Chapter 8 Basic Sytems Concepts and Tools
Chapter 8 Basic Sytems Concepts and Tools
Chapter 8 Basic Sytems Concepts and Tools
complexity
Ø A system is a set of interrelated components that must work together to achieve some
common purpose.
An information system (IS) can be defined in a very broad way as the collection of IT,
procedures, and people responsible for the capture, movement, management, and
distribution of data and information.
1. Boundary
2. Environment
3. Inputs
4. Outputs
5. Components
6. Interfaces
7. Storage
Three system characteristics that are especially important for analyzing and designing
information systems are the following:
An interface is the point of contact between a system and its environment or between
two subsystems. In an information system, the functions of an interface are generally as
follows:
Ø Error detection and correction Checking for compliance to standards and for
consistency
Ø Buffer Allowing two subsystems to work together without being tightly synchronized
Ø Security Rejecting unauthorized requests for data and providing other protection
mechanisms
Ø Slack and flexible resources Providing alternative paths to follow when one
component breaks down or slows down
Ø Buffers Storing data in a temporary location as a buffer or waiting line that can be
depleted as the data are handled by the next component.
Ø Sharing resources Creating shared data stores with only one program (part of the
interface component) maintaining the data, thus avoiding the need to synchronize
multiple step updating or to operate with inconsistent multiple copies of data
Ø Standards Enforcing standards that reduce the need for two components to
communicate.
BUSINESS PROCESSES
- not be viewed just as its workflow rather be viewed as firms’ assets and liabilities.
Folklore Processes
- process carried out only because they have been in the past.
IT ENABLER OF BPR
6 PRINCIPLES (HAMMER,1990)
- this principle implies that knew person should perform all the steps in given process
- the intent of this principle is to make those most interested in a result accountable for the
production of that result.
3. Integrate Information Processing into The Work That Produces the Information
- this principle implies that the distinction between centralization and decentralization is
artificial with IT.
- this principle says that related activities should be constantly coordinated rather than
waiting until a final step to ensure consistency.
6. Have the People Who Do the Work Make All the Decisions, And Let Controls Built into The
System Monitor the Process
- the result of this principle is the drastic reduction of layers of management, the
empowerment of employees, and the shortcutting of bureaucracy.
1: DEFINITION
- end users and systems analysts conduct a multistep analysis of the current business
operations and the information system or systems in the area of concern.
2: CONSTRUCTION
- entails the designing, building and testing of a system that satisfies the requirements
developed in the definition phase.
3: IMPLEMENTATION
- business managers and IS professionals work together to install the new system, which
often involves converting data and procedures from an old system.
STRUCTURED TECHNIQUES
- these techniques exist for all phases of the system development process, and many
variations have emerged.
PROCEDURAL-ORIENTED TECHNIQUES
- This process is akin to the general problem solving approach of analysis, design, and
take action.
- Also called Sequential Approach
- It helps ensure that the new process will work in concert with the new information
system, NOT against it.
Document As-Is > Create Logical To-Be > Translate Into Physical To-Be
As-Is Model
Context Diagram
- Positions the system as a whole with regards to the other entities and activities with
which it interacts
- Provides common frame of reference for project participants and helps define project
scope
- Identifies existing information sources, information sources that are updated, the order in
which steps occur, and some of the dependencies or decisions.
- The work process flow diagram and other as-is techniques serve to point out where the
existing system does and does not perform as desired.
Logical To-Be Model
- It maps out the flow of information for any process or system. This involves groups of
people and is accomplished through multiple iterations.
1) External Entity - indicates some elements in the environment of system that send or
receives data
2) Data flow - indicates data in motion
3) Process - processing components of the system
4) Data Store - depicts data at rest
FIGURE 8.13: Top-Level Data Flow Diagram For Accounts Payable System
Data Dictionary/Directory (DD/D)
- Most common approach to maintain the metadata in DFD. Its goal is to maintain the
metadata as possible.
- Also the place to capture whether elements are calculated, how many decimal places
are required, and how an element may be referred to in external systems that reference
it.
FIGURE 8.14 shows a typical data dictionary entry for the data element Purchase Order (PO)
Number.
Data Model
- Created by logically defining the necessary and sufficient relationships among system
data
The most common notation for a data model is an entity-relationship diagram, aka ERD.
CLASSES
- It is created by the programmer, it will act as a blueprint of an object that you want to
implement in your program.
- They contain all the attributes and methods that your desired object should have.
OBJECTS
ATTRIBUTES
OBJECT METHODS
1. ENCAPSULATION
- Is an OOP technique used to hide data from direct access.
USING ENCAPSULATION
2. INHERITANCE
- is an OOP technique used to inherit attributes and methods from one class to
another.
SUPERCLASS
SUBCLASS
- The class who will inherit the attributes and methods from a superclass.
Although the security and reliability issues will differ somewhat due to the nature of the software
application, this list of control mechanisms provide a starting point for understanding the role of
the IS professional in helping to ensure that business risks have been accounted for.
- are needed to maintain data integrity, allow only authorized access, ensure proper
system operation, and protect against malfunctions, power outages, and disasters.
SECURITY CONTROLS
METHODOLOGY STANDARDS
- One way to avoid errors is to developed standard, repeatable, and possibly reusable
methods and techniques for system developers.
- The importance of standards also extends to the documentation of the system during
construction and the following period of maintenance and upgrades. Standards are also
important for supporting information systems and users.
- Each time a data element is updated, the new value can be checked against a
legitimate set or range of values permitted for that data. Providing a screen display with
associated data can be a very useful edit check. Well-designed user interfaces also will
prevent data entry mistakes.
Various calculations can be performed to a validate processing. Batch totals that calculate the
sum of certain data in a batch of transactions can be computed both manually before
processing and by the computer during processing. A check digit can be appended to critical
identifying numbers such as general ledger account numbersor vendor numbers.
SYSTEM TESTING
The most common and effective of all IS controls is complete system testing. Each program
must be tested individually and in combination with the other programs in the application.
SECURITY
Logical access controls are concerned with whether users can run an application, whether
they can read a file or change it, and whether they can change the access that others have.
Encryption techniques are used to encode data that are transmitted across organizational
boundaries.
The ultimate protection against many system failures is to have a backup copy. Periodically a
file can be copied and saved in a separate location such as bank vault.
AUDITING ROLES
IS auditing is still frequently referred to as EDP auditing---a name chosen when the term
electronic data processing was used to refer to computer operations. EDP auditors use a variety
of methods to ensure the correct processing of data, including:
Compliance tests check that systems builders use high-quality systems development
procedures that lead to properly functioning systems.
Embedded auditing methods include reporting triggers programmed into a system that are
activated by certain processing events. The flagged records are then analyzed to determine if
error or security breaches are occuring in the system.
Audit trails trace transactions from the time of input through all the processes and reports in
which the transactions are used.