Sign-up today to join over 4 million learners already on ALISON:

ALISON: Diploma in Project Management


Comments about The analysis phase - The Analysis Phase: identification and description of the types of information needed to analyse the system

The comment must be about:
- Module: The analysis phase
- Topic: The Analysis Phase: identification and description of the types of information needed to analyse the system

Latest Comments

  • Thomas Ndungo Lekunze Cameroon The multiplicity of sources of information requires inextricably the need for such information to be weighted for reliability and suitability to the expected system change.
    2014-12-15 13:12:44

  • ESSOTOLOME BODJO China It is unusual for one user to be the exclusive source of information about the system. Most aspects of the system will have some degree of overlap - it may be that significant detail will come mainly from one source, but there will usually be other users who are also impacted, and information must be collected from them as well.
    2014-12-13 16:12:47

  • Stephen Diya Nigeria Good
    2014-12-12 16:12:04

  • Nathan Idowu Ireland How do you evaluate information provided by users for bias - do you involved the provider more on one on one so as to ascertain if indeed it is biased or not?
    2014-11-28 12:11:52

  • Cliffrichardson Urubusi Qatar To avoid bias the analyst is expected to weigh his source of information based on reliability when such information overlaps ;how will this be done?
    2014-11-27 11:11:17

  • Zinabie Tadesse Gebremedhin Ethiopia How can analyst identify and evaluate information bias?
    2014-11-25 11:11:05

  • Zinabie Tadesse Gebremedhin Ethiopia nformation collected must be evaluated for bias and relevance and given the appropriate weighting in the overall analysis of the system. For example, while a manager and a data clerk would both have opinions on the usefulness of the financial reports produced by a particular system, the manager's opinion would have more weighting, but conversely, the data clerk's opinion has more significance in areas relating to the ease of data entry.
    2014-11-25 11:11:07

  • lordford Oteng-Bonsu Ghana understood. In my opinion, I think the analyst should be independent from the manager and data entry clerk and exercise adequate degree of professionalism in his evaluation and weighting in the overall analysis of the system.
    2014-11-24 00:11:54

  • Cyrus Wanjohi Kenya well understood
    2014-11-17 12:11:42

  • Cyrus Wanjohi Kenya Having identified the sources of information, the next step the analyst must take is to establish what information can be gained from them. The information which can be gained from the manager will be different from the data entry clerk, which will be different from the customers and so on. The analyst must decide what information should be obtained from each source identified.
    2014-11-17 12:11:11

  • Caroline Omoro Kenya after identifying the sources of information, what follows is scrutiny of the information.different levels have different information.In a nutshell the system analyst should do the following; 1.consider how reliable the source of information is 2.evaluate information for bias and relevance 3.give appropriate weight to the information 4.consider how suitable the source of information is
    2014-11-16 13:11:54

  • Cyrus Wanjohi Kenya Having identified the sources of information, the next step the analyst must take is to establish what information can be gained from them. The information which can be gained from the manager will be different from the data entry clerk, which will be different from the customers and so on. The analyst must decide what information should be obtained from each source identified. It is unusual for one user to be the exclusive source of information about the system. Most aspects of the system will have some degree of overlap - it may be that significant detail will come mainly from one source, but there will usually be other users who are also impacted, and information must be collected from them as well. As well as identifying who will be capable of supplying what information in this step, the analyst must also make decisions about the reliability and suitability of the sources. Information collected must be evaluated for bias and relevance and given the appropriate weighting in the overall analysis of the system. For example, while a manager and a data clerk would both have opinions on the usefulness of the financial reports produced by a particular system, the manager's opinion would have more weighting, but conversely, the data clerk's opinion has more significance in areas relating to the ease of data entry. Sometimes, the analyst will identify the need for other information in order to fully analyse the system. In this case, they would need to document where this information can be obtained. An example of this would be the need to conform to government privacy regulations with regard to the release of confidential data on individuals.
    2014-11-16 07:11:53

  • Cyrus Wanjohi Kenya Having identified the sources of information, the next step the analyst must take is to establish what information can be gained from them. The information which can be gained from the manager will be different from the data entry clerk, which will be different from the customers and so on. The analyst must decide what information should be obtained from each source identified. It is unusual for one user to be the exclusive source of information about the system. Most aspects of the system will have some degree of overlap - it may be that significant detail will come mainly from one source, but there will usually be other users who are also impacted, and information must be collected from them as well. As well as identifying who will be capable of supplying what information in this step, the analyst must also make decisions about the reliability and suitability of the sources. Information collected must be evaluated for bias and relevance and given the appropriate weighting in the overall analysis of the system. For example, while a manager and a data clerk would both have opinions on the usefulness of the financial reports produced by a particular system, the manager's opinion would have more weighting, but conversely, the data clerk's opinion has more significance in areas relating to the ease of data entry. Sometimes, the analyst will identify the need for other information in order to fully analyse the system. In this case, they would need to document where this information can be obtained. An example of this would be the need to conform to government privacy regulations with regard to the release of confidential data on individuals.
    2014-11-16 07:11:23

  • Cyrus Wanjohi Kenya Having identified the sources of information, the next step the analyst must take is to establish what information can be gained from them. The information which can be gained from the manager will be different from the data entry clerk, which will be different from the customers and so on. The analyst must decide what information should be obtained from each source identified. It is unusual for one user to be the exclusive source of information about the system. Most aspects of the system will have some degree of overlap - it may be that significant detail will come mainly from one source, but there will usually be other users who are also impacted, and information must be collected from them as well. As well as identifying who will be capable of supplying what information in this step, the analyst must also make decisions about the reliability and suitability of the sources. Information collected must be evaluated for bias and relevance and given the appropriate weighting in the overall analysis of the system. For example, while a manager and a data clerk would both have opinions on the usefulness of the financial reports produced by a particular system, the manager's opinion would have more weighting, but conversely, the data clerk's opinion has more significance in areas relating to the ease of data entry. Sometimes, the analyst will identify the need for other information in order to fully analyse the system. In this case, they would need to document where this information can be obtained. An example of this would be the need to conform to government privacy regulations with regard to the release of confidential data on individuals.
    2014-11-16 07:11:37

  • Janvier Nyandamu Rwanda who is the analyst?
    2014-11-10 14:11:22

    • Cyrus Wanjohi Kenya Having identified the sources of information, the next step the analyst must take is to establish what information can be gained from them. The information which can be gained from the manager will be different from the data entry clerk, which will be different from the customers and so on. The analyst must decide what information should be obtained from each source identified. It is unusual for one user to be the exclusive source of information about the system. Most aspects of the system will have some degree of overlap - it may be that significant detail will come mainly from one source, but there will usually be other users who are also impacted, and information must be collected from them as well. As well as identifying who will be capable of supplying what information in this step, the analyst must also make decisions about the reliability and suitability of the sources. Information collected must be evaluated for bias and relevance and given the appropriate weighting in the overall analysis of the system. For example, while a manager and a data clerk would both have opinions on the usefulness of the financial reports produced by a particular system, the manager's opinion would have more weighting, but conversely, the data clerk's opinion has more significance in areas relating to the ease of data entry. Sometimes, the analyst will identify the need for other information in order to fully analyse the system. In this case, they would need to document where this information can be obtained. An example of this would be the need to conform to government privacy regulations with regard to the release of confidential data on individuals.
      2014-11-16 07:11:20
    • Cyrus Wanjohi Kenya Having identified the sources of information, the next step the analyst must take is to establish what information can be gained from them. The information which can be gained from the manager will be different from the data entry clerk, which will be different from the customers and so on. The analyst must decide what information should be obtained from each source identified. It is unusual for one user to be the exclusive source of information about the system. Most aspects of the system will have some degree of overlap - it may be that significant detail will come mainly from one source, but there will usually be other users who are also impacted, and information must be collected from them as well. As well as identifying who will be capable of supplying what information in this step, the analyst must also make decisions about the reliability and suitability of the sources. Information collected must be evaluated for bias and relevance and given the appropriate weighting in the overall analysis of the system. For example, while a manager and a data clerk would both have opinions on the usefulness of the financial reports produced by a particular system, the manager's opinion would have more weighting, but conversely, the data clerk's opinion has more significance in areas relating to the ease of data entry. Sometimes, the analyst will identify the need for other information in order to fully analyse the system. In this case, they would need to document where this information can be obtained. An example of this would be the need to conform to government privacy regulations with regard to the release of confidential data on individuals.
      2014-11-16 07:11:15
    • Cyrus Wanjohi Kenya Having identified the sources of information, the next step the analyst must take is to establish what information can be gained from them. The information which can be gained from the manager will be different from the data entry clerk, which will be different from the customers and so on. The analyst must decide what information should be obtained from each source identified. It is unusual for one user to be the exclusive source of information about the system. Most aspects of the system will have some degree of overlap - it may be that significant detail will come mainly from one source, but there will usually be other users who are also impacted, and information must be collected from them as well. As well as identifying who will be capable of supplying what information in this step, the analyst must also make decisions about the reliability and suitability of the sources. Information collected must be evaluated for bias and relevance and given the appropriate weighting in the overall analysis of the system. For example, while a manager and a data clerk would both have opinions on the usefulness of the financial reports produced by a particular system, the manager's opinion would have more weighting, but conversely, the data clerk's opinion has more significance in areas relating to the ease of data entry. Sometimes, the analyst will identify the need for other information in order to fully analyse the system. In this case, they would need to document where this information can be obtained. An example of this would be the need to conform to government privacy regulations with regard to the release of confidential data on individuals.
      2014-11-16 07:11:01
  • Nothando Gumpo United Kingdom Having identified the sources of information, the next step the analyst must take is to establish what information can be gained from them. The information which can be gained from the manager will be different from the data entry clerk, which will be different from the customers and so on. The analyst must decide what information should be obtained from each source identified. It is unusual for one user to be the exclusive source of information about the system. Most aspects of the system will have some degree of overlap - it may be that significant detail will come mainly from one source, but there will usually be other users who are also impacted, and information must be collected from them as well. As well as identifying who will be capable of supplying what information in this step, the must also make decisions about the reliability and suitability of the sources. Information collected must be evaluated for bias and relevance and given the appropriate weighting in the overall analysis of the system. For example, while a manager and a data clerk would both have opinions on the usefulness of the financial reports produced by a particular system, the manager's opinion would have more weighting, but conversely, the data clerk's opinion has more significance in areas relating to the ease of data entry. Sometimes, the analyst will identify the need for other information in order to fully analyse the system. In this case, they would need to document where this information can be obtained. An example of this would be the need to conform to government privacy regulations with regard to the release of confidential data on individuals.
    2014-11-06 13:11:48

  • Samuel Kofi Odoi Ghana It is unusual for one user to be the exclusive source of information about the system. Most aspects of the system will have some degree of overlap - it may be that significant detail will come mainly from one source, but there will usually be other users who are also impacted, and information must be collected from them as well. As well as identifying who will be capable of supplying what information in this step, the analyst must also make decisions about the reliability and suitability of the sources. Information collected must be evaluated for bias and relevance and given the appropriate weighting in the overall analysis of the system. For example, while a manager and a data clerk would both have opinions on the usefulness of the financial reports produced by a particular system, the manager's opinion would have more weighting, but conversely, the data clerk's opinion has more significance in areas relating to the ease of data entry. Sometimes, the analyst will identify the need for other information in order to fully analyse the system. In this case, they would need to document where this information can be obtained. An example of this would be the need to conform to government privacy regulations with regard to the release of confidential data on individuals. How can this lodge as confidential document. can a system be design for it confidentiality use?
    2014-10-20 04:10:54

  • Ralph Webster South Africa Having identified the sources of information, the next step the analyst must take is to establish what information can be gained from them. The information which can be gained from the manager will be different from the data entry clerk, which will be different from the customers and so on. The analyst must decide what information should be obtained from each source identified. It is unusual for one user to be the exclusive source of information about the system. Most aspects of the system will have some degree of overlap - it may be that significant detail will come mainly from one source, but there will usually be other users who are also impacted, and information must be collected from them as well. As well as identifying who will be capable of supplying what information in this step, the analyst must also make decisions about the reliability and suitability of the sources. Information collected must be evaluated for bias and relevance and given the appropriate weighting in the overall analysis of the system. For example, while a manager and a data clerk would both have opinions on the usefulness of the financial reports produced by a particular system, the manager's opinion would have more weighting, but conversely, the data clerk's opinion has more significance in areas relating to the ease of data entry. Sometimes, the analyst will identify the need for other information in order to fully analyse the system. In this case, they would need to document where this information can be obtained. An example of this would be the need to conform to government privacy regulations with regard to the release of confidential data on individuals.
    2014-10-19 10:10:32

  • George Fragos Greece Why it is unusual for a user to be the exclusive source of information about the system?
    2014-10-01 09:10:42

  • ANNETTE ROBINSON United States of America I need to do a little more research on this area. Can someone explain it a little more in layman's term?
    2014-09-09 12:09:39

Loading Menu