BM183 Handout
BM183 Handout
Chapter Outline
● The System View
● Business Processes
● Processes and Techniques to Develop Information Systems
● Information Systems Controls to Minimize Business Risks
System — is a set of interrelated components that must work together to achieve some
common purpose
● Even when a given component is well-designed, simple, and efficient to operate, the
system will malfunction if the components do not work together.
● A change in one component could affect other components.
Seven Key System Elements — one or more of these elements that change or are created
when we redesign or design a new (information) system.
1. Boundary — The delineation of which elements (such as components and storage) are
within the system being analyzed and which are outside
2. Environment — Everything outside the system; provides assumptions, constraints, and
inputs to the system
3. Inputs — The resources (i.e., data, materials, supplies, energy) from the environment
that are consumed and manipulated within the system.
4. Outputs — The resources or products (i.e., information, reports, documents, screen
displays, materials) provided to the environment by the activities within the system.
5. Components — The activities or processes within the system that transform inputs into
intermediate forms or that generate system outputs
6. Interfaces — The place where two components or the system and its environment meet
or interact
7. Storage — Holding areas used for the temporary and permanent storage of information,
energy, materials, and so on
Organizations as Systems
● Four fundamental components in an organization that must work in concert for the whole
organization to be effective
○ If a change in IT is made in an organization—such as the introduction of a new
software application—this change is likely to affect the other three components
○ Each time we change characteristics of one or more of these four
components, we must consider compensating changes in the others.
Systems Analysis and Design (SA&D) — major process used in developing a new information
system; based on a systems approach to problem solving
● Choose an appropriate scope
○ Selecting the boundary for the information system greatly influences the
complexity and potential success of an IS project
● Logical before physical
○ You must know what an information system is to do before you can specify how a
system is to operate.
○ Logical descriptions: concentrate on what the system does
○ Physical descriptions: concentrate on how the system operates.
○ “Function before form.”
● Problem-solving steps
○ Problem (or system): a set of problems; appropriate strategy is to keep breaking
a problem down into smaller and smaller problems, which are more manageable
than the whole problem.
IT as an Enabler of BPR
IT played a crucial role in enabling radical business process redesign. Hammer and
Champy (1993) urge managers to use IT to challenge old assumptions. Hammer (1990)
advocated six key principles for business process redesign.
1. Organize business processes around outcomes, not tasks. This principle involves
having one person manage an entire process. It consolidates information for this
individual, and it often means organizing processes around customer needs instead of
the product.
2. Assign those who use the output to perform the process. This principle emphasizes
holding those with a vested interest in a result accountable. This streamlines processes,
leveraging information technologies to allow managers to handle tasks traditionally done
by specialists.
3. Integrate information processing into the work that produces the information. This
principle advocates processing information at its source. This minimizes errors and
reconciliation steps by capturing data closest to where errors can be detected. It
emphasizes capturing data once at the primary source, promoting a common and
consistent data source.
4. Create a virtual enterprise by treating geographically distributed resources as
though they were centralized. This principle suggests that IT eliminates the artificial
distinction between centralization and decentralization. Technologies like
teleconferencing and shared databases enable efficient information processing across
time and space.
5. Link parallel activities instead of integrating their results. This principle advocates
continuous coordination of related activities instead of waiting until the final step for
consistency.
6. Have the people who do the work make all the decisions, and let controls built into
the system monitor the process. This principle leads to a significant reduction in
management layers, empowers employees, and streamlines bureaucracy. It underscores
the importance of integrating controls into a system from the beginning rather than as an
afterthought.
Procedural-Oriented Techniques
● Fundamental Procedural Approach to Systems Development
(1) Describe what you have
(2) Define what you want.
(3) Describe how you will make it.
● Three-Step Modeling Approach
➔ The approach involves documenting the existing system (the As-Is model),
creating a model of the desired future system (the Logical To-Be model), and
then interpreting the logical future model as a physical system design (the
Physical To-Be model).
● Work Process Flow Diagram — identifies the existing information sources (i.e.,
purchase order file, receipts file), information sources that are updated (changes to
invoices/payables), the order in which steps occur (approvals before checks are printed),
and some of the dependencies or decisions (need to know whether vendor is new or
not).
● Data Model — created by logically defining the necessary and sufficient relationships
among system data. The most common notation for a data model is an
entity-relationship diagram or ERD.
Techniques for Documenting the Physical To-Be System
● Physical To-Be Model — a high-level model; communicates how the new system will
work and helps identify any dependencies that might lead to downstream impacts, such
as data integrity problems or inadequate process definitions.
Object-Oriented Techniques
● One of the key advantages of object-oriented development is that it allows for the reuse
of pre-programmed objects created by others. This means you can quickly build
prototype applications with use-friendly interfaces and simplify the process of
maintaining software.
Two Principles
(1) Encapsulation — storing data and related operations together within an object.
(2) Inheritance — OOP technique used to inherit attributes and methods from one class to
another.
(a) Superclass — the class where inheritance of attributes and methods take place.
(b) Subclass — the class who will inherit the attributes and methods from a
superclass.
Methodology Standards
The foundation of a system’s reliability lies in its design and construction. Automated
checks alone cannot compensate for errors in the software.
● Function Libraries
○ Create a library of frequently used functions for various information systems.
○ Develop and test functions meticulously, saving time and minimizing design and
programming flaws.
● User Interface Standards
○ Organizations’ established standards for designing user interfaces.
○ Guidelines for screen and report layouts contribute to consistent and user-friendly
designs.
● Importance of Documentation
○ Complete and accurate documentation during construction and maintenance is
crucial.
○ Future programmers rely on thorough documentation to be aware of prior
changes.
● Information Technology Infrastructure Library (ITIL)
○ A comprehensive set of international guidelines for IT management.
○ Encompasses best practices for incident management, problem resolution,
system changes, and more.
● Benefits of ITIL
○ Reducing IT costs, increasing utilization, and aligning IT with business
requirements.
○ Emphasizes the reuse of proven methods, customer satisfaction, and overall
operational efficiency.
● IT Service Management Forum (ITSMF)
○ Professional society promoting ITIL methods.
○ Offers education and certification and advocates the value of ITIL for IT
professionals.
Systems Testing
● Essential IS control involves conducting complete system testing.
● Controls in the Implementation PhaseIndividual and combined testing of each
program within the application is necessary.
● Managers play a crucial role in creating test data with known results, covering typical,
atypical, correct, and erroneous scenarios.
● Testing is applicable during both the initial system development and subsequent
modifications.
Security
● Logical access controls focus on user permissions, managed through authentication and
authorization mechanisms.
● Authentication verifies user identity with unique identifiers and private passwords, while
authorization grants resource access based on permissions.
● Encryption safeguards data transmission and storage, rendering files unreadable without
the decryption algorithm.
● Physical security involves measures like badge readers, voice/fingerprint/retina
recognition, and combination locks.
● Detection methods for security breaches include hiding instructions in sensitive
programs, analyzing computer time usage, and reviewing system activity logs.
Auditing Roles
● Audits may align with annual accounting audits, compliance with regulations like
Sarbanes-Oxley, Basel II, or health-care regulations such as HIPAA.
● EDP (Electronic Data Processing) auditors use methods like compliance tests, statistical
sampling, and embedded auditing to ensure correct data processing.
● Compliance tests check for high-quality system development procedures, while
statistical sampling identifies abnormalities.
● Embedded auditing includes reporting triggers activated by specific processing events
and analyzing flagged records for errors or security breaches.
● Audit trails, tracing transactions from input through processes and reports, help identify
errors and security breaches.
Reference:
Brown, Carol V., et al, (2012) Managing Information Technology, 7th ed., Pearson