Sie sind auf Seite 1von 20

Information SystemsMaintenance

Information Systems Introduction


Maintenance: An A great deal of academicand practical attention
has been devoted to studying methods of
Integrated Perspective developing computer-basedinformation systems;
considerably less attention has been devotedto
studying the managementof systems once im-
plemented.The latter task is knownvariously as
systemsmaintenance,applications maintenance,
systems management, systems audit, post-
By: Chris Edwards implementation management,or applications
Professor of Management management.
Information Systems
Cranfield School of Management Traditionally, the creation of information systems
has beendiscussedby considering each task in a
Cranfield, England
systemsdevelopmentcycle. In essence,that is a
list of tasks requiredto be undertakenin the pro-
cess of creating an information system. The
developmentphasebegins the systemslife cycle
whichtraces the life of a systemfrom inception to
replacement. The latter part of the life cycle,
namelysystemsoperation, is usually discussed
by operationaltask with little referenceto anypar-
ticular system.For instance,installation, security,
file management,and engineering maintenance
are usually discussed without reference to any
particular operational system.Figure 1 showsthe
matrix of operational tasks versus systems,
highlighting the conventional discussion
perspective.

Not only is discussionorganizedin this way, but


Abstract personnel are similarly allocated; analysts and
programmers to system and operations personnel
This article argues that information systems to tasks. Exceptin the largest installations offer-
maintenance is a morecomplexandintegrated task ing very great development specilization,
thanportrayed in the literature. It involvesnot only the systems creation involves very few functional
maintenance of the applicationssoftware,but also all specializations whereassubsequent operation
the other elementsin an operational system. The
usually involves a greater number.Personnelin-
literature relating to the maintenance of eachelement is
volved in operations maywork on a numberof
reviewedto reveal substantial underdevelopment in
someareas andfragmentationbetweenelements.The systems in one day, whereas development per-
presentpractice of focusing uponthe maintenance of sonnel maywork for manymonths on a single
particular individual elements is criticized anda new system. For this reason, operation demandsa
focus uponchangesin the information inputs to the greater degreeof functional integration. This arti-
systemsdevelopment processis proposed.Alternative cle is concernedwith the processof ihtegration of
methodsof managing the maintenance operation are elementsof operational systems:a global view of
examinedand the implications of these methodsin related post-implementation tasks is proposed
terms of designing the procedures, staffing the which emphasizesthe systems rather than the
maintenance function, andthe needfor communication functional perspective.
are discussed.
The very early development of commercial
Keywords:Informationsystemsmaintenance; systems systems tended to emphasize the problems of
life cycle; systemslife cycle management. programming, since programming was very new
ACMCategories:K.6.1 and the business task to be developedwasusual-

MIS Quarterly/December 1984 237


Information SystemsMaintenance

ly well understood, logically structured, and


essentially static. Systemsmaintenanceis now
undergoing a similar evolutionary process: the
emphasis is presently focused on maintaining
software as against maintaining systems. This is
not to say that software maintenanceis being
overemphasized, merely that systems, main-
tenanceis being neglected.
This article focuses upon centralized data pro-
cessingorganizations, as the majority of applica-
{:: .,.,
tions presently existing are, andwill continueto
be, processedin a centralized environmentfor a
considerableperiod of time. However,the impact
of distributed data processing upon systems
maintenance will be’ briefly considered.

O O
Systems Maintenance
Definitions of maintenancevary in a computer-
related context. Boehm[8] distinguishes be-
tween software update and software repair. The
former involves enhancements whereasthe latter
ensuresthat the programsperformas first intend-
Development ~ Perspective ed. Ogdin [27] includes both of these under
(.-
.g maintenancebut introduces the term modification
to include changesthat result from a developing
environment. Riggs [20] movestoward a wider
0 view of maintenancein his definition:

"Systemsmaintenanceis the activity


associated with keeping operational
computer systems continuously in
tune with the requirementsof users,
data processing operations, asso-
ciated clerical functions, andexternal
demandsfrom government and other
agencies."

Swanson’s
[30] highly developedclassification of
the demandsfor software maintenanceconsists
of:
A. Corrective Maintenancearising from:
1 Processingfailure to producedata.
2 Performancefailure to meet specified
requirements.
3 Implementationfailure that has not yet
led to 1 or 2 above.

Operational Tasks B. Adaptive maintenancearising from:


1 Changesin the data environment.
2 Changesin ’the processing environment

238 MIS Quarterly~December1984


Information SystemsMaintenance

C2

The System

Application
Software

~
A1 A2, A3, C1, C3.

B1

Environment

Figure 2 -- A Representation of Swanson’sDemands


for Software Maintenance

involving hardwareor systemssoftware that wherever a demandarises the effect is to


changes necessitating amendmentsto cause an amendment to the applications soft-
applications software. ware. Changesin the data environment (B1)
presumably occur either because0f changesin
C. Perfective maintenancearising from:
someother unspecified system elementor in the
1 Processing inefficiency of software organizationalenvironment
itself.
which meets processing specifications
yet can be improved. Systemsmaintenance,as portrayedin this article,
2 Performance enhancement by amend- is considerably wider in scope than Swanson’s
ing, or addingreports, or facilities. view of software maintenance. Figure 3 shows
3 Maintainability improvementsto make the operational system in the sameformat as
programsmoreeasily maintainable. Figure 2, but consisting of rather moreelements
than Swanson’sincluded.
This classification can be representedin the form
of Figure 2. Any element may require modification either
becauseof an embodied
existing error in that ele-
Thesystemis seento consist of applications soft- ment (X), somechange occuring in someother
ware and hardware, and to operate within a element(Y), or somechangeoccuring in the en-
systems environment. Each of Swanson’s vironment (Z). A changein any element mayde-
demandsfor maintenance is located in its manda consequentchangein itself (U), in some
orginating systems element and cross other element (V), or in the environment (W).
referencedwith the earlier list. Thearrowsshow Changes in one element can develop whole

MIS Quarter/y/December 1984 239


Information SystemsMaintenance

The
Environment

The System

Applications
Software

Security
Procedures
V X

The
Database

Users

Figure 3 -- A Representation of Demands


for SystemsMaintenance

240 MIS Quarterly~December1984


Information SystemsMaintenance

chains of required amendments involving organizational changesnecessaryto utilize the


numeroussystems elements. newly developed system.

Building uponthis, systemsmaintenance is defin- Eachtask can be classified either as a control


ed here as "an alteration to any systemselement task or as a productiontask. Control tasks direct
necessaryto eliminate a fault in that element, the flow through the developmentcycle whereas
adapt to a changein that or any other element,or production tasks develop elements of the re-
to improve uponthe performancecharacteristics quired system. For example, task 1 is an in-
of an element." In essence,this is merelyan ex- vestigation whichresults in a report whichis used
pansion and generalization of Swanson’sclassi- in task 2. Henceboth task 1 and2 might be view-
fication to allow for other systemelements. For ed as control tasks as together they direct the
example,A1, B2, and C2in Figure 2 are particular subsequentflow. Contrast this with task 10 which
examplesof X, Y and Z in Figure 3, respectively involves the production of software--an element
However, this expansion in the scope of the in the operational system. Some tasks result in a
definition changes the whole nature of the statement of requirements which are then em-
maintenancetask and, in particular, demandsa bodied in a numberof other systemselements.
reconsideration of how the expanded re- Suchtasks are still productionstasks. Thedevising
quirementsmight be operationalized. of security specifications would be an exampleof
such a task as the resulting controls are em-
bodied in the software, the manualsystems, and
possibly other elements. Usually a production
SystemsLife Cycle task will result in someformof documentation that
The developmentlife cycle has been defined by will survive for the entire life of the systemandbe
manyauthors with only minor variations. Alter- updated as changesoccur.
native task titles andthe level of detail envisaged Figure 5 recasts the developmentlife cycle label-
by the individual authorsmakedifferent;es appear ing eachtask as production(p) or control (c),
moresignificant than is actually the case. In
showsthe resulting systemselements. Interac-
essence,a development life cycle is a structured tions between tasks and systems elements are
methodof producing the elements required for a
indicated.
system.For the purposesof this article, the life
cycle is to consist of the tasks shownin Figure 4. An arrow pointing towarda systemselement(i.e.,
upwards)indicates that the task in that row results
This life cycle consists of 18 tasks whichcan be
in the systemselementin that column. An arrow
groupedinto four stages:
pointing towarda task (i.e., to the left) indicates
SystemsOverview-- Tasks 1 and 2 involve that information fromthe elementin that columnis
investigating the nature of the problem and usedin the task. For example,the task of security
undertakinga brief appraisalas to its suitability designresults in a security specification whichis
for computerprocessing. then used in the tasks of computer systems
design and manual systems design. Systems
SystemsDesign -- Tasks 3 through 6 de- elements of hardware and systems software are
manda detailed consideration of user re- not included, as theseare essentially installation
quirements and the proposal of a numberof specific and are system dependent to a very
outline solutions. Thelast task in this stage limited extent. Thefigure doesnot attemptto por-
involves evaluating the alternatives and selec- tray iteration within tasks and betweentasks as
ting an appropriateaction plan. this wouldconfusethe situation.
SystemsCreation -- Tasks 7 through 1 5 are
Most of the systemsdevelopmenttasks draw in-
the core of the developmentprocess and in-
formation from the organization and its environ-
volvea great deal of effort. This is the stagein
ment. Figure 6 showsthe relevant organizational
whichthe majority of the elementsrequired to
utilize the systemare created. information addedto Figure 5. An arrow pointing
towardsa particular task portrays that the type of
Systems Implementation -- Tasks 16 information specified by that columnis used in
through 18 focus on implementing the that task. For example, to adequately analyze

MIS Quarterly~December 1984 241


Information SystemsMaintenance

Systems Overview (1)


Stage 1
Decision Point (2)
stop
Analysis and Verification of User Needs(3)

General SystemsDesign (4)


Stage 2
SystemsJustification 15)
stop or
Decision ~oint (6)
redesign
Security~l~esign(7)

ComputerSyste.ms Design (8)

anua Systems Design (9)

Write and Test Programs(1 O)


Stage 3
UserTraining (11

Computer
Speciallity Training (12)

ClerkTrair~ing(1 3)

SystemsTesting (1 4)
retest
Decision.Point (1 5)

DatabaseCreation I1 6)
Stage 4
,,mpemenation
!
I1 7)

Post-
I mp
I ementationAudit (18)
Figure 4 -- A SystemsDevelopmentCycle

user needs for information would require data be monitored other than immediately following
relating to the business environment, the implementation.
businessorganization, characteristics of users, Eachof the resulting systemselementshas a time
and details of the task to be undertaken.Precise dimension and may or may not need to be up-
details of the information required is system-and datedas the original informationinputs to that ele-
organization-dependent. The developmentcycle mentchange.Figure 7 is a cross-reference of in-
can thus be seen as a structured set of pro- formation inputs and the resulting systems
ceduresfor gathering information relating to the elements. This has been compiled from Figure 6
organization and transforming this into the ele- by tracing systems elements through the
ments required for an operational system. Task development cycle to the information required for
18, namely the post-implementation audit, is each element. Wheninformation directly relates
essentially a non-repetitive activity and hence to an elementit is shownin Figure 7 by an upward
information inputs for this task do not need to pointing arrow. The dots represent situations in

242 MIS Quarterly~December 1984


Information SystemsMaintenance

Production (P) or Control (C)

Post-implementation report

Report on systems tes¢ing

justification

Feasibility report

Specification of user needs

Systems specification (overview

Justification

Security specification

Computer systems overview/prog.


specs/database design

Procedures manual/forms

Software & documentation

Trained users

Trainer computer dept. staff

Trained clerks

Database

MIS Quarterly/December 1984 243


Information SystemsMaintenance

(I) SystemsOverview

(2) DecisionPoint
Analysisand Verification
(3) of User Needs

(4) GeneralSystemsDesign

(5) Syste~ Justification

(6) DecisionPoint

(7) SecurityDesign

(8) C~ter Systems. Design

(9) ManualSystemsDesign

(10) Write and Test Programs

(II) User Training

(12) O~ter Specialist Trs/ning

(13) Clerk Training

(14) SystemsTesting

(15) DecisionPoint

(16) D~tabaseCreation

(17) Implementation

(18) Post-lmplement~tion
Audit

Figure 6
Information Inputs to the Development
Cycle and Resulting Elementsin the Operational System

244 MIS Quarterly~December1984


Information SystemsMaintenance

WOI~INGPAPF_/~ ~,~fl~’gl~ IN OPEPATIC~AL


SYST]~

(c)
(c)
(P)
(P)
(P):
(C)
(c)i

(P)l

¢)

~c)

MIS Quarterly~December 1984 245


Information SystemsMaintenance

Figure 7 -- A Cross Referenceof Information Inputs Against Elements’in an Operational System

which an element draws information from a sec- ments.Notall informationinput changes will result
ond elementand an information input is required in corresponding changes in cross-referenced
for the latter, andthereforealso for the former. By elements.For example,changesin an installation
consideringthis chart, oneis able to observethe policy might.not affect users, henceuser retrain-
effects of a changein information inputs upon ing maynot be necessary. However, every ele-
systems elements. mentwill needto be consideredfor every change
in a cross-referencedinformation input to checkif
The systems developmentcycle can be seen as a it is relevant.
structured procedurefor producing elementsin a
systemgiven certain information inputs. A similar, In summary,a systemconsists of elements which
if not identical, chart will needto exist to process were produced as a consequenceof information
changesto a system.Figure 7 portrays the situa- gatheredat the development stage. It must follow
tions in whichchangein an information input will that changes to this information may demand
demandchange in the cross-referenced ele- alterations to the system.

246 MIS Quarterly/December 1984


Information SystemsMaintenance

reports empirical investigations designedto deter-


Surveyof the mineorganizational variables that will encourage
System Maintenance the continuing refinement of user needsthrough
time. He envisagesthe maintenance of user needs
Literature to consist of amending the information providedto
This section will discuss the maintenance satisfy changingneedsof user managers,ceasing
literature related to eachelementin an operational production of non-usedinformation, and encourag-
system. Often certain elements are combinedin ing usageof information perceivedas underutilized
the literature for discussionpurposes;this prac- by the users’ superiors or the information’s pro-
tice will be continuedhere. Secondly,this section ducers. (The term producerswill be used here to
will considerthe literature related to the organiza- denotestaff of the organizationalunit responsible
tional aspects of maintenance. for developingthe information systemandfor pro-
ducingthe information.)
Specification of user needs Edwardsnotes that the organizations in which the
maintenanceof user needs was operationalized
Manyauthors have addressedthemselves to the all hadthe following characteristics:
problem of defining user needs. Manyconceptual
and practical techniques have evolved to address - resources clearly devotedto maintenanceof
this problem. Davis [8] reviews a number of user needs,
methods of definition and classifies them as open user/producer communication chan-
belongingto oneof the following strategies: ask- nels, and
ing, deriving from an existing system,synthesiz-
ing from characteristics of the utilization system, - allocation of responsibility to motivatedper-
or discovering from experimentation with an sonnel who perceived the maintenance of
evolving system.Thefirst three strategies might user needsas an important activity.
well be termed engineering approachesas they
The crudeness of this research can be seen in
utilize the basic philosophyof engineers,namely the implicit assumptionthat users knowwhat in-
to compile a completeand detailed specification formation they need. Suchan assumptionis also
of the task prior to commencingdevelopment. inherent in the evolutionary approachand usually
Theyare baseduponthe assumptionthat a set of implicit in distributed systemsdevelopment.This
requirements can be fully determined prior to conflicts with the humaninformation processing
detailed development literature summarizedby Davis [8] which sug-
The fourth method, knowngenerally as an evolu- gests that managers either cannot identify or are
tionary approach,recognizes the managerialpro- unable to express their needs.
blemsinvolvedin report specification andinvolves Land[18], in synthesizingthe workof others, sug-
iterations towarda final system.Interestingly, an gests approachesto dealing with changing user
ideal system that satisfies managers’needsis
requirements. His systemsinclude considerable
usually implied after which, presumably,systems prethought of possible changes at the design
maintenance personel update requirements. stage, prototyping, and distributed systems
"Oncethe output system is shapedto accurately development.
fit user requirements,an input systemis designed
and developed," Berrisford and Wetherbe[2]. Ramsgard[28] provides another view by sug-
McCoshet. aL, [22] in a similar way, note that gesting that an inventory containingall the essen-
"once the prototype has served its experimental tial facts relating to all currently produced reports
purpose, it will be replaced by a robust, viable will reveal redundantand irrelevant reports and
system."Evolutionis usually not seenas a contin- highlight unreasonable distribution lists. Further,it
uing process, but as a methodof defining user will exposeexecutives who receive too great a
needs ultimately resulting in a defined set of volumeof reports.
requirementswhich will form the basis for a pro-
The Comptroller General in the Standards for
cessing system.
Audit of GovernmentOrganizations, Activities,
Researchrecognizing the continuing needto up- and Functions [6] states that one of the general
date user needs is not common.Edwards [11] objectivesof audit workis" to ensurethat financial

MIS Quarterly~December 1984 247


Information SystemsMaintenance

SYSTEMS

t~
SYSTEMS DESIGN SYSTEMS OPERATION
IMPLEMENTATION
-- PERIOD1
ANDINITIAL REVIEW

Internal Verification Verification


Audit Tasks ~’~ of security of security
(Function B) controls controls
(Function B) (Function B)
Time

Figure 8 -- SystemsRelated Tasks ShownThroughTime

reports contain accurate, reliable, and useful [10] suggests that the existence of a charging
financial data (emphasis added). This suggests system will encouageusers to be economical in
_the needto inquire if the organizationis giving due using the system.Usersmight well havedifficulty
consideration to identifying work (for example, in valuing a report, but mayfind it somewhatless
producingreports) whichserveslittle or no useful demanding to decide if the value exceeds a
purpose. Internal auditors appear to view stated cost.
themselvesas a checkingfunction to ascertain if
the organization is monitoring changing needs, The selection of appropriate costing methodsis
howeverthey suggest themselves as the secon- discussed in McKell [23]. The reoccurring costs
dary check, not the primary system. of producinga report will formonly a small part of
the total cost as projected in the initial systems
appraisal. This occurs mostly becauseof the hid-
den nature of developmentcosts and the costs of
Cost~valuespecification databaseupdatesthat would not be significantly
reducedif a single report were eliminated. The
The comparisonof cost and value that is required
relevant ongoingcosts are a subset of those iden-
prior to systemsdevelopment will differ in content
tified in the initial appraisaland, given that these
significantly from that which is undertaken to
are initially identified, can become the chargeout
justify systemsamendments. This, in turn, will
costs. Effectively, the cost/value justification is
significantly differ from the ongoingcomparison to
maintained to ensure value exceedscost through
ensurethat the value yielded is continuing to ex-
the life of the system.
ceed cost.
No literature waslocated that discussedorganiz-
Without someform of communication, managers
ing chargeout systemsas part of a maintenance
would not be aware of the cost. Hence, Bernard
function.
et al. [1 ] suggeststhat a systemof charging out
cost to users would provide communication.This Security specification
might encourageusers to comparecost with the
value yielded and to discontinue those reports Manyauthors addressthemselvesto the issue of
that did not justify the cost of production. Drury designing systems that assure availability,

248 MIS Quarterly~December 1984


Information SystemsMaintenance

Monitoring Systems Monitoring. Systems


operation and operation and
amending as amending as
necessary necessary
(Function A) (Function A)

SYSTEMS OPERATION SYSTEMS OPERATION


-- PERIOD2 -- PERIOD3

’T
Verification
Verification
of security of security
controls .controls
(Function B) (Function B)

preserveconfidentiality, and provide information Therole of the internal auditor in the maintenance
integrity: Thereis little discussionin the informa- of systemcontrols presents an important issue.
tion systemsliterature relating to the methods by Figure 8 represents the systems related tasks
which these controls might be maintained in shownthrough time. Main et aL, [25] represen-
changingorganizational circumstances. The very ting TheInstitute of Internal Auditors, see com-
detailed workby Martin [26] covers the issues in puter auditing as the verification of controls in
the area of designing secure systems. In 626 three areas of the organization: applications,
pages, Martin addresses 10 pages to this area systemsdevelopment, and the information pro-
andeven these relate only partly to the issue of cessing facility. Theysuggestthat the internal
maintenance. auditor performfunction B in Figure 8 (verifying
that adequatesecurity controls exist), but that
The issue of ongoing operations being reviewed someone else should perform function A
on a functional basis is particularly relevant here. (monitoring the system and amendingthe con-
Issues such as protected areas, fire hazard, trols as necessary). A ConferenceBoard Survey
sabotage, electromagnetic radiation, and [24] showsthat 88%of internal auditors consider
databaserecreation systemsare a small sample their role to include the reviewof data processing
of the issues to be considered in a functional controls, but 70%also becomeinvolved in the
perspective. development process to simplify subsequent
auditing. Theyemphasizethe role of review as
Auditors are becomingincreasingly involved in against (]esign to avoid compromisingthe check-
the data processingfunction. Evenso, manyaudit ing function.
managersbelieve that they have only scratched
the surface of computerauditing and do not have
the personnelor audit tools they needfor effec- Noliterature waslocated that dealt with function
tive operation. Macchiaverna[24], in a Con- A. Possibly producers who are pressured and
ference Board Report, states that EDPauditing overworkedhave been content to leave the task
wasthe most frequently mentionedproblem area, of identification of problem areas to internal
receiving a mention by 16%of the 284 audit auditors. With the increasing use of samplingon
managerssurveyed. the part of auditors, this could be dangerous.

MIS Quarter/y/December 1984 249


Information SystemsMaintenance

Manualproceduresspecification sideredin the literature. A surveyof data process-


ing managersundertaken by Lientz and Swanson
The literature relating to the design of non- [19] identified inadequateuser training as oneof
computer aspects of computer systems (for in- the six majorproblemareas in maintainingapplica-
stance, the design of forms) grew out of the tion systems. They suggest ongoing training as
organization and managementliterature with slight an important element of the maintenancefunc-
adaption for the differences involved in computer tion. Ramsgard [28] discusses the use of an in-
processing. The literature has not developedin- ventory containing samples.of all reports as a
dependently. That which does exist is primarily training aid. He suggests that no new manager
concernedwith systemscreation virtually to the should be allowed to receive any computer
exclusion of maintenance,with repeated mention reports until he has reviewedin detail the inven-
of the needfor regular reviews. tory of reports.

Database
It is clearly importantthat data items andtransac- Specification and documentation
tions be added to, amended,and deleted from This area of maintenance is of great practical im-
the database. It is of such importance and so portance and has attracted academicand profes-
clearly vital to operationsthat systemsare design- sional attention because it is virtually unavoidable.
ed (at the developmentstage) to maintain the Producers do not need to monitor users’ chang-
database. The ease of usageof such systemsis a ing needs(users will inform the producer in no
major attraction to DBMS.The problems en- uncertain terms if the changesare important). Nor
counteredin adding data structures and changing do producers need to evaluate systemssecurity
the format of existing structures has been con- (again, problemswill become very obvious or In-
sidered at length. However,such considerations ternal Audit will inform the producerof any inade-
seldom venture beyond the immediate systems quacies). But producers do need to correct
- element and hence integration of elements is system that fails. Onemust consider, however,
slight. Themajor exceptionto this is the security that corrective software maintenanceis usually
aspects incorporated into databasesystems. regarded as a small part of the total software
This is one of the few systemselementsin which maintenance task (between 19 and 21%of the
total software function [19, 20]). Other reasons
maintenanceis designedinto the systemfrom the for software maintenance-- perfective and adaP-
outset. As database managementsystems have tive -- will also bedifficult to avoid.Userpressure
developed, the implemention of changesboth to
for systems improvements can becomevery in-
the data andto the structure of the databasehave tense. In other cases, a new model of computer
easedconsiderably. will demand software changesbefore it will pro-
cess existing applications.
Training
Theliterature can be classified into four groupsor
The training area has not changedsignificantly issues.
with the introduction of computer-basedsystems
apart fromthe recent innovationof including train- Costof Maintenance -- A searchof the literature
ing and assistance information within an applica- failed to locate studies that isolate the cost of
tion programto aid clerks and users alike. The systems maintenance as defined here, but a
content of training programs,moreoften than not, number of investigations highlight a subsetof this
has focused on potential or existing systems -- the cost of software maintenance[5, 13, 16,
analysts and programmers, although somedo 17, 19, 29, 32, 33].
focus uponuser managers.Suchtraining for user
managersis often not organizationally centered Tracing, Recording and Costing Software
nor systemsspecific. Amendments -- These range from very simple
[34] to the more complex computer based
Seldomis the continuing availability of personnel systems [12] and are directed toward software
trained in particular application systems con- maintenancecost analysis, [1, 32, 33], general

250 MIS Quarterly~December 1984


Information SystemsMaintenance

related statistics [27, 29, 30], and security systems when the demand for resources is
aspects [31] of implementing changesto soft- reduced), and fixtures (who will stay with the
ware. system on a more or less permanent basis).
Knowingfrom the outset that oneis to be involved
Motivation of Software MaintenanceStaff -- in the maintenance of a system may well en-
Thebenefits accruing from integration or separa- courage one to develop adequate documenta-
tion of maintenancefrom developmentforms the tion. Freedmanand Wienberg [14] suggest ad-
focus of attention. ding maintenance staff to the post-implementation
review committeeto achieve this sameobjective.
Improved ProgrammingTechniques to Ease
the MaintenanceProblems-- The United State Cooper[7] suggestsa variant of this wherebya
GeneralAccountingOffice [33] identified the im- permanently assigned program maintainer joins
proved use of tools andtechniques as the second the developmentgroup to ease the transitional
most effective wayto reduce maintenancecosts. problems. Lientz and Swanson[19] report that
Ewers and Vessey [12] discuss 15 programmer separation of maintenance and development
productivity tools whichthey classify under the leads to increasedefficiency, although this was
headings of: tools used in the programmingen- by no meansthe usual methodof organization
vironment, tools used in the programcreation noted. Other cases of alternative organizational
function, and program testing tools. They methodscan be found [31 ].
especially emphasizethe maintenancebenefits
from such productivity tools. Donahue[9] uses
over 1 O0pagesto extensively describe software Communication
channels
maintenance tools andtechniquesin great detail.
Systems maintenance depends on open com-
Discussions of software tools tend to be
munication channels between producers and
technical, andutilization often involves the pur-
users. A British ComputerSociety study [4]
chase of particular software aids marketed by
reveals user/producer communicationas an im-
computermanufacturersand other large software
portant problemarea. Edwards[11 ] confirms the
producers.
importanceof.this aspect. Land[18] enumerates
reasonsfor communicationfailures.

Resource requirements
If producers are to play any significant role
in maintenance,resourceswill be required. Lientz Discussion
et al., [20] report that most senior managers
regard software maintenanceas more important This article has attempted to showthat systems
than developmentand hence, if the survey was maintenanceshould involve all elements in an
representative, resources may well be made operational system. A review of the literature
revealsa dearthof literature for the majorityof the
available for software maintenance. Glass and
elements of systems maintenance and a nearly
Noiseaux[15] profile a software maintainer which
total fragmentationinto non-interactingspecializa-
demands the qualities of a superman:flexibilty,
tions. This section offers positive direction in the
broad background, patience, self motivation,
responsibility, humility, innovation, and an maintenance dilemma by integrating proposals
historian. Authorsagreethat, in reality, the most from manysources.
inexperienced, the most inept, or the person
mosteasily pressedinto service is often utilized.
Whyis the presentsituation
so unsatisfactory?
Organizational design Thequestionof whythis situation is presently un-
Tipshusand Sanderson[31 ] suggesta novel form satisfactory must be addressedbefore becoming
of organization for software maintenance.They involved in a consideration of action. Organiza-
suggest creating a project teamfor development tions spendthousands,if not millions of dollars
consisting of transients (whowill moveon to other developing computer-basedinformation systems

MIS Quarter/y/December 1984 251


Information SystemsMaintenance

with the intention that any individual systemwill pressed by users, security procedures would be
last for a numberof years. Clearly, information tightened after a failure becomes apparent, user
support for the managerialtasks must have been training would be available uponrequest. Sucha
important whenthe system was first developed system would be proportionately inexpensive to
and, unless a major change in organizational operate, but the value yielded by the systemmay
tasks androles has occurred, information support also besimilarly small.
will still be of importance. As time passesand
organizational changes occur, the system may An alternative philosophy, here termedproactive,
yield progressively less value. The users, having would involve monitoring changesthat occur in
becomefamiliar with the original system, will the information inputs to the design processand,
possibly be requiring systems enhancementsto by using a chart of the form of Figure 7, tracing
increase the value yielded. Hence,the gap bet- the effects of each input change upon the
weenthe value potentially and actually yielded elementsin the system. Sucha systemwould, for
becomeswider. Awaiting the obsolesence of a instance, demandthe encumbentof a position to
system before developing a replacement is un- reappraise each report received for its utility
satisfactory. For mostof the life of that system,it whena particular organizationalposition is chang-
will not be providing the required information, and ed. Further, evenif a managerfilling a position is
extremelysignificant problemscould occur by not not replaced, he will needto be monitoredto en-
keeping the system current. For example, sure that his needs, uponwhich the reports were
breachesof security could occur resulting in the designed, have not changed.
misplacement of millions of dollars. Liken this lack
A combinationof these two philosophiesis clearly
of maintenance to the purchase of any other
possible, wherebycertain systemselements are
organizational asset that depreciates, say a
considered on a reactive basis and others are
machine or a new building, and the need for monitored on a proactive basis. For instance,
systematic maintenance becomespatently ob-
users might be monitored on a proactive basis
vious. A continually evolving system to meet
whereassoftware might be-organized on a reac-
changing organizational circumstances would ap-
tive basis.
pear preferable to a quickly degeneratingasset.
In addition to these major points, the aggravation Selecting a maintenancephilosophy will depend
involved in users having to utilize an unsatisfac- primarily uponthe projected degreeof changein
tory system can hardly be productive. the environment of the system and the costs of
alternative maintenancesystems. Such variables
All of these commentsaddressing the need for are difficult to quantify. Theprojected degreeof
maintenancehinge upon changeoccurring in the change and its projected effects can best be
organization through time. Even though some found by undertaking appraisal of each informa-
systems in an otherwise changing organization tion input to the developmentprocess. Certain
might not be effected Lincoln [21] identifies a applications addresssingparticular tasks (for ex-
number of organizational and environmental
ample, word processing) appear to require
pressuresthat wouldsuggestthat static organiza-
change less frequently than systems that are
tions should be most uncommon. report specific (for example,order analysis repor-
ting). The consequences of an ill-suited informa-
tion system can vary widely. The cost of alter-
Selecting a philosophy native systemsof maintenance,although not sim-
Figure 7, which cross references inputs to and ple, is somewhat easier to appraise.
outputs from the systems developmentprocess,
is actually cross referencing two possible focuses
of the maintenancefunction. First, a maintainer Whento consider maintenance
could adapt a reactive philosophy which involves
awaiting demandsfor maintenanceand adjusting Maintenance should be considered at the
the system’s elements to satisfy the specified system’sdesign andcreation stages: it shouldnot
change.Sucha methodis effectively reacting to be an afterthought. Either a separatetask in the
changes that becomeapparent. Programs would development cycle titled ’design maintenance
be amended if they fail, improvedif changesare procedures’ is originated ora part of every

252 MIS Quarterly~December 1984


Information SystemsMaintenance

systems element should be devoted to does not necessarily follow, although the logic
maintenance. This is impossible for existing underlying the importance of systems
systems, but no further systems proposals maintenancemight well encouragesupport.
should be drafted or acceptedwithout including a
clear consideration of howeach elementis to be
maintained. Systemsdesign of the maintenance Developing communicationchannels
function includes not only a discussionof whatis
required to be performedbut also whois to do it Systems maintenance depends on open com-
andhowit is to be organized. munication channels between producers and
users. Communication can be achievedin a varie-
ty of formal andinformal ways, but the methodof
physically locating an analyst with a group of
Allocating responsibility users to service a single systemappearsto meet
The design of maintenanceprocedures should be the objectives of a close contact with users. Yet,
the responsibility of the system designer. in extremecases, this mayisolate analysts from
Responsibility for the maintenancefunction can producers.Manyother organizational possibilities
be performed by users, by producers, someby exist to facilitate communication:for example,
either, andsomeby both. As a starting point, it systems discussion groups, regular systems
would seemreasonable to allocate the respon- reviews,informal activities, andadvanced training
sibility for each elementto the group that was sessions.
responsiblefor producingit. This wouldimply that
if systemanalysts weceinvolved in defining user
needs, they would be continually involved in Theevolving role of the
noting changesthat effect those needs. To turn internal auditor
responsibilty for maintenance over to users, as is
implied whenauthors suggest ’signing off,’ re- Theinternal auditor has beenmentionedin rela-
quires that the users have learned a great deal tion to the maintenanceof various elements.The
from their participation in the developmentpro- obviousextension of this responsibilty wassug-
cess. Further, it implies that they have the re- gested by Lientz and Swanson[19] in their
quired degreeof overview of the whole systemto recommendation for life cycle audits. Theydid not
realize the implications of change.If sucha turn- contrast the roles of maintenanceas an ongoing
over of responsibility is envisaged, exhaustive task, andaudit as a final checkingfunction. Rather
user training will be needed.Lientz and Swanson than being seen as a first line maintainer, the
[19] suggest that enhancements in terms of ad- internal auditor shouldbe seenas the final check
ditional reports could be processedby users with on efficient and effectiye operation by inves-
the use of report generator languages whereas tigating all systemselements. To safeguardcom-
enhancements that demand changes to the promising their position, auditors should not
databasewould be processedby producer staff. become associated with the systems main-
Whatever the division of responsibility, it is vital tenancefunction.
that someone has responsibility for the success
of maintenance just as the leading systems
analyst has in the developmentfunction. Attitude changes
Tworelated, but apparently minor points might be
Resourcerequirements valuable in securing effective systems main-
tenance. First, the title maintenance hardly
There is a need for senior management to engulfs the wider organizational tasks envisaged
recognize the need for, and importance of, in this article. Sucha title suggests
merelystriving
systems maintenancein order to allocate ade- to ensure that an initially given value persists.
quate resources. Previously discussed research Systemsevolution, or somesimilar title, might
suggeststhat senior managersdo recognize this move away from the narrow meaning of main-
need. The extension of these perceptions from tenance,towarda definition of striving to increase
software maintenance to systems maintenance the value of the systemto the organization. A sec-

MIS Quarterly~December 1984 253


Information SystemsMaintenance

ond point involves changing the attitude of Noiseux [15] include a discussion of six major
development staff to regard the new task of points whyanalysts and programmers are not at-
system evolution as equally important as system tracted to maintenance:
development.
maintenance
is intellectually very difficult

maintenance
is technically very difficult
Theeffects of distributed
data processinguponthe maintenanceis unfair; necessaryinforma-
maintenancefunctions tion is not available; original program
writers
get promoted even though they leave a
A final point worthyof considerationis the effects mess behind them
of distributed processing upon the systems
maintenanceis no-win; people only come
maintenancefunction. There are manyshadesof
to maintenancewith problems
distribution rangingfromnear centralization of all
systems elements to full user autonomy in maintenancework does not result in glory,
creating and operating systems, The wide variety noticeable progress, or chancesfor "suc-
of situations that are labelled as distributed pro- cess"
cessing would lead to an extensive discussion of
the effects of distributed data processing upon maintenanceli~es in the past, the quality of
the maintenance activity. Such a discussion yesterday’s coding is often very poor
wouldnot be suitably presentedin this paper, but
global comments might be appropriate. Thesepoints combinedwith a world shortage of
trained staff does not encouragesenior managers
The control of elements by a single department to insist on maintenance;computerstaff are all
headwill likely lead to an advantageous trade-off
too mobile.
between benefits and costs. The benefits of
systemsmaintenancein terms of improvedinfor- Second,it maynot be in an analysts interests to
mation will be knownto the operating department addall of the very significant cost of maintenance
head, in addition to the costs. A choice as to into the cost/value proposalsfor risk of fewer pro-
resource allocation can be madebasedupon full jects being undertaken. The underestimation of
information and with less political interference. maintenance cost in proposals makesit some-
The monitoring of either systemselements,or in- what difficult to request additional staff once
formation input, will be considerably simpler to systemsare implemented.It is easier to severely
organizegiven it is the responsibility of a single limit the activity to that which is absolutely
person. The changesare occurring in the depart- necessary. Any additional costs can be hidden
ment in which the maintainer is employed, and either in the developmentof subsequentsystems
hence the communication problem should be or through the non-analysis of costs; a practice
reduced. that thas beennoted [33]. Comparingprojected
with actual maintenance costs would demanda
sophisticated accounting system and even then
manyreasons could be found for the huge dif-
Reasons for the Neglect ference. If, by chance, such information was
available, an analyst would be even moretempted
of Maintenance to do less maintenance.
One major question remains to be addressed:
why, if systemsmaintenanceis so important, is it Third, Whena department experiences very high
so neglected in practice and academia? service demandswith a relatively fixed budget
somethinghas to suffer: the usual attitude in
Consideringthe former, four points appearrele- manywalks of life is to select aspectswhich are
vant. Firstly, it is often noted that analysts and least pressing from a short-term viewpoint and
programmersprefer to be concerned with the most difficult to measure.Systemsmaintenance,
development of new systems rather than the apart from software correction, appearsto be an
maintenance of existing systems. Glass and obvious choice.

254 MIS Quarterly~December1984


Information SystemsMaintenance

Lastly, maintenance has not been accepted [5] Canning, R.G. (ed.)"That Maintenance
historically as a major task. The author can Iceburg," EDP Analyzer, Number 10,
rememberwhen,working as a junior programmer, 1972.
a discussion centered upon the fate of the pro- [6] Comptroller General of the United States
grammingstaff when all the organizations "Standards for Audit of Government
systems were fully programmed: viewing Organizations, Programs,Activities, and
maintenance as a minor function is all too Functions," Washington, DC, 1972.
prevalent. To changesuch perceptions demands [7] Cooper, J.D. "Corporate Level Software
a major effort that maytake a considerableperiod Management,"IEEE Transactions on Soft-
of time. ware Engineering, SEo4, July 1978, pp.
319-325.
These foregoing arguments may suggest why [8] Davis, G.B. "Strategies for Information Re-
maintenance is neglectedin practice but doesnot quirements Determination," IBM Systems
explain whythe area has receivedso little atten- Journal, Volume21, Number1, 1982, pp.
tion from academics. Apart from a very small 4-30.
number of noted people, research on the [9] Donahue, J.D., and Swearinger, D. A
maintenanceissue has beenneglected. This ap- Review of Software Maintenance
plies, to a lesser extent, to all areas of MIS Technology,ITT ResearchInstitute, Rome
research. As in other areas of academia,there is Air Defence Centre, RADC-TR-80-13,
a tendency to research where a body of NewYork, NewYork, 1980.
knowledgealready exits (see, for instance, the [10] Drury, D.H. "Conditions Effecting
MIS research developing out of cognitive ChangebackEffectiveness," Information
psychology [34]). To be amongthe few working and Management, Number 5, 1982, pp.
in an area is unfashionable and often leads to 31-36.
papers such as this where the discussion can [11] Edwards, C. "Determinants of Successful
_only suggestthe mosttentative of actions. Information Systems Maintenance." Un-
published Ph.DDissertation, University of
Strathclyde, Glasgow,Scotland, 1980.
[12] Ewers, J. and Vassey, I. "The Systems
A cknowledgements Development Dilemma -- A Programming
Perspective," MIS Quarterly, Volume5,
Number2, June 1981, pp. 33-45.
Mythanks are offered to John Handleyfor many [13] Frank, W. The NewSoftware Economics,
helpful commentsoffered on an earlier draft of United States Professional Development In-
this article. stitute, Inc., Silver Springs, Maryland,
1979.
[14] Freedman, D.P., and Weinberg, G.M.
References Guide to Walkthroughs, Inspections and
Technical Reviews, Winthrop Publishers,
[1] Bernard, D., Emery,J.C., Nolan, R.L., and Inc. 1982.
Scott, R.H. Charging for Computer Ser- [15] Glass, R.L., and Noiseux, R.A. Software
vices: Principles and Guidelines, Maintenance Guidebook, Prentice-Hall,
EDUCOM,1977. Inc., EnglewoodCliffs, NewJersey, 1981.
[2] Berrisford, T., andWetherbe,J. "Heuristic [16] Hoskyns Systems Research Centre, "Im-
Development: A Redesign of Systems plications of Using ModularProgramming,"
Design," MIS Quarterly, Volume3, Number Guide Number 1, John Hoskyns and Co
1, 1979, pp. 11-19. Ltd, NewYork, NewYork, 1973.
[3] Boehm, B.W. "Software Engineering," [17] Khan, Z. "How to Tackle the Systems
IEEE Transactions on Computers, C-25, Maintenance Dilemma," Canadian Data
December 1976, pp. 1226-1241. Systems, March 1975, pp. 30-32.
[4] British Computer Society, User Re- [18] Land, F. "Adapting to ChangingUser Re-
quirements in Data Processing, Heyden quirements," Information and Management,
and Sons, London, England, 1979. Number5, 1982, pp. 59-75.

MIS Quarterly~December1984 255


Information SystemsMaintenance

[19] Lientz, B.P., and Swanson,E.B. Software High Cost of Maintenance," Unpublished
Maintenance Management, Addison- Ph.D Dissertation, Graduate School of
Wesley Publishing, Reading, Massa- Management, University of California, Los
chusetts, 1980. Angeles,California, 1977.
[20] Lientz, B.P., Swanson, E.B., and Tom- [33] United States General Accounting Office
pkins, G.E. "Characteristics of Application "Federal Agencies’ Maintenance of Com-
Software Maintenance," Communications puter Programs: Expensive and Under-
of the ACM,Volume 21, Number6, 1978, managed," AF MD-81-25, 1981.
pp. 266-471. [34] Zmud,R.W. ’,Individual Differences and
[21] Lincoln, T.J. "Impact of the Changing MIS Success: A Review of the Empirical
Business Environment on Management and Literature," Management Science, Volume
Their Information Needs," Management 25, Number10, 1979, pp. 966-979.
Datamatics, Volume 5, Number3, 1976,
pp. 105-111.
[22} McCosh,A.M., Rahman,M., and Earl, M.J. Aboutthe Author
Developing Managerial Information
Systems, John Wiley and Sons, NewYork, Professor Chris Edwards(MA PhD FCMA)is
NewYork, 1981. Professor of Management Information Systemsat
[23] McKell, L.J., Hansen,J.V., and Heitger, the Cranfield School of Management. He taught at
L.E. "Charging for ComputingResources," the University of Strathclyde between19 73 and
ComputerSurveys, Volume11, Number2, 1981. Fromthen until 1983 he wasresearching
1979, pp. 105-120. and teaching at the Carnegie-Mellon Graduate
[24] Macchiaverna, P. Internal Auditing, The Schoolof Industrial Administration. ProfessorEd-
Conference Board, NewYork, NewYork, wards joined Cranfield School of Management in
1978. 1983. He is particularly interested in the
[25] Mair, W.C., Wood,D.R., and Davis, K.W. organizational problems encountered by
ComputerControl and Audit, The Institute businesses using microcomputer-basedinforma-
of Internal Auditors, Inc., Altamonte tion systems. He is also involved in research
Springs, Florida, 1976. related to the effectiveness of different types of
[26J Martin, J. Security, AccuracyandPrivacy in information presentation, in particular the effec-
Computer Systems, Prentice-Hall, tive use of graphics.
EnglewoodCliffs. NewJersey, 1 973.
[27] Ogdin, J.L. "Designing Reli&ble Software,"
Datamation, Volume 18, July 1972, pp.
71-78.
[28] Ramsguard, W.C. Making Systems Work,
The Psychology of Business Systems,
John Wiley and Sons, New York, New
York, 1977.
[29] Riggs, R. "Computer Systems
Maintenance," Datamation, Volume 15,
November 1969, pp. 227-235.
[30] Swanson, E.B. "The Dimensions of
Maintenance," Proceedings 2nd Interna-
tional Conference on Software Engineer-
ing, SanFrancisco, California, 13-15 Oc-
tober 1976, pp. 422-497.
[31] Tipshus, E. and Sanderson, J. "Rotating
’Rival’ Programmers BetweenApplications
and Maintenance DampensAntagonism,
Improves Documentation," Data Manage-
ment, Volume18, June 1 980, pp. 42-46.
[32] Tompkins, G.E. "Characteristics of the

256 MIS Quarterly/December1984

Das könnte Ihnen auch gefallen