Navigation
SYSTEM ANALYSIS AND DESIGN PROJECT SELECTION
UNIT 1: PROJECT SELECTION
1. Sources of Project Request
1.1 What is a Project Request?
A project request is a formal or informal proposal to create, modify, or replace an information system. It can be a simple email, a completed form (like a Request for System Services – RSS), a verbal request during a meeting, or a strategic directive from the board.
1.2 Why Identify the Source?
Knowing the source helps:
- Determine the priority (e.g., CEO’s request vs. one user’s wish).
- Assign responsibility for further investigation.
- Understand the context and urgency.
- Predict resistance or support during implementation.
1.3 Detailed Classification of Sources
A. Internal Sources (within the organization)
| Source | Description | Example |
|---|---|---|
| Top Management | Strategic initiatives to gain competitive advantage, reduce costs, or comply with regulations. Often high priority. | “We need a dashboard showing real-time sales across all regions by next quarter.” |
| Department Managers | Operational improvements to increase efficiency, reduce errors, or improve service within a single department. | Inventory manager: “Our stock reorder system is manual; we need automated alerts when stock falls below threshold.” |
| Steering Committee | A cross-functional group (IT, finance, operations) that identifies projects during portfolio planning. | “Our ERP system is outdated; we request a feasibility study for replacement.” |
| End-Users | Frontline employees who face daily system frustrations. Often small-scale but high in usability value. | Data entry clerk: “Every time I enter a customer order, the system lags for 10 seconds. Can we fix this?” |
| System Analysts | Proactive identification of inefficiencies or opportunities using new technology. | Analyst notices that 30% of help desk tickets are password resets → proposes single sign-on (SSO). |
| Internal Audit | Identifies control weaknesses, fraud risks, or compliance gaps. | “User access rights are not reviewed quarterly; we need an automated access certification module.” |
B. External Sources (outside the organization)
| Source | Description | Example |
|---|---|---|
| Customers | Requests for better service, self-service portals, or integration. | “We want to check our order status online without calling your support team.” |
| Suppliers / Partners | Need for electronic data interchange (EDI), real-time inventory sharing, or automated payments. | “We will give you a 5% discount if you integrate your purchase orders directly with our system.” |
| Government / Regulators | New laws or standards that require system changes. | “GDPR requires that customers can export all their personal data. We need a new feature.” |
| Competitors | Imitation or differentiation pressure. | “Competitor X launched a mobile app for field service; we need one too to stay relevant.” |
| Technology Vendors | New tools or platforms that promise savings or capabilities. | “Microsoft offers a low-code platform that could replace your legacy claims system in 3 months.” |
1.4 Formal Documentation: Request for System Services (RSS)
Most organizations use a standard RSS form to capture project requests. It typically includes:
- Requester name, department, date
- Problem or opportunity description (what, where, when, how often)
- Expected benefits (tangible and intangible)
- Urgency / priority (high/medium/low)
- Known constraints (budget, timeline, regulatory)
- Approval signature of department head
Example RSS excerpt
Problem: “Accounts payable currently matches purchase orders and invoices manually. Average processing time is 12 days. Last month we missed 2 early payment discounts.”
Expected benefit: “Reduce processing to 3 days; capture 95% of discounts; estimated annual saving $150,000.”
Urgency: High – competition is automating.
1.5 Key Takeaway for Sources
A systematic process for capturing and logging requests from all sources ensures no valuable idea is lost. The source influences the evaluation criteria: a top-management request might skip some cost-benefit rigor if it’s a strategic necessity, while an end-user request must prove its value.
2. Managing Project Review and Selection
2.1 Purpose of Review and Selection
Not all project requests can be approved due to limited budget, staff, and time. The review and selection process ensures that:
- Only viable, valuable projects proceed.
- Projects align with business strategy.
- Risks are understood and acceptable.
- Resource conflicts are avoided.
- Stakeholders agree on priorities.
2.2 The Review and Selection Process – Step by Step
Step 1: Logging and Acknowledgment
- Enter each request into a project portfolio database (e.g., SharePoint, Jira, or a simple Excel sheet).
- Assign a unique ID and date received.
- Send an acknowledgment to the requester (e.g., “We have received your request #PR-2025-012 and will review it within 10 business days.”).
Step 2: Initial Screening (Triaging)
A quick check (often by a system analyst or PMO) to filter out obviously invalid requests:
| Criteria for Rejection | Reason |
|---|---|
| Out of strategic scope | “We are a B2B manufacturer; a consumer loyalty app is not aligned.” |
| Already exists | “This report is already available in the dashboard – see training guide.” |
| No clear problem/benefit | “The request says ‘make system faster’ but gives no metrics.” |
| Impossible technically | “Request to integrate with a mainframe that will be decommissioned next month.” |
| Too small | “Change a field label from ‘Addr’ to ‘Address’ – do it as a quick fix, not a project.” |
Step 3: Detailed Evaluation
For requests that pass screening, perform a formal evaluation using quantitative and qualitative methods.
3.1 Financial Analysis (Tangible Costs & Benefits)
Net Present Value (NPV)
NPV = Σ (Benefit_t – Cost_t) / (1 + r)^t – Initial Investment
Decision rule: Accept if NPV > 0. Higher NPV is better.
Return on Investment (ROI)
ROI = (Average annual net benefit / Initial investment) × 100%
Example: Investment $200k, annual net benefit $50k → ROI = 25% over 4 years? Wait, careful: Simple ROI = Total net benefit / Investment × 100. If total net benefit over life = $250k, then ROI = 125%. But often annualized.
Payback Period
Time to recover initial investment. Shorter is less risky.
Example: Investment $100k, annual net cash flow $40k → payback = 2.5 years.
Cost-Benefit Analysis (CBA)
List all tangible (hardware, software, salaries) and intangible (customer satisfaction, employee morale) costs and benefits. For intangibles, assign a proxy value or use a scoring approach.
Example CBA Table for a CRM project
| Cost Item | Amount ($) | Benefit Item | Amount ($) |
|---|---|---|---|
| Software license (year 1) | 50,000 | Increased sales (5% uplift) | 200,000 |
| Hardware (servers) | 20,000 | Reduced data entry time (2 hrs/day × 10 staff) | 60,000 |
| Training | 10,000 | Better customer retention (2% reduction churn) | 100,000 |
| Maintenance (annual) | 15,000 | – | – |
| Total Year 1 | 95,000 | Total Year 1 | 360,000 |
| Net benefit Year 1 = $265,000 (before considering multi-year costs). |
3.2 Weighted Scoring Model (for comparing multiple projects)
- Define criteria (e.g., strategic alignment, urgency, risk, cost, benefit, technical difficulty).
- Assign weights (total 100%).
- Score each project on a scale (e.g., 1–100) for each criterion.
- Multiply score × weight, sum to get total weighted score.
Detailed example with 2 projects:
| Criterion | Weight | Project A (Inventory System) | Project B (Mobile Sales App) |
|---|---|---|---|
| Strategic fit (0–100) | 30% | 90 (27) | 70 (21) |
| Net benefit (NPV in $M) | 25% | 80 (20) | 95 (23.75) |
| Implementation risk (invert) | 20% | 60 (12) | 80 (16) |
| Urgency (higher better) | 15% | 70 (10.5) | 90 (13.5) |
| Stakeholder support | 10% | 85 (8.5) | 75 (7.5) |
| Total weighted score | 100% | 78.0 | 81.75 |
| Project B wins despite lower strategic fit because of higher NPV and lower risk. |
3.3 Risk Assessment
Identify potential risks for each project:
- Technical risk: New technology, integration complexity.
- Operational risk: User resistance, process disruption.
- Schedule risk: Tight deadlines, dependency on external vendors.
- Financial risk: Cost overruns, benefits not realized.
For each risk, estimate likelihood (low/medium/high) and impact (low/medium/high). High-risk projects may require a risk mitigation plan before approval.
Step 4: Prioritization and Ranking
Combine financial scores, weighted scores, and risk ratings into a prioritized list. Common prioritization techniques:
- MoSCoW: (Must have, Should have, Could have, Won’t have) – more for requirements, but can be adapted for projects.
- Kano model: separates basic, performance, and delight features.
- Simple ranking: The steering committee orders projects by a single combined criterion (e.g., “value / cost” ratio).
Step 5: Approval Decision
The steering committee (or IT governance board) makes the final decision. Possible outcomes:
- Approved as submitted: Proceed to preliminary investigation or directly to project initiation.
- Approved with modifications: e.g., reduce scope, extend timeline, or find cheaper alternative.
- Deferred: Review again in 6 months when resources are available.
- Rejected: Document reasons; inform requester; may be resurrected later if conditions change.
Step 6: Communication and Documentation
- Publish the approved project list to all stakeholders.
- For rejected/deferred projects, provide a clear explanation (e.g., “Low ROI compared to other projects” or “Dependency on another project that was cancelled”).
- Keep a project backlog for future cycles.
2.3 Real-World Example of Review & Selection
Scenario: A medium-sized logistics company receives three project requests in one month.
| Request | Source | Rough Benefit (annual) | Rough Cost | Risk |
|---|---|---|---|---|
| 1. Real-time driver tracking app | Sales dept | $500k | $150k | Medium |
| 2. Upgrade accounting software | Finance dept | $200k | $100k | Low |
| 3. AI-based route optimization | CEO | $1M | $400k | High |
Evaluation:
- NPV (10% discount rate, 3 years):
- Project 1: $500k×3 = $1.5M benefits – $150k cost = $1.35M / (1.1^1 etc.) ~ $1.1M NPV.
- Project 2: $200k×3 = $600k – $100k = $500k NPV.
- Project 3: $1M×3 = $3M – $400k = $2.6M NPV, but risk high.
- Weighted scoring: assign lower weight to risk? Or require mitigation.
- Decision: Approve Project 1 and Project 2. Approve Project 3 conditionally – first do a proof-of-concept with 6 months of clean data.
2.4 Key Takeaway for Review & Selection
This is a business decision, not just a technical one. Use a mix of financial models, scoring, and risk analysis. Always involve stakeholders from different departments to avoid bias.
3. Preliminary Investigation (Feasibility Study)
3.1 Definition and Purpose
A preliminary investigation (also called initial study, feasibility analysis, or project scoping) is a short, focused research effort to determine whether a proposed project is feasible and worth a full-scale system analysis.
- Duration: Typically 1–4 weeks.
- Cost: Usually 1%–5% of the estimated project cost.
- Output: A Preliminary Investigation Report with a clear go/no-go recommendation.
3.2 Why Preliminary Investigation is Critical
- Prevents wasting resources on projects that are impossible, too costly, or not aligned.
- Clarifies vague requests into actionable problems.
- Builds early stakeholder buy-in.
- Provides a rough budget and schedule for the next phase.
3.3 Detailed Steps of Preliminary Investigation
Step 1: Understand the Request
- Meet with the requester (and key users) to discuss the problem in detail.
- Review existing documentation – RSS, process maps, error logs, previous studies.
- Observe the current system if possible (e.g., shadow a user for 2 hours).
- Create a preliminary problem statement in clear, measurable terms.
Example vague request: “Our order entry system is too slow.”
After investigation: “On average, entering a 10-line order takes 4 minutes, compared to the industry standard of 1 minute. 80% of the delay occurs when the system checks inventory across three warehouses.”
Step 2: Define Scope and Boundaries
- In scope: Which processes, departments, locations, and user roles are included?
- Out of scope: What is explicitly excluded to prevent scope creep?
- Interfaces: Which external systems or organizations will the new system interact with?
Example scope statement:
“This project will cover the sales order entry process for domestic customers only. International orders, warehouse management, and invoicing are out of scope. The system must interface with the existing ERP and CRM.”
Step 3: Conduct Feasibility Analysis (Five Types)
3.1 Technical Feasibility
- Does the required technology exist and is it mature?
- Does the organization have the hardware, software, and network capacity?
- Does the IT team possess the necessary skills, or can they be trained/hired?
- Are there integration challenges with legacy systems?
3.2 Economic Feasibility (Cost-Benefit)
- Rough order of magnitude (ROM) estimate: ±50% accuracy.
- Identify one-time costs and recurring costs.
- Identify tangible and intangible benefits.
- Compute a simple payback or break-even point.
Example economic feasibility table (ROM)
| Cost Category | Amount ($) | Benefit Category | Amount ($/year) |
|---|---|---|---|
| Development | 48,000 | Labor savings | 30,000 |
| Hardware (server) | 5,000 | Reduced errors | 2,000 |
| Software licenses | 10,000 | Faster order processing | 100,000 |
| Training | 7,000 | – | – |
| Total Year 0 | 70,000 | Annual benefit | 132,000 |
| Payback = $70,000 / $132,000 ≈ 0.53 years (~6 months). |
3.3 Operational Feasibility
- Will users accept the new system?
- Does the system solve the real problem?
- Does it fit with existing workflows and culture?
- Are there legal or ethical concerns?
3.4 Schedule Feasibility
- Can the system be delivered before a critical deadline?
- Are there any external dependencies?
3.5 Legal / Compliance Feasibility
- Does the system comply with data protection laws (GDPR, CCPA, HIPAA)?
- Are there industry standards (PCI-DSS, SOX)?
Step 4: Identify Alternatives (Optional but Valuable)
- Do nothing: Continue with current system (baseline).
- Improve existing system: Modify, add modules, or train users.
- Buy a commercial package: Off-the-shelf (COTS) with configuration.
- Build custom: In-house development or outsourced.
- Cloud/SaaS: Subscription model.
Step 5: Estimate Resources for Full Analysis
If the project goes ahead, what will the requirements analysis phase cost and take?
- Analyst time (e.g., 2 analysts × 6 weeks = 12 person-weeks)
- User time (interviews, workshops, reviews)
- Travel
- Software for prototyping
Step 6: Prepare the Preliminary Investigation Report
Typical structure:
- Executive Summary: One page: problem, findings, recommendation.
- Introduction: Background, request summary, investigation methods.
- Current System Description: As-is process, pain points, data flow.
- Problem/Opportunity Statement: Clear, quantified.
- Scope and Boundaries: In/out of scope.
- Feasibility Findings: Technical, economic, operational, schedule, legal.
- Alternative Solutions: Brief comparison.
- Estimated Time & Cost for Next Phase.
- Recommendation: Go / No-go / Modified go.
- Appendices: Data collected, interview notes, rough cost estimates.
Step 7: Present to Steering Committee
- Focus on key risks and assumptions.
- Be prepared to answer: “What happens if we do nothing?” and “What is the single biggest reason this might fail?”
3.4 Real-World Example of a Preliminary Investigation
Context: A regional hospital receives a request from the emergency department (ED) to replace the paper-based patient tracking board with a digital status board.
Preliminary investigation steps:
- Understand request: Interview ED nurses and doctors.
- Scope: Include ED admission, triage, room assignment, and discharge.
- Feasibility:
- Technical: Medium technical risk due to API integration.
- Economic: Feasible. Payback < 4 months.
- Operational: Feasible with change management.
- Schedule: Feasible.
- Legal: Compliant with HIPAA if properly configured.
- Recommendation: Go, but with a condition: First negotiate API access with the ADT vendor.
3.5 Common Pitfalls in Preliminary Investigation
| Pitfall | Consequence | Prevention |
|---|---|---|
| Skipping it | Small project becomes large, fails | Always do a mini-PI |
| Not talking to users | Miss critical requirements | Speak to at least 3 users |
| Over-optimistic estimates | Project approved but later cancelled | Use ranges and document assumptions |
| Ignoring operational feasibility | System built but never used | Include user acceptance risk section |
| Failing to define scope | Scope creep during analysis | Write explicit “out of scope” items |
3.6 Key Takeaway for Preliminary Investigation
Think of it as a low-cost insurance policy. It takes a few weeks but saves months of wasted work. Always produce a written report, and always include a clear go/no-go recommendation.
Final Summary Table – Project Selection
| Sub-topic | Core Elements | Deliverable |
|---|---|---|
| Sources of Project Request | Internal (management, users, analysts, audit) + External (customers, regulators, competitors, vendors) | Logged Request (RSS) |
| Managing Project Review & Selection | Screening → Financial analysis (NPV, ROI, Payback) → Weighted scoring → Risk assessment → Approval decision | Prioritized project portfolio + approval decision |
| Preliminary Investigation | Understand request → Define scope → Five feasibilities (technical, economic, operational, schedule, legal) → Report with go/no-go | Preliminary Investigation Report (Go/No-Go) |
