System Development and Program Change Activities
System Development and Program Change Activities
System Development and Program Change Activities
The learning objectives of this chapter is to identify how business acquire there information
system, to be able to identify and understand the stages in the systems development life cycle and
understand the risk, controls, and audit issues related to systems development and maintenance
procedures.
We will be starting this chapter on what is system development process and how the business
acquire its information systems and there advantages and disadvantages. This chapter will focuses on
System Development Life Cycle and Controlling and Auditing the SLDC. The two stages of system
development process or the systems development life cycle (SDLC) which are; fist, the “New systems
development” compose of seven phases which are systems planning, systems analysis, conceptual design,
systems selection, detailed design, programming and testing, and implementation, and second, the
“Program change procedures” compose of one phase which is maintenance.
System development process constitutes a set of activities by which organizations obtain IT-
based information systems. Auditors are interested in this activity because they want to ensure the
integrity of this process and to know the quality of accounting information presented in an organization’s
financial statements. The participants in this activity are the system professionals, end users and
stakeholders.
Most business acquire there information systems in either two ways which are “In-house
development” or “Commercial systems”. In-house development are systems that are highly unique
operations in short this systems are made only for the company while commercial systems are systems
that where purchased from software vendors.
Commercial software is group into three which are the “Turnkey systems”, “Backbone systems”,
and “Vendor-supported systems”. Turnkey systems are systems that are finished and tested systems that
are ready for implementation just like general accounting systems, special-purpose systems and office
automation systems. Backbone systems are systems that are designed and programmed the user interface
to suit the user’s needs. Vendor-supported systems are custom systems that the vendor develops and
maintains for the client organization.
Advantages of commercial software is that it can be implemented immediately once needed, it is
less costly and lastly it’s less likely to have an errors; in the other way around the disadvantages of
commercial software is that the firm is dependent on the vendor for maintenance, it is too general or too
inflexible, and lastly it is difficult to modify. Advantages of in-house development is that the firm will no
longer depend on the vendor for maintenance, it had the ability to produce applications, and lastly it
provides users with proprietary applications that can be economically maintained while the disadvantages
is that it take long time to develop, more costly and it is more likely to have an errors.
Purpose: produce a detailed description of the proposed system that both satisfy the system
requirements identified during systems analysis and in accordance with the conceptual design. System
components are specified and formally presented in a detailed design report.
Detailed design report- set of blueprint that specify input screen formats, output report layouts,
database structures, and process logic.
* Performance of system design walkthrough is needed to ensure that the design is free from conceptual
errors that could become programmed into the final system
*quality assurance group – simulate the operation of the system to uncover errors, omissions, and
ambiguities in the design.
A programming language is a set of commands, instructions, and other syntax use to create a
software program.
1. Procedural Languages- specifies a series of well-structured steps and procedures within its
programming context to compose a program.
Example: Microsoft Visual Basic- a programmer uses a graphical user interface (GUI) to choose
and modify preselected sections of code written in the BASIC programming language.
3. Object Oriented Languages- approach to problem-solving where all computations are carried out
using objects.
Encapsulation- the act of placing data and methods in the same class and thus restricting access
to the object’s components.
Inheritance
Polymorphism- allows multiple and different objects to respond to the same message.
For security and control purposes, the activities of programmers and operators should be
separated.
User Documentation
Users documentation describing how to use the system. The nature of user documentation will
depend on the user’s degree of sophistication with computers and technology. Thus, before designing user
documentation, the systems professional must assess and classify the user’s skill level. The following is
one possible classification scheme:
Novices- users have little or no experience with computers. User training and
documentation for novices must be extensive and detailed.
Occasional users- when users once understood the system but have forgotten some
essential commands and procedures. They require less training and documentation than
novices.
Frequent light users- are familiar with limited aspects of the system. Although functional,
they tend not to explore beneath the surface and lack depth of knowledge. This group
knows only what it needs to know and requires training and documentation for unfamiliar
areas.
Frequent power users- understand the existing system and will readily adapt to new
systems. They like to find shortcuts and use macro commands to improve performance.
This group requires only abbreviated documentation.
These two establish the accuracy of new applications and preserve their integrity throughout the
period under review.
Verify that SDLC activities are applied consistently and in accordance with management’s
policies.
Determine that the system as originally implemented was free from material errors and fraud.
Confirm that the system was judged to be necessary and justified at various check-points
throughout the SDLC.
Verify that system documentation is sufficiently accurate and complete to facilitate audit and
maintenance activities.
AUDIT PROCEDURES RELATED TO NEW SYSTEMS DEVELOPMENT
Upon implementation, the system enters the maintenance phase and this is the longest period in
SDLC.
Systems do not remain static throughout period rather, they may undergo substantial changes that
constitute financial outlay.
Auditor’s review should extend into maintenance phase to determine that application integrity is
still intact.
Formal Authorization
Technical Specification of the changes
Retesting the system
Updating the documentation
Password Control
- Provides one form of access control over the SPL
- When more than one person is authorized to access a program, preserving the secrecy of a shared
password is a problem
Separate Test Libraries
- Programs are copied into the programmer’s library for maintenance and testing
- This technique greatly reduces the risk of accidentally running an untested version of program in
place of the production program
Audit trail and Management Reports
- Creation of reports that enhance management control and the audit function (modification
reports-most useful)
- These reports should be part of documentation file of each application to form an audit trail
Program Version Numbers
- When combined with the audit trail reports provides evidence in identifying unauthorized
changes to program modules
Controlling Access to Maintenance Commands
- Use powerful maintenance commands to alter or eliminate program passwords, alter program
verification number and temporarily modify a program without generating a record of the
modification
- Should be controlled by management or the security group
QUESTIONS:
1. The steering committee is the one in charge in systems planning. TRUE
2. This is the foundation for the rest of the system development and life cycle. SYSTEMS
ANALYSIS
3. Users who have little or no experience with computers. NOVICES
4. Under this approach, the firm switches to the new system and simultaneously terminates the old
system. COLD TURKEY APPROACH
5. Which of these are performed in the analysis phase?
a. Approve all project requests
b. Perform detailed analysis of the old system
c. Build a prototype
d. Review and allocate resources to the project
6. Acquire hardware and software is done in which phase?
a. Planning
b. Analysis
c. Design
d. Implementation
7. Which one is incorrect feasibility assessment?
a. Technology Feasibility
b. Technical Feasibility
c. Economic Feasibility
d. Operation Feasibility
8. Conduct preliminary investigation and perform detailed analysis are the two major activities in
maintenance. FALSE
9. Checks for errors, bugs and interoperability. The goal is to ensure that defects are recognized as
soon as possible. This is part of TESTING.
10. Select all the ways in which a system analyst can gather information about a current system.
a. Interviews
b. Questionnaires
c. Observation
d. Inspection of records
e. All of the above