Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.

Slides:



Advertisements
Similar presentations
Fundamentals of Information Systems, Sixth Edition
Advertisements

Ethics, Privacy and Information Security
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives Policies and procedures must be established to avoid computer waste.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
Principles and Learning Objectives
Designing new systems or modifying existing ones should always be aimed at helping an organization achieve its goals State the purpose of systems design.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8.
Fundamentals of Information Systems, Second Edition
Policies and procedures must be established to avoid computer waste and mistakes
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
“Get Bill to Fix it up for you!”. MIS 300, Chapter 82 Basic Concepts Developing and maintaining information systems requires cooperative efforts of users.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Systems Design, Implementation, Maintenance, and Review
Principles of Information Systems, Tenth Edition
Introduction to Systems Analysis and Design
1 Principles of Information Systems, Ninth Edition Chapter 13 Systems Development: Design, Implementation, Maintenance, and Review.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Security Issues and Ethics in Education
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Chapter 8: Systems Development Please turn your cell phone off.
Succeeding with Technology Systems Development An Overview of Systems Development Tools and Techniques for Systems Development Systems Investigation Systems.
Chapter 10: Systems Development
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Designing new systems or modifying existing ones should always be aimed at helping an organization achieve its goals The primary emphasis of systems implementation.
Systems Investigation and Analysis
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
in Information Systems and the Internet
Security, Privacy, and Ethics
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
DIT614 ~ Customer Support & Work skills CHAPTER 1 Introduction to End User Computing Prepared By : Suraya Alias.
Fundamentals of Information Systems, Third Edition1 Systems Design Answers the question “How will the information system do what it must do to solve a.
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
Principles of Information Systems Eighth Edition
Systems Development: Design, Implementation, Maintenance, and Review
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Fundamentals of Information Systems, Second Edition 1 Systems Development.
Developing Business/IT Solutions Chapter 12 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Module 4: Systems Development Chapter 14: Design And Implementation.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Fundamentals of Information Systems, Fifth Edition Chapter 8 Systems Development.
Making the System Operational Implementation & Deployment
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives Effective systems development requires a team effort of stakeholders,
Chapter 9 Testing the System 9.1 Principles of System Testing Focus A: The objective of unit and integration ensure the code implemented the design.
Principles of Information Systems Eighth Edition Chapter 13 Systems Development: Design, Implementation, Maintenance, and Review.
Principles of Information Systems Eighth Edition
Add video notes to lecture
System Design, Implementation and Review
Information Systems Development
Fundamentals of Information Systems, Sixth Edition
Chapter 17 Risks, Security and Disaster Recovery
Fundamentals of Information Systems
Topics Lesson 6 System Implementation Software Development
Making the System Operational Implementation & Deployment
Information Systems, Ninth Edition
Policies and procedures must be established to avoid computer waste and mistakes
Principles of Information Systems Eighth Edition
Systems Development An Overview of Systems Development
Presentation transcript:

Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14

Systems Design

Chapter 13Slide 3 Principles of Information Systems, Fifth Edition Systems Design “How will the information system do what it must do to obtain a solution to a problem?”

Chapter 13Slide 4 Principles of Information Systems, Fifth Edition Logical Design Describes what the system must do “Functional requirements”

Chapter 13Slide 5 Principles of Information Systems, Fifth Edition Physical Design Describes the technology and other components needed to complete the logical design

Chapter 13Slide 6 Principles of Information Systems, Fifth Edition Hardware backup Disaster recovery plans Hot site Cold site

Chapter 13Slide 7 Principles of Information Systems, Fifth Edition Software & Database Backup Selective backups Incremental backups Image log

Fig 13.3

Fig 13.4

Chapter 13Slide 10 Principles of Information Systems, Fifth Edition Evaluation Techniques Group consensus Benchmark tests Cost/benefit analysis Point evaluation

Fig 13.6 Avoid “scope creep”

Systems Implementation

Chapter 13Slide 13 Principles of Information Systems, Fifth Edition Systems Implementation Includes hardware acquisition, user preparation, hiring and training of personnel, site and data preparation, installation, testing, start-up, and user acceptance.

Chapter 13Slide 14 Principles of Information Systems, Fifth Edition Make or Buy Software? Externally developed software Lower cost Lower risk Ease of installation Internally developed software Why?

Chapter 13Slide 15 Principles of Information Systems, Fifth Edition System Testing Unit testing System testing Volume testing Integration testing Acceptance testing

Fig 13.15

Systems Maintenance

Chapter 13Slide 18 Principles of Information Systems, Fifth Edition Systems Maintenance Checking, changing, and enhancing the system to make it more useful in achieving user and organizational goals.

Chapter 13Slide 19 Principles of Information Systems, Fifth Edition Reasons for Maintenance Changes in business processes Requests from stakeholders, users, or managers Errors in the program Technical & hardware problems Corporate mergers & acquisitions Government regulations Changes in the operating system or hardware

Chapter 13Slide 20 Principles of Information Systems, Fifth Edition Types of maintenance Slipstream upgrade Patch Release Version

Fig 13.17

Systems Review

Chapter 13Slide 23 Principles of Information Systems, Fifth Edition Systems Review Final step in SDLC Compares results with objectives Problems & opportunities trigger new SDLC process May be event-driven Significant vs. Continuous and/or time-driven

Chapter 13Slide 24 Principles of Information Systems, Fifth Edition Factors to Consider During Systems Review Mission Goals Hardware/ software Database Telecommunications IS personnel Control Training Costs Complexity Reliability Efficiency Response time Documentation

Computer Waste & Mistakes

Chapter 13Slide 26 Principles of Information Systems, Fifth Edition Computer Waste Discard technology Unused systems Personal use of corporate time & technology

Computer Crime

Chapter 13Slide 28 Principles of Information Systems, Fifth Edition Computers as Tools to Commit Crime Social engineering Dumpster diving Password sniffing Help on the Web

Chapter 13Slide 29 Principles of Information Systems, Fifth Edition Computers as Objects of Crime Illegal access and use Hackers vs. crackers Script bunnies

Chapter 13Slide 30 Principles of Information Systems, Fifth Edition Data Alteration & Destruction Virus Application virus System virus Macro virus Worm Logic bomb Virus hoaxes

Chapter 13Slide 31 Principles of Information Systems, Fifth Edition Computers as Objects of Crime Information and equipment theft Software & Internet piracy Computer-related scams

The Work Environment

Chapter 13Slide 33 Principles of Information Systems, Fifth Edition Health Concerns Repetitive stress injury (RSI) Carpal tunnel syndrome (CTS) Ergonomics