• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Sys & Infrast Lifecycle Mngt 1

Information Technology Audit and Cybersecurity, Temple University

Sys & Infrast Lifecycle Mngt 1

MIS 5203.001 ■ Spring 2020 ■ Wade Mackey
  • Home
  • Syllabus
    • Gradebook
  • Announcements
  • Course Work
    • 1 – Intro/SDLC
    • Planning
      • 2 – Prjct Mngmt & Governance
      • 3 – Business Case & Feasibility
    • Analysis
      • 4 – Requirements Determination
      • 5 – Process Modeling
      • 6 – Data Modeling
      • 7 -Test One
    • Design
      • 10 – HCI (UI)
      • 8 – Database
      • 9 – Software
      • 11 – Test Two
    • Implementation
      • 12 – Architecture
      • 13 – Development & Testing
      • 14 – Migration & Deployment
      • Test 3: Implementation
  • Projects
    • Project 1: Business Case Development
    • Project 2: SDLC
    • Project 3: Systems Design
    • Project 4: Process Re-engineering
    • Project 5: Controls

3 – Business Case & Feasibility

“The acquisition, development, and maintenance of information systems consume substantial resources for most organizations. This suggests that organizations can benefit from following a formal process for identifying and selecting projects. The first phase of the systems development life cycle—project identification and selection—deals with this issue. In the next section, you will learn about a general method for identifying and selecting projects and the deliverables and outcomes from this process. This is followed by brief descriptions of corporate strategic planning and information systems planning, two activities that can greatly improve the project identification and selection process.”  (Modern Systems Analysis and Design, 8th ed, Joseph Valacich)

Objectives:

  • describe the project identification and selection process,
  • describe the corporate strategic planning and information systems planning process, and
  • describe the three classes of Internet electronic commerce applications: business- to-consumer, business-to-employee, and business-to-business.

Topics:

From Modern Systems Analysis and Design:

4. Identifying and Selecting Projects
4.1. Process
4.2. Deliverables
4.3. Corporate Strategic Planning
4.4. Information Systems Planning
5. Initiating and Planning Systems Development Projects
5.1. Deliverables and Outcomes
5.1.1. Baseline Project Plan
5.2. Feasibility Analysis
5.2.1. Economic
5.2.1.1. NPV
5.2.1.2. ROI
5.2.2. Technical
5.2.3. Other Feasibility

From CISA:

3.2. Business Case and Feasibility Analysis
3.2.1. Auditor’s Role in Business Case Development
3.3.3. SDLC Phases
3.3.3.1. Feasibility

In this unit, plan to:

  • Participate in the class discussion thread
  • Read the assigned topics in CISA
  • Read chapter 4 in Modern Systems Analysis and Design

Primary Sidebar

RECENT ANNOUNCEMENTS

“School District reports a 334% hike in cybersecurity insurance costs”

A school district in Chicago released details on its cyber-insurance, from … [More...] about “School District reports a 334% hike in cybersecurity insurance costs”

“Security Flaws Seen in China’s Mandatory Olympics App for Athletes”

The article I read this week was from the New York Times, and it describes … [More...] about “Security Flaws Seen in China’s Mandatory Olympics App for Athletes”

“‘Preparation, not panic’: Top US cyber official asks Americans to look out for Russian hacking efforts”

by Sean Lyngaas 3/26/22 To summarize this article, the United States … [More...] about “‘Preparation, not panic’: Top US cyber official asks Americans to look out for Russian hacking efforts”

Cisco Umbrella default SSH key allows theft of admin credentials

Cisco Umbrella default SSH key allows theft of admin credentials … [More...] about Cisco Umbrella default SSH key allows theft of admin credentials

The battle over end-to-end encryption

The BBC article, “The battle over end-to-end encryption, is news to … [More...] about The battle over end-to-end encryption

Hackers Using Device Registration Trick to Attack Enterprise with Lateral Phishing

This article explains the email-based social engineering of criminals to … [More...] about Hackers Using Device Registration Trick to Attack Enterprise with Lateral Phishing

[More Announcements...]

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University