Design a business information system

Assignment Help Management Information Sys
Reference no: EM131915800

You have to select a topic to perform research, plan and design a business information system during the first week of this course. Please refer to Week One of this Course Guide for some suggested example of this topic.

Focus of the Final Paper

Construct a system analysis paper based on your weekly presentations.

Please note this is an individual paper. The paper should represent the research and recommendations you have performed for the proposed business information system over the previous four weeks in a cohesive format. Your paper should demonstrate critical thought.

The paper should be 2400 to 3000 words, excluding the title, diagrams, and reference pages. The structure of the paper should be as follows:

Cover Page

Title of paper

Student's name

Course name and number

Instructor's name

Date submitted

Introduction

The introduction should familiarize the reader with the proposed business information system and outline the major points that you will cover in the paper. It should include your thesis statement. If you need assistance with writing a thesis statement, visit the Ashford Writing Center's website for help.

Body

Make the suggested changes to the PowerPoint assignments for Weeks One through Four based on the constructive feedback provided by your instructor.

Do not simply copy and paste your previous assignments into your final paper. Read your writing and improve upon what you have already written to connect everything learned in this class. Be sure that your paper addresses the following points.

System Overview

Provide a brief overview of the proposed business information system and describe

What it would accomplish for the business organization

Who are the stakeholders in the proposed business information system

What are the business information system requirements

How the requirements are elicited, analyzed, documented, reviewed and confirmed

How would the business analyst ensure the business information system or solution satisfied all stakeholder requirements.

Explain which of the potential approaches to system development (computer-aided software engineering (CASE) tools, joint application design (JAD), rapid application development (RAD), participatory design (PD), or the use of Agile Methodologies should be considered for the proposed business information system design. Support your explanation with examples from your own experiences and/or from any scholarly journal citations.

Briefly discuss what each stage of the Systems Development Life Cycle (SDLC) approach would accomplish in your proposed business information system.

Requirements Determination

Discuss the types of documents that would be useful to analyze for requirements gathering purposes and why they would be important.

Additionally, discuss which documents would be possible to obtain as well as which ones would be difficult to obtain (think about the records and knowledge keeping within the organization, some information resides in specific documents while some is scattered throughout the organization).

Create a questionnaire that includes at least ten well-written questions that you can use for information gathering.

Explain your rationale for the style in which you wrote the questions.

Identify which modern requirements determination methods (Joint Application Design and/or Prototyping) would be appropriate for this business information system and explain why you think they would be suitable.

Using your proposed business information system scenario, discuss at least one example of each of the nine system characteristics:

What are the Components and Interrelated Components in the proposed business information system,

What would be the Boundary of the proposed business information system,

What is the Purpose of the proposed business information system,

What is the Environment of the proposed business information system,

What are the Interfaces of the proposed business information system,

What are the Constraints of the proposed business information system, and

What are the Inputs and Outputs to the proposed business information system

Scope and Feasibility

Explain the proposed business information system's scope. Please refer to Table 4-3 in the text

Develop a business information system plan. Please refer to Table 4-4 in the text.

Assess the business information system's feasibility from the system analyst's perspective by using the six categories of feasibility factors (economic, operational, technical, schedule, legal and contractual, and political feasibility) outlined in the text (pp. 90-98)

Develop a Project Scope Statement for the proposed business information system, refer to Figure 4-12 in the text. Include the following categories in the statement:

General Project Information,

Problem/Opportunity Statement,

Project Objectives,

Project Description,

Business Benefits,

Project Deliverables, and

Estimated Project Duration.

Diagrams

Develop a context-level data-flow diagram for the proposed system (use Fig. 6-5 in the text as a guide). You can use Microsoft PowerPoint to develop the data flow diagrams.

Develop a level-0 diagram for the proposed system (use Fig. 6-6 in the text as a guide).

Using the level-0 diagram that you previously constructed, select one of the level-0 processes and prepare a level-1 diagram (use Fig. 6-8 in the text as a guide).

Data Modeling

For the proposed business information system and the data flow diagrams developed previously, consider potential customer transactions.

Provide a list of all the entities (like supplier, customer, etc.) for which system will need to store information.

Identify a set of attributes for each entity listed above (like customer name, supplier phone). See pp. 197-199 in the text.

Specify an identifier (like employee ID, supplier phone, etc.) for each entity and explain the rules you applied when you selected the identifier. See pp. 199-201 in the text.

Develop an entity-relationship diagram for entity relationships.

Be sure to specify the cardinalities for each relationship (use Fig. 7-10 in the text as a guide).

Remember, cardinality of a relationship is the number of instances of an entity that can be associated with each instance of another entity.

User Training and Maintenance

For a business analyst, it is also important to plan for training of all users of the system and develop a maintenance plan for the life of the system (use Table 10-5, and 10-6 in the text as a guide).

Provide a brief suggested plan for user training.

For the proposed business information system, provide a brief plan for maintenance of the system (use Table 10-7 in the text as a guide).

To ensure readability, supply headings for each section of the body.

Conclusion

In your conclusion, restate your thesis statement. Review your conclusions. Include any ideas you have about the business information system that you did not already discuss.

References

Provide an APA-formatted reference list. In addition to the text, cite at least four additional scholarly references from the Ashford library to support your discussion.

The Final Paper

Must be 2400 to 3000 words (8 to 10 double-spaced pages) in length (not including title, diagrams, and references pages). Format the paper according to APA style as outlined in the Ashford Writing Center.

Must include a separate title page with the following:

Title of paper

Student's name

Course name and number

Instructor's name

Date submitted

Must use at least three scholarly sources in addition to the course text.

The Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.)Links to an external site. table offers additional guidance on appropriate source types.

If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.

Must document all sources in APA style as outlined in the Ashford Writing Center.

Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.

Reference no: EM131915800

Questions Cloud

Prepare a report of your recommendation to be presented : The product will be available for purchase online, & then instant download.It will also be offered via physical media which will be available in retail market.
Prepare an IMC campaign plan : MKT 441-1 Integrated Marketing Communications Campaign Plan Assignment. Prepare an IMC campaign plan with recommendations for CSU Health & Wellness Services
Acme is able to have highest debt-equity ratio in industry : Acme Inc., has the highest debt-equity ratio in its industry. Acme is able to have the highest debt-equity ratio in its industry.
Write about standard chartered bank : Write about Standard Chartered Bank - The size of its employees and its organizational structure - The training plan and methodology
Design a business information system : Construct a system analysis paper based on your weekly presentations.
Explain the differences between races : Are there similarities or differences between races (variable RC) in terms of Interpersonal Trust (variables IPT1-IPT5) and Age of branch managers.
Figure out why chairman of the board of directors fired : You're trying to figure out why the chairman of the Board of Directors fired you as a CEO of a small corporation
Describe function for each of the osi reference model layers : Develop a presentation suitable for use in training individuals with no experience in computer networking.
Discuss different types of costing methods : The elements of planning, control, and decision making used by the company. Different types of costing methods used by the company.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explanation of which web security threats are most prevalent

An explanation of which web security threats are most prevalent, the hazards they present, and how these threats are exploiting holes in current security countermeasures

  Explain project management as a discipline

Describe the industries in which project managers are in high demand. Provide evidence to support your response. Describe the general role of a project manager, and explain the primary ways in which it differs across different industries. Compare the..

  Traditional methods of performing tasks

New technology vs the 'old way' - what are some of the risks of using technology to do things instead of using more traditional methods of performing tasks?

  Discuss if think terminating a employee for policy violation

Discuss if you think terminating an employee for a policy violation is justified. Which policies would you fire someone over, which would you provide a warning first?

  Role of the operating manager in given case

The Role of the Operating Manager in Information Systems, It was 7:30 P.M. on September 22, 2006, and Leon Lassiter, Vice President of Marketing with the Midsouth Chamber of Commerce (MSCC), was still in his office, reflecting on the day's frustrat..

  Analyze quote and apply at least one text to help illuminate

"Getting workers to accept the new conception of time ultimately depended on the ability of the owners to convince the average laborer that through a combination of diligence, punctuality, discipline, and hard work he could better his lot in life,..

  Identify the major steps involved in the data file

Identify the major steps involved in the data file update process, and identify which of the steps can be performed using scripting

  Describing a failed is implementation project

Find an online article describing a failed IS implementation project. As you read the article make a note of the reasons given for the project failure, classifying them as technological (hardware/software did not work, etc.) or organizational (cu..

  Explain the impact if the attack or threat was actualized

Explain the impact if the attack or threat was actualized (happened). Would there be a monetary loss? Loss of confidence (in the event of a business breach).

  List three universities that provide graduate education

What do IT auditors do? What are their roles and areas of responsibilities? List three universities that provide graduate education in this field.

  Explain about end-user development tools

End-user development tools - The pitfalls of the end-user development tools can sometimes outweigh its advantages. Do you agree?

  Developing a secure information system

Your boss is asking each engineer from all departments to come up with the one or two sources of network threats and attacks you consider the most critical and why

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd