system• Implementation includes training and conversion
to new system
![Page 31: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/31.jpg)
31
Summary (continued)• Support entails maintenance and satisfying
changing needs• Agile methods are popular alternative to
traditional systems development cycle• Systems integration more complicated than
systems development• Great responsibility of IS professionals results in
certification requirements
![Page 32: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/32.jpg)
Quality
![Page 33: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/33.jpg)
33
Quality – the degree to which the software satisfies stated
and implied requirements• Absence of system crashes• Correspondence between the software and the
users’ expectations• Performance to specified requirements
Quality must be controlled because it lowers production speed, increases maintenance costs and can adversely affect business
![Page 34: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/34.jpg)
System Integration
![Page 35: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/35.jpg)
35
Quality Assurance Plan
• The plan for quality assurance activities should be in writing
• Decide if a separate group should perform the quality assurance activities
• Some elements that should be considered by the plan are: defect tracking, unit testing, source-code tracking, technical reviews, integration testing and system testing.
![Page 36: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/36.jpg)
36
Quality Assurance Plan
• Defect tracing – keeps track of each defect found, its source, when it was detected, when it was resolved, how it was resolved, etc
• Unit testing – each individual module is tested• Source code tracing – step through source code line
by line• Technical reviews – completed work is reviewed by
peers• Integration testing -- exercise new code in
combination with code that already has been integrated
• System testing – execution of the software for the purpose of finding defects.
![Page 37: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/37.jpg)
CMMi version 1.2
![Page 38: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/38.jpg)
38
Capability Maturity Model Integrated
• CMMi was developed by a group of experts from industry, government, and the Software Engineering Institute (SEI) at Carnegie Mellon University.
• CMMI models provide guidance for developing or improving processes that meet the business goals of an organization
• A CMMi model may also be used as a framework for appraising the process maturity of the organization
• CMMi defines 5 levels of process maturity• CMMi 1.2 of Aug 2006 provides models for development,
acquisition & service• CMMi1.2 covers 22 Key Process Areas that need
attention to improve the processses
![Page 39: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/39.jpg)
39
Levels of the CMMi• Initial (chaotic, ad hoc, individual heroics) - the
starting point for use of a new process.• Managed - the process is managed according to
the metrics described in the Defined stage.• Defined - the process is defined/confirmed as a
standard business process, and decomposed to levels 0, 1 and 2 (the latter being Work Instructions).
• Quantitatively managed• Optimized - process management includes
deliberate process optimization/improvement.
![Page 40: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/40.jpg)
40
CMMi Maturity Levels
[4]Buchholtz & Cordes[4]Buchholtz & Cordes
![Page 41: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/41.jpg)
41
CMMi Maturity Levels & KPAs
Maturity Key Process Area
2 Requirements Management
2 Project Monitoring and Control
2 Project Planning
2 Supplier Agreement Management
2 Configuration Management
2 Measurement and Analysis
2 Process and Product Quality Assurance
3 Product Integration
3 Requirements Development
3 Technical Solution
3 Validation
![Page 42: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/42.jpg)
42
CMMi Maturity Levels & KPAs
3 Verification
3 Organizational Process Definition +IPPD
3 Organizational Process Focus
3 Organizational Training
3 Integrated Project Management +IPPD
3 Risk Management
3 Decision Analysis and Resolution
4 Organizational Process Performance
4 Quantitative Project Management
5 Organizational Innovation and Deployment
5 Causal Analysis and Resolution
![Page 43: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/43.jpg)
Risks
![Page 44: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/44.jpg)
4444
Software Risk Management
• What is Risk?– An uncertain event or condition that, if it occurs, has a
positive or negative effect on a project objective.
• What is Risk management?– Systematic process of identifying, analyzing and
responding to project risk.– Includes maximizing the probability and consequences
of positive events and minimizing the probability and consequences of adverse events of the project.
![Page 45: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/45.jpg)
4545
Boehm’s Top 10 Risks in Software development
• Unrealistic Schedules and Budgets: Detailed, multisource cost and schedule estimation; design to cost; incremental development; software reuse; requirements scrubbing.
• Developing the wrong software functions: Organizational analysis; mission analysis; operational concept formulation; user surveys; prototyping; early users’ manuals.
• Personnel Shortfalls: Staffing with top talent; job matching; team-building; morale-building; cross-training; prescheduling key people.
• Developing the wrong user interface: Prototyping; scenarios; task analysis.
• Gold-plating. Requirements scrubbing: prototyping; cost-benefit analysis; design to cost.
![Page 46: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/46.jpg)
4646
1.2.2 Boehm’s Top 10 Risks in Software development
• Continuing stream of requirements changes: High change threshold; information-hiding; incremental development (defer changes to later increments).
• Shortfalls in externally-performed tasks: Reference-checking; pre-award audits; award-fee contracts; competitive design or prototyping; team-building.
• Shortfalls in externally-furnished components: Benchmarking; inspections; reference checking; compatibility analysis.
• Real-time performance shortfalls: Simulation; benchmarking; modeling; prototyping; instrumentation; tuning.
• Straining computer science capabilities: Technical analysis; cost-benefit analysis; prototyping; reference checking.
![Page 47: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/47.jpg)
4747
3.3.4 – Risk Identification : Tools & Techniques: Probability &
Consequence Which illustration depicts the higher risk?
Consequence = Probability =
Risk =
High Low
Consequence = Probability =
Risk =
Low Medium
Medium Low
• Probability or consequence of a risk condition is not, by itself, a good measure of risk
![Page 48: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/48.jpg)
4848
Qualitative Risk Analysis: Tools & Techniques
LowConsequence
MediumConsequence
HighConsequence
HighProbability
MediumRisk
HighRisk
HighRisk
MediumProbability
LowRisk
MediumRisk
HighRisk
LowProbability
LowRisk
LowRisk
MediumRisk
The Risk Scoring Matrix
![Page 49: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/49.jpg)
4949
Quantitative Risk Analysis
• Aims to analyze numerically the probability of each risk and its consequences on project objectives, as well as overall project risk.
![Page 50: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/50.jpg)
5050
3.5 – Outputs from Risk Analysis– Determination of top risks
– Opportunities to pursue
– Opportunities to ignore
– Threats to respond to
– Threats to ignore
![Page 51: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/51.jpg)
5151
3.6.1 – Risk Response Planning : Tools & Techniques (ATMA)
Avoidance• Some risks may be avoided• Changing the project plan to eliminate the risk• Risks that arise early in the project can be dealt with by
• Clarifying requirements• Obtaining information• Improving communication• Acquiring expertise
Examples:-• Reducing scope to avoid high risk activities• Adding resources or time• Adopting familiar approach instead of innovative one• Avoiding unfamiliar subcontractors
![Page 52: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/52.jpg)
5252
3.6.2 – Risk Response Planning : Tools & Techniques
Transference– Seeking to shift the consequence of a risk to a third
party together with ownership of the response.– Another party becomes responsible, it does not
eliminate the risk– Involves payment of a risk premium to the party taking
the responsibility
![Page 53: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/53.jpg)
5353
3.6.3 – Risk Response Planning : Tools & Techniques
Mitigation– seeks to reduce the probability or consequences of an
adverse event– Takes the form of implementing new course of action
![Page 54: BIS-M5-Planning and Implementing Information Systems](https://reader038.vdocument.in/reader038/viewer/2022102900/553dc1bf550346903b8b4774/html5/thumbnails/54.jpg)
5454
3.6.4 – Risk Response Planning : Tools & Techniques
Acceptance– Indicates that the project team has decided not to
change the project plan– Contingency plan is applied to the identified risks– Fallback plan is developed if the risk has a high
impact, or a selected strategy may not be fully effective.
– Usual risk response for this situation is to establish contingency allowance