ࡱ>  zbjbjVV 7<<qpR R & 8?$~yb-"- -xxxxxxx${~#y-I-I-^- -#y8y111.x1-x11p )wsދ. s<xNy0~yEsR[/Rx)w)wR=w--1-----#y#y1---~y----R---------R [: CHAPTER 13: Acquiring Information Systems and Applications Chapter Outline 13.1 Planning for and Justifying IT Applications 13.2 Strategies for Acquiring IT Applications 13.3 The Traditional Systems Development Life Cycle 13.4 Alternative Methods and Tools for Systems Development 13.5 Vendor and Software Selection Learning Objectives Define an IT strategic plan, identify the three objectives it must meet, and describe the four common approaches to cost-benefit analysis. Discuss the four business decisions that companies must make when they acquire new applications. Identify the six processes involved in the systems development life cycle, and explain the primary tasks and importance of each process. Describe four alternative development methods and four tools that augment development methods, and identify at least one advantage and one disadvantage of each method and tool. Analyze the process of vendor and software selection. Teaching Tools and Tips This chapter discusses the process whereby an organization develops a new information system. I would suggest spending time discussing the opportunities and pitfalls of systems development. Among the key points is to ensure that students gain an appreciation for the human relations side of the process. Remind students that people are an extremely important component of any information system. Once a development project is underway, many people from different disciplines are involved in the effort. Emphasize that project management and communications skills are extremely important for this process to be successful. It is important that students understand that when companies are planning new information systems, sometimes the concerned parties hit a stone wall regarding development and implementation processes. Managers from different areas may have different (and often hidden) agendas for the new system. Some times these hidden agendas may not become apparent until it is too late. Spend some time describing how companies struggle to bring order to the system development life cycle (SDLC) process. In some cases companies actually allow their users to develop their own applications. Explain that these islands of information and private databases maintained by users must be integrated into a well-designed, enterprisewide information strategy. This is especially true in cases where IS failed to determine the applications that users should and should not develop, as well as the tools they should and should not use. Companies usually embark on a systematic development of information systems when they find out they are losing competitive advantage because they have an inefficient business process or no IS at all. In such cases, top management frequently initiates an impetus for change and throws their unwavering support behind the effort. Consequently, the project gets off to a great start. Unfortunately, this same sense of urgency causes project managers to take inappropriate shortcuts. It is imperative for top management to inform their employees that the project plan is the blueprint for successful development. A successful approach to systems development is to rely on modular methodology and to exercise sound technical judgment. The key to successful project completion, however, is human relations and communications techniques. Therefore, it is prudent to mix the study of information systems development with sociological and psychological topics! Review Questions  Section 13.1 Before you go on What are some problems associated with assessing the costs of IT? One problem is the allocation of fixed costs among different IT projects. Another difficulty is that system costs continue after the system is installed. It is important to calculate the Total Cost of Ownership a formula for calculating the cost of acquiring, operating, and controlling an IT system. What difficulties accompany the intangible benefits from IT? By definition, intangible benefits are very difficult to place an accurate monetary value on. It is important not to ignore these benefits, however, because they are real and are valuable to the organization. Therefore, they must be approximated. Overestimating the value of intangible benefits will cause organizations to initiate projects that do not produce the expected benefits. Conversely, underestimating their value can result in valuable projects being rejected. Describe the NPV, ROI, breakeven analysis, and business case approaches. The NPV method compares the present value of a projects cash inflows with the present value of its cash outflows, discounted at the organizations cost of capital. An NPV that is $0 or greater suggests the project is acceptable. The ROI method computes a rate of return that is generated by the project based on the projects net income divided by the average assets invested in the project. Breakeven analysis provides an estimated date when the money spent on the systems development process is recouped from the benefits earned in the business it is used in. A business case is a written document that is used by managers to garner funding for one or more specific applications or projects. Its major emphasis is the justification for a specific required investment. The business case helps to clarify how the organization can best use its resources to accomplish the IT strategy. Section 13.2 Before you go on Describe the four fundamental business decisions that organizations must make when acquiring information systems. How much computer code does the company want to write? A company can choose to use a totally pre-written application (to write no computer code); to customize a pre-written application (to write some computer code); or to custom-write an entire application (write all new computer code). How will the company pay for the application? For pre-written and customized pre-written applications, the payment options are to buy or to lease. For complete custom applications, the company may use internal funding. Where will the application run? The company may choose to run the application on the companys own platform or on someone elses platform (e.g., Software-as-a-Service vendor or an application service provider). Where will the application originate? Pre-written applications can be open source or proprietary software (i.e., from a software vendor). These applications may be further customized in-house or outsourced. Completely customized applications can be either written in-house or outsourced. Discuss each of the seven development methods in this section with regard to the four business decisions that organizations must make. Development MethodsAmount Of Code WrittenFunding/ PaymentOperating Platform OwnerProgram Source CodePurchase a pre-written applicationNoneBuy or LeaseCompanys platformOpen-source or ProprietaryCustomize a pre-written applicationSomeBuy or LeaseCompanys platformOpen-source or ProprietaryLease the applicationsNoneLeaseCompanys or Vendors platformOpen-source or ProprietaryApplication service providers and software-as-a-service vendorsNoneLeaseVendors platformOpen-source or ProprietaryUse open-source softwareSomeInternal fundingCompanys platformOpen-sourceOutsourcingNoneInternal fundingCompanys platformOutsourceCustom developmentMostInternal fundingCompanys platformIn-house or outsource Section 13.3 Before you go on Describe the feasibility study. The feasibility study involves defining the business problem or new opportunity, investigating options available for the best solution, making a recommendation and estimating the probability of success. What is the difference between systems analysis and systems design? Systems analysis is the detailed study and documentation of the as is situation and the requirements for the new system. Systems design is the development of a technical specification that details the system inputs, outputs and interfaces as well as the hardware, software, databases, telecommunications, personnel and procedures needed to provide a solution for the requirements developed in the analysis stage. Systems design also provides a blueprint for integrating these various components. Describe structured programming. Structured programming techniques are used to establish a uniform approach to programming that successive iterations of staff can understand. Each module has only one function. Each module has only one entrance and one exit. GO TO statements are not allowed. What are the four conversion methods? Parallel - running old and new systems concurrently for a period of time. Direct moving the new system into production at the same time the old system is being made inaccessible. Pilot introducing the new system in one part of the organization, determining that it is stable, and then rolling it out to other areas. Phased introducing select components of the new system in stages. When the organization determines that these components are stable, it rolls out other components. Section 13.4 Before you go on Describe the tools that augment the traditional SDLC. Prototyping involves building a model of the system based on user feedback. It is an iterative approach that helps users visualize what the new system will look like. Joint application development (JAD) involves a meeting attended by all of the end users meeting and the IS project team to develop requirements and reach a consensus. It can save a lot of time, but it is intense, and it will work well only if all departments are represented. CASE tools are specialized tools that automate many of the tasks in the SDLC. Long-term maintenance on systems developed with CASE tools can be less expensive; however, initial development can cost more. Rapid application development is a systems development method that can combine JAD, prototyping, and ICASE tools to rapidly produce a high-quality system. In the first RAD stage, developers use JAD sessions to collect system requirements. This strategy ensures that users are intensively involved early on. The development process in RAD is iterative, similar to prototyping. That is, requirements, designs, and the system itself are developed and then undergo a series, or sequence, of improvements. RAD uses ICASE tools to quickly structure requirements and develop prototypes. As the prototypes are developed and refined, users review them in additional JAD sessions. RAD produces the functional components of a final system, rather than prototypes. Describe the alternate methods that can be used for systems development, other than the SDLC. The two methods are end-user development and object-oriented development. End-user development is very popular today because of the availability and familiarity with small databases such as Access and spreadsheet applications. As long as these databases are relatively small and the users document what they have done, end-user development can work well. If not, the IS department is usually called on to rewrite and rework. Object-oriented development is based on a different view of computer systems. OO systems are based on the aspects of the real world that must be modeled to perform a task. Consequently, these systems can be used to perform related tasks that involve the same real-world entities. Section 13.5 Before you go on List the major steps of selection of a vendor and a software package. Identify potential vendors Determine the evaluation criteria Evaluate vendors and packages Select a vendor and a package Negotiate a contract Establish a service-level agreement Describe a request for proposal (RFP). A request for proposal (RFP) is a document that a company sends to potential vendors inviting them to submit a proposal that describes their software package and explains how it would meet the companys needs. Explain why SLAs play an important role in systems development. Service-level agreements are formal contracts that specify the division of work and responsibilities between vendors and the company. These divisions are based on a set of agreed-upon milestones, quality checks, and what-if situations all of which need to be specified in the SLA. They describe how quality checks will be made and what is to be done in case disputes and quality standards are specified ITs About Business Questions  ITs About Business 13.1 Anniston Orthopaedics and Greenway Medical Technologies Would acquiring a new information system for a small organization be a longer or shorter process than acquiring one for a large organization? Why or why not? Support your answer. It some ways it may take longer due to the possible lack of understanding of the process, the systems, and the expectations of the acquiring organization. However, these factors can also speed up the process under some circumstances. What is the purpose of the contract between the two parties? When acquiring a new information system, both parties (purchasing organization and service provider) normally sign a contract outlining the project scope and other aspects of the project. A typical contract for a system development project includes but is not limited to the final system functionalities, stakeholders and their responsibilities with proper contact information, reporting/communication channel for the project progress, system costs, service charges, training and consulting fees, payment terms and procedures, contract and system effective dates, conflict of interest, change orders procedures, implementation procedures and timeline, stakeholder penalty for violating the contract terms, project termination, insurance, and warranty. In this case, the contract will specify the responsibilities of both Anniston and Greenway. If the two parties cannot agree on terms, then Anniston must resume its search for a new IS vendor. ITs About Business 13.2 A Disastrous Development Project Debate the lawsuit from the point of view of Deloitte and SAP. Deloitte filed a counterclaim over Marin countys failure to pay more than $550,000 in fees and interest. In its counterclaim, Deloitte maintained that it had fulfilled all of its obligations under the contract, as evidenced by the fact that all of Deloittes work was approved by the county officials who were responsible for the project. Debate the lawsuit from the point of view of Marin County. The complaint alleged that Deloitte used the countys SAP project as a training ground to provide young consultants with public sector SAP experience, at the countys expense. Further, the complaint charged that Deloitte (1) intentionally failed to disclose its lack of SAP and public sector skills; (2) withheld information about critical project risks; (3) falsely represented to the county that the SAP system was ready to go live as originally planned; (4) conducted inadequate testing; and (5) concealed the fact that it had failed to perform necessary testing, thereby insuring that system defects would remain hidden prior to the go-live date. The county further maintained that, despite the consulting fees it had paid to Deloitte, the system continued to experience crippling problems. ITs About Business 13.3 The State of Virginias Outsourcing Contract Proves Costly What are some reasons why Virginias IT problems can be considered the result of poor state oversight of Northrop Grumman? What are some reasons, if any, why the state might not be overseeing Northrop effectively? The IT problems at the State of Virginia could stem from the states or, in this case, the VITA taskforces poor agreement (i.e., contract) and inadequate oversight of the contractor. The project contract did not cover such items as backup or a disaster recovery plan. There is no penalty for Northrop Grumman if the project milestone is delayed or fails. Furthermore, the project scope is so large that a relatively small, 16-member VITA committee simply cannot oversee the entire $2.4 billion, 10-year project development for the state. What are some reasons why Virginias IT problems can be considered the result of poor execution by Northrop Grumman? What are some reasons, if any, why Northrop might be executing this project poorly? Northrop Grumman did not have any prior experience. There was not a disaster recovery plan in effect in the event of a system outage. The states critical databases were backed up properly. Discussion Questions  Discuss the advantages of a lease option over a buy option. Leasing has the advantages of lower upfront costs and more flexibility to change and adapt the applications used over time as needs change. Why is it important for all business managers to understand the issues of IT resource acquisition? Because information systems are so critical to competitive advantage, a systems timely and careful development is a very high priority. Systems acquisition and development is a team effort that should involve the entire organization. Why is it important for everyone in business organizations to have a basic understanding of the systems development process? End users possess the business knowledge the IS staff needs to develop all of the components of the systems design. For this reason, user input is critical to the acquisition and/or design of a successful IS. Should prototyping be used on every systems development project? Why or why not? The SDLC provides the basic structure of the development process. Prototyping can be used within that structure to experiment with new technology or clarify requirements. It should not replace the traditional SDLC for highly complex systems. Discuss the various types of feasibility studies. Why are they all needed? Technical, economic, behavioral, and organizational feasibilities are different facets of the analysis. Technical determines if the current hardware and software platform is appropriate as well as whether the system should be developed in house or purchased from a vendor. Economic determines if the project has an acceptable financial risk and whether the organization can afford it. Behavioral determines if the corporate culture is open to the change. Organizational determines whether the organization has any external issues that would preclude the project from being successful and whether the project meshes with the companys strategic plan. Discuss the issue of assessing intangible benefits and the proposed solutions. Intangible benefits are often very hard to quantify. IS staff responsible for the cost benefit analysis should collaborate with users of the system to place a value on the benefit, even if their analysis is less than scientific. Very often, it is the quantifying of the intangible benefit that will make the biggest impact on the decision to move ahead with a new system. Discuss the reasons why end-user-developed information systems can be of poor quality. What can be done to improve this situation? Putting development tools in the hands of end-users can result in some very innovative work. One of the biggest problems, however, is that in many cases the end users do not know the most efficient way to design a system. Therefore, when working with a small amount of data, it may seem like everything is okay, but as soon as they try to function in a full-blown production environment, the application grinds to a halt or stops completely. One way that this problem can be avoided is through education. If, for example, the users know how to design a relational database, then, they have a better chance of developing an efficient application. Another way would be to have the applications run through a quality assurance process with IS to ensure that they are not only developing software that can be used, but also documenting their work. Problem-Solving Activities  Students will research as directed and prepare a thoughtful report on their findings. Access  HYPERLINK "http://www.ecommerce-guide.com" www.ecommerce-guide.com. Find the product review area. Read reviews of three software payment solutions. Assess the payment solutions as possible components. Students will visit the Web sites and look for reviews on three software payment solutions of their choice. Note that some product information was submitted by the company representatives and may not provide the true review of the product. Use an Internet search engine to obtain information on CASE and ICASE tools. Select several vendors and compare and contrast their offerings. A list of CASE tool vendors can be found at this Web site  HYPERLINK "http://www.unl.csi.cuny.edu/faqs/software-enginering/vendor.html" http://www.unl.csi.cuny.edu/faqs/software-enginering/vendor.html. Students may choose a few vendors and compare and contrast their features. Access  HYPERLINK "http://www.ning.com" www.ning.com,  HYPERLINK "http://www.coghead.com" www.coghead.com,  HYPERLINK "http://www.teglo.com" www.teglo.com, and  HYPERLINK "http://www.dabbledb.com" www.dabbledb.com. Observe how each site provides components for you to use to build applications. Build a small application at each site. Ning is an educational network site that helps people integrate social media into education. Students will visit www.ning.com and learn how to use it to build an application. There are resources available in many different formats (e.g., printed information, blog, interactive demo, etc.) to help users get started. Note that dabbledb.com no longer provides support for its users. Web Activities  Results of the various on-line activities should be organized into report format and submitted after research activities are completed. Enter  HYPERLINK "http://www.ibm.com/software" www.ibm.com/software. Find its WebSphere product. Read recent customers success stories. What makes this software so popular? Students will develop and submit or present a report on their findings. Enter the Web sites of the GartnerGroup ( HYPERLINK "http://www.gartnergroup.com" www.gartnergroup.com), the Yankee Group ( HYPERLINK "http://www.yankeegroup.com" www.yankeegroup.com) and CIO (www.cio.com). Search for recent material about ASPs and outsourcing, and prepare a report on your findings. Students will develop and submit or present a report on their findings. StoreFront ( HYPERLINK "http://www.storefront.net" www.storefront.net) is a vendor of e-business software. At its site, the company provides demonstrations illustrating the types of storefronts that it can create for shoppers. The site also provides demonstrations of how the companys software is used to create a store. Run the StoreFront demonstration to see how this is done. Students may need to register with the Web site in order to view the demo. What features does StoreFront provide? Features of the StoreFront e-commerce software include various software tools for store building, product management, order processing, marketing and promotions, shopper features, and store management. Does StoreFront support smaller or larger stores? The software provides services for smaller stores with additional add-on modules for larger stores. What other products does StoreFront offer for creating online stores? What types of stores do these products support? In addition to software solutions, StoreFront offers services that help customers build e-commerce stores including design, custom development, marketing, setup and implementation, training, hosting, payment processing, and support. Click the View Client Gallery link to see examples of client applications. Team Assignments Assessing the functionality of an application is part of the planning process (Step 1) Select three to five Web sites that cater to the same type of buyer (for instance several Web sites that offer CDs or computer hardware), and divide the sites among the teams. Each team will assess the functionality of its assigned Web site by preparing an analysis of the different sorts of functions provided by the sites. In addition, the team should compare the strong and weak points of each site from the buyers perspective. Students will follow the directions for the group project. Note that students will have to search the Internet to locate information, and some Web sites might require them to register and provide contact information. Divide into groups, with each group visiting a local company (include your university). At each firm, study the systems acquisition process. Find out the methodology or methodologies used by each organization and the type of application each methodology applies. Prepare a report and present it to the class. Students will research and develop report on their findings. As a group, design an information system for a startup business of your choice. Describe your chosen IT resource acquisition strategy, and justify your choices of hardware, software, telecommunications support, and other aspects of a proposed system. Students will follow the directions for the group project. The project outcome may include a written report (e.g., a project proposal), a class presentation, or both. To help students prepare for the presentation, set up a scenario where the city has some funding to help a local startup business. Each project team is working for a local company. Stage the presentation as though the groups are presenting the selected companys information system to the citys Board of Commerce as a part of the city grant/funding application process. Closing Case The City of Lincoln, Nebraska: Developing Systems for the Taxpayers The Business Problem The City of Lincoln and the County of Lancaster, Nebraska, have a history of innovative systems development projects. In 2001, the municipality deployed Palm handheld computers to its animal control officers in an effort to streamline the processes involved in managing the areas growing pet population. The initial deployment was very successful and provided the animal control officers with real-time access to a wealth of useful field information, including contact information for pet owners, vaccination data, bite and attack history, previous dispatch history, citations written, and impoundment data. As a growing city/county government, Lincoln/Lancaster was concerned about providing the highest level of governmental services possible given its specific budgetary constraints. In 2008, the City and County wanted to again effectively use technology, this time involving the city police, county sheriffs, and firefighters. The IT Solution The Lincoln/Lancaster governments IT staff undertook an enterprise-wide systems development project that would enable the governmental staff and citizens to utilize smartphones to access a variety of governmental services. The initial project was the development of a smartphone-enabled system for parking services. Follow-up projects subsequently expanded into the sanitation and weed control departments. In addition, the city/county government developed a multi-use web portal to serve two purposes. First, the portal facilitates employee access to email and calendaring systems. Second, the portal provides citizens with realtime access to animal tag lookup, fire runs, property tax information, a geographical information system (GIS) for navigating the areas streets, 29 traffic cameras, and a lookup service for government employee phone numbers. The system also enables smartphone subscribers to receive real-time alerts from the National Weather Service, the Department of Homeland Security, and Amber Alerts (missing persons) from the State of Nebraska. For the first time, the local police, fire, sheriff, public health officials, and emergency coordinators can send needed information within seconds to desktops or smartphones. The Results Citizens responses to the systems developed by the Lincoln/Lancaster government and deployed via smartphones have been very positive. In a recent ranking published by the Center for Digital Government, Lincoln/Lancaster was ranked the second most technologically progressive municipal/county government in the United States. Questions Is this use of information technology an appropriate use of tax-payer dollars? Why or why not? The technology based projects have enabled the city to provide better service to the tax payers and also made the city employees more efficient in their job. These benefits can be quantified in financial terms and show that the tax payers are benefiting from these projects. So, these projects are appropriate use of tax payer dollars. Can you think of any other possible uses for this type of technology in local or state government? There are many potential projects. Involving the citizens in the governance process and means of interacting with the city are useful projects that can be based on technology.      Chapter 13: Acquiring Information Systems and Applications (4th edition) Page  PAGE 2  Wendy: Many of the bullets listed here appear to place blame with Northrop Grumman, not Virginia. Somebody with some expertise needs to review this answer. Or, copy-and-paste the MIS answer to this question (Chapter 14).   -;<=NO@ A T W    1 2 B K Q [   B D J K a $7Vĵxqxx h4hVr% h4h0 h4hk h4hfihFq h4h` h4hQUa h`hQUahQUah_hBB*phhz? hBh*hlvhlB*phhlvhr2B*ph hlvhl hOhr2hMhE5 h55 hE5hMhE56 hM6h5 h0Xh5hM hz6hMhM60 !!!>"?"S"j"s"{""" $Ifgd h^h`gdM & FgdMgdz^gd5 & Fgd5"""""0''' $Ifgdkd$$Iflrd ?o! ;0 t0644 lap2yt"" # #1#'kd$$Iflrd ?o! ;0 t0644 lap2yt $Ifgd1#6#C#V#q# $Ifgdq#r####0''' $Ifgdkd$$Iflrd ?o! ;0 t0644 lap2yt####$'kd$$Iflrd ?o! ;0 t0644 lap2yt $Ifgd$$$,$G$ $IfgdG$H$a$f$w$0''' $Ifgdkd$$Iflrd ?o! ;0 t0644 lap2ytw$$$$$'kd$$Iflrd ?o! ;0 t0644 lap2yt $Ifgd$$$$$ $Ifgd$$$$%0''' $Ifgdkd$$Iflrd ?o! ;0 t0644 lap2yt%%)%*%'kd $$Iflrd ?o! ;0 t0644 lap2yt $Ifgd*%+%,%-%N%O%o%p%;&<&&&u(v(((J)z)))) & F gdG h^h`gdOh^hgdO h^h`gdO & FgdGgdO h^h`gdM^gd5))**{*|*++++++ , ,,,--..1h^hgdjgds0rh^hgds0r & F gdGgdO h^h`gdO$a$gd"Ks $`a$gdOb*h*z*{*|********++++M+R+n+s++++++++ , ,,s,x,,,,,,,--z-}-----------..h.i.q.r...hjh556hs0rhl6 hs0r>*hlvhB>*hlvhr2B*ph hlvhr2hlvhr256hlvhl>* h0Xh5hs0rhl56 hlvhs0rhl hlvhlh5;....J/Y///C1G1|111111122F2'3;3333333334444455<5@5y5{5555555555555"626j6y6666677 77ƼƸƸƼƸƱ秠ѧ hlvhr2hlvhr256 h.sxhjhjhjhj56 h0Xhjhlhlvhr2B*phhlvhlB*ph hlvhlh5 h}Ph5 h0Xh5?11112223344445525T5r5555 & F gd j & FgdGgdO h^h`gdOgdj8^8gdj $h^ha$gdjgds0r & F gdG h^h`gdO55556677888 $Ifgd6o h^h`gdO h^h`gdOh^hgds0r & FgdG h^h`gdO 7Z7k78888888899999991:˲pYC0$h{aB*PJfHphq *hzhlB*PJfHphq -hzhr26B*PJfHphq &hzhlB*fHphq -hzhr25B*PJfHphq -hGhr26B*PJfHphq 0hGhr256B*PJfHphq 'hlv5B*PJfHphq hlvh_hlvB*ph hlvhlvhj hlvhl88889999t___N_ & F -DM gdGh-DM ^h`gdz -DM gdl~kd $$Ifl$$  t 0644 l` ap ytlv1:5:j:k::::::;;;;<<=>>>>>>>>>>>>&?'?{@}@@@AĮzrzrzrzkck_Xc_ hzhlvhHhzhr26 hzhlhGhr26hGhr256h%  h0Xh% hzhr25-hzhr26B*PJfHphq *hzhlvB*PJfHphq *hzhlB*PJfHphq $h{aB*PJfHphq $hdB*PJfHphq "9::::==>>>>>&?'?|@}@@ h^h`gdH & FgdG h^h`gdz^gd%  h^h`gdz & F -DM gdGh-DM ^h`gdzh-DM ^hgd{a@@CCC-D.DEE(GGG&HxHHHH $Ifgd6o h^h`gdzgd|5 & F^`gdw  & Fgdw  & Fgdw h^hgdH h^h`gdzAAAAB BBBBBCCCCC,D-D.DEEEECEDEJELEOEPEsEuEhFmF G!G'G(GGG&HHHHHHHII׾𧣜}v hlvhQUahlvhQUa6-hlvhlv5B*PJfHphq hlvhlvhlv hzhlvh7+h|5hw h' h0Xh'jh% 0J"Uh|5hr26 hzhlhw hr256hzhl5hzhr25hHhj.HHHIIIIIIJtlg^glg^h^hgdlvgdQUa & FgdG -DM gdlv~kd $$Ifl$$  t 0644 l` ap ytlv IIJJJaKiKrKKKKKKKLLL1L3L4L5LL|MM6N?NNNNNUO_OOOcPPPPsQQ,RRLSZSTTTT\U{UVV V#V$VzV{VV𽹲h *hQUa6 h *h>qh *hQUa5hQUa hlvhlvhlvh_hlvB*ph hlvh>qh)OhlvhYN6hzhQUa56 h0Xhjhj hlvhQUahlvhQUa69JJ`KaK3L4L5LLL|M}MMM2N6NNNTOUOOOcPdP^gdQUah^hgdQUah^hgdlvh^hgdjgdQUa & FgdG$h^ha$dPPP+R,RRRpTqTVV"V $Ifgd6ogdlv$a$gdQUah^hgdlv^gdQUa & FgdG "V#V$VzV{VRWSWGXxkkVQHh^hgd)Ogd>(N & F 8hh^h`gdG h^h`gd *^gdQUa~kdn $$Ifl$$  t 0644 l` ap ytlvVVVVVVVVVRWSWGXIXXXXXXXYYYYdYeYYYYYYYYZ Z!Z-Z.Z0Z1ZUZVZWZfZgZjZ뵱rjh *hQUa6Ujh *hQUa6U h>(Nh>(Nh0Xh)O0Jjh0Xh)OUh)OhhQUa h0Xh)Oh>(Nh *hYN6h *hQUa0J6B*phj h *hQUa6Uh *hQUa6jh *hQUa6U,GXHXIXXXYYYX[Y[\\\\ $Ifgd6ogd Oh^hgd h^h`gd *h^hgd)O hh^h`gd * & F 8hh^h`gdGgd>(Nh`hgd jZkZZZZZZZZZZZZZX[Y[[[[\\\\\\u]v]|]}]]]]]븴wjbjSjh>(NhHoA0J6B*phh>(NhHoA6jh>(NhHoA6Uh>(NhQUa6h>(NhQUa56 h>(NhQUa hlvh O h6oh Oh_h OB*phh>(N h0Xh)Oh)OhQUajh *hQUa6Uh *hQUa0J6B*phjh *hQUa6Uh *hQUa6jh *hQUa6U \\\u]v])^*^r^s^_tot_tVt_h^hgd & F hh^hgdGgd6o h^h`gd>(N~kdx$$Ifl$$  t 0644 l` ap yt ]]])^*^q^s^^^^^^^^^^___0_1_H______`'`(`)`;`<`;a(NhQUa6Uh>(NhHoA6jh>(NhQUa6Uh>(NhQUa0J6B*phj!h>(NhQUa6Ujh>(NhQUa6U h>(Nh>(Nh h>(NhQUah>(Nh<6h>(NhQUa6.____;a(N^gdFq & FgdFq & F hh^hgdGh^hgd h^h`gd>(Nddd eeeggg/g3gggggg/i0iliminijjkjljjjjjkFkGkkkkklllllĜ{tlh6ohp6 h6oh2V h6ohp h jhGhFq h0XhFqhFqhFq]hph j hGhGhG hFq]h0XhFq]hyhQUahGhQUa6-hGh2V5B*PJfHphq hlvh2Vh2Vh_h2VB*ph h>(NhFq' eeegggggtcVMDVh^hgd j)8^8gdFq h^h`gdG & F hh^hgdG -DM gd2V~kd$$Ifl$$  t 0644 l` ap ytEg/i0iminijjkjllll $Ifgd6o h`hgdid)8^8gdFq gd6oh^hgd j h^h`gdG & F hh^hgdG lllllloUoVopppCr|||wwwwwniwgdGh`hgdGgdgdp~kd$$Ifl$h%  t 0644 l` ap yt_ llllllllll-m.mkmlmmmmm#n$n[nsnnnnnSoVooooooooo5p6pvppppppppuuuuvvFvGvvvvvvvvvvCwDwEwֻ۳۫ h6h."h6h^H`hp6h^H`hG5h hhhhG5 h5 h^H`hph^H`hp5hh5 hp6h_hp6ACrDrttuuuvvvvEwFwxxxxyyyyyyyh^hgd h^h`gdG & F gdGgdGh`hgdGgdEwFwxxxxxxxyyyyyyyyyyyyyyyyyyzzzzzzzzzzzzƾyylyh0JaJmHnHujhGh?~0JUaJhGh?~0JH*aJhGh?~0JaJhGh?~aJh?~jh?~UmHnHuh0jh0U hGhThTh;@h^H`hp6 h6h."h6 h^H`hFq h0XhFqhhp&yyyyyzzzzzzzzzh^hgd#$a$gdQUagdp z zzzz hGhTh0h% jh% 0J"U5 01F:p O/ =!"#$% $$If!vh5$#v$:V l  t 065$` p ytlv$$If!vh5$#v$:V l  t 065$` p yt_$$If!vh5$#v$:V l  t 065$` p ytlv$$If!vh5$#v$:V l  t 065$` p ytlv $$If!vh5 55;505#v #v#v;#v0#v:V l t065 55;505ap2yt $$If!vh5 55;505#v #v#v;#v0#v:V l t065 55;505ap2yt $$If!vh5 55;505#v #v#v;#v0#v:V l t065 55;505ap2yt $$If!vh5 55;505#v #v#v;#v0#v:V l t065 55;505ap2yt $$If!vh5 55;505#v #v#v;#v0#v:V l t065 55;505ap2yt $$If!vh5 55;505#v #v#v;#v0#v:V l t065 55;505ap2yt $$If!vh5 55;505#v #v#v;#v0#v:V l t065 55;505ap2yt $$If!vh5 55;505#v #v#v;#v0#v:V l t065 55;505ap2yt$$If!vh5$#v$:V l  t 065$` p ytlv$$If!vh5$#v$:V l  t 065$` p ytlv$$If!vh5$#v$:V l  t 065$` p ytlvDyK www.ecommerce-guide.comyK Xhttp://www.ecommerce-guide.com/yX;H,]ą'cDyK  www.ning.comyK Bhttp://www.ning.com/yX;H,]ą'cDyK www.coghead.comyK Hhttp://www.coghead.com/yX;H,]ą'cDyK www.teglo.comyK Dhttp://www.teglo.com/yX;H,]ą'cDyK www.dabbledb.comyK Jhttp://www.dabbledb.com/yX;H,]ą'c$$If!vh5$#v$:V l  t 065$` p ytDyK www.gartnergroup.comyK Rhttp://www.gartnergroup.com/yX;H,]ą'cDyK www.yankeegroup.comyK Phttp://www.yankeegroup.com/yX;H,]ą'cDyK www.storefront.netyK Nhttp://www.storefront.net/yX;H,]ą'c$$If!vh5$#v$:V l  t 065$` p ytE$$If!vh5h%#vh%:V l  t 065h%` p yt_^* 6866666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p(8HX`~_HmH nHsH tH<`< $NormalCJ_HmH sH tH >@>  Heading 1$@& 5CJ\FF  Heading 2$$dh@&a$5\JJ  Heading 3$$d@&a$ 6\]::  Heading 4$@&6]RR  Heading 7$-D@&M . 5CJaJDA`D Default Paragraph FontVi@V  Table Normal :V 44 la (k (No List 6U`6 Hyperlink >*B*phDCD Body Text Indent h^hNR@N Body Text Indent 2$h^ha$4B@"4 Body Text$a$4>24 Title$a$5aJ4@B4 Header  !4 R4 Footer  !.)@a.  Page Number.Or. m0TXI .`.aJ*O* z?0CH_OLaJ4O4 6o0 OBJSET_TTLaJ&O& z?0OBJaJjj (NFollowedHyperlink >*B*phB'`!B [Comment ReferenceCJaJ8@28 $[ Comment Text#CJ:A: #[Comment Text CharHRH &[ Balloon Text%CJOJQJ^JaJNaN %[Balloon Text CharCJOJQJ^JaJ@j12@ (5Comment Subject'5\FBF '5Comment Subject Char5\"O" FqQ)aJPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] Robert Weiss=rRWEʄr  llloorVLb*.71:AIVjZ]dlEwzz>BCFUVY[^`dfhjnprA B""1#q##$G$w$$$%*%)1589@HJdP"VGX\_ eglCryz?@ADEGHIJKLMNOPQRSTWXZ\]_abcegiklmoqNNNQdQQQ R-R0RVRfRjRRRRRR|UUUVVVVW0WW(X;XrXXXXXXXXXX_fhr!@  @ (     j;& @4î `Instructors ManualTimes New RomanPowerPlusWaterMarkObject1uxS Q8vQ7RR +O!UN ML#L'JI!WJw(H 6GEFCU?;[<; 9K9n8p"4 3~2~28w3![32.))!7)'}'L#$"##L# z "4"' R>E1 T [  !:R7[%w(:@D D .I DE =>KBEfoADFkD+KBRHoA@>uG=DmD<.oA!E!KB$E2&oA&KB)E7)DK*'C0*KB)3+'Cl- J.@y/:2D15DM5'C4>7D7KB':EC:D;'Cl<@A>F>KB:?DFAEADCDCKBFuGFD}PD T'C(TKBS7S[S S"?  j;& @4î `Instructors ManualTimes New RomanPowerPlusWaterMarkObject2uxS Q8vQ7RR +O!UN ML#L'JI!WJw(H 6GEFCU?;[<; 9K9n8p"4 3~2~28w3![32.))!7)'}'L#$"##L# z "4"' R>E1 T [  !:R7[%w(:@D D .I DE =>KBEfoADFkD+KBRHoA@>uG=DmD<.oA!E!KB$E2&oA&KB)E7)DK*'C0*KB)3+'Cl- J.@y/:2D15DM5'C4>7D7KB':EC:D;'Cl<@A>F>KB:?DFAEADCDCKBFuGFD}PD T'C(TKBS7S[S S"?  j;& @4î `Instructors ManualTimes New RomanPowerPlusWaterMarkObject3uxS Q8vQ7RR +O!UN ML#L'JI!WJw(H 6GEFCU?;[<; 9K9n8p"4 3~2~28w3![32.))!7)'}'L#$"##L# z "4"' R>E1 T [  !:R7[%w(:@D D .I DE =>KBEfoADFkD+KBRHoA@>uG=DmD<.oA!E!KB$E2&oA&KB)E7)DK*'C0*KB)3+'Cl- J.@y/:2D15DM5'C4>7D7KB':EC:D;'Cl<@A>F>KB:?DFAEADCDCKBFuGFD}PD T'C(TKBS7S[S S"?0( ing>Bob B S  ? lr-t-t-t _Hlt1772843180Xs@1Xs E.<q=q  Qi\iiik&kl'lzmmmnqqqqqqqqqrrsP7X7C=J=EEIIgRjRSS` `ccg!gqqqqqqqqqrrs333333333=OW ? 1,Opv '!J!-r---0011@@wDDJJN$NOSOPP0SYSTT[[\]a0addnn5oFoqqqqqqqqqrrs4JJ@6PJyVrBdr2Hvl,dng:.=G,b^d<47"x,Fg3$~z([0T)hT5#;+*pb.Wܢ}..3=t:ESs!<œq=H6kp? X@AA:HSF5w,^ld;Yc`2o}P8g}Jpog ^`OJQJo( 8^8`OJQJo( ^`OJQJo(o  p^ `OJQJo(  @ ^ `OJQJo( x^x`OJQJo( H^H`OJQJo(o ^`OJQJo( ^`OJQJo(h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.h h^h`o(hH. 8^8`hH. L^`LhH.  ^ `hH.  ^ `hH. xL^x`LhH. H^H`hH. ^`hH. L^`LhH.h ^`o(hH.0^`0o(. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h h^h`o(hH. 8^8`hH. L^`LhH.  ^ `hH.  ^ `hH. xL^x`LhH. H^H`hH. ^`hH. L^`LhH.hh^h`o(.88^8`OJQJo(hHL^`L.  ^ `.  ^ `.xLx^x`L.HH^H`.^`.L^`L.^`o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h h^h`o(hH. 8^8`hH. L^`LhH.  ^ `hH.  ^ `hH. xL^x`LhH. H^H`hH. ^`hH. L^`LhH.h h^h`o(hH. 8^8`hH. L^`LhH.  ^ `hH.  ^ `hH. xL^x`LhH. H^H`hH. ^`hH. L^`LhH.h h^h`o(hH. 8^8`hH. L^`LhH.  ^ `hH.  ^ `hH. xL^x`LhH. H^H`hH. ^`hH. L^`LhH.808^8`0o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`OJPJQJ^Jo(^`OJQJ^Jo(hHop^p`OJQJo(hH@ ^@ `OJQJo(hH^`OJQJ^Jo(hHo^`OJQJo(hH^`OJQJo(hH^`OJQJ^Jo(hHoP^P`OJQJo(hHh ^`o(hH.^`o(.  L^ `LhH.  ^ `hH. x^x`hH. HL^H`LhH. ^`hH. ^`hH. L^`LhH.8^8`o(. ^`hH.  L^ `LhH.  ^ `hH. x^x`hH. HL^H`LhH. ^`hH. ^`hH. L^`LhH.h^`OJQJo(hHh^`OJQJo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohP^P`OJQJo(hHhhh^h`o(.h 8^8`o(hH)h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.0^`0o(. 8^8`hH. L^`LhH.  ^ `hH.  ^ `hH. xL^x`LhH. H^H`hH. ^`hH. L^`LhH.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh h^h`o(hH. 8^8`hH. L^`LhH.  ^ `hH.  ^ `hH. xL^x`LhH. H^H`hH. ^`hH. L^`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh h^h`o(hH. 8^8`hH. L^`LhH.  ^ `hH.  ^ `hH. xL^x`LhH. H^H`hH. ^`hH. L^`LhH.h^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohP^P`OJQJo(hHh^h`5o(. 8^8`hH. L^`LhH.  ^ `hH.  ^ `hH. xL^x`LhH. H^H`hH. ^`hH. L^`LhH.,dFg3$2Hg:Ss!<3=t:7";Yc}.yVrSFq=G,@6dokp?pb.~z(8g}`2o5w,^X@A5#;+[0T)                   ʞZb                :v                                    )                        N>                                  vJ                                                                       :'2         Z        2yed[ j! l4537(NYNO)OT~\S]`^H`QUa{adlhmFqs0r"Kslv#P{E}d1H2;)Cz0frpzyfiw GMkH2V'j>q' _|5vOqkm0i *<Bs]y O\5Eid6o.-mq\zqq@r`@Unknown G*Ax Times New Roman5Symbol3. *Cx Arial;. *Cx HelveticaCz 0000҉0 Pro W35. .[`)Tahoma?= *Cx Courier New;Wingdings7.@ CalibriA BCambria Math"qh''L` :` :!24uquqQ 3qHX?.A2  8Chapter 11: Acquiring IT Applications and InfrastructureRoberta M. Roth WileyServicex                      Oh+'0xx  4 @ LX`hp<Chapter 11: Acquiring IT Applications and InfrastructureRoberta M. Roth Normal.dotmWileyService2Microsoft Office Word@Z@zP{@zP{ `՜.+,D՜.+,t0 hp  Casey Consulting:uq 9Chapter 11: Acquiring IT Applications and Infrastructure Title 8@ _PID_HLINKSAp<1*http://www.storefront.net/y/http://www.yankeegroup.com/VKhttp://www.gartnergroup.com/&1http://www.ibm.com/softwareZKhttp://www.dabbledb.com/Y http://www.teglo.com/w  http://www.coghead.com/PEhttp://www.ning.com/_RAhttp://www.unl.csi.cuny.edu/faqs/software-enginering/vendor.html%> http://www.ecommerce-guide.com/  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrsuvwxyz{|}~Root Entry F ߋData t:1TableWordDocument 7SummaryInformation(DocumentSummaryInformation8MsoDataStore֋sދEX4C4JUWGQKWLY==2֋sދItem  PropertiesUCompObj y   F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q