A Methodology for Situated Analysis and Design

Author(s):  
Vivienne Waller ◽  
Robert B. Johnston ◽  
Simon K. Milton

This chapter presents a new high level methodology for the analysis and design of information systems specifically to support routine action at the operational level of organizations. The authors argue that traditional methods fail to adequately address the unique requirements of support for routine operational action. The main innovation of the methodology is the use of an action-centred approach derived from recent work on the nature of purposeful human action, and as such, emphasises both the information requirements for action and the dependence of action upon appropriately structured environments. A brief case study illustrates how using the methodology can sensitize the analyst to opportunities to increase human efficiency and effectiveness through lighter weight information systems.

Author(s):  
Judith Kabeli ◽  
Peretz Shoval

FOOM (Functional and Object-Oriented Methodology) is an integrated methodology for information systems’ analysis and design, which combines two essential software-engineering paradigms: the functional/data approach (or process-oriented) and the object-oriented (OO) approach. Having applied FOOM in a variety of domains, this chapter presents the application of the methodology to the specification of the IFIP Conference system. We focus on the analysis and design phases. FOOM-analysis phase includes data modeling and functional analysis activities and produces an initial Class Diagram and a hierarchy of OO data flow diagrams (OO-DFDs). The products of the design phase include: (a) a complete class diagram; (b) object classes for the menus, forms and reports and (c) a behavior schema, which consists of detailed descriptions of the methods and the application transactions, expressed in pseudocode and message diagrams.


2011 ◽  
Vol 2011 ◽  
pp. 1-19 ◽  
Author(s):  
M. Hasannezhad ◽  
S. E. Hosseini

Nowadays, vicissitude in administrative systems through Performance Measurement (PM) is one of the necessary and inevitable subjects, on which the improvement of efficiency and effectiveness in banking systems depend greatly. In this paper, we focused on efficiency analysis of Tejarat bank branches in order to propose the corrective actions on utilizing resources. Hence, we compute the efficiencies of units based on input-oriented CCR model with three approaches which differ on combination method of inputs and outputs and then rank them by Anderson & Peterson (AP) model. The results represent that the CCR model based on confined fuzzy weights presents the high level of accuracy in identifying efficient units as well as giving useful information on improving the inefficient branches.


2014 ◽  
Author(s):  
Rafael de Paula Herrera ◽  
Alan Salvany Felinto

Legacy Information Systems play key-roles on organizations development and growth. However, they can be considered as risky factor to operations chain whether they do not meet the demanding or become acting as single point of failures. In this work, we propose a migration model which is able to handle systems that depend on Relational Databases and its changes were driven through the use of a distributed middleware. We also pose how this approach was successfully applied while migrating a Legacy Information System to a Cloud Computing based infra-structure, adding fault-tolerance to its architecture as a competitive advantage, enabling the related services to be clustered and then horizontal scaled on demand. All major concerns on how the whole solution and its aggregated tools were conceived are discussed in high-level details, so them can be solely reproduced and integrated to another systems in order to achieve the same goals or improve its level of quality assurance.


Author(s):  
Zulkhairi Md. Dahalin

This paper discusses the state of a small and medium enterprise's (SME) information needs in terms of its strategic application portfolio. Specifically, it examines the strategic information requirements of a manufacturing SME with the aim of understanding the application strategy needed to formulate the firm's IT adoption so that lessons could he learnt from such technology innovation. A case study approach was chosen in which information requirements of the firm were investigated. Analysis was done to examine the evidence of potential applications strategic to the .firm 's business mission, goals and functional requirements. Major deliverables include an enterprise-wide data model representing a high-level overview of the firm's information requirements, a business area classification, and portfolios of applications categorized according to strategic, operational, potential and support using the classical McFarlan and McKenney Strategic Importance Matrix.  


Author(s):  
Ajantha Dahanayake

The first case study focuses on evaluating the capability of the CAME environment of supporting a problem area that requires a structured analysis and design method. The specific problem lies in the financial and administration sector of the example problem, Dutch flower auction (see Chapter 3). Financial administration is an activity that is required frequently within organizations, and the analysis, design, and development of such an information system are normally supported by a structured analysis and design method. This case investigates the modeling process and techniques required for a popular structured analysis and design method known as the YOURDON method. The financial and administration sector’s problem is used as the problem area of this case study based on the following considerations: a problem preferably of a general nature, meaning that development of similar information systems is common, is the object of investigation. The Dutch flower auction’s financial and administration sector’s problem is one of a typical data processing nature, and this is clearly a frequently occurring problem area in information systems development. The problem area has to be such that a structured analysis and design method would be adopted during information systems analysis and design. Otherwise it could not be considered to be information systems modeling support according to a structured analysis and design method. The YOURDON method (Yourdon, 1989) is particularly well known for its support of the problem area of data processing and real-time systems analysis and design. This means all clones of the YOURDON method described in literature include the real-time analysis and design. The selection of the YOURDON method to investigate this particular problem is based on the preference of students who worked with this particular example problem based on the course “Information Systems Analysis and Design Methodologies” at Delft University of Technology. The various versions of the YOURDON method give varying interpretations of its modeling techniques Data Flow Diagram (DFD), Entity Relationship Diagram (ERD), and State Transition Diagram (STD). The automated support must provide not only the required modeling techniques, but also the different variations of these techniques as required to deal with the problem area.


Author(s):  
Eduardo Fernandez-Medina Paton ◽  
Mario G. Piattini

Rapid technological advances in communications, transport, banking, manufacturing, medicine and other fields are demanding more sophisticated information requirements in organizations worldwide. As a result, large quantities of data must be handled, while a high level of security must be maintained in order to ensure information needs are met. The alarming growth in electronic crime is forcing organizations to take a look at how information systems can maintain security while meeting the technological needs of real-time systems in a global market. It is important therefore, that in information systems analysis and design, security requirements are taken into account.


2014 ◽  
Vol 2 (1) ◽  
pp. 300
Author(s):  
Elly Halimatusadiah ◽  
Bangun Gunwan

This research purpose to determine the application of Good Corporate Governance at PT. POS INDONESIA (Persero), to determine the implementation of Accounting Information Systems at PT. POS Indones (Persero), and to determine the application of good corporate governance in order to optimize the implementation of Accounting Information Systems at PT. POS Indonesia (Persero). This research uses descriptive method of analysis which aims to get a fairly clear picture of the object examined. Moreover, the authors use a case study, because the authors only discuss the case and retrieval of data on just one company. This research was conducted at PT. POS INDONESIA (Persero) which is located on Jl. Cilaki No. 73 Bandung. The result showed that the implementation of good corporate governance has been adequate, because it has been supported by the elements of Good Corporate Governance consisting of transparency, accountability, responsibility, independence, equality and fairness, and is supported by the stages full of Good Corporate Governance consists of the implementation phase, implementation phase and the evaluation phase, then Implementation of Accounting Information Systems has been adequate, because the input data has been performed with a high level of accuracy, timely, complete, concise, relevant, reliable and comparable. Data processing has also been carried out in accordance with Financial Accounting Standards.


2013 ◽  
Vol 61 (3) ◽  
pp. 569-579 ◽  
Author(s):  
A. Poniszewska-Marańda

Abstract Nowadays, the growth and complexity of functionalities of current information systems, especially dynamic, distributed and heterogeneous information systems, makes the design and creation of such systems a difficult task and at the same time, strategic for businesses. A very important stage of data protection in an information system is the creation of a high level model, independent of the software, satisfying the needs of system protection and security. The process of role engineering, i.e. the identification of roles and setting up in an organization is a complex task. The paper presents the modeling and design stages in the process of role engineering in the aspect of security schema development for information systems, in particular for dynamic, distributed information systems, based on the role concept and the usage concept. Such a schema is created first of all during the design phase of a system. Two actors should cooperate with each other in this creation process, the application developer and the security administrator, to determine the minimal set of user’s roles in agreement with the security constraints that guarantee the global security coherence of the system.


GIS Business ◽  
2019 ◽  
Vol 14 (6) ◽  
pp. 206-212
Author(s):  
Dr. D. Shoba ◽  
Dr. G. Suganthi

Employees and employers are facing issues in work life balance. It has become a difficult domain now, because the work needs have increased due to an increase in work pressure and complexities in handling the technology. As there are drastic changes in the rules and regulations in the work scenario of the aviation industry, it makes work life balance of employees difficult and set more hurdles. Hence there are many distractions and imbalances in the life of women employees in the aviation industry working across all levels. This work pressure is creating high level of hurdles in maintaining a harmonious job and family life, especially for female aviation employees. Data is collected from 50 female crew members working at Cochin International Airport. The objective of this study is to analyze the work life balance of working females of Cochin International Airport and its influence on their personal and specialized lives. The result of the study shows that the management should frame certain policies which will help employees to have the balance among their personal and expert lives.


Sign in / Sign up

Export Citation Format

Share Document