Beruflich Dokumente
Kultur Dokumente
Guidelines for Using the Field Exercises One of the most unique
features of this textbook is the field exercises, which encourage students to
investigate the topics of the chapter beyond the concepts and skills taught in
the textbook. These Field Exercises usually require students to investigate
systems analysis and design practices in organizations and compare these
practices to the principles outlined in the textbook. Because there are no
closed–ended answers to these exercises, we provide directions you can give
students in their work on these exercises and guidelines for you as you
evaluate the thoroughness and quality of answers they submit. The Field
Exercises can be used as class discussion questions, given that students have
been asked to research them prior to class. Many of the Field Exercises could
be the basis for essays or short papers throughout the course.
In addition to this Instructor’s Manual, there are several other supplements to
support instructors who adopt the second edition of Modern Systems
Analysis and Design. A comprehensive Test Bank exists with approximately
80 multiple choice, matching, and short answer questions for each chapter.
This excellent teaching aid, developed by Lisa Miller of the University of
Central Oklahoma, covers all the key concepts, principles, and terms of
systems analysis and design. This test bank is available on disk in Adobe
Acrobat format. It is part of your supplements package.
The authors gratefully ackowledge the support of our students (past and
present) who in so many ways have contributed to this Instructor’s Manual
and have continually suggested improvements to our teaching, which have
indirectly assisted us in preparing these materials. We would like to thank
Doug Hodson, Pamela Carter, Lisa Miller, and Len Jessup for their help in
preparing answers for the Review Questions, Problems and Exercises, and
Field Exercises. We would also like to thank Lisa Miller for her help in revising
this instructor’s manual.
For further information about the second edition of Modern Systems Analysis
and Design and its supplements and associated materials, please contact
your Addison Wesley Longman sales and marketing representative or visit our
web site.
Jeffrey Hoffer
Joey George
Joe Valacich
Sample Syllabus
Introduction
The second edition of Modern Systems Analysis and Design was designed to
be used with a single one–semester course, with a sequence of two quarter–
or semester–calendar courses, and as a companion text to Modern Database
Management, fifth edition (by McFadden, Hoffer, and Prescott, also from
Addison Wesley Longman Publishing) in a set of courses on systems analysis,
design, and implementation. However you use this text, it is not essential
that you cover all of the chapters. As with most SA&D texts, Modern Systems
Analysis and Design presents a wide range of aspects of systems analysis
and design. Most instructors find this to be too much for one course, and you
must choose to cut back on some book elements. The modular design of the
book should make this task of picking that subset of the text you want to use
both easy and effective.
Learning Objectives
The overall course objective is to give you the concepts and skills you need to
analyze and design information systems. The course concentrates on the
front–end of the systems development process; that is, the course only lightly
touches on the design and development of computer programs and their
testing and maintenance (although you will work through some elements of
the whole development process on your project).
Upon successful completion of the course, you are expected to be able to:
Weekly Schedule
9 Mid–term Examination
Examination Review
Object-Oriented Analysis Chapter 12
10
Rapid Applications Development Chapter 13
The above weekly schedule has some obvious assumptions, which if changed
would necessitate changing the organization of topics. First, this syllabus
assumes that only an overview is required for physical system design and
implementation, probably due to extensive coverage of these topics in prior
or subsequent courses. Additional coverage of these topics could be
accomplished by conducting the project activities during additional class
meetings or in private sessions with the instructor. Second, this syllabus does
not address system maintenance (either the design of systems to facilitate
maintenance—which is addressed in Chapter 18—or the management of
system maintenance—covered in Chapter 21. Again, project activities would
likely have to be eliminated to fit in this topic.
You may find that the timing of the mid–term examination is later than you
wish. We suggest that you design examinations to cover one or several whole
parts of the book, since the topics within each part are quite related. We have
conducted an examination after Chapter 6 and after Chapter 7, but it is not
advisable to hold an examination in the middle of covering Chapters 8–11.
This syllabus does not ask the students to read the Broadway Entertainment
Company cases. Although you could ask your students to read these sections
since most are short, the above schedule does not allow time for substantial
discussion of these cases. We believe that it is only when supplemented by
classroom discussion that these cases have the most value. One way to
include the cases would be to handle them via a newsgroup, GSS, or similar
electronic discussion forum. You could give participation credit to students
who post insightful ideas gleaned from the BEC cases. This approach would
still require your students to devote reading and thinking time to the cases,
but would not consume any classroom time.
We remind you that there are four video segments available to adopters of
the second edition of Modern Systems Analysis and Design; we encourage
you to include these tapes at appropriate points in the course. We do not
show when to use these tapes in the above schedule since they can be shown
at various times during the course. Please refer to the teaching notes on each
chapter and to the section on the video segments in this Instructor’s Manual.
Contents
1
The Systems Development Environment
Chapter Overview
The purpose of this chapter is to introduce students to systems analysis and
design and the components of the systems development environment. The
chapter serves as an overview of systems analysis and design as well as an
overview of the book. The components of systems development to which
students are introduced include the data–oriented approach to systems
development, different roles within an organization that play some part in the
development process, different types of information systems, and the
traditional systems development life cycle. The text is intended primarily for
juniors taking a core course in the information systems major, although the
book can be adapted for a similar course at the junior college level or for a
two–course sequence on analysis and design. In teaching this material over
the past decade, our experience has been that many students are not
familiar with the systems development process, with its different
organizational components, or with how those components work together.
This chapter is intended to provide the general organizational context in
which systems development takes place.
Instructional Objectives
Specific student learning objectives are included at the beginning of the
chapter. From an instructor’s point of view, the objectives of this chapter are
to:
1. Define and discuss the modern approach to systems analysis and design,
with an emphasis on the combination of both process and data views of
systems.
2. Show how systems development in an organizational context involves
many different roles beyond those played by the systems analyst and
others in the information systems unit.
5. Show students that the life cycle is a flexible basis for systems analysis
and design and that it can support many different tools and techniques,
such as prototyping and JAD.
Classroom Ideas
1. Emphasize the differences between methodologies, techniques, and
tools. Such differences are not obviously to students; often they think of
methodologies just as a set of techniques and that techniques and tools
are synonymous.
2. Figures 1–1 and 1–2 and Table 1–1 summarize the points made here
about data–oriented and process–oriented systems development
approaches. The figures and table can be used in class to clarify the
differences in the two approaches and to emphasize the need to balance
data– and process–orientation.
3. In the text, we focus on various organizational roles and how they can
be involved in systems development. We also provide an organization
chart for a sample information systems unit (Figure 1–3). Students are
interested to know that not all organizations have such differentiated IS
units. This is a good point to illustrate different IS organizations with
different organization charts that show the relative importance of IS to an
organization and the different sizes IS units can assume. In our teaching,
we compare a bank, where IS reports to the chairman, to a city
government, where IS is several hierarchical units below the city
manager, to an organization where there is no IS unit at all. All three of
the organization charts used are from real organizations. Use whatever
organization charts you have available to illustrate these differences.
7. When introducing the life cycle model we use, you may want to
introduce other life cycle models, from other textbook authors, or in other
forms, such as Boehm’s spiral model. This shows students that there is no
one standard life cycle model and that the model they will rely on when
they begin work as a systems analyst will likely differ from the life cycle
we use here. The point is to show them they can use our life cycle as an
archetype to understand other models, and they should understand there
is no one “correct” life cycle model. The life cycle represents activities
that must be done, and the phases are a way to introduce, in an
organized way, the methods, techniques, tools, and skills necessary for
success at systems analysis and design.
8. Give a brief overview of the activities and outputs from each of our
seven life cycle phases, based on your own experience or from your
reading of the rest of the book.
11. CASE tools have an entire chapter, Chapter 4, devoted to them. Since
CASE tools are mentioned at the end of this chapter, you may want to
spend some time talking about CASE tools now.
12. Two video segments are available that can be used to supplement your
lecture on this chapter: “Joint Application Design” and “Application
Engineering.” The JAD video segment is about 18 minutes long, and the
Application Engineering one is about 12 minutes long. Notes on using
these video segments are included in a separate section of this
Instructor’s Manual. See the Preface to this Instructor’s Manual for
information on how to obtain copies of these and other video segments
produced for use with the second edition of Modern Systems Analysis and
Design.
11. In the early years of computing, analysis and design were considered
more of an art. However, with the growing importance of and
changing nature of information technology and its usage in the work
environment, work methods have evolved, making analysis and design
a disciplined process. Through the years, we have seen the systems
developer’s job move from that of a builder to an integrator. In the
1950s, the development effort concentrated on the processes the
software performed; emphasis was placed on automating existing
processes; all applications had to be developed in machine language or
assembly language and were developed from scratch. In the 1970s,
systems development came to be more disciplined as many people
worked to make it more like engineering. In the 1980s microcomputers
became key organizational tools, the software industry expanded
greatly, fourth-generation languages were used more and more to
write applications, and CASE tools were developed. Systems
integration is currently the focus of the systems development
environment.
3. For an ATM transaction, the data involved would include customer name,
customer account number, customer personal identification number,
customer account balance, transaction type, and transaction amount.
At this point, the student shouldn’t be expected to know the structure
or nomenclature of a data flow diagram or of processing logic. For the
ATM example, they should be able to explain that a customer’s name is
read from the account identification number on their ATM card. The
customer inputs their personal identification number by hand and, if
this number is matched with their account identification number, they
are granted access to begin an ATM transaction. They will either
request to inquire into the status of their account, withdraw money, or
deposit money. If, for example, they request to withdraw money, their
request will be matched with their available funds and the allowable
daily limit for that ATM machine. If acceptable, the cash will be
dispensed, their account will be debited, and a receipt will be provided.
Do not worry whether or not the student knows the technique or
nomenclature at this point. It is more important that the student can
analyze the transaction, break it down into its component parts and
pieces of data, and understand the process.
7. The role of the systems analyst in the SDLC is essentially the same as
that in prototyping. The primary difference is that in prototyping, the
analyst is simultaneously performing tasks from the analysis, logical
design, and physical design phases of the SDLC. In cases where all or
part of the prototype will be used for the actual system, then the
analyst is also performing tasks from the implementation phase of the
SDLC. In cases where the analyst builds the prototype with the direct,
real–time assistance of the users, then the analyst and users are
collaboratively completing several steps of the SDLC in one step.
8. The process–oriented approach is focused on the flow, use, and
transformation of data in an information system. The techniques and
notations developed out of this approach show the movement of data
from their sources, through intermediate processing steps, and on the
final destinations. The natural structure of data is, however, not
specified within the traditional process–oriented approach. The data–
oriented approach depicts the ideal organization of data, independent
of where and how data are used within a system. A data model is
constructed, which describes the kinds of data needed in systems and
the business relationships among the data. Both approaches are
necessary and are captured within the SDLC. The process–oriented
approach helps us to understand and improve how the organization
functions. This is particularly important to popular process
improvement techniques such as business process re–engineering. The
data–oriented approach helps us to understand, preserve, and protect
the organization’s data resource. This is critical to the current efforts in
organizations to provide for employees easy access to accurate data in
real time.
10. Figure 1-5 illustrates the traditional, sequential ordering of the systems
development life cycle phases. Figure 1-8 illustrates a company-
specific systems development lifecycle. While the textbook does not
provide a detailed description of the Seer Technologies SDLC, the
following comparison can be used to facilitate discussion:
11. Students should be encouraged to review the section titled “Your Role
and Other Organizational Responsibilities in Systems Development.”
After reviewing this section, students will recognize that the level of
participation and leadership responsibilities will vary depending upon
the role and SDLC phase.
2. Expect that the degree to which these roles are filled formally or
informally will vary greatly from organization to organization. Similarly,
the extent to which organizations use a team approach to systems
development will also vary. To some degree, however, the work of the
various systems personnel must be integrated, even when a team
approach is not used. Ask students to explain the organizational history
that led to these job roles. Have them find out how the performance of
each of these people are measured, especially in team settings.
3. It shouldn’t be too difficult for students to list the various “systems” for
an organization, perhaps for their university. These may include
standard computer–based information systems such as a transaction
processing system for recording point of purchase sales or for
registering for a course. They should also include systems that are not
computer–based, such as a physical filing system for receipts or for
transcripts. Push the students to place each of their “systems” in the
categories provided in the question. Are there any other system
categories not provided in this question? It will also be useful for the
students to determine the extent to which these systems are, or
should, interact with each other. This will enable the students to
determine whether or not the systems are well integrated (be sure that
the students have a clear idea on what it means for systems to be
integrated).
4. Urge the students to use their imagination here. They might imagine
elegant, costly systems that do not solve the right problem and, as a
result, are not used. Alternatively, they might imagine a system where
a database is kept redundantly in several different locations, or where
information is rekeyed into one part of the system while it already
exists in another format in another part of the system. They might
describe a system that is lost completely because there were no proper
backup and recovery procedures. The useful part of this exercise is that
no matter what disasters or problems they imagine, they have
probably already happened in one setting or another.
2
Succeeding as a Systems Analyst
Chapter Overview
The purpose of this chapter is to present to students a rendition of the
systems analyst’s role in the system development process and in the
organization. We adopted this focus as we believe that many of the students
who major in information systems become systems analysts of one type or
another, whether they work for IS units in large corporations or as
consultants. Focusing on the systems analyst also allows us to list and
discuss the many diverse skills needed for systems development. The set of
skills we present here is certainly not universally recognized as the most
important, but we have done our best to represent a set of generic skills that
are important to successful systems development efforts.
Other than the introduction and summary, the chapter is divided into five
major sections. Four of these sections cover a basic systems analysis skill set:
analytical, technical, management, and interpersonal. The fifth major section
treats systems analysis as a profession. By far the longest of these five
sections is devoted to analytical skills, and most of that section is about
systems thinking. We have found that some level of systems thinking is very
helpful for sound analysis, which is why we have devoted so much space to it
here.
Chapter 2 also marks the students’ first exposure to our running case,
Hoosier Burger. Hoosier Burger is a fictional family–owned fast food
restaurant supposedly based in Bloomington, Indiana, home of one of our
three authors. The case is used here to illustrate how an organization can be
seen as a system and why the word system appears in the term information
system. A special icon in the margin shows where Hoosier Burger is used as
an illustration.
Instructional Objectives
Specific student learning objectives are included at the beginning of the
chapter. From an instructor’s point of view, the objectives of this chapter are
to:
1. Overview for students the different analytical skills that are important to
systems development, including problem identification, problem solving,
and systems thinking.
2. Discuss the many technical skills required of a systems analyst and why
analysts still need to have basic technical skills, even when systems are
developed using rapid prototyping and code generators.
2. You can use Figures 2–2 and 2–4 to define and illustrate each of the basic
components of a system.
6. Communication skills, and the need for them, are probably best
understood from experience and practice rather than from simply talking
about them. You can illustrate good and not–so–good communication
skills through short class exercises, such as the familiar “pass–the–word”
parlor game to show the importance of listening (i.e., the first person
whispers a message to second, who is supposed to relay the same
message to a third person, and so on until the end of the line, but the
message the last person states to the group is rarely even close to the
initial message) or by illustrating good and bad presentation formats to
show the importance of effective presentations (e.g., well–designed color
overheads vs. gray, crowded ones; monotone delivery vs. a more
dramatic and interested tone; illustrative hand motions vs. hands held
stiffly at sides).
9. The ACM Code of Ethics, shown in Figure 2–10, can be a stepping stone
to an involved discussion of ethics in systems analysis. An effective way
to present ethics in the classroom is to provide students with scenarios
and ask them to record what they would do and why. Student responses,
along with the “correct” response, can serve as the basis for a very lively
discussion. Scenarios with ethical dilemmas in IS are currently available
from several different authors and publishers. Many provide guidelines for
using the scenarios as part of class discussions. Another excellent source
of scenarios, as well as an expanded perspective on ethical issues in
information systems development and use, is the December 1995 issue
of Communications of the ACM. Six articles in this issue deal with
computer ethics, and a seventh article addresses a framework for
teaching ethical computing. You can find many good ideas in this issue
for expanding class discussion on being an ethical systems developer.
10. You may want to use the video segment “Managing User Expectations” to
supplement this chapter. This video segment is about 12 minutes long.
Notes on using this video segment are included in a separate section of
the Instructor’s Manual. See the Preface to this Instructor’s Manual for
information on how to obtain this and other video segments produced for
use with the second edition of Modern Systems Analysis and Design.
6. A systems analyst can determine if his or her technical skills are up–to–
date through reading trade publications, joining professional societies,
and attending classes and conferences.
11. A logical system description portrays the purpose and function of the
system without tying the description to any specific physical
implementation. A physical system description of a system focuses on
how the system will be materially constructed.
13. An open system interacts freely with its environment, taking input and
returning output, whereas a closed system is cut off from its environment
and does not interact with it.
3. At this point, the technical details of the figures drawn by the students
are not important. The students should at least draw general systems
diagrams as depicted in Figure 2-2 and Figure 2-4. It is important that the
students are able to draw a diagram which depicts each of the car
subsystems and includes lines with arrows that show the inter–
relationships between these subsystems. Similarly, they should be able to
draw a diagram of a personal computer, label the subsystems, and show
the inter–relationships between these subsystems. One important
subsystem of a personal computer is the system board (also known as
the motherboard) which includes the processor, memory chips, support
chips, and buses. Other subsystems include the power supply, hard disk,
and input/output devices such as the monitor, keyboard, mouse, printer,
and speakers.
4. It will probably be easiest for students to look back through the section of
the chapter that outlines each of these skill sets. In the area of resource
management, students might list predicting resource usage, tracking and
accounting for resource consumption, evaluating the quality of resources
used, securing resources from abusive use, relinquishing resources when
no longer needed, obsoleting resources when they can no longer be
useful, and learning how to effectively use resources.
For change management students might list planning for and managing
resistance to change and helping people to make a smooth transition
from an old system to a new system. Even if students do not yet have
supervisory experience, they have most likely developed and used these
skills in some way. For example, they probably used at least some subset
of the resource and project management skills to complete their course
work.
Some of the consequences for the organization include: that the systems
that this person worked on are not likely to work well, the organizational
performance would suffer, and the reputation of the systems department
and/or of the organization might be tarnished. A code of ethics and
professional conduct can be used to directly curb the behavior of the
systems analyst described above. For example, the ACM code described
in the chapter calls for peer pressure for compliance. Indirectly, such a
code also helps a discipline to build and gain the respect of other
professionals in the organization, so that they can learn what to expect
and demand from an information systems professional. In addition,
because there are codified rules of conduct and an organized professional
society, those people with unethical behavior can be more easily
detected and either helped or urged out of the profession.
8. In this chapter it was argued that the subsystems within a system should
be relatively uncoupled; that is, they should be as independent of each
other as possible. Similarly, the boundaries between systems should be
set such that the systems are relatively uncoupled. The systems should
be as independent of each other as possible. This way if one system fails,
other systems will not fail or have problems functioning. In addition, the
concept of subsystem cohesion applies to systems as well. Systems
should perform a single function. Some other more pragmatic criteria for
determining a system boundary include setting boundaries that are
commensurate with the resources available for building the system.
Some of the implications of setting too broad a boundary for a system are
that the system may become too complex and it may be difficult and
costly to build and maintain. If the system boundary is too narrow then it
may, in fact, be better to position the system as a sub–system of another
larger system.
10. One way to approach this question is to have students compare and
contrast an “unsuccessful” team with a very “successful” team on which
they have worked. For the unsuccessful team, few, if any, of the high-
performance characteristics will apply. Students will point out that
bickering, lack of trust, and poor participation were evident in the
unsuccessful team. However, with the successful team most of the high-
performance characteristics were evident. Students will probably point
out how they respected, trusted, enjoyed, and felt good about their team
members.
11. The role of the contractor will vary depending on what he or she has been
hired to do. For instance, parts of the project may be contracted out or
the entire project may be contracted out, depending on the
organization’s needs. The IS managers will still be involved in resource
allocation and project approval. If the organization has outsourced IS
development to another company, then the systems development
activities will be performed by the outsourcing company’s analysts and
programmers. If the project is contracted out, it is very important that the
work be supervised and that the work conform to prespecified guidelines.
As the text suggests a relationships manager will become necessary.
End users are still very necessary to the development process, whether
or not the system is developed in-house or contracted out. Business
managers will still set general requirements and constraints for
development projects.
3
Managing the Information Systems Project
Chapter Overview
The purpose of this chapter is to introduce students to the process of
managing an information systems project. Specifically, the chapter focuses
on the system analyst’s role in managing information systems projects
through the four phases in the life of all projects: initiation, planning,
execution, and close down. You (and your students) should think of this
chapter as a valuable reference throughout the systems development course
and use the material in this chapter to assist in guiding and evaluating
ongoing project activities. This chapter has been placed early in the book in
order to provide students with a better understanding of the totality of an
information systems project (e.g., it is not just building the system). You may
want to emphasize that the skills and knowledge gained from this chapter are
a critical foundation to the effective management of not only information
systems projects but all types of projects and activities.
Chapter 3 also introduces our second running case, Pine Valley Furniture.
Pine Valley Furniture provides a concrete example of a systems development
project. This project helps reinforce the analysis and design concepts
presented throughout the textbook. A detailed description of the Pine Valley
Furniture case can be found at the Modern Systems Analysis and Design web
site. The URL for this site is http://hepg.awl.com. The keyword is Hoffer.
Instructional Objectives
Specific student learning objectives are included at the beginning of the
chapter. From an instructor’s point of view, the objectives of this chapter are
to:
3. List and describe the skills and activities of a project manager during
project initiation, project planning, project execution, and project close
down.
Classroom Ideas
1. This chapter introduces many different concepts and terms that are
central to the management of information systems projects. Review
Question 1, at the end of the chapter, may be important to discuss in
class to be sure that your students are understanding the material. Be
sure that you ask your students to review the Key Terms listed at the end
of the chapter.
2. You may choose not to lecture from this chapter. Your students can read
the chapter much as they might read a supplemental, background
reading (this is especially true if your students have already been
exposed to project management concepts in another course). When
reading the chapter this way, you may want to ask each student to apply
the concepts of this chapter to a non–information systems activity (e.g.,
going on a date, vacation, etc.). For this activity, ask students to describe
initiation, planning, execution, and close down activities. Ask them to
create a “work breakdown” structure that includes precedence
relationships and time durations for each activity. Additionally, ask them
to construct Gantt and PERT charts for these activities. You can have
students do this as either an outside class activity or have them do this
during your class time. Within class, you can call on students to describe
their project and phases. Alternatively, you could make this a written
assignment to hand in to be graded or reviewed.
3. If you do lecture about this chapter, you might want to use the tables and
figures in the chapter to point out to the students the major project
management activities.
6. Another very effective in–class exercise for teaching this chapter is to ask
students who have been on systems development teams to compare
their experiences to the concepts presented in Chapter 3. This discussion
can be a good way to elaborate on alternative ways for managing
systems development projects, especially if systems were constructed
using different methodologies. Use this discussion to explore if these
student projects followed the discrete phases outlined in the chapter. Ask
them to describe the activities of the project manager. What was the
same? What was different?
9. If you can obtain a copy of the project management guidelines for a local
systems development firm or consulting organization, show students how
extensive project management guidelines typically are. If you have
students working in systems development organizations, you might ask
several of them to bring to class their firm’s guidelines. If possible,
reproduce the table of contents of these manuals for all students and
have them compare the various guidelines to see what each organization
emphasizes and what is different.
10. You may wish to supplement your lecture on this chapter with the video
segment “Application Engineering.” This video is about 12 minutes long.
Notes on using this video segment are included in a separate section of
this Instructor’s Manual. See the Preface to this Instructor’s Manual for
information on how to obtain this and the other video segments produced
for use with the second edition of Modern Systems Analysis and Design.
5.There are five major activities during project initiation; these include
establishing the project initiation team, establishing a relationship with the
customer, establishing a project initiation plan, establishing management
procedures, and establishing the project management environment and
project workbook. Establishing the project initiation team focuses on
organizing an initial core of project team members that assist in
accomplishing the project initiation activities. Establishing a relationship
with the customer focuses on building a cooperative and trusting
partnership with the customer. Establishing a project initiation plan
focuses on defining the necessary activities required to organize the
initiation team while they are working to define the scope of the project.
Establishing management procedures focuses on developing team
communication and reporting procedures, job assignments and roles,
project change procedures, and determining how project funding and
billing will be handled. Establishing the project management environment
and project workbook focuses on establishing the repository for all project
correspondence, inputs, outputs, deliverables, procedures, and standards
established by the project team.
After defining the scope of the project, the next objective is to identify and
document general, alternative solutions for the current business problem
or opportunity and assess each for feasibility so that a choice can be
made as to which to consider during subsequent SDLC phases.
The focus of dividing the project into manageable tasks is to divide the
entire project into manageable tasks and then logically order them to
ensure a smooth evolution between tasks.
Estimating resources and creating a resource plan focuses on estimating
resource requirements for each project activity and using this information
to create a project resource plan. Developing a preliminary schedule uses
information regarding tasks and resource availability to assign time
estimates to each activity in the work breakdown structure. This
assignment will allow for the creation of target starting and ending dates
for the project. Developing a communication plan outlines the
communication procedures between management, project team
members, and the customer. Determining project standards and
procedures specifies how various deliverables are produced and tested.
Identifying and assessing risk identifies sources of project risk and
estimates the consequences of those risks. Risks might arise from the use
of new technology, resistance to change, availability of critical resources,
competitive or regulatory actions, or team member inexperience with
technology or the business area.
Communication Examples
Methods
9.The activities performed by the project manager during project close down
are closing down the project, conducting post-project reviews, and closing
the customer contact. The focus closing down the project is to conclude
the project. The objective of conducting post-project reviews is to assess
the strengths and weaknesses of project deliverables, the processes used
to create them, and the project management process. The focus of closing
the customer contact is to ensure that all contractual terms of the project
have been met.
2. Each of the four phases of project management has its unique challenges.
Thus, students’ choices of which is most challenging should vary. Project
initiation, the first phase, involves team building, building relationships
with customers, defining the problem and project, and other challenging
tasks. Some students may (appropriately) argue that this first phase is
most important. If the first phase is conducted poorly, the project is likely
to be doomed to failure. Project planning, the second phase, is also
important because it can make or break the success of the project work
that follows. In addition, resource planning, scheduling, crafting a budget,
and other planning tasks are difficult. Good planning is also a challenge
because there is nearly always pressure to truncate or do away with
planning altogether. Many students are likely to choose project execution,
the third phase. This involves actually building the system, which is the
primary responsibility and often is the longest phase of project
management. Closing down the project, the fourth phase, is not likely to
be chosen by students as much as are other project phases. However, this
phase is equally challenging. The break up of the team is a difficult, often
overlooked aspect of project management. In addition, there may be
assignment changes for team members and there are likely to be
performance appraisals of team member performance. These are difficult
and important personnel tasks that must be completed.
Students can call trade magazines directly and ask for the dates of issues
that contained reviews. Computer searches in the university library may
identify articles they can obtain through inter–library loan and duplicating
services. Alternatively, students can contact the vendors directly to
receive information about software. Vendors will often provide copies of
published reviews in their marketing packets. Software reviews are also
available from Auerbach Publishers and Datapro.
5. Information systems are very similar to other types of projects. Most large,
complex projects, whether they involve developing information systems or
not, share many characteristics. For example, they involve time and
resource constraints, managing people, breaking a project into sub–tasks
and determining the inter–relationships among the sub–tasks, and so on.
Information systems projects are different in that they tend to involve
technological change more often than do other types of projects. The
project management software that the students reviewed is most likely to
be generic; that is, it can be used for a variety of projects, just as a word
processor or spreadsheet can be used for a variety of tasks in a variety of
organizations. Microsoft Project for Windows, for example, can be used for
nearly any project, regardless of whether or not it is a systems
development project.
6. Student answers will vary, but all should accept the opportunity to
become the manager of an information systems project if they believe
that they are ready. This is a great opportunity and is often the
springboard into higher managerial opportunities within the systems area.
Students should draw from the list of skills and activities of a project
manager listed in Table 3–1. In addition, students may list other skills,
abilities, and experiences that will make them a good project manager.
Students who believe that they would feel uncomfortable being a project
manager probably believe that they do not have enough experience.
Additional training and education will help, but often the best way to learn
how to manage is to do it. They might start out by supervising the
completion of relatively small projects or closely watching a mentor as he
or she manages a project.
8. The PERT chart provided below was created as a screen capture from
Microsoft Project. The students may use this or some other project
management software to produce their chart, may use a graphics
package, or draw the chart by hand. The important issue is that they
accurately express the relationships among the activities in this problem.
The earliest expected completion time is 27 weeks. The activities in the
boxes with the darker border are all on the critical path. These include
collect requirements, analyze processes, design processes, design reports,
test and document, and install. Changing Activity 6 from 1 week to 6
weeks doesn’t mean much. Activity 6 is off the critical path, as is Activity
8, its successor. There is enough slack time for Activities 6 and 8 so that
this change doesn’t affect the project completion time.
1
3 6 8
0
1 2 4 7 9
BOLD
shows
5
See table below to answer parts B and C.
9. The following Gantt chart was created as a screen capture from Microsoft
Project. The students may use this or some other project management
software to produce their chart, may even use a graphics package, or
draw the chart by hand. This chart reflects the change in Activity 6 from 1
week to 6 weeks. The activities with solid bars are on the critical path. The
Gantt chart for problem 8 is taken from MS Project with a June 12, 1998
start time.
10.The following PERT chart was created as a screen capture from Microsoft
Project. The newly added, week–long activity is labeled “feedback.” These
new time estimates have pushed the earliest expected completion time to
63 weeks. The activities in the boxes with darker border are all on the
critical path. These include collect requirements, analyze processes,
design processes, design reports, test and document, install, and
feedback.
12.Some of the difficulties are easier to deal with. For example, to change the
project plan to account for the delays, the students will simply adjust their
Gantt and PERT charts accordingly. Other difficulties, however, will be
much more problematic. For example, dealing with the boss is potentially
much more difficult. Frequent communication, accurate and full
assessments of the situation, requests for reasonable means to deal with
problems, and a history of being a good project manager are necessary to
gain compliance from the boss.
There are basically four problems. The reassigned team member and the
changes in due dates are beyond the control of the project manager.
However, the personality clashes among team members and the mistaken
completion estimate for one of the tasks are within the control of the
project manager, or at least these two problems, if unsolved, may reflect
poorly on the project manager. One prudent alternative would be to go to
the boss and explain to him/her the situation. The project manager should
also explain to the boss what he/she is doing to solve the two problems
that are within his/her control. If the boss absolutely cannot accept the
project past the original deadline, then additional resources will be needed
to complete the project on time. If additional resources will solve the
problem, and they are available, the project manager will have to provide
a fairly strong, convincing rationale for why these new resources should
be allocated to this project. The project manager might show, for example,
that the project cannot be completed on time unless the boss doubles the
programmers available for this project or takes some much needed
experts off other projects and assigns them to this project.
13.A suggested answer is provided below.
Immediate Critical
Activit Tim Predecess EF LF Slack Path?
y e ors
A 5 -- 5 5 0 Yes
B 3 A 8 9 1 No
C 4 A 9 9 0 Yes
D 6 C 15 15 0 Yes
E 4 B, C 13 16 3 No
F 1 D 16 16 0 Yes
G 5 D, E, F 21 21 0 Yes
Below is the Gantt chart from MS Project with the starting date set at June
12, 1998.
B E G
A
BOLDC D F
shows
critical
path
15. A suggested answer is provided below.
B
A C F J
D H I
BOLD E G
shows
critical
path
16.Below is the Gantt chart from MS Project with the starting date set at June
12, 1998.
18.Student answers will vary. However, students will likely mention reviewing
degree requirements, visiting with advisors, comparing schedules with
friends (making sure they are in the same class), reviewing work
schedules, and course schedules. Encourage students to use a project
management software package to create their PERT and Gantt charts. Ask
them to discuss the advantages to using project management software
over constructing the charts by hand.
2.As with the previous question, students are likely to find a variety of
answers for this question. Thus, it will be useful for students to compare
their answers. While the project planning elements in Table 3–3 are fairly
complete, they are operationalized slightly differently within each
organization. Students are likely to find variations in the extent to which
these elements are part of each person’s planning process. Have the
students discuss why the barriers exist and what can be done to either do
away, exploit, or work around these barriers.
6.This can be a very useful exercise, especially if the students can observe
an information system project team building a real system. If not, it is still
useful for the students to conduct the same exercise using a class–based
student project team. Alternatively, the students might read something
like Tracy Kidder’s award winning book The Soul of a New Machine, which
is an account of an information systems project (new computer system
design) team in industry (Data General). This book is an excellent case
study of the sociology of teams and projects. Have the students compare
their answers to see if a general set of project team do’s and don’ts
arises. Have the students also address the extent to which each of these
do’s and don’ts is generalizable to other project team settings.
4
Automating Development through CASE
Chapter Overview
The purpose of this chapter is to introduce students to the role of automated
tools in the design and development of information systems. Specifically, this
chapter overviews the evolution and use of automated tools in the systems
development process. The purpose of CASE is to make it much easier for an
organization to enact a single design philosophy across many projects,
systems, and people. Given this, the chapter first describes the evolution of
CASE usage in organizations, why organizations adopt CASE, and the impacts
of CASE on individuals within organizations. The chapter then outlines the
components of a comprehensive CASE environment and discusses how
specific CASE tools are related to each phase of the SDLC. The chapter
concludes with a brief examination of visual and emerging development
tools.
Instructional Objectives
Specific student learning objectives are included at the beginning of the
chapter. From an instructor’s point of view, the objectives of this chapter are
to:
4. Describe the general functions of upper CASE, lower CASE, cross life cycle
CASE, and the CASE repository.
5. Describe the role of CASE and how it is used to support activities within
the SDLC.
6. Provide the conceptual background about CASE necessary to understand
the potential features of any CASE tool students might use in the course.
Classroom Ideas
1. This chapter introduces many different concepts and terms that are
central to understanding the role of CASE in organizations and in the
systems development process. Review Question 1, at the end of the
chapter, may be important to discuss in class to be sure that your
students are understanding the material. Be sure that you ask your
students to review the Key Terms listed at the end of the chapter.
2. You may choose not to lecture from this chapter. Your students can read
the chapter much as they might read a supplemental, background
reading (this is especially true if your students have already been
exposed to CASE in another course, through work experience, or in out–
of–class lab experiences). When reading the chapter this way, you may
want to ask your students to focus on the role of CASE within
organizations. Additionally, ask them to consider how they feel about
CASE. Do they like CASE (e.g., does CASE free them from performing
mundane tasks or does is constrain their creativity)? Within class, you
can call on students to describe their views, or you could make this a
written assignment to hand in. It is important that students understand
why CASE is still not a widely accepted technology. If possible, have
students utilize a CASE tool in class assignments or projects. From first–
hand use of a CASE tool, students can better appreciate the power,
discipline, investment, and coordination necessary to effectively use
CASE in an organization.
3. If you do lecture about this chapter, you can use the tables and figures in
the chapter to point out to students the major concepts brought out in
the chapter. There are many effective tables that summarize the main
points. See the Preface to this Instructor’s Manual on how to obtain
transparency masters for the tables and figures in the chapter.
5. Another very effective in–class exercise for teaching this chapter is to ask
students who have been on systems development teams to compare
their experiences to the concepts presented in Chapter 4. This discussion
can be a good way to elaborate on alternative ways for constructing
information systems. If some students have used CASE before, have
them describe their experiences from a systems design and development
standpoint and from an organizational standpoint. Have them discuss
why CASE is or is not being deployed in the organizations with which they
are familiar.
9. Students can be placed into groups of about three or four students. Each
group can be asked to research a particular CASE product. During a
subsequent class period, each group’s findings can be presented to the
class. After the presentations have been completed, ask the class to
compare and contrast the products.
7. The driving forces behind the adoption of CASE are summarized in Table
4–3, and the resisting forces are summarized in Table 4–4.
8. The general types of CASE tools are diagramming tools, computer display
and report generators, analysis tools, a central repository, documentation
generators, and code generators. Diagramming tools enable system
process, data, and control structures to be represented graphically.
Computer display and report generators help prototype how systems
“look and feel” to users. Display (or form) and report generators also
make it easier for the systems analyst to identify data requirements and
relationships. Analysis tools automatically check for incomplete,
inconsistent, or incorrect specifications in diagrams, screens, forms, and
reports. A central repository enables the integrated storage of
specification, diagrams, reports, and project management information.
Documentation generators help produce both technical and user
documentation in standard formats. Code generators enable the
automatic generation of program and database definition code directly
from the design documents, diagrams, screens, forms, and reports. The
repository is likely the most important component of a comprehensive
CASE system because it provides the mechanisms through which tool and
activity integration can occur.
9. The repository is a centralized database that contains all diagrams,
screens, forms, and report definitions, data structure, data definitions,
process flows and logic, and definitions of other organizational and
system components; it provides a set of mechanisms and structures to
achieve seamless data–to–tool and data–to–data integration. The data
dictionary is a computer software tool used to manage and control access
to the information repository. It provides facilities for recording, storing,
and processing descriptions of an organization’s significant data and data
processing resources.
One likely scenario is that, like most other software, CASE tools will
continue to get more effective, easier to use, less expensive to purchase
and maintain, and will grow in use. Some industry experts believe that
generator tools are becoming so easy to use that the cost of making
requirements mistakes is drastically reduced. These people believe that I–
CASE has a limited future since it will be so easy to change the system as
new understandings of requirements are recognized. Still other industry
experts believe that CASE is necessary for reusability and the key is to be
able to change the specification models and have a new system
automatically generated. Part of this movement is object orientation,
which promotes reusability of system components, both conceptual and
physical.
3. It appears that one could duplicate the form shown in Figure 4-7 by using
a standard graphics package. It may take some time, but the form could
probably be replicated fairly closely. There are several important
advantages to using a CASE tool for form generation. The CASE tool will
have form templates, buttons, and other pre–existing features made
explicitly for form generation. The CASE tool can help you to ensure that
you use correct, consistent data labels and other form elements. The
forms and the form generation tool can be linked to other development
tools, to other parts of the system being developed, and to the actual
data. Finally, you can actually use the forms you generate as part of the
system being developed.
7. The problems that might arise if an organization uses different CASE tools
are similar to those that might arise if an organization does not use CASE
tools at all. These problems include using different naming conventions in
different parts of systems and across systems, incompatibilities among
systems and system components, redundant data storage, and so on. It
is not always possible to exchange repository contents between CASE
tools (some tools, like R&O’s Rochade help in transferring repository
contents between CASE tools). I–CASE and shared databases basically try
to address these same problems. The only difference is that, while shared
databases are an attempt to have systems that remedy these problems,
I–CASE tries to remedy these problems as systems are being built. There
are several metadata standards for CASE repositories that some CASE
vendors have adopted, in which case exchange of data between tools is
facilitated.
8. The data dictionary screens contain much information about the entity.
However, students may ask about the users and number of instances.
Students should be encouraged to discuss the importance of keeping
such detailed information about an entity.
2. Students should be able to find what they need from a vendor, an article
in the popular press, or from the documentation accompanying the CASE
tool used at their university. Even the less expensive, relatively simple
CASE tools now available to students for use on their PC’s have many of
the components of the CASE products discussed in Chapter 4. Students
should be encouraged to visit the web sites of several of the companies
discussed in this chapter. A quick search of the web will provide students
with information about product capabilities, product comparisons, and
product vendors.
4. It will be useful for students to share their data. Create a grid on the
board that lists the various CASE tools on one axis and all the features
and benefits on the other axis. Then use the students’ information to
check off boxes in the matrix. Have the students discuss whether they
believe this information to be truth, hype, or both. Students might then
take the completed matrix and have systems personnel who are familiar
with CASE tools review and comment on the matrix.
5. This is an excellent question for students that know the SDLC well. This is
basically the kind of analysis that organizations should be going through
to determine whether or not they can and should use CASE tools.
Students should be able to determine ways that CASE tools can be used
throughout the SDLC. It will be more difficult, however, to determine the
time and expense involved in those parts of the process that could be
better done using CASE tools. Encourage the students to do the best they
can to determine this information. Even their best guesses will still be
useful. Chances are that, if the projects being considered are moderately
large and complex, the case can be made for using CASE tools.
6. Vendors are typically very willing to give this information, so the students
should have success in getting the information necessary for answering
this question. Nearly all software vendors have plans for and/or are
working on future versions of their software. CASE tool vendors are no
different. It will be useful for students to compare their answers for
different CASE tool vendors. This will allow the students to learn more
about the competitive dynamics of the CASE tool market. Students
should be encouraged to visit the web sites of various CASE tool vendors,
including Oracle, Microsoft, Borland, and Powersoft. Ask students to
compare and contrast the various products in class.
The BEC cases serve as a useful “change of pace” for your students for
several reasons. First, the cases do not teach, rather they illustrate. Thus,
they are easy to read and to understand. Second, the cases help your
students to understand the organizational processes in which systems
development activities occur. For students who do not have business
experience, reading about systems development from an organizational and
people perspective will give them a deeper understanding of how to apply
what they are learning in this textbook and your course. Finally, the writing
style of the cases is more casual, which makes them fun to read. There is
humor, people have personalities, and most of the cases are conversational.
The cases are a refreshing way to see some of the concepts and skills
presented in the chapter come to life. Each case is short, so reading time is
also short.
The first two BEC cases appear after Chapter 4. Neither of these cases relates
directly to Chapter 4; rather, they serve as background for the cases that
begin after Chapter 5 and that do relate to the associated chapters. The first
case, Case Introduction, provides background information on BEC and its
markets. This information, as with any case study, is essential for
understanding the context in which business decisions are made, including
decisions about new information systems. This description includes a history
of information systems and the IS organization at BEC. The case also
introduces some of the people who will appear in subsequent cases.
As a background case, you do not need to spend much time discussing this
case. In order to prepare your students to appreciate the subsequent cases
better, you can use the following questions either for class discussion or as
brief writing assignments.
2. What are the forces that influence BEC, its market, and its
competition?
The second BEC case, The Existing Application Portfolio, follows the Case
Introduction. The purpose of this case is to layout BEC’s current investment in
information systems. Since decisions about requests for and the development
of new systems must relate to the systems in place, this case also provides
necessary information to understand issues raised in subsequent cases. The
case gives an overview of the systems that support both corporate and in–
store functions and processes. The case also summarizes the hardware and
network architecture in which application systems operate, and mentions
some of the key programming environments BEC uses for systems. No
attempt has been made to be comprehensive or detailed—this is beyond our
needs and would take too much space. Rather, this case should give your
students a sense of the comprehensiveness of systems and will allow them to
anticipate issues of compatibility and interaction with existing systems as the
new system described in subsequent cases evolves. The case also expands
on the discussion from the Case Introduction concerning the status of
systems and the information systems function within BEC.
5
Identifying and Selecting Systems
Development Projects
Chapter Overview
The purpose of this chapter is to introduce students to the first phase of the
systems development life cycle—identifying and selecting systems
development projects. The chapter takes the position that organizations can
benefit from following a formal process for identifying and selecting projects.
To do this, the chapter first overviews the corporate strategic planning
process and then links this process to information systems planning. Both are
presented as a three-step process. For information systems planning, the first
step is described as a process in which a senior manager, a business group,
an IS manager, or a steering committee identify all possible systems
development projects that an organization unit could undertake. Next,
projects are classified and ranked according to some criteria that are
important to the organization. Finally, those projects deemed most likely to
yield significant organizational benefits, given available resources, are
selected for subsequent development activities.
Instructional Objectives
Specific learning objectives are included at the beginning of the chapter.
From an instructor’s point of view, the objectives of this chapter are to:
Classroom Ideas
1. This chapter introduces many different concepts and terms that are
central to understanding the role of corporate strategic planning and
information systems planning in the identification and selection of
information systems development projects. Review Questions 1 and 2
may be important to discuss in class to be sure that your students are
understanding the material. Be sure that you ask your students to review
the Key Terms listed at the end of the chapter.
2. During a lecture, you can use the tables and figures in the chapter to
assist in pointing out to the students the major concepts brought out in
the chapter. Linking the planning processes to a specific example (e.g.,
the Pine Valley Furniture example in the chapter) is often a very good way
for students to understand abstract planning concepts.
4. Another very effective in–class exercise is to ask students who have been
on systems development teams to compare their experiences to the
concepts presented in Chapter 5. This discussion can be a good way to
elaborate on alternative ways for identifying and selecting information
systems projects. Some organizations are very informal, compared to
what is described in the book. Usually you can start a good debate on
how formal project identification and selection should be, and who should
control this process. Stress the tradeoffs of formal vs. informal processes:
consistency, awareness, budget and investment controls, long–term
focus, etc. vs. rapid action, commitment, current business needs, etc.
6. The chapter provided several factors as evidence for the need for
improved information systems planning, including: (a) the cost of
information systems has risen steadily and approaches 40% of total
expenses in some organizations; (b) many systems cannot handle
applications that cross organizational boundaries; (c) many systems often
do not address the critical problems of the business as a whole nor
support strategic applications; (d) data redundancy is often out of control,
and users may have little confidence in the quality of data; (e) systems
maintenance costs are out of control as old, poorly planned systems must
constantly be revised; (f) application backlogs often extend three years or
more, and frustrated end users are forced to create (or purchase) their
own systems, often creating redundant databases and incompatible
systems in the process.
Courtyard by Marriott
To provide economy and quality minded frequent business travelers with a
premier, moderate-priced lodging facility which is consistently perceived
as clean, comfortable, well maintained, and attractive, staffed by friendly,
attentive and efficient people.
McDonald’s
To offer the fast food customer food prepared in the same high–quality
manner world-wide, tasty and reasonably priced, delivered in a
consistent, low-key decor and friendly atmosphere.
3. There are typically two types of objectives used: financial and strategic.
Financial objectives target outcomes that relate to improving the
company’s financial performance. Two examples are: (1) increasing
earnings growth by 10 to 15 percent per year, and (2) boosting return on
equity investment from 15 to 20 percent. Strategic objectives target
outcomes that will result in greater competitiveness and a stronger long–
term market position. Three examples are: (1) overtaking rivals on
quality or customer service, (2) attaining lower overall costs than rivals,
and (3) achieving technological superiority over rivals. Companies
generally either try to achieve a low–cost leadership strategy or a
differentiation strategy where they try to differentiate themselves from
competitors based on features, service, or some other factor(s). Within
these two general strategies companies sometimes also provide either a
broad or focused set of products and/or services. Of course, some
companies try to achieve several of these goals. For example, some
implement a best–cost provider strategy, where they give customers
more value for their money by combining an emphasis on low cost with
an emphasis on upscale differentiation.
The implications for poor or no strategic IS planning are many. Users may
not be able to access data that they need. The data that the user works
with may be inconsistent or incompatible with other data. Users may be
receiving mixed signals about strategic applications and how the
organization desires to apply information technology. There may be little
or no guidance regarding the procurement of hardware and/or software.
Finally, this may lead to what F. Sweet has called the “Winchester
Syndrome” (April, 1984. Datamation). He reasoned that without proper
planning, information systems will suffer the same fate as the famous
Winchester Mystery House, with its false chimneys, doors that open onto
blank walls, stairways that lead to ceilings, and so on. The Winchester
Mystery House is a monument to “on the fly” design.
5. This would present a difficult situation for the IS planners. They would be
attempting to plan and garner the support and participation of others in
an atmosphere where people do not plan. In addition, because IS plans
should be driven by the organization’s mission, the IS planners would, in
essence, be planning in a vacuum. The IS planners would have to work
hard to determine what the organization’s mission was (i.e., they would
have to do corporate planning while doing IS planning). It is likely that
there will be many different, possibly even conflicting notions of what the
mission is and ought to be.
6. At this early stage the most important criteria is the extent to which the
project under consideration supports the organization’s mission. At this
point, economic concerns are secondary. Economic concerns will become
more important during the next project phase— project planning and
initiation—after a preliminary analysis of the project request provides the
evidence for a business case.
10. Two likely matrices are provided below using the information above. The
first example given is for a function–to–data–entity matrix. The second
example is for an information system–to–data entity matrix. This
organization also uses office automation applications such as electronic
mail, word processing, spreadsheets, graphics packages, and Internet
interface software, such as Netscape.
Functions
Circuit Manufacturing X X X X X X X X
Circuit Design X X X X X X X X
Order Fulfillment X X X X X
Data Entities C P V R O WE E I W
U R E MR C Q MN O
N P V
Functions
Distribution X X X X
Accounts Receivables X X X
Accounts Payable X X X
Information System–to–Data Entity Matrix
Data Entities C P V R O WE E I W
U R E MR C Q MN O
N P V
Information System
Payroll Processing X X
Accounts Payable X X X
Accounts X X X X
Receivable
Inventory X X X X X
Management
CAD X X X X
Cam X X X X X X X X X
11. The most important change would be to the matrices involving locations.
These matrices would need to be updated to reflect the eight new
locations.
2. This question may take relatively more time and effort to answer, but the
usefulness of answering this question is commensurably higher. If the
organization chosen is at least of moderate size, then there is probably
some degree of formal IS planning. Similarly, such an organization is
likely to engage in some degree of formal strategic planning. If the
organization is doing things right, there should be a clear fit between the
IS plan and the organization’s strategic plan, with the organization–wide
plan driving the IS plan. If there is not a good fit, have the students
express ideas on any problems that may arise and their forecasts for the
future of this company.
5. This information can be found on the Web. The home pages for each of
these companies can be found at:
1) http://www.microsoft.com/
2) http://www.ibm.com/
3) http://www.att.com/
The case illustrates how a supportive IS organization assists a user who has
an idea for an information system that could lead to competitive advantage.
This BEC case addresses the stimulus for the idea, how IS handled an inquiry
about such a system, how a lead analyst might work with a user to formulate
the idea for a system into a workable form, and how to align a system
request with the priorities of a business.
1. Does the client, Nancy Chen, have a good enough understanding of her
business needs to be requesting an information system at this point?
2. Should Nancy have gone directly to Karen Gardner for assistance before
talking with members of her own unit first to see what they think of the
idea? How would you have dealt with this idea if you had been Nancy
Chen?
4. Would you have provided any additional information in the request for the
CATS project to the SPB? Is the content of the CATS request consistent
with the kind of information outlined in Chapter 5 for inclusion in an initial
system project request?
5. What would your reaction have been to the CATS project request if you
had been a member of the SPB? What factors would you consider in
deciding whether to approve this request?
6. Assuming that the Customer Activity Tracking System has potential
competitive advantage, how should BEC evaluate this project request?
Should project selection criteria be different for different types of
information systems? In your opinion, does CATS have potential
competitive advantage?
6
Initiating and Planning Systems Development
Projects
Chapter Overview
The purpose of this chapter is to introduce students to the second phase of
the SDLC, initiating and planning information systems projects. Project
initiation focuses on activities designed to assist in organizing a team to
conduct project planning. During project initiation, one or more analysts are
assigned to work with a customer to establish work standards and
communication procedures. Project planning is the process of defining clear,
discrete activities and the work needed to complete each activity. The
objective of the project planning process is the development of a Baseline
Project Plan (BPP) and the Statement of Work (SOW). The BPP becomes the
foundation for the remainder of the development project. The SOW produced
by the team clearly outlines the objectives and constraints of the project. As
with the project initiation process, the size, scope, and complexity of a project
will dictate the comprehensiveness of the project planning process and
resulting documents. An important aspect of the project initiation and
planning process centers on the assessment of a project’s feasibility and risk.
The chapter describes several types of feasibility including, economic,
technical, operational, schedule, legal and contractual, and political. Students
may find the techniques used to assess economic feasibility are similar to
techniques they learned in a prior course in managerial accounting or
finance. Other forms of feasibility assessment are likely to be new. The extent
to which you focus on each aspect of feasibility will be influenced by your
overall curriculum.
Instructional Objectives
Specific student learning objectives are included at the beginning of the
chapter. From an instructor’s point of view, the objectives of this chapter are
to:
1. Illustrate the steps involved in the project initiation and planning process.
2. Explain the need for and to describe the contents of a Statement of Work
and Baseline Project Plan.
Classroom Ideas
1. This chapter introduces many different concepts and terms that are
central to understanding the project initiation and planning process.
Review Questions 1 and 2 at the end of the chapter may be important to
discuss in class to be sure that your students are understanding the
material. Be sure that you ask your students to review the Key Terms
listed at the end of the chapter.
2. During a lecture, you might want to use the tables and figures in the
chapter to assist in pointing out to the students the major concepts from
the chapter. Linking the processes described in the chapter to a specific
example (e.g., the Pine Valley Furniture example in the chapter) is often a
very good way for students to understand more abstract concepts. You
may want to blend tables and figures from Chapters 6 and 7 given the
interrelatedness of these chapters. As part of a lecture, engage students
to suggest various costs and benefits that might arise with specific
systems. One alternative is to briefly describe a systems development
project with which you have been involved and ask the students to list
the possible costs, benefits, and risks that would be part of a feasibility
assessment of that system.
4. Another very effective in–class exercise is to ask students who have been
on systems development teams to compare their experiences to the
concepts presented in Chapter 6. This discussion is a good method for
elaborating on alternative ways for identifying and selecting information
systems projects. This comparison can be done through discussions of
Field Exercises, 3, 4, 5, or 6.
2. Break–even analysis finds the amount of time required for the cumulative
cash flow from a project to equal its initial and ongoing investment. The
present value represents the current value of a future cash flow. The net
present value uses a discount rate, determined from the company’s cost
of capital, to establish the present value of a project. The return on
investment is the ratio of the net cash receipts of the project divided by
the cash outlays of the project.
4. The Baseline Project Plan (BPP) contains all information collected and
analyzed during project initiation and planning. The plan reflects the best
estimate of the project’s scope, benefits, costs, risks, and resource
requirements given the current understanding of the project. The BPP
specifies detailed project activities for the next life cycle phase, analysis,
and less detail for subsequent project phases (since these depend on the
results of the analysis phase). The content and format of a BPP depends
on the size, complexity, and standards of an organization.
11. The time value of money (TVM) refers to the concept of comparing
present cash outlays to future expected returns. A dollar today is worth
more than a dollar one year from today because money can be invested.
The rate at which money can be borrowed or invested is called the cost
of capital and is called the discount rate for TVM calculations.
2. The students should conclude that this is a relatively small project and
should not take very long to complete. If their familiarity with PCs is
moderate to high, or if they have the help of someone who is familiar
with buying and installing PCs, then the risk for this project should be
relatively low. One risk can arise when leading–, or “bleeding–” edge
technology is selected. For example, as this book was finalized, Windows
98 was about to be introduced. You might want to have students
comment on how reliable Windows 98 is and the risk accepted by the
early adopters of this critical software.
NPV of all Costs ($75,000) ($106,252.00) ($134,154) ($159,066) ($181,309) ($201,169) ($201,169)
Break-even Analysis
Yearly NPV
Cash Flow ($75,000) $44,641 $39,860 $35,589 $31,776 $28,371
Overall NPV
Cash Flow ($75,000) ($30,359) $9,501 $45,090 $76,865 $105,237
6. Students should estimate, as best they can, the dollar figures for each of
the costs they described in their answer for question 4. In addition, they
should quantify, as best they can, the benefits from such a system. They
should then present an analysis with each of the items provided in the
spreadsheet for the previous question. For the answer provided above for
question 4, let us assume that the one-time costs of implementing this
LAN are $50,000.00 and the recurring costs are $20,000.00 per year.
Assume that the benefits are $65,000.00 per year. See the following
spreadsheet analysis for an economic summary of this situation.
Problem and Exercise #6
Year 0 Year 1 Year 2 Year 3 Year 4 Year 5 TOTALS
Net economic
$ 0 $ 65,000 $ 65,000 $ 65,000 $ 65,000 $ 65,000
benefit
Discount rate
1.0000 0.8929 0.7972 0.7118 0.6355 0.5674
(12%)
PV of benefits $ 0 $ 58,036 $ 51,818 $ 46,266 $ 41,309 $ 36,883
NPV of all
$ 0 $ 58,036 $109,853 $156,119 $197,428 $234,310 $234,310
benefits
$
One-time costs (50,000)
$ $ $ $ $
Recurring costs $ 0
(20,000) (20,000) (20,000) (20,000) (20,000)
Discount rate
1.0000 0.8929 0.7972 0.7118 0.6355 0.5674
(12%)
PV of recurring $ $ $ $ $
$ 0
costs (17,858) (15,944) (14,236) (12,710) (11,348)
$ $ $
NPV of all $ $ $ $
costs (50,000) (67,858) (83,802) (98,038) (110,748 (122,096 (122,096
) ) )
Break-even
analysis
Yearly NPV $
$ 40,178 $ 35,874 $ 32,030 $ 28,599 $ 25,535
Cash Flow (50,000)
Overall NPV $
$ (9,822) $ 26,051 $ 58,081 $ 86,680 $112,214
Cash Flow (50,000)
NPV of all Costs ($75,000) ($106,252.00 ($135,178) ($161,474) ($185,379) ($207,111) ($207,111
) )
Overall $115,106
NPV
Overall 0.56
ROI
Break-even Analysis
Yearly NPV ($75,000) $46,021 $41,322 $37,566 $34,151 $31,046
Cash Flow
NPV of all Costs ($75,000) ($110,714) ($142,602) ($171,073) ($196,494) ($219,191) ($219,191)
Overall $87,215
NPV
Break-even Analysis
Yearly NPV ($75,000) $40,179 $35,874 $32,030 $28,598 $25,534
Cash Flow
Overall NPV ($75,000) ($34,821) $1,052 $33,082 $61,681 $87,215
Cash Flow
Break-even Analysis
Yearly NPV Cash Flow ($75,000) $44,643 $39,860 $35,589
Overall NPV Cash Flow ($75,000) ($30,357) $9,503 $45,092
NPV of all Costs ($90,000) ($126,364) ($159,421) ($189,474) ($216,795) ($241,631) ($241,631)
Break-even Analysis
Yearly NPV Cash Flow ($90,000) $9,091 $12,397 $15,026 $17,075 $18,628
Overall NPV Cash Flow ($90,000) ($80,909) ($68,512) ($53,486) ($36,411) ($17,783)
Project break-even w ill not occur during the life of this project.
12. The following spreadsheet summarizes the economic analysis requested
in this question. Since the overall NPV is negative, the ROI is not useful in
this situation.
NPV of all Costs $ (90,000) $ (125,714) $ (157,602) $ (186,073) $ (211,494) $ (234,191) $ (234,191)
Break-even Analysis
Yearly NPV Cash Flow $ (90,000) $ 8,929 $ 11,958 $ 14,236 $ 15,888 $ 17,023
Overall NPVCash Flow $ (90,000) $ (81,071) $ (69,114) $ (54,878) $ (38,990) $ (21,967)
Project Break-even w ill not occur during the life of this project.
NPV of all Benef its $0 $45,455 $90,909 $135,988 $180,384 $223,848 $223,848
One-Time Costs ($90,000)
NPV of all Costs ($90,000) ($144,545) ($194,132) ($239,211) ($280,192) ($317,447) ($317,447)
Break-even Analysis
Yearly NPV Cash Flow ($90,000) ($9,091) ($4,132) $0 $3,415 $6,209
Overall NPV Cash Flow ($90,000) ($99,091) ($103,223) ($103,223) ($99,808) ($93,599)
Project Break-even w ill not occur during the lif e of this project.
14. The answer for this problem is the same as Problem and Exercise #10.
15. Students should submit an answer that is somewhat like the following.
For the system described above for answer 4, 6, and 7, assume that this
system will be used for the office automation needs of a small group of
office workers.
16. Alternative system configurations for the system described above include
the use of a different LAN operating system, such as Artisoft LANtastic or
Microsoft Windows NT. In addition, they may choose not to replace the
existing PCs used by this work group, or they may choose to replace their
PCs with another type of PC. For example, they may choose to upgrade
all of the PCs with IBM-compatible PCs, or they may choose to replace the
PCs with Apple Power PCs. Another alternative is to use a wireless LAN or
even use an existing mainframe or departmental minicomputer as the
server for the LAN. Other alternatives involve choices on the
implementation schedule, such as phasing–in the equipment. Alternatives
might be based on different assumptions, such as the number of
concurrent users, server space allotted for each user, the type of
applications to be run on the network, or budget limitations. At first
glance, this system seems to be highly feasible. The implementation of
similar systems of PCs and LANs has become common throughout many
organizations.
The centerpiece of this case is the development of the Baseline Project Plan.
An important objective in your use of this case is to have your students
compare the BPP for the CATS project with the standards for a BPP outlined in
Chapter 6. It is probably this issue that you will want to emphasize in class
discussion or written exercises. Of interest is not only the content of the BPP
but also the process followed by the project initiation team to develop this
BPP.
1. Is the content of the Baseline Project Plan for the CATS project consistent
with the BPP content suggested in Chapter 6?
2. What skills are required on a project initiation and planning team, and do
Jordan and Nancy apparently possess all of these skills?
3. In retrospect, what would you have done differently in preparing the BPP
for the CATS project? What other activities would you have done and
what other information would you have prepared?
5. Assess the CATS project schedule shown in Figures 3 and 4. Do you have
any recommendations on restructuring this schedule to improve the
project? Are the resource requirements consistent with this project
schedule?
7. Did Nancy and Jordan assume appropriate roles during the walkthrough
meeting for the Baseline Project Plan? If you were Jordan, would you have
developed a different agenda for this meeting?
8. If you were a member of the SPB, would you have found the economic
justification for the project acceptable for this stage of the project? What
questions might you have asked about system justification to supplement
the information provided in the BPP?
7
Determining System Requirements
Chapter Overview
The purpose of this chapter is to acquaint students with some of the many
methods systems analysts use to collect information about information
system requirements. The chapter begins with a discussion of the more
traditional requirements gathering techniques, such as interviews,
questionnaires, and obtaining information from organizational documents.
The latter part of the chapter is devoted to more recently developed
techniques and tools, such as Joint Application Design (JAD), group support
systems, prototyping, and CASE tools. This chapter concludes with a
discussion of business process reengineering.
From their study of this chapter, students should take with them an
appreciation of the different types of requirements information analysts
collect and the different methods they can use to collect these requirements.
However, reading about and discussing how analysts collect requirements is
no substitute for direct hands–on experience with the techniques. Most of the
classroom suggestions listed below involve some type of hands–on
experience for students. You probably won’t have time to do all of these in
class, but even one or two of these exercises will give students a much better
insight into the requirements collection process.
Instructional Objectives
Specific student learning objectives are included at the beginning of the
chapter. From an instructor’s point of view, the objectives of this chapter are
to:
6. Show how computing, in the form of CASE tools and group support
systems, can support requirements determination.
Classroom Ideas
1. Point out that, while requirements determination tools and techniques are
very valuable in the analysis phase, analysts can benefit from their use in
other phases of the life cycle. Demonstrate this with examples from other
phases. For example, JAD is also useful in the early phases of design,
such as where input forms and output formats are designed. Also,
observation can be useful during system implementation to verify that
the new system is being used as expected.
3. Use Field Exercise 1 at the end of the chapter as an in–class exercise. This
exercise typically takes about one hour to complete, including time for
discussion of the results. Students can submit the reports at the next
class meeting.
5. Use the box “Lost Soft Drink Sales” as a point–of–departure for a class
discussion of the advantages and disadvantages of direct observation.
You may want to expand the discussion of direct observation, especially if
you have experience as an action researcher, since the methods are
similar. You could include coverage of the use of confederates, how to
avoid observer biases, and other issues you consider important. We have
found that students are reluctant to use direct observation and need to
be encouraged to consider it equal to interviewing.
6. Figures 7-3, 7–4, and 7–5 can serve as the basis for a discussion of
documents and how system requirements can be determined from them.
Bring in other documents to add to the discussion or have students
collect various documents they have, such as bills and order forms. Show
how you can analyze such documents to discover business rules as well
as content requirements. For example, a shipping form will show whether
the firm recognizes potentially ship to, order from, and bill to addresses; a
class registration form may indicate the maximum length for student
names. Save these forms since they can also be used with Chapters 14
and 15 in discussing input, output, and user interface design.
8. Three of the four video segments that accompany this textbook can be
used with Chapter 7. The most appropriate is the one on “Joint
Application Design.” This video segment is about 18 minutes long. Also
very appropriate is the video segment called “Managing User
Expectations,” which is about 12 minutes long. A third video segment on
“Application Engineering” could be used, if you have not already used it
with a prior chapter. Notes on using these video segments are included in
a separate section of this Instructor’s Manual. See the Preface to this
Instructor’s Manual for information on how to obtain the video segments
produced for use with the second edition of Modern Systems Analysis and
Design.
9. Using a business case, run a mock JAD in class, with some students
assigned roles as analysts, others as managers, and others as users. As
with a real JAD, the person chosen as facilitator is crucial to the exercise’s
success. The mock JAD should be preceded by the type of careful
planning that precedes actual JADs, as outlined in the text. Several
possible business cases for such an exercise are included in this
Instructor’s Manual.
10. Use a CASE tool to support the mock JAD outlined in Classroom Idea #9.
11. Use a group support system to support the mock JAD outlined in
Classroom Idea #9. The planning necessary for the JAD will have to be
supplemented with the planning necessary for GSS use.
13. Take an activity with which students are familiar, such as enrollment.
Have the students reengineer this activity. Encourage students to be
innovative.
7. Computing has been used to support JAD in the form of the computer
used by the scribe, CASE tools used during the JAD to illustrate and
change form and report designs, group support systems to elicit a higher
level of group member participation, and prototyping tools to provide JAD
participants with workable system prototypes based on their ideas and
preferences stated during the JAD.
10. Group support systems provide unique benefits for group requirements
determination through allowing everyone the opportunity for equal
participation through typing instead of talking, and anonymity allows the
shy and those afraid of criticism to participate.
11. As part of the BPR effort, key business processes should be identified.
Key business processes are the structured, measured set of activities
designed to produce a specific output for a particular customer or
market. Once these key business processes have been identified, those
activities that can be radically improved should be identified. Primary
candidates include those activities that are viewed as important,
changeable, or dysfunctional. Benefits of BPR include radical
improvements in speed, quality, and customer satisfaction.
2. Numerous articles are available in the library and on the web. CASE
tools are useful in JAD sessions because the JAD team can use the CASE
tools (i.e., creating data flow diagrams, entity–relationship diagrams, and
a data dictionary) together. This helps the team to better, and more
quickly, develop the system. A GSS is useful in JAD sessions because
more team members can participate, the GSS can help keep the team on
track, the team members can use the electronic, anonymous
brainstorming tools, and the GSS automatically, accurately captures the
outputs of the sessions. Some of the limits to using CASE and GSS in JAD
are the availability of the tools, the learning curve for these tools if the
team members are not familiar with them, and potentially over–
structuring the development process.
5. Students might suggest the following for the JAD leader: the JAD sessions
should be off–site, the proper people should be invited to the JAD
sessions, establish clear ground rules for the sessions, set and follow a
clear agenda, distribute the agenda to all participants before the
sessions, remain neutral on issues, make sure that everyone has the
opportunity to participate, encourage people to be creative and break
free of traditional ways of doing things, manage time effectively, and
follow up with meeting notes.
1. Which of the following is the best thing about the word processor that
you currently use to do your job (pick only one):
a. good help system
b. extra tools such as spell check, grammar check, thesaurus, and
autocorrect
c. compatibility with other applications such as graphics package and
spreadsheet
2. Please rank the following three items in terms of their need for
improvement in the next version of this word processor. Place a “1” by
the item which is most in need of improvement.
a. ease of use
b. speed
c. compatibility
3. Should the next version of this word processor enable you to create
and use hypertext markup language documents for use on the World
Wide Web?
1 2 3 4 5 6 7
Strongl Agree Agree Neutral Disagree Disagree Strongly
y Somewha Somewh Disagre
Agree t at e
9. Because the group interview might be more difficult to conduct and more
time consuming, the analyst might add to the interview guide “time
certain” events or “time stamped” agenda items. For example, if the
meeting begins at 8:00 a.m., and the manager of the users will come in
to the meeting to give a brief talk, this event might be scheduled for 8:15
a.m. until 8:30 a.m. Other processes in the meeting will be postponed
during this event. With time stamping, the analyst writes definitive start
times next to each of the agenda items and then uses this to keep the
group on track. Alternatively, the analyst might write specific questions
that should be asked of specific members of the interview group. If
several analysts are involved in the group interview, the group could be
broken into parallel sessions, each with its own agenda. Finally, agenda
activities should be allotted for discussion and interchange between the
interviewees, so that consensus and synergy can occur.
11. The answer to this question can be facilitated by revisiting the definitions
for corporate strategic planning and information systems planning.
Corporate strategic planning is an ongoing process that defines the
mission, objectives, and strategies of an organization. Information
systems planning is an orderly means of assessing the information needs
of an organization and defining the systems, databases, and technologies
that will best satisfy those needs. The key to understanding BPR is that it
is the search for and implementation of radical change in key business
processes. Those organizations involved with BPR are looking for new,
innovative ways to perform these processes.
2. This should be a useful method for learning about the team’s work
processes. Students should be able to identify and apply the comparative
advantages and disadvantages of group interviews as discussed in the
chapter. Student observations may vary based on group size, group
history, and whether the group leader is present.
3. If the teams chosen closely follow the prescribed method of work, then
the information from the interview should match the information from the
written documentation. If, however, some of the teams chosen use a
more informal system for completing work, then the information from the
interview is not likely to match the information from the written
documentation. Have the students compare their answers and talk about
why, and with what implications, these differences might exist.
5. For good background on JAD, students might read Guide (1990). “JAD
Across the Life Cycle.” Guide International Inc., Publication no. GPP–219.
For more recent publications on JAD, students will find articles in IS
journals in the academic literature and IS magazines in the popular press.
In addition, the proceedings of the annual International Conference on
Information Systems and the Hawaii International Conference on Systems
Sciences frequently have articles on JAD.
6. Students will discover that the organization’s systems were not merely
tweaked; they were significantly modified to the betterment of the
organization. If students are not able to find a contact person, a visit to
the library or to the web will yield results. Also, you may want to
encourage your students to identify companies that have undergone BPR,
such as Ford. Ask the students to identify the tangible and intangible
benefits of this process. Students should identify the costs as well.
This case itself is not very provocative. It can, however, be used to stimulate
some interesting class discussion about how an interview is conducted and
the results achieved. Thus, we recommend that you take some time in class,
probably after you lecture on Chapter 7, to discuss some questions based on
this case. Some possible discussion questions are the following:
1. From the information included in the case, how would you rate Frank
Napier’s ability as an interviewer? Do you think he was well prepared for
his interview with Wendy Yoshimuro? In answering these questions,
assume that Wendy’s interview was one of the first interviews Frank
conducted for the CATS project.
2. Besides Wendy, who else should the CATS team analysts be interviewing
(use general titles for the kinds of people who you think should be
interviewed)?
5. What kinds of questions should Jordan ask the seven BEC store managers
in the meeting she has scheduled? Assume that this is a group interview,
not seven individual interviews.
6. What impact does the DFD in Figure 2 have on structuring interviews for
the CATS project?
7. Why does Frank think that both individual interviews and a JAD should be
used for requirements determination on the CATS project? Do you think
both are necessary? Why?
8
Structuring System Requirements: Process
Modeling
Chapter Overview
The purpose of this chapter is to show students one particular method for
modeling business processes, data flow diagrams (DFDs). Although there are
several methods and techniques available for process modeling, we have
chosen to focus on DFDs because they have been popular for many years,
especially in the structured analysis and design literature. Many CASE tools,
such as the Visible Analyst Workbench™, IEF™, and others, have incorporated
DFDs into their sets of system development tools and techniques.
The chapter is divided into several distinct sections, each of which builds on
what has come before. After a brief introduction to process modeling, data
flow diagramming techniques are introduced in a section called “Data Flow
Diagramming Mechanics.” This section demonstrates the basic DFD symbols,
definitions, and rules. We use the Gane and Sarson symbol set throughout
the book, and these symbols are explained in this section. There is also an
example from Hoosier Burger, the food ordering system first shown in
Chapter 2. This section also includes explanations of decomposition and
balancing.
The third major section in this chapter, “Using Data Flow Diagramming in the
Analysis Process,” is novel for an introductory systems analysis and design
text. In this section, guidelines for drawing and using DFDs in analysis are
introduced. This is different from the mechanical rules presented earlier.
Topics include completeness, consistency, timing, iterative development,
primitive DFDs, and analyzing DFDs for system inefficiencies and
discrepancies among DFDs that are supposed to be modeling the same
system. We use another Hoosier Burger example and output from Oracle’s
Designer/2000 CASE tool to illustrate some of these concepts.
Instructional Objectives
1. Show how logically modeling processes can be done with data flow
diagrams.
2. Teach students data flow diagram symbols and the mechanical rules
necessary for them to create accurate and well–structured process
models.
5. Explain and demonstrate the differences among the four levels of DFDs:
current physical, current logical, new physical, and new logical.
Classroom Ideas
1. Use Figures 8–2 and 8–6 to illustrate the basic DFD symbols and the
correct and incorrect ways to draw the diagrams. Use Figure 8–3 to
demonstrate the problem with trying to include sources/sinks inside the
system being modeled.
2. Once you have taught the basics of drawing DFDs, have students
complete Problems and Exercises 2 through 4 and 10 as in–class
exercises that you can then go over in class to emphasize the points you
have made.
3. Figures 8–5, 8–7, 8–8, and 8–9 can be used in class to teach
decomposition. These can be followed with students completing in–class
Problems and Exercises 5 and 11.
4. Use Figure 8–10 to illustrate unbalanced DFDs.
8. Using a CASE tool that supports DFDs, show in class how the tool
provides for decomposition and balancing and how DFDs are linked to the
CASE repository. Later, when teaching Chapter 10, you can show how the
repository links DFDs and entity–relationship diagrams.
9. Use a CASE tool in class to show how the tool checks for completeness,
consistency, and other elements of analysis as discussed in the chapter.
3. The rules for DFDs are listed in Table 8–2 and illustrated in Figure 8–6.
Processes cannot have only outputs, cannot have only inputs, and must
have a verb phrase label. Data can only move to a data store from a
process, not from another data store or an outside source. Similarly, data
can only be moved to an outside sink or to another data store by a
process. Data to and from external sources and sinks can only be moved
by processes. Data flows move in one direction only. Both branches of a
forked or a joined data flow must represent the same data. A data flow
cannot return to the process from which it originated.
4. Decomposition is the iterative process by which a system description is
broken down into finer and finer detail, creating a set of diagrams in
which one process on a given diagram is explained in greater detail on a
lower–level diagram. Balancing is the conservation of inputs and outputs
to a data flow diagram process when that process is decomposed to a
lower level. You can determine if a set of DFDs are balanced or not by
observing whether or not a process which appears in a level–n diagram
has the same inputs and outputs when decomposed for a lower-level
diagram.
6. Current physical DFDs often show the people and technology used within
a system, showing who does what and the media on which data are
stored. Current logical DFDs attempt to show the essence of the system
without regard to the actual physical implementation.
7. Detailed DFDs for the current physical system tend to take a great deal of
time and then tend to be tossed aside as the focus shifts from the current
to the new system. By not drawing current physical DFDs, or by drawing
only cursory ones, analysts can save themselves effort and focus from
the beginning on what is really important, the new system.
9. You stop decomposing a DFD when the following six conditions are
satisfied.
The system user does not care to see any more detail, or when you and
other analysts have documented sufficient detail to do subsequent
systems development tasks.
Every data flow does not need to be split further to show that different
data are handled in different ways.
You believe that you have shown each business form or transaction,
computer screen, and report as a single data flow.
You believe there is a separate process for each choice on all lowest–level
menu options for the system.
10. Sources and sinks are always outside of the system being considered.
They are of interest to the system being considered only because they
represent sources of data coming into the system and destinations for
data leaving the system. If any data processing occurs inside a source or
sink, it should be of no interest to the system being modeled. If the
processing is of interest, however, or if the identified source/sink has
several inputs and outputs to and from the rest of the system, it may be
better considered as an internal process.
11. Context diagrams have only one process that represents the entire
system being modeled and show only the data flows into and out of the
system. The diagram also includes sources and sinks, which represent
the system’s environmental boundaries. There are usually no data stores
in a context diagram.
2. There are a number of ways that students could draw their data flow
diagrams, particularly depending on the level of detail they choose to
capture. Students should realize that there isn’t necessarily one “right”
data flow diagram for this or most other business processes. Some of the
relevant data flows might include payment information, receipt, goods
sold information, and inventory information. Some data stores might
include a goods sold file, an inventory file, and daily sales total file. Some
processes might include update goods sold file, update inventory file,
update daily sales total file, and produce management reports. Some
sources/sinks might include customer or store manager. A sample context
and level–0 data flow diagram for this exercise is provided below. In the
level–0 data flow diagram, Transform Customer Purchase, Update Goods
Sold File, Update Inventory File, and Update Sales Total File, were selected
as processes rather than as sources/sinks because they were deemed to
be central to the point of sale process. Point out why these DFDs are
balanced.
Context Diagram
0
Rece
Point
Custo of Sale
System Store
Manag
Pay ement
Level-0 Diagram
Rece 1
Transf
orm
Custo
mer
Purcha
se
2 3 4
Update Update Update
Goods Invento Sales
Sold ry Total
File File File
Context Diagram
Order 0 Cap
Infor and
Stude Order Shipp
Entry
System
Rece
Level-0 Diagram
Order Cap
Infor Rece and
1 2 Invent 3
Valid Update
Finaliz ory Invento
Validat
e e ry
Order Order File
Invent
ory Forma
tted
Invento
D ry File
2
Level-1 Diagram
Shipp
Validate
2
2 2
.
Generat Rec . Receip .
1 Log Generat
2 3
1e Goods e
Receipt 1
Sold Informa
Data tion
for
Shippin
g
Goods Inve
Valid
Sold
Order
Goods Update
Validate
D Sold
2 File
Different names and numbers are used for apparently the same data
store on the two diagrams.
In the level–0 diagram, the data store, Class Roster, does not have the
data flow, Scheduled Classes, flowing into it, rather this data flow
connects processes 2 and 3, thus these DFDs are not balanced.
Process 1 appears to accomplish nothing since its inflow and outflow are
identical; such processes are uninteresting and probably unnecessary; it
is possible that this process will become interesting when it is
decomposed, where validation and error handling processes might
appear.
Process 2 does not appear to need Course Request as input in order to
perform its function, as implied by its name.
7. Physical data flow diagrams help you better understand the people
and/or computer systems that are used in the overall system’s
processing. Logical data flow diagrams help you better understand the
essence of the system, the data and the processes that transform them,
regardless of actual physical form. Further, the new logical data flow
diagrams can then show any additional functionality necessary in the
new system, to indicate which, if any, obsolete components have been
eliminated, and any changes in the logical flow of data between system
components, including different data stores. The data flow diagrams for
the new physical system can then be constructed with the data flow
diagrams for the new logical system as a guide. As discussed in the
chapter, experts used to recommend that all four levels of data flow
diagrams (current physical, new physical, current logical, and new logical)
be constructed because: (1) analysts knew little about the business of the
user and needed to develop a detailed current physical data flow diagram
in order to understand the business, (2) users were not able to work with
a new logical data flow diagram right away, and (3) there is not much
work in turning current logical data flow diagrams into new logical data
flow diagrams.
Data flow DF5 should not move directly from source E1 to data store DS1
without first going through a process.
Data flow DF1 should not move directly from source E1 to sink E2 without
first going through a process.
Other peculiarities (such as Process 1.0 has label P2 and the data store
has only a label, not a number) are only that, not errors.
11. There is a general formatting issue with these DFDs since there are no
numbers on processes and data stores, but the student should be able to
find logical errors as well. These diagrams show the decomposition of
process P1 on the level–0 diagram. Three particular logical errors in
Figure 8-23 are:
The data store DS1, not DS2, should be represented on the level-1
diagram.
Data flow DF3 should be an outflow on the level–1 diagram, and data flow
DF6 should not be on the Level–1 diagram.
12. The example context and level-0 data flow diagrams represent one
possible way to model the hiring process described in this question.
Variations, based on different assumptions, are possible. For example, it
is possible to include the processes performed by the Personnel Manager
outside the system as a source/sink; in our diagram, we assume the way
the Personnel Manager does her/his work might be studied in more detail
and the way this work is done is subject to change. Also, some students
might show Applicant and Hired Employee as separate sources since only
Hired Employees provide the information on a non–disclosure agreement.
Our example solution also shows split data flows; be sure to emphasize
that a split flow means that the same data flow at the same time, but to
multiple destinations. In our example, we also show the Employee data
store only on the level–0 diagram, not on the context diagram.
Technically, you could show it on the context diagram, but we assume
that this is a detail that is necessary to be known only to those looking at
level–0 and lower diagrams. A frequent mistake our students have made
is to forget to include the purge process (on level–1 or lower diagrams) to
get rid of year–old applications. Related to this, since applications are
retained for a year and the system operates whenever new jobs are
posted (this timing can’t be seen on DFDs), there is a need to have an
application data store inside the system (that is, on level–1 and lower
diagrams); some students will miss this essential element of the logical
system description.
Context Diagram
Interview
Appli
Engin
Job
Blank Descri
Non-
0
Hiring
Complete System Intervi
d ew
Appli Appli
Hiring
Level-0 Diagram
Completed
Blank Non-
Valid Purge
1 Appli 5
Appli Recei
Purge
Appl ve
Applic Year-
Appli
cation
D ations old
Appli
1 cation
s
Year-old
Applicat
ions
3
Intervie Choos Applicat
e ions for
for
Intervi 6
Create
ew Emplo
yee
Appli Recor
New
d
Hiri
ng
Engi Job
Job D Descrip 4
Descr Evalua Employ
2 tions te D ees
2 Relev
Receiv ant and 3
e Hire
Job
Descri
ption Interview
Hiring
13. The sample context and level–0 data flow diagrams represent one
possible way to model the help desk process described in this question.
In our solution, we have chosen to include the processes performed by
the consultants and operators as subsystems within the system rather
than as sources/sinks; this adds detail, but allows bottlenecks in these
processes to be corrected. Note that data store D1 is repeated in the
level–0 diagram, to avoid excessive crossing of data flow lines. Several
processes could be exploded further, but the student would probably
have to make many assumptions to do so.
There are a number of ways that the students could choose to improve
this system. For example, with the current system a customer may have
to explain their problem and/or question over and over to multiple
people: an operator and possibly several consultants. The customer may
begin to believe that they are getting the “run-around” characteristic of a
large bureaucracy. One way to avoid this potential problem is to let the
initial operator have access to the customer problem database so that
when the caller is handed off to a consultant the customer’s already
opened problem file will go along with them. In addition, the operator
could have sufficient information and the option to direct the call to the
proper consultant. Alternatively, clients could call the assigned consultant
directly on follow–up calls to an initial call for help.
Ask your students for characteristics of a DFD that imply areas for
improvement. Possible answers are: processes that simply collect and
pass on information rather than transforming data, collecting the same
information into several processes, placing untransformed data into data
stores thus causing unknown delays in processing this data, or cycles or
loops that have no apparent termination.
Context Diagram
Call
Inquiry on
0
Nature of Non-
Help Help
Client Call Report Desk
System Other
New
Interim
Final Call
Level-0 Diagram
Call New
1
Recei
Inquiry on Call Report # 9
ve Close
Call Nature Final Call Call
Report
Call
Call
D queue Closed
Infor 1 Call New
2 Help Infor
Deter Desk
mine Close
Direct 5
ion Deter 8
of 3 Previ mine Resear
Help Deter ch
Call ous Proble
Desk mine Proble
m
if First m
Status
Call
Cal
Non-
Help
First Open Pro
Call Call ble
4 Call
Create D report
Call
Report
2 file Ne
Other
Call w
Call
Report
D queue
6 1 7
Transf Recor
er Open Call
d
Call New
Probl
em Infor
matio
Interim n
14. A suggested answer is provided below.
Context Diagram
Prescrip 0
Drug
Hospit
Unfilled al
Docto
Pharma Store
cy
System Patient
Unfilled Number
Order
Level-0 Diagram
1
Revie
Prescrip w&
Doct Send
Prescr
iption
Unfilled
to
Statio Phar
Prescr n Patient
Unfilled macy D File
Order
1
2 Patie
Revie
w
Prescr
iption
Order
by
Statio Order
n Order
3
Fill
Order
Drug
Billi
4
Gener Patient
ate Number
Label
Drug Nurs
15. A suggested answer is provided below.
Context Diagram
0
Purchas Shipping
Contra
Gover cting
System Gover
Invoic
Invalid
Purchas
Level-0 Diagram
Purchas Contrac
1 t Terms
Verify
Gov
Purch
Contrac
ase Dt
Order
Invalid Validat 1 Databas
Purchas e
Validat
Comple
ted PO
Shippin
Inv 2
Check
Invent
ory
Validat
Not-
in-
3
Pull & Validated
Ship PO,
Items
from
Contra
Invent D cts
ory
Shipping 2 File
Bill for
16. A suggested answer is provided below.
Context Diagram
Seminar &
Reserv &
0 Negotia
Seating Info
Booki No. Negotia
tion
Contract
tion Sales
Trainin Info Mana
Agreeme
Info
g Contract ger
nt Info
Logisti Agreement
Possible cs Info
System
Approved
Travel
Availabil Flight
ity, Cost,
Availabil
Flight
ity, Cost,
Reser
Mtg Travel
Potent
Level-0 Diagram
Availabil
ity, Cost,
Mtg
Reserv &
1 Negotia
Seating Info
Arran Negotia
tion
Pote Contract
tion
ge Info
Availabil Agreeme
Info Sale
for Contract
ity, Cost, nt Info
Meeti Agreement
ng Info
Seminar & Facilit
Consultant ies
Boo
Me
No. etin
Seminar Mtg
Anticip g
2 Seminar
Possible
Make D logistics
Consu
Cons ltant Consultant 1 database
Apprvd Travel
Arran Flight
geme
Travel nts
Flight Trav
3 Reser
Deter
mine
&
Send Requ
Semin est
4 Semin
ar ar
Gathe
Mater
r, Box
ials Ship &
ment Send
Mater
ials to
Meeti
y
4. Students are likely to find that various other types of software packages
have elements in them that can be used to construct data flow diagrams.
For example, a drawing package might include data flow diagram
symbols (many flow charting packages, like ABC Flowcharter and Visio,
include DFD symbols). Alternatively, a database management package
might include some data dictionary features. However, none of these will
be as effective and easy for constructing data flow diagrams as will a
CASE tool with features for this purpose. If students don’t believe this,
have them construct a simple data flow diagram using a drawing
package, and then have them move sources or processes around on the
screen. Chances are that the drawing package doesn’t automatically
move all the connected data flows while these objects are moved around
the screen. With a CASE tool, when an object is moved, its connecting
data flows move with it. Similarly, with a CASE tool you can often move to
a different, related data flow diagram by clicking on a button or by double
clicking on a particular process. Also, drawing packages do not know DFD
rules, so no automatic error checking can be done and decomposition is
not a function of the package. In addition, since a drawing package has
no repository, symbols on different diagrams probably cannot be linked
(e.g., when details on a higher–level diagram change, these are
automatically reflected on nested diagrams).
5. Students might find that these people draw their business process using
either a data flow diagram, a flow chart, a series of input/output models,
or some combination of these techniques. People will draw the diagram
using the techniques they are familiar with. If they are not familiar with
any techniques for modeling processes, then they will probably draw
pictures that represent physical reality (e.g., a piece of paper moving
from one person to another person, or a piece of paper moving from one
person to a file cabinet). For people who are not familiar with data flow
diagrams, the students should find that it is relatively easy to show them
that data flow diagrams are a better way to model processes. Chances
are that this person’s original picture already has many of the elements
of a standard data flow diagram anyway. Research has found that process
modeling is a very natural activity for most people, even when they are
not formally trained in this technique.
1. Would the DFDs serve any benefit during the meeting with the store
managers? Why or why not?
3. Do you believe that any of the lowest level processes in Figures 2, 3, and
4 need to be further exploded, or are all of these primitive processes?
5. Based on the fax Frank sent Jordan, what kinds of questions should Jordan
ask the seven BEC store managers in the meeting she has scheduled?
Assume that this is a group interview, not seven individual interviews.
9
Structuring System Requirements: Logic
Modeling
Chapter Overview
The purpose of this chapter is to introduce students to three different
techniques that can be used to represent processing logic. Starting with the
data flow diagrams students learned about in Chapter 8, we proceed here to
show students how to represent the logic contained in the process symbols in
data flow diagrams. This chapter serves as a brief introduction to three
commonly used techniques for logic modeling. The instructor may want to
focus on one or two techniques and enlarge on the coverage presented here.
Structured English, decision tables, and decision trees are traditional methods
used to represent processing logic. We show how Structured English
statements are used to represent the basic constructs in structured
programming: sequence, choice, and repetition. We also provide some simple
examples using the Hoosier Burger inventory control system, as well as some
exercises at the end of the chapter. Some students may confuse Structured
English with the pseudocode they learned in their programming classes. We
explain the difference by pointing out that pseudocode is closer to code than
Structured English, and pseudocode must incorporate statements about
opening and closing files and initializing variables (and so on) that logic
statements in Structured English do not include. We see Structured English as
a tool to facilitate communication between analysts and users, while
pseudocode is a tool to facilitate communication between analysts and
programmers.
After Structured English, we turn to decision tables and decision trees, both
intended to represent more complicated processing logic than simple
Structured English statements. We provide two examples of creating and
simplifying decision tables, along with a set of rules to follow. We also provide
two simple decision tree examples, one of which models the same logic as
the “payroll” decision table example.
Instructional Objectives
Specific student learning objectives are included at the beginning of the
chapter. From an instructor's point of view, the objectives of this chapter are
to:
Classroom Ideas
1. Use Figures 9–2 and 9–3 to open your discussion of Structured English.
Have students complete Problems and Exercises 2, 3a, and 6 in class.
2. Work through both decision table examples contained in the text, using
Figures 9–4 and 9–5, then work through Figures 9–6 and 9–7. Have
students complete Problem and Exercise 3b in class.
3. Use Figures 9–8, 9–9, and 9–10 to illustrate the creation and navigation
of decision trees. Have students convert decision tables from other
exercises to decision trees.
5. Divide the class into teams. Assign either Problem and Exercise 10, 11,
or 12 to the teams. Have some teams solve the assigned problem with
Structured English, others with decision tables, and others with decision
trees. After giving the groups time to complete their tasks, have group
representatives present and explain their solutions. Ask those observing
to determine which solution works best for that particular problem and
why. End with a class discussion of what worked and what did not and
why.
2. The purpose of logic modeling is to show the rules that govern the
behavior of processes represented in data flow diagrams. Structured
English, decision tables, and decision trees all model decision logic. State
diagrams model temporal logic and are discussed in Chapter 12.
5. The steps for creating a decision table are: (1) name the conditions and
the values each condition can assume; (2) name all possible actions that
can occur; (3) list all possible rules; (4) define the actions for each rule; (5)
simplify the decision table. To reduce the size and complexity of a decision
table, use separate, linked decision tables, or use numbers that indicate
sequence rather than Xs where rules and action stubs intersect.
6. Decision trees are organized in a hierarchical fashion, starting with the
root node on the far left, and proceeding to subsequent decision nodes. All
possible actions are listed in leaf nodes on the far right.
7. You can use the tool you understand best and prefer; however, you
should also consider the appropriateness of the tool for the specific
situation. For example, some research shows decision trees are best for
determining the correct conditions and actions from a description of a
problem. Structured English was found to be best at converting conditions
and actions to sequential statements. Structured English is not as easy to
validate as decision tables and decision trees, however. Decision tables
are better than decision trees at portraying complex logic, are more
compact, and are easier to manipulate. Decision trees are better than
decision tables at portraying simple problems and at helping people make
decisions in practice.
8. Structured English uses action verbs, such as read, write, print, sort,
move, merge, add, subtract, multiply, and divide. Unlike regular English,
Structured English does not use adjectives or adverbs.
10. To determine the number of rules a decision table must cover, simply
determine the number of values each condition may have and multiply
the number of values for each condition by the number of values for every
other condition.
2.Students should realize that, as described in the chapter, each analyst will
have his or her own particular dialect of Structured English. There is no
standard version of it. There are many possible ways to represent with
Structured English the decision logic in the decision table of Figure 9–5.
One possible representation is provided below in a series of conditions.
BEGIN IF
IF Employee–Type is Salary
THEN PAY base salary
END IF
BEGIN IF
IF Employee–Type is Hourly
AND Hours–Worked is <40
THEN CALCULATE hourly wage AND PRODUCE Absence Report
END IF
BEGIN IF
IF Employee–Type is Hourly
AND Hours–Worked is 40
THEN CALCULATE hourly wage
END IF
BEGIN IF
IF Employee–Type is Hourly
AND Hours–Worked is >40
THEN CALCULATE hourly wage AND CALCULATE overtime
END IF
3.One of the data flow diagrams from the Hoosier Burger example in the
previous chapter (see Figure 8–15) is reproduced in Figure 9-2. A
Structured English representation of the four processes is presented in
Figure 9-3. There may not be enough time to have students write
Structured English for each of the processes for each of the Hoosier
Burger data flow diagrams in the previous chapter. At a minimum the
students should understand the examples already given in this chapter
and write their own Structured English for one more piece of the data flow
diagrams from Hoosier Burgers. One such example is provided below for
the process, Query Inventory Levels, from the level–0 data flow diagram
for Hoosier Burger's new logical inventory control system, Figure 8–16.
Conditions/ Rules
Courses of Action 1 2 3
Due status L D N
Generate Rush Payment X
Generate Payment X
Postpone Payment X
Due status:
L = Late; Date of invoice is more than 30 days before today's date.
D = Due; Date of invoice is 30 days before today's date.
N = Not due: Date of invoice is less than 30 days before today's date.
4. Sample decision trees for Figures 9–6 and 9–7 are provided below. After
constructing these trees, students should be able to appreciate the
complexity of modeling logic, even for a problem with only three
variables. In addition, drawing the second tree shows graphically how
much easier it is to deal with the reduced decision table and tree.
Problem and Exercise 4
BEGIN IF
IF Purchase–amount is greater than $15,000.00
THEN Purchasing–Department APPROVES RFP
DO Bid Process
ELSE Purchasing–Department APPROVES Purchase
PURCHASE equipment
END IF
RETURN
(Bid Process)
SEND RFP
BEGIN IF
IF three Proposals received
AND Winning–Vendor is APPROVED by Purchasing–Department
AND no Violations
THEN AWARD contract
PURCHASE equipment
ELSE DO Rebid Process
END IF
RETURN
(Rebid Process)
SEND RFP
BEGIN IF
IF Winning–Vendor is APPROVED by Purchasing–Department
AND no Violations
THEN AWARD contract
PURCHASE equipment
END IF
ISSUE Purchase Order
RETURN
7.A computer–based tool that helped people to create and edit Structured
English logic models might have a library of “generic” business processes
already described. Users could then choose a corresponding process and
quickly and easily edit it so that it fits with their situation. Such a tool
might also have a library of common logic, such as IF/THEN and/or
DO/UNTIL structures, that could be called up and edited to fit the
situation. In addition, this tool might have common commands (such as
DO and BEGIN IF) and verbs (such as read, write, print, sort, move, merge,
add, subtract, multiple, and divide) ready to choose from either a menu or
as buttons.
8. Presented below is a sample decision table and decision tree for some
aspects (exclusive of the bidding process) of the answer presented to
Problem and Exercise 6 above. The decision table and decision tree
express the same information; one expresses the information in tabular
form while the other expresses the information in graphical form. For this
situation, where there are several, nested, complicated conditions, the
Structured English presented in the answer to Problem and Exercise 6 may
be more useful than one table or tree (although several tables may be
suitable).
Conditions/ Rules
Courses of Action 1 2 3 4
Purchase amount G L G L
Vendor Approved Y Y N N
Award Contract to Winning Vendor X
Issue Purchase Order X X
Purchase equipment X X
Award Contract to Other Appr Vendor X
Find another Approved Vendor X
Purchase amount: G = greater than $15,000.00, L = less than or equal
to $15,000.00
Vendor Approved: Y = Yes; approved by Purchasing Department
N = No; not approved by Purchasing Department
1
Y Issue purchase order, purchase equipment
N
2
N
Find another approved vendor
9. A computer–based tool that helped people to create and edit decision
table and decision tree logic models might have a library of “generic”
tables and trees available. Users could then choose a table or tree and use
it as a template with which to fill in their information. Alternatively, the
tool might have the user build their decision table, and then the tool
would automatically convert the table into a tree, and visa versa. The tool
would also automatically check for errors of completeness and
consistency. Interestingly, a tool, called ADDS was developed as early as
the 1960s by NCR Corp. to generate, print, and check for errors in decision
tables. A decision table or tree tool would be just as useful as one built for
making Structured English logic models; both tools would, much like a
CASE tool, automate systems development tasks.
10.Provided below is one way to represent the sales process described in this
question with Structured English. The students may come up with different
versions depending on their form of Structured English and their
assumptions about this sales process. In fact, there are many aspects of
the problem that are ambiguous and creating structured logic models
helps the analyst find ambiguities. You will want to emphasize to your
students this interaction between requirements structuring and
requirements determination.
The Structured English has two routines, one for handling each purchase
and one for determining end–of–year bonuses. The method for calculating
base rep end–of–year bonus is not specified, so only a general statement
is included. These models assume that Customer Satisfaction is measured
on a 5–point scale and all customer ratings are averaged to arrive at one
number between 1 and 5 for a rep’s customer service rating. Ratings of 4
or 5 increase the bonus, and ratings of 1 or 2 lower the bonus; we include
some sample percentages for increasing and decreasing the bonus under
these circumstances. We have also included some sample logic for how
the annual bonus is decreased if purchases are less than orders, but the
exact logic would have to be determined from more analysis since
specifics are not included in the exercise.
(purchase–routine)
BEGIN IF
IF customer–annual–purchases greater than $100,000
THEN SUBTRACT (.1 X purchase–amount) from purchase–amount
END IF
ADD purchase–amount to customer–annual–purchases
ADD purchase–amount to rep–sales
BEGIN IF
IF purchase within rep–region AND purchase is not a shared–sale
THEN ADD ((.10) X purchase–amount) to rep–commission
END IF
BEGIN IF
IF purchase within rep–region AND purchase is a shared–sale
THEN ADD ((.08) X purchase–amount) to rep–commission
END IF
BEGIN IF
If purchase not within rep–region
THEN ADD ((.02) X purchase–amount) to rep–commission
END IF
BEGIN IF
IF rep-sales equal to or greater than rep–sales–goal
THEN ADD 5% of purchase–amount to rep–commission
END IF
(rep–bonus)
BEGIN IF
IF rep–sales equal to or greater than rep–sales–goal
THEN GRANT family vacation
END IF
CALCULATE rep–bonus based on rep–sales
BEGIN IF
IF customer–satisfaction–rating equal to or greater than 4
THEN INCREASE rep–bonus by (customer–satisfaction–rating
multiplied by (.01))
END IF
BEGIN IF
If customer–satisfaction–rating equal to or less than 2
THEN DECREASE rep–bonus by ((customer–satisfaction–rating
multiplied by
(.01)) minus .1) multiplied by 2)
END IF
BEGIN IF
IF rep–amount–of–orders is equal to or greater than 125% of rep–
sales
THEN DECREASE rep–bonus by rep–amount–of–overage
END IF
PAY rep–commission plus rep–bonus
Conditions/ Rules
Sections <1> <––2––> <3>
Courses of Action 1 2 3 4 5 6
7
Customer–annual–purchases >$100,000 Y N – – – –
–
Purchase within rep region – – Y Y N –
–
Shared Sale – – N Y – –
–
Rep–sales => rep–sales–goal – – – – – Y
N
Subtract 10% from purchase–amount 1
Add purchase–amount to customer–annual–purchases 2 2
2
Add purchase–amount to rep–sales 3 3 3
Add 10% of purchase–amount to rep–commission 4
Add 8% of purchase–amount to rep–commission 4
Add 2% of purchase–amount to rep–commission
4
Add 5% of purchase–amount to rep–commission
5
Y 3
Pay 8% commission
N
2
Y Pay 15% commission
N 3
Pay 10% commission
N
1
Y Pay 7% commission
2 3
Pay 2% commission
N
For this answer it was assumed that all possible levels would participate
in the review. Also presented are a sample decision table and
corresponding decision tree for one piece of this process, the decision
whether a faculty member should go up for tenure (the first BEGIN IF
block in the Structured English code). Each of these models is useful in its
own way. The Structured English model helps you see the “line by line”
logic that will later translate into code. The table and tree help you to see
particular pieces of the logic that are difficult to decipher from the lines of
text with the Structured English approach.
BEGIN IF
IF faculty-member length-of-service equals 6 years
OR IF faculty-member has permission-for-early-tenure
THEN faculty-member SUBMITS tenure-packet
END IF
DO
department committee REVIEW packet
department chair REVIEW packet
school/college committee REVIEW packet
associate dean REVIEW packet
dean REVIEW packet
university-wide faculty committee REVIEW packet
provost REVIEW packet
president REVIEW packet
(review process — same for each type of review)
DO
EVALUATE research-accomplishments
EVALUATE teaching-performance
EVALUATE service-contributions
MAKE AND WRITE recommendation/decision
Conditions/ Rules
Courses of Action 1 2 3 4
Length of Service S N S N
Special Permission Y Y N N
Go up for tenure X X X
Postpone tenure review X
Y Go up for tenure
S 2
Go up for tenure
N
1
Y Go up for tenure
N 2
Postpone tenure review
N
BEGIN IF
IF user-status equals light
OR IF user-status equals moderate AND user has
approval-for-standard
THEN ISSUE standard-hardware-complement
END IF
BEGIN IF
IF user-status equals heavy
OR IF user-status equals moderate AND user has
approval-for-upgrade
THEN ISSUE upgrade-hardware-complement
END IF
BEGIN IF
IF user-status equals mobile
THEN ISSUE mobile-hardware-complement
END IF
BEGIN IF
IF user-hardware-needs equal special
THEN ISSUE additional-hardware
END IF
BEGIN IF
IF user-software-needs equal special
THEN ISSUE special-software complement
ELSE ISSUE standard-software-complement
END IF
Conditions/ Rules
Courses of Action 1 2 3 4 5 6 7 8
User Status L L H M O L H M O
Special Approvals S S S S U U U U
Standard Complement X X X
Upgrade Complement X X X
Mobile Complement X X
User Status: L = light; H = heavy; M = moderate; O = mobile
Special Approvals: S = standard; approval for standard complement
U = upgrade; approval for upgrade complement
S Standard complement
2
U Standard complement
S Upgrade complement
2
U Upgrade complement
1
S Standard complement
2
U Upgrade complement
S Mobile complement
2
U Mobile complement
13.A suggested answer for this question is provided below.
Y Take 2 Major
Classes & 1
1 Elective
Take 1 Major
N Classes & 1
Elective
Register for
R = Replacement Class(es)
P, PL, EC, C
4 Y & MA
Register for
N P, PL, EC, C
Y & 1 R for
Y Register
4 P, PL, EC,
Y 3 MA & 1 R
Register for
N Y P, PL, EC, &
Y 4 N 2Register
R for
2 P, PL, C,
Register forMA
Y 3 P,&PL,
1 RC, &
Y N Register for
N 4 P,2 PL,
R MA &
1 2R
N Registerfor
Register for
Y Y N P, PL, &
EC, C, MA 3R
Y
N 2 4 &2R
3 Register for
N EC, C, & 3 R
Y Register for
N 4
N EC, MA & 3
Y Register for
R
N EC & 4 Rfor
Y Register
3
4 C, MA & 3
R
Register for
N C & 4 R
N Y Register for
4
MA & 4 R
N Register for
RR
14.A suggested answer is provided below.
Appl
6
y
7 Appl
Y y
Y Do
Not
Appl
Appl
N
6 yy
Y N
Appl
Y 7
Y y
3 Do
Y
4
N Not
Do
Appl
N yNot
N Appl
N Y Appl
y
Y 6 y
Y Appl
Y Y 5 7 y
N Do
3 Not
1
N N
Do
Appl
yNot
Y Appl
Appl
Y N Y 6
N yy
Y 5 Y Appl
N 7
2 4
N y
N Do
N Not
N Do
Appl
Not
y
Do
Appl
Not
y
Do
Appl
Not
y
Appl
y
15.A suggested answer is provided below.
Ap
pro
Y Y ve
Ap
7 9 pro
Y
ve
De
N 8 ny
De
Y Ap
ny
N pro
7 YN Ap
ve
Y pro
ve
8 De
N ny
Y 4
Y Ap
GetYadd'l N pro
N applic info &Y Ap
ve
Y
1 forward to VP pro
Y ve
7 8
3 De
Y Y Ap
ny
N pro
N N 6
ve
N
N De
2
7 ny
De
N
5 N
ny
N
Forward
to VP
Guidelines for Using the Field Exercises
1. To order a cap and gown a student typically begins by giving her name,
address, phone number, payment, and payment information. She then
must either give or be measured for cap and gown sizes. Next, the
student must indicate her area of study so that a corresponding color for
the cap tassel can be ordered. Some areas of study and their
corresponding colors are: agriculture is maize, economics is copper,
medicine is green, arts is white, teaching is white, science is golden
yellow, architecture is violet, business administration is drab, engineering
is orange, fine arts is brown, forestry is russet, music is pink, and public
administration is peacock blue. The sleeves on the gown are also
different for the different degrees conferred. Bachelor candidate gowns
have long pointed sleeves, master candidate gowns have long, closed
sleeves that are open at the wrists, and doctoral candidate gowns have
round, bell–shaped sleeves and velvet about the neck and on chevrons
on the sleeves. In addition, the hoods worn are different. Bachelor
candidates wear either a small hood or none at all, master candidates
wear hoods of moderate length, and doctoral candidates wear a full hood.
These hoods also have colors that are significant. The hoods are lined
with the colors of the college or university, and the hoods are trimmed
with the color of graduate’s area of study. Presented below is some
sample Structured English for pieces of a cap and gown ordering process.
The advantage of using Structured English here versus using decision
tables or decision trees is that a lot of information and logic can be
summarized succinctly in these models. Structured English can more
easily be converted into useable code, and identifiable modules of logic
are easily created.
DO
GET customer-information
GET cap-size
GET gown-size
BEGIN IF
IF customer is bachelor-candidate
THEN ISSUE cap
ISSUE bachelor-gown
ISSUE tassel
END IF
BEGIN IF
IF customer is master-candidate
THEN ISSUE cap
ISSUE master-gown
ISSUE tassel
ISSUE master-hood
ELSE ISSUE cap
ISSUE doctoral-gown
ISSUE tassel
ISSUE doctoral-hood
END IF
BEGIN IF
IF area-of-study is economics
THEN color-of-tassel AND color-of-hood-lining is copper
END IF
BEGIN IF
IF area-of-study is teaching
THEN color-of-tassel AND color-of-hood-lining is white
END IF
BEGIN IF
IF area-of-study is business administration
THEN color-of-tassel AND color-of-hood-lining is drab
END IF
BEGIN IF
IF area-of-study is engineering
THEN color-of-tassel AND color-of-hood-lining is orange
END IF
2. The English language is vast, rich, and complex. There are any number of
ways that a thought or idea can be expressed. Thus, it is difficult to
represent process logic with regular written English in a way that is
simple, consistent, and will convey the exact, unambiguous meaning to
everyone who reads it. The Structured English approach provides a
relatively small, truncated version of English that is tailored to
representing procedure and action, is more easily and consistently
understood by people, and can easily be converted to code.
1. Where did Frank Napier find the information he needed to develop the
decision logic models shown in this case? Where else might he look to
extend and validate his work?
2. What are the relationships between data flow diagrams and logic models
such as decision tables and trees? How does an analyst use these
different models to cross–check each?
3. Was it really necessary for Frank to develop both Figures 2 and 3? Do you
think that different types of errors in representing decision logic could be
identified using one or the other of these types of decision models, and if
so, what types of errors might more likely be found using each type of
decision model?
10
Structuring System Requirements:
Conceptual Data Modeling
Chapter Overview
The purpose of this chapter is to present a detailed description of the
techniques used to structure the data requirements for an information system
application. The chapter emphasizes entity–relationship (E–R) diagramming,
the most common notation used by practicing systems and data analysts.
The chapter explains how E–R diagramming is used along with process and
logic modeling techniques to develop a thorough, unambiguous description of
system requirements. In addition to the standard constructs of the E–R model
(entities, attributes, and relationships), we also describe the data–oriented
questions that should be raised during requirements determination so that an
analyst can do data modeling. The chapter also introduces the modeling of
business rules for entity integrity, referential integrity, domains, and
triggering operations using both E–R diagrams and textual constraint
statements.
Instructional Objectives
Specific student learning objectives are included in the beginning of the
chapter. From an instructor’s point of view, the objectives of this chapter are
to:
2. Present the E–R model as a conceptual data model that can be used to
capture the structure and much (although not all) of the semantics (or
meaning) of data in several front–end stages of the systems development
process.
3. Show students how data, process, and logic models all represent data
requirements, but that conceptual data models (such as an E–R diagram)
provide a more thorough and stable representation of data than do other
types of system structures.
4. Show students, via an example from Hoosier Burger, how to match data
requirements from data, process, and logic system models. This example
emphasizes the differences between data stores and data entities, yet
shows how to reconcile process and data models to be sure each covers
all data requirements (while each represents different semantics about
data).
Classroom Ideas
1. This chapter was written to be read following Chapters 8 and 9 on
process and logic modeling, respectively. Many instructors, however,
want to emphasize data modeling by having students study data
modeling first among requirements structuring methods. If you wish to do
this, you can tell students to skip reading the section “An Example of
Conceptual Data Modeling at Hoosier Burger,” which is the only section of
this chapter that is tightly linked to the preceding chapters. You can then
have students read this section after reading Chapters 8 and 9.
3. This is a very detailed chapter, and there are many concepts as well as
notations to cover. We suggest that you devote at least two lecture
periods to this chapter, and if possible schedule a third session that you
devote entirely to working sample exercises with your students.
6. Introduce the notation that is used in the chapter for E–R diagrams
(Figure 10–5). Give an example (and then have students give examples)
for each of the constructs shown in the figure.
7. Contrast the terms “entity type” and “entity instance.” Discuss other
examples, such as STUDENT (with each student in the classroom as an
instance). Warn the students that the term “entity” is often used either
way, with the meaning intended to come from the context in which it is
used.
8. Discuss the representation of multivalued attributes and repeating groups
in E–R diagrams and give some examples. If students are familiar with
programming languages that support arrays and other data structures of
repeating data, use this understanding to emphasize the need to
separate conceptual from physical data modeling.
9. Discuss relationships and their different degrees (Figure 10–6). Have your
students develop additional examples (we find that students can be quite
creative with this type of exercise when paired up in class!).
12. Unary and ternary relationships can be especially difficult for some
students. Present several examples of each (for unary, for example, a
hierarchical organization structure, or the relationships between
geographical areas or governmental territories; for ternary, for example,
a faculty member advising students about majors, or a customer buying
products through different sales channels).
13. If you have the time, an exciting way for students to better appreciate
conceptual data modeling is to listen to a guest speaker who has
developed an enterprise data model for a local organization. Students are
usually amazed by how many entities and relationships exist in any
reasonably–sized organization (several dozen entities and relationships
are common, and models with a hundred entities exist). Such a guest can
usually discuss the difficulties in developing this data model,
misunderstandings people had or controversies that existed before the
data model was developed, how the data model is being used to guide
the development of many new or redesigned systems, and the
administrative effort necessary to maintain such a data model (as well as
many other topics).
14. We have discovered that students who study process modeling before
data modeling often have some special difficulties with this chapter. First,
students may try to include entities for the sources and sinks for the
process model. You must emphasize with your students that data entities
have to be described by attributes, and each instance must have a
primary key. Further, there will usually be multiple instances. For
example, in a data model for a retail store, a student might include the
store or the store’s manager as a data entity. Such concepts do not
satisfy the definition of a data entity. Second, students may try to use
relationships to represent data flows rather than structural associations
between entities. This often occurs when students try to model system
outputs as entities. For example, some students will create an entity for a
major system report (say a monthly sales summary report), and then
show a relationship between the customer entity and the report. You
should emphasize that although copies of the report may be kept on file,
system outputs are derived from other data; these data are used to
produce any of the system outputs, and hence the outputs are
redundant.
4. Data stores, data flows, and even processes all provide information for
data modeling. A data store often represents one or more data entities
and their associated attributes. All data in data flows must either be
stored in some entity, be computed from data in entities, or in rare
circumstances pass through the system. The description of a process
can shed light on business rules that must be represented in the data
model.
12. The primary deliverable for the conceptual modeling part of analysis is
an E-R diagram, showing the major categories of data and the business
relationships between them. A full set of entries about data objects to
be stored in the project repository is also produced.
14. An identifier that meets the criteria set forth in the chapter would be
an ideal choice. The criteria include: (1) choosing an attribute that will
not change its value over the life of each entity type, (2) choosing an
attribute that for each instance of the entity will have valid values and
will not be null, (3) avoiding intelligent key usage, and (4) substituting
surrogate keys for large composite keys.
15. E-R diagrams are produced (1) to cover just the data needed in the
project’s application; (2) for the application system being replaced; (3)
to document the entire database from which the new application’s data
is extracted; and (4) for the whole database from which data for the
application being replaced is drawn.
C_Description
Component No
Product No Unit of Measure
COMPRISED 3
PRODUCT COMPONENT
OF
Cost
C_Quantity
P_Description
Current Price
Order No T_Price
Date No of Shares
4. Many CASE tools already have facilities to help people create and edit
E–R diagrams. Users can use the mouse to select drawing tools, such
as for drawing entity symbols, from a tool palette and draw symbols
with a click and drag of the mouse. Some tools also let users link the
elements of the E–R diagram directly with elements of a data
repository and other parts of the CASE tool. Such a tool might also
have a library of “generic” diagrams and relationships for common
business processes (e.g., order entry, manufacturing company,
personnel management). Users could then choose the diagrams for a
corresponding process and quickly and easily edit them so that they fit
with the situation. A data modeling CASE tool might also be able to
translate verbal descriptions of business rules into semantically rich
data models. Such a feature would allow more direct translation from
requirements determination to requirements structuring. Also, an E–R
tool should be seamlessly integrated with other requirements
structuring tools, so that all dimensions (data structure, data
movement, processing logic, and timing of events) of the same object
can be nonredundantly and consistently modeled.
10. Following is one possible set of relationship cardinalities for Figure 10–
18.
11. Each of the four statements in the exercise yields a new entity and
relationship with an entity in Figure 10–18.
(2) From our experience, the statement in this exercise that causes
the most difficulty is the one about customers becoming
“members” with unique benefits. The debatable term is “unique.”
We suggest that “unique” means that only members, not other
customers, receive those benefits. Then the following
representation would be reasonable: Create a BENEFIT entity and a
many–to–many Receives relationship between BENEFIT and
CUSTOMER such that a customer receives zero (not all customers
are members) to many benefits (each benefit is recorded as a
separate instance of the BENEFIT entity), and a benefit is received
by zero (on a transient basis, nobody may hold a given benefit) to
many customers (this also allows different members to receive
different benefits). Again, this statement points out how much
more precise an E–R model is than is a requirements, narrative
statement.
(3) The creation of manufacturing teams adds a TEAM entity (the
exercise does not say we need to know what employees are on a
team) and a Produces relationship such that a team produces one
to many products, and a product is produced by exactly one team
(teams get unique sets of products, and some team has to produce
each product).
12. Student answers will vary depending on the document they find. Each
of the types of documents mentioned generally involve three or four
entities or gerunds, with a gerund representing the many–to–many
relationship between two of the other entities. Also, each of these
documents have master entity or header data and detail or line item
data. The following figure, showing data found on a typical customer
sales receipt, is representative of each of these three situations. Since
the gerund LINE ITEM does not have a specific attribute for its primary
key, we show the primary key as the concatenation of the primary keys
from the associated entities, which is typical of gerunds. Since
normalization is not done until logical data modeling (see Chapter 16),
students may combine some entities. For example, in the following
figure, it is permissible to combine the CUSTOMER attributes into the
CUSTOMER RECEIPT entity.
14. This is actually a fairly complex situation. For the exercise here, we
take the statement literally that a reservation is a ternary relationship
(a gerund if it has associated data) between the three listed entities.
We assume that a flight means a flight on a particular day, hence flight
has a composite primary key. Thus, a seat on a flight may have a
passenger. A passenger must have some seat on one or many flights.
A passenger will have exactly one seat on a given flight. The following
E–R diagram depicts this situation.
Name State
CUS
TOM
ER
Plac
Custom Zip
es
er_No
ORD
ER
Incl
udes
PRO
DUC
T Order_
Date
Order_
No
Promise
_Date
Quantit
y
Descrip
tion
Product
_No
Unit_Pr
ice
FE #18, Part A:
Offer_Date,
Offer_Price
Offer_Name
Propert PRO
y_No
FE #18, Part B:
Offer_
Propert Offer_ Date Offer_P
y_No No rice
Offer_
PRO OFF Name
PER ER
TY
FE #18, Part C:
Offer_
Date
PRO
OFF
Buyer_
No
POT
Name
Phone_
No
Address
FE #19, Part A:
Is_
Marr Date_M
ied_t arried
o
FE #19, Part B:
Marr
ied Date_M
arried
20. One suggested answer for a domain integrity rule follows. Ask students
if limits should be placed on the range of this attribute. Why or Why
not? For the triggering operation, an assumption is made that when an
account is first opened the initial balance cannot be less than $100.00.
Domain Definition:
Name: Balance
Meaning: Balance of the Customer’s Account
Data Type: Numeric
Format: 2 decimal Places
Uniqueness: Nonunique
Null support: Non-null
Triggering Operation:
21. The text and figures of Problems and Exercises 10 and 11 do not tell us
much about the processes and logic underlying these data and
relationships. We do know that there will be data stores on the DFDs
for the associated business situation that contain the same attributes
as contained on the E–R diagram. These E–R diagrams do, however,
tell us a bit about the business rules that apply. For example, we know
that each sales representative is assigned to a small, unique set of
customers, that some customers are “members,” which entitles them
to special benefits, and so on. These are all statements that would
have been collected during requirements determination and would be
listed as business rules. There would be processing step where, for
example, customers would be assigned their benefits, but the process
description for the associated processing steps would not show the
rules which govern the assignment of benefits to customers. A decision
table might outline these rules, the result of which is the determination
of which benefits a member receives.
While the E–R diagrams tell us much about the data, relationships
among data, and the relevant business rules, the process models
(DFDs) and the logic models (Structured English, decision tables, and
decision trees) from previous chapters tell us more about the business
process and the flow of data. Obviously, we need to know about the
data, the relationships, the business rules, and the business processes
in order do develop a good system. Thus, the various modeling
techniques are complementary. If either data or logic modeling
techniques were done poorly (or not done at all) the resulting system
would suffer. For example, if data modeling were left out, the business
process would be understood well but the implementation of the
databases would likely be flawed. The system would probably provide
information to the right person at the right time, but the information
would be useless. Conversely, if logic modeling techniques were done
poorly, the databases might be implemented well, but they wouldn’t
be doing anyone much good.
22. This is one of the more complex exercises since there are many
entities and relationships and some complicated business rules. We
assume that a case worker may not have been assigned a purchase
request yet, and that some vendors, who only bid on the large
purchase requests, are not approved to supply commonly purchased
products and services. We assume that a purchase request is for
exactly one product or service. We also assume that a purchase
request is tracked before bids start to come in. Finally, we assume that
to be recognized as a customer, the “customer” must have submitted
at least one purchase request. The E–R diagram can be more explicit
(than we show below) if generalization modeling techniques are used.
Without supertype and subtype relationships, we are forced to use a
TYPE attribute on the PURCHASE REQUEST entity; we would have to
write detailed business rules that indicate that large purchase requests
require bids, whereas small requests do not. It also appears from the
text of the exercise that only small purchase requests are associated
with products and services, which would necessitate a business rule to
elaborate on the E–R diagram. An E–R diagram, using just the concepts
discussed in Chapter 10 and including a few attributes, follows.
Problem and Exercise 22
Wants to Buy
Submits PURCHASE PRODUCT/
CUSTOMER
Is Submitted by REQUEST Is Bought on SERVICE
Has Approved
Has Assigned Awarded to Supplier
EMPL ID
Is Approved
to Supply
Is Awarded to
CASE
BID VENDOR
WORKER Is Assigned to
2. The students should find that the E–R diagramming technique is fairly
robust and applicable across a variety of situations. There should be
little or no difference in using the technique for service– versus
product–oriented organizations. Similarly, there should be little or no
differences in using the technique for public, private, or governmental
organizations. The students may find that governmental organizations
are a bit more rule–bound than are non–governmental organizations,
and so there may be more and stricter rules that apply to data. Other
than this, the only major differences found should be in the various
ways that data happen to be stored and used in these organizations.
This is not likely to be based on the “type” of organization, but on the
choices made for managing data and business processes. Some more
detailed and dedicated students may find that the E–R model needs
more semantic richness or some extended constructs. Business rules
provide one useful extension. As an alternative, you might suggest that
students read about the object–oriented database model; some people
believe that the OO data model is richer than the E–R model, and your
students will certainly find many similarities.
4. If the students find analysts who have experience with conceptual data
modeling, then these analysts are likely to be able to come up with
examples for all three relationships. The analysts’ experiences with
each type of relationship will vary depending on their amount and level
of experience with modeling and the relatively complexity of the
systems they help to develop and maintain.
5. Students are likely to find that where E-R diagrams are being used the
systems personnel are probably using CASE tools to create and edit
them. Many of these CASE tools have been discussed throughout this
book. CASE tools with E–R diagramming features are very effective for
the creation and manipulation of good E–R diagrams and the linking of
E–R diagram elements to other information within the CASE tool and
system. For those people that are drawing E–R diagrams by hand,
perhaps they do not know of or haven’t yet found the proper
automated tool for doing so. Even with the limitations of CASE tools to
draw advanced E–R features (such as ternary relationships), advanced
features can be simulated and useful, approximate data models (albeit
imprecise for generating code) can be created.
7: The answer is similar to that for FE 6 in that the details of the diagram
will depend on the ER diagramming method being used. The bill-of-
materials ER diagram will also be more specific as it will pertain to a
specific assembly or subassembly.
The case contains primarily dialogue between a data analyst and two
systems analysts as the data analyst and one of the system analysts explain
their joint work to the second systems analyst. In this dialogue the analysts
discuss the use of the CASE repository and its querying capabilities, the
linkages between an E–R model and other requirements structuring
documentation (such as decision tables, data flow diagrams, and state–
transition diagrams), and standards for drawing E–R diagrams. The case
reads like a mini–structured walkthrough, so your students might develop
some sense for how to conduct a walkthrough from reading this case. The
case also teases out some physical database design issues, and emphasizes
by example how conceptual, logical, and physical database design issues are
kept as much separate from one another as possible during systems
development. Overall, the case emphasizes the importance of being
impertinent when doing data modeling, and the need to have an intimate
understanding of the rules by which the business operates in order to make
the data model and associated repository entries semantically rich.
This case is not very complex and does not contain any conflict since the
conceptual data model is not very complicated. For many multi–user, multi–
department systems, a conceptual data model can contain several dozen
entities and possibly a hundred relationships. Even with its relative simplicity,
this case can, however, be used to stimulate some interesting class
discussion about the necessary impertinence of analysts involved in data
modeling. Thus, we recommend that you take some time in class, probably
after you lecture on Chapter 7, to discuss some questions based on this case.
Some possible discussion questions are the following:
1. The case discusses a “keyword search capability in the CASE tool.” How
do you think Buffy and Jorge used this capability? What contents of the
repository were they searching? What difficulties might they encounter in
doing a keyword search? How could they overcome such difficulties?
2. On page 381 of the case, the business rule is given that a video customer
transaction can link a product with a particular video. Do Buffy and Jorge
have any other choices on how to model this association without violating
the business rule (currently, they chose to link the customer transaction
and the product profile)?
3. On page 385, Buffy argues for the separation of conceptual, logical, and
physical data modeling. Do you accept her argument? Why or why not?
5. What are some examples of business rules not shown on the E–R diagram
or stated in Figure 3 that should be written to fully document the data
model for CATS?
6. What are the pros and cons of including attributes on an E–R diagram
versus separately in only a repository report?
7. What do you think the ‘uid’ next to some of the attributes in Figure 3
signifies?
11
Selecting the Best Alternative Design
Strategy
Chapter Overview
This chapter has three primary purposes: (1) to show students that all of the
software associated with a systems development project is not developed in–
house; (2) to emphasize that analysts should consider several design
strategies before choosing the one to pursue for further development in
design; and (3) to return to and update the Baseline Project Plan first
developed during project initiation and planning (Chapter 6). A secondary
purpose is to emphasize to students that the consideration of a packaged
software solution should be done after the analysis efforts are complete, not
as a substitute for analysis.
Finally, we revisit and update the Baseline Project Plan from Chapter 6.
Updating an entire Baseline Project Plan is beyond the scope of this chapter,
so instead we list the sections of the Plan that would be updated and show
how more accurate information can be used to update both the cost benefit
analysis and the project schedule. The BPP needs to be updated at this point
since the end of the analysis phase typically is a project milestone, often with
review by those that must approve continuation of funding for the project.
Instructional Objectives
Specific student learning objectives are included at the beginning of the
chapter. From an instructor’s point of view, the objectives of this chapter are
to:
1. Show students that in–house developed systems are not the only source
for software.
Classroom Ideas
1. Use Figure 11–2 and an updated version of the same information from the
most recent Datamation 100 survey to begin a discussion of the many,
varied sources of software in the marketplace. Datamation also publishes
data for the international market as well as the U.S. market, so such data
can be used as the starting point for a discussion of the international
computer software market.
4. Have students research the proper format and contents for Requests for
Proposal and have them create and/or present RFPs for a specific design
strategy (see Problem and Exercise 3). RFP preparation should include
discussion of the hardware, software, and organizational issues discussed
in the chapter.
5. Work through the Hoosier Burger example in class, including creating the
multi–criteria decision matrix. Expand on student understanding of this
comparison technique by introducing changes in Hoosier Burger’s
objectives and constraints and showing how these changes affect the
matrix and maybe the final choice. Or give students another example,
with objectives, constraints, and some design strategy options, having
them generate alternative strategies and the corresponding matrix (such
as Problems and Exercises 10 and 11).
8. In class, work through the Baseline Project Plan and the changes in it
discussed in the chapter, using Figures 11–7 through 11–11 and Tables
11–5 and 11–6. Have students make some of the specific changes that
are discussed more abstractly in the text. Discuss with students the
reasoning behind a Baseline Project Plan and the purpose it serves. (Also
see Problem and Exercise 8.)
10. Every section of the Baseline Project Plan is updated during the
alternative generation and selection step of analysis.
11. To verify vendor claims about a software package, an analyst can ask
for a software demonstration, use the software (and its documentation
and training materials) personally, talk with other users of the software,
and consult independent software testing and abstracting services
(surveys available for a fee).
3. The request for proposal (RFP) is used when the organization wants to
solicit proposals from several competing vendors. RFPs usually first give
some background information on the company and the business units
involved in the request, an explanation of the information systems needs,
a description of what is wanted from the vendors (i.e., what information
they must provide or other actions they must take), and an explanation of
any rules or procedures for the RFP and system development process.
The bulk of the document then describes the mandatory, essential, and
desirable requirements in the areas of need (e.g., functionality, hardware,
software, and service). Students’ RFP outlines should include these key
features.
The third spreadsheet has the additional criteria of “references” and “in
use.” “References” are written references from other organizations
currently using the vendor’s systems. “In use” means that the technology
proposed must have been in use by a paying customer for 6 months.
These are very common criteria for organizations that value stability of
the vendor and technology over performance and having state-of-the-art
technology. These additional criteria change the outcomes; Alternative B
now has the highest score. These changes appear to have caused the
more stable vendor (i.e., the vendor with the better references and the
track record for using the technology it has proposed) to be chosen over
the vendor who scored higher on other performance indicators.
First
Spreadsheet
(Government Agencies)
Weig
Criteria Alt A Alt B Alt C
ht
Ratin Scor Ratin Scor Ratin Scor
g e g e g e
Requirements
Real-time data
10 5 50 5 50 5 50
entry
Auto re-order 10 3 30 5 50 5 50
Real-time data
10 1 10 3 30 5 50
query
90 130 150
Constraints
Development
25 5 125 4 100 3 75
costs
Hardware costs 25 5 125 4 100 4 100
Time to operation 15 5 75 4 60 3 45
Ease of training 5 5 25 3 15 5 25
350 275 245
Total 100 440 405 395
Second
Spreadsheet
(New Weights for Alternative B)
Weig
Criteria Alt A Alt B Alt C
ht
Ratin Scor Ratin Scor Ratin Scor
g e g e g e
Requirements
Real-time data
18 5 90 5 90 5 90
entry
Auto re-order 18 3 54 5 90 5 90
Real-time data
14 1 14 4 56 5 70
query
158 236 250
Constraints
Development
20 5 100 5 100 3 60
costs
Hardware costs 15 5 75 5 75 4 60
Time to operation 10 5 50 5 50 3 30
Ease of training 5 5 25 4 20 5 25
250 245 175
Total 100 408 481 425
Third Spreadsheet
(Additional Criteria)
Weig
Criteria Alt A Alt B Alt C
ht
Ratin Scor Ratin Scor Ratin Scor
g e g e g e
Requirements
Real-time data
16 5 80 5 80 5 80
entry
Auto re-order 16 3 48 5 80 5 80
Real-time data
12 1 12 3 36 5 60
query
140 196 220
Constraints
Development
16 5 80 4 64 3 48
costs
Hardware costs 13 5 65 4 52 4 52
Time to operation 8 5 40 4 32 3 24
Ease of training 3 5 15 3 9 5 15
200 157 139
Other
References 8 3 24 4 32 4 32
In use 8 5 40 3 24 1 8
64 56 40
Total 100 404 409 399
5. The list for evaluating computer hardware and system software would
be very similar to that for selecting off-the-shelf application software. In
addition to cost, functionality, vendor support, viability of vendor,
flexibility, documentation, response time (or other performance criteria,
such as number of transactions per unit of time or other benchmark tests
or raw processor speed), and ease of installation, we might include: the
current staff’s familiarity with the new system, need for retraining,
compatibility and connectivity with current systems, cost of converting
old systems to the new platform, ease of future upgrades, and track
record of the vendor in successfully implementing this new system in
other organizations.
6. For this method of evaluation to be valid, one assumes that all relevant
criteria are known and included and that the weights and ratings are
accurate. More important, this method assumes that the alternatives and
criteria lend themselves to a quantitative analysis. Some people argue
that some parts of the analysis inherently cannot be quantified. For
example, it is difficult to truly explicitly rate and weight the amount of
trust that you can place in a vendor and your belief that they will indeed
follow through on their claims. Further, this method assumes that the
criteria are independent of each other, and thus scores are additive.
When multiple decision makers will collaborate and make the decision
together, there are several methods for incorporating their interactive
input. For example, for a quantitative analysis such as that presented in
Figure 11-6, each decision maker could first enter their ratings for each
alternative across each criteria. This data could then be summarized
using a spreadsheet, and the average and/or summary rating across all
decision makers could then be used to choose a vendor. In addition,
group support systems could be used to tally the individual, anonymous
ideas, comments, and/or votes of multiple, collaborating decision makers.
Since there are many multi–criteria decision-making methods (e.g.,
another popular one uses pairwise comparisons), students may come up
with many alternatives for this question.
10. Some basic system alternatives include: (1) build the system in-house
using a programming language such as C or Microsoft Visual Basic; (2)
purchase off-the-shelf packages, such as Microsoft Excel and Access,
along with the necessary computer and telecommunications equipment,
and use these to build the necessary systems in–house; (3) purchase
custom software and a turn–key system from either a generic information
systems consulting firm such as Andersen Consulting or EDS or from a
specialized systems provider for the food retail or pizza retail industry; (4)
outsource the systems to an outside firm.
11. It will be useful for students to create a spreadsheet like that one
presented in Figure 11–6. They should list in the criteria category each of
the requirements and constraints described in the problem, plus any
others that they believe are relevant. As best they can, have them weight
each of these criteria and use them to rank each of the four alternatives
presented in the previous answer. They may have to make some
assumptions in order to complete each of the ratings. This method of
analysis should be useful even for this relatively small system. The
method will force the decision maker to flesh out relevant criteria and
weighting and be as objective as possible in rating each alternative on
each criteria.
12. Having only one design strategy can be problematic in several ways.
First, there will be no guarantee that the best, the correct, or even an
adequate system for the situation is being developed or purchased. This
is not obvious because it is unclear if other alternatives were considered,
and if they were, those present cannot see why the one choice won out.
Second, if the one strategy is because only one vendor is used, there are
no benefits from having multiple vendors compete for an RFP. For
example, the vendor has no incentive to keep their price as low as
possible. Third, without the detailed, public systems specifications that
are part of a competitive bid process, there is not likely to be much in the
way of written documentation to refer back to if the vendor does not
fulfill their promises. If the analysts present only one design strategy
during the oral presentation to the project steering committee or client,
the recommendations are likely to be (at worst) rejected, or (at best)
accepted with great skepticism. It is also possible that those present at
the meeting will start to generate alternatives, each representing that
person’s position. The meeting will likely quickly deteriorate since a fair
assessment of ad hoc alternatives cannot be done within the limits of a
meeting. In any event, this is not a good way to begin the development
of an information system (or to build a career).
13. The list for evaluating alternative custom software developers would be
very similar to that for selecting off-the-shelf application software or for
computer hardware and system software. In addition to cost,
functionality, vendor support, viability of vendor, flexibility,
documentation, response time, and ease of installation, we might include
the current staff’s familiarity with the software, need for retraining,
compatibility and connectivity with current systems, and the track record
of the vendor in successfully implementing similar software in other
organizations. Such vendors should have an established track record of
developing similar software in other organizations. Their references
should be checked thoroughly, including visits to these other sites. If the
developer’s role will end after the application is accepted, then the
reputation of the vendor for handling this transition from external
development to internal maintenance is important. From a legal point of
view, you may want to select a custom developer based on the
willingness to sign a non–disclosure agreement, so that they are not
allowed to develop a similar system for one of your competitors, at least
for some amount of time.
14. The project team can use the advantages of the enterprise resource
planning design as part of their strategy for selling this system. The team
can stress that this solution consists of a series of integrated modules,
these modules are integrated to focus on business processes, and the
firm can integrate all parts of a business process. This approach includes
a single repository of data, thus providing more consistent and accurate
data and less maintenance. These modules are flexible and new modules
can be easily integrated into an existing system.
2. The spreadsheet below presents the quantitative analysis for the three
alternatives described in the previous answer. Speed, storage, ease of
use, reliability, costs, and time to operation were the criteria used. The
mid-range alternative has the highest score because it has acceptable
rankings for the performance–oriented criteria and scores well on the
highly weighted criteria of costs. As is often the case, people often buy
more technology than they really need. The counter argument is that, for
PCs, one should buy as much power as they can reasonably afford so the
technological life of their equipment is longer, and they will be better
able to take advantage of new software as it becomes available.
Field Exercise 2
Spreadsheet
3. Students should be able to either find and use a copy of three different
spreadsheets or find information about each package. They might also try
visiting a computer retailer, particularly a large one such as CompUSA or
Egghead Software. At such stores the students will be able to test a
variety of software packages. Some of the criteria the students are likely
to use include: speed, ease of use, compatibility with other packages,
price, and features. It will be useful for students to compare their
analyses to see the differences and similarities. This will help them to
understand how difficult it is for software vendors to be all things to all
customers.
4. Business people are likely to use this list of criteria in some formal or
informal way. Have the students present their answers to the class so
that they can learn about a variety of companies. It will be useful for
students to see how companies actually use these criteria and methods
in purchasing off–the–shelf software.
6. Chances are any organization that a student contacts about its ERP
implementation will have a lot to say about it, provided they are willing to
share the information. Typically, ERP implementations take several years
and cost quite a bit in terms of consultant fees. There are many reasons
to move to an ERP system, just as there are many reasons to not move to
an ERP system (see the answer to PE 14 above). The organization was
probably attracted to the promise of uniformity and consistency made by
ERP vendors, although the exact reasons will differ from firm to firm.
Chances are good that the organization has had to make some internal
changes, such as realigning departments internally to take advantage of
the opportunities ERP systems offer, as well as to meet the demands ERP
systems make in order to operate most effectively. And the chances are
also good that most of the implementation work has been done by
outside consultants, so for firms not used to managing large numbers of
contractors, an ERP implementation would be a new and different
experience. The implementation is likely still going on at whatever firm a
student happens to talk with, but it has probably been going on for many
months or years, as each ERP implementation is a learning experience for
the consultants and the adopting firm.
The case highlights the various roles of different team members and how
each is the best person to present certain findings. The case also shows how
the team anticipates the perspectives of those who will attend the
presentation and how the presentation content is customized to fit the
audience. Consistent with the suggestions from the chapter, the CATS team
has three alternative design strategies to outline. One of these, Alternative 2,
will likely be a surprise to the students, since it is a purchased package
solution. There has been no hint in prior BEC cases that such an alternative
was possible or being considered. The fact that this arises suggests that the
CATS team has considered all alternatives and has been creative. As noted
earlier, it is only after a thorough analysis that purchased software
alternatives be seriously considered. There is no way the CATS team could
have evaluated a package until all the requirements were collected,
structured, and analyzed. The real surprise is that this turns out to be the
recommendation!
We recommend that you take some time in class, probably after you lecture
on Chapter 11, to discuss several questions based on this case. Some
possible discussion questions are the following:
1. Do you agree with the assignments of who will present what at the CATS
analysis phase walkthrough meeting with the SPB? What would you
change and why?
4. Assuming the requirements and constraints for CATS are necessary and
sufficient, does the analysis presented in Figure 4 make sense? Would
you question any of the weights or ratings?
Chapter Overview
The purpose of Chapter 12 is to introduce students to object-oriented analysis
and design. OOAD’s increasing popularity is brought about in part because of
its ability to represent complex relationships, as well as data and data
processing, with a consistent notation. Students are introduced to several
techniques that systems analysts can use to perform object-oriented analysis
and design. The techniques and notations presented in this chapter include
use cases, class diagrams, state diagrams, and sequence diagrams. The
standard object-oriented language, UML, is used to present these techniques
and notations.
6. Show and discuss how the models are related to each other.
Classroom Ideas
1. An OO specification can become very extensive since all aspects are
integrated into one model, so you will need to use simple examples. After
briefly reviewing OOAD terminology and notation, we recommend that
you teach from examples for the rest of the class. The situations
described in Problem and Exercise 7 are suitable to work in class. Our
experience is that the greatest discussion will center around what
methods should exist and where they should be located (that is, with
what object).
3. Compare and contrast the OOAD phases with the traditional SDLC
phases. Stress to the students that in the beginning the model is
abstract, showing more detail as it moves through the OOAD phases. The
text uses a good analogy; OOAD resembles more of an onion than a
waterfall.
7. An interesting exercise for the students involves the use of Figures 12-20
and 12-21. As a class discussion or group exercise, ask the students to
discuss how these diagrams should be modified (if at all) to
accommodate transfer students from other universities or junior colleges.
A state diagram is a model of the states of an object and the events that
cause the object to change from one state to another. A sequence
diagram depicts the interactions among objects during a certain period of
time.
15. One example of aggregation is a vehicle. A car will have front and side air
bags, an air conditioner, an engine, tires, possibly a trunk, and other
components.
Part A.
7. Part B.
7. Part C.
7. Part D.
7. Part E.
Part A:
14. Part B.
14. Part C:
15. A suggested answer is provided below.
16. An example of a state transition is opening a checking account at a local
bank. Have students use this example and prepare a state transition
diagram.
3. The translation of the EER (or E-R) diagram should map the entity types
and attributes into classes. EER diagrams can represent generalizations
that also map to class diagrams. EER and E-R notation is different than
UML. Association relationships remain the same. E-R diagrams usually
show keys. Keys can be represented with class attribute names followed
by the {key} notation.
4. The main differences will most likely be in the notation used to describe
the model. Students may find systems analysts using Booch, OMT, or
their own custom notation. Students should see if the notations in use
can represent use-cases.
13
Rapid Application Development
Chapter Overview
The purpose of this chapter is to present an overview of one of the more
popular approaches to systems development that differs from the traditional
systems development life cycle, Rapid Application Development. The key
aspect of RAD that makes it so quick is its combined use of CASE tools, rapid
prototyping, and Joint Application Design, with heavy user involvement
throughout the process. This chapter presents an introduction to RAD, the
components of RAD, several approaches to RAD, several success stories, and
the advantages and disadvantages of RAD. Martin’s approach to RAD, as well
as the McConnell approach, is overviewed in this chapter. To help students
see the application of RAD, a specific RAD life cycle (Cambridge Technology
Partners) and three RAD success stories are presented. This chapter
concludes with a discussion of the advantages and disadvantage of RAD.
Instructional Objectives
Specific student learning objectives are included at the beginning of the
chapter. From an instructor’s point of view, the objectives of this chapter are
to:
2. Compare and contrast RAD with the traditional systems development life
cycle.
Classroom Ideas
1. Use Figure 13-1 to compare and contrast the RAD systems development
life cycle to the traditional SDLC.
2. Ask students to research RAD in both of Martin’s many writings on the
subject and in the trade press. Ask them to present their findings to the
class.
5. Encourage students to visit the Borland Delphi Web site and read the
cases presented there. Have the students summarize their findings.
6. If possible have a systems analyst speak to your class about how his/her
company utilizes RAD.
3. Both Martin and McConnell present differing views of the four RAD pillars.
Martin’s four pillars include tools, people, management, and
methodology. Tools refers to the software development tools; people
refers to individuals having the right skills; methodology identifies the
tasks and the ordering of these tasks; management provides facilitation
and support. Martin further suggests that an organization should “grow
into” the RAD development approach. McConnell’s four pillars of RAD
include avoiding classic mistakes, applying development fundamentals,
managing risks, and applying schedule-oriented practices. McConnell’s
RAD approach has a more conservative management flavor, stressing the
avoidance of mistakes such as the silver-bullet syndrome, requirements
gold plating, and feature creep. He also stresses the application of
development fundamentals and risk management. After “efficient
development” has occurred, then schedule-oriented practices can be
developed.
4. Prototyping, JAD, integrated CASE tools with code generators, CASE tool
repositories, and/or visual development environments are important
components. JAD sessions can be used to facilitate the prototyping
process, where users and analysts are working together to define
requirements and design new systems. Integrated CASE tools and code
generators can be utilized to design and implement the new production
system. The CASE tool repository is beneficial in that it promotes the
reuse of templates, components, or previous systems described in the
repository.
5. The two trends mentioned in the text are the increased speed and
turbulence of doing business in the late 1980s and early 1990s and the
ready availability of high-powered computer-based tools to support
systems development and easy maintenance.
8. The Martin and Cambridge approaches are very similar. Figure 13-7 can
be used to illustrate this point. Martin’s requirements planning phase
corresponds to the first two phases of the Cambridge approach, scope
and rapid solutions workshop. Each approach has a design phase;
Cambridge’s development phase is similar to Martin’s construction
phase; Martin’s cutover phase is similar to Cambridge’s rollout phase.
10. The problem situation will dictate when RAD should be used; however,
the primary advantage of RAD can be used to answer part of this
question. Systems requiring rapid development are prime candidates for
this approach, thus systems responding to new government regulations,
opportunities for competitive advantage, and/or changing business
conditions would fall in this category. Total reliance on RAD for all systems
development can pose problems with nonconformance to standards, lack
of reusability between system components, and lack of consistency
between systems modules. Systems requiring tight integration with other
systems would most probably benefit from a more traditional systems
development approach.
11. JAD is one component that is useful during the RAD process. Analysts and
users rely on JAD-like sessions to facilitate the prototyping process.
3. Since the RAD four-phase life cycle resembles the SDLC, these can be
complementary methodologies. RAD can be used to accelerate the SDLC
steps of analysis through installation. RAD could be used on selected
modules of a new system—modules that needed to be developed quickly
and that are more stand-alone.
2. The difficulty with this question is that there are so many different
implementations of RAD, most firms will say they have used RAD but
with vastly different processes and results. Thus, the reasons for
project selection will likely vary. What is important is to understand
how an organization chooses to use the methods, techniques, and
tools it does under what circumstances. Students will likely find that
there are many common influential factors, but that the history of
information systems successes and failure in each organization causes
certain factors to dominate. Have the students present their findings
and try to draw comparisons across organizations.
Introduction
What I’d like you to do is meet with Hank and his staff and
find out what kind of help he’d like from us. This will be a
“free” session, part of developing potential business for us
with his department. After you meet with Hank, organize
your thoughts into a recommendation for me and Hank on
what kind of analysis we might do for Vehicle Management.
Prepare a presentation that you can take to Hank to sell our
business analysis services. Remember, now that we are a
profit center, we have to sell clients on the idea that we can
help them solve their business problems. We don’t give free
advice anymore! If we tell Hank what to do, he’s likely to hire
someone else to implement the solution.
Hank is a pretty astute manager, although still learning
about his new department. So, you’ll have to develop a clear
proposal and figure out what key points are necessary to sell
our services. This should be a good opportunity for you to
show me that you can generate new business for Business
Systems. How’s that for a challenge?
Jim, it was good to see you again last week at the company
picnic. Time has passed quickly since we graduated from
Mid–State University. I'll never forget our I–core group!!
Again, congratulations on your promotion. You people in
systems always seemed to have a leg up on the rest of us.
selling vehicles at the best time (we can get the best
trade–in price when we sell a vehicle with the right
combination of mileage and age)
Background
Questions
Overview
Let me know when you’d like to talk about these. If you know
of anyway we could get some help thinking about these
issues, I’d be glad to discuss my concerns with anyone.
****************
Teaching Notes for EDS Video
Introduction
In this section we overview and suggest how you might use the four video
segments based on the Broadway Entertainment Company; these video
segments are provided to adopters of the second edition of Modern Systems
Analysis and Design. These video segments are referenced in selected
chapters of this Instructor’s Manual; these references are intended to serve
as guides, indicating which video segments are appropriate for certain
chapters. Please check our web site (http://hepg.awl.com) for the latest
information about updates to these video segments.
All four video segments are realistic and practical examples of situations a
systems analyst might confront or in which she/he might be involved. The
video segments were written and produced by EDS Corporation, with
guidance from the textbook authors. Thus, the video segments are consistent
with the textbook (so your students can easily follow the video segments as
an integral part of the course), and they represent issues and ideas
encountered by one of the leading systems development and management
consulting firms in the world. The authors are indebted to Chris Ryan, Stu
Bailey, and Terry Zeuchow of EDS and Bob Tucker of Antaries Alliance (a CASE
tool firm partially owned by EDS) for their leadership in writing and producing
these video segments, and to Vern Olson of EDS for championing this project
to senior management within EDS.
In the following sections we overview each video segment and suggest some
discussion questions to use with students after they have viewed the video
segment. We suggest that you preview each video segment since we are
certain that you will see additional discussion points in each video segment,
and you will see various ways to link the video segment into your classroom
experience. We also suggest that you distribute at least a few of the
discussion questions to your students before they view the video segment.
This will help them think about the video segment as they view it, rather than
using the viewing of the video segment simply as a break in the class. Some
of the discussion questions could also be used as written assignments to be
turned in at the next class.
You do not need to use all of the video segments, and you do not need to use
them in any particular sequence. We have designed the video segments so
that each is independent of the other three, yet they fit together since they
all involve the same organization, have many of the same principle roles, and
have a consistent format and use consistent terminology. Each video
segment ends with a brief summary by one of the textbook authors, and one
of the video segments has an introduction by two of the textbook authors;
students are given some guidance to the main points of each video segment
through these elements of the video segments. However, at no point does
one video segment refer to another video segment nor do the authors refer
to specific textbook chapters. Thus, you have considerable freedom to use
the video segments as you wish, and you may find that you can show a video
segment with a chapter with which we did not expect that video segment to
fit. We encourage you to use the video segments creatively and to share your
insights on the video segments with others through the WWW site on the
textbook maintained by the publisher, Addison Wesley Longman.
This video segment (which we suggest can be used best with Chapters 5 and
6) highlights two of the most common issues facing a systems analyst:
identifying the true business problem and linking the systems solution to the
problem and to the needs of the business. The situation depicted in the video
segment involves two principle roles: (1) Alice Carlson, a marketing manager
with an interest in store operations, and (2) Max Davis, a continuous
improvement specialist in the systems engineering group at BEC (Max is
really a systems analyst with a special focus).
This video segment illustrates various important points about the orientation
of systems work and about some traps into which systems analysts and user
managers can fall, including:
Technical solutions, when reached too quickly, may not deal with the
most important business issues. The video segment shows how Max
works to deals with business issues first, and how he bases the business
case for a new system not on the “neat” features of the system but on
the business reason why a system with specific features is needed.
Following are some questions you can use to stimulate discussion about this
video segment.
What does the Deming quote shown at the beginning of the video
segment and the other references about continuous improvement have
to do with the issues encountered in this video segment?
How might Max have used the business model graphic shown early in the
video segment to help identify the real problem and to develop the
business case for the proposed system?
Why did Alice Carlson come to the conclusion that an information kiosk
would be the solution to the problem she observed in BEC? Try to get into
the mind of a typical business manager; suggest why Alice might have
wanted to jump to this conclusion? As a systems analyst, what do you
have to do in your interactions with user managers to overcome these
tendencies?
If you were Alice Carlson, what else could you have done to investigate
the initial observations about customers not being able to find the videos
they want?
What was the agenda for the marketing information systems steering
committee meeting shown in the video segment? Given that we might not
have seen the whole meeting, what agenda items do you think were not
shown or should have been included in the meeting?
Why does the kiosk appear near the end of the video segment given that it
was not part of the systems solution? What does this appearance of the
kiosk say about the mix of systems development projects often found in
an organization?
What other key points would you add to the summary of the lessons of this
video segment given by Professor Hoffer at the end of the segment?
This video segment (which we suggest can be used best with Chapters 1 and
7) highlights the reasons for, benefits of, and conduct of an increasingly
popular requirements determination and validation technique—Joint
Application Design (JAD). The video segment does not raise issues about this
technique, rather it illustrates the motivation for JAD and how a JAD session is
planned and conducted. The situation depicted in the video segment involves
five principle roles: (1) Alice Carlson, a marketing manager, who does the
narration in the video segment and who was the initiator of the information
kiosk into BEC, (2) Andy Collins, a central district manager responsible for 27
BEC retail outlets and the initiator of the project to enhance the kiosks, (3)
Nancy Chen, VP of US operations and the sponsor of the JAD, (4) Jorge Lopez,
a systems analyst, and (5) Frank Napier, a systems analyst.
The video segment illustrates many important points about a JAD including
the steps required to conduct a JAD, with emphasis on the planning and
preparation steps. The overall JAD process as described in the video segment
is:
Following are some questions you can use to stimulate discussion about this
video segment:
In what ways did the JAD in the video segment seem to be conducted
differently than the way a JAD is described in the text?
Summarize the reasons for and benefits of a JAD raised in the video
segment. What additions would you make that were not mentioned in the
video segment?
Why does the video segment stress the need for significant preparation
for a JAD?
What role might prototyping play in a JAD? Under what conditions might it
be possible for a prototyping team to be of value during a JAD?
Why was it Andy Collins, not one of the systems analysts, who was
getting Nancy Chen to sign–off on the development project which was the
result of the JAD?
What other key points would you add to the summary of the lessons of
this video segment given by Professor Hoffer at the end of the video
segment?
This video segment (which we suggest can be used best with Chapters 2, 7,
and 20) highlights the importance of a customer focus in developing
information systems. The video segment illustrates some of the problems
that can arise for a systems analyst when requirements are not thoroughly
investigated. The video segment also shows how difficult it is for users and
analysts to develop a shared understanding of requirements. The situation
involved in this video segment includes four roles: two systems analysts
(Doug and Lee) and two unnamed user mangers. The video segment shows
two versions of what might happen during a JAD session, one session in which
the analysts are not very aggressive in probing for requirements and one in
which the analysts dig more deeply into the minds and wishes of the users.
This video segment highlights that an analyst has to do more than just listen
to users during requirements collection sessions, such as in a JAD. Analysts
also have to probe, question, and pose what if situations. The analyst must
elicit requirements, even those not obvious to users. Analysts have to find
ways to avoid saying “we didn’t know you wanted us to build the system to
do ...”
Following are some questions you can use to stimulate discussion about this
video segment.
Why is it likely that users and analysts have different expectations for a
system?
What other key points would you add to the summary of the lessons of
this video segment given by Professor Hoffer at the end of the video
segment?
This video segment (which can be used with various chapters in the second
edition of Modern Systems Analysis and Design, such as Chapters 1, 3, 7, and
13) introduces the notion to students that systems development can be
viewed as an engineering–like discipline. Systems development is discussed
in the video segment as a continuous improvement process in which not only
the business is continuously improved but also the methods and practices of
systems development are refined. The video segment emphasizes that the
purpose of application development is to improve the business and its
processes via the design and improvement of information systems. These
information systems add value to the organization. There are three principle
roles in this video segment: Karen, who is a BEC manager with operations
responsibilities, and two systems analysts—Max Davis and Jordan Pippen—
who have recently won the approval of a steering committee for funding a
new information systems project.
Following are some questions you can use to stimulate discussion about this
video segment:
Compare how Max and Jordan explain RAD to how RAD is presented in the
textbook. What makes RAD different from the traditional structured
systems development life cycle?
What does it mean to say that systems development is an engineering–
like discipline? From this video segment and your own experience, what
characteristics does systems development have that qualifies it to be
called “application engineering?”
Describe the step of a system post audit mentioned in the video segment.
Why is this step considered part of the project close down and not part of
maintenance?
What other key points would you add to the summary of the lessons of
this video segment given by Professor Hoffer at the end of the video
segment?