Lecture 10 analysis design and implementation
Download
1 / 54

Lecture 10: Analysis, Design and Implementation - PowerPoint PPT Presentation


  • 66 Views
  • Uploaded on

Lecture 10: Analysis, Design and Implementation. B1 – Strategic and tactical tools for e-business Philip Holst Center for applied ICT Copenhagen Business School. Analysis. Learning outcomes. Summarize approaches for analysing requirements for e-business systems. Management issues.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Lecture 10: Analysis, Design and Implementation' - lerato


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Lecture 10 analysis design and implementation

Lecture 10:Analysis, Design and Implementation

B1 – Strategic and tactical tools for e-business

Philip Holst

Center for applied ICT

Copenhagen Business School



Learning outcomes
Learning outcomes

  • Summarize approaches for analysing requirements for e-business systems


Management issues
Management issues

  • Understanding processes and information flows to improve service delivery

  • What are the critical success factors for analysis and design of e-business systems?

  • What is the balance between requirements for usable and secure systems and the costs of designing them in this manner?


Workflow management
Workflow management

  • “the automation of a business process, in whole or part during which documents, information or tasks are passed from one participant to another for action, according to a set of procedural rules”

  • WfMC (1996)

  • Administrative workflow

  • Production workflows


Typical functions in workflow management
Typicalfunctions in workflow management

  • Assigning tasks to people

  • Reminding people of their tasks and the sequence they should be performed in

  • Allowing collaboration between people sharing tasks

  • Retrieve information needed for performing tasks

  • Providing managers with an overview of the status of each task


Process modeling
Processmodeling

  • the processes and their constituent sub-processes

  • the dependencies between processes

  • the inputs (resources) needed by the processes and the outputs


Examples of process modelling
Examples of processmodelling


Examples of process modeling
Examples of processmodeling


Event driven modelling
Event-driven modelling


Ressource events agents rea model
Ressource, events, agents (REA) model

  • Proposed by William E. McCarthy in 1982 as an accounting system for the computer age

  • goods, services or money, i.e., RESOURCES

  • business transactions or agreements that affect resources, i.e., EVENTS

  • people or other human agencies (other companies, etc.), i.e., AGENTS


Rich pictures
Richpictures


Use case modeling
Use-casemodeling

  • Analysis from the useperspective.

  • Identifying the actorswhointeractwith the system

  • Describing scenarios of use and linkingactors to use-cases


The microsoft customer model people and departments
The Microsoft Customer Model – people and departments


The microsoft customer model departments and work
The Microsoft Customer Model – departments and work


The microsoft customer model personas roles
The Microsoft Customer Model – personas (roles)


Data modeling
Data modeling

  • Identifying:

  • Entities – the groupings in the domain

  • Attributes – the characteristics of the entities

  • Relationships – the connection between entities


Data modeling1
Data modeling



Learning outcomes1
Learningoutcomes

Identify key elements of approaches to improve the interface design and security design of e-commerce systems.


The online customer experience
The online customerexperience

Your competitors website is just one click away!


Approches to design
Approches to design

  • Participatory Design

  • Contextual design

  • Human-centered design processes for interactive systems (ISO 13407 Model, 1999)


Usability
Usability

”An engineering approach to web design to ensure the user interface of the site is learnable, memorable, error free, efficient, and gives user satisfaction. It incorporates testing and evaluation to ensure the best use of navigation and links to access information in the shortest possible time. A companion process to information architecture.”

(Jakob Nielsen, 2000)


Goals for usability
Goals for usability

(Sharp et al. 2007)

  • Effective to use

  • Efficient to use

  • Safe to use

  • Easy to learn

  • Easy to remember

  • Good utility


Some usability design principles
Someusability design principles

(Nielsen 2001)

  • Visibility of system status

  • Match between system and the real world

  • User control and freedom

  • Consistency and standards

  • Help users recognize, diagnose and recover from errors

  • Error prevention

  • Recognition rather than recall

  • Flexibility and efficiency of use

  • Aesthetic and minimalist design

  • Help and documentation


Information architecture card sorting
Information architecture - Cardsorting


Information architecture sitemaps
Information architecture - sitemaps


Accessibility
Accessibility

  • Size of display

  • Type of browser

  • Resolution

  • Mobile acces


Different elements of online customer experience
Different elements of online customerexperience


Security types of attacks
Security – types of ”attacks”

  • Malware

  • Phishing

  • Denial-of-service (DoS) attack

  • Virus

  • Hacking


Security countermeasures
Security - countermeasures

  • Information security management systems

  • Antivirus

  • Firewall

  • Encryption

  • Information security policy

  • Security standards (e.g.ISO 17799)

  • Ethical hacker (White hat hackers)


Security secure transactions
Security - Securetransactions

  • SecureSocketLayer (SSL)

  • Virtual Private Network (VPN)

  • Digital signatures

  • Certificates (e.g. Verisign)




Learning outcomes2
Learningoutcomes

  • Produce a plan to minimize the risks involved with the launch phase of an e-business application

  • Define a process for the effective maintenance of an e-business system

  • Create a plan to measure the effectiveness of an e-business application


Management issues1
Management issues

  • What actions can we take to minimize the risks during implementation?

  • What are the critical success factors?

  • How do we transition from previous systems to a new e-business system?

  • What techniques are available to measure the success of our implementation?


Technical implementation issues
Technicalimplementationissues

  • Acquisition techniques

  • Site implementation tools

  • Content management and updating

  • Localization

  • System changeover

  • Evaluation and monitoring



Implementation approaches the iterative approach
Implementationapproaches - The iterative approach


Microsoft surestep implementation methodology
Microsoft SureStepimplementationmethodology


Acquisition methods
Acquisitionmethods

  • In-housedevelopment (Bespokedevelopment)

  • Highlytailored solution

  • Customized standard packaged solution (Off-the-shelf)

  • Hosted

  • E-commerce servers


Common web development applications and frameworks
Common web developmentapplications and frameworks

A survey of the application frameworks used by Fortune 1000 companies in 2007Source: Port80 software (www.port80software.com/surveys/top1000appservers)



Usability evaluation
Usabilityevaluation

  • Examples of usability evaluation methods

  • Expert reviews

  • Heuristics

  • Usability evaluation

  • Examples of dimensions of usability evaluation

  • Effectiveness – can the users complete their tasks correctly and completely?

  • Productivity (Efficiency) – are tasks completed in an acceptable time?

  • Satisfaction – are the users satisfied with the interaction


Go live methods
Go-livemethods


Content management system cms
Content management system (CMS)

  • Helpseasyauthoring

  • Publicationworkflow

  • Versioning

  • Tracking and monitoring


Example of a lenghty content update review process
Example of a (lenghty) contentupdatereviewprocess


Performance measurement
Performance measurement

”the process of quantifying the efficiency and effectiveness of past actions throughacquisition, collation, sorting, analysis, interpretation and dissemination of appropriate data”

Neely et al. (2002)


Performance measurement process
Performance measurementprocess


Common measurements
Commonmeasurements

  • Uniquevisitors

  • Visits

  • Page impression

  • Ad impressions

  • Ad clicks



Tools for performance measurements
Tools for performance measurements

  • Oftenembedded in the webserver

  • Googleanalytics


Sum up
Sum up

  • Analysis and Design

  • Summarize approaches for analysing requirements for e-business systems

  • Identify key elements of approaches to improve the interface design and security design of e-commerce systems.

  • Implementation

  • Produce a plan to minimize the risks involved with the launch phase of an e-business application

  • Define a process for the effective maintenance of an e-business system

  • Create a plan to measure the effectiveness of an e-business application



ad