• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Sys & Infrast Lifecycle Mngt 1

Information Technology Audit and Cybersecurity, Temple University

Sys & Infrast Lifecycle Mngt 1

MIS 5203.001 ■ Spring 2021 ■ Wade Mackey
  • Home
  • Syllabus
    • Gradebook
  • Announcements
  • Course Work
    • 1 – Intro/SDLC
    • Planning
      • 2 – Prjct Mngmt & Governance
      • 3 – Business Case & Feasibility
    • Analysis
      • 4 – Requirements Determination
      • 5 – Process Modeling
      • 6 – Data Modeling
      • 7 -Test One
    • Design
      • 10 – HCI (UI)
      • 8 – Database
      • 9 – Software
      • 11 – Test Two
    • Implementation
      • 12 – Architecture
      • 13 – Development & Testing
      • 14 – Migration & Deployment
      • Test 3: Implementation
  • Projects
    • Project 1: Business Case Development
    • Project 2: SDLC
    • Project 3: Systems Design
    • Project 4: Process Re-engineering
    • Project 5: Controls

5 – Process Modeling

“Data flow diagrams enable you to model how data flow through an information system, the relationships among the data flows, and how data come to be stored at specific locations. Data flow diagrams also show the processes that change or transform data. Because data flow diagrams concentrate on the movement of data between processes, these diagrams are called process models .”  (Modern Systems Analysis and Design, 8th ed, Joseph Valacich)

Objectives:

  • understand the logical modeling of processes by studying examples of data flow diagrams,
  • draw data flow diagrams following specific rules and guidelines that lead to accurate and well-structured process models,
  • decompose data flow diagrams into lower-level diagrams,
  • balance higher-level and lower-level data flow diagrams,
  • use data flow diagrams as a tool to support the analysis of information systems,
  • discuss process modeling for electronic commerce applications, and
  • use decision tables to represent the logic of choice in conditional statements.

Topics:

From Modern Systems Analysis and Design:

7. Structured System Process Requirements
7.1. Process Modeling
7.1.1. Data Flow Diagraming
7.1.2. Decision Modeling

From CISA:

3.1. System Development Methodologies
SDLC Phases
3.1.1.1. Acquisition
3.1.1.1.1. Design
3.1.1.1.1.1. Structured Techniques

From Secure Software Design:

1.2. Vulnerability Mapping
1.2.1. The Misuse Case
1.2.2. Diagramming Sensitive Dataflows
1.2.3. Data Diagramming and the Trust Boundary

In this unit, plan to:

  • Participate in the class discussion thread
  • Read the assigned topics in CISA
  • Read selected readings from Secure Software Design
  • Read chapter 7 in Modern Systems Analysis and Design

Primary Sidebar

RECENT ANNOUNCEMENTS

Week 14 Implementation Plan Risks – Prince Patel

What Are the Risks of an Implementation Plan? As is the case with any … [More...] about Week 14 Implementation Plan Risks – Prince Patel

Week 13 Smoke Testing- Prince Patel

Smoke Testing Smoke testing is performed on the ‘new’ build given by … [More...] about Week 13 Smoke Testing- Prince Patel

Week 12 (FaaS) Function as a Service! – Prince Patel

You all must have heard IaaS, PaaS & SaaS. But let me introduce you to … [More...] about Week 12 (FaaS) Function as a Service! – Prince Patel

Week 10 What is Guerrilla Usability Testing? – Prince Patel

Guerrilla testing In guerrilla testing, test subjects are chosen … [More...] about Week 10 What is Guerrilla Usability Testing? – Prince Patel

Week 9 Dev-ops Software Development Methodology – Prince Patel

DevOps development methodology DevOps is not just a development … [More...] about Week 9 Dev-ops Software Development Methodology – Prince Patel

Week 8 Database Design Steps – Prince Patel

How to Design Database: Steps of Designing Database Database designing … [More...] about Week 8 Database Design Steps – Prince Patel

[More Announcements...]

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University