Information System Development: Identifying System Elements, Types And Hosting Options
Categorizing Information Based on Type
The main elements of the system that is used for the development of the information system should be identified and it includes the following:
- Input and Output
- Processor
- Control
- Feedback
- Environment
- Interface and boundaries
There are different types of system and it is divided into the following types such as:
- Abstract or physical systems
- Closed or open systems
- Adaptive and non-adaptive systems
- Temporary or permanent systems
- Manufactured and natural systems
- Probabilistic or deterministic systems
- Man-made information system
The gathered information should be categorized depending on its type such as strategic, managerial and operational information. Each type of information has its used for the different level of management team for development of DSS (Decision Support System), MIS (Management Information System) or DPS (Data Processing System).
Stand Alone
For the development of a stand alone system the inputs and outputs should be identified for processing the information and using the output for different process. The processor is the main element that transforms the inputs and outputs and controls the elements for functioning as a system component.
Networked
Different sub components should be linked with each other and connected with the network such that the data can flow between the different sub component for the management of the information. The modules should operate individually and fetch data from the data storage server for operating according to the requirement. The servers should be interconnected with each other for generating an accurate result of the querry and redundant links should be used for connection such that the data is not lost or no congestion occurs in the network.
Hosting Options
There are different hosting options available and selection of inhouse server or cloud servers is important for the success of the information system. For the information that are frequently uses the in house servers should be used and other information can be stored in the cloud storage for reducing the operating cost.
Cloud Infrastructure
The selection of the hardware and the software component should be analysed for the selection of the best infrastructure. The cloud computing model are used for management of the unpredictable changes and balancing the demand of accessing the resources.
The story board design is created with the application of different research techniques and arrangement of interviews and workshops. The stories of the user and their communication link should be identified for the development of the Adelaide Symphony Orchestra (ASO) ticket booking system. The storyboard provides a linear information sequence and helps in delivering the information following different meaning. It helps in prediction and exploration of the user experience for the management of the flow of the interaction of the people.
The storyboard helps is finding the approach used for designing the user interface for the information system and making it human centred. Priority is given on the important factors and with the application of pitch and critique method each of the designer contributes their idea for designing the interface. A simple iteration is followed for designing the story board and a sketch of each of the page of the design that would inspire the user to follow the design concept (Zeng & Shi, 2018). The navigation from the different pages of the story board is shown which the help of an arrow and it helps in elimination of the complexity of the users for navigating from the different pages and reach the destination page of the information system.
Identifying Standalone and Networked Systems
The story board helps in clarifying the concept of the information system for the user who have less idea about the working of the information system. For the development of the story board the user must have clear understanding and the information should be clearly conveyed such that the user does not face any difficulty while using the information system. Narration is used for each of the story board for focusing on the goal that is achieved for the development of the structure.
There are different security concern associated with the development of the information system and it can be determined based on the financial loss, business service, ethics, service and quality and interruption of the service. For the management of the security of the information system a computer security policy statement should be created and responsibility of the users should be assigned such that any user is accounted for the responsibility. Training should be given to the employees about the different security issues for the development of the information system (Honig, 2017). An IT security strategy should be created for the management of the challenges faced by the organization to meet their needs and the security issues and the disaster should be differentiated. The security of the information should be kept in control and the transaction should be recorded for identification of the vulnerability of the network. The increase in the cyber attacks and the competitive forces should be used for the prediction of the lawsuits and the security lapse. Security policy should be developed for the management of the software changes and distribution of the software for the management of the security risk regarding the leakage of sensitive information. With the advancement of the internet different business have created alliance with each other for maintaining relationship and management of the control (Dewar, 2017). A security survey should be conducted for the identification of the vulnerability of the current system and the configurations that can be done for the improvement of the security of the information system.
There are different network security tools that can be used for the analysing the vulnerability and the security configuration of the information system. The information system should be configured following the security needs and the network used for connecting the servers should be encrypted such that the data flowing through the different network is kept secured from the illegal users. Arrangement of ethical hacking training program can help in increase the awareness between the users and increase the level of security of the information system. The sensitive information should be prioritized and different security control practice should be formed for enforcement of desired security level. After the enforcement of the security policy the system must be tested with a group of friendly penetration testing team such that the reliability of the system is improved. The security threats acting n the system should be identified earlier and the respondent should be identified such that a conclusion should be drawn on the issues and application of the significant technology that can help in mitigation of the security issues action on the system. The level of concern for the security breach should be identified and all the systems should be installed with antivirus application for protecting the PC from virus, spam ware, trojan and malwares. The virus related problems should be identified for the mitigation of the risk and experts should be hired for handling the security breaches and modify the policy for meeting the current needs of the organization. The customer information and the payment information should be kept secured from external agents and the servers should be installed in DMZ zone from restricting the physical access.
Choosing the Best Hosting Options and Cloud Infrastructure
For the development of the project the selection of the project management methodology is important and it is important to manage the changes in the organization. The bottom up management is selected and the aims and objectives of the project is analysed for starting the project development. In the approach the team members are involved and their input is used for the execution of the different process of the project. The participation of the team members for each of the steps of the project is necessary for taking necessary decision regarding the changes and management of each of the activity. The decision taken by the whole team is used and it allows the manager for the communication of values and goals of the project. For designing the system the components should be identified and an architecture should be defined for the management of the different components. The system should be designed following a systematic design methodology and a bottom up approach is selected for the development of the information system for Adelaide Symphony Orchestra. For designing the component an analysis is done on the system components and the problems with the current system should be identified. Different problem solving techniques are applied for the accomplishment of the aims and objectives of the project.
The system is designed for replacing the current manual process and meeting the specific requirement of the users. The project plan is created after analysis of the old system for meeting the specific requirement of the organization. A structure or framework of the system should be created and its interdependence and interconnectivity between the different modules should be identified for meeting the objectives of the project. For designing the system components an analysis should be made on the system properties and the type of the system should be identified. A milestone and a project plan is created and the team members involved in the project development phases. The different phases of the project development includes a preliminary study on the system requirement, feasibility study, detailed study of the system, analysis of the system, designing of the system, coding of the functional modules, testing the codes and analysis of the errors and maintenance of the system. For the implementation of the system the acceptability of the user is important and the hardware and the software should be identified that is necessary for building the platform.
For the development of the information system the required software should be installed in the computers used for the development of the software and training should be provided to the team members for execution of the package, entering the data, processing the data and generating the user reports. The changes in the requirement of the project should be managed with the inclusion of the pilot run projects and comparing its results with the desired results. This can help in establishment of continuity and prepare a system documentation with the changes, description of the process, coding and the flow of the system information.
Dewar, R. S. (2017). The European Union and Cybersecurity: A Historiography of an Emerging Actor’s Response to a Global Security Concern: Rights, Power and Security. In Challenges and Critiques of the EU Internal Security Strategy(pp. 113-148). Cambridge Scholars Publishing.
Honig, B. (2017). The Moral and Ethical Implications of Framing Global Health as a Security Concern.
Mavridou, A., Baranov, E., Bliudze, S., & Sifakis, J. (2016). Architecture diagrams: A graphical language for architecture style specification. arXiv preprint arXiv:1608.03324.
Zeng, Q., & Shi, M. (2018, July). Story Board Tools and Methods for User-Knowledge-Based Automotive Human-Machine Interface Design. In International Conference on Cross-Cultural Design (pp. 108-119). Springer, Cham.