Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Summary

Summary Information Communication Technology

Rating
-
Sold
-
Pages
8
Uploaded on
30-06-2023
Written in
2022/2023

The students are expected to demonstrate higher order thinking that goes beyond mechanically recalling or reporting facts, concepts or theories regarding Information Systems Analysis, Design and Engineering. The response should demonstrate deep understanding of concepts and theories, and how they relate to their own experience. Citations from the literature and the use of paraphrasing or quotations from major authors to support your explanations are required. 1. James is a systems analyst on a new account management system for Hometown National Bank. At a recent meeting with the project sponsor, James learned about some new ideas for the system that were not a part of the original project scope. Specifically, the bank’s marketing director has asked that some of the data that will be collected by the new system from customers who open new checking and savings accounts also be used as the basis of a marketing campaign for various loan products the bank offers. James is uncomfortable with the request. He is not sure the bank has the right to use a person’s data for purposes other than the original intent. a. Who “owns” this data, the bank that collected it as a part of a customer opening an account, or the customer who the data describes? - -customer opening the account whom data describes b. Should James insist that the customers give authorization to use “their” data in this way? Or should he say nothing and ignore the issue? -- James should insist. He may use RA 10173, or the Data Privacy Act to support his idea. RA 10173 protects individuals from unauthorized processing of personal information that is (1) private, not publicly available; and (2) identifiable, where the MID TERM EXAM R I Z A L T E C H N O L O G I C A L U N I V E R S I T Y Cities of Mandaluyong and Pasig ICT-CS13 2 identity of the individual is apparent either through direct attribution or when put together with other available information. Besides, it is important for analysts to maintain confidence and trust with all people. c. Is it necessary (or appropriate) for a systems analyst to be an ethical watchdog in a systems development project? Why or why not? - Yes, because that is one of the attributed a systems analyst should have. 2. Travelers Insurance Company of Hartford, Connecticut has adopted agile development methodologies. The insurance field can be competitive, and Travelers wanted to have the shortest “time to implement” in the field. Travelers set up development teams of six people—two systems analysts, two representatives from the user group (such as claim services), a project manager, and a clerical support person. In the agile approach, the users are physically assigned to the development team for the project. While at first it might seem that the users are just sitting around drinking coffee and not doing their regular jobs, that is not the case. The rapport that is developed within the team allows for instant communication. The interaction is very deep and profound. The resulting software product is delivered quickly—and, generally, with all the features and nuances that the users wanted. QUESTIONS: a. Could this be done differently, such as through JAD sessions or having the users review the program on a weekly basis, rather than taking the users away from their real jobs to work on development? - Joint application design is used to collect business requirements while developing information systems for a business. JAD technique brings together the IT and business community in a workshop where a consensus is to be reached. JAD processes enhance participation, development and improvement of the quality of specifications. Travelers Insurance Company of Hartford could use JAD design to develop its insurance. Through JAD, IT analysts and specialist problems that may occur between parties in the information system. JAD process...

Show more Read less
Institution
Course

Content preview

R I Z A L T E C H N O L O G I C A L U N I V E R S I T Y Cities
of Mandaluyong and Pasig




MIDTERM EXAM



The students are expected to demonstrate higher order thinking that goes
beyond mechanically recalling or reporting facts, concepts or theories regarding
Information Systems Analysis, Design and Engineering. The response should
demonstrate deep understanding of concepts and theories, and how they relate to
their own experience. Citations from the literature and the use of paraphrasing or
quotations from major authors to support your explanations are required.




1. James is a systems analyst on a new account management system for
Hometown National Bank. At a recent meeting with the project sponsor,
James learned about some new ideas for the system that were not a part of
the original project scope. Specifically, the bank’s marketing director has
asked that some of the data that will be collected by the new system from
customers who open new checking and savings accounts also be used as
the basis of a marketing campaign for various loan products the bank offers.
James is uncomfortable with the request. He is not sure the bank has the
right to use a person’s data for purposes other than the original intent.
a. Who “owns” this data, the bank that collected it as a part of a customer
opening an account, or the customer who the data describes?


- -customer opening the account whom data describes


b. Should James insist that the customers give authorization to use
“their” data in this way? Or should he say nothing and ignore the
issue?
-- James should insist. He may use RA 10173, or the Data Privacy Act to support his
idea. RA 10173 protects individuals from unauthorized processing of personal
information that is (1) private, not publicly available; and (2) identifiable, where the



ICT-CS13 1

, R I Z A L T E C H N O L O G I C A L U N I V E R S I T Y Cities
of Mandaluyong and Pasig


identity of the individual is apparent either through direct attribution or when put
together with other available information. Besides, it is important for analysts to
maintain confidence and trust with all people.
c. Is it necessary (or appropriate) for a systems analyst to be an ethical
watchdog in a systems development project? Why or why not?
- Yes, because that is one of the attributed a systems analyst should
have.


2. Travelers Insurance Company of Hartford, Connecticut has adopted agile
development methodologies. The insurance field can be competitive, and
Travelers wanted to have the shortest “time to implement” in the field.
Travelers set up development teams of six people—two systems analysts,
two representatives from the user group (such as claim services), a project
manager, and a clerical support person. In the agile approach, the users are
physically assigned to the development team for the project. While at first it
might seem that the users are just sitting around drinking coffee and not
doing their regular jobs, that is not the case. The rapport that is developed
within the team allows for instant communication. The interaction is very
deep and profound. The resulting software product is delivered quickly—and,
generally, with all the features and nuances that the users wanted.
QUESTIONS:
a. Could this be done differently, such as through JAD sessions or having
the users review the program on a weekly basis, rather than taking the
users away from their real jobs to work on development?


- Joint application design is used to collect business requirements while developing
information systems for a business. JAD technique brings together the IT and business
community in a workshop where a consensus is to be reached. JAD processes
enhance participation, development and improvement of the quality of specifications.
Travelers Insurance Company of Hartford could use JAD design to develop its
insurance. Through JAD, IT analysts and specialist problems that may occur between
parties in the information system. JAD process significantly reduces errors, costs and



ICT-CS13 2

Written for

Course

Document information

Uploaded on
June 30, 2023
Number of pages
8
Written in
2022/2023
Type
SUMMARY

Subjects

$8.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LearnWithLeo Havard college
Follow You need to be logged in order to follow users or courses
Sold
2595
Member since
2 year
Number of followers
13
Documents
6157
Last sold
2 days ago

4.8

218 reviews

5
195
4
15
3
5
2
2
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions