Information Systems Development in the Digital Era

MODULE I: Development of Information Systems

1. The Life Cycle of Information Systems

A complete development of an information system, from recognizing the need it will satisfy to achieving optimal computerized operation, goes through various stages that make up what is called the life cycle of a system.

Stages of a Life Cycle

Inception Phase: Defines the system’s vision, establishes the project scope, and makes the decision to proceed.

Elaboration Phase: Analyzes the system for which a solution is sought, defines the preliminary system structure, identifies project risk factors, and develops a detailed plan.

Construction Phase: Builds the system and necessary supporting products, such as documentation and system test cases.

Transition Phase: Delivers the system to users. This includes installation, configuration, user support, corrections, etc., and ends when users are satisfied.

Products or Outcomes of the Life Cycle Stages

Each stage generates a set of products or outcomes. These can be system components, the system itself in various development stages, or system documentation reflecting the work carried out. Documentation should be limited to documents that provide value to the project from a management or technical perspective.

2. System Development Methodologies

Software development methodologies provide tools, techniques, and models to represent software at different life cycle stages. Based on their primary object of decomposition, they can be classified into:

Methodologies for Data Structures

These methodologies are based on the idea that modeling input and output data structures ensures software quality. They focus on defining data structures using techniques that are transformed into programs.

Structured Methodologies (Process Oriented)

These emphasize software decomposition into processes or functions, resulting in a hierarchical structure of process threads.

Object-Oriented Methodologies

These break down software into objects with data structures and behavior defined by their functions. Objects group data and processes. These methodologies focus on identifying objects, their responsibilities, and how they interact to fulfill software requirements.

3. Sources of Incorporation of Information Systems

The main sources for obtaining applications are:

Internal Development

The system is “manufactured” in-house by the organization’s personnel, carrying out all life cycle stages.

External Development

Some or all parts of the system are developed outside the organization. This involves hiring external services to provide some or all life cycle stages.

Acquisition of Standardized Applications

This involves purchasing (or leasing) “manufactured” goods (packages), i.e., applications developed for the market by software companies.

“Outsourcing”

Outsourcing transfers all or part of an activity or process to a qualified external provider. The organization entrusts a specific activity to a third party, who provides personnel and equipment. The outsourcing company does not have its own computer equipment or systems personnel; all computer activity is managed by the contracted organization.

5. Problems in Human Systems

The history of applying electronic tools has seen more failures than successes. Initially, attention was focused on improving hardware and reducing costs. However, most organizations continued to experience problems such as:

  • Dissatisfied users
  • Project delays
  • Security breaches
  • Errors and rework
  • Broken promises
  • Unjustified costs
  • Staff turnover and job dissatisfaction
  • Strained relationships between the systems area and the rest of the organization

Relatively recently, it was concluded that the root of these problems lay in “the human side of information systems.”

Typical human problems in the systems area include:

  • Obsession with technology without realizing that information is the primary computing resource and the computer is just a tool.
  • Lack of a strategic plan to support management with systems applications and prioritize user needs.
  • Excessive focus on technological design rather than functional design.
  • Lack of interest in internal marketing of IT services.
  • Hindering constructive relationships with users by using excessive computer jargon.
  • Lack of training in interpersonal relations and teamwork, including creativity, conducting group meetings, and effective oral and written communication.

MODULE II: Rethinking Business and Organization in the Digital Era

4. Internet

The Internet is a network of computer networks, a vast network of thousands of smaller networks interconnected through various communication devices, primarily the standard telephone network. It has revolutionized communication, providing almost instantaneous access to text, images, sound, and video.

The Web (WWW or W3) organizes information on the Internet as hypertext documents. Using a browser, you can “surf” the Internet and view information based on keyword searches or links.

The WWW communication protocol is HTTP (Hypertext Transfer Protocol). All servers and clients must understand it to send and receive hypermedia documents. WWW servers are often called “HTTP servers.”

The Internet is extremely resilient. If networks are added or removed, or if a problem occurs in one, the network continues to operate normally.

Common uses of the Internet include:

  • Communication and collaboration: email, data, and document exchange.
  • Access to information: searching documents, databases, catalogs, reading e-brochures, manuals, books, and advertisements.
  • Participation in discussions: subscribing to discussion groups.
  • Entertainment: interactive video games, video clips, animated magazines, and books.

Today, the Internet is the lifeblood of the digital economy. The speed, scope, and consequences of the changes occurring today are unprecedented.

5. Intranet and Extranet

Intranets

An intranet is a network using Internet-based technology created by an organization to disseminate corporate information and connect with its employees. The main objective is to provide access to corporate information regardless of location or storage method.

An intranet is protected by security measures like passwords, encryption, and firewalls, ensuring that only authorized members can access it.

One of the most immediate benefits of an intranet is the drastic reduction in paper usage.

The goal of an intranet is to connect all information islands within a company, similar to what the Internet did for the world. The Web is to the Internet what the intranet is to the company: employees create their own pages and share project or task details with colleagues.

Extranets

Extranets are network links using Internet technology to connect a company’s intranet with the intranets of its customers, suppliers, or other business partners.

The value of extranets comes from several factors. First, browser technology makes accessing intranet resources easier. Second, extranets allow companies to build and strengthen strategic relationships with customers and suppliers, enabling interactive web-based interactions with business partners.