The students are expected to demonstrate higher order thinking that goes
beyond mechanically recalling or reporting facts, concepts or theories regarding
Information Systems Analysis, Design and Engineering. The response should
demonstrate deep understanding of concepts and theories, and how the...
R I Z A L T E C H N O L O G I C A L U N I V E R S I T Y Cities
of Mandaluyong and Pasig
MIDTERM EXAM
The students are expected to demonstrate higher order thinking that goes
beyond mechanically recalling or reporting facts, concepts or theories regarding
Information Systems Analysis, Design and Engineering. The response should
demonstrate deep understanding of concepts and theories, and how they relate to
their own experience. Citations from the literature and the use of paraphrasing or
quotations from major authors to support your explanations are required.
1. James is a systems analyst on a new account management system for
Hometown National Bank. At a recent meeting with the project sponsor,
James learned about some new ideas for the system that were not a part of
the original project scope. Specifically, the bank’s marketing director has
asked that some of the data that will be collected by the new system from
customers who open new checking and savings accounts also be used as
the basis of a marketing campaign for various loan products the bank offers.
James is uncomfortable with the request. He is not sure the bank has the
right to use a person’s data for purposes other than the original intent.
a. Who “owns” this data, the bank that collected it as a part of a customer
opening an account, or the customer who the data describes?
- -customer opening the account whom data describes
b. Should James insist that the customers give authorization to use
“their” data in this way? Or should he say nothing and ignore the
issue?
-- James should insist. He may use RA 10173, or the Data Privacy Act to support his
idea. RA 10173 protects individuals from unauthorized processing of personal
information that is (1) private, not publicly available; and (2) identifiable, where the
ICT-CS13 1
, R I Z A L T E C H N O L O G I C A L U N I V E R S I T Y Cities
of Mandaluyong and Pasig
identity of the individual is apparent either through direct attribution or when put
together with other available information. Besides, it is important for analysts to
maintain confidence and trust with all people.
c. Is it necessary (or appropriate) for a systems analyst to be an ethical
watchdog in a systems development project? Why or why not?
- Yes, because that is one of the attributed a systems analyst should
have.
2. Travelers Insurance Company of Hartford, Connecticut has adopted agile
development methodologies. The insurance field can be competitive, and
Travelers wanted to have the shortest “time to implement” in the field.
Travelers set up development teams of six people—two systems analysts,
two representatives from the user group (such as claim services), a project
manager, and a clerical support person. In the agile approach, the users are
physically assigned to the development team for the project. While at first it
might seem that the users are just sitting around drinking coffee and not
doing their regular jobs, that is not the case. The rapport that is developed
within the team allows for instant communication. The interaction is very
deep and profound. The resulting software product is delivered quickly—and,
generally, with all the features and nuances that the users wanted.
QUESTIONS:
a. Could this be done differently, such as through JAD sessions or having
the users review the program on a weekly basis, rather than taking the
users away from their real jobs to work on development?
- Joint application design is used to collect business requirements while developing
information systems for a business. JAD technique brings together the IT and business
community in a workshop where a consensus is to be reached. JAD processes
enhance participation, development and improvement of the quality of specifications.
Travelers Insurance Company of Hartford could use JAD design to develop its
insurance. Through JAD, IT analysts and specialist problems that may occur between
parties in the information system. JAD process significantly reduces errors, costs and
ICT-CS13 2
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller stephanvdb04. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.