Wednesday, December 4, 2019
Stakeholder Analysis and Natural Resource Management Free Samples
Question: Discuss about the Stakeholder Analysis and Natural Resource Management. Answer: Introduction: System Analyst is someone who is basically an information technology professional who has specialization in analyzing, designing and also implementing the information system. System Analyst analyzes the system and procedures that is already in work and making modifications to the existing system and identifies the new requirements that are needed for the system. System Analysts helps in solving the business problems through analysis and technologies. System Analyst helps in evaluating the business that is needed and also helps in identifying appropriate solutions and also looks after the design (Feldman et al., 2015). They are mainly responsible for evaluating the code and reviewing the script and also if necessary change the code according to the need. There are various roles that a system analyst has to follow like they need to identify and understand and make plan according to their understanding for any organization just to make sure that all new technical requirements are proper ly integrated with the existing systems and if not then trying to make the changes. The second is that they are also responsible for planning a system flow right from the very basic. They also need to interact with internal users and customers as well as they need to have a deep knowledge about the software architecture and should have a good sense of software limitations (Rich Waters, 2014). They also need to help the programmers when the system is being deployed and provide them with all the necessary materials like use cases, flow chart and many more. System Analysts plays a major role when any software is being deployed as they need to design all the components and inform the developers about the system design. Identifying the stakeholders involved in system requirements There are various stakeholders who are closely related when it comes to system requirements. The first one is the Users as they will be in continuous touch with the system and they are the ones who will be using the application from beginning till the end. It is up to the users what they like and what they do not, what they would like to have included and what they want to remove. Users are very basic part when it comes to system requirements as every application according to them. An application will fail or pass strongly depends on the users reaction (Catahan Jr et al., , 2014). Every application should be made so as to make their work more simple and easy to work with. The second stakeholders are the Developers who aids in developing these applications for the users. They develop these applications according to the requirements and needs that any user asks for. They also help in updating the application from time to time so as to include new features and are also they look after t he application if they are working properly or not. They are also responsible for making the application quite secure so that users can do their work with ease (McMurtrey, 2013). The third is Legislators as they are responsible for laying down some of the rules and regulations that the developers need to follow while developing the application for the users. These guidelines are meant for the safe working of the application. These rules and regulations can be local or even include the government. The last one is Decision Makers who are responsible for making the decisions when the system is under development (Chevalier, 2016). These kinds of stakeholders mainly include the managers of the development team, user managers and also the financial controllers when it comes to developer and organization users. Kind of information that is required for the model system upgrade requirements For this, DFD or Data Flow Diagram is considered which is basically a graphical structural analysis the helps in describing all the external system sources and also helps in describing the logical functions, data flows and access of data is also possible. Data Flow Diagram mainly helps in visualizing the working of the application and which attributes will the main factor and how they will interact with each other. The main goal of DFD is to show the relationships between the processes and also gives an idea about how each process will convert their input into outputs. This is done so to make the systems description more clear and easy to understand for every level of detail. DFD mainly consists of three levels where all the processes are decomposed on the structural components (Ajaykumar Prasad, 2014). Data Flow Diagram helps in showing the flow of data that will be occurring within the application. DFD can be used to upgrade the systems also as with DFD, developers can get a rough idea about how the data will flow and what new attributes will be required before implementing or changing the system. Functional and non-functional requirements for the system upgrade Functional and Non-Functional requirements needs to selected carefully to make sure that they make sense when the final outcome of the project comes and this needs to be conveyed to all the team members who are working over the same project. Authentication is very much important when it comes to application as there are very confidential data present within the application which should be kept safe from any prying eyes and also this makes sure that no one can access these data without proper authorization. Authorization Levels are also quite important as this should be limited to managers and higher officials only as if the authorization level is given to the employees, they might make some error for which the companies have to face problems in the long run. Reporting Requirements are also quite important as in this all the requirements are mentioned that it would be required for making the application (Wiegers Beatty, 2013). Reliability is a main factor that that every user wants from any application and the developers needs to make the application reliable as much as possible so that the work of the users becomes easy (Chung et al., 2012). Security is also an important factor that users prioritize as they save all their personal information or any business related information within the application. The developer needs to make sure that the security is strong enough and no one can enter the application without proper authorization (Chung et al., 2012). References Ajaykumar, S. D., Prasad, M. S. (2014). Transforming data flow diagram to use case diagram.International Journal of Management, IT and Engineering,4(1), 561. Catahan Jr, N. B., Kale, S. P., Garg, S., Leon, M. T. B., Sundararajan, R. (2014).U.S. Patent No. 8,762,415. Washington, DC: U.S. Patent and Trademark Office. Chevalier, J. M. (2016). Stakeholder analysis and natural resource management. Chung, L., Nixon, B. A., Yu, E., Mylopoulos, J. (2012).Non-functional requirements in software engineering(Vol. 5). Springer Science Business Media. Feldman, D., Barbose, G., Margolis, R., Bolinger, M., Chung, D., Fu, R., ... Wiser, R. (2015). Photovoltaic System Pricing Trends. McMurtrey, M. (2013). A case study of the application of the systems development life cycle (sdlc) in 21st century health care: Something old, something new?.Journal of the Southern Association for Information Systems,1(1).) Rich, C., Waters, R. C. (Eds.). (2014).Readings in artificial intelligence and software engineering. Morgan Kaufmann. Wiegers, K., Beatty, J. (2013).Software requirements. Pearson Education.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.