CHAPTER 11 Acquiring Information Systems and Applications 1 Copyright John Wiley & Sons Canada.
CHAPTER 14 Acquiring Information Systems and Applications.
-
Upload
gloria-bruce -
Category
Documents
-
view
289 -
download
9
Transcript of CHAPTER 14 Acquiring Information Systems and Applications.
![Page 1: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/1.jpg)
CHAPTER 14
Acquiring Information Systems and Applications
![Page 2: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/2.jpg)
CHAPTER OUTLINE
14.1 Planning for and Justifying IT Applications14.2 Strategies for Acquiring IT Applications14.3 The Traditional Systems Development Life Cycle14.4 Alternative Methods and Tools for Systems Development14.5 Vendor and Software Selection
![Page 3: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/3.jpg)
LEARNING OBJECTIVES1. Discuss the different cost/benefit analyses that
companies must take into account when formulating an IT strategic plan
2. Discuss the four business decisions that companies must make when they acquire new applications
3. Enumerate the primary tasks and importance of each of the six processes involved in the systems development life cycle
4. Describe alternative development methods and tools that augment development methods
5. Analyze the process of vendor and soft ware selection
![Page 4: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/4.jpg)
14.1 Planning for and Justifying IT Applications
![Page 5: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/5.jpg)
Planning for and Justifying IT Applications
Organizations must analyze the need for the IT application.Each IT application must be justified in terms of costs and benefits.The application portfolio
![Page 6: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/6.jpg)
IS Operational Plan
Contains the following elements:MissionIT environmentObjectives of the IT functionConstraints of the IT functionApplication portfolioResource allocation and project management
![Page 7: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/7.jpg)
Evaluating & Justifying IT Investment: Benefits, Costs & Issues
Assessing the costsFixed costsTotal cost of ownership (TCO)
Assessing the benefits (Values)Intangible benefits: Benefits from IT that may be very desirable but difficult to place an accurate monetary value on.
Comparing the two
![Page 8: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/8.jpg)
Conducting the Cost-Benefit Analysis
•Using Net Present Value (NPV)
•Return on investment
•Breakeven analysis
•The business case approach
![Page 9: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/9.jpg)
14.2 Strategies for Acquiring IT Applications
![Page 10: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/10.jpg)
Strategies for Acquiring IT Applications
Four fundamental business decisions to make before choosing a strategy: (1) How much computer code does the company want to write? (2) How will the company pay for the application? (3) Where will the application run? (4) Where will the application originate?
![Page 11: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/11.jpg)
Strategies for Acquiring IT Applications
Purchase a Prewritten ApplicationCustomize a Prewritten ApplicationLease the applicationsApplication Service Providers and Software-
as-a-Service VendorsUse Open-Source SoftwareOutsourcingCustom Development
![Page 12: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/12.jpg)
14.3 Traditional Systems Development Life Cycle
![Page 13: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/13.jpg)
Traditional Systems Development Life Cycle
Software Development Life Cycle (SDLC) Systems InvestigationSystems AnalysisSystems DesignProgramming and TestingImplementationOperation and Maintenance
![Page 14: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/14.jpg)
The SDLC
Major advantagesControlAccountabilityError detection
Major drawbacksRelatively inflexibleTime-consuming and expensiveDiscourages changes once user requirements are gathered
![Page 15: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/15.jpg)
SDLC – Systems Investigation
Begins with the business problem (or opportunity) followed by the feasibility analysis.
Feasibility studyDeliverable: Go/No-Go Decision
![Page 16: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/16.jpg)
Feasibility Study
• Technical feasibility
•Economic feasibility
•Organizational feasibility
•Behavioral feasibility
![Page 17: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/17.jpg)
SDLC – System Analysis The examination of the business problem that the organization plans to solve with an information system.
Main purpose is to gather information about existing system to determine requirements for the new or improved system.
Deliverable is a set of system requirements, also called user requirements.
![Page 18: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/18.jpg)
SDLC – System Analysis Describes how the system will accomplish this task.
Deliverable is the technical design that specifies:
System outputs, inputs, user interfaces.Hardware, software, databases,
telecommunications, personnel & procedures.Blueprint of how these components are
integrated.
![Page 19: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/19.jpg)
SDLC – Programming & TestingProgramming involves the translation of a system’s design specification into computer code.
Testing checks to see if the computer code will produce the expected and desired results under certain conditions.Testing is designed to delete errors (bugs) in the computer code.
![Page 20: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/20.jpg)
SDLC – Systems Implementation
Implementation involves three major conversion strategies:
Direct Conversion Pilot Conversion Phased Conversion Parallel Conversion (not used much today)
![Page 21: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/21.jpg)
SLDC – Operation & Maintenance
Audits are performed to assess the system’s capabilities and to determine if it is being used correctly. Systems need several types of maintenance.
Debugging Updating Maintenance
![Page 22: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/22.jpg)
14.4 Alternative Methods and Tools for Systems Development
![Page 23: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/23.jpg)
Alternative Methods and Tools for Systems Development
•Joint application design (JAD)
•Rapid application development (RAD)
•Agile development
•End-user development
![Page 24: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/24.jpg)
14.5 Vendor & Software Selection
![Page 25: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/25.jpg)
Vendor & Software Selection
Step 1: Identify potential vendors.Step 2: Determine the evaluation criteria.
Request for proposal (RFP)
Step 3: Evaluate vendors and packages.Step 4: Choose the vendor and packageStep 5: Negotiate a contract.Step 6: Establish a service level agreement.
![Page 26: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/26.jpg)
Closing Case #1Tweak or Trash?
• The Problem
• The Solution
• The Results
![Page 27: CHAPTER 14 Acquiring Information Systems and Applications.](https://reader034.fdocuments.in/reader034/viewer/2022052122/56649cff5503460f949d042c/html5/thumbnails/27.jpg)
Closing Case #2 Putting IT All Together
• The Problem
• The Solution
• The Results