9 Developing an Information System

download 9 Developing an Information System

of 29

Transcript of 9 Developing an Information System

  • 8/11/2019 9 Developing an Information System

    1/29

    9Developing an

    information system

    Build a system that even a fool can use, and only a fool will want to use it.Shaw's Principle

    OverviewWe are now ready to put together everything we have learnt so far. Starting from a taskdescription we will develop a working information system following the DDE cycle.

    To do this we will look at:

    what can be achieved data flow diagrams the information system development process

    internet abuses.

    IS reviewSo far we have found that in general the following operations are associated with an

    information system:

    Design

    establish the facts and relationships

    determine constraints or restrictions decide table structure identify field properties.

    Manipulate data

    retrieval (queries, sorting, functions) insertion and deletion update or modify execute procedures.

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    2/29

    Leading Technology 304

    Presentation

    display (soft and hard copy) report (summary).

    Security

    ensure confidentiality of sensitive data restrict access to only relevant data ensure integrity from accidental or deliberate error.

    In the computer industry such an information system is usually developed by a team. This teammight consist of a project manager, a systems analyst or analysts, programmers, and so on.

    Through the project manager these will liaise with the owner of the system, the UoD expert,and the end users. The aim is to design a system that works for them. In addition thedevelopment process would also involve the training of users, the preparation of work

    procedures, maintenance of the system when in place, and reviews of its relative value.

    If we try to do all of this ourselves we will run into great difficulty because we are restricted inwhat we can do in a classroom. When it comes to modelling real-world situations we do nothave the time, expertise, or access to data that a real systems designer would have. We arelimited in the complexity of the systems we can develop and in the sophistication of what wecan achieve.

    With this in mind we will cover as much of the process as we can and, in doing so, get a feelfor how an information system is developed in the industry.

    Before we begin this process however we will first look at data flow diagrams as an alternativeway of describing the connections between the parts of an information system.

    Data flow diagramsA data flow diagram (DFD), as the name suggests, shows how data flows through an

    information system. It is different from a conceptual schema diagram in that it concentrates on

    how the data is processed (changed) rather than the objects and relations in the system. Bylooking at the flow of data we not only see the information system from a different perspective,

    it will also give us a good idea of the inputs and outputs, to and from the system.

    A DFD shows how data enters and leaves a system, how it moves from one process to another,

    and where it is stored. Over the page is a DFD for a student enrolling at a school:

    In a DFD sources or destinations of data, such as students or teachers, are represented as

    rectangles.

    In this example the student to be enrolled provides details such as name, age, gender, etc. This

    data must be checked to see if it is complete, if it contains any obvious errors, or if there are

    any problems. Arrows represent this flow of information, from and to the student, while a

    rounded rectangle shows the process involved (check details).

    Aprocessis where data is taken as input, something is done to it, and then an output is made.

    Each process must therefore have at least one input and one output arrow.

    Once checked the data can then be input into the student database. The student must also be

    added to a year group, and added to class lists. As part of this last process the student will get to

    choose which subjects he or she would like to do. Again arrows show flow of data, rounded Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    3/29

    Developing an information system 305

    rectangles show processes, while an open ended rectangle represents the data store (student

    database).

    School enrolment DFD

    Once all the data has been added to the student database it can then be used to generate

    information such as class lists and timetables. These are provided to students and teachers.

    If you wish to add more detail to a DFD the processes and data stores can have identifyinginformation added.

    The process can be numbered to indicate its place in a sequence, with sub-numbering (3.1, 3.2,

    etc.) if required. The person or device making the change to the data is recorded at the bottom.

    If there are a number of data stores they can also be identified by a code.

    The best way to develop a DFD for a given scenario is to use either a whiteboard or a large

    sheet of paper. The situation should be talked through, preferably by more than one person, and

    the inputs, outputs, processes and data stores identified. Changes should be made as necessary

    until a representative diagram of the flow of data is achieved.

    Student database

    Student checkdetailscorrect

    inputdata

    add toclasslists

    add toyear

    group

    student details

    omissions/errors

    checked forms

    student details

    year

    subjectssubject choices

    timetable

    Teachers

    class lists

    3.0

    add toyear group

    Yrcoordinator

    Student databaseD1

    Room scheduleD2

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    4/29

    Leading Technology 306

    Activ ity 9.1 Flow of data

    1. Write a paragraph describing the flow of data through the school enrolment scenariodescribed above. Assume a typical student and describe the data collected, where it goes,

    and what processing it undergoes.

    2. Identify the sorts of data that flows between student and teacher, and teacher and parent.

    Draw this on a diagram like the following:

    3. Explain what each of the following is in a DFD and draw the symbol used to represent it.

    a An external source or destination of data.

    b A flow of data.

    c A process.

    d A data store.4. The diagram below shows the flow of data for theRepairsdatabase used earlier.

    Owners of computer and other equipment to be repaired will leave the device with the

    receptionist who will tell them when it is ready to be collected. The receptionist will

    record the details on the computer. From the computer the foreman will allocate jobs to be

    performed by the technicians and himself.

    Represent the information from the diagram as a DFD.

    technician

    owner receptionist

    foreman

    name, device

    ready, cost

    job# readycost

    namedevice

    job#tech#date

    rate, priority,tech details

    job#, device, priority

    job#, ready, timecurrent jobsComputer

    parentstudent teacher

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    5/29

    Developing an information system 307

    5. Cyrus Habberschold owns an art gallery and has asked you to develop an information

    system to keep a record of all his artworks from acquisition to sale. Cyrus does not own

    the artworks, his gallery is merely the agent for their sale.Cyrus would like to keep a record of the artwork and the details of the artwork such as

    title, artist, type, medium, assessed value, etc. He wants to record the details of ownership

    of each artwork. An owner can own more than one artwork.

    Cyril would like to use the system to prepare a catalogue which is an alphabetical list of all

    the artworks available for sale with artist and assessed value. Records of sales are also to

    be kept including purchaser details. This will form the basis of a mailing list for future

    promotions.

    Each month Cyrus prepares a statement to each owner who had artworks in the gallerydetailing the outcome of any sales.

    Represent the above information as a DFD.

    6. Fleet Hire Motors provide chauffeur-driven prestige vehicles and would like a database of

    all vehicles that are currently part of their fleet. Apart from the usual details of make,

    model, hire cost etc., date of purchase, purchase cost, and vendor are to be recorded.

    Vendors can be the providers of more than one vehicle. Chauffeur (driver) details are to be

    recorded with both home and mobile phone numbers, and hourly work rate.For each hire, vehicle and chauffeur are to be recorded, as well as number of hours hired,

    and distance travelled, plus customer details. Fuel costs for each vehicle are also recorded

    as are service costs and details. Accidents and the appropriate damage details should also

    be stored.

    Represent the above information as a DFD.

    7. a Prepare a CS diagram for Q5 above.

    b Compare the CSD representation to the DFD. What sorts of information about thesystem is provided by each diagram?

    c Repeat for the scenario in Q6.

    Information system developmentIt is now time to create an information system from scratch.

    The information system development process is similar to the software development cycle.

    Overall we follow the same design-develop-evaluate (DDE) cycle, but there are differences in

    sub-steps as detailed below.

    Identify

    general problem description a simple statement of the overall task rationale for development the reason this system is being developed assumptions and boundaries the limits we place on the task to make it manageable.

    Conceptualise

    aims and objectives what we intend to achieve Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    6/29

    Leading Technology 308

    data flow diagram a schema identifying how data travels through the system input and output requirements what data is to go into, and what information we

    want to be reported by the system.

    The Information System Development Process

    Formalise

    normalised relations data organised into relational tables data dictionary a list of the fields that make up the system with their associated

    properties.

    device specification the hardware and software needed to implement the system screen and report layout a sketch plan for input and output screens or hard copy

    menu design a tree diagram showing menu options interactive devices an outline of how the user will work with the system, including

    how user assistance will be given

    Implement

    database and tables input forms queries

    output reports menu.

    Test

    ensure the system works in all situations with all data.

    Evaluate

    function compare the operation of the system with the original specifications todetermine if the stated objectives have been met

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    7/29

    Developing an information system 309

    implementation comment on the performance, reliability and ease of use of thesystem; suggest possible improvements that could be made

    process discuss the effectiveness and efficiency of the development procedure.

    Document

    specification documentation written record of the first three steps hard copy representative sample of activities in the implementation phase evaluation detail of ongoing and formal evaluation log record of activities that describe the development process help system user manual or on-line assistance to users.

    We will now work through each of these steps based on the following scenario.

    ScenarioThe owner of Porkies Dial-a-Rib has decided to set up a computerised system to help with his smallbusiness. The current system is paper based, and is not keeping up with the growth of theenterprise.

    Porkies works out of a kitchen in a shop. All orders are taken by phone and delivered by drivers.There are no walk in or pick-up orders taken.

    Over the page is a copy of Porkies menu:

    IdentifyTo gain a clear idea of this task it is important to distinguish exactly what it involves. To do this

    we will prepare a general problem description, a rationale for development, and we will

    identify the assumptions and boundaries of the scenario.

    General problem descriptionA general problem description is a simple re-statement of the overall task. To prepare this

    description read the information provided carefully and pinpoint all relevant features. Ifnecessary you may expand on the information provided to give a clearer picture of the scenario

    as you see it. When you are sure you understand what has to be done rewrite the task in your

    own words.

    In real life you would interview the system owner, UoD expert, and end users, and would be

    able to provide both background and specific detail. In a classroom situation some

    inventiveness may be necessary to provide such background and detail.

    General problem description: Porkies Dial-A-Ribhas been operating for two years now. It grew out

    of a small cafe operation where the owner, John Porky Thompson, offered ribs as part of the menu.These proved so popular that he specialised in just ribs. Soon he decided to employ a driver andoffer home delivery. In time Porky Thompson closed the cafe operation and only accepted ordersgiven over the phone. At present the business has grown to the extent that on most nights threedrivers are needed to make deliveries.

    Originally orders were taken by Porky and written on scraps of paper while he made up the ordershimself. He has now found it necessary to employ a phone operator and a kitchen hand to help himkeep up. The system of writing orders on scraps of paper no longer works; orders have been mixedup and even lost. Porky has decided to computerise the ordering system.

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    8/29

    Leading Technology 310

    In the new system customers will ring through their orders for ribs and other items from the menu,such as soft drinks and garlic bread. No products are to be sold other than over the phone. Eachorder is taken by the phone operator who enters customer details and both the code and the quantity

    for the particular items required. Orders are not accepted from public telephones. The time of orderis noted.

    The total cost of the order is calculated by the computer and the customer is informed. The operatoris also responsible for allocating the order to a particular driver. On a given night there are up tothree drivers, each with their assigned vehicle. The order is displayed on a monitor in the kitchenwhere it is prepared and made ready for the driver. A copy of the order and address is given to thedriver who then collects the order and takes it to the customer.

    Porkies Dial a Rib

    Fast free delivery - 7 days a week - 5pm till 10pm

    MenuRibs Regular Large

    BBQ sauce $8.50 $10.50Chilli sauce $8.00 $10.00Smokey Bacon sauce $8.25 $10.25

    Side OrderFried Rice $2.95Chips $1.95Garlic Bread $1.60

    Drinks Bottle CanCoca Cola $1.10 $1.20Fanta $1.10 $1.20

    Sprite $1.10 $1.30Salad Small Large

    Coleslaw $1.50 $2.75Green Salad $1.40 $2.50

    Phone: 399 111Just phone Porkies and give your name, address, suburb, and phone number to place

    your order. Free delivery direct to your door in around 30 minutes.

    A welcoming light turned on outside would be appreciated by our driver.

    Drivers carry change for $20 only. Limited delivery area.

    Minimum order $10. Prices subject to change without notice.

    Rationale for developmentA rationale is a reasoned justification for why a particular process is being followed.

    In developing an information system in real life it is necessary to identify the reasons behind

    the decision to proceed with the system. The justification might include a cost-benefit analysis,

    detailed examination of current processes, investigation of alternatives, trade-offs that had to be Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    9/29

    Developing an information system 311

    made, and so on. It would also include an estimate of the cost of development both financially

    and in terms of time and effort. The rationale is to provide clear evidence of why there is a need

    for this system and how it would add value to the enterprise.For our purposes we will limit our rationale to just identifying the benefits that would result

    from implementing such a system. Again some inventiveness may be necessary to provide

    sufficient detail.

    Rationale for development: ThePorkies Dial-A-Ribinformation system is to be implemented toimprove the efficiency, accuracy and timeliness of the ordering operation and to increase customersatisfaction.

    By computerising orders they need only be entered once and can be checked by the system toensure values are within limits. The order can be accurately and quickly transmitted to both thekitchen and the driver. It can also be totalled by the computer and records kept of transactions. Thesaving in time of processing the order and the certainty that the customer will receive prompt andcorrect delivery will improve customer satisfaction and lead to regular clientele and generate newbusiness. In turn this will make the business more profitable and increase the possibilities forexpansion.

    Employees will benefit from the ease of use, accuracy and speed of the new system. As theybecome more proficient in using the system, a higher level of staff morale should be developed.

    The system will ensure that information is correct, up-to-date and consistent. Data may also beeasily accessed, and additional information will be available so that Porky can make well informed

    decisions for the future operation of the business.

    Assumptions and boundariesThe assumptions and boundaries (UoD) are the simplifications or limits placed on the system

    so that the task is manageable and that it is practical to implement.

    UoD: This system will encompass the owner (Porky Thompson, also UoD expert), the customers,phone operator, kitchen staff and drivers. Data from the menu will be stored on computer as well asdetails of orders taken and the customer who orders them. The computer will also record the time oforder, its total cost and the driver assigned.

    The system will not be concerned with inventory of stock on hand, wages, profits or otheraccounting. Archival records will not be kept.

    Since there is no confidential information in the system it will not need password access, however itwill pay to lock menu items and values to prevent accidental changes.

    Assumptions: In developing this system we will make the following assumptions:

    there is only one phone operator who is responsible for checking the delivery area andthe minimum cost of the order

    drivers are not assigned suburbs and will deliver orders one at a time as they areprepared

    a driver is always available

    details of previous customers are not kept on computer

    items are identified by a code for ease of entering into the computer

    each order is identified by an order number

    each customer name is unique

    all orders are from private addresses though there may be two different orders from oneaddress (e.g. a party)

    a customer can make more than one order per night (but on a different order number).

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    10/29

    Leading Technology 312

    For simplicity we are excluding such practical considerations as money handling; staff rostering;archival details (stock available, total sales, time worked, etc.) and customer complaint handling.

    ConceptualiseOnce we have a clear idea of what we have to do, we can start to look at how we might do it.

    This is the conceptualisation phase where we form a clear picture of how the completed system

    might look as a final product before we begin.

    To do this in real life you would investigate the system in place to determine the users

    requirements, but for this task we are limited to the data given in the scenario.

    To form the conceptualisation we will develop:

    aim and objectives a brief statement of what we expect to achieve by developingthis system and a list of the requirements of what the completed system is to do data flow diagram showing the important parts of the system with arrows to

    indicate what data is handled, and who or what it is passed to or comes from

    input and output requirements the data to be entered into, and the facts and figuresthat are to be extracted from the system.

    Aim and objectives: Our aim is to develop a working information system for Porkies Dial-a-Rib. Thesystem will be user friendly, user proof and well documented, and will run with no errors.

    We will develop a menu based information system that will record information about orders andtransactions. The system will accept new input as customer details and orders. It will also enable theoperator to assign drivers. The computer will total bills and keep a record of transactions for oneevening.

    Output reports on takings for the evening and the current state of orders will be made available toPorky. There will also be a delivery form prepared for drivers and an on-screen report for the kitchento see orders that have to be made up.

    Data flow diagram:

    Data flow diagram for Porkies Dial-a Rib

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    11/29

    Developing an information system 313

    Input and output requirements: The phone operator will require an input screen to enter customerdetails and the items ordered. It will pay to create a code for menu items to speed up the data entryprocess. On the input form there will be a field for the operator to assign a driver, as well as fields for

    time of order and total cost. The owner will initially need to set the menu and cost of items but sincethese are not often changed we will not have a set form for their input.

    Drivers will have to indicate when they have returned and are ready to deliver another order, but thiscan be done directly to the phone operator and will not need to be entered into the system.

    FormaliseFormalisation is where we start to flesh out the conceptualisation by going into specific detail

    of how the system is to be implemented. To achieve this we will develop the following:

    normalised relations organise data into relational tables data dictionary a list of the fields that make up the system with their associated

    properties

    device specification a list of suitable hardware and software that could be used toimplement the system

    screen and report layout a sketch plan for input and output screens menu design tree diagram showing menu options interactive devices outline of how the user will work with the system (including

    user assistance).

    Normalised relationsThis step involves the development of the CS diagramand the ONF tablesby preparing the

    following:

    entities identify the entities and show links between any that may be related elementary sentences develop a set of elementary sentences to describe the

    relationships in this UoD

    conceptual schema diagram convert the elementary sentences into a draft diagram refine the diagram simplify the diagram by eliminating surplus entities and by

    indicating derived facts

    constraintsand assumptions add uniqueness, mandatory and other constraints to thediagram and include any assumptions made

    loops establish table loops around relation groups that are many:1 or 1:1, andaround any many:many relations

    normalised tables from the loops form named tables and indicate keys and other

    relevant information data dictionary from the tables work out the field properties required.

    Once this is done we can implement and test the system.

    Elementary sentencesTo develop the elementary sentences we will firstly need to identify the entities in the system.

    To do this we will need to carefully re-read the task description and also what we have written

    in the general problem description, aims and objectives. From that we can then look carefully at

    the data flow diagram and input form to identify potential entities. Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    12/29

    Leading Technology 314

    From all of these we might end up with the following list of entities:

    customer street suburb phone

    order time item item cost quantityorder total cost driver order ready vehicle

    On further thought we might realise that we will also need an entity called order. Using an

    order number we can identify a specific order to tie together all of the information a customer

    provides and to track it through the system. Identifying the order by number rather than by

    customer name overcomes problems such as repeats of names or a second order by the same

    customer.

    We may also realise item will be identified by both an item code and an item description.

    If we put all of these entities onto a sheet and draw lines showing entities that might be relatedin any way we may come up with something like the following:

    This will help to us develop the elementary facts and from them the elementary sentences:

    customer (name) A. Mackie customer (name) A. Mackielives at / is location for abides in / is area foraddress (street) 18 Chinchilla suburb (subname) Harlaxton

    customer (name) A. Mackie customer (name) A. Mackieis found on / is number for placed / was placed by

    phone (phonenr) 345678 order (order#) 0038order (order#) 0038 order (order#) 0038was placed at / for placement of has total cost of / is total cost fortime (am/pm) 7:30pm money ($) 22.50

    order (order#) 0038 driver (driv#) D02is assigned to / delivers is allocated / allocated todriver (driv#) D02 vehicle (veh#) 2

    item (itemcode) R-BBQ item (itemcode) R-BBQis code for / has code of is priced at / is price of

    item(itemname) reg. ribs-BBQ sauce money ($) 8.50

    order (order#) 0038 order(order#) 0038has status / is status for includes / is onready (Y/N) yes item (itemcode) R-BBQ

    in number / ofquantity (nr) 2

    All elementary sentences are binaries except the final one which can be represented as a nested

    ternary.

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    13/29

    Developing an information system 315

    Conceptual schemaOur first draft of the conceptual schema diagram based on the elementary sentences will give

    us:

    Surplus entities and derived factsThe next step is to check for surplus entities and to see if any facts can be derived.

    It does not take much to realise that both item cost and total cost are both money and so these

    two entities can be joined into one. They will be handled in exactly the same way as each other

    by the system.

    What about entities like phone number and quantity, or driver number and vehicle number?

    Perhaps these could be combined but they are not similar enough, and besides we would get

    really confused if driver and vehicle numbers could be mistaken for each other. We will leave

    these as separate entities.

    The only fact that can be derived is the total cost for an order. This will be the sum of item cost

    times quantity for a given order. (While time of order cannot be derived it can be determined by

    the system.)

    We will make these changes to our CS diagram (as shown over the page).

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    14/29

    Leading Technology 316

    ConstraintsWe will now redraw the CS diagram and add uniqueness, mandatory, entity and frequency

    constraints:

    ( item cost x quantity )Normalisation

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    15/29

    Developing an information system 317

    Placing loops around the relations in the above diagram will result in the following normalised

    tables:

    Customer: ( name, street, suburb, phone )Order: ( order#, name, driver, time, ready, totalcost )

    Menu: ( itemcode, itemname, itemcost )

    Quantity: ( order#, itemcode, quantity )

    Driver: ( driver, vehicle )

    Data dictionary:

    Field name Data type Size Format Required Notes

    name text 25 Y key for Customer

    street text 35 Ysuburb text 25 Y

    phone text 8 0000 0000 Y

    order# number 5 00000 key for Order

    driver text 15 Y key for Driver

    time date/time hh:mm Y

    ready yes/no 1

    totalcost currency $###.## derived at run time

    itemcode number 5 0000 key for Menu

    itemname text 25 Y description of item

    itemcost currency $###.## Y

    quantity number 3 ### Y

    vehicle text 5 Y

    Formalisation (cont)

    Now that we know what will be in our system we can complete the formalisation with a devicespecification, screen and report layout, menu design and interactive devices.

    Device specification: This system will need a computer for the phone operator (and perhaps theowner) as well as a screen and some input device in the kitchen. A printer will also be required toprepare delivery instructions for the drivers. Software will include Access 2010 and Windows 7.

    In the kitchen a monitor to display the current orders will be linked into the system with a mouse orjoystick used to indicate which orders are ready.

    Output reports: The system will produce the following output reports:

    Report Detail Prepared for

    deliveryaccount

    driver, order number, customer name, street and number,items and quantity, time of order, amount owing

    driver

    kitchen order number, items and quantity, time of order cook

    current orders order numbers, items and quantity, driver allocated owner

    takings total value of evenings orders owner

    *

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    16/29

    Leading Technology 318

    Screen layout:

    Porkies Dial-A-RibOrder number:

    Customer name: Contact phone:

    Street address: Suburb:

    Code Item Quantity Cost

    Total:

    Time of order: Driver assigned:

    Menu design: The application will run through the following menu structure.

    Main Menu

    Interactive devices: The phone operator and owners interaction with this system will be providedthrough an Access interface. This will be started from a desktop icon. There will be no passwordaccess.

    On start up the user will be presented with the main menu. Movement through this system will be bymouse action on standard buttons. Directions and help will be available for all actions.

    In the kitchen a list of orders will be displayed this will be an on-screen report. The display will beupdated as each new order is filled. Movement through the orders on the report will be by mouseaction. Kitchen staff can click next to an order when it has been made up.

    Exit will be from a main menu selection. The program will automatically save data to disc.

    Enterneworder

    Orders Owner Exit

    Viewcurrentorders

    Printorder

    Updateorder

    Deleteorder

    Returnto mainmenu

    Returnto mainmenu

    Viewtakings

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    17/29

    Developing an information system 319

    Activity 9.2 Implement and testWe are now at the stage of working from our design to turning our conceptualisation into a

    functioning information system.To do this in turn we will set up each of the following:

    database and tables create the database and tables working from the ONF design,and then populate the tables

    input forms make the data entry forms queries develop any queries needed output reports create formatted reports

    menu structure add the switchboard and macros needed to run the application1. Use the normalised tables above set up the database for Porkies Dial-a-Rib in Access.

    Populate the tables with information from the menu (see p318) and with sample customer

    orders.

    2. Develop the following queries to be used on the input form

    a Cost: multiply itemcostfromMenuby quantityfrom Quantity.

    b Item name: display itemnamegiven itemcode.

    3. Create the data input form as per the design on page 318 and using these two queries.

    4. Develop the following queries and use them to create the output reports listed on page 318:

    a Deliver: using fields fromDriver, Customer, Quantityand Order(amount owing will

    be an expression).

    b Kitchen: using fields from Quantityand Order.

    c Current: also using fields from Quantityand Order.

    d Takings: totalling the cost of all orders and using fields from QuantityandMenu.

    5. Add a menu system to run the application.

    The application should include on-screen cues for users. Ensure there is a consistent

    format in screen presentation and similar actions are carried out in the same way, e.g. to

    exit to a previous screen.

    6. Test the system to ensure it works effectively in all situations. The system should be tested

    both by yourself and at least one other person who is not familiar with it, to ensure it is

    easy to use and is user proof. Use a variety of test data to prototype the system effectively.

    EvaluateOnce completed the effectiveness of the system must be judged and the system has to be

    documented.

    Evaluation should reflect on:

    function compare the operation of the system with the original specifications todetermine if the stated objectives have been met

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    18/29

    Leading Technology 320

    implementation comment on the performance, reliability and ease of use of thesystem; suggest possible improvements that could be made; comments made by an

    unfamiliar user would be useful as part of an evaluation process discuss the effectiveness and efficiency and the development procedure

    with comments on working in pairs if relevant.

    Function: The system as implemented meets the requirements of the initial specification.

    The performance of the application is good and provides the business with a quicker moreprofessional service for its customers. The increased efficiency of orders appearing on the kitchenscreen immediately upon entering the computer system and the accurate print out of order andcustomer details for the driver ensures no mix-ups.

    With a unique identity number each order has an individual reference that is used by the phone

    operator, kitchen and driver and provides a direct link between the physical order and the customersdelivery instructions.

    Being menu driven and user friendly the program is easy to use. The menus are explicit in what is tobe done and there is error checking to ensure valid values are input. A user manual is also providedfor reference.

    One disadvantage is that the business will now be dependent on the system and major problemsmay occur if the system goes down for any reason.

    Implementation: As implemented the system is still not complete and will need to be upgraded toinclude the driver, and kitchen sections.

    The system is reliable if users are careful not to enter invalid data or make inadvertent deletions. It isalso easy to use with actions obvious from the directions on buttons. One problem is the need toclose a window to return to the main menu and this might be difficult for novice users.

    Improvements that might be included could be:

    providing an on-screen menu for the phone operator to refer to when answering calls

    archiving customer data for ease of data entry (with a customer number for regulars) and thepotential of a mailing list for advertising of special offers

    provision of further reports for the owner (stock, income etc.)

    an on-line help facility would assist in learning about the system and would increase theconfidence of the users in that they would know assistance is readily at hand

    a better interface, e.g. voice activated in the kitchen where hands might be sticky or greasy

    user proofing the system so that users can only enter valid values

    prompting the phone operator to confirm the deletion of orders

    a security system such as password access to prevent anyone other than the owner fromaltering menu or prices

    a back up system to come into play if the main system went down

    including a splash screen with business name and logo to welcome the user at the start of theapplication.

    Process: In this case the process of implementation has been very smooth and we have achievedwhat we set out to do.

    DocumentThe documentation should have been collected throughout the process up to this point to

    chronicle the whole process of development of this information system. It is to be collated in

    order, be neatly presented, and should consist of: Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    19/29

    Developing an information system 321

    general problem description and rationale for development list of assumptions and boundaries

    aims and objectives data flow diagram input requirements and output reports device specification and screen designs menu design and interactive devices to be employed elementary sentences a copy of the conceptual schema diagram and normalised tables data dictionary

    printouts of table definitions and contents screen captures to show the main menu and order entry form printouts of reports generated evaluation user manual if included.

    For a system as simple as this a user manual might be overkill, but if we did produce one it will

    need to inform the user:

    what the system does how to start the system basic methods of how to use the system what to do if something goes wrong how to finish.

    In addition you might like to include a copy of the menu schema to assist the user.

    Such a manual might start like this:

    User Manual:

    Porkies Dial a Rib

    1. About the system

    2. Getting started

    3. Operating the system

    4. Getting help

    5. How to finish off.

    1. About the System

    Porkies Dial-a-Rib information system is designed to increase the efficiency and overallmanagement o f the business of w hich you are a part. This computerised system is fasterand more reliable than a paper based system as a result of better organisation, increasedease of use and greater accuracy wi th orders. The system is easy to use and provides youwith help messages at every stage.

    The system collates and sto res orders coming in. Details about customers and orders areentered by the phone operator. The system then assigns an order number and a time oforder, and calculates the total cost of the order. These details are passed onto the kitchen

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    20/29

    Leading Technology 322

    and the drivers. The system will di splay information about the menu, orders pendingdelivery and orders to be filled. The system also prepares the delivery slip.

    Output reports on The state of current orders and evenings takings are also available.

    2. Getting Started

    After start ing the computer cl ick on the Porkies icon on the desktop to gain access to themain menu.

    The menu offers opt ions and sub-options o f:

    Orders place, prin t, delete, update and return to main menu

    Owner view current orders, view takings and return to main menu

    Exit

    Each entry on the menu is activated by pressing the associated button or Alt + the

    underlined letter. To exit from a menu item press the Continue button3. Operating the System

    3.1 Orders Menu

    etc. ...

    Possible IS ScenariosThe following scenarios are ideas for suitable information systems.

    1. Jacki Jones is in the process of setting up a new taxi company that she will call Kwika

    Cabs. She wishes operations to be computer based and has contracted you to develop the

    information system.

    Jacki intends to offer four categories of cab (ordinary, maxi, courier and limo) each with

    its own rate of hire. Cabs also have different rates of hire for day and night (after 6 p.m.).

    Each vehicle is to be owned and run by independent operators.

    To maximise income taxi owners keep the vehicle on the road as much as possible with

    drivers (usually including themselves) operating in shifts. The contact phone number foreach owner and driver must be held on the system.

    When a customer phones up, the dispatcher will record the name and pick up point. At

    times the dispatcher may request a contact phone (e.g. if he suspects a prank call). The job

    is then assigned to the nearest vacant taxi and the driver is informed by radio. The time the

    cab is sent is also recorded in case the customer phones back to enquire about delays.

    Prepare a system that will assist the dispatcher in assigning cabs to jobs and also record the

    operations for a given day (6 a.m. to 6 a.m.). As Jacki intends to charge owners in

    proportion to the number and category of jobs they are given, the system must be able togive details of which cabs were in use, when, how and where they were used, and by

    which customers.

    2. Mike and Jane Edwards have recently taken over a small run-down motel on the New

    England highway just south of Toowoomba. They have almost got the motel ready for

    service but would like a computer system to record operations and have asked for your

    help.

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    21/29

    Developing an information system 323

    The motel has fourteen rooms, six single, six double and two family, each with its own

    rate. Rooms may be booked in advance, but most are taken on a casual basis when

    travellers stop by. Occasionally a group may book in, in which case a discount can be

    offered. The name, home address and (unless paying by cash) the credit card of the

    customer who books the room is recorded. A record must also be kept of the value of

    phone calls, room service and mini-bar sales for each room.

    Mike and Jane would like a system that will show which rooms are available for a given

    date, and a record of customers and takings.

    3. The Bunyip Art Society presents an annual exhibition. The Art Show is now established as

    an important event in the societys calendar featuring work from artists from around

    Australia. Invitations are extended to prominent artists, and artists who have exhibited theprevious year, to show their work for sale. The art may be paintings, sculpture, jewellery

    or other media.

    A catalogue is prepared for the Art Show detailing the works of art and their location in

    the gallery. A receipt is issued to the customer whenever a sale is made and the society

    receives a commission as agent.

    At the end of the show, an account is sent to all artists detailing sales, commissions

    deducted and totals forwarded. A summary report is then prepared for the Art Show

    Committee.

    The societys committee is not satisfied with their existing method of recording data and

    have engaged you to set up a computerised information system to record data.

    Hint: you might like to refer to your answer to the art gallery DFD in Activity 9.1.

    SEI 9 Internet abuses

    The most prevalent information system currently is the internet. Unfortunately there are many

    who will abuse and twist it to their own ends. Information a user provides for one purpose canbe used for other unrelated, and often intrusive, purposes. In this section we will investigate

    some of the forms these abuses can take.

    SpamSpamis electronic junk mail. Like personalised marketing the person promoting something for

    sale sends information to consumers, but in this case it is sent by email. While ordinary junk

    mail or personalised mail will cost upwards of fifty cents each to

    deliver, thousands of spam mailings can be posted for a few cents.

    The name spam derives from a Monty Python sketch in which

    four Vikings loudly sing the praises of spam (a meat substitute)

    and drown out the voices of the other customers. In the same way

    email spam floods mailing lists and threatens to drown out normal

    communication. In addition to email there is spam on text

    messaging, fax machines, IM, blogs, social network sites, and so

    on.

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    22/29

    Leading Technology 324

    Spam mailing lists are often compiled by unethical (or even illegal) means. One way is to use a

    program called a spambotthat works its way through web sites, blogs, social sites and

    newsgroups, harvesting addresses as it goes. Another is to collect and then sell lists of

    addresses of people who provide information via on-line forms. There are resources available

    to spammers that give details of over 50 million current email addresses.

    The extent of spam is amazing. Some estimates suggest that there are tens of billionsof

    unwanted emails a year, and the use of spam in newsgroups could be well over 50% of traffic.

    The arrival of spam on a home computer is annoying, but the sheer volume of traffic it

    generates on the internet significantly slows down operations.

    It is possible to install software on your computer to filter out spam but ironically some

    companies even use spam to advertise anti-spam software! The net community is doing what itcan to fight back by blacklisting spammers and notifying ISPs of originating addresses. There

    are legal steps being proposed, but the international nature of the internet makes this difficult.

    There are already laws in many countries that attempt to regulate spam.

    Some civil liberties groups are concerned about so called stealth blocking. In this ISPs use

    aggressive spam blocking without their customers knowledge. The concern is that ISPs

    seeking to reduce spam-related costs may also block non-spam e-mail.

    This anti-spam message is itself spam

    Spoofing and phishingSpoofing is where a person is able to masquerade as another. A typical example is where

    unscrupulous persons pretend to be younger, or a different gender, in chat rooms or on

    channels. This is simple to do because those concerned are not face to face, and identities can

    be anonymised.

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    23/29

    Developing an information system 325

    Spoofing can also apply to programs or files. In some cases music copyright holders have

    flooded file sharing networks with unlistenable versions of popular tracks to discourage

    downloading.

    Web page spoofing is where the legitimate page is replaced by another. An early case where

    this occurred was when the official White House web site was spoofed. Hackers had found the

    site was not protected and changed data on the site. Visitors were surprised to see some very

    uncomplimentary comments about the then US president Clinton. Another way of spoofing a

    web site is topharm(intercept) the original web address and redirect the user to another site

    that superficially looks like the original.

    Spoofing can also be used as part ofphishingwere an attempt is made to acquire information

    such as passwords or credit card details. The person behind the attempt fishes for theinformation (the ph comes from the older practice ofphone phreaking).

    Phishing is a form of social engineering, and is carried out by masquerading as a trustworthy

    person or business in an email, web site or instant message. In a typical phishing attempt the

    target will receive a message saying that they have to verify their account, by following a

    link to what appears to be an authentic website. In reality the link is forged, although this is

    very difficult to spot as everything from the web address to the screen appearance is the same

    as the original.

    A phishing attempt to obtain an eBay password

    The damage caused by phishing ranges from loss of access to email, to financial loss if bank

    account passwords are stolen.

    Phishing can also be used in identity theft. Unsuspecting people will often divulge personal

    information including credit card, passport and tax file numbers. In this format phishing is also

    known as carding(from credit card). Once information is acquired, the carders may use a

    persons details to prevent them from accessing their own accounts, ruin their credit rating, or

    even create fake accounts in the targets name.

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    24/29

    Leading Technology 326

    One strategy for combating phishing is to train users how to deal with phishing attempts. There

    are also anti-phishing programs available which work by identifying typical phrasing used in

    emails or on web pages. Spam filters also limit the number of phishing emails that will

    penetrate a system. Some banks now also use challenge questions in addition to password

    access. The answers to the challenge questions are known only to the legitimate user and the

    bank, and therefore not the phisher.

    SpywareAs mentioned in unit 5 spyware is the name given to programs that are loaded onto a computer

    without the users informed consent. Once installed these programs can monitor the users

    actions or collect information about the user for commercial purposes. The computer has been

    subverted for the benefit of someone else.The most visible behaviour of spyware is usually to promote contact with selected sites by

    displaying pop-up ads. These are advertisements that appear on the computer at regular

    intervals, or alternatively, whenever the user opens a new browser window. The spyware

    monitors the users web browsing interests and habits by recording sites visited, and attempts to

    develop a profile of the user in order to tailor pop-up advertisements to target the user.

    Spyware is not like a virus or worm in that it does not spread itself. Most spyware is installed

    by the user, but usually without their knowledge. Typically users download desirable software

    such as music players or file transfer programs upon which the spyware is piggybacked. Theend user license agreement (EULA) of the main program may inform the user of this bundling

    of programs, but the notification is usually buried in the many pages of fine print that few read.

    An example of this wasKazaa Lite, a file sharing application many downloaded for free and

    installed without reading the EULA. Not only was this EULA 4 208 words long, but it

    referenced nearly 20 000 words of contracts with other associated companies. Those who

    ticked theI acceptbox agreed to amongst other things:

    permitting their computer to be used as a server for others in their area allowing the usage of their computer and hard disc space to be sold onto other

    companies

    permitting spyware to be installed and then used to monitor their browsing habits allowing the spyware to look through their computer and report on the software

    installed

    not to use anti-spyware programs paying for legal costs in case of a lawsuit.

    This information was buried in the contract. Few who read it would have agreed to the terms.Spyware can also be loaded onto a system when the user is tricked into doing something that

    installs it without realising what they are doing. As mentioned earlier a Trojan horse is a

    program that claims to do one thing but actually does another. The user downloads what is

    described as a useful program (e.g. a web accelerator or software agent) and does not realise the

    program really is spyware. A variation on this is where the user clicks on a link for a promised

    action (e.g. optimising Internet access) which instead triggers the download of the spyware.

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    25/29

    Developing an information system 327

    One form of spyware is described as adware. This is software that displays adverts, either with

    or without the users consent. Some users are prepared to put up with advertisements to obtain

    a free version of a program. These are displayed as part of the normal operation of the program

    and the user accepts them as the cost of ownership. A later upgrade to the paid version of the

    program will remove the adverts.

    In addition to covert monitoring of the user, spyware can also reduce the performance of the

    infected system by tying up resources. These parasitic programs can cause the computer to

    crash or hang.

    There are programs to detect and remove spyware. In extreme cases of multiple infection the

    whole system may need a fresh install.

    Keystroke loggingKeystroke logging is a process of recording the keys a user presses on the computer keyboard.

    While this can have legitimate purposes such as diagnosing typing habits, it can also be used to

    detect passwords, encryption keys, or other confidential information such as banking details.

    Keystroke logging can be carried out by either hardware or software.

    Hardware loggers are either attached to the keyboard, and hence are easily spotted, or are

    installed so that they are hidden inside the keyboard. Software loggers are more difficult to

    spot, and may enter the computer through a virus, worm or Trojan horse.Both hackers and law enforcement agencies use keystroke loggers. The hackers use the

    information gained to access password protected systems or for financial gain. The law

    enforcement agencies use the loggers to track the activities of criminals or terrorists.

    Denial of service attacksIn the normal course of events sites such as Googlereceive hundreds of millions of hits a day.

    The number of hits determines the rates they set for advertising; the higher the number of visits

    - the more they charge advertisers. However a site can have too many visitors. Sites such asNASA during a shuttle launch can receive so many hits that their servers may not be able to

    keep up with demand.

    In some cases there have been deliberate attempts to overload web servers. Unhappy

    customers, cyber-vandals, or commercial competitors can take part in a denial of service (DoS)

    attack. Using automated URL calls, a site can be bombarded with thousands of page requests a

    second from dozens of locations. The demand can be so much that the web server is overloaded

    and legitimate customers or users cannot get through. The web site is effectively shut down.

    In some cases the perpetrators will use many other computers to assist in the DoS. Using aworm (such asBlaster) they secretly install remote access privileges on other peoples

    computers. These infected machines can then be controlled by IRC and configured to act as a

    group. When ready the zombie computers are activated and together bombard the targeted

    server with many thousands of page requests. This form of attack is called a distributed denial

    of service (DDoS) attack.

    Such attacks have been made against many of the leading web sites. Originally there was

    nothing that could be done after all web sites want visitors, but such attacks are now illegal.

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    26/29

    Leading Technology 328

    CookiesA cookieis a file used by the users Internet browser to identify the computer to a web site.

    These are text files of information and are stored on the local HDD. (For Internet Explorer look

    in Windows > Cookies; for Firefox use Tools > Options choosePrivacy and thenCookies and

    View Cookies.)

    The information stored by cookies includes such things as arrival time, pages visited, time

    spent on the site, information the visitor has volunteered, searches made, and so on. The use of

    cookies is mostly harmless and can be a help in speeding up access. It can also be used to greet

    the user or to check identity at the next access.

    However cookies can be misused. Some sites use the information stored to serve up adverts

    based on previous accesses. In some cases the information collected can be used to helpdevelop a profile of the user. Some sites form cookie rings that share information.

    Cookies can be disabled if the user is concerned about privacy issues but many sites require

    access to the users cookie file before they can be visited. Without cookies enabled web access

    would be severely limited. Browsers do give some control over cookie handling and there is

    cookie management software and cookie eater software available to help the user to maintain

    control.

    Activ ity 9.3 Abusing the system1. a What is spam?

    b Explain how the use of mailing lists is a privacy intrusion.

    c Why is spamming so universally disliked?

    d Why does it continue?

    e What regulations or laws are there currently in force in Australia to control spam?

    2. a Explain the difference between phishing and spoofing.

    b What is an anonymiser and why might spoofers use one?

    c What is the purpose of phishing? List some of the confidential information phishers

    might seek.

    d How would the flooding of unlistenable versions of a song discourage downloading

    of a track?

    e What is pharming, and why might someone pharm web addresses and redirect users?

    3. a Why should users of the internet be wary of sharing personal or contact data?b In what ways can such data be supplied inadvertently?

    c What aspects of web security should the home user employ to maintain privacy and

    the integrity of their system?

    4. Explain with examples the meaning of each of the following:

    a Identity theft.

    b User profile.

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    27/29

    Developing an information system 329

    c Social engineering.

    d Cyber-bullying.

    5. How might the originators of spyware make money?

    6. Outline a scenario in which keystroke logging might be used.

    7. a What might motivate a person or group to mount a denial of service attack on a

    company or website?

    b Research and report on an actual DoS or DDoS that has occurred

    8. Identify both the positive and the negative aspects of cookies.

    9. Many web sites publish a privacy policy.Either visit such a web site and briefly summarise their policy, or list the features you

    think a web site privacy policy should include.

    10. Visit the Electronic Frontiers Foundation at www.eff.organd identify their stand in regard

    to on-line privacy. Check out also epic.organd www.privacyinternational.org.

    Activity 9.4 Social issues report

    Prepare a report on one of the social issues of information systems. This is to be written in theformat of a conventional report and based on your own research. It will detail the findings of

    your investigation and will conclude with a commentary of how significant the issue is, and

    what you see as its possible future ramifications.

    Presentation is to be in the format of a report of at least 1 500 words. The initial preparation or

    research may be done in pairs, but the report itself is to be written individually.

    In developing the report you will follow the Information Literacy Cycle (ILC), which is a

    variation on the DDE cycle.

    IdentifySelect the social issue to investigate. Possible topics include:

    the implications for privacy in a technological world misuse of the Internet, e.g. spam, spoofing, spyware, phishing, denial of service

    attacks, on-line hate groups, cyberstalking (choose one or two only)

    censorship or restriction of the Internet by government social networking, IRC/IM, gaming, wikis, blogs responsibilities in developing knowledge based systems biometrics using the computer to commit fraud, e.g. to steal money, or credit card information the changing workplace e.g. the virtual office, tele-commuting, e-business, e-banking the computer vandals: hackers or virus writers the effects of on-line computer games on individuals, or on society in general the sociological effects of computerised automation (job displacement, downsizing,

    deskilling, relocation, social unrest, OH&S, etc.)

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

  • 8/11/2019 9 Developing an Information System

    28/29

    Leading Technology 330

    technophobia (the fear of computers) industrial espionage in the computer industry obsessive behaviour and computers gender or socio-economic differences in relation to access, availability and utilisation

    of computing resources

    a related topic agreed to with your teacher

    Determine informationWhen you have chosen a topic, briefly list the matters to include in the report. Use this list to

    identify the information to find out or collect.

    Determine methods of research and possible sources of information. These will include library

    resources, computer magazines and journals, as well as on-line sources.

    Prepare a list of suitable terms that will assist in focussing your search efforts.

    The Information Literacy Cycle

    Identify sourcesConduct some initial research to establish if you can find sufficient data to support a report on

    your topic.

    Select the resources most relevant to your topic.

    Research the issue you have chosen. The information you collect must be factual, and based on

    reputable and reliable sources.

    Collect and organiseMake notes of relevant information found and carefully record bibliographical information. For

    web sites this will include the access date in addition to the URL.

    Read through your notes and select the parts of the research to use in your report.

    Divide the information into logical sections. Choose headings and list the main points to be

    presented in each section.

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall

    D l i i f i 331

  • 8/11/2019 9 Developing an Information System

    29/29

    Developing an information system 331

    Prepare a draft of the main sections of your report and your commentary. This is to be

    submitted to your teacher for advice, directions and suggestions at this stage.

    Develop your draft into a report with the following sections:

    Title page report title, your name, who the report is for, due date Table of contents section headings and page numbers Summary (50 words ) brief outline of what the report covers Introduction (150 words) explain the background to the report and specify its

    purpose and scope; explain any specialist terms you will use

    Body of the report (800+ words) relevant data concerning topic divided into logicalsections with suitable headings; write in paragraphs with a topic sentence and one

    main idea to a paragraph Discussion (500 words) commentary on your findings (see below) Bibliography clearly indicate all sources of data Appendices (optional) additional information (e.g. tables of data).

    ReflectionAs part of your report make a commentary on your findings. In this state the relevant

    significance of the issue. How important is it, and how serious is its effect on society? Discuss

    the potential future impact of the issue. Support your comments with reference to key points inyour report.

    Conclude the report by making a recommendation on whether those involved should be

    encouraged or dissuaded if necessary, and how.

    To finish we are going

    to see how intelligent

    computers can be

    Kevin Savage 2011 Single user licence issued to Mitchell Ingall