Sign In
Not register? Register Now!
You are here: HomeEssayIT & Computer Science
Pages:
5 pages/≈1375 words
Sources:
2 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 27
Topic:

The Role Of Stakeholders In Information System Development (Essay Sample)

Instructions:

the paper DISCUSSES METHODOLOGY of undertaking system analysis design in business organizations. it looks at the role of stakeholders in information system development

source..
Content:

Information System Project Design
Name
Institution
Question 1
Waterfall methodology refers to a step by step method in designing process, where after completion of one step then developers advances to the next step . In case of agile methodology the developers begins with a simplified project design and built on it. These methods differ in a number of ways as discussed below. In waterfall methodology, it has been seen that one-step should be executed before the next one is handled.
It is also impossible for developers to review the previous step, unless they do away with the whole project and begins a fresh. This method gives no room for correction, developers need to be very keen with every step they undertake in executing there project. In contrast to this method, Agile methodology is based on principles and not the process. Every step is carried out and project priorities are assessed which enables tests to be conducted. As opposed to waterfall methodology, this one allows customers’ feedback in the process before the next step is approached.
Waterfall method has a number of advantages. First, it allows record keeping as it is sequential. Upon these records, improvement can be made in future. Secondly, a client is able to tell what is next and plan accordingly. Another merit of this method is that, in case there is a massive shift of employees, there will be a minimum impact due to document keeping. Besides this merits, this method has a number of limitations. First, it is irreversible, once a step has been executed, it difficult to go back. Another main problem is that it relies heavily on initial stages, once they are messed, and then the project is ruined.
Question 2
Boehm and Turner chart is a diagram, which describes a proposed project development with focus on how requirement factors function for realization of predefined goals. The model visualizes the project implementation as dependent on several elements, which requires analysis for the realization of the expected project performance (Shelly& Rosenblatt 2010).The Boehm and Turner method facilitates the understanding of the project environment and stakeholders involved in the implementation. The approach helps in integrating agile techniques, which tend to bypass the traditional methods of project development. The components, which the models are built on, include the personnel, dynamism and organizational culture and size.
Most of the information systems project tends to have inherent sensitivity and high demand for accurate and reliable business project. Owing to the dynamism and ever changing information system requirements for business organizations. Adopting the model offers unimaginable advantages in developing methodology for system development life cycle. For example, the model elaborates on the type and size of human resource requirement for implementing information system project. Through the model, it is possible to incorporate agile techniques, which helps in meeting information system unpredictability. This unpredictability would arise from the need to align the system to accommodate the large numbers of entries in the databases systems or to ensure proper use of information technology infrastructure.
Additionally, the model will ensure the right experts are involved in the project with feasible time lime during the project implementation. Personnel identification and task assignment, which creates function pipeline for the project is easily achievable through the model. For example, competent system analyst, developer and eventual maintenance and support team to guide final information system users.
Question 3
This is a trend of investing more resources in an apparently unproductive undertaking, which entail physical effort, time and finance already associated with it. Sometimes sticking to a decision is important but at times, it is a dangerous tendency that results in magnifying the effect of a poor decision-making.
Several factors influence the escalation behavior. These may include
1) Group decision-making
Someone could invest further in a poor business when the firm comprises of multiple policy makers. Alternatively, a groupthink could reinforce the initial decision and override the consideration of alternatives. Groupthink decreases the likelihood of escalation of commitment.
2) Proximity of completion
It is harder to abandon a project when it is nearer to completion. The closer the project is to completion the more the likelihood of escalation of commitment.
3) Sunk costs
When many resources had b spent on an investment, the decision is more likely to escalate commitment. These irrecoverable resources are known as sunk costs.
4) Personal responsibility
Most people will increase commitment to bad investments if they are the ones who initially endorsed them. Self-justification and impression management majorly causes this.
5) Exogenous explanation of failure
When blames on past failures are shifted to unforeseeable events, the decision maker will likely escalate commitment. An opportunity to blame a failed venture on an exogenous event provides the decision maker with positive beliefs.
The decision makers are required not to consider sunk costs, delegate the decision on whether or not to escalate to new decision makers, practice loss aversion, structure the incentives, frequently remind themselves of the goals of the investment and actively enquire about alternatives
Question 4
A use case diagram is an explicit representation interaction along with various features of an element. It is a technique employed in system analysis to classify, explain and organize system requirements. System, in this case is something, which is under operation like a service website (Dennis, Wixom & Tegarden, 2015. The system objectives could entail planning overall requirements, authenticating a hardware design, testing software debugging product and creating an online assistance. Use case diagrams are developed when the requirements for the system needs to be captured.
The element, actor presents anything that can perform particular role in the system. The role of an actor is a use case diagram is to interrelate with the use case (Dennis, Wixom & Tegarden, 2015). Given an example of hospital applicability, a patient unit stands for an actor for the chosen system. Again, whoever gives any examination in the system can still represent an actor. However, the duty of the designer to think about the effect of usability which he wants to model. In case, an entity does not affect a given section of usability under model.
An actor could be represented as a stick figure as above.
Another element of a use case diagram is a system boundary which defines the level at which the system will be employed (Dennis, Wixom & Tegarden, 2015). Similarly, a use case diagram also defines the level of the limit of the system.
Question 5
Types and purposes of feasibility
The feasibility studies major goal is to evaluate the practicality of a new project; it determines whether the project needs investment or not. Various types of feasibility should be taken into consideration for investors to consider the system. Operation feasibility, its major role is to determine whether the outcome of the system will match the requirements. It also determines the implementation and the possible effect on organizations set up and strategies, for instance, pr...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Importance of Cybersecurity Tools and Technologies
    Description: Companies need to invest in cybersecurity tools and technologies for a number of owing to the increasing cyberspace threats such as network intrusion. Firstly, Installation of cybersecurity tools ensures the protection of organizations information technology infrastructure(Rajagopal & Behl, 2017). The ...
    1 page/≈275 words| 3 Sources | APA | IT & Computer Science | Essay |
  • Importance Of Cybersecurity Tools And Technologies
    Description: The Essay Discusses Cyber-Security Tools And The Implications I N Protection Of Information Resources Of Business Organizations....
    1 page/≈275 words| 3 Sources | APA | IT & Computer Science | Essay |
  • Find out and Describe are Computers Really Creative?
    Description: Creativity has two fundamental aspects that include inception of a new or novel idea and its inclusion into a relevant domain for implementation...
    3 pages/≈825 words| 4 Sources | APA | IT & Computer Science | Essay |
Need a Custom Essay Written?
First time 15% Discount!