Professional Documents
Culture Documents
System Analysis and Requirement Discovery
System Analysis and Requirement Discovery
PIECES framework:
A checklist for identifying problems with an existing information system.
Performance
o Throughput
o Response Time
Information (and Data)
o Outputs
Lack of any information
Lack of necessary information
Lack of relevant information
Too much information – information overload
Information that is not in a useful format
Information that is not accurate
Information that is difficult to produce
Information that is not timely to its subsequent use
o Inputs
Data is not captured
Data is not captured in time to be useful
Data is not accurately captured – contains errors
Data is difficult to capture
Data us captured redundantly – same data is captured more than once
Too much data is captured
Illegal data is captured
o Stored Data
Data is stored redundantly in multiple files and/or databases
Stored data is not accurate
Data is not secure from accident or vandalism
Data is not well organized
Data is not flexible – not easy to meet new information needs from stored
data
Data is not accessible
Economics
o Costs
Costs are unknown
Costs are untraceable
Costs are too high
o Profits
New markets can be explored
Current marketing can be improved
Control (and Security)
o Too little security or control
Input data is not adequately edited
Crimes (e.g. fraud, embezzlement) are (or can be) committed against the
data
Ethics are breached on data or information – refers to data or information
getting to unauthorized people
Redundantly stored data is inconsistent in different files or databases
Data privacy regulations or guidelines are being (or can be) violated
Processing errors are occurring (either by people, machines, or software)
Decision- making errors are occurring
o Too much control or security
Bureaucratic red tape slows the system
Controls inconvenience customers or employees
Excessive controls cause processing delays
Efficiency
o People, machines, or computers waste time
Data is redundantly input or copied
Data is redundantly processed
Information is redundantly generated
o People, machines, or computers waste materials and suppliers
Effort required for tasks is excessive
Materials required for tasks is excessive
Service
o The system produces inaccurate results
o The system produces inconsistent results
o The system produces unreliable results
o The system is not easy to learn
o The system is not easy to use
o The system is awkward to use
o The system is inflexible to new or exceptional situations
o The system is inflexible to change
o The system is incompatible with other systems
o The system is not coordinated with other systems
Operational Flexibility:
Proposed projects are beneficial only if they can be turned out into information system. That will
meet the organization’s operating requirements. Operational feasibility aspects of the project are
to be taken as an important part of the project implementation. Some of the important issues raised
are to test the operational feasibility of a project includes the following: -
• Is there sufficient support for the management from the users?
• Will the system be used and work properly if it is being developed and implemented?
• Will there be any resistance from the user that will undermine the possible application
benefits?
This system is targeted to be in accordance with the above-mentioned issues. Beforehand, the
management issues and user requirements have been taken into consideration. So there is no
question of resistance from the users that can undermine the possible application benefits.
The well-planned design would ensure the optimal utilization of the computer resources and would
help in the improvement of performance status.
Security:
Each user is required to log in. The system should log staff that has been assigned user names and
passwords. The system should be designed to make it impossible for anybody to logon without a
valid username and password. Data encryption should be employed to keep the user login name
and password secret.
Reliability:
The system would be used by about 50 staff working at the Red Cross headquarters and also some
other many staff in the collaborating clinics and hospitals. The system should have little or no
downtime and be able to handle multiple concurrent users.
Ease of Use:
The general and administrative views should be easy to use and intuitive.Online help and
documentation should be provided.
System and Browser compatibility Testing:
The system should be accessible on the following browsers - Microsoft Internet Explorer ,
NetScape Navigator and Mozilla .
Performance requirements:
Red Cross society Uganda has a UNIX server. This system would be designed to run on a minimum
hardware configuration of 500MHz x86 machines.Considering the vast hardware available at the
society , this would not pose any problems. The system should have a quick response time. For the
purpose of this research project, this would be defined as less than 5 seconds.
Server Software:
Operating System: Windows 10
PHP version: PHP 5.6+
Web Server: Apache Web Server. 2.4.25+
Database: MySQL 5.7.18+
Interview:
We used this technique frequently in the system analysis after questionnaires. The interview were
unstructured. We choose some people in the organization who were either decision maker or
operator or uses Some activity related with the project. As we interviewed them many helped us
to understand all stages involved.
Questionnaire:
We used this technique in the initial and Final phases of our project. In the initial phase we
Prepared some questionnaire to get some basic information about the current system. Then we
used the questionnaire to get some numerical data that was required or missing after all the
observation.
Record review:
This was the most beneficial technique for us wile making our database we studied the existing
file structure, documents used and generated in the organization. For every files registers we tried
to identify its significance need relation with other data item.
Observation:
While finding the facts we keenly observed all the activities and transaction usage of files and
document. Observation helped us in finding out the actual way functioning apart from the ideal or
desired.