Lecture 10 analysis design and implementation
This presentation is the property of its rightful owner.
Sponsored Links
1 / 54

Lecture 10: Analysis, Design and Implementation PowerPoint PPT Presentation


  • 40 Views
  • Uploaded on
  • Presentation posted in: General

Lecture 10: Analysis, Design and Implementation. B1 – Strategic and tactical tools for e-business Philip Holst Center for applied ICT Copenhagen Business School. Analysis. Learning outcomes. Summarize approaches for analysing requirements for e-business systems. Management issues.

Download Presentation

Lecture 10: Analysis, Design and Implementation

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Lecture 10 analysis design and implementation

Lecture 10:Analysis, Design and Implementation

B1 – Strategic and tactical tools for e-business

Philip Holst

Center for applied ICT

Copenhagen Business School


Analysis

Analysis


Learning outcomes

Learning outcomes

  • Summarize approaches for analysing requirements for e-business systems


Management issues

Management issues

  • Understanding processes and information flows to improve service delivery

  • What are the critical success factors for analysis and design of e-business systems?

  • What is the balance between requirements for usable and secure systems and the costs of designing them in this manner?


Workflow management

Workflow management

  • “the automation of a business process, in whole or part during which documents, information or tasks are passed from one participant to another for action, according to a set of procedural rules”

  • WfMC (1996)

  • Administrative workflow

  • Production workflows


Typical functions in workflow management

Typicalfunctions in workflow management

  • Assigning tasks to people

  • Reminding people of their tasks and the sequence they should be performed in

  • Allowing collaboration between people sharing tasks

  • Retrieve information needed for performing tasks

  • Providing managers with an overview of the status of each task


Process modeling

Processmodeling

  • the processes and their constituent sub-processes

  • the dependencies between processes

  • the inputs (resources) needed by the processes and the outputs


Examples of process modelling

Examples of processmodelling


Examples of process modeling

Examples of processmodeling


Event driven modelling

Event-driven modelling


Ressource events agents rea model

Ressource, events, agents (REA) model

  • Proposed by William E. McCarthy in 1982 as an accounting system for the computer age

  • goods, services or money, i.e., RESOURCES

  • business transactions or agreements that affect resources, i.e., EVENTS

  • people or other human agencies (other companies, etc.), i.e., AGENTS


Rich pictures

Richpictures


Use case modeling

Use-casemodeling

  • Analysis from the useperspective.

  • Identifying the actorswhointeractwith the system

  • Describing scenarios of use and linkingactors to use-cases


The microsoft customer model people and departments

The Microsoft Customer Model – people and departments


The microsoft customer model departments and work

The Microsoft Customer Model – departments and work


The microsoft customer model personas roles

The Microsoft Customer Model – personas (roles)


Data modeling

Data modeling

  • Identifying:

  • Entities – the groupings in the domain

  • Attributes – the characteristics of the entities

  • Relationships – the connection between entities


Data modeling1

Data modeling


Design

Design


Learning outcomes1

Learningoutcomes

Identify key elements of approaches to improve the interface design and security design of e-commerce systems.


The online customer experience

The online customerexperience

Your competitors website is just one click away!


Approches to design

Approches to design

  • Participatory Design

  • Contextual design

  • Human-centered design processes for interactive systems (ISO 13407 Model, 1999)


Usability

Usability

”An engineering approach to web design to ensure the user interface of the site is learnable, memorable, error free, efficient, and gives user satisfaction. It incorporates testing and evaluation to ensure the best use of navigation and links to access information in the shortest possible time. A companion process to information architecture.”

(Jakob Nielsen, 2000)


Goals for usability

Goals for usability

(Sharp et al. 2007)

  • Effective to use

  • Efficient to use

  • Safe to use

  • Easy to learn

  • Easy to remember

  • Good utility


Some usability design principles

Someusability design principles

(Nielsen 2001)

  • Visibility of system status

  • Match between system and the real world

  • User control and freedom

  • Consistency and standards

  • Help users recognize, diagnose and recover from errors

  • Error prevention

  • Recognition rather than recall

  • Flexibility and efficiency of use

  • Aesthetic and minimalist design

  • Help and documentation


Information architecture card sorting

Information architecture - Cardsorting


Information architecture sitemaps

Information architecture - sitemaps


Accessibility

Accessibility

  • Size of display

  • Type of browser

  • Resolution

  • Mobile acces


Different elements of online customer experience

Different elements of online customerexperience


Security types of attacks

Security – types of ”attacks”

  • Malware

  • Phishing

  • Denial-of-service (DoS) attack

  • Virus

  • Hacking


Security countermeasures

Security - countermeasures

  • Information security management systems

  • Antivirus

  • Firewall

  • Encryption

  • Information security policy

  • Security standards (e.g.ISO 17799)

  • Ethical hacker (White hat hackers)


Security secure transactions

Security - Securetransactions

  • SecureSocketLayer (SSL)

  • Virtual Private Network (VPN)

  • Digital signatures

  • Certificates (e.g. Verisign)


Example rules triggered by e mail

Example rules triggered by e-mail


Implementation

Implementation


Learning outcomes2

Learningoutcomes

  • Produce a plan to minimize the risks involved with the launch phase of an e-business application

  • Define a process for the effective maintenance of an e-business system

  • Create a plan to measure the effectiveness of an e-business application


Management issues1

Management issues

  • What actions can we take to minimize the risks during implementation?

  • What are the critical success factors?

  • How do we transition from previous systems to a new e-business system?

  • What techniques are available to measure the success of our implementation?


Technical implementation issues

Technicalimplementationissues

  • Acquisition techniques

  • Site implementation tools

  • Content management and updating

  • Localization

  • System changeover

  • Evaluation and monitoring


Implementation approaches the waterfall model

Implementation approaches - The Waterfall model


Implementation approaches the iterative approach

Implementationapproaches - The iterative approach


Microsoft surestep implementation methodology

Microsoft SureStepimplementationmethodology


Acquisition methods

Acquisitionmethods

  • In-housedevelopment (Bespokedevelopment)

  • Highlytailored solution

  • Customized standard packaged solution (Off-the-shelf)

  • Hosted

  • E-commerce servers


Common web development applications and frameworks

Common web developmentapplications and frameworks

A survey of the application frameworks used by Fortune 1000 companies in 2007Source: Port80 software (www.port80software.com/surveys/top1000appservers)


Testing

Testing


Usability evaluation

Usabilityevaluation

  • Examples of usability evaluation methods

  • Expert reviews

  • Heuristics

  • Usability evaluation

  • Examples of dimensions of usability evaluation

  • Effectiveness – can the users complete their tasks correctly and completely?

  • Productivity (Efficiency) – are tasks completed in an acceptable time?

  • Satisfaction – are the users satisfied with the interaction


Go live methods

Go-livemethods


Content management system cms

Content management system (CMS)

  • Helpseasyauthoring

  • Publicationworkflow

  • Versioning

  • Tracking and monitoring


Example of a lenghty content update review process

Example of a (lenghty) contentupdatereviewprocess


Performance measurement

Performance measurement

”the process of quantifying the efficiency and effectiveness of past actions throughacquisition, collation, sorting, analysis, interpretation and dissemination of appropriate data”

Neely et al. (2002)


Performance measurement process

Performance measurementprocess


Common measurements

Commonmeasurements

  • Uniquevisitors

  • Visits

  • Page impression

  • Ad impressions

  • Ad clicks


Performance management levels

Performance management levels


Tools for performance measurements

Tools for performance measurements

  • Oftenembedded in the webserver

  • Googleanalytics


Sum up

Sum up

  • Analysis and Design

  • Summarize approaches for analysing requirements for e-business systems

  • Identify key elements of approaches to improve the interface design and security design of e-commerce systems.

  • Implementation

  • Produce a plan to minimize the risks involved with the launch phase of an e-business application

  • Define a process for the effective maintenance of an e-business system

  • Create a plan to measure the effectiveness of an e-business application


Lecture 10 analysis design and implementation

Questions?


  • Login