Chapter Three - Information Systems Development
Chapter Three - Information Systems Development
After completing this sub- chapter on Information System Development, you will be able to:
• Describe the stages in the systems development Lifecycle (SDLC)
• Discuss the alternative to SDLC such as Prototyping
• Analyze the Software outsourcing process
• Justify the factors to consider while selecting a software package
Information systems have to be developed and improved. This could be done with, prototyping,
application software packages acquisition, end-user development, and outsourcing as systems-
building alternatives to the traditional systems lifecycle method.
i. Systems investigation
• Determines whether a business problem exists
• Conducts a feasibility study to determine whether or not a new or improved
information system is a feasible solution
• Develop a project management plan and obtain management approval
The product is feasibility study.
ii. System analysis
• Describes what a system should do to meet the information needs of end-users
• Analyze the information needs of end-users, the organization environment and
any system currently used
• Develop the functional requirements of a system that can meet the needs of end-
users covering: interface requirements; processing requirements; storage
requirements; control requirements.
The product is functional requirements.
iii. Systems design
• Specifies how the system will accomplish the objective of developing a system
that meets the information needs of end-users
• In this step then, the following specifications are developed:
o Hardware
o Software
o People
o Data resources
o Information products
The product is systems specifications.
iv. Systems implementation
• Involves several activities
• Acquisition of hardware and software (software might be developed)
• Testing of systems – programs and procedures
• Performance of a variety of installation activities
2
• Training people to operate and use systems
• Development of documentation
• Converting to new system
The product is operational system.
3
Limitations of the Lifecycle Approach
The systems lifecycle is still used for building large transaction processing systems and
management information systems where requirements are highly structured and well defined.
It will also remain appropriate for complex technical systems such as space launches, air
traffic control, and refinery operations. Such applications need a rigorous and formal
requirements analysis, predefined specifications, and tight controls over the systems-building
process.
However, the systems lifecycle approach is costly, time consuming, and inflexible. Volumes
of new documents must be generated and steps repeated if requirements and specifications
need to be revised. Because of the time and cost to repeat the sequence of lifecycle activities,
the methodology encourages freezing of specifications early in the development process,
discouraging change. The lifecycle method is ill-suited to decision-oriented applications
where decision makers may need to experiment with concrete systems to clarify the kinds of
decisions they wish to make. Formal specification of requirements may inhibit system-
builders from exploring and discovering the problem structure. Likewise, the lifecycle
approach is not suitable for many small desktop systems, which tend to be less structured and
more individualized.
Steps in Prototyping
Prototyping process involves the following steps:
Step 1: Identify the user's basic requirements. The system designer (usually an information
systems specialist) works with the user only long enough to capture his or her
basic information needs.
Step 2: Develop an initial prototype. The system designer creates a working prototype
quickly, using fourth-generation software, interactive multimedia, or computer-
aided software engineering (CASE) tools.
Step 3: Use the prototype. The user is encouraged to work with the system in order to de-
termine how well the prototype meets his or her needs and to make suggestions
for improving the prototype.
Step 4: Revise and enhance the prototype. The system builder notes all changes the user
requests and refines the prototype accordingly. After the prototype has been
revised, the cycle returns to step 3. Steps 3 and 4 are repeated until the user is
satisfied.
5
When no more iterations are required, the approved prototype then becomes an opera-
tional prototype that furnishes the final specifications for the application. Sometimes the
prototype itself is adopted as the production version of the system.
6
database on a PC) to more than 400 program modules with 500,000 lines of code for a
complex mainframe system.
Packages have flourished because there are many applications that are common to all
business organizations—for example, payroll, accounts receivable, general ledger, or inven-
tory control. For such universal functions with standard procedures, a generalized system will
fulfill the requirements of many organizations.
To maximize market appeal, packages are geared to the most common requirements of all
organizations. What happens if an organization has unique requirements that the package
does not address? To varying degrees, package software developers anticipate this problem
by providing features for customization that do not alter the basic software. Customization
features allow a software package to be modified to meet an organization's unique require-
ments without destroying the integrity of the package software. For instance, the package
may allocate parts of its files or databases to maintain an organization's own unique pieces of
data. Some packages have a modular design that allows clients to select only the software
functions with the processing they need from an array of options. An alternative way of
satisfying organizational information requirements unmet by a software package is to
supplement the package with another piece of software.
7
Application software packages must be thoroughly evaluated before they can be used as the
foundation of a new information system. The most important evaluation criteria are the func-
tions provided by the package, flexibility, user-friendliness, hardware and software resources,
database requirements, installation and maintenance effort, documentation, vendor quality,
and cost. The package evaluation process often is based on a Request for Proposal (RFP),
which is a detailed list of questions submitted to packaged software vendors.
When a system is developed using an application software package, systems analysis will
include a package evaluation effort. Design activities will focus on matching requirements to
package features. Instead of tailoring the system design specifications directly to user
requirements, the design effort will consist of trying to mold user requirements to conform to
the features of the package.
When a software package solution is selected, the organization no longer has total control
over the system design process. At best, packages can meet only 70 percent of most
organizations’ requirements. If the package cannot adapt to the organization, the
organization will have to adapt to the package and change its procedures.
8
5. End-user Development
In many organizations, end users are developing a growing percentage of information system
with little or no formal assistance from technical specialists. This phenomenon is called end-
user development. End-user development has been made possible by the special fourth-
generation software tools. With fourth-generation languages, graphics languages and PC
software tools, end users can access data, create reports, and develop entire information
systems on their own, with little or no help from professional systems analysts or
programmers. Many of these end-user developed systems can be created much more rapidly
than with the traditional systems lifecycle.
Unfortunately, fourth-generation tools still cannot replace conventional tools for some
business applications because their capabilities remain limited. Fourth-generation software is
relatively inefficient, processing individual transactions too slowly and at too high a cost to
make these systems suitable for very large transaction processing systems. Slow response
time and computer performance degradation often result when very large files are used.
Most fourth-generation tools likewise cannot easily handle applications with extensive
procedural logic and updating requirements, such as systems used for optimal production
scheduling or tracking daily trades of stocks, bonds, and other securities, that require comp:
processing and often the matching of multiple files.
9
Reduced application backlog as users are no longer totally reliant on overburdened
information systems specialists.
Problems
At the same time, end-user computing poses organizational risks because it occurs outside of
traditional mechanisms for information system management and control. Most organizations
have not yet developed strategies to ensure that end-user-developed applications meet
organizational objectives or meet quality assurance standards appropriate to their function.
When systems are created rapidly, without a formal development methodology, testing and
documentation may be inadequate.
Control over data can be lost in systems outside the traditional information systems de-
partment. When users create their own applications and files, it becomes increasingly
difficult to determine where data are located and to ensure that the same piece of information
(such as product number or annual earnings) is used consistently throughout the organization.
6. Outsourcing
If a firm does not want to use its internal resources to build or operate information systems, it
can hire an external organization that specializes in providing these services to do the work.
The process of turning over an organization's computer center operations,
telecommunications networks, or applications development to external vendors is called
outsourcing.
Its own computer center, which would be underutilized when there is no peak load.
Outsourcing has become popular because some organizations perceive it as a cost effective
measure that eliminates the need for maintaining their own computer center and information
systems staff. The provider of outsourcing services benefits from economies of scale (the
same knowledge, skills, and capacity can be shared with many different customers) and
likely to charge competitive prices for information systems services. Outsourcing allows a
company with fluctuating needs for computer processing to pay for only what it uses rather
than build
10
Some firms outsource because their internal information systems staff cannot keep pace with
technological change or innovative business practices or because they want to free scarce and
costly talent for activities with higher payback. By outsourcing, companies hope to exploit
the benefits of information technology in key business processes and improve the
productivity of their information system resources.
11