Вы находитесь на странице: 1из 24

BA 186 FINALS REVIEWER

System Design Phase: Chapters 8 – 10


Systems Implementation Phase: Chapter 11
System Support and Security: Chapter 12

CHAPTER 8: USER INTERFACE DESIGN


- Everyone wants a system that is easy to learn and use

User Interface (UI)


- Describes how users interact with a computer system
- Consists hardware, software, screens, menus,
functions, output, and features that affect 2-way
communications between the user and computer

*best interface: ones that users don’t even notice. They make
sense cos they do what users expect them to do - User-centered System
o Distinctions blurs between input, output
Evolution of User Interface and interface itself
o Users work with varied mix of input, screen
CLI  GUI  NUI output and data queries on their daily
Command Line Interface (CLI) functions
- Codified  Because all tasks require
- Strict interactions with the computer
- Programming black screen system, UI is a vital element in
Graphical User Interface (GUI) the systems design phase
- Metaphor
- Exploratory Human Computer Interaction (HCI)
- Laptop desktop screen - UI is based on basic principles of HCI
Natural User Interface (NUI) - Relationship between computers and people who use
- Direct them to perform their jobs
- Intuitive - Started in 1980s
- IPad screen o Users typing complex commands in green
*IT group became a supplier of information technology, rather text on a black screen
than a supplier of information - Then came the GUI
o Huge improvement
o Used icons, graphical objects, and pointing
devices

User Rights
1. Perspective
- When developing older systems, all the printed and o User is always right
screen output were designed first then inputs o System is the problem, not the user
necessary to produce the results 2. Installation
- Often, the UI mainly consisted of process-control o Right to install and uninstall software and
screens hardware systems easily wo negative
o Allowed the user to send commands to the consequences
system 3. Compliance
o Worked well with traditional systems that o Right to a system that performs exactly as
simply transformed input data  structured promised
output 4. Instruction
- Main focus TODAY: users within and outside the o Easy to use instructions for understanding
company and utilizing a system to achieve desired
o How they communicate with the IS goals and recover efficiently from problem
o How the system supports the firm’s situations
business operations 5. Control
o Right to be in control of the system
o Be able to get the system to respond to a
request for attention
6. Feedback
o System provides clear, understandable and
accurate info regarding the task it’s
performing and the progress toward
completion
7. Dependencies

1
o Informed clearly about all the system - How people work, learn, and interact with computers
requirements for successfully using Aesthetics
software or hardware - How an interface can be made attractive and easy to
8. Scope use
o Know the limits if the system’s capabilities Interface technology
9. Assistance - Provides operational structure required to carry out
o Communicate with the technology provider the design objectives
and receive a thoughtful and helpful
response when raising concerns Output Design
o Customer service Before designing output, ask questions:
10. Usability - Purpose of output
o User as the master of software and - Who wants the info? Why? And how it will be used
hardware technology (not vice versa) - What specific info will be included
o Products should be natural and intuitive to - Will the output be printed, on screen or both? Type of
use device the output go to?
- When will the info be provided and how often must it
Principles of User-Centered Design be provided?
1. Understand the business - Do security or confidentiality issues exist
o Interface designer must understand the
functions and how the system supports
individual, departmental and enterprise
goals
o Overall objective: design an interface that
helps users perform their jobs
o Good starting point: analyze a functional
decomposition diagram (FDD)
2. Maximize graphical effectiveness
o People learn better visually
3. Think Like a User
o Systems analyst should understand user
experience, knowledge and skill levels
o Interface should be flexible enough to
accommodate novices as well as
experienced users
4. Use models and prototypes
o Essential to construct models and
prototypes for user approval
o Can present initial screen designs in the Output Technology
form of a storyboard - Internet-based info delivery
5. Focus on usability - Email
o Objective: offer a reasonable number of - Blogs
choices that a user can easily comprehend - Instant messaging
 Too many options: confusing - Wireless devices
 Too few options: increase - Digital audio, images and video
number of submenu levels and - Podcasts
complicate the navigation - Automated facsimile systems
process - Computer output to microfilm or digital media
o Often, present the most common choice as - Specialized forms of outputs
the default, but allow the user to select o ATMs
other options o Electronic detection of data embedded in
6. Invite feedback credit cards, employee cards
7. Document everything
o For later use of programmers Types of Reports
- Detail reports
Designing the UI – 8 Basic Guidelines - Exception reports
1. Design a transparent interface - Summary reports
2. Create an interface that is easy to learn and use
3. Enhance user productivity Input Design
4. Make it easy for users to obtain help or correct errors - Source documents
5. Minimize input data problems o Collects input data, triggers or authorizes an
6. Provide feedback to users input action and provides a record of
7. Create an attractive layout and design original transaction
8. Use familiar terms and images - Data entry screens
o Data capture: automated or manually
*Good UI design = ergonomics + aesthetics + interface technology operated device to identify the source data
Ergonomics and convert it into computer-readable form

2
 Credit card scanners, bar code o Output must be accurate, complete, current
readers and secure
o Data entry: process of manually entering o Protects privacy rights and shields the
the data into the IS organization’s proprietary data from theft
 Keystrokes, mouse clicks, touch or unauthorized access
screens, spoken words o Ex. Reports should include
- Input masks  Title, report number or code,
o Templates or patterns that restrict data printing date and time period
entry and prevent errors covered
- Validation rules  Page # of #
o Improves input quality by testing data and  End of report should be labeled
rejecting any entry that fails to meet clearly
specified conditions  Control totals and record counts
o Sequence check, existence check, data type should be reconciled against
check, range check, reasonableness check, input totals and counts
validity check, combination check, batch  Selected at random for thorough
controls check of correctness and
- Objective: ensure quality, accuracy and timelessness of completeness
input data  All errors or interruptions must
- Garbage in, garbage out (GIGO) like FIFO be logged so they can be
analyzed
Input Technology - Input Security Control
- Batch input o Includes necessary measures to ensure that
o Data entry usually performed on a specified input data is correct, complete and secure
time schedule: daily, weekly, monthly, or o Focus on input control during every phase
longer of input design
- Online input  Starting with source of
o Source data automation = online data entry documents that promote data
+ automated data capture accuracy and quality
o Every piece of info should be traceable back
Traditional Input Devices to the input data that produced it
- Keyboard  provide audit trail
- Mouse  records source of
- Pointing devices each data
- Microphone o When batch input method is used
- OCR: optical character recognition  Produce an input log file that
- MICR: magnetic ink character recognition identifies and documents the
- Graphic input devices data entered
Evolving Input Devices Data security policies and procedures
- Body motion detection - Protect data from loss or damage
- Advanced voice recognition - Records retention policy
- Biological feedback o store source documents in a safe location
- Embedded magnetic data for some specified length of time
- Advanced optical recognition
- Physical adaptation devices CHAPTER 9: DATA DESIGN
Emerging Input Devices
- BCI: brain computer interface Data Design Concepts
- Neural networks - Data structure
- AI: artificial intelligence o Framework for organizing, storing and
- Advanced motion sensors managing data
- 2-way satellite interface o Consist of files or tables that interact in
- virtual environments various ways
- 3D technology  Each file/table contains data
about people, place, things or
Input Volume Reduction events
*To reduce input volume, reduce # of data items required for - File-oriented system
each transaction o Aka file processing system
1. don’t input data that user can retrieve from system o Stores data in one or more separate files
files or calculate from other data o Same data is stored in more than 1 location
2. input necessary data only  Major disadvantage of file-
3. don’t input constant data oriented systems cos it reduces
4. user codes efficiency and data quality
o Can contain various types of files
Security and Control Issues  master files
- Output Security Control

3
 stores relatively *in a file processing environment, that means retrieving
permanent data information from independent, file-based systems, which is slow
about an entity and inefficient. These problems DO NOT exist in database system
 ex. Product code, - Database management system (DBMS)
name, description o All tables are connected by common fields
 table files o Typical common field: customer number
 contains reference  Used to locate info about
data used by the IS customer in other tables
 relatively static and o Collection of tools, features, and interfaces
are not updated by IS that enables users to add, update, manage,
 ex. Tax tables, access and analyze the contents of a set
postage rate tables data
 transaction files o Main advantage from user’s POV
 stores records of daily  Offers timely, interactive and
business and flexible data access
operational data o Linked tables form a unified structure
 input file that updates  Aka relational database or
master file relational model
 after updating, o Common field that connects 2 tables is said
transaction file has to link, join or relate the tables
served its purpose
 ex. Charges and
payments file that
updates customer
balance file
 work files
 temporary file
created by an IS for a
single task
 ex. Sorted files and
reports that hold
output reports until
printed
 security files
 for backup and
recovery purposes
 ex. Audit trail files 3 Potential Problems in File Processing Environment
and backups of 1. Data redundancy
master, table, o Data common to 2 or more IS is stored in
transaction files several places
 new security files 2. Data integrity
must be created to o Problems can occur if updates are not
replace outdated files applied in every file
 history files 3. Rigid data structure of a typical file processing
 for archiving environment
purposes o Businesses must make decisions based on
 ex. Inactive student company-wide data
file o Managers often require info from multiple
business units and departments

Evolution from File Systems to Database Systems


Database System
- Offers a solution to the problems of file processing
- Provides overall framework
o avoids data redundancy
o supports real-time dynamic environment

File-processing environment: data files designed to fit individual


business systems
Database environment: several systems can be built around a
single database

4
o Can allow different users to have different
levels of access
- Most DMBSs provide sophisticated security support

Increased programmer productivity


- Programmers don’t have to create underlying file
structure for a database
o Allows concentration on logical design
 New database app can be
developed more quickly than in a
file-oriented system
Data Independence
- Systems that interact with a DBMS are relatively
independent of how the physical data is maintained
- Provides DBA flexibility to alter data structures wo
DBMS ADVANTAGES
modifying IS that use data
Scalability
DBMS CONCEPTS
- system can be expanded, modified, or downsized easily
to meet the rapidly changing needs of a business
enterprise
- ex. If company decides to add data about secondary
suppliers of material it uses,
o new table can be added to the relational
database and linked with a common field

Better support for Client/Server System


- processing is distributed throughout the organization
- require the power and flexibility of database design

Economy of Scale
- inherent efficiency of high-volume processing on larger
computers
- database design allows better utilization of hardware
- if company maintains an enterprise-wide database,
processing is less expensive using a powerful
mainframe server instead of using several smaller
computers

Flexible Data Sharing


- users are empowered because they have access to the
info they need to do their jobs
Interfaces for Users, Database Administrators and Related
Enterprise-wide application Systems
- DBMS is managed by a database administrator (DBA)
o Assesses overall requirements and Users
maintains the database for the benefit of - Typically work with predefined queries and
the entire organization rather than a single switchboard commands
department or user o Also use query languages to access stored
- Database systems can support enterprise wide data
applications more effectively than file processing  Query language allows user to
systems specify a task wo specifying how
the task will be accomplished
Stronger Standards  Some use natural language
- Effective database administration helps ensure that commands that resemble
standards for data names, formats, and documentation ordinary English sentences
are followed uniformly throughout the org  Query by example (QBE)
language, Structured Query
Controlled Redundancy Language (SQL)
- Because data is stored in a set of related tables, data Database Administrators
items don’t need to be duplicated in multiple locations - Responsible for DBMS management and support
- concerned with data security and integrity
Better Security o preventing unauthorized access
- DBA can define authorization procedures o providing backup and recovery, audit trails
o Ensures only legitimate users can access the o maintaining the database
database o supporting user needs

5
- most DBMSs provide utility programs to assist the DBA o Can require design modification, additional
o creating and updating data structures software and some added expense
o collecting and reporting patterns of (migrating traditional database to the Web)
database usage
o detecting and reporting database Internet Terms
irregularities - Web browser
Related Information Systems o App that enables user to navigate or browse
- DBMS can support several related IS that provide input the internet and display web pages on the
to and require specific data from the DBMS local computer
- Unlike a UI, no human intervention required for 2-way - Web page
communication between DBMS and related systems o Text document written in HTML (Hypertext
Markup Language)
DBMS Components  HTML: uses formatting codes
- Data Manipulation Language (DML) called tags
o Controls database operations  Tags: specify how the
 Storing text and visual
 Retrieving elements will be
 Updating displayed in a web
 Deleting data browser
o Most commercial DBMS: Oracle and IBM’s o Stored on a Web Server
DB/2 use a DML  Web server: computer that
- Schema receives requests and makes
o Complete definition of a database including web pages available to users
descriptions of all fields, tables and - Web site
relationships o = Web server + web pages
o Subschema
 View of the database by one or Data Design Terms
more systems or users - entity
- Physical Data Repository o person, place, thing, or event for which data
o At this stage, data dictionary is transformed is collected and maintained
into physical data repository - table or file
o Contains schema and subschemas o data is organized into tables or files
o Might be centralized or distributed to - field
several locations o aka attribute
o single characteristic or fact about an entity
Web-based Database Design Characteristics - record
- Global access o aka tuple (rhymes with couple)
o Internet enables worldwide access using o set of related fields that describes one
existing infrastructures and standard instance or occurrence of an entity
telecommunications protocols
- Ease of use Key Fields
- Multiple platforms - Primary key
o Web-based design is not dependent on o Field or combination of fields that uniquely
specific combination of hardware and and minimally identifies a particular
software member of an entity
o Required: browser and internet connection - Candidate key
- Cost effectiveness o Sometimes you have a choice of fields to
o Initial investment is low cos internet serves use as primary key
as communication network o Any field that could serve as primary key
o Require only a browser, and web-based *any field aint a primary or candidate key is a nonkey field
systems do not require powerful - Foreign key
workstations o Recall that a common field exists in more
- Security issues than 1 table and can be used to form a
o Internet connectivity raises special concerns relationship, or link between the tables
o Solution o Field in 1 table that must match a primary
 Good design key value in another table in order to
 Software that can protect the establish the relationship between the 2
system and detect intrusion variables
 Stringent rules for passwords - Secondary key
and user ID o Field or combination of fields that can be
 Vigilant users and managers used to access or retrieve records
- Adaptability issues o Not unique
o Internet advantages: access, connectivity,
flexibility

6
 exactly 1 of the second entity
occurs for each instance of the
first entity
o one to many relationship (1:M)
 1 occurrence of the first entity
can relate to many instances of
the second entity, but each
instance of the second entity can
associate with ONLY 1 instance
of the first entity
o many to many relationship (M:N)
 1 instance of the first entity can
relate to many instance of the
second entity, and 1 instance of
the second entity can relaty to
many instances of the first entity

Referential Integrity
- Type of validity check
- Set of rules that avoids data inconsistency and quality
problems
- In a relational database, referential integrity means
that a foreign key value cannot be entered in 1 table
unless it matches an existing primary key in another
table
- Wo referential integrity, might have an order called an
orphan
o No related customer
- Prevent the deletion of a record if record has a primary
key that matches foreign keys in another table
- Ex. Referential integrity would prevent you from
entering a customer order in an order table unless
customer already exists in the customer table

Entity-Relationship Diagram (ERD)


- model that shows the logical relationships and
interaction among system entities
- provides overall view of the system and a blueprint for
creating the physical data structures
- types of relationships between entities
o one to one relationship (1:1) Cardinality

7
- describes the numeric relationship between 2 entities - involves applying a set of rules that can help you
and shows how instances of 1 entity relate to instances identify and correct inherent problems and
of another entity complexities in your table designs
- technique used to define relationships in more detail - involves 4 stages
after analyst draws an initial ERD o unnormalized design
o first normal form
o second normal form
o third normal form

Using Codes During Data Design


- code
o set of letters or numbers that represents a
data item
o used to simplify output, input and data
formats
o reviewed during data design process and
develop new ones that will be used to store
and access data efficiently
o often shorter than the data the represent
o save storage space and costs
o reduce data transmission time
o decrease data entry time
o ex. ZIP codes used to classify and sort mail
efficiently

Types of Codes
1. Sequence
o Numbers or letters assigned in a specific
order
o Contain no additional info other than an
indication of order of entry into the system
2. Block sequence
o Blocks of numbers for different
classifications
o Ex. College course numbers (Chem 110 and
Math 125 for freshies)
3. Alphabetic
Normalization o Alphabet letters to distinguish one item
- process of creating table designs by assigning specific from another based on category,
fields or attributes to each table in the database abbreviation or easy to remember value:
o table design mnemonic code
 specifies the fields and identifies 4. Significant digit
the primary key in a particular o Series of subgroups for digits
table or file o Ex. ZIP codes
- working with a set of initial table designs, use 5. Derivation
normalization to develop an overall database design o Combine data from different item
that’s simple, flexible, and free of data redundancy attributes, or characteristics to build the
code
6. Cipher

8
o use keyword to encode a number  System reads or writes physical
7. Action record at a time
o Indicate what action is to be taken with an  When system reads a physical
associated item record, it loads the data from
storage into a buffer
Tips in Developing a Code  Segment of computer
1. Keep codes concise memory
o Do not create codes longer than necessary - Data coding & storage
2. Allow for expansion o Computers represent data bits or binary
o Coding scheme must allow for reasonable digits
growth in the number of assigned codes o EBCDIC, ASCII, AND BINARY
3. Keep codes stable  Extended Binary Coded Decimal
o Changes in codes can cause consistency Interchange Code
problems and require data updates  Used on mainframe
4. Make codes unique computers and high
o Unique to have meaning capacity servers
5. Use sortable codes  American Standard Code for
6. Avoid confusing codes Information Interchange
o Like 0 and O, 1 and I  Used on most
7. Make codes meaningful personal computers
o Must be easy to remember, useful for users  EBCDIC and ASCII both require 8
convenient to use and easy to encode and bits or 1 byte for each character
interpret o UNICODE
8. Use a code for a single purpose  Uses 2 bytes per character rather
9. Keep condes consistent than 1
o Storing dates
 Depends on how the dates will
be displayed and whether they
will be used in calculations

Data Control
- Well designed DBMS must provide built-in control and
security features to maintain data
o Subschemas
o Passwords
o Encryption
o Audit trail files
o Backup and recovery procedures
- Main responsibility: ensure that DBMS features are
used properly
- System security
Database Storage & Access o Network monitoring
- Strategic Tools o Access codes
o Data warehousing o Data encryption
 Integrated collections of data  Process of converting readable
that can include seemingly data into unreadable characters
unrelated info, no matter where to prevent unauthorized access
it is stored in the company to the data
 Provides enterprise-wide view to o Passwords
support management analysis o Audit trails
and decision making - Audit log files
o Data mining o Record details of all accesses and changes
 Looks for meaningful data to the file or database can be used to
patterns and relationships recover changes made since the last backup
- Logical and Physical Storage - Audit fields
o Logical storage o Special fields within data records to provide
 Consists of alphabetic and additional control or security information
numeric characters o Include date the record was modified, name
o Physical storage of user who performed the action, number
 Strictly hardware related of times the record has been accessed
 Involves physical record, or block
 Smallest data unit CHAPTER 10: SYSTEM ARCHITECTURE
that can be handled - Translates system’s logical design into a physical
by the operating structure that includes hardware, software and
system processing methods
System Architecture Checklist

9
- Enterprise Resource Planning (ERP)
o Defines a specific architecture
 Includes: standards for data,
processing, network and UI
design
 Describes a specific hardware
and software environment
(platform) that ensures
connectivity and easy integration
of future systems
- Initial and Total Cost of Ownership (TCO)
o TCO: tangible purchases, fees, contracts
(hard costs)
o Soft costs of management, support, training
and downtime
 More difficult to measure
- Scalability
o Aka extensibility
o Ability to expand, change or downsize easily
to meet changing needs of a business Stand Alone Computing
enterprise - user works in stand-alone mode
- Web Integration o workstation performs all functions of a
o System analyst must know if new app will server
be a part of an e-commerce strategy and  storing, accessing, and
the degree of integration with other web- processing data
based components  providing UI
- Legacy system interface requirements - inefficient and expensive despite user productivity
o Older systems that use outdated o maintaining data on individual workstations
technology, but still functional raised major concerns about data security,
- Processing options integrity and consistency
o Online or batch processing
- Security issues Local & Wide Area Networks
- Local Area Network (LAN)
Planning Architecture o Allows sharing of data and hardware
- 3 main functions of every system resources
o data storage and access methods o Resolved problem of stand-along computing
o application programs - Wide Area Network (WAN)
 handles the processing logic o Spans long distances
o interface o Can connect LANs that are continents apart
 allows users to interact with the - Distributed systems
system o Company wide systems that connect one or
o all 3 are performed on a server, client, or a more LANs or WANs
divided between the server and the client
File Sharing Architecture – Client Based Processing
Servers and Clients - Aka file server design
Server - Individual LAN client has a copy of the app installed
- computer that supplies data, processing services or locally, while data is stored on a central file server
other support to 1+ computers o Client request for copy of data file  server
o computers = clients transmits data file to client
o After performing processing locally, client
Mainframe Architecture return the data file to the central fle server
- server performs all processing where it is stored
- describes a multiuser environment where server is
more powerful than the clients

10
Client/Server Design Styles
- Many forms depending on type of server and
relationship between server and client

Client/Server Architecture
- Systems that divide processing between 1 or more
networked clients and a central server
- Client
o handles entire UI (data entry, data query,
and screen presentation logic)
- Server
o Stores data and provides data access and
database management functions
o Handles data and app logic

Based on the figure above, processing is divided between the


Client/Server Characteristics Mainframe
server and the clients
Very flexible Basic Architecture Very rigid
- Nature of the communication: depends on type of
Flexible App development Highly structured server
Fast Slow o Database server
Object-oriented Traditional  Processes individual SQL
PC-based User-environment Uses terminals commands
GUI Text interface o Transaction server
Empowers the Constrains the  Handles set of SQL commands
user user o Object server
Improves Limited options  Exchanges object messages with
productivity clients
Decentralized Security and Centralized o Web server
Difficult to control control features Easier to control  Sends and receives Internet-
Can be shared Processing options Cannot be based communications
and configured in modified
any form desired Fat & Thin Clients
Can be Data storage All data is stored - Fat client design
distributed to options centrally o Aka thick client
place data closer o locates all or most of the app processing
to users logic at the client
Very flexible Hardware/Software Very rigid - Thin client design
Multivendor hotel integration Single proprietary o Locates all or most of the processing logic at
vendor the server

11
Cost-Benefit Issues
- To support business requirements, IS need to be
scalable, powerful, and flexible
- Client/server computing (Benefits)
Client/Server Tier o transfer apps from expensive mainframes to
- aka two-tier design less-expensive client platforms
o UI resides on the client o reduce network load and improve response
o All data resides on the server and app logic times
- Three-tier design - Client/Server Performance Issue
o Recent version o Separates apps and data
o Aka n-tier designs o Networked clients submit data requests to
o UI runs on the client server, server responds by sending data
o Data is stored on the server back to the clients
o Has middle layer  When # of clients and demand
 Between client and server for services increase beyond a
 Processes client requests and certain level, network capacity
translates to data access becomes a constraint  system
commands performance declines
 Commands can be dramatically
understood and o To deliver and maintain acceptable
carried out by the performance, system developers must
server anticipate the # of users, network traffic,
 Can run either on server size, and location and design a
server/client/both client/server architecture that can support
 “middleware” current and future business needs
 software that o Data storage
connects dissimilar  Data can be stored in more than
apps and enables 1 location using distributed
them to communicate database management system
and pass data (DDBMS) like processing
 can be an application server *client/server systems must be designed so client contacts the
because it provides the app or server only when necessary and makes as few trips as possible
business logic required by the
system Internet-based Architecture
 enables tiers to communicate - Entire UI is provided by the Web server
and pass data back and forth o in HTML coded documents
 glue that holds clients and  interpreted and displayed by
servers together client’s browser
 provides transparent interface - Web is used to build efficient, reliable and cost-
 enables integration of effective solutions
dissimilar software - Use available and emerging technology to meet
and hardware company’s business requirements when planning new
 integrate legacy systems and systems
Web-based applications - Packaged solutions and e-commerce service providers
 Ex. Middleware can link a - Corporate Portals
departmental database to a Web o Entrance to a multifunction Website
server, which can be accessed by o After entering, user can navigate to a
client via the Internet or a destination using various tools and features
company intranet provided by the portal designer
o Can provide access for customers,
employees, suppliers, and the public

12
o Portal design provides important link o Users interact directly with the IS
between user and system o Users can access data randomly
 Poor design can weaken system o IS must be available whenever necessary to
effectiveness and value support business functions
- Cloud Computing - Batch processing
o Refers to cloud symbol = Internet o Data is collected and processed in groups or
o Envisions a cloud of remote computers that batches
provide total online software and data o Can handle other situations more efficiently
environment hosted by third parties as compared to online processing
o Effectively eliminates compatibility issues  Online processing: interactive
 Cos internet itself is the platform business systems require
 Provides scaling on demand immediate data input and
 Matches resources to output
needs at any given o Used for large amounts of data that must
time be processed on a routine schedule
 Ex. During peak loads, o Ex. Paychecks, credit card transactions
additional cloud - Combined online and batch processing
servers might come o Online processing can be used with file-
on line automatically oriented systems
to support the
workload
*user’s computer doesn’t perform processing or computing tasks,
the cloud does
- Web 2.0
o Shift to internet-based collaboration
o Not a reference to a more technically
advanced version of the current Web
o 2nd generation of the Web
 enables people to collaborate,
interact and share info more
Open Systems Interconnection (OSI) Model
dynamically
- Describes how data actually moves from an app on 1
computer to an app on another networked computer
- Along the way, data may pass through one or more
Developing E-Commerce Solutions In-House
network routers that control the path from 1 network
- Require financial resources and management attention
address to another
- Benefits
o Unique website LAYER NAME DESCRIPTION
 Design consistent with NUMBER (layer)
company’s marketing efforts 7 Application Provides network services
o Complete control over the organization of requested by local workstation
the site, # of pages, size of the files 6 Presentation Ensures data is uniformly
o Scalable structure structured & formatted for
 Handle increases in sales and network transmission
product offerings in the future 5 Session Defines control structures that
o More flexibility manage the communications
 To modify and manage the site link between computers
as the company changes 4 Transport Provides reliable data flow and
o Opportunity to integrate error recovery
 Web-based business systems + 3 Network Defines network addresses and
other IS determines how data packets
 Creates potential for more are routed over the network
savings and better customer 2 Data link Defines specific methods of
service transmitting data over the
Guidelines for In-house E-commerce Site Development physical layer: defining start and
- Analyze company’s business needs and goals end of data frame
- Obtain input from users, plan for future growth, aim 1 Physical Contains physical components
for ease of use that carry data: cabling and
- Determine if IT staff has necessary skills and connectors
experience to implement project
- Develop project in modular form for testing and Layers on transmitting computers  layers on receiving computer
approval
Network Protocol
Processing Methods - Network must a protocol in all cases
- Online processing characteristics - Set of standards that govern network data
o System processes transactions completely transmission
when and where they occur

13
- Transmission Control Protocol/Internet Protocol o Each node connects to every node
(TCP/IP) o Reliable yet expensive to install and
o Popular network protocol maintain
o Originally developed by the US Department o Resembles the internet
of Defense to permit interconnection of  Message can travel on more
military computers than 1 path
o Backbone of the Internet o Originally developed for military apps
o Primary advantage: redundancy
Network Topology  Multiple paths provide backup if
- Topology: physical or logical view of the network communication problems arise
o Physical topology: actual network cabling or some nodes become
and connections inoperable
o Logical topology: the way components
interact
o *a specific physical topology might be able
to support more than 1 logical topology
- Hierarchical Network
o Ex. Retail clothing chain
 Central computer stores data
about sales and inventory levels
and local computers handle
store-level operations
o Disadvantage
 Becomes more complex and
expensive to operate and
maintain as business adds
processing levels
o Often used in traditional mainframe based
systems, but are much less common today
- Bus Network
o Single communication path connects central
server, departmental servers workstations
and peripheral devices
o Disadvantage
 If central bus becomes defective,
entire network shuts down
 Overall performance declines as
more users and devices are
added
 Since all message
traffic must flow
along the central bus
- Ring Network
o Resembles a circle
o Data flows in only 1 direction from 1 device
to the next
o Like bus network with ends connected
- Star Network
o Most popular LAN topology today
 Because of its speed and
versatility
o Has central networking device: switch
 Manages the network and acts
as a communications conduit for
all network traffic
o Traffic flows into and out of the switch
o Disadvantage
 Entire network is dependent on
the switch
 Yet backup switches
are available
immediately in case
of hardware failure
(in most large star
networks)
- Mesh Network

14
Wireless Networks Topologies
- Basic Service Set (BSS)
o Aka infrastructure mode
o Central wireless device: access point or
wireless access point (WAP)
 Used to serve all wireless clients
 Similar to hub in LAN star
topology
 Use single communications
medium, the air,
 Broadcast all traffic to
all clients
 Connected to a wired network so
wireless clients can access the
wired network

- Extended Service Set (ESS)


o Made up of 2 or more BSS networks
o Wireless access can be expanded over a
wide area
Routers o Each access point provides wireless services
- Connects networks: LANs or WANs over a limited range
o Roaming
- Connects network segments
- determines most efficient data path  Process automatically allowing
- guides flow of data clients to associate with the
- differ from switches stronger access point
o routers work at a higher OSI level (layer 3)  Allowing for
 dealing with IP packets undisrupted service
o Switches handle data frames (layer 2)  As client moves from
away from 1 access
Wireless Networks point and closer to
- WLAN (Wireless local area network) another
o Inexpensive to install
o well-suited to workgroups and users who
aren’t anchored to a specific desk or
location
o most notebook computers (laptops) are
equipped with built-in wireless capability
 relatively simple to add this
feature to existing desktop
computers and workstations in
order to set up a wireless
network - Independent Service Set (ISS)
o Aka peer to peer mode
o No access point used
o Wireless clients connect to each other
directly
o Well-suited to situations requiring quick
data transfer among clients

15
storage
requirements,
processing schedules,
reporting deadlines,
and online response
times (ops
constraints)
o Implementation requirements
 start-up processing
 initial data entry or acquisition
System Design Completion  user training requirements
1. System design specification  software test plans
o Management Summary o Time and Cost Estimates
 Brief overview of the project for  Detailed schedules
company managers and  Cost estimates
executives  Staffing requirements
 Outlines development efforts to  All for systems development
date, provides current status phase and revised projections
report, project costs summary, for the remainder of the SDLC
reviews the benefits of the new  Total costs-to-date for the
systems, present systems project
implementation schedule, and  Compare costs with
highlights any issues that prior estimates
management will need to o Additional Material
address  Documents from earlier phases
o System components that would be helpful to readers
 Contains complete design for 2. User approval
new system 3. Presentation
 UI o Opportunity to explain the system, answer
 Outputs questions, consider comments and secure
 Inputs final approval
 Files
 Databases CHAPTER 11: MANAGING SYSTEMS IMPLEMENTATION
 Network - Involves app development, testing, documentation,
specifications training, data conversion, system changeover, and post
 Should include source implementation evaluation of the results
documents, report and screen - System design specification as blueprint for
layouts, DFDs, and all other construction the new system
relevant documentation
 should include requirements for Software Quality Assurance
all support processing - Main objective: to avoid problems or to identify them
 backup and recovery ASAP
 start-up processing - Poor Quality Causes
 file retention o Inaccurate requirements
 if purchase of a software o Design problems
package is part of the strategy, o Coding errors
one must include any interface o Faulty documentation
information required between o Ineffective testing
the package and system you are
developing Software Engineering
 if you use case design tool, - Software development process
 you can print - Stresses solid design, accurate documentation and
diagrams and most careful testing
other documentation - Manage and improve quality of finished system
directly from the tool o Given the fact that quality is important
o System Environment - Software Engineering Institute (SEI)
 Describes the constraints, or o Leader in software engineering
conditions affecting the system o Provides quality standards and suggested
procedures for software developers and
 Requirements that
systems analysts
involve operations,
o Designed standards called, Capability
hardware, systems
Maturity Model (CMM)
software, or security
o Recently established a new model,
 Transaction volumes
Capability, Maturity Model Integration
that must be
(CMMI)
supported, data

16
 Integrates software and systems - intense collaboration and communication between IT
development  larger team and users
framework (process
improvement)

International Organization for Standardization (ISO)


- Worldwide body that establishes quality standards for
products and services
- Seeks to offer a global consensus
o What constitutes good management
practices
 Practices that can help firms
deliver consistently high-quality
products and services

ISO 90003:2004
- Updated ISO standard
- Company can specify ISO standards when it purchases
software from a supplier/use ISO guidelines for in-
house software development
o To ensure that final result measures up to
ISO standards System Development Tools
- ISO requires specific development plan - entity relationship diagram
o Outlines a step by step process for - flow chart
transforming user requirements  finished o represents logical rules and interaction
products graphically using symbols and arrows
o ISO standards can be quite detailed - pseudocode
o technique for representing program logic
Application Development o similar to structured English
- Process of constructing the programs and code o analyst or programmer can describe the
modules program actions that can be implemented
o Building blocks of the IS in any programming language
- 3 popular development options - decision tables and decision trees
o structured analysis - all project management tools
o object oriented (O-O) analysis
o agile methods Structure Application Development
- regardless of method, objective is to translate design - usually involves a top-down approach
 program and code modules that will function o proceeds from a general design to a
properly detailed structure
- Partitioning
Recall o Process where systems analyst breaks the
Chapter 4 – Requirements modeling system down into subsystems and modules
- how to use FDDs to break complex business operations  After analyst documents
down  smaller units or functions system’s requirements
Chapter 5 – Structured data and process modeling o Approach also called modular design
- created DFDs  Similar to constructing a leveled
- developed process descriptions for functional primitive set of DFDs
processes that documented business logic and *All modules must work together properly so analyst must
processing requirements carefully proceed with constant input from programmers and IT
Chapter 6 – Object-oriented model management to achieve a sound, well integrated structure.
- use case diagrams, class diagrams, sequence diagrams, Analyst must ensure that integration capability is built into each
state transition diagrams, activity diagrams design and thoroughly tested
Chapter 7 – Development strategy
Chapter 8 – UI design Structure Charts
Chapter 9 – Data design issues, relationships between system Shows program modules and relationships among them
entities Higher level module (control module) directs lower level modules
- entity-relationship diagram (ERDs) (subordinate modules)
Chapter 10 – Overall system architecture Symbols represent the ff:
- Module
Application Development Taks - Data couple
Traditional Methods o Shows data that 1 module passes to
another
Agile Methods - Control couple
- plan project, lay the groundwork, assemble the team o Shows a message, aka status flag
and prepare to interact with the customers - Condition

17
o Indicates that a control module determines
which subordinate modules will be invoked,
depending on a specific condition
- Loop
o Indicates that 1 or more modules are
repeated

*implementing a structured design, a structure chart is sued to


describe the interaction between program modules

Cohesion and Coupling


- Cohesion
o Measures module’s scope and processing
characteristics
o High degree cohesion
 Module performs single
function/task
Object-Oriented Application Development
 desirable
- when implementing an object-oriented design,
o before it focuses on a single task, a cohesive
relationships between objects already exist
module is much easier to code and reuse
- Since the object interaction is defined during the O-O
- Coupling
analysis process, the app structure is represented by
o Degree of interdependence among modules
the object model itself
o Loosely coupled
 Independent modules
Object-Oriented Cohesion & Coupling
 Desirable
- Principles of cohesion and coupling also applied
 Easier to maintain and modify
o Classes should be loosely coupled as
 Cos logic in 1 module
possible
doesn’t affect other
 Independent of other classes
modules
- Object methods should be loosely coupled and highly
 If update is needed, programmer
cohesive
can accomplish the task in a
- By following the principles, classes and objects are
single location
easier to understand and edit
o Tightly coupled
o O-O programmers who ignore cohesion and
 One module is linked to internal
coupling concepts may end up creating a
logic constrained in another
web of code that is difficult to maintain
module
o When code is scattered in various places,
editing becomes complicated and expensive

Agile Application Development


- Development team is in constant communication with
the users
- Based on quick and nimble development process that
easily adapts to change
- Focuses on small teams, intense communication and
rapid development iterations
o Makes use of user stories
o Iteration cycle
-  Planning, designing, coding and
testing based on user stories
- Disadvantage
o Lacks discipline and produces systems
questionable in quality
 Cos focuses on quick iterations
and fast releases too much
o Not work for large companies that much

18
errors that could have been missed during
desk checking
- Integration testing or link testing
o Testing 2 or more programs dependent on
each other
o Ex. Consider an information system with a
program that checks and validates customer
credit status, and a separate program that
updates data in the customer master file.
The output from the validation program
becomes input to the master file update
program.
o Testing programs independently doesn’t
guarantee that data passed between them
is correct
 Only by link testing can you
make sure programs work
together properly
*try to review and read this part of the book - System testing
o After link testing
Coding o MUST
- Process of turning logic  specific instructions that o Involves entire IS
computer system can execute
- Use of programming language to transform program
logic  code statements
- Individual programmer: create small program
- Larger programs: typically divided into modules that
several individuals or groups can work on
simultaneously
Programming Environment
- Integrated Development Environment (IDE)
o Simplifies integration of system
components and reduce code development
time
o Software products: built-in tools, advanced
features, etc.

Testing
- Important!!
- After coding, programmer must test each program to
make sure it functions correctly
- The process detects syntax errors
o Language grammar errors
o Programmer corrects errors until program
executes properly
- Desk Checking
o Reviewing the program code to spot logic Review Additional Reading – Refer to Ch.11 Slide 27
errors which produce incorrect results
o Can be performed by the person who wrote Systems Testing Objectives
the program or by other programmers - Perform final test of all programs
o Many orgs require a more formal type of - Verify that system will handle all input data properly,
desk checking: structured walkthrough or both valid and invalid
code review - Ensure that IT staff has documentation and
 Group of 3-5 IT staff members instructions needed to operate the system properly
participate and backup and restart capabilities of system are
- Design Walkthrough adequate
o Session with users - Demonstrate users can interact with the system
o To review the interface with a cross-section successfully
of people who will work with the new - Verify all system components are integrated properly
system and ensure that all necessary and actual processing situations will be handled
features have been included correctly
- Unit testing - Confirm that IS can handle predicted volumes of data
o Testing of individual program or module in a timely and efficient manner
o Objective: to identify and eliminate
execution errors that could cause the Documentation
program to terminate abnormally and logic - Describes an IS

19
- Helps users, mangers, and IT staff who must interact o contains live data and is accessible only by
with it authorized users
- Accurate documentation reduces system downtime, - Test Environment
cut costs, and speed up maintenance tasks o Used to develop and maintain programs
- 4 Types o Separate test environment is necessary to
o program documentation maintain system security and integrity and
 describes inputs, outputs and protect the operational environment
processing logic for all program
modules Training
 starts in the system analysis - Successful IS requires training for users, managers, and
phase IT staff members
 use defect tracking software - Entire systems development effort can depend on
(bug tracking software) whether or not people understand the system and
 to track program know how to use it effectively
defects, code changes
and replacement
code, called patches
o System documentation
 Describes system’s functions and
how they are implemented
 Data dictionary entries, DFDs,
object models, screen layouts,
source documents and systems
requests
 Starts w systems analysis and
design phases
o Operations documentation
 All info needed for processing
and distributing online and
printed output
 Ex. Program, system analyst
identification, scheduling info,
input files etc.
 Clear, concise and available
online if possible
Data Conversion
o User documentation
- Part of system installation process
 Instructions and information to
- Existing data is loaded into new system
users
- Depending on the system, data conversion can be
 User manuals, help screens,
done before, during or after the operational
tutorials
environment is complete
- When new system is replacing the existing system, you
Management Approval
should automate the data conversion process if
- Describe test results
possible
- update status of all required documentation
- Should develop data conversion plan ASAP and
- summarize input from users who participated in
conversion process should be tested when the test
system testing
environment is developed
- provide detailed … for making system fully operational
- Data is verified, corrected and updated during
o time schedules
conversion process
o cost estimates
o staffing requirements
Systems Changeover
- Process of putting the new IS online and retiring the
System Installation & Evaluation
old system
Remaining steps in systems implementation
- Can be rapid or slow depending on the method
- prepare a separate operational and test environment
- 4 Changeover methods
- provide training for users, managers, and IT staff
o direct cutover
- perform data conversion and system changeover
 similar to throwing a switch that
- carry out a post-implementation evaluation of the
instantly changes over from old
system
to new system
- present a final report to management
 least expensive, most risky
o parallel operation
Operational and Test Environments
 requires both systems run
- Operational/Production Environment
simultaneously for a specified
o for actual system ops
period
o access must be limited and controlled to
 slowest method
users
 most expensive, least risky

20
o pilot operation - User support, maintenance, security, backup and
 between direct cutover and disaster recovery, performance measurement, system
parallel operation obsolescence
 implementing the complete new
system at a selected location of Managing Systems Support and Security Overview
the company - 3 main concerns
 pilot site o user expectations
 group that uses new o systems performance
system first while o security requirements
others use the old - Start
system o When system becomes operational and
 less risky than direct, less costly continues until system reaches the end of
than parallel its useful life
o phased operation - During
 between direct cutover and o Support and maintenance tasks
parallel operation
 implement system in the whole User Support
organization - User training (refer to Ch. 11)
 allows you to implement the o User training package
new system in stages or modules  Online support via email
 less risky than direct, less costly  Special website
than parallel  Revision to user guide
 Training manual supplement
 Formal training sessions
- Help Desks
o Usually called information center (IC)
o Can boost productivity by using remote
control software
o Centralized resource staffed by IT
professionals who provide users with the
support they need to do their jobs
o 3 main objectives
 show people how to use system
resources more effectively
 provide answers to technical or
operational questions
 make users more productive by
teaching them how to meet their
own info needs
Post Implementation Evaluation o Typical Help Desk Tasks
- assesses overall quality of IS  Show a user how to create a
- verifies the new system data query/report that displays
o meets specified requirements specific business info
o complies with user objectives  Resolve network access or
o produces the anticipated benefits password problems
- should examine all aspects of the development effort  Demonstrate an advanced
and the end product : the developed IS feature of a system/commercial
- Typical evaluation package
 Help user recover damaged data
 Offer tips for better operation
 Explain an undocumented
software feature
 Show a user how to use Web
conferencing
 Explain how to access company’s
intranet or the internet
 Etc.
- Outsourcing issues

Report to management Maintenance Tasks


- Maintenance expenses
CHAPTER 12: MANAGING SYSTEMS SUPPORT & SECURITY o Vary significantly during the system’s
- System security support and tasks that continue operational life
throughout the useful life of the system o Include spending to support maintenance
activities
- Maintenance activities

21
o Changing programs, procedures or
documentation
 To ensure correct system
performance
o Adapting the system to changing
requirements
o Making the system operate more efficiently
o Needs are met by corrective, adaptive,
perfective and preventive maintenance
- Corrective Maintenance
o Diagnoses and corrects errors in an
operational system
o To avoid new problems, all maintenance
work requires careful analysis before
making changes
- Adaptive Maintenance
o Adds enhancements to an operational
system
o Makes the system easier to use
- Perfective Maintenance
o Changing an operational system to make it
more efficient, reliable or maintainable
- Requests for corrective and adaptive maintenance
normally come from users, while IT department usually
initiates perfective maintenance
- Adaptive and perfective are called enhancements
- Preventive Maintenance
o To prevent problems
o Requires analysis of areas where trouble is
Key Terminologies
likely to occur
- Configuration management (CM)
o Aka change control (CC)
o Process for controlling changes in system
requirements during software development
o Important tool for managing system
changes and costs after system becomes
operational
- Maintenance release methodology
o All noncritical changes are held until they
can be implement at the same time
o Each change is documented and installed as
a new version of the system called
maintenance release
- Service packs
o Maintenance releases
o Provided by commercial software suppliers
- Version control
o Process of tracking system releases or
versions
o When new version of a system is installed,
prior release is archived or stored
 If new version causes a system to
fail, company can reinstall the
prior version to restore
operations
- Baseline
o Formal reference point
o Measures system characteristics at a
specific time
o Used as yardsticks to document features
and performance during the system
Maintenance Management
development process
o 3 types
 functional
 configuration of the
system documented

22
at the beginning of Trespass and Employee enters unlocked server
the proj. espionage room and views payroll data on a
 contains necessary forbidden system
system requirements Vandalism Attacker defaces Website logo,
and design destroys CEO’s hard drive
constraints
 allocated Attacker Characteristics
 documents the ATTACKER DESCRIPTION Skill
system at the end of Set
the design phase Cyberterrorist Attacks to advance political, social High
 identifies any changes or ideological goals
since functional Employee Uses unauthorized info or privileges Varies
baseline to break into computer systems,
 includes testing and steal info or cause damage
verification of all Hacker Uses advanced skills to attack High
system requirements computer systems with malicious
and features intent (black hat) or to expose flaws
 product and improve security (white hat)
 describes system at Hacktivist Attacks to further a social or Varies
the beginning of the political cause, often involves
system operation shutting down or defacing Web
 incorporates any sites
changes made since Script kiddie Inexperienced or juvenile hacker Low
the allocated baseline who uses readily available malicious
 includes results of software to disrupt or damage
performance and computer systems and gain
acceptance tests for recognition
the operational Spy Non-employee who breaks into High
system computer systems to steal info and
sell it
System Performance Management
- Fault management Kinds of Attacks
o Monitoring the system for signs of trouble ATTACK EXAMPLE
o Logging all system failures Back door Attacker finds vulnerability in software
o Diagnosing the problem package and exploits it
o Applying corrective action
Denial of 1/+ computers send a stream of
* A system administrator must detect and resolve service/distributed connection requests to disable a Web
operational problems as quickly as possible denial of service server
- Performance and workload management
DNS poisoning False Domain Name Server info steers
o Benchmark testing
the user to attacker’s website
o Metrics
Dumpster diving Scours the trash for valuable info that
can be used to compromise the system
Mail bombing Enormous volumes of e-mail are sent to
a target address
System Security Overview
Check Ch. 12 slide 17 notes for video Malicious code Attacker send infected e-mail to the
target system. Use of viruses, worms,
THREAT CATEGORY
Trojan horses, keystroke loggers, etc. to
Extortion Hacker steals trade secrets and
destroy data, bog down systems, spy on
threatens to release them if not paid
users or assume control of infected
Hardware & Software Router stops functioning or software
systems
Failures causes the app server to crash
Man in the middle Attacker intercepts traffic and poses as
Human error/failure Accidentally delete files
the recipient, sending the data to the
Natural disasters Flood destroys company bldg. and
legitimate recipient but only after
networked systems reading the traffic or modifying it
Service failure Electricity is disrupted and brings the
Password cracking To gain access into aa secured system
entire system down for hours Dictionary/brute force attack
Software attack A group plants destructive software,
Privilege Employee tricks a computer into raising
virus or worm into a company escalation his or her account to the admin level
network
Sniffing Network traffic is intercepted and
Technical Outdated software is slow, difficult scanned for valuable info
obsolescence to use and vulnerable to attacks
Social engineering Attacker calls help desk posing as a
Theft of Physical server is stolen, intellectual legitimate user and requests that his or
physical/intellectual property is stolen or used wo her password be changed
property permission (may be
Spam Unwanted, useless e-mail is sent
physical/electronic)
continuously to business e-mail

23
accounts, wasting time and decreasing
productivity
Spoofing IP address is forged to match a trusted
host, and similar content may be
displayed to simulate the real site for
unlawful purposes

Security Levels
- Physical level
o Operation center security
o Servers and desktop computers
o Notebook computers
- Network level
o Encrypting network traffic
o Wireless network
o Private network
o Virtual private network
o Ports & services
o Network intrusion detection
- Application level
o Services
o Hardening
o Application permissions
o Input validation System Obsolescence
o Patches and updates - no longer supports user needs
o Software logs - platform becomes outdated
o Analyze app’s functions, identify possible - most common reason for discontinuing system: system
security concerns and study all available reached the end of its economically useful life as
documentation to protect all server based indicated by the ff signs
apps o system’s maintenance history indicates that
- File level adaptive and corrective maintenance are
o Encryption increasing steadily
o Permission o operational costs or execution times are
o User group increasing rapidly
- User level  routine perfective maintenance
o Identify management doesn’t reverse or slow the
o Password protection trend
o Social engineering o software package is available that provides
o User resistance the same or additional services faster,
o New technologies better and less expensive than current
- Procedural level system
o Procedural security aka operational security o new technology offers a way to perform
o Concerned with managerial policies and same or additional functions more
controls that ensure secure operations efficiently
o IT professionals believe that security o maintenance changes or additions are
depends more on managerial issues vs difficult and expensive to perform
technology o users request significant new features to
 Management must work to support business requirements
establish a corporate culture
that stresses importance of *A lot of videos to watch for Chapter 12 
security to the firm and its
people
o Defines how particular tasks are to be
performed
 From large scale data backups to
everyday tasks (storing emails or
forms)
o other procedures
 how to update firewall software
 how security personnel should
treat suspected attackers
Backup and Recovery

24

Вам также может понравиться