6 Stages of the Traditional Systems Life Cycle y project definition y systems study y design y programming y installation y post-implementation
4 Steps in Prototyping y identify preliminary requirements y develop a working prototype y use the prototype; and refine y enhance the prototype
Software Package-Based Development z Use the software vendor's response to a Request for Proposal (RFP) about package features
End-User/Fourth-Generation Development Tools: – personal computer tools – query languages – graphics languages – report generators – application generators – very high-level programming languages – application software packages
Outsourcing z. Outsourcing is the process of handing over some or all of a function to an external vendor.
Information Systems Threats – disaster, such as fire or electrical failure – hardware malfunction – software errors – user errors – computer crime – computer abuse
Computer Crime – monetary theft – theft of services, information, or computer programs – alteration of data – damage to software – trespassing
IS General Controls
IS Application Controls
Information Systems Security • • Data security Hardware security Network security Recovery plan
Information Systems Quality • Using development methodology • Using quality measurements, e. g. , response time, # of bugs per 1000 lines of code • Using programming standards • Using testing standards • Using development tools, e. g, CASE • Using quality audits