6 Stages of the Traditional Systems Life Cycle

  • Slides: 11
Download presentation
6 Stages of the Traditional Systems Life Cycle y project definition y systems study

6 Stages of the Traditional Systems Life Cycle y project definition y systems study y design y programming y installation y post-implementation

4 Steps in Prototyping y identify preliminary requirements y develop a working prototype y

4 Steps in Prototyping y identify preliminary requirements y develop a working prototype y use the prototype; and refine y enhance the prototype

Software Package-Based Development z Use the software vendor's response to a Request for Proposal

Software Package-Based Development z Use the software vendor's response to a Request for Proposal (RFP) about package features

End-User/Fourth-Generation Development Tools: – personal computer tools – query languages – graphics languages –

End-User/Fourth-Generation Development Tools: – personal computer tools – query languages – graphics languages – report generators – application generators – very high-level programming languages – application software packages

Outsourcing z. Outsourcing is the process of handing over some or all of a

Outsourcing z. Outsourcing is the process of handing over some or all of a function to an external vendor.

Information Systems Threats – disaster, such as fire or electrical failure – hardware malfunction

Information Systems Threats – disaster, such as fire or electrical failure – hardware malfunction – software errors – user errors – computer crime – computer abuse

Computer Crime – monetary theft – theft of services, information, or computer programs –

Computer Crime – monetary theft – theft of services, information, or computer programs – alteration of data – damage to software – trespassing

IS General Controls

IS General Controls

IS Application Controls

IS Application Controls

Information Systems Security • • Data security Hardware security Network security Recovery plan

Information Systems Security • • Data security Hardware security Network security Recovery plan

Information Systems Quality • Using development methodology • Using quality measurements, e. g. ,

Information Systems Quality • Using development methodology • Using quality measurements, e. g. , response time, # of bugs per 1000 lines of code • Using programming standards • Using testing standards • Using development tools, e. g, CASE • Using quality audits