Professional Documents
Culture Documents
While there are several different versions of the pyramid model, the most
common is probably a four level model based on the people who use the
systems. Basing the classification on the people who use the information
system means that many of the other characteristics such as the nature of
the task and informational requirements are taken into account more or less
automatically.
Four level pyramid model based on the different levels of hierarchy in the
organization
Using the four level pyramid models above, we can now compare how the
information systems in our model differ from each other.
a) Functions of a TPS
TPS are ultimately little more than simple data processing systems.
Functions of a TPS in terms of data processing requirements
Validation
Sorting Lists
Transactions Listing Detail reports
Events Merging Action reports
Updating Summary reports?
Calculation
o Payroll systems
o Order processing systems
o Reservation systems
o Stock control systems
o Systems for payments and funds transfers
a) Functions of a MIS
a) Functions of a DSS
DSS manipulate and build upon the information from a MIS and/or
TPS to generate insights and new information.
Functions of a DSS in terms of data processing requirements
Modelling
Internal Transactions Summary reports
Simulation
Internal Files Forecasts
Analysis
External Information? Graphs / Plots
Summarizing
What is an EIS?
a) Functions of an EIS
EIS organizes and presents data and information from both external
data sources and internal MIS or TPS in order to support and extend
the inherent capabilities of senior executives.
Functions of a EIS in terms of data processing requirements
I II III IV V VI
Nolan (1979) indicated that there are six stages in the information system
evolutionary process. It is an improvement over the four-stage model. The
stages are:
1. Initiation- in which the organization has an operational focus and tries to
get operational efficiency and thereby limited value from the information
systems.
2. Contagion-in which the organization moves towards online systems after
having tasted success in the initiation stage. More users are added.
3. Control-in which the management exercises control and makes a cost-
benefit type of assessment.
4. Integration-in which the organization moves away from an ad hoc isolated
solutions based on information system to a service based information
system. This is the stage when the organization transitions from a data
processing outlook about information systems to more holistic information-
based decision-making approach towards information systems. A more
comprehensive approach towards information systems results in changes in
the organization's behavior towards information systems and initiates a new
appreciation for data and information.
5. Data administration-in which the organization begins to appreciate the
value of information and makes efforts to centralize the data management to
take advantage of the benefits of information based decision-making.
6. Maturity-in which the organization creates synergies in its corporate
objectives and information systems planning so that the two can work in a
synchronized manner.
These are the stages as Nolan has described in this research. However, no
empirical proof exists of this stage growth model of information system
maturity.
B. Information System Strategic Grid:
Using the X axis, a manager can determine how a potential project will
impact the company’s operations and whether it will make it possible for
the company to capture new market share. With the Y axis, a manager can
work out how a project will make existing systems more efficient or more
productive.
The strategic grid shows how a company is using its IT investments and its
need for both new and reliable IT support. As a framework, the strategic
grid is meant as a tool businesses can use to assess their current and
continuing IT needs rather than to simply state the company’s IT use
status.
The need for IT support in business was first recognized in the 1970s, and
today, it is more critical to daily operations than ever before in nearly every
type of enterprise. Understanding this, business managers must be
involved in the strategic planning and management of information systems.
Using this example, the manager might anticipate that in five years’ time,
the company will increase its workforce by a third and thus will need
additional IT support. In his projection for the next five years, he would
plot the company higher on the Y axis, acknowledging that for the company
to continue its current operations smoothly at a larger scale, it will need to
invest in more of the same IT support it is already using.
Wards Model:
The goal of Earl’s Methodology is to be able to align the business goals to the
IT/IS needs or plans. This will be able to maximize the technologies’
functionalities, and be able to choose the right innovations to implement
and avoid unnecessary costs.
I was really amazed at the realization that previously, the role of IT is only a
support service is in the value chain. After applying Earl’s Multiple
Methodology, it is now very evident the IT has a very crucial role in the CSF
of the business.
For example in the company, the role of technology now is very essential in
expanding its marketing and sales strategy. The advertisement campaigns
and promotions are now in mobile and web applications because more and
more customers are using the social media and smart phones to
communicate and interact.
Benefits of SSM
While the importance of this methodology has been realized, it also has a
few limitations. The fourth stage in the system has no modelling tool, along
with a definite technique to compare solutions in the real world. It also
needs to factor in the effectiveness of system thinking. If participants have
little knowledge and experience with the so-called problem, it will be harder
to come up with a solution (Hanafizadeh, 326). When working with SSM, it
requires the user to adapt to a new approach that some may find difficult to
do. The user must also be careful not to narrow the scope of the
investigation too early, this could cause issues later on. It can also be
difficult to assemble the richest picture without giving it a particular
structure and solution on the problem situation. The user can face
difficulties interpreting the world in a loose way (Weeks). Another limitation
of this methodology is the revising process. For example, when changes are
implemented simultaneously, it may cause conflicting results. This may
result in adding other methodologies, such as Soft System Dynamics
Methodology (SSDM). Combining these methodologies together will create a
synergetic tool for solving soft problems (Hanafizadeh, 325).
The Planning phase is the most crucial step in creating a successful system,
during this phase you decide exactly what you want to do and the problems
you’re trying to solve, by:
After analyzing this data you will have three choices: develop a new system,
improve the current system or leave the system as it is.
2- System Analysis
3- System Design
A general system design can be done with a pen and a piece of paper to
determine how the system will look like and how it will function, and then a
detailed and expanded system design is produced, and it will meet all
functional and technical requirements, logically and physically.
In the Software Development Life Cycle, the actual code is written here, and
if the system contains hardware, then the implementation phase will contain
configuration and fine-tuning for the hardware to meet certain requirements
and functions.
In this phase, the system is ready to be deployed and installed in customer’s
premises, ready to become running, live and productive, training may be
required for end users to make sure they know how to use the system and
to get familiar with it, the implementation phase may take a long time and
that depends on the complexity of the system and the solution it presents.
6- System Maintenance
In this phase, periodic maintenance for the system will be carried out to
make sure that the system won’t become obsolete, this will include replacing
the old hardware and continuously evaluating system’s performance, it also
includes providing latest updates for certain components to make sure it
meets the right standards and the latest technologies to face current
security threats.
These are the main six phases of the System Development Life Cycle, and
it’s an iterative process for each project. It’s important to mention that
excellent communication level should be maintained with the customer, and
Prototypes are very important and helpful when it comes to meeting the
requirements. By building the system in short iterations; we can guarantee
meeting the customer’s requirements before we build the whole system.
Many models of system development life cycle came up from the idea of
saving effort, money and time, in addition to minimizing the risk of not
meeting the customer’s requirement at the end of project, some of theses
models are SDLC Iterative Model, and SDLC Agile Model.
Prototyping
STEPS IN PROTOTYPING
some types of information systems can be developed by end users with little
or no formal assistance from technical specialists. This phenomenon is
called end-user development. A series of software tools categorized as
fourth-generation languages makes this possible. Fourth-generation
languages are software tools that enable end users to create reports or
develop software applications with minimal or no technical assistance. Some
of these fourth-generation tools also enhance professional programmers’
productivity.
Chapter 6 points out that the software for most systems today is not
developed in-house but is purchased from external sources. Firms can rent
the software from an application service provider, they can purchase a
software package from a commercial vendor, or they can have a custom
application developed by an outside outsourcing firm.
During the past several decades, many systems have been built on an
application software package foundation. Many applications are common to
all business organizations—for example, payroll, accounts receivable,
general ledger, or inventory control. For such universal functions with
standard processes that do not change a great deal over time, a generalized
system will fulfill the requirements of many organizations.
OUTSOURCING
If a firm does not want to use its internal resources to build or operate
information systems, it can outsource the work to an external organization
that specializes in providing these services. Application service providers
(ASPs), which we describe, are one form of outsourcing. Subscribing
companies would use the software and computer hardware provided by the
ASP as the technical platform for their systems. In another form of
outsourcing, a company could hire an external vendor to design and create
the software for its system, but that company would operate the system on
its own computers. The outsourcing vendor might be domestic or in another
country, and we discuss the special issues raised by offshore outsourcing.
Outsourcing has become popular because some organizations
perceive it as providing more value than an in-house computer center or
information systems staff. The provider of outsourcing services benefits from
economies of scale and complementary core competencies that would be
difficult for a firm that does not specialize in information technology services
to replicate (Levina and Ross, 2003). The vendor’s specialized knowledge and
skills can be shared with many different customers, and the experience of
working with so many information systems projects further enhances the
vendor’s expertise. Outsourcing enables a company with fluctuating needs
for computer processing to pay for only what it uses rather than build its
own computer center, which would be underutilized when there is no peak
load. Some firms outsource because their internal information systems staff
cannot keep pace with technological change or innovative business practices
or because they want to free up scarce and costly talent for activities with
higher paybacks.
Not all organizations benefit from outsourcing, and the disadvantages
of outsourcing can create serious problems for organizations if they are not
well understood and managed (Lacity and Willocks, 1998; Earl, 1996). Many
firms underestimate costs for identifying and evaluating vendors of
information technology services, for transitioning to a new vendor, and for
monitoring vendors to make sure they are fulfilling their contractual
obligations. These hidden costs can easily undercut anticipated benefits
from outsourcing (Barthelemy, 2001). When a firm allocates the
responsibility for developing and operating its information systems to
another organization, it can lose control over its information systems
function. If the organization lacks the expertise to negotiate a sound
contract, the firm’s dependency on the vendor could result in high costs or
loss of control over technological direction (Lacity,Willcocks, and Feeny,
1996).