Beruflich Dokumente
Kultur Dokumente
Autumn 2011
1
Figure 1-2
Competitive advantage
Survival
Behavioral approach:
Studies issues arising from development and maintenance of systems, such as business integration and utilization
Fulfilling a customer order involves a complex set of steps that requires the close coordination of the sales, accounting, and manufacturing functions.
6
Functional Perspective : Sales and marketing systems Manufacturing and production systems Finance and accounting systems Human resources systems
Constituency Perspective: Transaction processing systems Management information systems and decision-support systems Executive support systems
TPS ( Transaction Processing Systems): A TPS is a computerized systems that performs and records the daily routine transactions necessary to conduct business such as sales order entry, hotel reservations, payroll, employee record keeping and shipping DSS ( Decision Support Systems): A DSS is a computerized system that supports business or organizational decision-making activities. DSSs serve the management, operations, and planning levels of an organization and help to make decisions, which may be rapidly changing and not easily specified in advance. ESS ( Executive Support Systems): A ESS help senior management make these decisions. ESS address non routine decision requiring judgment, evaluation, and insight because there is no agreed on procedure for arriving at a solution.
Enterprise Applications : Enterprise applications automate processes that span multiple business
functions and organizational levels and may extend outside the organization.
Four Major Type of Enterprise Application Enterprise systems: Also known as enterprise resource planning (ERP) systems solve this problem
by collecting data from various key business process in manufacturing and production, finance and accounting, Sales and marketing , human resource and storing the data in a single central data repository.
Supply chain management systems : Also known as SCM which helps businesses manage
relationships with their suppliers. SCM systems are one type of inter-organizational system because they automate the flow of information across organization boundaries.
Customer relationship management systems : Also know as CRM system which help firms
managing their relationships with their customers. This system provide information to coordinate all of the business processes that deal with customers in dales, marketing and service to optimize revenue, customer satisfaction and customer retention
Knowledge management systems: This will enable organizations to better manage processes for
capturing and applying knowledge and expertise.
9
Enterprise applications automate processes that span multiple business functions and organizational levels and may extend outside the organization.
10
Customer orders, shipping notifications, optimized shipping plans, and other supply chain information flow among Haworths Warehouse Management System (WMS), Transportation Management System (TMS), and its back-end corporate systems. 11
Computer Science
theory fundamentals
Software Engineering
the practicalities of developing delivering useful software
is concerned with
12
13
Dependability
Software must be trustworthy (reliable, secured and safe);
Efficiency
Software should not make wasteful use of system resources;
Acceptability
Software must accepted by the users for which it was designed. This means it must be understandable, usable and compatible with other systems.
14
Delivery
Developing techniques that lead to faster delivery of software;
Trust
Developing techniques that demonstrate that software can be trusted by its users. Reliable, Secured and Safe.
15
16
Engineering Example
Building a house: Land and finances garden, garage, you are used to age wine, enjoy to sit by the fireplace, lots of storage, dont like Bauhaus Architect will define number of floors and rooms, orientation of the driveway, size of the garage type of bricks, color of the walls, Construction Entering Living in the house Fixing minor problems, leaking in the roof
17
Waterfall Weakness
High risk for new systems because of specification and design problems. Low risk for well-understood developments using familiar technology. Usually requirements change, are incomplete or even not known ( Result: Thats not what I meant ! ( go back to last step ) WF-Model reacts very statically: Each stage must be completed before next one starts
Validation
Product Design
Verification
Detailed Design
Verification
Code
Unit Test
Integration
System Test
Operation + Maintenance
Revalidation
18
Specification
Outline description
Development
Intermediate versions
Validation
Final version
Transformational
High risk because of need for advanced technology and staff skills.
19
Product design
Detailed design
Focuses attention on reuse options. Focuses attention on early error elimination. Puts quality objectives up front. Integrates development and maintenance. Provides a framework for hardware/software development. Contractual development often specifies process model and deliverables in advance. Requires risk assessment expertise.
20
PUBLIC CLIENT AND EMPLOYER PRODUCT JUDGMENT MANAGEMENT PROFESSION COLLEAGUES SELF
22
The introduction of new information technology has a ripple effect, raising new ethical, social, and political issues that must be dealt with on the individual, social, and political levels. These issues have five moral dimensions: information rights and obligations, property rights and obligations, system quality, quality of life, and accountability and control.
Figure 4-1
24
System quality: Data quality and system errors Quality of life: Equity, access, and boundaries Balancing power: Center versus periphery Rapidity of change: Reduced response time to competition Maintaining boundaries: Family, work, and leisure Dependence and vulnerability
Property rights: Intellectual property Trade secrets Copyright Patents Challenges to intellectual property rights
25
Cookies are written by a Web site on a visitors hard drive. When the visitor returns to that Web site, the Web server requests the ID number from the cookie and uses it to access the data stored by that server on that visitor. The Web site can then use these data to display personalized information.
Figure 4-3
26
This figure shows the major types of products and services hawked through spam e-mail messages and the industries that receive the most spam.
27
Question???
Autumn 2011
28