• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Sys & Infrast Lifecycle Mngt 1

Information Technology Audit and Cybersecurity, Temple University

Sys & Infrast Lifecycle Mngt 1

MIS 5203.001 ■ Spring 2020 ■ Wade Mackey
  • Home
  • Syllabus
    • Gradebook
  • Announcements
  • Course Work
    • 1 – Intro/SDLC
    • Planning
      • 2 – Prjct Mngmt & Governance
      • 3 – Business Case & Feasibility
    • Analysis
      • 4 – Requirements Determination
      • 5 – Process Modeling
      • 6 – Data Modeling
      • 7 -Test One
    • Design
      • 10 – HCI (UI)
      • 8 – Database
      • 9 – Software
      • 11 – Test Two
    • Implementation
      • 12 – Architecture
      • 13 – Development & Testing
      • 14 – Migration & Deployment
      • Test 3: Implementation
  • Projects
    • Project 1: Business Case Development
    • Project 2: SDLC
    • Project 3: Systems Design
    • Project 4: Process Re-engineering
    • Project 5: Controls

4 – Requirements Determination

“Systems analysis is the part of the systems development life cycle in which you determine how the current information system functions and assess what users would like to see in a new system. Analysis has two subphases: requirements determination and requirements structuring. In this chapter, you will learn about determining system requirements. Techniques used in requirements determination have evolved over time to become more structured and increasingly rely on computer support. We will first study the more traditional requirements determination methods, including interviewing, observing users in their work environment, and collecting procedures and other written documents.”  (Modern Systems Analysis and Design, 8th ed, Joseph Valacich)

Objectives:

  • describe options for designing and conducting interviews and develop a plan for conducting an interview to determine system requirements,
  • explain the advantages and pitfalls of observing workers and analyzing business documents to determine system requirements,
  • explain how computing can provide support for requirements determination,
  • participate in and help plan a Joint Application Design session,
  • use prototyping during requirements determination,
  • describe contemporary approaches to requirements determination, and
  • understand how requirements determination techniques apply to the development of electronic commerce applications.

Topics:

From Modern Systems Analysis and Design:

6. Determining System Requirements
6.1. Process
6.1.1. Deliverables and Outcomes
6.2. Methods
6.2.1. Interviews
6.2.2. Observation
6.2.3. Artifacts
6.2.4. JAD
6.2.5. Prototyping
6.3. BPR

From CISA:

3.1. System Development Methodologies SDLC Phases
3.1.1.1. Requirements Definition

From Secure Software Design:

1.1. Security Requirements Planning
1.1.1. Functional and Non-Functional Security

In this unit, plan to:

  • Participate in the class discussion thread
  • Read the assigned topics in CISA
  • Read selected readings from Secure Software Design
  • Read chapter 6 in Modern Systems Analysis and Design

Primary Sidebar

RECENT ANNOUNCEMENTS

“School District reports a 334% hike in cybersecurity insurance costs”

A school district in Chicago released details on its cyber-insurance, from … [More...] about “School District reports a 334% hike in cybersecurity insurance costs”

“Security Flaws Seen in China’s Mandatory Olympics App for Athletes”

The article I read this week was from the New York Times, and it describes … [More...] about “Security Flaws Seen in China’s Mandatory Olympics App for Athletes”

“‘Preparation, not panic’: Top US cyber official asks Americans to look out for Russian hacking efforts”

by Sean Lyngaas 3/26/22 To summarize this article, the United States … [More...] about “‘Preparation, not panic’: Top US cyber official asks Americans to look out for Russian hacking efforts”

Cisco Umbrella default SSH key allows theft of admin credentials

Cisco Umbrella default SSH key allows theft of admin credentials … [More...] about Cisco Umbrella default SSH key allows theft of admin credentials

The battle over end-to-end encryption

The BBC article, “The battle over end-to-end encryption, is news to … [More...] about The battle over end-to-end encryption

Hackers Using Device Registration Trick to Attack Enterprise with Lateral Phishing

This article explains the email-based social engineering of criminals to … [More...] about Hackers Using Device Registration Trick to Attack Enterprise with Lateral Phishing

[More Announcements...]

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University