Systems Analysis and Design by Elias M Awad [PDF]

  • 0 0 0
  • Suka dengan makalah ini dan mengunduhnya? Anda bisa menerbitkan file PDF Anda sendiri secara online secara gratis dalam beberapa menit saja! Sign Up
File loading please wait...
Citation preview

Systems Analysis and Design



y



^ fv-



Contents



Part



One



Overview 1.



Systems Concepts and the Information Systems Environment 4 Introduction. The Systems Concept: Definition. Characteristics of a System: Organization. Interaction. Interdependence. Integration. Cen-



Elements of a System: Outputs and Inputs. Processor(s). and Interface. Types of Systems: Physical or Abstract Systems. Open or Closed Systems. ManMade Information Systems. Illustration A Dynamic Personnel Information System Model. tral Objective.



Control. Feedback. Environment. Boundaries







2.



The System Development



— What



38



Life Cycle



Recognition of Need the Problem? Feasibility Study. Analysis. Design. Imple-



Introduction. Is



The System Development



Life Cycle:



mentation. Post- Implementation and Maintenance. Considerations for



Candidate Systems: Political Considerations. Planning and Control for System Success. Prototyping. 3.



The Role



of the Systems Analyst



60



Introduction. Definition. Historical Perspective: The Early Years. The



War



Effort.



What Does



Personal Qjualifications.



Take to Do Systems Analysis? Academic and The Multifaceted Role of the Analyst: Change



It



XI



Xll



CONTENTS



Agent. Investigator and Monitor. Architect. Psychologist. Salesperson.



The Analyst /User Interface: Behavioral Issues. The Place of the Analyst in the MIS Organization:



Motivator. Politician. Conflict Resolution.



The MIS Organization. Rising Positions in System Development: The Paraprofessional. The Technical Writer. Conclusions.



Part



Two



Systems Analysis 4.



90



Systems Planning and the



Initial Investigation



92



Introduction. Bases for Planning in Systems Analysis: Dimensions of Planning. Initial Investigation: Needs Identification. Determining the User's Information Requirements. Case Scenario. Problem Definition



and Project



Background Analysis. Fact-finding. Fact Analysis.



Initiation.



Determination of Feasibility. 5.



Information Gathering 126 Introduction. What Kinds of Information Do We Need? Information about the Firm. Information about User Staff. Information about Work Flow. Where Does Information Originate? Information-Gathering Tools: Review of Literature, Procedures, and Forms. On-Site Obsen'ation. Interviews and Qjuestionnaires. Types of Interviews and Qfjestionnaires.



6.



The Tools



164



of Structured Analysis



Introduction.



What



Is



Stiiictured Analysis?



The Tools



of Structured



The Data Flow Diagram (DFDI. Data Dictionarv. Decision Tree and Structured English. Decision Tables. Pros and Cons of Each Tool.



Analysis:



7.



196



Feasibility Study straints.



System



Performance Definition: Statement of ConIdentification of Specific System Objectives. Description of



Introduction.



Outputs. Feasibility Study: Feasibility Considerations. Steps in Feasibility Analysis. Feasibility



8.



Report. Oral Presentation.



Cost/Benefit Analysis 232 Introduction. Data Analysis. Cost/Benefit Analysis: Cost and Benefit Categories. Procedure for Cost/Benefit Determination. The System Proposal



Part Three



Systems Design 9.



The Process and Stages



258 of Systems Design



Introduction. The Process of Design: Logical



260



and Physical Design. De-



CONTENTS







Form- Driven Methodology' Structured Walkthrough. Major Dexelopment Activi-



sign Methodologies: Structured Design.



The IPO



Charts.



Personnel Allocation. Audit Considerations: Processing Controls and Data Validation. Audit Trail and Documentation Control. ties:



10.



InputOutput and Forms Design



284



Introduction. Input Design: Input Data. Input Media



and Devices. Out-



put Design. Forms Design: What Is a Form? Classification of Forms. Requirements of Forms Design. Carbon Paper as a Form Copier. Types of Forms. Layout Considerations. Forms Control. 11.



File Organization



320



and Data Base Design



Introduction. File Structure. File Organization: Sequential Organization.



Inde\ed-Sequential Organization. Inverted List Organization. Di-



rect-Access Organization. Data Base Design: Objectives of Data Base. Key Terms. Logical and Physical Views of Data. Data Structure. Normalization.



The Role



of the Data Base Administrator.



Part Four



System Implementation 12.



356



System Testing and Quality Assurance 358 Introduction. V\'hv Sx'stem Testing? What Do We Test for? The Nature of Test Data. The Test Plan: Activity Network for System Testing. Svstem Testing. Qualit\' Assurance: Quality Assurance Goals in the Svstenis of Quality Assurance. Trends in Testing. Role of the Data Processing Auditor: The Audit Trail.



Life Cycle. Levels



13.



Implementation and Softivare Maintenance 386 Introduction. Conversion: Activitv Network for Conversion. Comhating Resistance to Change. Post-Implementation Re\ie\v: Request for Review. A Review Plan. Software Maintenance: Maintenance or Enhance-



ment? Primary Activities of a Maintenance Procedure. Reducing Maintenance Costs. 14.



Hardware/Software Selection and the Computer Contract 414 Introduction. The Computer Industiy: Hardware Suppliers. Software Suppliers. Ser\ice Suppliers. The Software Industiy: Tyjjes of Software. A Procedure for Hardware/Software Selection: Major Phases in Selection. Software Selection. The Evaluation Process. Financial Considerations in Selection: The Rental Option. The Lease Option. The Purchase Option. The Used Computer. The Computer Contract: The Art of Negotiation. Contract Checklist.



15.



Project Scheduling and Software Introduction. Why Do Systems Fail? What



444 Is



Project



Management? A



XIU



XI\'



CONTENTS



16.



Security, Disaster/Recovery, in



and Ethics



System Development



473



Introduction. System Securitv': Definitions. Threats to System Security. Control Measures. Disaster/ Recoverv Planning: The Plan. Ethics in



System Dexelopment: Ethics Codes and Standards of Beha\ior.



Glossary of Terms



502



Index



516



Systems Analysis and Design



Part



One



Overview



^r:







1 SYSTEMS CONCEPTS AND THE INFORMATION SYSTEMS ENVIRONMENT



2



THE SYSTEM DEVELOPMENT



3



THE ROLE OF THE SYSTEMS ANALYST



LIFE



CYCLE



Chapter



1



Systems Concepts and the Information Systems Environment



Introduction



The Systems Concept DEFINITION Characteristics of a System



ORGANIZATION INTERACTION



INTERDEPENDENCE INTEGRATION



CENTRAL OBJECTIVE Elements of a System OUTPUTS



AND



PROCESSOR(S)



CONTROL FEEDBACK



INPUTS



At a Glance Systems analysis is the application of the systems approach to problem solving using computers. The ingredients are systems elements, processes, and technology. This means that to do systems work, one needs to understand the systems concept and how organizations operate as a system, and then design appropriate computer-based systems that will meet an organization's requirements. It is actually a customized approach to the use of the computer for



problem



solving.



By the end of this chapter, you should know: 1. The primary characteristics of a system and the importance of the systems concept for developing information systems. 2. How the various elements of a system work together to intertace with the



end 3.



4. 5. 6.



user.



How



physical systems differ from abstract systems. The unique features of formal and informal information systems. The makeup of management information systems. How decision support systems help in decision making.



ENVIRONMENT BOUNDARIES AND INTERFACE Types of Systems PHYSICAL OR ABSTRACT SYSTEMS Systems Models Schematic Models Flow System Models Static System Models Dynamic System Models



OPEN OR CLOSED SYSTEMS



MAN-MADE INFORMATION SYSTEMS Formal Information Systems Categories of Information



Intormal Information Systems Computer-Based Intormation Systems



Management



Information Systems (MIS) Decision Support Systems (DSS)



Illustration— A



Dynamic Personnel Information System Model



PAKT ONE OVERVIEW



INTRODUCTION It



s



a Upical da\



that



it



reall\'



.



The car



starts



OK, but you think with a flash of



irritation



shouldn't take that long to get the air conditioner going. Onl\'



an hour to catch the plane, and cars are piled up on the express\va\' as far as the e\e can see. Vou begin to wonder if there isn't a way to allow airport traffic to mo\ 8 faster. Vou get to the parking lot and have to walk half a mile to the plane.



obstacles?



Each one



Where



— the is



is



the shuttle?



\\'h\'



ticket counter, the X-ray



a system in



itself, \'et



so long a wait? \\h\ so



mam



machine, the gate attendant,



they are



all



etc.



part of the transportation



s\'stem.



about sxstems anaksis and how it relates to shaping organizations, impro\1ng performance, and achie\ing objectives for profitabilir\ and growth. As our scenario suggests, the emphasis is on systems in action, the relationships among subsystems, and their contribution to meeting a common goal in this case, fixing passengers to destinations on time. Looking at a s\stem and determining how adequateh- it fimctions, the changes to be made, and the cjualitx of the output are parts of s\'stems This book



is







anal\sis.



Systems analysis as used in this text is the application of the systems approach to the stud\' and solution of problems using computer-based systems. Sx'stems thinking is integral to systems work. Organizations ai^ complex systems that consist of interrelated and interlocking subsystems. Changes in one part of the s\stem ha\e both anticipated and unanticipated consequences in other parts of the s\'stem. The s\'stems approach is a wa\of thinking about the anal\sis and design of computer-based applications. It pro\ides a frameworic for \isualLzing the organizational and en\ironmental factors that operate on a system. When a computer is introduced into an organization, xarious functions and dysfunctions operate on the user as well as the organization. Among the positixe consequences are improxed performance and a feeling of achiexement with qualitx infomiation. .Among the unanticipated consequences might be (1 a possible threat to employees that their xvork no longer "measures up, I2i decreased morale of personnel who were not consulted about the installation, and I3i feeling of intimidation by users xvho haxe limited training in the nexv computer. In assessing these consequences, the analyst's role of allexiating fears and remoxing 1



'



barriers for the user



is



extremelx' crucial for the sxstem's success.



Systems analx'sis and design focus on sxstems, processes, and technologx'. Haxing a firm grasp of the makeup of the system in question is a prei'equisite for selecting the procedure or intixjducing the computer for implementation. In our airport scenario, knoxxledge of the traffic fiow, the strategic location of the airport, and hox\' a gixen change will speed up airport traffic is important in deciding on improxements such as special shuttles, helicopter senice. or



more



aiq^ort limousines to solxe the prob-



lem. Thus, a background in sxste?his concepts and a familiarity xxith the ways organizations function are helpful. This chapter discusses the systems



>\



^' PC.. -i--,



»



.



1 /



SYSTEMS CONCEPTS



AND THE INFORMATION SYSTEMS ENVIRONMENT



concept, elaborates on the types of systems that are relevant to systems analysis, and illustrates the relationship between the knowledge of systems



concepts and systems antdysis.



THE SYSTEMS CONCEPT Scholars in various disciplines



who



are concerned about the tendency



toward the fragmentation of knowledge and the increasing complexity of phenomena have sought a unifying approach to knowledge. Ludwig von Bertalanffy, a biologist, developed a general systems theoiy that applies to any arrangement of elements such as cells, people, societies, or even planNorbert Wiener, a mathematician, obseived that information and communications provide connecting links for unifying fragments or elements.^



ets.'



which shows the parallel between the functioning of human beings and electronic systems, laid the foundation for today's computer systems. Herbert A. Simon, a political His systems concept of information theory,



scientist, related the systems concept to the study of organizations by viewdng an ongoing system as a processor of information for making deci-



sions.'



Systems analysis and design for information systems were founded in general systems theory, which emphasizes a close look at all parts of a



component and overlook



system. Too often analysts focus on only one



other equally important components. General systems theory is concerned with 'developing a systematic, theoretical framework upon which to make decisions. "^ It discourages thinking in a vacuum and encourages considera-



and its extei-nal environment.'' Pioneering work in general systems theoiy emphasized that organizations be viewed as total systems. The idea of systems has become most practical and necessary in conceptualizing the interrelationships and integration of tion of



all



the activities of the organization



operations, especially



when



thinking about organizations



using computers. Thus, a system



and



their problems.



It



is



a



way



of



also involves a set of



techniques that helps in solving problems.



Definition



The term system



is



derived from the Greek



organized I'elationship



'



'



Row,



Ludwig



among



Bertalanffy, General



Systems Theory (New York; George



Norbert Wiener, Cybernetics (New York: John Wiley



o



PS



CJ



0)



CO



c



t



o



c:



c d



Se



n



c



CO



Q.



c i o



T3



^o ^ T3



CO



1



o



"*-



o o c c E



o



a



c o 3



'=



t



(i>



IE



CO



a.



k.



^



.2



Q) u.



CO



*-*



c to



Id



i3



C



c



D • • •



k_



O o



-



i5



0)



CO



I «



ro



i



f



d)



CO



Q



Q.



£



C a o w



60 c:



CD



r in



o



Q)



E 3



I



-H



o



CO



2 =• o»o



Q,



.Quj



ra







0)



5



c



^-



3 o V ti



(0



CD



ec



'^^



F ^.



c



^o 0)



-S



5



o o c



IB



A 1



kept randomly in boxes with onl\' the date of their creation [printed on the outside. Pavment slips are filed in boxes and indexed by date only. The actual checks are mailed to the bank for Dix)cessing (see Exhibit 4-1 1.



4



EXHIBIT 4-1



/



SYSTEMS PLANNING



AND THE



INITIAL INVESTIGATION



Present Information Flow at Jefferson Credit Center



Source documents



Payments



Customer inquiries



Encoding



Encodement reading



computer entry



119



120



PAKT



TWO / SYSTEMS ANALYSTS



Customer



inquiries are received through the



imately 660 per



mailroom



at



approx-



week and by phone at 150 per week. Mail inquiries are and indexed by month and by account number within



filed in a cabinet



each month. Further correspondence related to a particular inquiry is also stored with the original document. When an inquiry is received, it necessitates the retrieval of inquiry correspondence. The employee must know the approximate date when the document was received and the account number. In many cases, the date is difficult to determine, which necessitates a search through several months of documents. With a physical file system, there is a good chance of misfiling documents; this complicates the search. To retrieve payment slips, the employee invariably searches the paper file, although they are also stored on microfilm. This is due to the lack of a reasonable index system,



which makes microfilm



retrieval



almost as slow as the paper file. Consequently, search time averages 10 minutes. Often it takes half a day. Cleariy, the Jefferson credit center uses state-of-the-art computer hardware IBM interactive system but inefficient manual document-











retrieval operations.



Assignment a.



What



is



the main problem facing Jefferson stores and the credit center? Be



specific. b.



In



doing an



initial investigation,



what goals and considerations would you



focus on? c.



Provide the necessary information to detennine the feasibility of an alternative system.



An in-house



Is



an



alternative



system feasible?



analyst of a lai^e commercial



Justify



your answer.



bank received an inquiry



(see



the box) from Mrs. Mattes, the second \ice president of operations, concerning Christmas Club coupons. After a brief talk with her, the analyst decided to see for himself



how



the whole operation works.



He



observed the following: a.



are classified as $1.00, $2.00, $5.00, and $10.00. For example, a club member with 52 $1.00 coupons saves $1.00 per week or



Coupons



$52 by Christmas. b.



A customer comes



in with the



coupon book



for deposit.



The



teller



stamps the stub (in the coupon book) with the date of pavTiient and the amount, and returns the coupon book to the customer.



receives the cash, detacheg the coupon,



4



c.



/



SYSTEMS PLANNING



AND THE INmAL



INVESTIGATION



end of the day, the coupons are sorted by denomination, counted, and the total value bcdanced against the cash received. The entire process takes one person about three hours. At the



determined the problem to be too many categories of coupons rather than a shortage of clerical help. Increases in people's incomes, interest-bearing checking accounts, and the like would make it unprofitable for the bank to maintain the $1.00, $2.00, and $5.00 coupon books. Therefore, they should be discontinued. Effective January of next year, club members should be sold $5.00 or $10.00 coupon books or encouraged to open a savings After observing the operation, the analyst



account.



PROBLEM REPORT FORM



16-A



Statement of Problem



Because of the increase in the number of Christmas Club accounts, has become necessary to seek full-timie clerical help to process the daily coupons. Furthermore, the manual handling of each coupon has made it more costly to maintain the club. it



Reason(s) for Reporting Problem



The manucd handling



coupons rricikes it difficult to attract regular help. Tellers complain that coupons interrupt their work. Immediate solution to this problem can improve the service and provide



efficient



NAME:



of



operation of the club.



Dixie Mattes



DEPARTMENT:



TITLE: Second vice president



Operations



EXT: 5421



DATE:



3/15/85



Assignment a.



b.



Do you agree with the analyst's definition of the problem? you define it? Why? Explain. If



you were



to



do the



initial



investigation,



If



not,



how would you



how would handle



it?



Elaborate.



/Mlied Concrete, Inc., has



had



to



revamp



its



approach



to maintaining a



computer system and converting applications. Recently management has established a steering committee to oversee and approve all applications before they are run on the mainframe. The committee con-



121



122



PAKT



TWO SYSTEMS ANALYSTS /



one member from each of the following areas: accounting, sales, production, and information systems. The committee is chaired by the



sists of



The primary charge is to review each user request and approve or disapprove it based on feasibility and



vice president in charge of production.



approved, the user department is billed for its development by a debit transaction against its budget. The amount includes computer time, analyst and programmer time, and supplies. All department heads have agreed to the new policy. In formalizing the committee's authority and responsibilities, serious questions wei'e raised by several user depar'tments about whether the committee has the authority to turn doun a project even if it is technically feasible. They argued that since they are paying for the project out of their budget, there is no reason for it to be rejected. priority. If a request is



Assignment Should all user projects that are operationally and technically feasible be developed as long as the user is paying the price? If so, what should be the role of the steering committee?



a.



What do you



b.



think of the



makeup



should the analyst, programmer, committee? Elaborate.



of the steering committee?



What



role



or data base specialist play in a steering



The steering committee for the information system of a large savings and loan bank is evaluating a request from the mortgage loan department to provide an online system in all branches. The bank's mainfi'ame is



operating



at



55 percent of capacity.



new application. The



It



has adequate



only equipment needed



memory to handle



an online temiinal in each of the bank's 27 branches and a software package that can be installed in five weeks using the existing telecommunications network. the



The terminals



is



are available thi-ough the vendor' within the



week



at



$2,100 each. Branch tellers could be well trained in less than four



working days. The softwai-e package costs $18,000. The existing mortgage loan applications are handled in a l)atch mode. At the end of the day, each branch sends the mortgage payments



and documents to the computer center, located 18 miles away. When the documents ai-e received, data entry operatoi-s enter each pavment and account number directly on disk. V\'hen all transactions are entered, they are processed. All accounts are updated and the resulting report (1,400 pages long) is^sent to various branches for reference.



Obviously, in a batch environment,



previous day's



activities.



all



infonnation



is



based on the



4



The bank



is



/



SYSTEMS PLANNING



AND THE



ZNITIAL INVESTIGATION



new laborsaving when a new applica-



a leader in the industiy for introducing



and income-generating applications. In the past, tion was implemented, it set the tone for other banks to duplicate. The systems group is highly motivated and well paid and works closely with management on a regular basis. mortgage loans reasons that with an online mortgage loan system, tellers can answer inquiries about mortgage payments, balances, and other mattere in just seconds. Within the year, she expects customers to call the branch rather than In the proposal, the vice pi^sident of



main office for all infomiation regarding their respective loans. This means a sa\ings in human resources and a more efficient distribution of the work load among the branches. the



Assignment Based on the information pro\ided,



a.



Why?



pui-sued?



this



is



proposal feasible? Should



it



be



Ekiborate.



What other information does the steering committee need to do a thorough investigation? What source(s) would it come ftxjm? Be specific.



b.



Selected References Bariff,



M. L. "Information Requirements Analysis: A Methodological Rexiew." WorkPaper 76-08-02, the Wharton School, University of Pennsylvania, Phila-



ing



delphia, 1976.



Bowman,



Brent;



Gordon



Davis;



and James



C.



Wetherbe. "Modeling for MIS."



Datamation, July 1981, pp. 155-64. Information Systems Planning Guide. Application Man-



Business Systems Planning ual,



GE



20-0527-3,







3d ed. IBM Coip, July 1981. Available thraugh IBM branch



offices.



Caldwell, Jack. "The Misunderstanding of Objectives." Journal of Systems Manage-



ment. June 1982, Cerullo, Michael



J.



p. 30.



"MIS:



What Can Go Wrong? Management Accounting, '



April 1979,



pp. 43-49.



Cooper, Roldolpb B., and E. Burton Swanson. "Management Information Requirements Assessment: The State of the Art." Data Base, Fall 1979, pp. 5-16. Couger, J. D. "Comparative Analysis of Infomiation Systems Curricula." Computing Newsletter for Schools of Business, vol. XVII, no. 2 (October 1983), p. 1. Davis, Gordon B. "Strategies for Information Requirements Determination." IBM



Systems Journal 21, no. 1 11982), pp. 4-30. Doll, \Vm. J., and Mesbab U. Ahmed, "Managing User Expectations." Journal of Systems Management, June 1983, pp. 6-11. Gore, Marvin, and John Stubbe. Elements of Systems Analysis. 3d ed. Dubuque, Iowa: Wm. C. Brown, 1983, pp. 178-207. Haughey, Thomas P., and Robert M. RoUason. "Function Analysis: Refining Information Engineering." Computenvorld lln-Depth), August 22, 1983, pp. 24-26flF.



123



124



PART



TWO SYSTEMS ANALYSTS /



The Delphi Method." In Technological ForeGovernment: casting for Industry and Methods and Applications ed. James R.



Helmer,



Olaf. "Analysis of the Future:



Bright.



Englewood



Cliffs, N.J.:



Prentice-Hall, 1968, pp. 116-22.



Lederer, Albert T. "Information Requirements Analysis." Journal of Systems Management, December 1981, pp. 15-19. Leif,



Robert



Robert D. Dodge; and Ralph



E.;



Management



Strategy to



Style."



L. Ogden. "Adapting Data Pixjcessing Computerworld (In-Depth), December 5, 1983,



pp. 25-32.



and Myles Chen. "Long Range Planning for



Lientz, Rennet P.,



InfoiTnation Services."



Long Range Planning, vol. 13 (February 1980), pp. 55-61. Linstone, M. A., and M. Turoff, eds. The Delphi Method: Techniques



and Applica-



tions. Reading, Mass.: Addison-Wesley Publishing, 1975. McFarlan, Warren. "Portfolio Approach to Information Systems." Journa/ of Systems Management, January 1982, pp. 11-19. McLean, Ephraim R., and John V. Soden. Strategic Planning for MIS. New York: John



WUey Miller,



&,



Wm.



Sons, 1977. B.



"Developing a Long Range



EDP



Plan." Journal of Systems



Manage-



ment, July 1979, pp. 36-39. Gil. "Problem Definition: Tasks and Techniques." Journal of Systems Management, June 1983, pp. 16-21. Munro, Malcolm C. "DeteiTnining the Manager's Information Needs." Journal of



Mosard,



Systems Management, June 1978, pp. 34-39. Human Problem Solving. Englewood



Newell, A., and H. A. Simon.



Cliffs, N.J.:



Pren-



tice-Hall, 1972.



Nolan, Richard



L.



"Managing Infomiation Systems by Committee." Harvard Business '



Review, July-August 1982, pp. 72-79. Pitagorsky, George. "Analyzing, Defining Systems Needs."



Systems Week, August



Management Information



24, 1983, p. 30.



Poppel, Harvey. Strategic Impact of Information Technology.



New York: Deltak Corp.,



1982, pp. 5-9.



Powers, Michael; David Adams; and Harlan D. Developnient: Analysis



&



Mills.



Computer Information System



Design. Cincinnati: South-Western Publishing, 1984,



pp. 60-82.



Scharer, Laura. "Pinpointing Requirements." Datamation, April 1981, pp. 139-40. Steiner, George A. "Formal Sti'ategic Planning in the United States Today." Long



Range Planning 16, no. 3 (1983), pp. 13-17. Tharp, Marvin O., and Wm. Taggart. "Management Information Analysis: A



Situa-



Management Datamatics 5, no. 6, (1976), pp. 231-39. Thierauf, Robert J., and George W. Reynolds. Effective Information Systems Managetion Perepective."



ment. Columbus, Ohio: Charles



E. Merrill Publishing, 1982.



Wetherbe, James C. Systems Analysis and Design: Traditional, Structured, and Advanced Concepts and Techniques. Minneapolis, Minn.: West Publishing, 1984, pp. 319-59.



I



(^



Chapter 5 Information Gathering



Introduction



What Kinds



of Information



Do We Need?



INFORMATION ABOUT THE FIRM INFORMATION ABOUT USER STAFF INFORMATION ABOUT WORK FLOW



Where Does Information Originate? Information-Gathering Tools



REVIEW OF LITERATURE, PROCEDURES, ON-SITE OBSERVATION



INTERVIEWS



AND QUESTIONNAIRES



Interviews



The Art



1^



of Interviewing



AND FORMS



.



At a Glance



A



key part of feasibility analysis is gathering information about the present The analyst must know what information to gather, where to find it, how to collect it. and what to make of it. The proper use of tools for gathering information is the key to successful analysis. The tools are the traditional interview, questionnaire, and on-site observation. We need to know, for example, how to structure an interview, what makes up a questionnaire, and what to look for in on-site observations. These tools, when learned, help analysts assess the effectiveness of the present system and provide the groundwork for recommending a candidate system. system.



By the end 1



of this chapter,



What categories



you should know:



of information



are available



4.



The sources of information. How to arrange an interview. The types of interviews and questionnaires.



5.



How to



2.



3.



construct



a



questionnaire.



Arranging the Interview Guides to a Successful Interview Questionnaires



TYPES OF INTERVIEWS AND QUESTIONNAIRES The Unstructured Alternative The Structured Alternative Procedure for Questionnaire Construction Reliability of Data from Respondents The Reliability-Validity Issue



for



systems analysis.



128



PART



TWO SYSTEMS ANALYSTS /



INTRODUCTION Chapters 5 and 7 describe the early phase of system development. Whether the thrust of the activities



is



the



initial



investigation or a feasibilitv' study, the



aim is primarily to develop an understanding of the problem facing the user and the nature of the operation. Understanding how each activitv operates requires access to information.



Information gathering is an art and a science. The approach and manner in which information is gathered require persons vvdth sensitivity, common sense, and a knowledge of what and when to gather and what



channels to use in securing information. Additionally, the methodologv' and tools for information gathering require training and experience that the analyst is expected to ha\e. This means that information gathering is neither easy nor routine. Much preparation, experience, and training are required.



This chapter addresses the categories and sources of information and the functions, uses, and relevance of key infoiTnation-gathering tools during the phases of system analysis. The phases are: Familiarity v\ith the present system through available documentation,



such as procedures manuals, documents and the user



staff,



and



their flow, interviews of



on-site observation.



making associated v\ith managing the system. This is important for determining what information is required of the system. Conducting interviews clarifies the decision points and how Definition of the decision



decisions are



made



in the user area.



Once decision points



3.



are identified, a series of interviews



may be



conducted to define the information requirements of the user. The information gathered is analyzed and documented. Discrepancies between the decision system and the information generated from the information system are identified. This concludes the analysis and sets the stage for system design.^



WHAT KINDS OF INFORMATION DO WE NEED? Before one determines where to go for information or what tools to use, the first



requirement



information



user



staff,



is



to figure out



we need



what information



to gather.



Much



of the



to analyze relates to the organization in general, the



and the work flow



(see Figure 5-1).



For details on the application of s\stem analysis activities, refer to James VVetherbe, Systems Analysis and Design: Tradilional. S&vctured, and Advanced Concepts and Techniques '



(St.



Paul, Minn.;



West Publishing,



1984), pp. 127-54.







5



FIGURE 5-1



• Polirjps



nnals







Organization



INFORMATION GATHERING



Categories of Information Information Describing



Kind of Information







/



^«.^ '•-^



The organization



structure



Authority relationships • Job functions • Information •



requirements •



Interpersonal relationships







Wnrk



"^-..^^^^^ ^*''~~'"^-~



^^^—"^



User



to



staff



Information gathering



finw



The work ^^__,,,,—-—



procedures •



Work schedules



-'



itself



'



Information about the Firm Information about the organization's policies, goals, objectives, and structure explains the kind of envdronment that promotes (or hinders) the intro-



duction of computer-based systems. Company policies are guidelines that determine the conduct of business. Policies are translated into lules and procedures for achieving goals. A statement of goals describes management's commitment to objectives and the direction system development vvoll follow. Objectives are milestones of accomplishments toward achieving goals. Information from employee manuals, orientation pamphlets, annual company reports, and the like helps an analyst form opinions about the goals of the organization. After policies



and goals



are set, a firm



is



organized to meet these goals.



The organization structure, via the organization chart, indicates management directions and orientation (see Figure 5-2). For example, a familyowned firm often has a rigid, centralized structure and a conservative approach to implementing change. This suggests that when it comes to computerizing applications, the analyst has a challenge to before a final approval It



is



sell



the project



secured.



The organization chart represents an achievement-oriented structure. helps us understand the general climate in which candidate systems utII



be considered. In gathering information about the firm, the analyst should watch for the correspondence between what the organization claims to achieve (goals) and actual operations. Policies, goals, objectives, and struc-



129



President



Installment



Officer



Installment



Loan bauni



Loans



Loan vice



ent



Presid







Senior



cer



5> io



President



President



Assistant Commercial



Vice



KIdd Loans



Vice



L.



Supervisor



Proof



'



Hookkeopint)



c 3 O



1



Ol 2i



~\



I



Li-



II



E X President



Platform



Second



II aO



Vice



=



"I



Q.



coo



moo



c e



5



c



Q.



1



Ol 5



a:



^ C



E



Do ^



(ft



Supervisor



5



/



INFORMATION GATHERING



ture are important elements for analysis. Requests for



must be evaluated



computer



ser\ice



in the light of these elements.



Information about User Staff Another kind of information for analysis is knowledge about the people who run the present system their job functions and information requirements,







the relationships of their jobs to the existing system,



network that holds the user group together.



We



and the



interpei'sonal



are actually focusing



on



people's roles, authority relationships, job status and functions, information



requirements, and interpersonal relationships. Information of this kind highlights the organization chart and establishes a basis for determining the



importance of the existing system for the organization. In summaiy, the major focus is to find out what people the analyst is going to be dealing with and what each person expects to get out of a candidate system before it goes thixjugh design and final implementation. Once such information is secured, the next step is to show how various jobs hang together within work schedules and procedures.



Information about Work Flow Work flow focuses on what happens to the data through various points in a system. This can be shown by a data flow diagram or a system flowchart. A data flow diagram represents the information generated at each processing point in the system and the direction



it



takes from source to destination



system flowchart describes the physical system The information available ft-om such charts explains the procedures used for performing tasks and work schedules. Details on charts are covered in Chapter 6. (see Figure 5-3). In contrast, a (see Figure 5-4).



WHERE DOES INFORMATION ORIGINATE? is gathered from two principal sources: personnel or written documents ftom within the organization and from the organization's environment. The primary e^iternal sources are:



Information



1.



Vendors.



2.



Government documents.



3.



Newspapers and



The primary



professioncil journals.



internal sources are:



1.



Financial reports.



2.



Personnel



3.



Professional staff (legal counsel, ditor, etc.).



staff.



EDP



[electronic data processing] au-



131



132



PAST



FIGURE 5-3



TWO SYSTEMS ANALYSTS /



Data Flow Diagram



of



a



Payroll System



•A



4.



System documentation or manuals.



5.



The user or user



6.



Reports and transaction documents.



staff.



Hardware xendors are traditional sources of information about systems and software. Other equipment manufacturers proxide information about competitive sxstems. A third source that has experienced tremendous growth during the past decade is the software house. There are thousands of software packages on the market to suit \irtually everv' problem area with reasonable modifications. Independent listings of software packages and their vendors are available through associations such as Computerworld and DATAPRO, or other organizations with experience in the application under consideration. Other external sources of information are government documents, technical newspapers, and professional journals. Computerworld, for example, provides weekly information about new hardware, hardware installations, software developments, and trends in the field. Articles are also published in system development, documentation, and EDP journals, such as Communications of the ACM and Journal for System Management. They provide invaluable updates in the systemaarea. Internal sources of infomiation



ai'e



limited to the user



staff,



company



personnel, and various reports. User personnel are the fixjnt-line contacts



5



FIGURE 5-4



INFORMATION GATHERING



System Flowchart of a Payroll System



Verify



time cards



/



_^



/



Dat entry Data



Data entry



\



CRT



program



/



I Payroll trans-



actions



©



program



Checks



Reports



Payroll



_^f New



\



Year-end



program



and validating information about a system. An important source of information is the key employee who has been in the user area for years and is familiar with present activities and applications. As we shall see later, historical and sensitive information is often acquired from informants. In some cases, that is the only source available to the analyst. for acquiring



INFORMATION-GATHERING TOOLS No two



projects are ever the same. This



means



that the analyst



must decide



on the information gathering tool and how it must be used. Although there are no standard rules for specifying their use, an important rule is that information must be acquired accurately, methodically, under the right conditions, and with minimum interruption to user personnel. For example,



if



the analyst needs only information available in existing manuals, then



133



134



PART



TWO SYSTEMS ANALYSTS /



unnecessary except where the manual is not up to date. If additional information is needed, on-site observation or a questionnaire may be considered. Therefore, we need to be familiar with various infoiTnation-gathering tools. Each tool has a special function, depending on the information needed. The tools discussed in this chapter are shown in interviewing



is



Figure 5-5.



Review of Literature, Procedures, and Forms Very few system problems are unique. The increasing number of software packages suggests that pixjblem solutions are becoming standardized. Therefore, as a first step, a search of the literature through professional references and procedures manuals, textbooks, company studies, government publications, or consultant studies may prove invaluable. The primary drawback of this search is time. Often it is difficult to get certain reports, publications may be expensive, and the information may be outdated due to a time lag in publication. Procedures manuals and forms are useful sources for the analyst. They describe the format and functions of the present system. Included in most manuals ai'e system requirements that help determine how well various objectives are met. Up-to-date manuals save hours of information-gathering time. Unfortunately, in



many



cases,



manuals do not



exist or are seriously



out of date.



FIGURE 5-5



Information-Gathering Methods """"^^^



Review ture,



litera-



procedures,



and forms



On-site observation



Informationgathering



* Data



Interviews



organization



tools



-



Questionnaires



^



5



/



INFORMATION GATHERING



Included in the study of pixjcedures and manuals is a close look at used for capturing and proxading information. Figure 5-6 illustrates the flow of a purchase oixier in a production system. The objecti\'e is to understand how forms are used. The following questions may be useful: existing forms. Printed forms are widely



1.



Who



2.



Do



uses the form(s)?



the forms include



How



all



important are they to the user?



the necessary information?



What items should



be added or deleted?



How many



departments recei\'e the existing form(s)? Why? In Figure 5-6, each department has a reason for receiving a copy of the purchase



3.



oixJer.



would make



It



little



sense, for instcmce,



if



the



manager



of the



production department required copies of each purchase order e\en



though puchase requisitions were



How How



4.



readable and easy to follow



initiated



by the department.



the form?



is



foim help other users make better decisions? What other uses does the form offer the user ai-ea?



5.



does the information



in the



On-Site Observation Another infonnation-gathering observation.



It is



PURCHASE ORDER



Electronics



Co



Quantity



Description



200 300 130 400 60



Transformers 392K Switches 410A Capacitors 17C Reactors 072



Unit Price



Total price



300 225



600 00



4 10



67500 41000



35 10 00



140 00 600 00



Purchasing department



and



Dick



& Son



Inc



„^ £4l.-^ -ajc Purchasing Agent



Accounts



department payable department



Computer center (processing)



Billing



routine



Purchase



V



AB



Receiving



Inventory control



(in file)



(copies of purchase order)



MHO



objects,



_-N



,



Rea No



on-site



DesT.^at 0^



Source



2 10 3 30







wires 15



and noting people,



is



Date Aug 30 1985 Dehver Before Sept 30 Sh,o»,a Best way



A„,vP



ft



system studies



a Purchase Order in a Production System



foh



2



in



K



A B Dick & Son mc 4117 Waukegan Road Deerlield ill 60015



Lake Geneva. Ill •^i""



used



the process of recognizing



Distribution Flow of



FIGURE 5-6



To E B



tool



analysis



135



136



PART



TWO SYSTEMS ANALYSTS /



occurrences to obtain information.- The analyst's role is that of an information seeker who is expected to be detached therefore unbiased from the system being observed. This role permits participation with the user staff openly and freely. The major objective of on-site obsenation is to get as close as possible to the "real" system being studied. For this reason it is important that the analyst is knowledgeable about the general makeup and activities of the sv'Stem. For example, if the focus of the anahsis is communication, one needs to know as much as possible about the modes of communication i



and the aspects



available thixDugh the organization structure



layout that might



adversely affect



i



of the phvsical



communication. The following questions



can serve as a guide for on-site observations: 1.



What kind



2.



Who



3.



What



of system



is it?



runs the system? is



What does



Who



it



do?



are the important people in



the historv of the system?



How did



it



get to



its



it?



present stage of



development? Apart from its fomial function, what kind of system is it in comparison with other systems in the organization? Is it a primary or a secondarv' contributor to the organization? Is it fast paced or is it a leisurely system that responds slowly to external crises?



4.



As an observer, the analvst follows



a



set



of rules. While



making



than talk and to listen v\ith a svmpathetic and genuine interest when information is conveyed. The emphasis is not on giving advice or passing moral judgment on what is observed. Furthermore, care is taken not to argue with the persons being observed or to show hostilitv toward one person and undue friendliness toward another. observations, he/she



When human



is



more



likelv to listen



observers are used, four alternativ e observation methods



are considered:



Natural or contrived. A natural observation occurs in a setting such as the employee's place of work; a contrived observation is set up by the



1.



observer in a place



like



a laboratorv'.



Obtrusive or unobtrusive.



2.



the



An



obtrusive observation takes place



respondent knows he/she



is



when



being observed; an unobtrusive



observation takes place in a contrived



way such



as



behind



a



one-way



mirror.



Direct or indirect.



3.



A



direct observation takes place



when



the analvst



actuallv observes the subject or the system at work. In an indirect



observation, the analvst uses mechanical devices such as cameras



and



videotapes to capture information.



-



ed.



Haqjer Boyd: Ralph



(Homewood.



111.:



VVestfaU; cind Stanley Stasch,



Hichard D. Irwin, 1981), p. 125.



Marketing Research:



Tejtt



and Cases, 5th



5



/



INFORMATION GATHERING



Structured or unstructured. In a structured observation, the observer looks for and records a specific action such as the number of soup cans a shopper picks up before choosing one. Unstructured methods place the observer in a situation to observe whatever might be pertinent at the



4.



time.



methods may be used in information gathering. Natural, direct, obtrusive, and unstructured observations are fi^quently used to get an overview of an operation. The degree of structure is increased when observations have a specific purpose. An example is tracing the ix)ute of a sales invoice through a system. The degi^e of obtiusiveness may decrease vv^hen one wants to observe the tasks that make up a given job. For example, the analyst may want to create a list of the activities of a production



Any



of these



by observing him/her from a remote location. Indirect observations could be used in a similar manner. For instance, the daily routine of a bank teller may be observed indirectly via a video camera. Finally, contrived situations are used to test or debug a candidate system. They are also used in training programs to help evaluate the progress of supervisor



trainees.



Electronic observation



used information-gathering



and monitoring methods tools



For example, some truck



becoming widely because of their speed, efficiency, and low are



use an electronic recorder system that records, analyzes, and reports infomiation online about the hours and minutes a vehicle was driven faster than 60 miles per hour, the number of hours an engine was idle in a day, and how much out-of-service time a vehicle had.^ These and other electronic methods expedite the information-gathering process in systems analysis. On-site observations are not without problems: cost.



fleets



I



I



Intnjding into the user's area often results in adverse reactions by the



1.



staff.



Therefore, adequate preparation



Attitudes



2.



and



training are important.



and motivations of subjects cannot be



readily observed



— only



the actions that result from them.



Observations are subject to error due to the observer's misinterpreta-



3.



tion



and subjective selection of what to observe, as well as the work pattern during observation.



subjects'



altered



Unproductive, long hours are often spent in an attempt to observe specific, one-time activities or events.



4.



In deciding to use



an on-site observation, several questions are consid-



ered:



What behavior can be observed



1.



that



What data can be obtained more than bv other means?



2.



3



"Electronic: Data for Fleet



cannot be described in other ways?



easily or



more



Management," Fleetowner,



reliably



76, no. 6



by observation



(June 1981), pp. 76-78.



137



138



PAKT



TWO SYSTEMS ANALYSTS /



What assurances can be



3.



given that the observation process



is



not



seriously affecting the system or the behavior being observed?



What



4.



interpretation needs to be



made about observational



data to avoid



being misled by the obvious?



Hou^



5.



much



skill is



required and available for the actual observation?



For on-site observation to be done properly in a complex situation it can be veiy time-consuming. Proper sampling procedures must be used to ascertain the stability of the behavior being observed. Without a knowledge of stability; inferences drawn from small samples of behavior (small time slices) can be inaccurate.



Interviews As



and



GLuestionnaires



we



have seen, on-site observation is directed primarily toward describing and understanding events as they occur. It has limitations when we need to learn about people's perceptions, feelings, or motivations, however. Therefore, other information-gathering tools are also used for analysis. Infomiation-gathering tools can be categorized by their degree of directness. If we wash to know about something, we simply ask someone about it directly, but we may not get an answer. Most of the informationgathering tools used in systems analysis are relatively direct. This is a strength because much of the infonnation needed can be acquired by direct questions. There is information of a more difficult nature that user staff may be reluctant to give directly, however for example, information on company politics or satisfaction vvdth the supervisor. When asked by direct questions, the respondent may yield information that is invalid; yet properly handled, information can be successfully obtained with interviews or







questionnaires.



Interviews



The interview



is



a face-to-face interpersonal role situation in



which



a



pei'son called the interviewer asks a person being interviewed questions



designed to gather information about a problem area.^ The interview is the oldest and most often used device for gathering infoiTnation in systems work. It has qualities that behavioral and on-site observations do not possess. It can be used for two main purposes: (1) as an exploratoiy device to identify relations or verify infonnation, and (2) to capture information as it exists.



Validity



terview bias.



no small problem. Special pains are taken to eliminate inWe assume that information is more valid, the more freely it is



is



Such an assumption stresses the voluntary character of the interview as a relationship freely and willingly entered into by the respondent. If the



given.



'



Fred N. Kerlinger, Fundamentals of Behavioral Research, 2d ed. (New York: Holt, Rinehart



& Winston,



1973),_p. 481.



5



inter\ie\v



/



INFORMATION GATHERING



considei'ed a requirement, the intenlevver might gain the



is



respondent's time and attention, but cannot be certain of the accuracy of the information gathered during the inter\ievv. In



an



inter\ie\v, since the analyst



terviewed meet face to face, there



The anahst



information.



is



is



iinter\ievverl



an opportunity'



and the person



in-



for flexibilitv in eliciting



also in a position to observe the subject. In



contrast, the information obtained through a questionnaire



is



limited to the



subject's written responses to predefined questions.



There are four primarv advantages of the interview: 1.



makes the interview a superior technique for exploring areas vv here not much is known about what questions to ask or how to Its flexibilitv



formulate questions. 2.



opportunitv than the questionnaii^ to evaluate the validity of the infomiation gathered. The interviewer can observe not only what subjects say but also how they sav it.



3.



technique for eliciting information about complex subjects and for piT)bing the sentiments underlving expressed opin-



It



It



offere a better



is



an



effective



ions. 4.



Many people



enjoy being interviewed, regardless of the subject. They usually cooperate in a studv when all they have to do is talk. In contrast, the percentage of returns to a questionnaire is relativ elv low: often less than 20 peix;ent. Attractivelv designed questionnaires that ai'e simple to return, easy to follow,



and presented



in a context that inspii'es



coopera-



tion improve the return rate.



The major drawback



of the interview



is



the long preparation time.



Interviews also take a lot of time to conduct, which means time and money. So whenever a more economical alternative captures the same information, the interview



The Art



is



generally not used.



ol Interviewing.



in school, but



most



of



Interviewing



them develop



is



an



art.



Few analvsts



learn



expertise thixjugh experience.



it



The



which the v\ith no fear



interviewer's art consists of creating a permissive situation in



answers offei^d ai'e i^liable. Respondents' opinions are offered of being criticized by others. Primaw requirements for a successful interview are to create a friendly atmosphei'e and to put the respondent at ease. Then the interview pixjceeds with asking questions properlv, obtaining reliable responses,



and recording them accurately and completely.



Arranging the Interview. the physical location,



The interview should be arranged so that time of the interview, and order of interviewing assui'e



privacy and minimal interruption. Usually a neutral location that



is



non-



threatening to the respondent is preferred. Appointments should be made well in advance and a fixed time period adhered to as closely as possible. Interview schedules generally begin at the top of the organization structure



and work down so



as not to offend anyone.



139



140



PAKT



TWO SYSTEMS ANALYSTS /



Guides to a Successful Interview,



interviewing should be ap-



proached as logically as programming. In an interview, the following steps should be taken: 1.



Set the stage for the interview.



2.



Establish rapport; put the interviewee at ease.



3.



Phrase questions clearly and succinctly.



4.



Be a good



5.



Evaluate the



1.



Stage setting. This



arguments.



listener; avoid



outcome is



of the interview.



an



the analyst opens the interview by focusing on interview,



(b)



why



phase where the purpose of the



"ice breaking/' relaxed, informal



the subject



was



selected,



and



(c)



(a)



the confidential nature



of the interview. After a favorable introduction, the analyst asks the



first



question and the



respondent answers it and goes right through the interview. The job of the analyst should be that of a reporter rather than a debater. The direction of the interview is controlled by discouraging distracting conversation. During stage setting the interviewer evaluates the cooperation of the interviewee. Both the content and tone of the responses are evaluated. How well the interview goes depends on whether the interviewee is the friendly type, the timid type who needs to be coaxed to talk, or the resident e?cpert, who bombards the analyst with opinions disguised as facts. In any case, the analyst adjusts his/her own image to counter that of the interviewee. 2.



Establishing rapport. In one respect, data collection



is



an imposition on



an intrusion into their privacy. Even though the pro-



user staff time and cedure is authorized by management in advance, many staff members are reluctant to participate. There is seldom a direct advantage in supplying information to outsiders, regardless of their credentials. There is a strong perception that it may do them harm. This factor makes it important to gain and maintain rapport with the user staff. The investigation is an art. Al-



though there are no ground rules a.



b.



Do



to follow, there are pitfalls to avoid.



about the purpose of the study. A careful, well-thought-out briefing of participants should not provide any more detail than is necessary. Too much technical detail may tend to confuse people. The briefing should be consistent for all participants to avoid rumors. not deliberately mislead the user



staff



Assure interviewees confidentiality that no information they offer will be released to unauthorized personnel. The promise of anonymity is very important.



c.



d.



Avoid personal involvement in the affairs of the user's department or identification with one faction ^at the cost of another. This may be difficult when several groups are involved in the study.



Avoid shoudng other sources.



off your



knowledge or sharing information received



ftxjm



5



e.



Avoid acting



like



/



INFORMATION GATHERING



an expert consultant or confidant. This can reduce the and discourage people from freely giving



objecti\ity of the appix)ach



information.



/



Respect the time schedules and preoccupations of your subjects. Do not make an extended social e\ ent out of the meeting. If the subject does not complain, subordinates might, especialK' if they are waiting to see the subject iboss).



Do



g.



not promise amlhing you cannot or should not deliver, such as



ad\ice or feedback. h.



/.



Dress and beha\e appropriately for the setting and the circumstances of the user contact.



Do



not interrupt the interviewee. Let



him her



finish talking.



Asking the questions. E.xcept in unstructured interxlews. it is important that each question is asked exacth' as it is worded. Rewording or impromptu explanation ma\' pro\oke a different answer or bias the response. The questions must also be asked in the same order as they appear on the interview schedule. Reversing the sequence could destroy the com3.



each question must be asked unless the pluvious respondent, in answering a question, has already answered the parabilitv of the interviews. Finally,



next one. 4.



Obtaining and recording the response. Interviewers must be prepared to



coax respondents to elicit further information when necessarv The probing" technique enables the interviewer to act as a catalyst, for example: .



a.



Interviewer:



b.



.Analyst



I



see



what you meain. Could you elaborate further on



How do you



that?



about separating the present loan division into commercial and loan departments? (



interview eri:



feel



Financial vice president (respondent): Well, I'm not sure.



think that



we have



Analyst:



see.



I



Sometimes



I



to take this route eventually.



Can you



tell



me more



about that?



These statements indicate that the analyst is listening, is interested, understands what the respondent is trying to say, and is making an effort to gain



more information. The information received during the interview



recorded for



is



later analysis.



Data recordins. and the notebook. Manv svstem studies fail because of poor data recording. Care must be taken to record the data, their source, and the time of collection. If there is no record of a conversation, the analyst runs the risk of not remembering enough details, attributing them to the wrong source, or otherwise distorting the data. 5.



The form of the notebook varies according to the tvpe of study, the amount of data, the number of analysts, and their individual preferences. The "notebook may be a card file, a set of carefully coded file folders, or a looseleaf binder. It should be bound and the pages numbered. The information shown in Figure 5-7 should be included in the notebook. "



141



142



PART



TWO SYSTEMS ANALYSTS /



Data Capture and the Notebook



FIGURE 5-7 1.



all notes taken during investigation are documented. They are the chief sources of interview and observational data, as well as background infomiation on the system. Each page of notes should be numbered serially, and a running chronological record of them should be kept. The name of the analyst, the date the notes were taken, and surrounding circumstances are all important. Since handwritten notes often are not intelligible to others, it is good to have them transcribed or typed soon after they are taken.



2.



Copies of



3.



Copies of all



Originals or duplicate copies of



— — data — originals or duplicates — are included. Loss of key data, even



all information-gathering tools questionnaires, interview schedules, observation guides are placed in the notebook for futui-e reference.



temporarily, can be costly. 4.



Minutes of all meetings as well as a record of discussions, decisions, and changes in design all become part of the notebook.



The organization



of the notebook



purely chronological arrangement will



is



also important. In



some



cases, a



system of categories udth cross-classification would be appropriate. Proper indexing makes it easier to retrieve information when needed. suffice. In others, a



CLuestionnaires In contrast to the interview



is



the questionnaire,



which



is



a term used



has questions to which individuals respond. It is usually associated with self-administered tools with items of the closed or fixed alternative type. By its nature, a questionnaire offers the following advantages: for almost



any



tool that



economical and requires



less skill to



administer than the interview.



1.



It is



2.



Unlike the interview, which generally questions one subject at



at time,



a



questionnaire can be administered to large numbers of individuals simultaneously. 3.



The standardized wording and order



of the questions



and the



stan-



dardized instructions for reporting responses ensure uniformity of questions. In contrast, the interview situation is rarely uniform ft-om



one interview 4.



to the next.



The respondents



feel



greater confidence in the anonymity of a ques-



tionnaire than in that of an interview. In an interview, the analyst



knows the user



by name, job function, or other identification. With a questionnaire, respondents give opinions without fear that • the answer will be connected to their names. usually



5.



staff



The questionnaire places



less pressure



on subjects



for



immediate



re-



sponses. Respondents have time to think the questions over and do calculations to provide



The advantages vantages, especially



more accurate



data.



of the self-administered questionnaire outweigh disad-



when



cost



is



a consideration.



The



principal disadvan-



5



'



INFORMATION GATHERING



low percentage of returns. Another disadx antage is that many people ha\e difficultv expressing themsehes in writing, especialh' when responding to essa\' lopem questions. Many dislike writing. Because of these disad\antages, the inteniew is probabK' superior to the questiontage



is



a



naire.



Types of Interviews and €Luestionnaires and questionnaires



wideh' in form and stnjcture. Inteniews range fixjm the highh unstructured, where neither the questions nor the respecti\e responses Jire specified in ad\ance, to the highl\' structured alternative in which the questions and responses are fixed. Some variation within this range is possible. Interxiews



\ar\'



The Unstructured Alternative The unstructured gathering technique.



inteixiew



is



a relatively nondirectix'e information-



allows respondents to answer questions freeh in



It



own



words. The responses are spontaneous rather than forced. They are self-re\'ealing and pei-sonal rather than general and superficial. The role of the analyst as an inter\iewer is to encourage the respondent to talk finely and ser\e as a catalyst to the expression of feelings and opinions. This is best achie\ed in a permissi\e atmosphere in which the subjects ha\e no their



feeling of disappixtxal.



The Structured Alternative In the structured appixjach, the questions are presented with exactly



the



same wording and



in the



same order



to



all



subjects.



If



the analyst asks a



"Would \ou like to see a computerized approach to sohing \our accounts recei\able problem?" and asks another subject, 'How do \ou feel about computers handling accounts receixable?" the response may not be the same even though the subjects both ha\e the same opinion. Standardized questions impro\'e the reliabilit\' of the responses by ensuring that all subjects are responding to the same questions. subject,



Structured inter\iews and questionnaires ma\' stajcturing of the questions. Questions



diff^er



in the



amount



of



may



be either closed or openended. An open-ended question requires no response direction or specific response isee Figure 5-8i. In a questionnaire, it is written with space



Examples



FIGURE 5-8 •



of



Open-Ended Questions



\o\v that \ou ha\e had the new installation for



six



months, how would you



evcduate the benefits.^







Wtiat







If



is



your opinion regarding the "no smoking"



you had



center?



a choice,



how would you



polic\' in the



DP



center?



ha\e designed the present information



143



144



PAST



TWO / SYSTEMS ANALYSTS



FIGURE 5-9 What



is



the



How many •



What



is



Examples name



of Fill-in-the



of the



anailysts



the average



MIS



Blank Questions



director of your firm?



handle the accounts receivable conversion?



number



of calls



you



receive from clients?



provided for the response. Such questions are more often used in interview's than in questionnaires because scoring takes time. Closed questions are those in which the responses are presented as a set of alternatives. There are five major varieties of closed questions: Fill-in-the-blanks questions request specific information (Figure 5-9).



1.



These responses can then be



Dichotomous



2.



statistically



analyzed.



(yes/no type) questions that offer



two answers (Figure



5-10) have advantages similar to those of the multiple-choice type (ex!\\



The problem



making certain that a reliable response can be answered by yes or no; otherudse, an additional choice (e.g., yes, no, I don't know) should be included. The question sequence and content are also plained



later).



is



important.



Ranking scales questions ask the respondent to rank a list of items in order of importance or preference. In Figure 5-11, the first question asks the respondent to rank five statements on the basis of how they describe his/her present job. 3.



Multiple-choice questions offer respondents specific answer choices (Figure 5-12). This offers the advantage of faster tabulation and less analyst



4.



bias



due



to the order in



which the answers are



favorable bias toward the



which answer choices are



first



given.



Respondents have a



alternative item. Alternating the order in



listed



may reduce



bias but at the expense of



additional time to respond to the questionnaire. In any case,



FIGURE 5-10 •



If



not,



important



Dichotomous Questions



no



do you plan



yes







of



is



Are you personally using a microcomputer in your business? (please circle one) yes







Examples



it



no



to



be using one in the next 12 months? (please



performance of your work, are you personally involved hardware/software purchase decisions? (please circle one) In the



yes



no



circle one)



^ in



computer



5



FIGURE 5-11



An Example



ol



/



INFORMATION GATHERING



a Ranking Scales Question



statements in each group on the basis of how well they describe the job mentioned on the front page. Write a "1" by the statement that best describes the job; write a "2" by the statement that provides the next best description, and Please rank the



five



continue ranking



statements, using a "5" for the statement that describes the



all five



job least well.



Workers on



this job



are busy



all



.



.



.



the time.



have work where they do things for other people. try



out their



own



ideas.



are paid well in comparison with other workers.



have opportunities for advancement.



to



be aware of these types of bias



when



constructing multiple-choice



questions.



Rating scales questions are an extension of the multiple-choice design. The respondent is offered a range of responses along a single dimension. In 5.



Figure 5-13, the respondent



is



asked to rate various aspects of his/her job on



a scale of 1-5.



Open-ended and closed questions have advantages and limitations. Open-ended questions are ideal in exploratory situations where new ideas and relationships are sought. The main drawback is the difficulty of inter-



FIGURE 5-12 •



What



is



Examples



of Multiple-Choice Questions



the average salary of an entry-level analyst? (please check one)



Under $15,000 $15,000-$19,999 $20,000-524,999



Over $25,000







Please check one category that best describes the business of the firm are employed.



where you



Savings bank College, school, library, association



Computer



service



Industricd



company



Outside computer consulting



Other (please describe)



.



145







146



PAST



TWO SYSTEMS ANALYSTS /



An Example



FIGURE 5-13 •



How



satisfied are



circle



one



a Rating Scale Question



of



you udth the following aspects



of



your present job? Iplease



each question)



for



Very Dissat-



Very Dissat-



No



Sat-



Sat-



isfied



Opinion



isfied



isfied



isfied



1.



2.



3.



The way my job provides steady employment



for



1



The chance to be responsible for the work of others The pleasantness



1



of the work-



ing conditions 4.



The chance



1



make use



to



of



my



best abilities



1



preting the subjective answers



and the tedious responses



to



open-ended



questions. Other drawbacks include potential analyst bias in interpreting



the data and time-consuming tabulation. Closed questions are quick to analyze, but typically most costly to prepaid. They are more appropriate for



securing factual information (for example, about age, education, sex, and salaiy). They have the additional advantage of ensuring that answers are given in a frame of reference consistent with the line of inquiiy. A summary of structured



HGURE



5-14



and unstructured interview techniques



and A Summary Structured



is



given in Figure 5-14.



Unstructured Interview Techniques-



Interview



Type



Advantages



Structured



1.



Easy ate



to



due



Drawbacks administer and evalu-



1.



High



to standardization



2.



Standardization of questions



2.



Requires limited training



3.



Easy



to train



new



staff



1.



Pi"o\ides for greater creativity



and spontaneity



3.



Facilitates



Mechanizes interviewing, which makes it impractical



2.



and



standing of the intervipwee Offere greater flexibility in con-



ducting an overall inter\aevv



for



interview settings



Moi'e infoiTiiation of questionable use



deeper understand-



ing of the feelings



3.



1.



in in-



terviewing 2.



pi'eparation cost



tends to reduce spontaneity



all



Unstructured



initial



is



gathered



Takes more time to conduct therefore, costly



3.



Requires extensive training and



experience for effective



i-esults



5



Procedure for CLuestlorinalre Construction The procedure for constructing a questionnaire 1.



Decide what data should be collected; that



is,



/



INFORMATION GATHERING



consists of six steps:



define the pix)blem to be



investigated. 2.



Decide what type of questionnaire (closed or open-ended) should be used.



3.



Outline the topics for the questionnaire and then write the questions.



4.



Edit the questionnaire for technical defects or biases that reflect per-



sonal values.



how well



it



a final editing to ensure that the questionnaire



is



5.



Pretest (try out) the questionnaire to see



6.



Do



istration.



This includes a close look



at



works.



ready for admin-



the content, form,



of questions as well as the appearance



and



and sequence



clarity of the pixjcedure for



using the questionnaire.



A



critical



reliable



and



aspect of questionnaire constiuction is the formulation of questions. To do a satisfactoiy job, the analyst must focus



\'alid



on question content, wording, and fomiat. The following what to consider: 1.



is



a checklist of



Question content. the question necessary?



a part of other questions?



a.



Is



b.



Does the question adequately cover the area intended? Does the subject(s) have pi-oper information to answer the ques-



c.



Is



it



tion? d.



Is



the question biased in a given direction?



e.



Is



the question likely to generate emotional feelings that might lead



to



untrue responses?



2.



Question wording. Is the question worded for the subject's background and experia. ence? b. Can the question be misinterpreted? What else could it mean to a respondent? c. Is the frame of reference uniform for all respondents? d. Is the wording biased toward a particular answer? How clear and direct is the question? e.



3.



Question format. Can the question best be asked in the forni of check answer (ana. swered by a word or two or by a number) or with a follow-up free answer? Is the response form easy to use or adequate for the job? b. Is the answer to the question likely to be influenced by the precedc. ing question? That is, is there any contamination effect?



147



148



PAKT



TWO SYSTEMS ANALYSTS /



Reliability of the user staff are



Data from Respondents.



presumed



which events occur.



If



to



The data coUected ftxjm accurately correspond with the actual way in



such reports are the only source of data, there may be



several uncontrolled sources of error: 1.



The respondent's perceptual



slant.



is known to vary. members who have no



Perceptual ability



Reports of a given event ftxjm several



staff



training in careful observation often have



little



resemblance



to



one



another. 2.



The respondents



failure to



remember just what did happen. Assuming



that he or she receixed a fairly reliable impression of



time that it happened, it generally becomes more passage of time to describe the details of an event.



an event



difficult



at



the



with the



3.



Reluctance of persons being interviewed to report their "true" impressions of what occurred. A subject often distorts descriptions of events for fear of retaliation, a desire not to upset others, or a general reluctance to verbalize a particular type of situation.



4.



Inabilitv'



of subjects to



communicate



their reports or inability of the



analyst to get from subjects the information that they are qualified to



pro\1de.



The RellabUitY-ValldltY Issue .An information-gathering instrument faces two major tests: reliability and validitv'. Before administering the instrument, the analyst must ask and answer the questions: What is the reliability of the measuring instrument? What is its validity'? The term reliability is synonymous with dependability, consistency, and accuracy. Concern for reliability comes from the necessity for dependability' in measurement. Using the questionnaire as an example, reliabilit\' ma\' be approached in three ways: 1.



we



administer the same questionnaire to the same subjects, will we get the same or similar results? This question implies a definition of If



reliabUty as stability, dependability, 2.



3.



and



predictability.



Does the questionnaire measure the true variables it is designed to measure? This question focuses on the accuracy aspect of reliability.



How much



measurement is there in the proposed questionnaire? Errors of measurement are random errors stemming from fatigue error of



or fortuitous conditions



at a



given time, or fluctuations in



mood



that



temporarily affect the subjects answering the questionnaire. To the extent that errors of



measurement



measurement



Ibid.,



p 442.



in



are present in a questionnaire,



is \iewed as the a measuring instrument.^



unreliable. Thus, reliability'



relative



it



is



absence of errors of



5



/



INFORMATION GATHERING



suppose we administered a questionnaire to measure the attitude of the user staff toward a new computer installation. The "true" scores of the five staff members were 92 (excellent attitude), 81, 70, 59, and 40. Suppose further that the same questionnaire was administered again to the same group within the same time period and the scores were 96, 82, 69, 61, and 55. Although not a single case hit the "true" score again, the second test showed the same rank order. The reliability in this example is extremely



To



illustrate,



high.



Now



suppose



had been



that the last set of scores



same



72, 89, 51, 74,



and



67.



but they have a different rank order. In this They case, the test is unreliable. Figure 5-15 shows the three sets of scores. The rank orders of the first two sets of scores covary exactly. Even though the test scores in the two columns are not the same, they are in the same rank order. To this extent, the test is reliable. The opposite case is shovvoi in columns (1) and (3). The rank order changed, making the test unreliable. It can be seen, then, that for an information-gathering instrument to be interpretative, it must be reliable. Unreliable measurement is overloaded uith error. Although high reliability is no guarantee of good questionnaire results, there can be no good results without reliability. It is a necessary, but not sufficient, condition for the value of questionnaire results and their are the



five scores,



interpretation.



The most common question that defines validity is: Does the instrument measure what we think it is measuring? It refers to the notion that the questions asked are worded to produce the information sought. In contrast, reliability means that the information gathered is dependable enough to be used for decision making. In validity, the emphasis is on what is being measured. For example, an analyst administers a questionnaire to a user group to measure their understanding of a billing procedure and has included in the questionnaire only factual items that identify the parts of the billing system. The questionnaire is not valid because, whereas it may measure employees' factual knowledge of the billing system, it does not measure their understanding of it. In other words, it does not measure what



FIGURE 5-15



Reliable



(1)



"True" Scores



and



Unreliable Test Scores



(2)



(3)



Scores fix)m



Scores from Unreliable



Reliable



Questionnaire



Rank



1



72



3



2



89



1



3



51



5



61



4



74



2



55



5



67



4



Rank



Questionnaire



92



1



96



81



2



82



70



3



69



59 40



4 5



Rank



149



"



150



PART



TWO SYSTEMS ANALYSTS /



the analyst intended to measure. For this reason, it questionnaire for validity as well as for reliability.



important to pretest a



is



can be concluded, then, that the adequacy of an information-gathering tool is judged by the criteria of validity and reliability. Both depend on the design of the instrument as well as the way it is administered. It



Summary 1.



Much of the information organization, the user



that staff,



we need to



analyze a system relates to the



and the work



flow. Organization-based



information deals vvdth policies, objectives, goals, and stnjcture. Userbased information focuses on job functions, information requirements, and interpersonal relationships. Work-based infomiation addresses the



methods and procedures, and work schedules. We are interested in what happens to the data through various points in the



work



flow,



system. 2.



Information



is



gathered ft-om sources within the organization and ft'om



the organization's environment. External sources include vendors, gov-



ernment documents, and professional



journals.



The primary



internal



sources are financial reports, personnel, system documentation, and users. 3.



The primary information-gathering tools are documentation, on-site observation, interviews, and questionnaires. The most commonly used tool



4.



is



the interview.



The major



objective of on-site observation



system being studied. The methods used



is



to get close to the "real



may be



obtrusive or unobtrusive, direct or indirect,



natural or contrived,



and structured or unstruc-



The main limitation of observation is the difficulty of observing attitudes and motivation and the many unproductive hours that often tured.



are spent in observing one-time activities. 5.



The interview is a face-to-face interpersonal meeting designed to identify relations and capture information as it exists. It is a flexible tool, offering a better opportunity than the questionnaire to evaluate the



The major drawback



is preparation experience in arranging the interview, setting the stage, establishing rapport, phrasing questions clearly, avoiding arguments, and evaluating the outcome.



validity of the information gathered.



time. Interviewing



6.



an



art that requires



The questionnaire is a self-administered tool that is more economical and requires less skill to administer than the interview. It examines a large number of respondents at the same time, provides standardized wording and instiuctions, and places less pressure on subjects for immediate response. The main drawback is the low percentage of returns.



7.



is



^



may be structured or unstructured. The respondents to answer questions freely unstructured approach allows



An



interview or a questionnaire



5



/



mPORMATION GATHERING



own



words, wheras the structured approach requires a specific response to open-ended or closed questions. in their



8.



There are



five



major



xarieties of closed questions:



a.



Fill-in-the-blanks questions inquest specific information.



b.



Dichotomous questions



c.



d. e.



two-answer choice. Ranking scales questions ask the respondent to rank a list of items in oixler of importance or pi-eference. Multiple-choice questions ask for specific answer choices. Rating scales questions ask the respondent to rank \arious items along a single dimension scale). offer a



i



9.



must focus on question content, wording, and fomiat. These are considered with \alidit\' and In constructing a questionnaire, the anal\st



mind. There are uncontrolled sources of error, however, that stem from the respondent's perceptual slant, failure to remember specific details, reluctance to I'eport the "true" impressions of what reliabilitv in



occurred, or 10. .An



inabilitv' to



communicate information.



information-gathering instrument faces the tests of reliabilitv and



SNTiommous with dependabUitN', consistencv, and accuracy, whereas \'alidit\' emphasizes what is being measured. It should measure what the analvst intended to measure.



\alidit\



.



Reliabilit\' is



Key Words Closed Question Contri\ed Obser\ation



Open-Ended Question



Dichotomous Question Direct Obser\'ation



Ranking Scales Question Rating Scales Question



Fill-in-the-Blanks Question



Reliabilitv



Indirect Obser\ation



Structured Interxiew



Infomiant



Structured Obser\ation



Inter\iew



L'nobtrusixe Observation



Multiple-Choice Question Natural Obser\ation



Unstructured Interview Unstructured Observation



Obtrusive Obser\ation



X'aliditv



Questionnaire



On-Site Obserxation



Review QiUestions 1.



What



categories of information are available for analvsis?



one decide on the category 2.



Why



is



policies 3.



it



How would



for a given project?



important that the analyst learns about an organization's



and



objectives?



Information is available from internal and external sources. Under what circumstances would the analyst depend more heavily on external than internal information? Whv?



151



152



PART



TWO SYSTEMS ANALYSTS /



4.



How



5.



What



6.



is



the informant useful in systems analysis? Explain.



traditional information-gathering tools are available for the ana-



lyst?



Explain each tool



Visit



the computer center of a local firm. Review a user manual and



briefly.



report your findings. 7.



What



8.



How would



is



considered in evaluating forms? Explain.



one conduct an and cons of



specify the pros 9.



10.



on-site observation? Lay out a plan



and



this tool.



you were asked to observe observation method would you



select?



Summarize the advantages and



limitations of interviews



computer operator



a



If



at



work, what



Why? and question-



naires.



what purposes would one use an interview rather than other data-collection methods? Explain.



11.



Under what circumstances or



12.



Explain the difference between (a) structured and unstructured intervieudng and (b) open-ended and closed questions. Give an example



for



of each.



and explain the primary steps



in interviewing.



13.



List



14.



Explain briefly the procedure used to construct questionnaires.



15.



If



you were



to interview a user to obtain biographical information (age,



education, years of experience on the job, and so forth) about the staff of



and you have only one hour to acquire the information, which of the follovvdng methods would you use and why? Structured interviews using open-ended questions. a. 10 employees



minutes each.



b.



Unstructured interviews of



c.



Self-administered questionnaires.



d.



Structured interviews using closed questions.



what respect



five



interviewing an art? Explain.



16.



In



17.



Suppose you have completed the would you pilot test it?



18.



What sources



is



first



draft of a questionnaire,



how



of error affect the reliability of data from respondents?



Elaborate. 19.



What



is



rapport? As an analyst,



with the user's



stafi?



how do you



gain and maintain rapport



Give an example.



Why?



20.



What kinds



21.



Distinguish between validity and



22.



Explain and give an example of each variety of closed questions:



of data should be recorded?



a.



Fill-in-the-blcinks questions.



b.



Dichotomous questions.



c.



Ranking scales questions.



d.



Multiple-choice questions.



e.



Rating scales questions.



«,



reliability.



How



are they related?



5



/



INFORMATION GATHERING



Application Problems



assembly plant contacts the manager of the production department. She briefs him on the survey she is taking and asks the manager to help her get answei^ to some questions. The manager is cordial, and he invites her to come over. The foUovvdng



The systems



emjilyst of a radio



interview takes place.



What



Analyst:



is



We



Manager:



the main function of your department?



assemble radios from components and ship them to



order.



How many people work here? Manager: Why do you want to know?



Analyst:



Analyst:



It



could be that you have too



Manager: Maybe



I



should be the judge of



Analyst [ignores answer^. What's that



She hasn't done



hall?



Manager: She



many people on your



girl



a thing since



shipping orders. more orders fiDm purchasing. verifies



Why do you



need



It



I



that.



doing in the room across the walked in here.



could be that she



check these orders ready been cleared for production?



Analyst:



payroll.



to



when



is



waiting for



they have



Manager: We've had occasions when the units ordered belong than one person or to another address. Analyst:



wjmt



I



the clerk's



What



Analyst:



Meyer:



I



The manager walks udth the anaHe introduces the analyst to her.



reluctantly agrees.



desk. She



woric



verify the



do you



is idle.



do, Miss



Meyer?



goods against shipping orders.



How do you know that



Analyst:



more



to talk to her.



The manager lyst to



to



al-



the shipping orders are correct?



guess I don't, but I verify the type, number of units ordered, and shipping address against the units produced before they are loaded on the truck.



Meyer:



I



Analyst: Aren't



you wasting your time doing



this?



Meyer: You'll have to ask Mr. Kehoe (the manager)



The manager, stcmding by, begins talks to the manager while in Meyer's Analyst: That's



other



girls



all



I



wanted



doing there?



that.



to get irritated.



The



analyst



now



area.



to find out fixjm this area.



What



are those



153



154



PAKT



TWO SYSTEMS ANALYSTS /



Manager: They're preparing bills of lading, taping the fiiTns's logo on the cartons, and making sure that the bill accompanies each order. Analyst: I'd like to walk over there



and



talk



with one of them.



won't



It



take a minute.



Manager: The\



breaking in a



we



have



it



now. Jane o\er on the



prett\' bus\' right



're



new girl we



just hired.



documented.



all



If



you



right



be glad to gi\e \ou a copy in



I'd



is



are after the pre)cedure,



my



ofiice.



how up



Analyst: I'm not sure



hear



it



to date



your documentation



is.



I'd



rather



from them.



The manager leads the analyst to the west comer of the warehouse where four giris are t\ping. He intix)duces the analvst to the senior clerk.



How many bills



Analyst:



of lading does



your average



typist



prepare per



day? Senior clerk: Around Analvst: \'ou ha\'e



fi\'e



The



First,



70.



t\pists here, including yourself



w as



output yesterda\ Senior clerk:



ma\'be



60;



only 200.



as \'ou can see, we're training a



girls also file, call



customers



We



stay busy.



way, and the Analyst: This



like.



is fine,



Senior clerk: Well,



and ha\e them Analyst: Don't



to tell



but what else do



we



and your



total



What happended?



the\'



them



new person



that the oixJer



is



here.



on



its



do?



take the bills of lading to the drivers at the



dock



sign for the shipment.



you think



that this i-unning are)und



is



a



waste of time?



Senior clerk: [no answer]



Assignment a.



How do you



b.



What type



c.



What questions were open-ended? Closed?



d.



e.



rate the interview? Elxplain.



of interview



was conducted by the



Should the analyst have asked the questions respondents? V\'hv?



analyst?



in the



same sequence



to all



Critique the analyst's questions in terms of their content, wording,



and



format.



/



If



you were the



interview.



analyst, illustrate



how



\'ou



would ha\e conducted the



5



/



INFORMATION GATHERING



The dean of students of a major university requested the development of a nonacademic transcript (NAT). The NAT has the objective of maintaining a I'ecord of each student's extracurricular activities while in



school. Three benefits are listed: a.



Faculty



may gain



better insight into student activities



recommendations mittees, without b.



Facultv'



to employer's, graduate schools, or



much



when making awards com-



effort.



can work with students to coordinate career or educational



goals vvith extracurricular commitments. c.



Students



may submit



their



resumes and produce a



sepai^ate record



of extracurricular activities for a prospective employer. ployer, in turn,



may access such



The em-



records, with the student s permis-



sion.



To determine the



feasibility,



the college of business at the university



as a prototype. It was hoped that the results could then be applied across the univereity. To determine the various organizations on campus, interviews were conducted with the staff of the dean's



was used



office,



the career planning director of the business school,



registrar. Extracurricular activities a.



were



Greek organizations, including fi^aternity



and



and the



classified into four groups:



fi'aternities,



soix)ritieS;



and



inter-



intersorority councils.



b.



Organizations recognized by the school council.



c.



University-affiliated organizations.



d.



Athletics (men's



jmd women's) as well



as varsity



and junior



varsity.



The questionnaire shown here was used to collect data from fourthyear MIS students at the college of business. After the data were tabulated, the specific format of the NAT was developed and information was entered into the data base. Since an IBM PC lab was readily available, a dBASE II package was used to implement the prototype.



Assignment a.



What type



of questionnaire



was used?



Critique the questionnaire in terms of tion, c.



its



length, completeness, organiza-



and sequence. What changes would you make?



was selected for determining feasibility, should all univerhave been included rather than only those that were unique to



Since a prototype sity actiwties



business students?



Why?



155



:



:



;



.



PART



156



TWO SYSTEMS ANALYSTS /



Instructions



NONACADEMIC TRANSCRIPT DATA COLLECTION FORM filling out the top portion of this form, After please check each activity on the list below that you were involved in during your enrollment at the university. SSN



Name first



last



m. 1



Current Address



Phone



:



_



School Year:



Major Please check each activity or activities in which you have been or are currently involved. Indicate your level of involvement and each year of participation (e.g.. 2 = second year) .



Example Activity



*^ Alpha Epsilon



Level of Involvement Pi



Vice president. rush chairman



Years Participated



®©©©



Greek Organizations



Level of Involvement Activity Alpha Epsilon Pi Alpha Phi Alpha Alpha Tau Omega Beta Theta Pi Chi Phi Chi Psi



Delta Kappa Epsilon Delta Sigma Phi



Years Participated



12 12 12 12 12 12 12 12



3 3 3 3 3 3 3 3



4 4 4 4 4 4 4 4



5



Activity



/



INFORMATION GATHERING



Level of Involvement



157



Years Participated



12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12



Delta Tau Delta Delta Upsilon Kappa Alpha Kappa Alpha Psi Kappa Sigma Omega Psi Phi Phi Beta Sigma Phi Delta Theta Phi Epsilon Pi of ZBT Sigma Phi Epsilon Sigma Pi Tau Kappa Epsilon Theta Chi Theta Delta Chi Zeta Psi Inter-Fraternity Council



3 3 3 3 3 3 3 3 3



3 3 3 3 3 3 3



4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4



Organizations Recognized by Student Council Activity



Level of Involvement



Aikido Club AFROTC Cadet Group Akindelas Fraternity, Inc. Alpha Phi Omega Theta Chapter American Advertising Federation Amnesty International, USA AROTC Cadet Assoc. Asian Studies Club Assoc, for Arab American Understanding Assoc, for Computing Machinery (ACM) Baptist Student Union Beta Alpha Psi Black Engineering Society Black Student Alliance Black Voices Blue Ridge Mountain Rescue Group Bowling Club B'nai Brith Hillel



Years Participated



12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12



3



4 4 4



3



4



3 3 3 3



4 4 4 4



3



4



3 3 3 3 3 3



4 4



3 3



3 3 3



4 4 4 4



4 4 4



I



|



included. 6.



Recommendations and conclusions suggest to management the most beneficial and cost-effective system. They are written only as a recommendation, not a command. FoUouang the recommendations, any con-



may be included. Appendices document all memos and data compiled clusions ftxjm the study



7.



tigaiton.



They



are placed at the



of the report for reference.



has been conducted properly. When a feasibility team has maintained good rapport with the user and his/her staff it makes the recommendations easier to approve. Technically, the report is only a recommendation, but it is an authoritative one. Management has the final say. Its approval is required before system design is initiated. Chapter 9 covers in detail the design phase of the system Disapproval of the



'-»J



end



during the inves-



life



feasibility report is rare



if it



cycle.



Oral Presentation The



good written presentation documenting the activities involving the candidate system. The pivotal step, however, is selling the proposed change. Invariably the project leader or analyst is expected to give an oral presentation to the end user. Although it is not as polished as feasibility report is a



the written report, the oral presentation has several important objectives.



The most



critical



requirements for the analyst



who



gives the oral presenta-



and knowledge about the candidate system that can be translated into language understandable to the user, and (2) the ability to answer questions, clarify issues, maintain credibility, and pick up on any new ideas or suggestions. The substance and forni of the pi^sentation depend largely on the purposes sought. Figure 7-1 suggests a general outline. The presentation may aim at inforaiing, confirming, or persuading. tion are



1.



(1)



communication



Infiirming. This simply



skills



means communicating the decisions already



reached on system recommendations and the resulting action plans to those who will participate in the implementation. conclusions are included.



No



detailed findings or



^



Confirming. A presentation with this purpose verifies facts and recommendations already discussed and agreed upon. Unlike the persuading



2.



7



FIGURE 7-1



/



FEASIBIUnr STUDY



Oral Presentation— Suggested Outline



Intixxduction.



I.



A.



Introduce



B.



Introduce topic.



C.



Briefly describe current system. 1.



self.



Explain



why



it



is



not



soMng



the problem.



2.



Highlight user dissatisfaction with



it.



3.



Briefly describe scope, objectives,



and i-ecommendations



of the pix)-



posed system.



Body



II.



of presentation.



A.



Highlight weaknesses of current system.



B.



Describe proposed system.



C.



Sell



D.



and expenses. 2. Use \asual aids to justify pix)ject and explain system. Summarize implementation plan and schedule. 1.



How



is it



going to solve the problem?



prxjposed system. Specifv sa\ings



and



benefits, costs



Review human resouix;es requirements to Conclusion. E.



III.



A. B.



C.



D.



system.



Summarize proposal. Restate recommendations and objectives of proposal. Summarize benefits and savings. Ask for top-level management support. Solicit go-ahead



Discussion period



rv.



install



for project,



— .Answer questions convincingly.



approach, no supportive evidence is presented to sell the proposed change, nor is there elaborate reasoning behind i^conimendations and conclusions. Although the presentation is not detailed, it should be complete. Confirming is itself part of the process of securing approval. It should reaffiim the benefits of the candidate system and provide a clear statement of results to be achieved. Persuading. This



3.



is



a presentation pitched toward selling ideas







tempts to convince executives to take action on recommendations implementing a candidate system.



at-



for



Regardless of the purpose sought, the effectiveness of the oral presentadepends on how successful the project team has been in gaining the



tion



confidence of frontline personnel during the initial investigation. How the recommendations are presented also has an impact. Here are some pointers 1.



on



how



to give



Rehearse and in



an



test



oral presentation:



your ideas before the presentation. Show that you are



command. Appear



relaxed.



recommendations are more easUy accepted if they are presented as ideas for discussion, even though they seem to be settled and final.



2.



Final



3.



The presentation should be



brief, factual,



and



interesting. Clarity



and



209



.



210



PAKT



TWO SYSTEMS ANALYSTS /



persuasiveness are interest 4.



critical. Skill is



needed



to generate



enthusiasm and



throughout the presentation.



Use good organization. Distribute relevant material to the user and other parties in advance.



5.



Visual aids (graphs, charts) are effective



and imaginative. An communicated 6.



effective



if



they are simple, meaningful,



graph should teach or



tell



what



is



to



be



Most important, present the report in an appropriate physical environment where the acoustics, seating pattern, visucil aid technology, and refreshments are



all



available.



The most important element to consider is the length of the presentation. The duration often depends on the complexity of the project, the interest of the user group, and the competence of the project team. A study that has compan3/vvdde applications and took months to complete would require hours or longer to present. The user group that was involved at the outset would likely permit a lengthy presentation, cilthough familiarity with the project often dictates a brief presentation. Unfortunately,



many



presentations tend to be a rehash of the written document, with



or excitement. Also,



when



little flare



the analyst or the project leader has a



reputation and success record from previous projects, the



oral



good



end user may



request only a brief presentation.



Summary 1.



A



study is conducted to select the best system that meets performance requirements. This entails an identification description, an evaluation of candidate systems, and the selection of the best system feasibility



for the job. 2.



A systems



required performance



defined by a statement of consystem objectives, and a descripthen ready to evaluate the feasibiUty of is



straints, the identification of specific



tion of outputs.



The



analyst



is



candidate systems to produce these outputs. 3.



Three key considerations are involved in



and



feasibility analysis:



economic,



Economic analysis (known as cost/benefit whether the adoption of a system can be costjustified. Technical considerations evaluate existing hardware and softw^are. Behavioral feasibility determines how much effort will go into educating, selling, and trciining the user staff on a candidate system. technical,



behavioral.



analysis) determines



4.



There are eight steps in a feasibility study: a. Form a project team and appoint a project leader. b. Prepare system flowcharts. c. Enumerate potential candidate systems. d.



Describe and identify characteristics of Ccindidate S3^tems.



7



/



FEASIBILITY



STUDY



Determine and evaluate performance and cost effectiveness of each



h.



candidate system. Weight system performance and cost data. Select the best candidate system. Prepare and report project directive to management.



Key Words Candidate System Cost/Benefit Analysis Feasibility



Study



Response Time Source Code Source Language



Review GLuesfions 1.



What makes up a system peiformance definition? Select a situation with which you are familiar and explain the steps to prepare the definition.



2.



"Many feasibility studies produce Do you agree? Why? Explain.



3.



What considerations are involved in feasibility analysis? Which consideration do you think is the most crucial? Why?



4.



Elaborate on the steps in feasibility analysis.



them 5.



to four steps,



disillusions to users



If



and



you were



analysts."



to shorten



which ones would you pick? Why?



How important



is



in every study?



Whei^



a project team in feasibility analysis?



Is



it



mandatory



are the exceptions?



6.



Use Table 7-3 as the basis for determining alternative performance/cost factors between the IBM PC jr. and Apple's Macintosh systems. Which one would you recommend for the safe deposit department of the bank?



7.



What makes up



a feasibility report?



How would you change it? Explain.



Application Problems



SAFE DEPOSIT TRACKING SYSTEM Introduction



The



member



First



National Bank of South Miami



of the Federal Reserve



is



a full-service bank



and a



and the Federal Deposit Insurance



211



212



PAKT



TWO SYSTEMS ANALYSTS /



Corporation. At the close of 1983, the bank had assets totaling S159 million, capital of more than S19 million, deposits of SI 13 million, and a loan base of S37 million. Rated the 37th safest bank in the United States,



has a highly successful management team and 119 employees in a single-stor\' building in the heart of downtown South Miami. The bank operates two remote automatic teller machine lATM) First National



locations



and



a dri\ e-in



facility.



The



original orientation



was toward the



community,', ser\1ng the people in the immediate area. Although



primarily a communit\' bank, First Xational



is



still



becoming increasingly



commerical as more industrial firms move into South Miami, especially around a major uni\"ersit\' where the bank is located. Available are complete banking and trust senices ranging from XOW accounts and money market certificates to commercial, installment, and auto loans to safe deposit box rentals.



The Organization Structure



—Safe Deposit



In 1978, the bank's safe deposit department anticipated a sharp



demand. The safe deposit department is in the lobb\' area and operates under the operations department. It is staffed b\' three customer ser\1ce representati\'es and one security' guard Exhibit 7-1). Although no single indi\idual in the department has been given the official title of super\isor, in practice, one of the employees is in charge. increase in



-Vl



i



Denise Aguiar, the "supervisor," began working in August 1981. Since then she has made sexeral improxements in procedures as we shall discuss later. Dorothx' Gcirrison and Linda Hoppe are the other two safe deposit clerks. They began emploxnient in June 1981 and March 1983, respectively. None of the three women has prior computer experience. Humberto Tamayo joined safe deposit in Januan' 1982 as the vault security guard. The bank currently has 6,195 safe deposit boxes and the capacity' to increase the number to more than 10,000. The safe deposit boxes range in size from 3 by 5 inches to 38 by 21 inches and are rented on an annual contractual basis. E.xhibit 7-2 lists the most recent schedule of senice charges by box size. Although rental charges are fixed, in practice the department must keep track of three fee schedules. First, the safe deposit box lessees whose contracts have not yet expired are charged by the older rental fee schedule. A second schedule holds for some current customers who are unhapp\' with the hefty price increases and ha\e large account balances, borrowings, or utilization of other bank services. These customers are enticed into keeping their bo.xes by \arious discount allowances that are appro\ed by a vice president. Third, the employees are ofi'ered safe deposit boxes at the old fee rates less SIO, making the 3 by 5 box free.



7



EXmBIT



7-1



/



FEASIBIIJTY STUDY



213



Organization Chart



Board of



Directors



Audit



President



± Personnel



Guard Operators



Maintenance



Vice President Trust



Senior Vice President



Vice President Installment Loans



Collector Assistant Cashier



Safe Deposit



Department



Senior Vice President Operations



Loans



Vice President



Vice President



Commercial Loans



Commercial Loans



2nd



2nd



Vice President



Vice President



Vice President



Vice President



Accounting



Bookkeeping



Vice President



2nd Vice President



Vice President Platform



1



Customer



Customer



Customer



Representative (Denlse Aguiar)



Representative (Dorothy Garrison)



Representative (Linda Hoppe)



Guard (Humberto Tamayo)



214



PART



TWO SYSTEMS ANALYSTS /



EXHIBIT 7-2 Box Size (inches)



List of



Old Rental Charge



3X5 5X5 3 5



10 15 13



26 38



X X X X X X X



Rental Charges



10.00



$



New



Rental



Charge $



25.00



25.00



45.00



10



30.00



75.00



10



40.00



100.00



10



70.00



175.00



10



125.00



225.00



21



350.00



350.00



21



600.00



600.00



21



1,000.00



1,000.00



Data Collection



The data



collection process began by examining the safe deposit department's Manual of Instructions and Procedures and sample documents. To gather more information about the department and investigate some questions rfiised, staff members were interviewed at the bank. Denise provided most of the data. A tour of the facility offered a firsthand look at the layout of the vault and lobby area where business is conducted. A systems flowchart of procedures was drawn up based on the Manual of Instructions and Procedures and the rules and regulations booklet (Exhibit 7-3). This helped to clarify the information and indicate where changes might be needed. Any further questions were readily answered by the supervisor or a member of the board of directors who is quite familiar with the bank's operations. There was a good







and the project team by Management's encouragement and



deal of communication between the bank



phone, in person, and in writing. enthusiasm for the project were extremely helpful throughout the



feasi-



bility study.



Following data collection, the department's policies and procedures were analyzed by looking at improvements that had already been implemented and identifying existing problem areas. The department has recently instituted several improvements in its operations. For example, a previous problem involved the absence of security measures when the keys were sent to the locksmith for changing the lock after a customer discontinued the box rental. These keys were never recorded and could be missing, causing a potentially large security problem. Denise established a new procedure that required the constant monitoring of the whereabouts of all keys. Another area in which changes have occurred is record-keeping and documentation. In the past, vital documents such as birth and death certificates, court orders, and records on customers and payments were not always readily available. Denise has organized this information and filed it so that it can be obtained more easily.



EXHIBIT 7-3A Customer



Initica Visit Attendant



216



PART



TWO SYSTEMS ANALYSTS



EXHIBIT 7-3B Customer



/



Daily Activity Attendant



Guard and customer insert



own



keys



Customer conducts business



in



private



Customer



,^\



returns box to guard or



attendant



Use guard key and customer / key to unlock and ,



return



box



,



i



7



EXHIBIT 7-3C



Billing



/



FEASIBILITY



STUDY



217



218



PART



TWO SYSTEMS ANALYSTS



EXHroiT 7-3D



'



/



Six-Month Delinquent Rental



'/



.%



7



/



FEASIBILITy



A new problem arose when the department was questioned



regard-



ing a purported loss of cash fix)m a customer's safe deposit box;



spurred



£in



investigation into the procedures of



its



STUDY



which



operations. There



was one instance where a change in a contract's terms regarding the rental of a box was improperly recorded. Consequently, a new procedure was established whereby contract changes are now immediately recorded as a new contract. The old contractual agreement on which the change



is



noted



is



duplicate contract.



filed as a



A



situation that



would be a change in rental by two individuals to a single lessee. Furthermore, a manual of procedures was compiled. As shown in Exhibit 7-4, it specifies and documents the procedural requirements and information necessary for opening new accounts, conducting daily operations, and collecting delinquent rentals. The guidelines improve efficiency and minimize legal liabilities. requires such action, for instance,



The Problem Despite these recent procedural changes, problems still exist for safe deposit that indicate the need for further, more dramatic changes in the current system. The main problems center around the present



memual record-keeping procedures. All filing and record-keeping are done manually by several people. Consequently, documents are easUy lost or misfiled. The enormous volume of paperwoiit generates inefficiency cmd disorganization. Because the department has grown so large and the nature of the manual work is so tedious, the potential for errors is great. As stated by one employee, "the idea of future growth under this system is frightening." Problems uath financial record-keeping also attribute to the manual system, particularly with accuracy in the present billing method. One person is solely responsible for pulling contracts due for billing and for typing up the bills. This, along with manually noting payments on contracts, leaves room for inaccurate reporting and misfiling. One result, for example, is that delinquent accounts sometimes go unbilled. Another area of concern with the present system is incomplete and labor-intensive



inaccurate documentation. This



is



evident in the difficulty of tracing



misplaced documents. Similar documents are not necessarily filed together and standard forms cire not prenumbered. These all contribute to filing problems. Documentation problems were found to stem from the Manual of



no description of which files exist, how they are organized, what is kept where, and how often each file is updated. Second, box prices are somewhat arbitrary. Only one of the four pricing schedules is documented. Third, there are no formal



Instructions



and Procedures.



First,



there



is



job descriptions or recorded assignments of duty.



Related to record-keeping deficiencies are inventory procedures. Neither auditing nor safe deposit knows exactly how^ many boxes there



219



220



PART



TWO SYSTEMS ANALYSTS /



EXHIBIT 7-4



SUMMARY OF CURRENT PROCEDURES Following



an outline of the procedures presently followed by the department, as



is



documented



in the



Manual of Instructions and Procedures.



PROCEDURE FOR OPENING NEW ACCOUNTS Forms



to



be completed upon the opening of a



new account



before the customer



enters the vault: I.



Lease. A.



Necessary identification information to be obtained. 1.



B.



Name.



2.



Firm.



3.



Address.



4.



Phone number.



5.



Hair color.



6.



Eye color.



7.



Height.



8.



Weight.



Lease agreement (contract) the account. A key deposit



on the



II.



is



read and signed by the person(s) opening



made and



the deposit



amount



is



recorded



lease.



additional persons are to have access to the safe desposit box, a deputy



C.



If



D.



must be appointed. This appointment signature of the deputy is needed. Contract filed by box number.



is



noted on the contract and the



Visitation card.



A.



B.



III.



is



Signed upon rental; this original signature is used for comparison purposes during each visit. Signed upon each visit by authorized customer.



compared



1.



Signature



2.



Initialed



3.



Date and time of entrance noted. needed information is obtained, customer



C.



After



D.



Filed



to original signature.



by attendant. is



granted entrance.



by lessee name.



Rental form. A.



Receipt for the



initial rental fee



B.



Receipt for key deposit.



C.



Lessee



is



(payable in advance).



requested to read safe deposit rules and regulations printed on



reverse side.



by box number.



D.



Filed



E.



Lessee receives copy. Transaction entered on daUy balance sheet;



F.



envelope.



all



receipts filed in daily



7



/



FEASIBnJTY STUDY



EXHIBIT 7-4 (continued) I\



.



HistoiA card. A.



B.



Inlbmiation to be recorded: 1.



Box number.



2.



Personisi renting box.



3.



Date rented.



4.



.Attendants



Filed b\ bo.\



initials.



number.



Customer is granted entrance to the \ault: 1. Customer is escorted by safe deposit attendant 11.



III.



I\



.



Customer's keys are tested. Box is checked to ensure it is empt\-. Customer and box are taken to a pri\ ate booth placed in box at this time.



PROCEDURES FOR



D.\IL\



Customer wants access I.



II.



III.



if



to safe deposit box.



personal belongings are to be



WORK



to safe deposit box.



.Attendant pulls customer's \isitation card. .A.



Customer



B.



.Attendant checks signature, initials card,



Customer



signs.



accompanied into .Attendant and customer each is



\ault insert



and



and notes time and



date.



to safe deposit box.



own



ke\'s;



door



is



opened and box



is



remo\ed. I\'.



\



.



\1.



Customer conducts business with box in pri\ate booth. Customer returns box to attendant. Attendant key and customer key are used to unlock door; box door locked.



is



returned and



Inventor%' of contents of safe deposit box. I.



II.



Ill



I\



.



v. \1.



A.



must be authorized by Court order or



B.



Power



In\entor\



of attorney.



.Approval from President,



I.



III.



I\'.



Officer



needed before entrance. Customer is accompanied by officer or safe deposit custodian of the bank. \ isitation card is signed and initialed b\' bank officer and safe deposit custodian and circumstance of entr\ noted. Im entor\ of safe deposit box contents is made. Copy of inventory contents is filed by date.



Customer surrenders II.



\P and Cashier, or \P and Senior Loan



safe deposit box.



Release portion of lease agreement signed.



1.



card notations. Closing date.



2.



Number



Histor\'



of keys returned.



account documents documents. Key deposit returned.



,A11



cire



marked with closing date and



filed



with



inacti\'e



221



222



PART



TWO SYSTEMS ANALYSTS /



EXHIBIT 7-4 (concluded)



BILUNG PROCEDURE Safe deposit attendant



manually determines



for



which accounts



rental fees



are due. II.



Notices mailed. A.



If



fee



is



charged to customer's checking account, an advice of charge



is



created in triplicate.



Copies to a. Customer. b. Accounting department. Contract file. c. 2. Credit noted on daily balance sheet. B. If fee is not charged to customer's account, a rental due notice is mailed to customer at month's end. If rent not received by the end of the month in which it was due, second notice will be mailed. If rent not received within two weeks after second notice, current address must be verified. If rent still not paid, three monthly warning letters are mailed (SD2, SD3, SD4). 1.



III.



IV.



V.



A.



Two



copies typed. Original signed by



VP and Cashier and mciiled to customer. Second copy filed in contract file. If rent is not renewed within three months after expiration of lease term, the safe deposit corporation may deny admission to safe deposit box. If rent is six months delinquent, delinquent procedures are enacted. When rent received, payment noted on daily balance sheet. All cash and daily balance sheet sent to Accounting at end of day; receipts 1.



2.



VI.



VII. VIII. IX.



filed in daily



envelope.



SIX-MONTH DELINQUENT RENTAL PROCEDURE I.



II.



Registered letter mailed to customer's last



known



address, advising that the



box wall be opened and contents stored at renter's expense unless rented payment is made within 30 days. If payment is not received, box is opened in presence of Bank Officer and Notary Public. A. Contents sealed in package. Notary Public executes certificate reciting. B.



C.



1.



Name



2.



Date of



3.



List of contents.



rv.



box opening.



Five copies of certificate of opening.



Included in package holding contents. 2. Last known address of renter. 3. Auditing department. 4. Safe deposit department. Locksmith. 5. Package placed in bank vault; same rent charged as for safe deposit box. If one year elapses and package is not claimed, a public auction is held to sell contents. Proceeds used to pay for rent and expenses. 1.



III.



of renter.



7



/



FEASIBEnr STUDY



Discrepancies exist between the two departments (auditing and Boxes are manually counted. Their numbers do not follow a logical sequence corresponding with locations in the vault. In addition, some of the boxes cannot be matched with a contract, and some contracts are missing altogether. cire.



safe deposit) records.



two important security deficiencies have been identified. First, contracts filed in the vault are not locked up, which means they are accessible to customers in the vault at any time. Second, past-due contracts are filed in the lobby in an unlocked desk that is not fireproof. These conditions jeopardize the interests of both the customer and the Finally,



bank.



summary,



system have been identified in areas such as manual record-keeping and filing procedures, incomplete and inaccurate documentation, and inadequate security. Despite recent procedural and policy changes, a computerized safe deposit tracking and billing system could result in significant improvements. Such a system would provide needed up-todate information, improve accuracy and file organization, and increase security by making errors more readily detectable. With a user's manual and a more specific policy manual, documentation would be complete. In



specific deficiencies with the present



The Alternatives determining feasibility, the first step was to evaluate to what extent cuiTcnt needs can be met and pixDblems solved. A quick search of existing software packages i^vealed specific improvements, including: In



a.



Improved bUling accuracy and



b.



Provision for updated box tracking.



c.



Reduction of record



d.



Elimination of monthly manual check for box occupancy. After various



efficiency.



misfiling.



microcomputers were reviewed,



it



became obvious



an IBM PC would be appropriate. For a relatively low cost, such a system would meet the department's immediate needs, has enough memory capacity for expansion, and is flexible enough to be used for other functions such as word processing, general ledger, payroll, and financial analysis. The system has an excellent reputation for performance and maintenance and could later be networked into a large system. Even though department personnel are completely unfamiliar with computers, the system would not be intimidating and can be installed with limited training. Politically, the IBM PC would be a good choice. The \ice president in charge of accounting had a three-day seminar on the system with a previous employer. His biases could not be overlooked. The first major task undertaken was a search for a software package that is capable of meeting the user's needs, keeping in mind the followthat



ing:



223



224



PAKT



TWO SYSTEMS ANALYSTS /



b.



Automated billing. Box tracking.



c.



Online safe deposit maintenance.



d.



User-friendly documentation



e.



Loading the software on the IBM PC.



a.



and easy



training.



Although one option was to do the programming, it was soon found that time and cost would be prohibitive. After various directories ofr financial software packages were searched, a package was found to fit the overall requirements.



The Package There were three limitations concerning the proposed safe deposit package: a.



b.



c.



There was no provision for a history card file to keep track of the present and previous customers of each box for reference.



The package handles a maximum of 8,000 boxes- on the PC and 32,000 boxes on the XT (hard disk) model. Being less than two years old, the package has flaws such as limited editing capability and poor documentation.



To compensate was solved by



for these dravvl^acks, the history card



setting



up



a



dBASE



II file



on the PC



to



work



file



problem



in



conjunc-



The capacity constraint was settled when it was learned that management does not expect SDC to exceed that limit in box rentals before 1990. In the long run, this would be more cost effective with the PC than underutilizing an XT system. Finally, the vendor assured the bank that all program flaws wdll be eliminated in a forthcoming updated edition. tion udth the software package.



Costs and Benefits



Computerizing safe deposit operations will involve new costs that can be justified by saving one full-time clerk and substantially improving customer service and overall performance. Listed here are the costs



and savings associated



vvdth the



candidate system:



Hardware/software



Hardware



IBM PC with 64K memory Three 64K-byte memory chips



Monochrome Monochrome Epson printer



display



and printer adapter board



display (screen)







letter qualitj^



$2,630



490 335



345 1,100



$4,900



7



/



FEASIBILITy



STUDY



Software



DOS



2.0



dBASE



operating system



65



385



II



system



Safe deposit tracking/billing



Maintenance lone-time Supplies disks, paper, I



950



fee)



150



etc.)



250 $1,800



Total costs



$6,700



Direct savings



One



full-time



employee



(salary



+ 25%



Net direct benefits $16,750 - 6,700 = Break-even point 6,700/16,750



benefits)



$16,750



$ 10,050



= 40 percent



or 4.8 months



Assignment a.



undertaken by the project team strengths, weaknesses, pixjcedures used, and expected outcome.



b.



If



Evaluate



the



study



feasibility







its



you were doing the study, would you have considered hardware before



software? VVhv? Elaborate.



JEFFERSON CREDIT CENTER This case in



Chapter



4.



is



a continuation of the company's backgiDund presented



In this section,



a preliminary choice



Problem



is



two



made



for



alternative systems are described



and



implementation.



Definition



As described in the fii^t part of the case (see Chapter 4), the current problem in the operations of the Jefferson credit center is inefficient storage and retrieval. In the present file system, both customer inquiries and payment slips are stored in physical paper files under date indexes. Consequently, misfiles and the tertiaiy relevance of the account



number and document



type



make



the search process highly inefficient.



This reduces the credit center's ability to properly respond to customer inquiries.



Goals and Considerations



With the preceding problem in mind, the study was oriented toward (1) locating and evaluating microfilm processing and data storage and retrieval systems capable of meeting the Jefferson credit depart-



225



n 226



PAKT



TWO SYSTEMS ANALYSTS /



ment's needs and



recommending the system



(2)



best suited to the



unique needs and limitations of credit center operations. In the system feasibility study, the following goals were expected be achieved by the candidate system: a.



File control- -All out-of-file



to



or misfiled conditions should be elimi-



nated. b.



Multiple access



— Multiple users should have access to the same



information simultaneously. c.



Labor savings



— Fewer personnel should be able to retrieve more



information in less time, providing greater productivity per employee. (L



Storage capacity



— The



system should be large enough to allow



unlimited expansion. e.



Document in



organization



— Retrieval of documents can be specified



any order regardless of date or order filmed.







/



Information revision The system must be capable of accepting additional information via the CRT terminal.



g.



Future files



flexibility



(readers



if



— The system should be capable of adding more



needed) in the event of future



In addition to these goals, each system



grovvlJi.



was evaluated



in light of the



following considerations: a.



Compatibility with the present credit



IBM 3031 and b.



Feasibility of in-house (versus contracting) conversion file



and updat-



records.



Ease of transition, which involves implementation procedures and



employee d.



the



4341.



ing of existing paper c.



management system on



training.



.AffordabUity.



Of the systems evaluated, two top candidates were chosen. Each system is briefly described here.



Kodak Micro imagination System



The Kodak Microimagination System rate areas: filming



is



is



delineated into two sepa-



perf^ormed by the ReUant 800 Microfilmer, and



and retrieval functions are performed by the IMT-150 Intelligent Terminal. The Reliant 800 microfilms checks at the rate of 700 per minute. The machine has reduction capabilities and a film capacity of either two 100-feet rolls of 5.4-mm film or two 215-feet rolls of 2.5-mm film. The unique aspects of the system are its flexibUity and speed. Accessories can be added with ease. The indexing system developed while microfilming the document allows for a retrieval time of less than storage



five



seconds.



:



7



The receives



Reliant 800



program



is



equipped with an



signals



The



and



translates



/



FEASronJTY STUDY



intelligent controller that



them



into operations that suit



can select any four indexing options from 13 available pixjgrams. These indexing choices can be changed as the user's needs change. The second component of the system is basically a microcomputer that has a built-in memory and short-term (temporary) storage that can be erased when not in use. The unit is capable of searching through several varieties of film formats. When the document is brought to screen, the IMT-150 has an automatic image position feature that "locks in" a clear, complete pictui^ on the viewing screen. Once on the vievvdng screen, a print can be obtained in 12 seconds. An aspect of the Kodak system that is of vital importance to Jefferson stores is its easy adaptability and compatibility udth Jefferson's existing mainframe computer. The Computer-Assisted Retrieval (CAR) allows the user to keep the images on inexpensive, easy-to-use microfilm magazines, while the computer data base maintains an index of the location of each miciT)film image. With the CAR, the computer does all the sorting and indexing of randomly filmed documents while the IMT-150 retrieves the document. the indexing needs.



client



CAMMS/ll Microimage System



The second candidate system considered was the CARMS/11 system. The California-based vendor is one of the leading suppliers of rapid-access infomiation-retrieval systems using micrographic and computer technologies. The proposed system is a fully automated, computer-controlled record management system. It is designed to: a.



Eliminate misfiles and out-of-file documents.



b.



Provide instant retrieval of payment and customer inquiries.



c.



Increase productivity by creating instant access to data.



d.



Allow for incremental expansion into other areas vvdthin the son credit center.



When



Jeffer-



the operator initiates a search by depressing a function key,



he/she receives prompts querying as to what functions are to be performed. In addition to system status, the system c£in be used to update, amend, or append information to a file, thus providing the operator vvath complete information whenever it is needed.



Comparative Analysis



The next step



was



and cons of The present system used by Jefferson's credit center is already obsolete. Both systems considered, the Kodak Reliant and the CARMS/11 are completely compatible wdth the IBM 3031. In the case of the Kodak system, a small software package is all in this project



to evaluate the pros



the two candidate systems.



that



is



required to integrate the two systems.



On



the other hand, the



227



228



PAfiT



TWO SYSTEMS ANALYSTS /



CARAIS/ll system would require extensive data base and



file



control



software to control indexing, storage, and retrieval of large amounts of information.



A second



consideration



is



storage requirements. Jefferson's credit



center receives and microfilms between 12 and 25 batches of 250 checks per day. It also receives 725 customer inquiries per week. The proposed '



«l



system must be capable of storing two years of such data. This amounts to 2 million to 3 million documents. The CARMS/11 system, with a storage capacity of 100,000 documents per ultrastrip cassette, would require 20 to 25 cassettes. On the other hand, the Kodak system would require 150 cassettes to store two years of documentation. Related to storage requirements is quick retriexal time. The maximum time for accessing a document should be 15 seconds; 25 seconds if a hard copy is required. This criterion fa\'ors the CARMSll system. With 20 to 25 total storage cassettes, the CARMS/11 access time is between 2 and 12 seconds. The Kodak system, with more than five times as



many film



cassettes,



In addition, the



would require more search time



chance



for misplacing the cassette



for the cassette.



is gi-eatly



increased



with the Kodak system.



A



Both systems are hours per day.



A



document filming and indexing. comparable. FUming and indexing take fi\e to eight



third criterion to consider



is



used in the evaluation is vendor serxice and support. Kodak's vendor is in Lynchburg home of the credit center), whereas the CARiMS/ll dealer operates out of the Washington, D.C., area 140 miles away. A system engineer must be within eas\' reach to remed\' malfunctions and pro\ide an ongoing training program. final criterion



I







Cost Comparison



Most of Kodak's cost is for hardware. Jeff^erson would ha\'e to purchase a new microfilmer, two intelligent terminals, some peripheral accessories, and a fairly inexpensi\'e software package isee E.xhibit 7-5). On the other hand, the CARMS/ll system's cost is mainly the software package and its two work stations. Compared to Kodak's software package, which merely pro\ides the interface between the IMT-150 and the IBM 3031, the CARMS/11 software package proxides data base management services, but also redundant operating system services (see Exhibit 7-6).



Development costs present some interesting features. The CARMS/11 system requires o\'er twice the processing and dexelopment costs incurred by the Kodak system. This is best shown by Exhibits 7-7 and 7-8, w^hich represent the processing and development costs for the next two years' business xolume. The increased cost of CARMS/11 can be attributed solely to the ultrastrip conversion. The ultrastrip 's benefits seem to outweigh its rather expensive price tag, however.



7



Kodak Microimagincrtion System



EXHIBIT 7-5 Item



Costs Cost



Reliant 800 Mici-ofilmer



$ 8,600



Intelligent controller



3,025



Imprinter



6,400



Imprinter keyboard



2,550



Patch sensor assembly



1,760



Image mark counter Bench wori^ base



535



Shelf



155



585



Receiving hopper



165



Film unit for inquiries



2,190



Film unit for checks



2,190



Auto-feeder



1,325



Stacker



985



Image marker Two IMT-150 terminals Interface with computer



905 29,570 2,800



Total



$63,740



Development and processing costs of past documents



11,305



Total to be current



EXHIBIT 7-6



$75,045



Purchase Cost System



Two CARMS/ll work



for



C ARMS/ 11 Microimage



$ 38,000



stations



Auto-feeder



1,325



50 Strip removable cartridges



1,000



Software



35,000



Total system price Conversion of present microfilm to ultrastrips Total system and conversion costs



$ 75,325



— two



35,000



yecirs



$110,325



CARMS/ll Developing Costs



EXHIBIT 7-7 Description



Costs



Cost of developing one image microfilm and ultrastrip



0.05/image



1,500,000 checks/year,



3 checks/image



$25,000/year



600 customer inquiriesAveek, 1



inquiry/page



Total microfilm



and



1,440/year ultrastrip



development costs/year



$26,440



/



FEASffirUTY



STUDY



229



230



PART



TWO SYSTEMS ANALYSTS /



EXHIBIT 7-8



Kodak Developing



Costs



1,500,000 checks/year,



20,000 checks/cartridge,



75 cartridges required/year,



two years' worth = 150



cartridges,



$7.00/cartridge



$1,050



600 customer inquiries, 24,000/year,



two cartridges required/year, two years' worth



148



Total



$1,198



comparing the two systems,



necessary to weigh the cost, vendor reputation, nearby service center, and support of the Kodak system against the greater flexibility, speed, and storage capabilities of the CARMS/11 system. Because such a large portion of the credit cenIn



ter's activity



is



it



centers around customer service, speed



and



efficiency are



of prime importance. Consequently, the CARMS/11's ability to increase



u r



*



»,l



was the deciding advantage. Although center in Lynchburg, CARMS's dealer can



the speed of access/retrieval



Kodak operates a



service



provide same-day service as well. Finally, although the CARMS/11 system costs $30,000 more than the Kodak system, no budget constraints were provided. Furthermore, the system's unique attributes justify the additional cost.



Assignment Evaluate the feasibility study.



weak points? What



What were



The do a complete study?



the strong points of the study?



additional information



is



needed



to



Elaborate.



Selected References Andrews,



Wm.



"The Business Systems Proposal." Journal of Systems Management, February 1978, pp. 39-41. Gore, Marvin, and John Stubbe. Elements of Systems Analysis. 3rd ed. Dubuque, Iowa: Wm. C. Brown, 1983, pp. 240-67. Neuschel, Richard F. "Presenting and Selling Systems Recommendations." Journal of Systems Management, March 1982, pp. 5-13. Powers, Michael; Davis Adams; and Harlan D. Mills. Computer Information System Development: Analysis & Design. Cincinnati. South-Western Publisbing, 1984, C.



pp. 120-47.



"A Practiciil Approach to a Project Expectation Document." Computerworld (In-Depth), August 29, 1983, p. 1.



Zells, Lois A.



Chapter



8



Cost/Benefit Analysis



Introduction



Data Analysis Cost/Benefit Analysis



COST AND BENEFIT CATEGORIES



PROCEDURE FOR COST/BENEFIT DETERMINATION Costs and Benefits Identilicotion Classifications of Costs and Benefits Tangible or Intangible Costs and Benefits Direct or Indirect Costs and Benefits Fixed or Variable Costs and Benefits Savings versus Cost Advantages Select Evaluation Method Net Benefit Analysis Present Value Analysis



Net Present Value



Payback Analysis 232



^ ^



At a Glance Data gathering, traditional or structured, is only one part of systems analysis. The next steps are examining the data gathered, assessing the situation, looking at the alternatives, and recommending a solution. The costs and benefits of each alternative guide the selection of the best system for the job. Cost



and



benefits



may be tangible or intangible, direct or indirect, fixed or



variable. Cost estimates also take into consideration hardware, personnel,



and supply costs for final evaluation. Cost/benefit analysis, then, identiand benefits of a given system and categorizes them for analysis. Then a method of evaluation is selected and the results are interpreted for facility,



fies



the costs



The evaluation methods range from the simple net benefit analysis more complex methods such as present value and payback analyses. action.



By the end 1.



2.



to



chapter, you should know: What is involved in data analysis. Cost and benefit categories. of this



3.



How



4.



The various evaluation methods



to identify



and



classify costs



and



benefits.



for cost/benefit analysis.



Break-even analysis Cash- Flow Analysis Interpret Results of the Analysis



and



Final Action



The System Proposal



>-.*?



234



TWO / SYSTEMS ANALYSTS



PAKT



INTRODUCTION In Chapters 5



and



we



discussed various tools analysts use for gathering details about the system under study. Data gathering is only one part of systems analysis, however. The next steps are to examine the data, assess the situation, look at the alternatives, and recommend a candidate system. The costs and benefits of each alternative guide the selection of one alternative over the others. Since this aspect of analysis is so important, it vvdll take



up most



6,



of the chapter.



This chapter discusses approaches to developing design recommendaend user. Each approach has costs and benefits that are compared vvdth those of other approaches before a final recommendation is tions for the



made. The outcome is a system proposal (also called a project proposal) that summarizes the findings of the analysis and states the recommendations for design. By the end of this chatper, you should be able to evaluate how current operations are pert"ormed, the categories of costs and benefits, key methods for cost/benefit analysis, and how a system pix)posal is developed.



DATA ANALYSIS Data analysis



is



System investigation an assessment of current findings. Our interest is



a prerequisite to cost/benefit analysis.



and data gathering lead



how



to



performed,



how



they contribute to achieving the intended goals, and the cost of making improvements. Let us return to our safe deposit scenario (from Chapter 4) to in



determining



efficiently certain steps are



illustrate the point.



The safe deposit department was authorized



to



double



its



capacity from



meet increased demand. Consequently, the number of employees changed from three to five, with one employee



4,000 to 8,000 boxes in an effort to



assigned full-time to bUling. Analysis of the data collected made it obvdous that customers were frequently billed too late, too often, or not at all. Access to customer information or status of vacant boxes was a nightmare. Customer lines were long, and service was jeopardized.



The



representative facts for the safe deposit department are



The system



shown



in



summarizes the operating characteristics of the safe deposit system, such as the volume of work, nature of processes, physical facilities, and personnel. From the analysis, the system design requirements are identified. These features must be incorporated into a candidate system to produce the necessary improvements. The system Figure 8-1



.



requirements



profile



are:



customer



1.



Better



2.



Faster information retrieved.



3.



Quicker notice preparation.



4.



Better billing accuracy.



service.







8



FIGUBE 8-1



Representative Facts



/



COST/BENEFIT ANALTSIS



and Candidate System Design



235



Objectives



Objectives (System



Current System Facts



Analysis



What



done?



is



IprocessesJ



Design Requirements)



Open customer account



Better



Assign safe deptosit box



Faster information retrieval



Issue key



Quicker notice prejiaration



customer service



Receive annual rent



How



is



it



done?



(processing detail)



Some



Better billing accuracy



Heaviest activity



Lower processing and ofjerating cost Improved staff eflRciency More consistent billing procedures to



40 boxes ofjened or closed daily Master card file located too far from customer inquiiy station



on Fridays and before



holidays



Too many



eliminate errors



new



steps taken with



cus-



tomers Delay in billing







all



manual



Some 80 renewal piayment



notices pre-



pared daily



Cash received given end of each day



to



head



teller at



Poorly designed application forms



Accounting gets daily summaiy Procedure for customer access to boxes is neither documented nor consistent



Who



does



it?



(personnel)



One person handles One (jerson handles



billing (fiill-time)



Better trained personnel



security



Elxperience in



Three persons process customers into



and out of



computer use



for other



applications



safe deposit area



Except for two persons,



rest of staff is



jxxjrly trained



Communication among



stciff is



adequate



Where



is



it



done?



(physical location/



Location allows privacy and security Billing carried out close to



Allocate quiet sp>ace for



customer



counter



information access



facility)



Assessment of processing



Time



to prepare a



renewal notice



is



10



minutes



Time



to process a



customer



is 3-5



minutes 15 jjercent of billing



is



erroneous in



amount, box number, or amount of rent



28 percent of vacant boxes cannot be located on existing books



Frequent notices regarding "to be



renewed" boxes cost $8,000



for



mailing



Employee pwyroU



is



as



hi^



oflBcers in operations area



computer



Provide security measure for



as junior



236



PART



TWO SYSTEMS ANALYSTS



5.



Lower processing and operating



6.



Improved



7.



Consistent billing procedure to eliminate errors.



/



stajff



costs.



efficiency.



To achieve these design objectives, several alternatives must be evaluated; there is seldom just one alternative. The analyst then selects those that are feasible economically, technically, and operationally. The approach may emphasize the introduction of a computerized billing system, replacement of staff, improved billing practices, changes in operating procedures, or a combination of several options. As you can imagine, each approach has its benefits and drawbacks. For example, one alternative is to introduce a computer-based safe desposit tracking and billing system designed to improve billing accuracy and notice preparation and lower processing and operating costs. It would also promote staff efficiency by allowing the existing staff to concentrate on customer service and provide online information on box availability and the like. The drawbacks include laying off the billing clerk who i^cently got married and strong resistance by the majority of the staff to a computerized environment.



Another alternative might be simply to devise a semiautomatic (ferriswheel type) system that organizes master cards and customer records and improves their access. A word processing system might be introduced to speed the preparation of billing notices. The edit feature of word processors would improve the accuracy in billing preparation. If these were the only two alternatives available, which alternative must be selected? An analysis of the costs and benefits of each alternative guides the selection process. Therefore, the analyst needs to be familiar udth the cost and benefit categories and the evaluation methods before a final selection can be made. Details on these topics are given in the next section.



COST/BENEFIT ANALYSIS Cost



and



Benefit Categories



In developing cost estimates for a system,



elements.



Among them



we need



are hardware, personnel,



to consider several cost facility,



operating,



and



supply costs.



purchase or lease of the computer and peripherals (for example, printer, disk drive, tape unit). Determining the actual cost of hardware is generally more difficult when the system is shared by various users than for a dedicated stand-alone system. In some cases, the best way to control for this cost is to treat it as an operating cost. 1.



Hardware costs



2.



Personnel costs include



relate to the actual



EDP



ance, vacation time, sick pay,



and benefits (health insurwell as pay for those involved in



staff salaries



etc.)'



as



developing the system. Costs incurred during the development of a system



8



are one-time costs



and



/



COST/BENEFTT ANALYSIS



Once the system is and maintaining the system become recur-



are labeled developmental costs.



installed, the costs of operating



ring costs. 3.



Facility costs are



expenses incurred



in the preparation of the ph\'sical



where the application or the computer will be in operation. This includes wiring, flooring, acoustics, lighting, and air conditioning. These costs are treated as one-time costs and are incorporated into the overall site



cost estimate of the candidate system.



Operating costs include all costs associated with the day-to-day operation of the system; the amount depends on the number of shifts, the nature of the applications, and the caliber of the operating staff. There are various ways of covering operating costs. One approach is to treat operating costs as overhead. Another approach is to charge each authorized user for the 4.



amount of processing they request irom the system. The amount charged is based on computer time, staff time, and \olume of the output produced. In any Ccise, some accounting is necessar)' to detemiine how operating costs should be handled. Supply costs are variable costs that increase with increased use of paper, ribbons, disks, cind the like. They should be estimated and included



5.



in the overall cost of the system.



A system



is



also expected to provide benefits.



The



first



task



is



to identifv



each benefit and then assign a monetary vcilue to it for costbenefit analysis. Benefits may be tangible and intangible, direct or indirect, as we shall see later.



The two major benefits are improving performance and minimizing the The performance categon' emphasizes improvement in the accuracy of or access to information and easier access to the system bv cost of processing.







authorized users. Minimizing costs through an efficient system error control or reduction of staff is a benefit that should be measured and in-







cluded in cost/benefit analvsis.



Procedure



for Cost/Benefit



Determination



between expenditure and investment. We spend to get what we need, but we invest to realize a return on the investment. Building a computer-based system is an investment. Costs are incurred throughout its life cycle. Benefits are realized in the form of reduced operating costs, improved corporate image, staff efficiency, or revenues. To what extent benefits outweigh costs is the function of costlienefit analysis. Cost benefit analysis is a procedure that gives a picture of the various costs, benefits, and rules associated with a system. The determination of costs and benefits entails the following steps: There



is



a difference



and



benefits pertaining to a given project.



1.



Identify the costs



2.



Categorize the various costs and benefits for analysis.



237



238



PART



TWO / SYSTEMS ANALYSTS



3.



Select a



4.



Interpret the results of the analysis.



5.



Take action.



X



Costs



method



and



of evaluation.



Benefits Identification



Certain costs



and



benefits are



moi^



than others. For



easily identifiable



example, direct costs, such as the price of a hard disk, are easily identified from company invoice payments or canceled checks. Direct benefits often relate one-to-one to direct costs, especially savings ft om reducing costs in the activity in question. Other direct costs and benefits, however, may not be well defined, since they represent estimated costs or benefits that have



some



uncertainty.



An example



of such costs



is



reserve for



bad



debt.



It is



a



discerned real cost, although its exact amount is not so immediate. A category of costs or benefits that is not easily discernible is opportunity costs and opportunity benefits. These are the costs or benefits forgone by selecting one alternative over another. They do not show in the organization's accounts and therefore ai'e not easy to identify.



M



Classifications of Costs



and



Benefits The next step in cost and benefit determination is to categorize costs and benefits. They may be tangible or intangible, direct or indirect, fixed or variable. Let us review each category.



^-



Tangible or Intangible Costs and



Benefits.



Tangibility refers to



the ease with which costs or benefits can be measured.



An



outlay of cash for



is referred to as a tangible cost. They are usually on the books. The purchase of hai'dware or software, personnel training, and employee salaries are examples of tangible costs. They are readily identified and measured. Costs that are known to exist but whose financial value cannot be accurately measured ai"e referred to as intangible costs. For example, em-



a specific item or activity



shown



as disbursements



ployee morale problems caused by a



image



is



an intangible



cost. In



some



new system



or lowered



cases, intangible costs



company



may be



identify but difficult to measure. For example, the cost of the



easy to



breakdown



of



an online system during banking hours wdll cause the bank to lose deposits and waste human resources. The problem is by how much? In other cases, intangible costs may be difficult even to identify, such as an improvement in customer satisfaction stemming ftx)m a i-eal-time order entry system. Benefits are also classified as tangible or intangible. Like costs, they are



often difficult to specify accurately. Tangible benefits, such as completing



jobs in fewer hours or producing reports with Intangible benefits, such as



more



no



errors, are quantffiable.



customers or an improved coipoBoth tangible and intangible costs and



satisfied



rate image, are not easily quantified.



should be considei-ed in the evaluation process. Management often tends to deal irrationally with intangibles by ignor-



benefits, however,



8



/



COST/BENEFIT ANALYSIS



Tangible and Intangible Costs and a Given Project



FIGURE 8-2



Benefits for



Tangible



Tangible



costs



benefits



Intangible costs



Tangible benefits



minus tangible costs



on intangible benefits



ing them. According to Oxenfeldt, placing a zero value is



wrong.^ Axelrod reinforces this point by suggesting that



and



benefits are ignored, the



different



from



when



outcome



of costs



It



they are included.- Figure 8-2



and



benefits.



considered cost



If



the project



is



quite



a h\pothetical repre-



is



and



intangible costs



and



exaluated on a purely tangible basis,



by a substantial margin:



effective.



On



the other hand,



are included, the total tangible



which makes the all



may be



indicates the degree of uncertaint\' surrounding the estimation



benefits exceed costs



ing



intangible costs



of the e\aluation



sentation of the probabUit}' distribution of tangible benefits.



if



and



if



therefore,



such a project



intangible costs



and



is



benefits



intangible costs exceed the benefits,



project an undesirable inxestment. Furthermore, includ-



costs increases the spread of the distribution



(compared with the



tangible-only distribution) with respect to the e\entual



outcome



of the



project.



Direct or Indirect Costs



and



Benefits.



From



a cost accounting



point of view, costs are handled differently depending on whether they are direct or indirect. Direct costs are those with directly associated in a project.



They



which



a dollar figure can be



are applied directly to the operation.



For example, the purchase of a box of diskettes for S35 is a direct cost because we can associate the diskettes with the dollars expended. Direct



'



A. R. Oxenfeldt, Cost-Benefit Analysis for Executive Decision



Management 2



C.



Making



AMACOM, American



Association, 19791, p. 51.



Warren Axelrod, Computer Productivity (New York: John WUey & Sons,



1982), pp. 61-89.



239



240



PAKT



TWO SYSTEMS ANALYSTS /



can be specifically attributable to a given project. For example, system that can handle 25 percent more transactions per day is a



benefits also



a



new



direct benefit.



Indirect costs are the results of operations that are not directly associ-



ated with a given system or activity. They are often referred to as overhead. system that reduces overhead realizes a savings. If it increases overhead,



A it



incurs an additional cost. Insurance, maintenance, protection of the computer center, heat, light, and air conditioning are all tangible costs, but it is



determine the proportion of each attributable to a specific activity such as a report. They are overhead and are allocated among users according to a formula. Indirect benefits are realized as a by-product of another activity or system. For example, our proposed safe deposit billing system that provides profiles showing vacant boxes by size, location, and price, will help management decide on how much advertising to do for box rental. Information about vacant boxes becomes an indirect benefit of the billing even though it difficult to



is difficult



to specify its value. Direct cind indirect costs



readily identified for tangible costs



Fixed or Variable Costs constant, regardless of are sunk costs.



They



and



and



benefits are



benefits, respectively.



and Benefits. Some costs and benefits are



how well a



are constant



system



is



used. Fi^ed costs (after the



fact)



and do not change. Once encountered,



not recur. Examples are straight-line depreciation of hardware, exempt employee salaries, and insurance. In contrast, variable costs are incurred on a regular (weekly, monthly) basis. They are usually proportional



they



vvdll



work volume and continue as long as the system is in operation. For example, the costs of computer forms vary in proportion to the amount of to



processing or the length of the reports required. Fi^ed benefits are also constant and do not change. An example is a decrease in the number of personnel by 20 percent resulting from the use of a new computer. The benefit of personnel savings may recur every month. Variable benefits, on the other hand, are realized on a regular basis. For example, consider a safe deposit tracking system that saves 20 minutes preparing customer notices compared with the manual system. The amount of time saved varies udth the number of notices produced.



is



Savings versus Cost Advantages. Savings are realized when there some kind of cost advantage. A cost advantage reduces or eliminates



expenditures. So we can say that a true savings reduces or eliminates various costs being incurred. Figure 8-3 is a summary of savings from the



use of a new online teller system. In this installation, $131,870 was saved through a reduction in personnel, handling charges, and proof machine rental. After deducting processing charges of $90,990, the net savings from the online system was $40,880. This is a savings that provides relief from current costs. It is realized specifically as a result of the additional processing costs incurred in the new system.



8



An Example



FIGURE 8-3



of



/



COST/BENEFIT ANALYSIS



Savings That Reduce Current Costs Summary



of Savings



from an Online Teller System



A.



Reduction



in



personnel and payroll: Average Annual Pay (includes 25 percent



N



benefits



Collections teller



1



$12,400



$ 12,400



Savings teller



5



11,610



58,050



Bookkeeper



3



9,940



29,820



Proof operator



1



10,900



Position



Subtotal



10



B.



Reduction



in



handling charges



C.



Reduction



in



proof machine rental:



Previous units



Present units



(4



@



@



13



S4,500) 51,380)



Total



I



10,900



$111,170 6,840



$18,000 4,140



Net savings from rentals



13,860



Total gross savings



$131,870



Less processing charges:



Online



demand



deposit processing



Proof of deposit reporting



Online savings processing Teller



machine



S33,660 27,000 5,100



25,230



rental



Total processing charges



90,990



Net savings/year



S 40,880



There are savings, however, that do not directly reduce existing To illustrate, examine the following case:



costs.



A systems analyst designed an online teller system that requires 14 new terminals. No reduction in personnel is immediately planned. Renovation of the bank lobby and the



teller



cages will be required. The primary benefits are:



2.



time to update accounts and post transactions. Faster access and retrieval of customer account balances.



3.



Availability of additional data for tellers



4.



Reduction of transaction processing errors. Higher employee morale. Capability to absorb 34 percent of additional transactions.



1.



5. 6.



Savings in



tellers'



when needed.



is a case wher« no dollars can be realized as a result of the costs incurred for the new installation. There might be potential savings if additional transactions help another department reduce its personnel. Similarly, management might set a value (in terms of savings) on the improved accuracy of teller activity, on quicker customer service, or on the psychological benefits from installing an online teller system. Given the profit motive,



This



241



apBm



242



PART



TWO SYSTEMS ANALYSTS /



would ultimately be tied to cost reductions. Managesay on how well the benefits can be cost-justified.



savings (or benefits)



ment has the ;



final



Select Evaluation Method When all financial data have been identified and broken down into cost



.



categories, the analyst



tion



methods are



method of evaluation. Several evaluaeach with pros and cons. The common methods



must



available,



select a



are: 1.



Net benefit analysis.



2.



Present value analysis.



3.



Net present value.



4.



Payback analysis.



5.



Break-even



6.



Cash-flow^ analysis.



Net benefit analysis simply involves subtracting toted costs from total benefits. ,It is easy to ceilculate, easy to interpret, and easy to present. The main di;awback is that it does not account for the time value of money and doe^ not discount future cash flow. Figure 8-4



Net Benefit Analysis.



J-'



J.^^k^



cinalysis.



use of net benefit analysis. Cash flow cmiounts are shown for three time periods: Period is the present period, foUowed by two succeeding periods. The negative numbers repi^sent cash outlays. A cursory look at



illustrates the



numbers shows that the net benefit is $550. The time value of money is extremely important in evaluation processes. Let us expleiin what it means. If you were faced with an opportunity that generates $3,000 a yccir, how much would you be wiUing to invest? Obviously, you'd like to invest less than the $3,000. To earn the same money five years fixjm now, the amount of investment would be even less. What is suggested here is that money has a time value. Today's doUar and tomorrow's doUar are not the same. The time lag accounts for the time value of money. The time value of money is usually expressed in the form of interest on the fijnds invested to realize the future value. Assuming compounded the



interest, the



formula



is:



F = FIGURE 8-4



Year



$-1,000



Benefits



Net benefits



+



i)"



Net Benefit Analysis—An Example



Cost/Benefit



Costs



P(l



$-1,000



Year



Year



1



2



Total



$-2,000



$-2,000



$-5,000



650



4,900



5,550



$-1,350



$-2,900



$



550



8



/



COST/BENEFn ANALYSIS



where



F P



Future value of an investment. Present value of the investment. Interest rate per compounding period.



i



Number



n



of vears.



For example, $3,000 invested in Treasury' notes for three years interest would have a value at maturity of:



F = = = Present Value Analysis,



A



difficult to



compare today's



+



$3,000(1



percent



0.10)3



3,000(1.33)



$3,993



in developing long-term projects,



costs with the



full



is



it



often



value of tomorrow's benefits.



As we have seen, the time value of mone\' allows



and other



at 10



for interest rates, inflation,



factors that alter the value of the in\'estment. Furthermore,



certain investments offer benefit periods that vars' with different projects.



Present value analysis controls for these problems by calculating the costs



and



benefits of the system in terms of today's value of the investment



and



then comparing across alternatives.



A



consider in computing present value is a discount rate equivalent to the forgone amount that the money could earn if it were invested in a different piDJect. It is similar to the opportunity cost of the funds being considered for the piDJect. Suppose that $3,000 is to be invested in a micrxjcomputer for our safe deposit tracking system, and the average annual benefit is $1,500 for the four-year life of the system. The investment has to be made today, whereas the benefits are in the future. We compare present values to future values by considering the time value of money to be invested. The amount that we are critical factor to



willing to invest today



is



of a given period (year).



determined by the value of the benefits



The amount



at



the



end



called the present value of the



is



benefit.



(F



To compute the present value, we take the formula for future value P/(l + /)") and solve for the present value (P) as follows:



=



+



(1



So the present value of $1,500 invested the fourth year is:



ir



at



10 perx:ent interest at the



end of



1,500



P = (1



+



1,500



0.101-*



=



$1,027.39



1.61



That



is, if



we



invest $1,027.39 today at 10 percent interest,



we can



expect to



243



244



PAKT



TWO / SYSTEMS ANALYSTS



Present Value Analysis Using 10 Percent



FIGURE 8-5



Rate (Discounted)



Interest



Cumulative Estiinated



Discount



Year



Future Value



Rate*



1



$1,500



2



1,500



3 4



1,500



X X X X



1,500 •



1/[(1



+



t



P =



F/[(l



0.908



Present Valuet



Present Value of Benefits



$1,363.63



$1,363.63



0.826



1^39.67



2,603.30



0.751



1,127.82



3,731.12



0.683



1,027.39



4,758.51



=



l)"]



+



i)" ]



have $1,500 in four years. This calculation can be represented for each year where a benefit is expected. For a four-yccir summary, see Figure 8-5. i.



Net Present Value. The net present viilue is equal to discounted minus discounted costs. Our $3,000 microcomputer investment



benefits



3delds a cumulative benefit of $4,758.51, or a net present gain of $1,758.51.



easy to calculate and accounts for the time value of money. The net present value is expressed as a percentage of the invest-



This value



ment







in



is



relatively



our example: 1,758.51



0.55 percent



3,000



Analysis. The payback method is a common measure of the relative time value of a project. It deteimines the time it takes for the accumulated benefits to equal the initial investment. Obviously, the shorter the payback period, the sooner a profit is i^cilized and the more attractive is the investment. The payback method is easy to calculate and allows two or more activities to be ranked. Like the net profit, though, it does not allow for the time value of money. The payback period may be computed by the following formula:



*/.



Payback



Overall cost outlay



iA



y
s i « g E c



0)



E



C



o a u
^ >> CO cQ



ID



CO



^



U



CO ""



«>



B



to



c i E



5



o u CO



2 n



Q_ 13



CO



a



Is S



o



o3



B



u o



+ £ + = 2



j:;



J3



o a,



D >



M



fe,



O



0)



CO



CO



CO



s U



P ^ U



01



CO



-S —c Zo



.§1



CO



2> 09 cd



eo^ o



il *^



^ c .2 «



a



0)



c 00 CO « 3 3 o l-g 2 » C > ^ o I3 £m £ •'C







O)



2



C



E 8



^



03



CO



u O



O



c o o



& -o S 01



«



a



01



Q)



£ o E in 2 3 c CO C8 1 o 0) C on E o



Q.



a a o



^^



3 >



s c



E o



'8



a



01 a;



E c



CS



13



o E



^



00



t3



CO a)



£ « ™ CO



£ o 3 m £



aI I



CS



u



-^



250



PAKT



TWO SYSTEMS ANALYSTS /



FIGURE 8-9



A



Feasibility



Report— An Outline



written feasibility report should include the following:



TITLE PAGE



I.



Defines the



TABLE OF CONTENTS



II.



name



List



of the project



and who



various parts, features,



it is



and



for



exhibits,



showing



page numbers III.



SCOPE



IV.



STATEMENT OF PROBLEM



Present a brief explanation of the system boundaries



Describe current system Describe proposed system Indicate



how proposed



system



will solve the



problem(s)



SUMMARY/ABSTRACT



V.



I



optional



I



Give executive a



summary



of project, high-



lighting benefits



COST/BENEFIT STATEMENT



VI.



List benefits



and



sa\'ings in quantitative



terms



Present dollar savings versus costs



Summarize cost



of



new equipment,



one-time



charges, etc.



Quantify net savings and expected returns



IMPLEMENTATION SCHEDULE Submit implementation plan Specify human resources requirements,



VII.



-



systems and procedures, etc. PERT-CPM or Gantt chart



*j



Include



HARDWARE CONFIGURATION



VIII.



(optional)



Lay out computet- configuration terminal network and



Describe



equipment ICRTs, printers, etc.) communication equipment



List



idata sets, lines, etc.)



CREDITS APPENDIX



IX.



X.



Give credit to those



who



contributed to the project study



Include exhibits, correspondence miscellaneous documentation



on



project,



and



other



explained in Chapter 7, the report is a detailed summary of the investigation that has been carried out. It outlines the options and recommendations. It is presented to management for determining whether a candidate system should be designed. Effective reports follow carefLilly planned formats that management can understand and exaluate without having to read the



document. The content and format of the marized in Figure 8-9.



entire



feasibility report are



sum-



Summary 1.



Data analysis is a prerequisite to cost/benefit analysis. Fi-om the analysis, system design i-equirements ai'e identified and alternative systems evaluated. The analysis of th^ costs and benefits of each alternative guides the selection process. Therefore, a knowledge of cost and benefit categories



and evaluation methods



is



important.



8



2.



In developing cost estimates, facility,



operating,



provide benefits.



monetary value 3.



/



COST/BENEFIT ANALYSIS



we need to consider hardware,



personnel,



and supply costs. In addition, a system is expected to We need to identify each benefit and assign it a



for cost/benefit analysis.



Cost/benefit analysis gives a picture of the vcirious costs, benefits, rules associated udth a.



each alternative system. The procedure



Identifying the costs



and



and



entails:



benefits pertaining to a project.



Categorizing the various costs and benefits for analysis. Selecting a



method



of evaluation.



Interpreting the results of the analysis.



Taking action. Costs and benefits are classified as tangible or intangible, direct or indirect, fixed or variable: Tangible costs: Outlays of cash for cin item or activity. a. b.



Intangible costs:



Those



that have financial values not easily



mea-



sured. c.



Direct costs:



Those where a dollar



figure C£in



be directly associated



with a project. d.



Indirect costs:



The



results of operations not directly associated with



a system or activity. e.



Fi^ed costs: They are constant and do not change



/ When



Variable costs: all



method



They are proportioned



financial data have



been



to



— nonrecurring.



work volume.



identified, the analyst



of evaluation. There are several



methods



must



select a



available:



from



a.



Net benefit analysis: Involves subtracting



b.



Present value analysis: Calculates the costs and benefits of the



benefits. It is easy to calculate, interpret, and present. The main drawback is not accounting for the time value of money and not discounting future cash flows. total costs



total



system in terms of today's value of the investment and then compares. c.



d.



Net present value: Discounted benefits minus discounted costs. It is relatively easy to calculate and accounts for the time value of money. Payback analysis: A common measure of the relative time value of a project. It determines the time it takes for the accumulated benefits to equal the initial investment.



e.



/



It is



easy to calculate and allows the



ranking of two or more activities. Break-even analysis: The point at which the cost of the candidate system and that of the current one are equal. Cash-flow analysis: Keeps track of accumulated costs on a regular basis.



Once the



and revenues



complete, actual results are compared against standards or alternative investments. The decision to adopt an alternative system can be highly subjective, depending on the evaluation of the project



is



251



252



PAST



TWO SYSTEMS ANALYSTS /



analyst's or user's confidence in the estimated cost



and



benefit values



and the magnitude of the investment.



Key Words Net Pay Value Opportunity Cost Payback Analysis Present Value Return Period



Break-even Analysis



Cash-Flow Analysis Cost/Benefit Analysis Direct Cost



Fixed Cost Future Value



Savings



Indirect Cost



Sunk Cost



Intangible Cost



Tangible Cost



Investment Period Net Benefit Analysis



Variable Cost



Review GLuestions 1.



What



cost elements are considered in cost/benefit analysis?



element do you think



is



the most difficult to estimate?



Which



Why?



2.



Define and explain the procedure for cost/benefit determination.



3.



How



easy



is it



to identify the costs



examples of costs that are not 4.



easily identifiable.



a.



Opportunity and sunk costs.



b.



and indirect costs. Fixed and tangible costs. Tangible and intangible benefits Direct



d. "If



tangible costs



and



"Savings are realized



outcome of the evaluawhich they are included." Do



benefits are ignored, the



tion may be quite different from one you agree? Illustrate your answer. 6.



benefits of a system? Give



Distinguish between the foUoudng:



c.



5.



and



when



in



a cost advantage of



some kind



exists."



Elaborate. 7.



How do



8.



What



are the pros



and cons



b.



Payback method. Cash-flow analysis.



c.



Break-even analysis.



a.



9.



net present value and present value analyses differ? Illustrate.



If



of the foUoudng evaluation



methods?



the evaluation methods used in cost/benefit analysis are seemingly



quantitative,



why



are the interpretive phase



and the subsequent



sion phase subjective? Explain. 10.



Briefly describe the essential



elements of a project study report.



deci-



)



8



/



COST/BENEFIT ANALYSIS



Application Problems



Suppose a firm went through a request for proposal, vendor proposals, benchmarking, and the final choice of a system that can be purchased or leased. Under the purchase option: a.



The



b.



The expected



price tag



is



$500,000.



useful



life



is



five years,



and the



salvage value



is



540,000. c.



The vendor allows a trade-in on the user's old hardware of $100,000. The book value is $70,000, and there is a remaining life of one year.



d.



Maintenance service



Under the



is



avcdlable at $8,000



per year.



lease option:



a.



Lease charges are $110,000 per year under a five-year contract.



b.



Lessor's (vendori



c.



There



is



maintenance



fees are $8,000 per year.



no trade-in allowance, although a third party



is



offering



$75,000 for the old equipment. d.



Cost of capital to the user 40 percent.



is



10 percent, and the effective tax rate



is



Assignment Determine the net present



mind



\'alue



applied to the purchase/lease options. Keep in



the following:



a.



The



b.



When



benefits derived from either option are



assumed



to



be equal.



using the net present value method, you are looking for the net



present value of either cash inflows or cash outflows. c.



Show



all



cash inflows and outflows net of their tax



d.



Proceeds from the from the sale.



e.



Tax benefits



/



of the old system are



reduced by the tax on the gain



that result from the deductibility of the service contract, the



lease pavments,



The



s£ile



effect.



effect is a



and depreciation



are taken into account in the analysis.



reduction in the cash outflows related to the expenditures.



Maintenance, lease pa\Tnents, and depreciation are annuities, fixed amounts payable over a period of time.



253



254



PAET



TWO / SYSTEMS ANALYSTS



A medium-sized bank has decided



to



automate



its



trust accounting



service. The \ice president of the trust department requested a cost/



The systems acti\ities. The



benefit analysis of a trust package for possible installation.



analyst



first



re\1e\ved the cost of operating present trust



and three



earned 564,000 in salaries. Inventory and supplies average S400 each year. Trust account statements, asset reviews, and other trust reports are produced on an outdated system at an annual cost of $400. Overhead (air conditioning, lighting, power, and maintenance! average $2,165 a year. The analyst then evaluated three software packages designed for trust work. One package met the user's requirements. The purchase price was $13,980. When implemented, the computerized service will reduce payroll by $10,000 the salarv' of a junior trust officer. Inventory and supplies were priced at $1,900. Overhead was calculated at $2,660 for air conditioning, lighting, power, and maintenance.



vice president



trust officers







When all



was gathered, a report was drafted for the vice president. With these facts and figures, he could see the cost of a computerized trxist package. The operation costs of both systems are summarized as follows: the information



Proposed System



Present



554,000



S&4.000



1,900



400



13,980



400



Air conditioning



900



780



Lighting



860



700



Salaries



Inventory and supplies



System charges CKerhead



System



Power



610



400



Maintenance-janitorial



290



285



S72,540



S66,965



Total



In the event the



house



proposed system is implemented, a brokerage department agreed to undeiAvrite 25



that deals with the trust



percent of the system charge, or $3,495 per year. So the actual operations costs to the trust department are $69,045.



Assignment a.



Did the analyst project the correct salary costs for both systems? Explain.



b.



Did the analyst provide the vice president with all the costs for the system? Did he collect all the aosts relating to the present system?



c.



Given the operations costs, can the vice president cost-justify the proposed system? Explain. ft



new



8



/



COST/BENEFIT ANALYSIS



MIS department was contacted one morning manager of the candy bar dixasion. The problem was by the production that the 3-ounce candy bar is sticking to the wrapper. A large percentage of the bars begin to stick to their wrappers after four or five weeks on the grocer's shelf. Consequently, customer complaints have forced a



The systems



analyst of the



supermarket chain to switch to a competitor's brand. After a two-week observation of the mixing and wrapping processes and inspection of the wrapper, it was found that the three-year-old mixing unit overheated after 6.5 hours of operation. This caused a sugar ingredient to react slowly to room temperature three to four weeks after production. The mixing machine has five more years of projected life. The alternatives are to modify the present machine at a cost of $79,000 and to replace it with a new (but more reliable) machine that has been successfully used by a competitor. The new machine costs $150,000 plus $14,000 installation charge. It has no salvage value at the end of the eight years.



The next step was



to



compute the operation



costs of both systems.



In a meeting with his supervisor, the analyst tried to show how the new system would increase sales of the 3-ounce candy bcir eind produce



production that would easily off^set the initial investment in the new machine. The supervisor did not seem impressed. After a lengthy discussion, the analyst was asked to redo the computations and the reliable



analysis.



PROPOSED SYSlTiM Operating costs Salaries (three



employees



$5.40/hour



or $648/week) Total salaries



Fringe benefits



$33,696



(@ 10%)



3,370



Total payroll/year



$37,066



Service fees



12,000



Overhead (additional expenses due to



new



system)



Mcdntenance (three hours/day Insurance Utilities



Total



Total operating costs/year



@



$8.00/hour)



$ 8,736



955 $ 1,140



$10,831



$59,897



255



256



PART



TWO / SYSTEMS ANALYSTS



PRESENT SYSTEM Operating costs Salaries (four



employees



@



$4.50/hour or $720 week) $37,440



Total salaries



Fringe benefits



(@ 10%)



3,744



$41,184



Total payroll/year



Overhead Maintenance



$ 5,824



675



Insurance



1,008



Utilities



7,507



Total



Total operating costs/year



$48,691



Assignment a.



b.



One problem that was pointed out was computing employee wages. What seems to be inaccurate about the salary section in both system? How would you correct the problem? With respect



to the types of costs incurred in operating either system, did



the analyst include



all



relevant costs?



Show where



additional costs should



be included. What other expenses should the report emphasize



(if



any)?



Selected References Axelrod, C. Warren. Computer Productivity.



pp. 61-89. Davis, Wm. Systems Analysis



New



York:



John Wiley



&



Sons, 1982,



and Design: A Structured Approach. Reading, Mass.: Addison-Wesley Publishing, 1983, pp. 313-24. Oxenfeldt, A. R. Cost-Benefit Analysis for E^cecutive Decision Making. AMACOM, American Management Association, New York 1979. Powers, Michael; Davis Adams; and Harlan D. Mills. Computer Information System Development: Analysis & Design. Cincinnati: South-Western Publishing, 1984, pp. 184-213.



Part Three



Systems Design



I.



'.'"•a



)-•:



-'



9 THE PROCESS AND STAGES OF SYSTEMS DESIGN 1



INPUT/OUTPUT



1 1



FILE



AND FORMS DESIGN



ORGANIZATION AND DATA BASE DESIGN



259



Chapter 9



The Process and Stages of Systems



Design



Introduction



The Process



of



Design



LOGICAL AND PHYSICAL DESIGN



Design Methodologies STRUCTURED DESIGN Functional Decomposition



FORM-DRIVEN METHODOLOGY— THE IPO CHARTS HIPO and IPO Charts



STRUCTURED WALKTHROUGH User Involvement



Major Development



Activities



PERSONNEL ALLOCATION 260



.



At a Glance System design



is



a



solution,



system. This important



a "how to" approach to the creation ol a new is composed ol several steps. It provides the



phase



understanding and procedural details necessary tor implementing the system recommended in the feasibility study. Emphasis is on translating the pertormance requirements into design specifications. Design goes through logical and physical stages of development. Logical design reviews the present physical system; prepares input and output specifications; makes edit, security, and control specifications; details the implementortion plan; and prepares a logical design walkthrough. The physical design maps out the details of the physical system, plans the system implementation, devises a test and implementation



any new hardware and software. Structured design methodologies are emphasized for design work. They include structure charts, HIPO and IPO charts, and structured walkthrough. Major development activifies, audit considerations, and processing controls plan,



and



specifies



are also discussed.



By the end of this chapter, you should know: The process of system design. 1



2.



How



3.



Top-down design and



4. 5.



6.



logical design difiers from physical design.



functional decomposition.



Forms-driven methodology. The major development activities in structured design. Audit considerations for system development.



Audit Considerations



PROCESSING CONTROLS AUDIT TRAIL



AND DATA VALIDATION



AND DOCUMENTATION CONTROL



262



PART THREE / SYSTEMS DESIGN



INTRODUCTION The discussion so



us to a pivotal point in the system development life cycle. User requirements have been identified. Information has been gathered to verify the problem and evaluate the existing system. A feasibility study has been conducted to review alternative solutions and provide cost/ benefit justification. The culmination of the study is a proposal summarizing the findings and recommending a candidate system for the user. If the figures and the reasoning behind the candidate system make sense, management authorizes the proposed change. At this point in the systems life cycle, the design phase begins. The design is a solution, a "how to" approach, compared to analysis, a "what is" orientation. It translates the system requirements into ways of operationalizing them. In this chapter, we cover the process and stages of systems design, the tools used to design candidate systems, and the user's input to systems design. It is an overview chapter that outlines what follows. The next five chapters elaborate on various aspects of design input/output and forms design (Chapter 10), file organization and data base design (Chapter 11), system testing and quality assurance (Chapter 12), and system implementation and software maintenance (Chapter 13). far brings







THE PROCESS OF DESIGN The design phase focuses on the detailed implementation of the system recommended in the feasibility study. Emphasis is on translating performance specifications into design specifications. The design phase is a transition from a user-oriented document (system proposal) to a document oriented to the programmers or data base personnel.



Logical



and Physical Design



Systems design goes through two phases of development: logical and physical design. As we saw in Chapter 6, a data flow diagram shows the logical flow of a system and defines the boundaries of the system. For a candidate system, it describes the inputs (source), outputs (destination), data bases all in a format that meets the (data stores), and procedures (data flows) user's requirements. When analysts prepare the logical system design, they specify the user needs at a level of detail that virtually determines the information flow into and out of the system and the required data re-







sources.



The design covers the



following:







1.



Reviews the current physical system umes, ft^quencies, etc.



2.



Prepares output specifications— that is, determines the format, content, and ft-equency of imports, including teiminal specifications and locations.



its



data flows,



file



content, vol-



9



3.



/



THE PROCESS



AND STAGES OF SYSTEMS DESIGN







Prepares input specifications format, content, and most of the input functions. This includes determining the flow of the document from the input data source to the actual input location.



4.



and control specifications. This includes specifying the rules for edit correction, backup pixacedures, and the controls that ensure processing and file integrity.



5.



Specifies the implementation plan.



6.



Prepares a logical design walkthrough of the information flow, output,



F*repares edit, security,



input, controls, 7.



and implementation



plan.



Rexiews benefits, costs, target dates, and system constraints.



As an illustration, when a safe deposit tracking system is designed, system specifications include weekly reports, a definition of boxes rented and boxes vacant, and a summary of the activities of the week boxes closed, boxes drUled, and so on. The logical design also specifies output, input, file, and screen layouts. In contrast, procedure specifications show







how



data are entered,



duced



how



files



are accessed,



and how reports



are pro-



(see Figure 9-1).



Foflowdng logical design is physical design. This produces the woricing system by defining the design specifications that tell programmers exactly what the candidate system must do. In turn, the programmer writes the necessary programs or modifies the software package that accepts input



FIGURE 9-1



Systems Design Goes through Logical



System specifications



)



»



(



and



Physical Design



Procedure specifications



PROGRAM SOFTWARE



FILES



Master



Data entry/Access communication



INQUIRY File/Update maintenance



Transaction



Backup/Recovery



Donnant



263



264



PART THREE / SYSTEMS DESIGN



from the user, performs the necessciry calculations through the existing file or data base, produces the report on a hard copy or displays it on a screen, and maintains an updated data base at all times. Specifically, physical system design consists of the following steps: 1.



Design the physical system. a.



Specify input/output media.



b.



Design the data base and specify backup procedures. Design physical information flow through the system and a physical design walkthrough.



c.



2.



Plan system implementation. a.



b. 3.



Prepare a conversion schedule and a target date. Determine training procedure, courses, and timetable.



Devise a test and implementation plan and specify any



new hardware/



software. 4.



Update



benefits, costs, conversion date,



financial,



hardware,



and system contraints



(legal,



etc.).



The physical design for our safe deposit illustration is a software package written in Pascal (a programming language). It consists of program steps that accept new box rental infonnation; change the number of boxes available udth every new box rental; print a report by box type, box size, and box location; and store the information in the data base for reference. The analyst instructs the software programmer to have the package display a menu that specifies for the user how to enter a new box rental, produce a report, or display various information on the screen. These and other procedure specifications are tested and implemented as a working model of the candidate system.



DESIGN METHODOLOGIES During the past decade, there has been a growing move to transform the "art" of systems analysis and design into an "engineering-type" discipline. The feeling that there has to be a more clearly defined logical method for developing a system that meets user requirements has led to new techniques and methodologies that fundamentally attempt to do the following:



and programmers.



1.



Improve



2.



Improve documentation and subsequent maintenance and enhance-



pix)ductivity of analysts



ments. 3.



Cut douTi drastically on cost overruns and delays.



4.



Improve communication among the user, grammer.



5.



Standardize the approach to analysis and design.



6.



Simplify design by segmentation.



analyst, designer,



and pro-



9 / THE PBOCESS



Data Flow Diagrram Update Procedxare



FIGURE 9-2



— Sale



AND STAGES OF SYSTEMS DESIGN



Deposit Cxistomer Master File



Box Status/Customer Update



New Box Record



Box



Status/



Customer Master Record



New Box Status/Customer Record



Structured Design



The approach begins with a system specification that identifies inputs and outputs and describes the functional aspects of the system. The system specifications, then are Structured design



used as a basis



is



a data-flow-based methodology.



for the graphic representation



— data flow diagram(DFD) — of



and 9-3). From the DFD, the next step is the definition of the modules and their relationships to one another in a form called a structure chart, using a data dictionary and other the data flows



and processes



(see Figures 9-2



structured tools.



Structured design partitions a program into small, independent



mod-



The are arranged in a hierarchy that approximates a model of the business area and is organized in a top-down manner with the details shown at the bottom. Thus, structured design is an attempt to minimize ules.



FIGURE 9-3



The Structured Design Method structured English decision tree, decision table,



^^^^^^^s System



DFD



specifications



^^W



Data



^B



^^



dictionary



^^B



J



'



Process informa



^^^^^^^§



^^^^^^



265



266



PAET THREE / SYSTEMS DESIGN



Decomposition



FIGURE 9-4



—A Framework Top



level



Second



A



level



Third level



3.3



complexity and make a problem manageable by subdividing it into smaller segments, which is called modularization or decomposition (see Figure 9-4). In this way, structuring minimizes intuitive reasoning and promotes maintainable, provable systems. A design is said to be top-down if it consists of a hierarchy of modules, with each module having a single entry and a single exit subroutine. The primaiy advantages of this design are as follows: 1.



Critical interfaces are tested first.



2.



Eariy versions of the design, though incomplete, are useful



enough



to



resemble the real system. 3.



Structuring the design, per



4.



The procedural



se,



provides control and improves morale.



characteristics define the order that determines pro-



cessing.



So structured design arises from the hierarchical view of the application rather than the procedural view. The top level shows the most important division of work; the lowest level at the bottom shows the details.



Functional Decomposition The documentation tool for structured design ture chart.



elements:



It



is



^



is



the hierarchy or struc-



a graphic tool for representing hierarchy,



and



it



has three



——



9



1.



The module



THE PROCESS



AND STAGES OF SYSTEMS DESIGN



represented by a rectangle with a a contiguous set of statements.



It is



HGURE



/



is



name



(see Figure 9-5).



9-5



A Module



2.



The connection is represented by a vector linking two modules. It usually means one module has called another module. In Figure 9-6, module A Ccdls module B: it also calls module C.



HGURE



9-6



Connection



An Example



A



^^ .^v



k



J



C



B



3.



The couple



represented b\' an arrow with a circular tail. It represents data items mo\ed from one module to another. In Figure 9-7, O, P, and Q are couples. Module A calls B, passing O downward. Likewise, module A calls C, passing P dov\Tiward and receiving Q back. More on coupling is described next.



HGURE



9-7



is



Coupling



An Example



267



oc lU



1



liJ^



u-O



RATETAB^



Verify employee nuiaber before reading the record



2.



>



Verify type of work 2.2.2



^ 3.



C>



(EU



Display special conditions before update



Load file and lookup pay rate 2.2.3



Check for overt iae, holi2.2.4 day pay, etc.



PJR(updated) 5.



Update



P.IR



with rate



Eitcfidcd



Exttnded Dcscripaon



Notti



Module



[



Segnent



Re
v



xi 1



:



d



X5'r I?



-



acceptable I



3



X X



^ ^



it -i--i-



it



X



1



1



1



I



!



E



ait



Irom a diagram («ny on* o* the low n



^ix.s.



:i::|:



1



i.^



accepiabiei



X



"^



I 1



I^



1



1



Alternate path



1



1



1



1



1



II



1



1



II



M



1



l



Key Chicago



160



S>



Fresno



170



[rJ::^



Houston



179



[rj::^



Memphis



190



[r^:^>



Miami



R =



Flight departure time index



Flight description index



Flight #



flight



flight



Pointer



Key



[R5:r>



8:15



gr^gr:-



[B3>



8:55



[b2:==^



10:10



r3:^=»



E3>



11:05



[r?::=-



[r2:>



11:53



[r5::>



[r3>»



flight flight



flight



rS>



Pointer



Relation (association)



Data Location Area Flight



Location



Flight*



Flight description



departure



R



1



179



Memphis



R



2



190



Miami



R 3



170



Houston



R 4



160



Fresno



R



5



147



Chicago



flight



11:53



R 6



169



Houston



flight



8:15



Looking



at inverted-list



flight



flight flight



flight



organization



8:15 8:55



10:10 11:05



diffei-ently,



suppose the passenger



requests infomiation on a Houston flight that departs at 8:15. The DBMS first searches the flight description index for the value of the "Houston flight." It finds R3 and R6. Next it searches the flight departure index for these values. It finds that the R3 value departs at 10:10, but the R6 value



11



/



HLE ORGANIZATION AND DATA BASE DESIGN



departs at 8:15. The record at location R6 in the data location area displayed for follow-up.



can be seen that inverted



It



lists



are best for applications that request



on multiple keys. They are ideal for static and deletions cause expensive pointer updating.



specific data



tions



is



files



because addi-



Direct-Access Organization file organization, records are placed randomly throughout Records need not be in sequence because they are updated directly and revso^itten back in the same location. New records are added at the end of the file or inserted in specific locations based on software commands. Records are accessed by addresses that specify their disk locations. An address is required for locating a record, for linking I'ecords, or for establishing relationships. Addresses are of two types: absolute and relative. An absolute address represents the physical location of the record. It is usually stated in the format of sector/track/record number. For example, 3/14/6 means go to sector 3, track 14 of that sector, and the sixth record of the track. One problem vvath absolute addresses is that they become invalid



In direct-access



the



file.



when



the



around



file



that contains the records



is



relocated on the disk.



One way



use pointers for the updated records. address gives a record location relative to the beginning of the file. There must be fixed-length records for reference. Another way of locating a record is by the number of bytes it is from the beginning of the file this is to



A relative



moved, pointers location of the record remains



(see Figure 11-8). Unlike relative addressing,



if



the



file is



need not be updated, because the relative same regardless of the file location. Each file organization method has advantages and limitations; a summary is given in Figure 11-9. Many applications by their nature are best done sequentially. Payroll is a good example. The system goes through the employee list, extracts the information, and prepares pay slips. There are no lengthy random-access seeks. In contrast, real-time applications where response requirements are measured in seconds are candidates for r£indom-access design. Systems for answering inquiries, booking airlines or the



stadium seats, updating checking or savings accounts in a bank, or interacting with a terminal are examples for random-access design.



DATA BASE DESIGN A decade



ago, data base



Today



is



was unique



to large corporations with



mainframes.



recognized as a standard of MIS and is available for virtually every size of computer. Before the data base concept became operational, users had programs that handled their own data independent of other it



was a conventional



environment with no data integration or sharing of common data across applications. In a data base environment, common data are available and used by several users. Instead of each program (or user) managing its own data, data across applications are



users.



It



file



331



332



PART THREE SYSTEMS DESIGN



FIGURE 11-8



Absolute



and



Relative



Addressing— An Example



My



M\ address



address



Relati\e



is



the 4th house



on left from comer of Oak St.



Record



M\



Relati\e



110 Ludlam Road



is



address is from comer



relati\e



50



\ artis



of



Oak



B\1e



St.



Relati\e



Absolute Address



shared



relati\ e



Address



authorized users with the data base software managing the data as an entit\ .A program now requests data through the data base management system DBMS which determines data sharing isee Figure 11-10'. b\'



.



Objectives of Data Base The general theme behind a data base is to handle information as an integrated whole. There is none of the artificialit\ that is normalh embedded in separate files or applications. .A data base is a collection of interrelated data stored with mininiuni



and



The general objective is ine.xpensixe. and fle.xible for the



etficienth



quick,



redundancy



man\' users quickly to make information access eas\-,



.



to sei^e



user. In data base design, several



specific objecthes are considered:



nGURE



11-9



File



Organization Methods— A



Summary



.Method



Achantages



Di.sachantages



Sequential



Simple to design



Records cannot be added to middle of file



Easy to program \ ariable



and blocked



length



records a\ailable Best use of storage sjjace Inde.xed-sequential



Records can be inserted or updated in middle of file Processing ma\ be carried



Unique



kex-s



required



Processing occasionalK" slow Periodic reorgcinization of



out sequentialJ\ or ran-



file



required



domh' Im^erted



list



Used



in applications request-



ing specific data



multiple



Random



on



ke_\-s



Records can be iAerted or updated in middle of file



Calculating address required



Better control ox'er record



\



location



al-



for processing



ariable-iength records nearh'



impossible to process



II



FIGURE 11-10



Conventional and



Personnel data



/



FILE



ORGANIZATION AND DATA BASE DESIGN



DBMS Environments



Independent



Shared data



data resources (direct access)



(controlled access)



resources



Profit



Profit



sharing application



• Skills data



sharing



Profit



• Profit sharing



application



sharing data



data • Benefits data



Employee



Employee



benefits application



benefits application



Benefits



data



^ DBMS



FILE ENVIRONMENT (No DBMS)



CONVENTIONAL



ENVIRONMENT



Redundant data occupies space and, therefore, is wasteful. If versions of the same data are in different phases of updating, the system often gives conflicting information. A unique aspect of data base design is storing data only once, which controls redundancy and 1.



Controlled redundancy.



improves system performance. Ease of learning and use. A major feature of a user-friendly data base package is how easy it is to learn and use. Related to this point is that a data base can be modified without interfering with established ways of using the 2.



data.



Data independence.



An important



data base objective is changing hardware and storage procedures or adding new data without having to rewrite application programs. The data base should be "tunable" to improve performance without rewriting programs. 3.



More information at low cost. Using, storing, and modifying data at low cost are important. Although hardware prices are falling, software and programming costs ai-e on the rise. This means that programming and software enhancements should be kept simple and easy to update.



4.



5.



Accuracy and



integrity.



The accuracy



and content remain constant. curacies where they occur.



quality



of a data base ensures that data



Integrity controls detect data inac-



333



334



PART THREE / SYSTEMS DESIGN



With multiuser access to a data base, the system must recover quickly after it is down with no loss of transactions. This objective also helps maintain data accuracy and integrity. 6.



Recovery from



failure.



7. Privacy and security. For data to remain private, security' measures must be taken to prevent unauthorized access. Data base security means that data are protected ftxjm various forms of destruction; users must be positively identified and their actions monitored.



Performance. This objective emphasizes response time to inquiries suitable to the use of the data. How satisfactory the response time is depends on the nature of the user-data base dialogue. For example, inquiries regarding airiine seat availability should be handled in a few seconds. On the other extreme, inquiries regarding the total sale of a pi-oduct over the past two weeks may be handled satisfactorily in 50 seconds. 8.



Key Terms be familiar with several terms. Suppose we have a sales status system designed to give the sales activities of each salesperson. Using the basic model in Figure 11-11, we run into four temis: In data base design,



FIGURE 11-11



we need



Conventional



File



to



Environment



Data model



Sales Status System Sales Report



Salesperson 1 Step (item) 1 Step (Item) 2 Total



40.(»



11450 $154 50



Systems



a; 0?



< U



'X'



i/i



uj;



r-



O o



6D



^



.^ 0



C



B E E



0







4)



(U



to



tn



03 ;/l



to



3



»3



tn



>, >i >, t« -t;



X




endent vendors have been successful in training operators and programmers to use the equipment. They generally rebuild used systems after they have been acquired fixim the second user. For stand-cilone s3/^tems, used computers are ideal for users with inhouse expertise who cire located in an area where technical support is adequate, or who are assured of vendor support. Although the biggest drawback to used computers is maintencince, this is readily available from the vendor or independent service firms. Used computers are acquired through dealers or end users. Most dealers cire knowledgeable about the system they sell. The best bargain, howSales in the



buying directly fixim the end user, provided there is a log that verifies the maintencince record of the system. Checking the maintenance log will reveal how reliable the system has been. The buyer must be sure that the seller has clear title to the system. A qualified consultant can help. In conclusion, there are savings fiDm acquiring used systems, and more and more or^cinizations are going that route. Furthermore, it is an excellent way to extend the useful life of the computer. ever, is



THE COMPUTER CONTRACT After a decision has



been made about the equipment or software, the



step in system acquisition



is



fined



to negotiate a contract. Unfortunately, the



typical user does not negotiate. Tlie



assumption



that a contract drafted by not subject to change. To the contrary, every contract is negotiable to some extent. Large users often spend weeks negotiating amenities and terms, using legal counsel or con-



a reputable firm



is



a standard instrument



and



is



is



sultants.



The primary



law^



governing contracts



is



the law of contracts, although



contracts can be influenced by other laws, such as the Uniform Commercial



Code



(UCC).



Under the



law^ of contracts, the



formation of a contract requires



mutual assent (meeting of the minds) and consideration. Performance of a contract is the fulfilling of the duties created by it.



The



Art of Negotiation



Many users enter into contract negotiations at the mercy of the vendor, with Timing is critical. Strategies must be planned and rehearsed. The leverage enjoyed by either party can change little



preparation. Negotiating



is



an



art.^°



during the course of the negotiations. Figure 14-5 iUustrates the negotiation procedure. Part A represents the jxjorly prepared user, outmaneuvered completely throughout the negotiations. Part B shows a relatively informed user, but one who has a sense of urgency. The user's negotiating leverage



*° Lynn Haber, "Negotiations Can SpeD Out Successful Systems," Computerworld, November 21, 1983, p. 22flF.



433



434



PART FOUR / SYSTEM IMPLEMENTATION



FIGURE 14-5



Negotiation Procedures



100% Lessor (vendor) A. Deficient



Lessee (user)



Bid



Award



Conclusion



Award



Conclusion



100%



B.



Fair



Lessor



100%



C.



Good Lessee



Award



drops



Conclusion



to nearly zero as he/she enters the contract-negotiating phase. At this



point, the



\endor recognizes the user's



willing to negotiate in earnest. In part C, the



ing procedui^s



Strategies



and



and



mind and becomes less user is following good negotiat-



state of



retains fair lexerage into the negotiations.



Tactics



Various strategies and tactics are used to control the negotiation process. A key strategv' is to control the environment. The user's 'home field



advantage" allows the user's representati\'e to concentrate on the negotiation process in a familiar setting. Other strategies are the following: 1.



Use the "good guy" and 'bad guy" approach. The consultant is often perceived as the bad guy, the user as the good guy. The consultant is the "shrewd" negotiator, whereas the user is the compromiser.



2.



Be prepared with



3.



Use



trade-offs.



tions.



alternatives at all times.



Rank



less



It is



a give-and-take approach.



important objectives high early in the negotia-



14 /



4.



Be prepared cussed in



to



HAKDWAfiE/SOFTWABE SELECTION



drop some



AND THE COMPUTER CONTRACT



issues. Certain issues



may be



better dis-



later sessions.



Contract Checklist Responsibilities



and Remedies



A computer contract should specify the remedies to the parties in the event of default or nonperformimce. Remedies should begin with a list of responsibilities that both parties have agreed to assume. Next to each vendor obligation are listed the remedies desired by the user in the event of nonperformance. With such provisions, the contract obligates a vendor to deliver onfy equipment that operates according to specifications. There are three major categories of remedies: special remedies, damages, and specific performance. Special remedies are the user's first line of defense. For example, if the vendor fails to meet the delivery date, the user has the right to Ccmcel the deal after a stated notice to the vendor. Or, if the system fails the acceptance test due to deficient capacity, the user may expect the vendor to provide additional power or memory at a specific cost (or



no



cost) within a stated time.



Tliese special remedies provide immediate relief to the user, without litigation.



When



the vendor hesitates to negotiate special remedies, the



user's representative(s)



may be



may demand strict damage remedies. Such damages



actual, consequential, or liquidated. Actual



damages compensate a



party for what it should have received in a contractual bargain. Consequential damages include all other foreseeable losses that result from the breach



amounts greater than actual damages, vendors make every eflFort to limit consequential damages in the contract. liquidated damages establish a fixed amount in advance payable in the event of default. If the vendor fails to meet the delivery date or the installation or acceptance deadline, liquidated damages ai^ a popular remedy. They actually provide the vendor with a negative financial incentive if they do not perform. of a contract. Because they cover



HoElCiwaie.



A good hardware



contract



is



goal-oriented.



It



stipulates



the results to be achieved with the system. Of greater importance is the definition of sj^tem performance in terms of expected functions. The fir^t step in contracting equipment is to identify each component and spell out



the performance criteria that the processor must meet under normal operating conditions. Where possible, it should be written in terms understandable to anyone v^^o reviews the contract at a later date.



Software. A software package is a Ucense to use a proprietary process. It is not truly "sold," since a title is not transferred, so it is more or less a "license for use." The user has the right to use the package but does not have title of ownership. There are several risks inherent in software packages:



435



436



PAST FOUB SYSTEM IMPLEMENTATION



Nonperformance or



1.



failure to



meet



specifications.



One remedy



is



to



provide for termination in the contract. Costs of modification or integration. with modifications for a fee.



2.



The remedy



is



to specily assistance



Bankruptcy of the vendor. The remedy is provision for the user to modtfv the package without penalties, charges, or obUgations.



Delivery and Acceptance. A major problem with contracting is failure of the vendor to deli\ er on schedule.^ ^ A contract should specif the remedies provided for failure to meet the agreed-upon delivery schedule. The section governing acceptance describes the tests that must be met for the equipment to be accepted by the user. A user should also insist on a period of use under normal operating conditions to ensure the system's performance to standards.



Warranties. .Aiticle 2 of the UCC provides three implied warranties by the vendor for goods sold and many lease transactions as well. Essentially, the vendor has title to the goods when sold, the goods are mechantable, and the goods are fit for the purposes they are intended. Because warranties are desirable for customers, vendors include provisions relating to them in agreements, thus suggesting that some warranty is made.



Finances. Contract negotiations involving finances can be summarized by "Let the buyer beware." One of the most difficult contract items to negotiate is the time when pavments begin. Most standard contracts speciK' that pavTnent



commences upon



installation. In rental



arrangements, the



contract should specifv whether rent



is based on a tlat monthly fee or on used per month or shift. In lease an-angements, however, the contract covers an option to buy, when it can be exercised, and if the optin is assignable. Also, it stipulates whether monthly lease pavTnents can be applied toward the purchase price. Since the contract is normally signed before delivery, the prices defined in the contract should be protected. If the vendor requires an escalation clause, the user should be able to cancel the contract in exchange for a penaltv pavment from the vendor as compensation for costs incurred for



the



number



of hours



preparation.



A clause called /brce majeure deals with the suspension of the contract an event beyond the vendor's control. This includes civil disorders, hurricanes, tornadoes, earthquakes, and acts of war. It is interesting to note that nuclear devastation is normally exempted from a force majeure clause. in



Guarantee



of Reliability.



This



is



a statement by the vendor specify-



ing the following: " David Myers, More Seen 14, 1983, p. 23!



gine



2



2.1



purchase engine



2.2 test



engine



Malceboat



3



3.1



assemble



moW



3.2 pour fiberglass



4



Test boat



Prepare owner's manual



5



5.1 write draft



5.2 copyedrt



5 J print



Legend



Engine tested



Design completed, engine ordered



Engine



Prototype



installed



completed



Steering installed



and designing the interior. They are estimated to take 10, 5, and 18 The total (33) is the estimated time for the "design boat" activity. In real-life applications, an allowance for contingencies is provided. This is called slack time. Each project allows beween 5 and 25 f>ercent slack hull,



days, resf>ectively.



time for completion.



Determine the total estimated time for each activity and obtain an agreement to proceed. Figure 15-3 shows the number of days budgeted for each activity and a 20 f>ercent activity contingency toward completion. 3.



4.



Plot activities



on a Gantt



drawn on the Gantt



chart,



and milestones are with emphasis on simplicity and accuracy (see chart. All activities, tasks,



Figure 15-2).



Review and record progress periodical^. "Hie actual amount of time sfjent on each activity is recorded and compiared with the budgeted times. As shown in Figure 15—4, the actual number of days spent on the three tasks in designing the boat is 40 as budgeted. This procedure is applied to the remaining activities of the prototyp>e stage. A summaiy of progress on the 5.



project



is



sent to



management



for follow-up.



451



452



PART FOUE SYSTEM IMPLEMENTATION '



FIGURE 15-3



Budgeted



Activities



—An Exconple Project name: -ci^^^



136



total



Time



Activity



Activity time estimate



/u



/^



J



(



Estimorte



Date



,'



.'7'-



7-5"



Project name: jl^^*^^^_ _ _ _ _ _ _ _ >



A



critical job.



A



critical job



cannot be delayed



without delaying the entire project. "^



>



A



non-critical job. There will be slack time associated with a non-critical job. This symbol is used for all jobs when you choose not to show the critical path.



Slack time for a non-critical job. A job can be delayed up to its total slack time without delaying



>



the project.



A A



>::::::::>



>::::= = = = n U



=



>



>::::::::X



job.



completed job. The uncompleted portion could be critical or non-critical.



> >



0::::::::>



>_ _ _ _ >



completed



V



X



partially



Jobs with no prerequisites. These jobs are scheduled to begin on a specific date, not after the completion of prerequisites. Jobs with no successors. No other jobs name these jobs as prerequisites. The last job in a project normally ends with an X. A project may have multiple finishes.



Source: VisiCorp., VisiSchedule, User Guide, pp. 2-30 and 2-31.



15



however.



It



tions are corrected



software.



The



and



latest



when an



or when. Noncritical tasks



permissible start times. These limita-



management



organization installs project



features listed earlier give



available for planning



PROJECT SCHEDULING AND SOFTWARE



who does what



says nothing about



are given only the earliest



/



an indication of



and controlling systems



flexibility that is



projects. For example, with



almost any package, it is possible to create a hierarchy by breaking the main network into subnetworks so that each activltv is broken into its own network of activities. Gi\'en this flexibilitv', a software package designed for 200 activities could handle as many as 600,000, though at the expense of many hours of nonstop computing.



PROJECT ORGANIZATION We



have explained the major tools used in project planning. After the tasks have been mapped out and the manpower requirements determined, the next step is to decide on the best way to organize manpower. We shall begin by identifying the staffing and appropriate skills for a pixDJect and then suggesting a



management



style



and approach



to



manage and



control the



staff.



The



Project



Team



The term team is used here to mean a group of people with similar skills and sharing a common activity. Some of the questions a project manager may ask are: What comprises the project team? Who should be on it? What skills must they have? For large projects, a project team is staffed by systems analysts, programmers, prime userls), hardware/software suppliers, and even subcontractors. The staff may be retained for the duration of the project.



The skills expected of a project team are the same computer system development projects:



skills



required in



Systems analysis. Detailed system design. Program design. System testing. Conversion.



Cost justification. Planning and estimating. Hardware/software experience. Leading teams.



A project team is



expected to tap the



more members can address



of its



members



so that one or



and suggest



keep the project moving the completion. These skiUs be secured through a plan that identifies team members and specifies



alternative solutions to



may



skills



the issues that face the project



461



462



PAET FOUR / SYSTEM IMPLEMENTATION



team



expected to serve through the maintenance of the new system. Except in unusual situations, team members should not be shared between projects and project managers because of the possibility of priority conflicts. their skills. For larger project, a project



is



Reporting Structure Most people associated with major projects are outside the direct control of the project leader. Ideally, each team member should report directly to the project leader. In practice, how^ever, most team members report to their respective supervisors. This



means



that the project leader has to use special



coordinate a host of persons over whom he/she has no real authority. For this reason, some authors refer to such a position as project manager rather than project leader} skills to



Management



Styles



In discussing project



work performed



management



we need



examine two types of mechanistic and creative tasks. Mecha-



style,



to



system projects: nistic tasks occur primarily during coding, testing, and maintenance, which take up to 80 percent of the system development effort. Managing these tasks is made possible by controlling against predefined standards and formats. Creative tasks, on the other hand, are exemplified by program or system design and devising a test strategy, which involve up to 20 percent of the system development effort but could affect more than 80 percent of the outcomes. Compared to mechanistic tasks, a relatively small staff is needed for creative tasks. They report directly to the manager. With these tasks in mind, a project manager may use democratic, autocratic, or some intermediate management style. The democratic approach aUows subordinates to think on their own and make suggestions on in



is appropriate when the project manager is not sure exactly be done. Yet it could be interpreted as indicative of a weak or inexperienced manager. Other problems with this approach are the likelihood of a slow reaction time and difficulty in expediting woric. In contrast to the democratic approach is the autocratic approach. The basic premise states that democracy is the wrong approach to unique projects. The aspects necessary to a system project should be entrusted to an experienced individual rather than a committee. This approach is more rewarding to individuals, although it is difficult to coordinate and control. The implication of these approaches for project management is that simple mechanistic tasks may be assigned to lower-level staff members with coordination and control by a responsible manager. At the higher staff level.



projects.



what



'



is



It



to



Jeffrey Keen,



1981), p. 217.



Managing System Development (Reading, Mass.: Addison-Wesley Publishing,



15



/



PBOJECT SCHEDULING



AND



SOFTWAfiE



however, innovative people report directly to the project manager, since their work could affect more than 80 percent of the outcome of the project. These suggestions assume a fairly large project where a hierarchy is important for management control. This scheme does not apply to small system projects. A typical small project could be run by the computer manager, a programmer/analyst, and an operator. This means less staff and fewer levels of management, requiring no formal procedures or project control. Unlike in larger projects, each staff member in a smaller project performs several functions. Consequently, small projects tend to be less thorough and more prone to error. Furthermore, there is pyschological pressure on the project manager to make sure the project udll be a success. The excuse of system failure through committee is absent in small projects.



The



Project



Manager



To plan, coordinate, and control the project team's manager is expected to have unique qualities: 1.



Flexibility



2.



Ability to



and



effort,



the project



adaptability to changing situations.



communicate cind persuade people affected by the project as those working on it about changes or enhancements to incorpo-



well as



rate into the plan. 3.



Commitment to planning the system development aspect of the project and ability to minimize the risks when assessing different approaches implementing a



to



project.



4.



Understanding technical problems and design



5.



Understanding the motivations and interests of members of the project staff and the ability to implement ways to improve job satisfaction.



Of



the contributions a project memager can make, maintaining a



all



satisfied staff is the



approach



details.



is



most important



for strong project teeims.



An



effective



match needs. Hundreds of



to look into the vocational needs of the staff and tiy to



what the job offers and how it meets their studies have been published on the subject. They all look at the variables that improve job satisfaction and motivate people to continue w^orking in the job. The variables that have been known to be important to the job



them



writh



satisfaction of



Looking projects



EDP



staff are listed in



at these variables,



means making the



it is



Figure 15-12.



clear that success in



best of project team



interested in their woric, assigning



them worthwhile



managing system



abilities,



getting



them



jobs, recognizing their



spontaneous way, and providing opportunities for them to use their abilities, advance, and develop their careers. These factors become goals that a project manager should try to achieve for each member of the project staff and for the group as a whole. Managing the people who build systems involves more than underefforts in a



463



464



PART FOUR / SYSTEM IMPLEMENTATION



FIGURE 15-12



Variables Considered Important in Job Satisfaction of the



EDP



Staff



Variable



Interpretation



could do something that makes use of



1.



Ability utilization



I



2.



Achievement



The



3.



Acti\atv



I



4.



Advancement



The



5.



Authority



I



6.



Company



policy



job could give



could be busy



all



me



my



abilities



a feeling of accomplishment



the time



would pro\ide an opportunity for advancement people what to do The company would administer its policies fairly



and



job



could



tell



practices 7.



Compensation



8.



Co-workers



My My



9.



pay would compare well with that of other workers co-woricers would be easy to make friends with



could



trv out



some



of



my own



ideas



Creati\it\'



I



10.



Independence



I



11.



Moral values



I



could work alone on the job could do work without feeling that



12.



Recognition



I



could get recognition for the work



13.



Responsibility



14.



Securirv



could make decisions on my outi The job would pro\ide for steady employment



15.



Social service



I



16.



Social status



I



17.



Supervision-human



My



boss would back up his people (with top management)



My



boss would train his people well



it I



is



morally wrong



do



I



could do things for other people could be "somebody" in the community



relations 18.



Supervision-technical



19.



Variety



I



20.



Working conditions



The



could do something different every day job would have good working conditions



Source: Rene \'. Davvis, L. H. Lofquist, and D. J. Weiss. A Theory of Work Adjustment Minnesota Studies in Vocational Rehabilitation, 1968.



la revision),



Standing the methodology or estimating aJgoiithms. It is understanding the people themselves. Their behavior can be moi^ important to a prtjject's success than the correct development methodology. The project manager must be the kingpin in personnel motivation. He/she must build teams of mature people who are motivated and can be trusted to see a project through to completion. This is the essence of project management.



Summary 1.



System projects



fail



for



many



reasons: conflicting objectives, user's lack



management, budget overruns, and changes in user requirements. These problems make it important that projects are properly planned, managed, and implemented.



of involvement, inexperienced project



2.



Pi-oject



management



is



the application of planning, organizing,



Managing projects user participation, and a



control concepts to critical one-of-a kind projects.



requires top



management commitment,



active



long-range plan. 3.



and



In establishing a project, sevefttl steps are considered:



15



/



PROJECT SCHEDULING



AND SOFTWARE



Study the problem to evaluate the scope, degree of change, and cost of late completion.



Specify project responsibilities through a qualified project team.



d.



manager with experience in the functional areas, ability to recognize problems and communicate ideas, and working knowledge of the system improvement process. Establish ground rules and standards for handling projects.



e.



Select the right project, especially



f-



Define the tasks to be done and plan accordingly.



Select a project



C.



4.



A



project



manager plans the



life



if it is



the



first



project for the firm.



cycle of the project



and eliminates



through proper planning. Planning mccms plotting activities against a time ft ame and developing a network based on an analysis of the tasks that must be performed to complete the project. crisis



5.



TWo a.



b.



planning tools are used in project planning: Gantt chart uses horizontal bars to show the duration of actions or tasks. Broken bars are estimated time delays or slack time. A task is a specific job to be performed; a group of tasks make up an activity



that ends in a milestone. Program evaluation and review technique (PERT) uses tasks and events to represent interrelationships of project activities. Each task is limited by an identifiable event that has no duration. The list of tasks and events is networked in a PERT chart. The numbers of the activity lines are the days required between events. When the network is completed, the next step is to determine the critical path—



the longest path through the network.



It



determines the project



completion date. 6.



Project



management software



is



available for virtually every size of



produces a network's critical software packages load on the personal computer; some also have on-screen graphic capabilities. project.



7.



The



It



skills



required of a project team are the



same as those for computer



system development projects. This means that there should be at least one team member qualified to address each issue related to the project. 8.



Two



types of work are performed in systems projects: mechanistic and creative. Mechanistic tasks take up to 80 percent of the system develop-



ment



effort,



development comes. 9.



whereas effort



creative tasks take



up



to 20 percent of



system



but could affect more than 80 percent of the out-



The democratic approach to project management allows subordinates to think on their own and make suggestions, although the drawbacks are slow reaction time and difficulty in expediting work. In contrast, autocratic management is more rewarding to individuals than committees, cilthough it is difficult to coordinate and control.



10 Success in project



management



requires flexibility to changing situa-



465



466



PA2T FODB / SYSTEM IMPLEMENTATION



communicate, and a commitment to planning and understanding technical problems and the moti\'ations of staff members. Of all the contributions a project manager can make, maintaining a satisfied staff is the most important for strong project teams. The project manager must be the kingpin of personnel motivation. This is the essence of project management. tions, the ability to



Key Words Program Exaluation and Review Technique



Activity Critical



Path



I



PERT



I



Menu



Manager Slack Time



Milestone



Task



Precedence Relationship



VisiSchedule



Gantt Chart



Pixjject



Review GLuestions 1.



2.



your own words, why do systems fail? How would one reduce potential failure Ln system development? Explain. In



From vv^hat we have learned about system development and



the analyst-



user interface, how important is the user's involvement for successful system implementation? W hat other factors are important? Be specific. 3.



4.



Define the following terms:



management.



a.



Project



b.



Task.



c.



Milestone.



d.



Critical path.



Distinguish between the following: a.



b. c.



d



Event and milestone. Gantt and PERT.



Task and activity. Precedence and successor relationships.



5.



Discuss the steps for establishing a system project. Which step do you think is the most critical? Why?



6.



What



skills



7.



What



is



fixim a



and



qualifications are required of a project leader? Explain.



a Gantt chart?



PERT



how



How would you



develop one?



How does



it



difiier



chart? Explain.



a task leads to an activity



8.



Explziin



9.



Illustrate the steps taken in



and an



activity to a milestone.



planning a project. What charts or forms are used? What information do they contain?



10.



Think of a problem area where a Gantt chart may be used. and the procedure used in developing the chart.



11.



What information does a PERT chart show? Explain calculating events.



List



the two



the steps



methods



of



15



12.



PROJECT SCHEDULING



Review the computer journals cind report project



how 13.



/



management. Explain



they



briefly



store,



two applications for what each application does and to class



differ.



What is the main function of a members provide? Explain.



14. If you



AND SOFTWARE



project team?



What



skills



should team



were a project manager developing a mailing list for a large retail what management style would you adopt? Why? Justify your



preference. 15.



"A project manager must be the kingpin of personnel motivation." you agree? Discuss in detail.



Do



Application Problems



Bank of Kendall contracted a computer service to instaU an automated teller machine (ATM) in a new shopping plaza five miles away. The computer service that processes checking and savings



The



First National



transactions presented the vice president of operations with a critical



date calendar as



shown



in Exhibit 15-1.



Assignment Prepare a Gantt chart based on the infoimation provided.



A systems project includes designing a stock status routine, followed by writing two programs (A



and



B).



A reorder routine



is eilso



and Each



designed,



two programs (Rl and R2) are to be written at the same time. program is tested after being written. Program Rl is tested only cifter the stock file is generated, which, in turn, must foUow the stock status design. The system as a whole is tested after all programs have been tested.



Assignment a.



Draw a PERT chart and schedule



the required activities around the follow-



ing conditions:



and one week to test. Stock status design takes three weeks and reorder design takes two weeks. The stock file takes four weeks to generate. There are two full-time programmers who test their own programs and are Each program



takes



two weeks



not involved in stock



file



to write



or stock status design.



467



ATM



EXHIBIT 15-1



Critical



Date Calendar



Week



Bank



3/8



3/15



3/22



3/29



1



2



3



4



Live date set



Ad



slicks



(Ccird



obtained



Bank personnel assigned



and forms



OLDS



rep as-



signed



Contract received



Building contractor



and Diebold meet on building



printouts received;



maintenance work begun Work started on validation and disclosure forms



production)



Servicer



name and



name/address



Short



Survey completed



specs



/Maim system planned



Deliver



manuals



Equipment, formproofs, sample plastic ordered



Phone Co. Diebold



Building specs.



Other Burroughs







General Data



Comm. Ad agency



EXHIBIT 15--1



(Concluded) Week



Bank



5/17



5/24



5/31



6/7



11



12



13



14



Credit criteria



due



Second card due



edit



Pin



Building com-



and pan con-



tacts assigned



BCF form due



pleted



Autodialer questionnaire



Review



fined



card



is-



sue



Data entry training



Servicer



Second card due



edit



Card tape to vendor Data entry training Order demo, and



First 10



cards pro-



duced and tested



special cards



Phone Co. Diebold



Other Burroughs General Data



Comm. Ad agency



Cards tested







4/19



4/12



4/5



4/26



8



(i



Marketing campciign meeting



Plan ad cam-



paign



GIF training



begun Artwork



pi-oofs



GIF clean-up (emphasis



on DDA)



10



Gontinue GIF DDA cleanup



appixjved



Mariceting



campaign



meeting



5/10



5/3



Supplies or-



card edit



First



mainte-



nance begun



card edit



First



dered GIF conver-



produced instructions



given



sion/train-



ing Gircuit



due



GRTs installed



Data set due Mcirketing



campaign



Ad campaign



meeting



6 14



6/21



6/28



7/5



7/12



7/24



15



16



17



18



19



20



Interchange



Supplies due



Ad campaign begins



Cards due



Cards mailed



demo and



ATM



G/L accts.



employees Uniforms and



opened Employee



live to



activity



kickoff



Pins dis-



*



tributed to



*



customers GIF clean-up completed



* * *



*



*



*



* * * *



*



Demonstrators response team balancing



* *



*



*



*



* *



training



ATM



*



*



circuit



due



*



*



*



Atm



installed * * * * * *



ATM



date



set



due



*



*



*



* * * *



470



PART FODK / SYSTEM IMPLEMENTATION



The



total



system takes



1.5



weeks



to test,



which



involves the



two program-



mers.



Remember



that there are



testing activities, stock



What is



file



two design creation,



the critical path duration?



time allotted by the



criticfd



activities,



and a



total



Can the



four program writing



system



and



test.



project be completed within the



path? Elxplain.



Selected References Diamond, Daniel 1983, p.



S. "Project



Management



Via PC." Business Computing,



December



30fF.



Hairell, Clayton Jr.



Computer



"Sure-Handed Project Management, Part



Decisions,



November



I.



Harrison, William D. "For Stronger Project Team: Working the puterworld,



May



Reducing the



Risks."



1983, p. 2608".



Human



Side."



Com-



21, 1984, pp. ID15-16ff.



Justice, Karen. "Systems to



Keep You on Schedule." ICP Interface Administrative and



Accounting, Winter 1983, pp. 25-27ff. Newldrk, Claire. "Project Estimating What's So Tough about







It? ICP Software Business Review, December/January 1984, p. 26ff. Potts, Paul. "Project Management: Getting Started." Journal of Systems Management, February 1983, pp. 18-19.



"Project Manager: Technician or Administrator." Journal of Systems Management, January 1982, pp. 36-37. Kerzner, Harold. "Project Management in the Year 2000." Journal of Systems Management, October 1981, pp. 26-31. Rolefson, Jerome F. "Project Management Six Critical Steps." Journal of Systems .







Management, Strehlo, Kevin.



April 1978, pp. 10-17.



"When



the Objective



Is Efficient



Project



Management." Personal



Computing, January 1984, p. 132flf. Yasin, Rutrell. "Project Mfmager's Role Is Changing." MIS News, February 34-35.



1,



1984, pp.



.V-. .«',



Chapter



16



Security,



Disaster/Recovery, and Ethics in



System Development



Introduction



System Security DEFINITIONS



THREATS TO SYSTEM SECURITY The Personal Computer and System Risk Analysis



CONTROL MEASURES Identitication Access Controls Encryption Audit Controls System Integrity Recovery/Restart Requirements



System Failures and Recovery



472



K



Integrity



At a Glance Every candidate system must provide built-in features for security and integrity of data. Without safeguards against unauthorized access, fraud, embezzlement, fire, and natural disasters, a system could be so vulnerable as to threaten the survival of the organization. To do an adequate job on security, a systems analyst must analyze the risks, exposure, and costs and specify measures such as passwords and encryption to provide protection. In addition, backup copies of software and recovery restart procedures must be available when needed. A disaster/recovery plan that



has management support should also be prepared. Then no matter what



can recover. The strength behind system integrity and success is ethics and professional standards of behavior. When ethics are compromised, regardless of techthe disaster, the firm



nology, the very fabric of



a system



is



in question.



By the end of this chapter, you should know: a. The various threats to system security and b. c.



How



to



do



risk



analysis



The importance



their defenses.



and



of disaster



specify measures. recovery planning and



how such a plan



initiated. d.



The meaning and importance



of ethics in



Disaster/Recovery Planning



THE PLAN The Team Planning Tasks The Manual Ethics In System



ETHICS



Development



CODES AND STANDARDS OF BEHAVIOR



system development.



is



474



PABT FODB / SYSTEM IMPLEMENTATION



INTRODUCTION when



no longer a question; it is here. Its impact is everywhere, but not without a price. The end user is concerned about security along with increased dependence on the computer. In system development, the project manager and the analyst must consider measures for maintaining data integrity and controlling security at all times. "Hiis invoK'es built-in hardware features, programs, and procedures to pro-



Just



the



computer age



will arriv^e is



systems from unauthorized access. In this chapter, we address the issues of data and system security and suggest some control measures. We also look at ways of planning for and recovering fix»m disasters so that the organization can continue to operate. Underlying the entire system development process is the issue of ethics and ethical standards that govern the beha\ior of analysts, designers, and project managers. Ethics is becoming an important topic in systems analysis and should be addressed at this point. tect candidate



SYSTEM SECURIT7 Newspapers, journals, and television are rife with stories about computer criminals embezzling millions of dollars, "hackers," and kids electronically breaking into computers across the nation. Here are tw^o examples:



A Wells Fargo bank employee embazzled



1.



The employee was the branch and knew^ ex-



$21 million.



jjerforming the entire reconciliation function of actly the operating procedures of the system.*



group of teenager computer enthusiasts computer, a modem, and "home-grown" computer know^ledge. They had broken into more than 60 business and government computers, including those of the Defense Department, the Los Alamos National Laboratory, and the Sloan-Kettering Cancer Center in New York. In July 1983, the FBI caught a



2.



armed with



a personal



computer worid are numerous. As hardware, communication links, and



Points of vulnerability in today's



shown



in Figure 16-1,



they relate to



mcmy



system security, costing companies over $300 million a year. Stealing secrets ftxim computers is more profitable than robbing banks. The average computer theft is $430,000 compcired to $10,000 for a bank holdup or $19,000 for fraud and embezzlement.^ Episodes like the ones cited have made security one of the fastestgrowing areas of concern in the computer industry. An estimated $300 million and $425 million were spent on safeguards in 1982 and 1983, termincils. This explains the



resp>ectively.



'



A



DciUas-based



oil



brecik-ins in



firm invested $500,000 to overhaul



com-



Arnold M. Cohn, Total Information System Security," Journal of System Management,



April 1983, p. 17. 2



its



Ben Harrison, "Planning



for the Worst," Infosystem,



June 1982,



p. 54.







hi ^^1—^



Ol



^^^^fc^



vX 1



^Pl



"V\/^ •



jD



o ^ 0>



Q.



tO can



and



to



who



« >



Is a>



o>



=



«= " 5 »- « o S " -c I



5



n ss n (D « S «c— «> E a



^B^^



H a> S j£ o o > O o a >.-^ _) «x:x»^ as *-



ao



eg



3 C



6 M >•



I3



cn



U



E Q



•O



"5



O CO D



c Q £



JO ic E-



3



2



a



«



Q



o



u



c



a l-a



a E



O M



r




3 XJ .2 13



E



5



as



ID



£ ^ £



P o



o



a>



M M



c o *^



-P



_o



"



c o



.tS CO



V



D 0)



M D



> o



—eg



br /-



g-l 0)



a a en



o O



T3 -S eg



-



j2



c



P.^



^



3



£



I 3 O



3 OB



V



a a



c



a E o (J



O)



CO



«



E « o I E ^



CO



m 3



U u



0)



P CO



J3



Si



E o



"^



"n



.h -^ eg



O) t.



3



0) eg



p



2



^



£



^ °' report, 207-8, 506 Feasibility study, 41, 44-45, 200-210,



261-62 definition, 44, 210. 506



considerations. 201-2, 210 steps in, 202-8, 210



Feedback,



14,



Field, 323,



506



506



FUe activity,



323



data, 335 definition, 323, 506



organization, 323-31



methods, 323-32, 350 specifications, 263



form, 263 structure, 322-23 \olatilit>'. 323 File/update maintenance. 263 Fill-in-the blanks question. 144. 150, 506 Fixed benefits, 240 Fixed cost, 240, 506



519



INDEX



520



506



Flat forms, 300, 313,



Flow system models,



Indirect benefits, 240



16, 30,



506



Flowchart, 203, 506 FM; see Facilities management Force majeure, 436, 506



Form action, 296, 313 ballot box, 308-9



classification



continuous



296



of,



strip/fanfold, 301-2, 313



control, 312



conversion, 396 definition, 295-96, 313, 506 design, 295-312, 507



requirements of, 297 flat, 300, 313, 506 formatted, 290-91, 312 instructions, 309-10 layout considerations, 303-12 memory, 296, 313



NCR,



301, 313, 509



Indirect costs, 240, 507 Indirect observation, 136, 507



Information about the firm, 131 about user staff, 131 about work flow, 131 definition, 507 categories of, 21-23, 30-31, 128-31 gathering, 126-51 sources, 131-33, 150 tools, 133-48,



150



origination, 131-33



requirements analysis, 97 Infomiation management system, 176-78 Information system computer-based, 23-28 definition, 20, 30, 507 formal, 21



man-made, 20-21 i-equii-ements, 101-3



report, 296, 313



Initial investigation, 42,



spacing requir-ements, 307-8 types of, 300-302 unit-set/snapout, 300 Forms control, 312, 507 Forms-driven methodology, 270-74 Fortress approach, 490 Functional decomposition, 266-69, 507 Functional structure, 74-75, 507 Functionality, 425, 507



99-116, 507



user's request forni, 99-100



Input definition, 286



design, 286-93, 313



media and



devices, 287-93



Input/output analysis, 112, 508



control system, 335, 508 layout form, 263 specifications, 263



G-H Gantt chart,



16, 18,



Instance, 343



450-53, 465, 507



Hardware evaluation, 427-28



Integritv'



selection, 416



financial considerations in, 430-32



performance



Intangible benefits, 238



Intangible costs, 238, 508 Integration, 12



criteria,



430



suppliers, 416 Help screen, 395



data, 335, 476



system, 476, 479, 485-87, 496 Interaction, 9



Interdependence, 9-12, 508



Hierarchical structuring, 339-40, 350, 507



Hierarchy diagram, 270-74 HIPO, 270-74, 280,' 507 diagram, 271 t€!mplate, 273 worksheet, 271-72 Homeostasis, 507 Human resources information system, 11 I



507 Implementation definition, 388, 507 Identifier-, 343,



types of, 388 IMS; see Infomiation management system Index area, 325 Index paper, 311 Indexed sequential organization, 325-29, 350, 507



Interviewing the art



of,



139



definition, 150, 508



guides



to,



140-42



Interviews, 45, 111, 138



advantages



of,



139



and questionnaires, 138-43 types of, 143-46 structured, 143-46, 513



unstructured, 143, 515 Inverted list organization, 329-31, 508 Investment period, 245, 508 IOCS; see Input/output, contix)l system IPO i;hart, 115, 270-74, 280, 508



K-L



^,



Key, 508 coiTOitenated, 345, 503 primary, 345 Key-to-diskette, 287



INDEX



Kitchen sink strategy, 102, 508 339 Lease option, 431 Ledger paper, 311 Logic error, 36«, 508 Logical design, 262-64 Logical failui-e, 487 Logical record, 323-24, 508 Logical view, 337 Leaf,



M Mijgnetic ink character recognition, 286-87. 508



Net present value, 244, 251, 432, 509 Netwoi-k structuring, 340-41, 350, 509 Normalization, 344 steps in, 344-47, 351, 509 Notation diagram; see Hierarchy diagram NI*V'; see Net pi-esent value



O Obseivation contrived, 136, 503 direct, 136, 505



indirect, 136, 507



methods, 136-37, 150 natuial, 136, 509



reader, 289, 293 Maintainahilitv', 369



obtrusive, 136, 509



Maintenance, 401-6, 430



paiticipant, 136, 510



unohtmsive, 515



adapti\e', 331 c()ri-e!cti\e,



Obtixisive obseivation, 136, 509



402



definition, 403, 508



OCR; see Optical character recognition



management



On-site obseivations, 45, 111, 135-38, 509 methods, 150



pt!rtecti\'e,



audit, 403



402



primary activities, 403-4 pix)grammers, 76 system, 41, 57 Management infomiation, 21, 31 Management information svstem, 21-26 definition, 508 managei", 77 modeling foi', 97-98 oiganization, 73-78, 82 planning, 95-98 strategic [ilanning, 95-97



Management levels, 22-23 Managerial MIS planning, 97 Many-to-manv relationship, 338-39 Mai-k sensing, 288 Mean time hetvveen failure, 405, 437, 508 Memoiy fonn, 296, 313 Menu, 289, 312, 458, 508 MICR; see Magnetic ink character recognition



Milestone, 52, 450, 508 MIS; see Management infoinialion system



Model, 16, 508 dy7iamic system, 16, 18, 505 Modularity, 419, 508-9 Modularization: see Decomposition Module, 267 calling, 269 cohesion, 269 coupling, 269 MTBF; see Mean time between failure Multiple choice question, 144, 150, 509 Mutual backup approach, 490



N Natural observation, 136, 509 NCR fomi, 301, 312, 509



Needs



identification, 99-101 Net benefit analysis, 242-43, 251, 509



objective, 150



pii)blems, 137 C)n(!-to-many relationship, 338



One-to-one relationship, 338



Open-ended questions,



143-44, 509



advantages, 145 drawbacks, 145-46



Open Open



rectangle, 171 system, 18-19, 30, 509 Operating costs. 237 Operating system, 336, 509 Operational infomiation, 21, 31 Operations: see Computer, operations functions Optical bar code, 288 Optical (character recognition, 288 Organization, 8-9, 509 chain, 21, 129-30, 213, 509 direct-access, 331, 350, 505 indexed sequential, 325-29, 350, 507 sequential, 325-26, 350, 512



structure, 129, 212-13



Output,



19,



509



design, 293-95 Overall logical view; see



Schema



Overflow area, 325 Overhead, 240, 509 P Parallel processing, 389,



509



Paraprofessional definition, 509



task categories, 78, 80 Parent, 339



Participant obsenation, 136, 510



Password, 481, 495, 510 Payback analysis, 244-45, 251, 510 Perfective maintenance, 402 PERT; see Program evaluation and review technique



521



522



INDEX



PERT



chart, 16, 18, 30 Phase, 52, 510 Physical design, 263-64, 510 Physical record, 323-24, 510 Physical security, 477, 495 Physical system, 15, 510 Physical view, 337 Pilot testing, 510 Plaintext, 483, 510 Planning, 510 dimensions of, 94-95 Pointer, 275, 327-29, 510 Policy,



Project



management



(continued)



functions, 447



planning tools, 450-56 requirements for, 447-48 software, 456-61 styles, 462-63, 465 Project-oriented structure, 74, 510 Project proposed; see System proposal Prompt, 291-92, 312, 511



Prototype, 450-51 Prototyping, 54-56, 105-6, 108, 511



Punch



card, 287



Purchase option, 431-32



510



Pool-oriented structure, 74-75, 510 Portability, 369, 425, 510 Positive testing, 360



Post-implementation, 41 review, 398-401, 406, 423 activity network for, 399 definition, 399, 510 plan, 399-401 Precendence relationship, 454-55, 510 Present value analysis, 243-44, 251, 510 Primary key, 345 Prime area, 325 Privacy, 334 definition, 476, 510 system, 514 Private cold site, 490 Piivate warm backup site, 490 Problem definition, 108 Procedure specifications, 263 Process, 171-72, 181, 510-11 Processing controls, 278 specification, 263 Processor, 14



Program



objective, 374 Quality factors specifications, 369-70



Question closed, 144, 503



advantages, 146 varieties, 144-46, 150



open-ended, 143-44, 509 advantages, 145 drawbacks, 145-46 Questionnaire, 111, 142-43, 150 construction procedure, 147-48 structured, 143-46 unstructured, 143, 515



R Ranking scales questions,



144, 150, 511 Rating scales questions, 145, 150, 511 Reasonableness check, 278 Recency effect, 103, 511



Record



design, 275-76 logical view, 337 testing,



Quality assurance, 359, 369-71 definition, 511 levels of, 370-71, 374



definition, 511



367-68



logical, 323-24,



Program evaluation and



i"eview technique,



450, 453-56, 459, 461, 465, 511



Recovery/restart requirements, 486-87



Redundancy,



Programming



508



physical, 323-24, 510 333, 511



pool basis, 76



Relation, 341-42, 511



structure, 76, 82



Relational



team



DBMS



basis, 76



features, 342



structuring, 341-43, 350, 511



Project definition, 446



Relative address, 331



directive, 116, 511



Reliability, 111



108-9 manager, 448-49, 463-64 organization, 461-64 planning, 450 scheduling, 444-56 team, 40, 202-3, 461-62 reporting structure, 462 skills, 461-62



of data, 148



initiation,



Project



management,



51, 57, 65,



definition, 447,



464



ft-amework



448-49, 465



for,



S-li"



definition, 148, 150, 511 Reliability-validitv' issue,



148-50



Rental option, 430-31 Report form, 296, 313 Request for proposal, 421-22, 511 Requii'ements analysis, 421



78



Resource sharing, 419 Return period, 245, 512 RFP; see Request for proposal Risk analysis, 479-81, 495



INDEX



Rollback, 4S6, 496, 512



RoUforvvard, 4«6, 496, 512 Rule, 305-6, 512



Run order



schedule, 366



Schema, 337-38, 350-51, 512 Schematic model. 16. 30, 512 Scientific management, steps



in. 62-63 Scoring approach, 429. 438 SDLC: see System de\elopment life cycle Securit>', 334, 472, 495, 511 data, 476. 504 control categories, 495 physical, 477, 495 system, 474-89 definition. 476 threats to. 477-81 Sequence check. 278 Sequential organization, 325-26. 350. 512 Service bureau. 418 Servicer, 418 Simon. Herbert, 27 decision making process, 27-28 Slack time. 451. 460, 512 Snapout form, 300, 313, 512 Software aids. 371-72 applications, 418, 437 attributes. 419 cross-industr\' applications, 419 design specifications, 370 evaluation. 430



industry',



418-20



industn-specific, 419



maintenance. 401-5 modification, 405 packages, 423-24, 435 evaluation process, 427-30



programmer. 76 requirement specifications, 370 selection. 416, 423 criteria for. 424-27, 438 process, 421-23, 437 supplies, 416 system. 418. 437 system audit. 404-5 testing and implementation, 370 types of 418-20 Source document. 286-87, 298 Static system models, 16, 513 Steady state, 19, 513 Strategic information, 21, 30-31 Strategic MIS planning, 95-97. 513 Strategic system planning, 97 Stress testing, 361. 513 String testing, 367-68, 513 Structure chart, 115, 266, 268, 513 elements, 266-69. 280 Structured, definition, 279 Structured analysis



Structured analv'sis continued) attributes, 169-70 definition. 167 Structured design. 265-69, 279 Structured activities. 275-76 Structured English, 167, 181-83, 186-87. 265. 513 Structured interview, 143-46. 513 advantages, 146 drawiiacks, 146 Structured observation. 513 Structured questions, 143-46 Structured tools, 167, 170-86 Structured walkthrough. 263. 274-75. 513 Subschema. 337-38. 350, 513 Subsystem, 10. 513 Sunk costs, 240, 513 SvTitax en-or, 368, 513 Suprasystem: see Environment i



System abstract, 15, 502



acceptance



testing.



276



boundaries, 15 candidate, 502 characteristics 8-12 classifications, 15-28, 30



closed, 19, 30. 503 control. 14



measures, 481-89, 495 513 development, 431, 514 ethics in. 492-95 life cycle, 40-50. 514 documentation, 132, 367-68 elements, 12-15, 20 emplovee-based, 23 enhancement, 48 environment, 14-15 failures. tApes of 487 flowcharts. 203. 514 implementation, 387-88. 485 definition, 8, 30,



inputs. 13 integritv. 476. 479. 485-87, 496,



interface, 15



specifications, 276 maintenance, 41, 48. 57 model. dvTiamic. 16. 18. 505 open 18-19, 30, 509 characteristics of 19-20 operating. 336, 509



outputs. 13 planning. 94-98



top-down approach, 98 privacv. 476. 514



project phases, 51-52 recoverv' restart. reliability',



486-87



479



securitv', 334, 472,



474-89, 495



definition, 476, 514



threats



to,



477-81, 495



specifications, 167, 421. 514



514



523



524



INDEX



Testing (continued)



S\'stem icontinued) study, 40



alpha, 371, 502



support, 22 test preparation, 276



beta, 371. 502



testing, 276, 360,



positi\e. 360



514



System de\elopment



life



program. 364 cycle,



40-50



stress, 361,



513



with protor\ping. 56 with structured analysis. 167-68, 186-87 System proposal, 45, 99, 248, 250 System testing, 366-68, 374 acti\it>' network for, 362-66, 373 performance criteria for, 367. 374 steps in, 367-69 Systema, 7



transaction path, 364 trends in, 371-72 unit. 360, 515 user acceptance. 364 Top-dov%Ti. 266, 280, 514 pi-ogram testing. 366 Tuple, 342. 514



Systems



Turnaround



string, 367-68,



513



time, 367, 515



concept, 7-8



U



definition. 56. 261-62, 279, 513



department manager, 77-78



UCC; see Uniform commercial code



design. 41, 46



implementation, 41. 46-48 definition, 57 management. 78 methodologies, 264-65 models. 16-18 physical. 263-64 process and stages of, 260-80 Systems analysis, 41, 45-46 definition. 56. 502. 514 structure functional structure, 75-76 pool-oriented. 74-75 project-oriented, 74-75



Systems cinal\'st academic qualifications. definition. 62. 82. 514



66,



personal qualifications, 66 relative status, 78-79 role of, 67-72 skill categories, 64-65, 82 specifications, 263 user dififerences, 71-72 user interface, 70-72



82



Unitbrm commercial code, 433 Unit-set forms, 300, 515



Unit testing. 360, 515 Universal product code, 288 Unobtrusi\e intenieu, 143, 515 Unobtrusi\e observation, 136, 515



Unstructured questionnaire, 143, 515 UPC: see Universal product code User acceptance testing, 364, 367-69, 374, 515 friendliness, 277 tr-aining, 364, 392-95, 406 aids, 395-96, 406 elements of 393-94 User's information requirements determination of 101-3 strategies in, 104-6 Users request fomr, 99-100 User's view, 335



V-Z Validation, 371, 374, 422. 515 Validit>, 111-12, 138



definition, 149, ISO, 515



Variable benefits, 240 Variable cost, 240. 251, 515



Tangible benefits, 238 Tangible costs, 238, 514 Task, 51. 450-51, 453, 514 Taylor, Frederick, 62-63 Technical writer. 80, 83, 514 Testing acceptjince, 360



\endor selection, 422-23 approaches to, 428-29 \'isiSchedule, 457-61, 515



Walkthrough; see Structured walkthrough Wami backup ser\ice, 490 Warranties, 436 Zoned form, 304



This book has been set Linotron 202. in 10 and 9 point Zapf Book Light, leaded 2 points. Part numbers are 36 point Lubalin Graph Medium and part titles are 36 point Lubalin Graph Bold. Chapter numbers are 27 point Lubalin Graphic l\^dium and chapter titles are



27 point Lubalin Graph Bold. The size of the type page is 31 by 49 picas.



#



f



n



v^



>



/::,,N



iTSBSa*,^



9



:i.



:'fc



wi



a



•4 \



'.r-



-:'-''.'



m-15flT-DE



^



-^



-tl



JB-f



V-W



ISBN D-aSt3-Q2fl5M-T