0% found this document useful (0 votes)
52 views9 pages

System Analysis and Design

The document discusses different types of information systems categorized by users and functions. It describes traditional categories like office systems, operational systems, and executive information systems. It also covers newer categories such as enterprise resource planning systems, transaction processing systems, business support systems, knowledge management systems, and user productivity systems. The document then discusses information system development methods like structured analysis and the system development life cycle.

Uploaded by

Hassoon Šd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views9 pages

System Analysis and Design

The document discusses different types of information systems categorized by users and functions. It describes traditional categories like office systems, operational systems, and executive information systems. It also covers newer categories such as enterprise resource planning systems, transaction processing systems, business support systems, knowledge management systems, and user productivity systems. The document then discusses information system development methods like structured analysis and the system development life cycle.

Uploaded by

Hassoon Šd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Subject : system analysis and

design

Lecture 2-3
Types of information system
Traditionally IT managers divided information system into categories
based on the users group the system served .
Traditional categories of information system are :
1\ Office systems : used by administrative staff group .
2\ Operational system : used by operational personnel group.
3\Executive information system : used by executive managers .
4\Decision support system : used by middle managers and knowledge
workers group . Today system is identified by its function and features
rather than by its users.
The newest of categories include :
1\ Enterprise computing : is an information system that support
Company-wide operations and Data management requirement .
In large companies they are called ERP ( enterprise resource planning ) ,
common providers for ERP applications are oracle , sap .
Enterprise computing improving efficiency , reduce costs , help
managers make decisions by integrating basic company functions such as
( production , sales , services , inventory , and accounting ) .
ERP sometimes might not match what company operates .
2\Transaction Processing (TP):
It is an information system that were developed to process large amount
of data for routine business transactions and day to day business
operations such as customer-order- processing .
T P always perform a series of tasks whenever a specific transaction
occurs. e.g the sales transactions below :

1
(A single sales transaction consists of six separate tasks, which the
TP system processes as a group)

Verify
customer
data

Update
sales Sales Check credit
activity file transaction status

Post to
Adjust Check in
accounts
inventory stock
receivables
data status

Tp systems are efficient since they treat a set of transaction as a


group .Tp systems maintain data integrity by ensuring if a single
element of transaction fails , the system does not process the rest
. of transaction
Business support system : is an information system that provide \3
job –related information to support users at all levels of a
company. This type of systems can do the following
analyze transactional data *
generate information needed to manage and control business *
. process
. provide information that leads to better decision making *

2
A business support system can work hand in hand with TP
system , e.g a company sales merchandise (commodities) to a
customer , the TP system can perform the following tasks
record the sale *
update customer balance *
make deduction from inventory *
A business support system can perform the following
graph slowing – fast items selling *
. produce reports that summarized daily sales activities*
. highlights inventory items that need reordering*
Knowledge management systems : they are called expert \4
systems that captures and stores the knowledge of human expert
. and then simulate human reasoning
Expert systems are composed of knowledge base and inference
rules . A knowledge base consists of a large database that allows
users to find information by entering keywords or questions in
. normal English phrase

A knowledge management system uses inference rules, which are logical


rules that identify data patterns and relationship . expert systems
successfully have resolved diverse problems such as diagnosing illness
, searching for oils ,etc .
5 \user productivity
Companies provide employees at all levels with technology that improves
productivity. Examples of user productivity systems include e-mail, voice
mail, fax, video and Web conferencing, word processing, automated
calendars, database management, spreadsheets ,desktop publishing,
presentation graphics, company intranets, and high-speed Internet access .
6\ Information Systems Integration

3
Most large companies require systems that combine transaction
processing, business support, knowledge management, and user
productivity features.
: Information system development

. The best system supports business and information needs

Many options exist to develop the best system , but the most popular
analysis techniques or basic analysis techniques are
Basic system analysis
techniques

Other methods Object oriented Structured analysis


based on SDLC

structured analysis method *

is the traditional system development technique , which uses a


series of phases called system development life cycle (SDLC) , and uses
a set of process models to describe a system graphically . is used widely
. and popular one

SDLC : system development life cycle is a common


methodology for system development in many organization Which
describes activities and functions that all systems developers perform,
.regardless of which approach they use

Planning , analysis , design , implementation , system support


security . SDLC phases can be shown using waterfall model . In the
waterfall model, the result of each phase is called a deliverable, or end

4
product, which flows into the next phase . The phases and deliverables of
the SDLC are shown in the waterfall model
system request

Phase 1 planning

Preliminary
investigation

Phase 2 analysis

System requirement

Phase 3 design

System specification

Phase 4 implementation
implementation

Complete functioning
IS

Phase 5 system support


security

Operational IS

5
: System request

The starting point for most projects is called system request ,(a formal
request to IT departments from top managers or head of department , or
head of IT department), which describes problems or changes in
.information system or business process

System request proposes the following

enhancement for an existing system *

correction of problem *

replacement of an older system by building entirely new information *


. system

: Main reasons for system request

improved service : system request aimed at improving service to \1*


users or customers within the company . such as

creating online college registration system **

. allowing fund investors to check their account balance on a web site **

: support for new products and services \2

A new services and products need support from IT. Such as

as new products enter the market place vendors announces that they *
. will no longer provide support for older versions

. software vendors may offer automatic upgrade service to subscribers *

better performance : to improve performance for a system , current \3


system might not meet performance requirements, it might respond

6
slowly to data inquiries at certain times, or it might unable to support
. company growth

more information : system might produce insufficient information for \4


changing company needs . such as the system that tracks customer orders
. might not capable of analyzing and predicting marketing trends

stronger controls : the system must have effective controls to ensure \5


. the data is secure and accurate

common security controls such as passwords ,encryption that keep *


. the system from unauthorized users

hardware based security controls : such biometric devices that can *


identify person by retina scan, and scanners that scan hands and
. determine fingers characteristics

data accuracy by minimizing data entry errors for example if a *


user enters invalid customer number the order processing system should
. reject the entry immediately

REDUCED COST : The current system could be expensive to \6


operate or maintain as a result of technical problems, design weaknesses,
or the changing demands of the business. It might be possible to adapt the
system to newer technology or upgrade it. On the other hand, cost-benefit
analysis might show that a new system would be more cost effective and
. provide better support for long-term objectives

A system request : must pass several tests called feasibility study , to


see whether it is worthwhile to proceed further .
a feasibility study uses four main criteria to measure aproposal or test
system request :

7
1\operational feasibility : means that a proposed system will be used
effectively after it has been developed. If users have difficulty with a new
system, it will not produce the expected benefits. During operational
feasibility analyst should consider the issues that solved these questions
such as :
* Does management support the project? Do users support the project? Is
the current system well liked and effectively used? Do users see the need
for change?
* Will the new system require training for users? If so, is the company
prepared to provide the necessary resources for training current
employees?
* Will users be involved in planning the new system right from the start?
* Will the new system result in a workforce reduction? If so, what will
happen to affected employees?
* Will any risk to the company’s image or goodwill result?
2\ technical feasibility : refers to the technical resources needed to
develop, purchase, install,or operate the system. When assessing
technical feasibility, an analyst must consider the following points:
* Does the company have the necessary hardware, software, and network
resources? If not, can those resources be acquired without difficulty?
* Does the company have the needed technical expertise? If not, can it be
acquired?
* Will a prototype be required?
* Will the system be able to handle future transaction volume and
company growth?
3\Economic feasibility : to measure and asses the benefits from the
proposed system after total cost such as
• People, including IT staff and users
• Hardware and equipment

8
• Software, including in-house development as well as purchases from
vendors .
• Formal and informal training .
• Licenses and fees .
• Consulting expenses
• Facility costs
• The estimated cost of not developing the system or postponing the
project.
The benefits can be tangible or intangible .
* tangible benefits : are benefits that can be measured in dollars. Tangible
benefits result from a decrease in expenses, an increase in revenues, or
both.
Example of tangible benefits:
*A new scheduling system that reduces overtime
Intangible benefits : are advantages that are difficult to measure in dollars
but are important to the company.
Example of intangible benefits :
* A new Web site that enhances the company’s image .
4\ schedule feasibility : means that a project can be implemented in an
acceptable time frame. When assessing schedule feasibility, a systems
analyst must consider the interaction between time and costs. For
example, speeding up a project schedule might make a project feasible,
but much more expensive.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy