Presenting the Evaluation Model of Information Systems Development Measures

Document Type : Original Article

Authors

Ph.D. in National Security, Supreme National Defense University

Abstract

The revolution in the field of Fawa shows the necessity of continuous development and evaluation of information and communication systems. The purpose of this research is to provide evaluation models in information systems development methods. The sample of this research was 40 specialists in the development and implementation of information systems, who were selected by the purposeful sampling method. The research tool was made by the researcher’s questionnaire for which Cronbach’s alpha test showed acceptable validity and reliability. The collected data were analyzed along with statistical tests during experiments. The findings have shown that the necessary operations in the traditional method are: needs assessment, feasibility study, conceptual and logical design, deployment and implementation, maintenance, reporting and documentation, setting goals, determining performance indicators, cost-benefit analysis and detailed design. is the system. Prototyping methods include: system improvement and development, needs assessment, conceptual and logical design, programming, testing and evaluation, implementation and physical design. In the life cycle method, they are: design, requirements assessment, feasibility study, feasibility report, identification of user information requirements, conceptual and logical design, programming, evaluation and testing, deployment and implementation, delivery, maintenance and development of the system, report and It is documentation. In the organization-oriented method, they are: determining systems and subsystems, information requirements, managing resources and formulating an information strategy. In the object-oriented method, they are: examining the system’s information interaction, system modeling, identifying important events, change diagrams, modeling processes, and drawing data flow diagrams. As a result: different organizations, situations and information systems require the use of different implementation methods, and designers and implementers must act towards the realization of the standard operational measures of each method

Keywords


 
1- اخوان نیاکی، انوشیروان (1394). مقایسه فراروش های ایجاد و توسعه سامانه های اطلاعاتی. تهران: انستیتو ایز ایران.
2- الهی، شعبان و باقری، مسعود (1382). نقش معماری در توسعه سیستم‌های اطلاعات استراتژیک. اولین سمینار مدیریت فن آوری اطلاعات، تهران.
3- توکلی، احمد (1398). عوامل موثر در موفقیت پروژه های فناوری اطلاعات دولت الکترونیک. بازیابی در 10 اسفند 1398 از: https://b2n.ir/548955
4- حسن بیگی، ابراهیم و کیان‌خواه، احسان (1392). تفکر استراتژیک لازمه اثربخشی فاوا و ارتباطات.
5- حسینی، حجت الله (1391). تحقیق و بررسی پیرامون نظام توسعه فناوری ایران. توسعه تکنولوژی، 3(6)، 74-5.
6- رضایی، رضا؛ شمس، فریدون و شمس، زینب (1392). ارائه روشی برای تدوین برنامه معماری سازمانی. چهاردهمین کنفرانس سالانه انجمن کامپیوتر ایران، تهران، انجمن کامپیوتر، دانشگاه صنعتی امیر کبیر.
7- شکوهی، حسین؛ خیرگو، منصور و لطفی، محمد (1391). مدل راهبردی توسعه فاوادر سازمان‌های دفاعی ج.ا.ایران. مطالعات بین رشته‌ای دانش راهبردی، 7، 193-168.
8- قاضی‌زاده‌فرد، سیدضیاء‌الدین (1387). ‌فناوری اطلاعات و ارتباطات و مبانی سیستم‌های اطلاعاتی،  جلد اول.‌ تهران: انتشارات دانشگاه امام حسین (علیه السلام).
9- کیان‌خواه، احسان (1389). مدیریت امنیت اطلاعات. تهران: انتشارات ناقوس.
10- ولوی، محمد رضا (1388) شناخت سامانه‌های C4I در نیروی دریایی. تهران: موسسه آموزشی و تحقیقاتی صنایع دفاع.
 
منابع لاتین
11- Alag, S  (2016). National and Transnational Security Implications of Big Data in the Life Science. A Joint AAAS-FBI-UNICRI Project
12- Altmann, J (2006). Military Nanotechnology: New Technology and arms Control, Contemprory Security Studies, Germany and land use patterns. International Journal of Environmental Science and Technology. DOI10.1007/s13762-014-0660-6
13- Aral, S., Brynjolfsson, E and Van Alstyne, M (2013). Information, technology, and informationworker productivity. Information Systems Research, 23(3(, 849–867.
14- Colin, M., Galindo, R and Hernandez, O (2015). Information and Communication Technology as a KeyStrategy for Efficient Supply Chain Management in Manufacturing SMEs. Procedia Computer Science, 55, 833-842.
15- Harrington , C & Theohary, A (2015). Cyber Operations in DOD Policy and Plans: Issues for Congress. Congressional Research Service
16- Hewitt, E (2018). Technology Strategy Patterns Architecture as Strategy. oreilly media
17- Itami, H and Numagami, T (2009). Dynamic interaction between strategy and technology. Strategy Management Journal. doi: 10.1002/smj.4250130909
18- Janczewski, L & Colarik, A (2008). Cyber warfare and cyber terrorism. America: information science reference.
19- Perry, Z (2010). Information Technology: Past and Current Trends. at: http://www.associatedcontent.com, Acces Date:perspective, Prentice-Hall
20- Porter, A., Rossin, F & Carpenter, S (2010). A Guidebook for Technology Assessment and Impact Analysis. New York: North Holland
21- Reddy, M & Monika, M (2012). Integrate Military with Distributed Cloud Computing and Secure Virtualization.  International Journal of Enhanced Research in Management & Computer Applications, 1(3).
22- Shariati, M., Bahmani, F & Shams, F (2011). Enterprise information security, a review of architectures and frameworks from interoperability perspective. Procedia Computer Science, 3, 537-543.
23- Sherwood، J (2009). Enterprise Security Architecture-A Business Driven Approach. CRC Press، by Taylor & Francis Group.
24- Ward, J & Pepard, J (2012). Strategic Planning for Information Systems. New York.