Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Quality Assurance and Implementation Systems Analysis and Design, 8e Kendall & Kendall.

Slides:



Advertisements
Similar presentations
Testing Relational Database
Advertisements

Chapter 16 Quality Assurance Through Software Engineering
Chapter 20 Quality Assurance Through Software Engineering
Software Quality Assurance Plan
Describing Process Specifications and Structured Decisions Systems Analysis and Design, 7e Kendall & Kendall 9 © 2008 Pearson Prentice Hall.
Quality Assurance Through Software Engineering Systems Analysis and Design, 7e Kendall & Kendall 16 © 2008 Pearson Prentice Hall.
Quality Assurance Through Software Engineering
Using Data Flow Diagrams
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 3.1.
Chapter 1 Assuming the Role of the Systems Analyst
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 5.1.
Chapter 21 Successfully Implementing The Information System
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Essentials of Systems Analysis and Design Fourth Edition Joseph S. Valacich Joey F.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Process Specifications and Structured Decisions Systems Analysis and Design, 8e Kendall.
Designing new systems or modifying existing ones should always be aimed at helping an organization achieve its goals State the purpose of systems design.
6.1 Copyright © 2014 Pearson Education, Inc. publishing as Prentice Hall Building Information Systems Chapter 13 VIDEO CASES Video Case 1: IBM: Business.
© Prentice Hall CHAPTER 9 Application Development by Information Systems Professionals.
Using Dataflow Diagrams
© 2005 by Prentice Hall Chapter 4 System Testing & Implementation Modern Systems Analysis and Design Fourth Edition Jeffrey A. Hoffer Joey F. George Joseph.
Chapter 1 Assuming the Role of the Systems Analyst
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Quality Assurance Through Software Engineering
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Quality Assurance and Implementation Systems Analysis and Design, 8e Kendall & Kendall.
Kendall & KendallCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 9 Kendall & Kendall Systems Analysis and Design, 9e Process Specifications.
Chapter 1 Assuming the Role of the Systems Analyst
Kendall & KendallCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 16 Kendall & Kendall Systems Analysis and Design, 9e Quality Assurance.
Chapter 1 The Systems Development Environment Modern Systems Analysis and Design Sixth Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich.
Introduction to Computer Technology
Kendall & KendallCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 9 Kendall & Kendall Systems Analysis and Design, 9e Process Specifications.
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.1.
Copyright 2001 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Joseph S. Valacich Joey F. George Jeffrey A. Hoffer Chapter 1 The Systems.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 14 Systems Analysis and Design: The Big Picture.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
Systems Analysis and Design: The Big Picture
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 4.1.
Chapter 17 Successfully Implementing The Information System
System Implementation. System Implementation and Seven major activities Coding Testing Installation Documentation Training Support Purpose To convert.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Computers Are Your Future Eleventh Edition Chapter 13: Systems Analysis & Design Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
ITEC224 Database Programming
Successfully Implementing the Information System Systems Analysis and Design, 7e Kendall & Kendall 17 © 2008 Pearson Prentice Hall.
Chapter 16 Quality Assurance Through Software Engineering Systems Analysis and Design Kendall & Kendall Sixth Edition.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 1 Assuming the Role of the Systems Analyst Systems Analysis and Design Kendall & Kendall Sixth Edition.
Fundamentals of Information Systems, Third Edition1 Systems Design Answers the question “How will the information system do what it must do to solve a.
Computers Are Your Future Tenth Edition Chapter 13: Systems Analysis & Design Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
System Implementation. © 2011 Pearson Education, Inc. Publishing as Prentice Hall 2 Chapter 13 FIGURE 13-1 Systems development life cycle with the implementation.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 16 Quality Assurance Through Software Engineering Systems Analysis and Design Kendall & Kendall Sixth Edition.
TESTING THE NEW SYSTEM Various Approaches to Testing.
Thepul Ginige Lecture-7 Implementation of Information System Thepul Ginige.
Copyright © 2011 Pearson Education Process Specifications and Structured Decisions Systems Analysis and Design, 8e Kendall & Kendall Global Edition 9.
Thepul Ginige Lecture-5 Implementation of Information System Part - I Thepul Ginige.
Successfully Implementing Information Systems Systems Analysis and Design.
BÁO CÁO THUYẾT TRÌNH MÔN: PHÂN TÍCH VÀ THI Ế T K Ế H Ệ TH Ố NG Đ Ề TÀI: Đ Ả M B Ả O CH Ấ T L Ư Ợ NG QUA CÔNG NGH Ệ PH Ầ N M Ề M QUALITY ASSURANCE THROUGH.
Chapter 1 Assuming the Role of the Systems Analyst.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Process Specifications and Structured Decisions Systems Analysis and Design, 8e Kendall.
Copyright © 2011 Pearson Education Quality Assurance and Implementation Systems Analysis and Design, 8e Kendall & Kendall Global Edition 16.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Chapter 21 Successfully Implementing The Information System.
Discovering Computers 2010: Living in a Digital World Chapter 14
Data and database administration
Fundamentals of Information Systems, Sixth Edition
FORMAL SYSTEM DEVELOPMENT METHODOLOGIES
Chapter 5 Determining System Requirements
Lecture-5 Implementation of Information System Part - I Thepul Ginige
CHAPTER 9 (part a) BASIC INFORMATION SYSTEMS CONCEPTS
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Quality Assurance and Implementation Systems Analysis and Design, 8e Kendall & Kendall 16

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-2 Learning Objectives Recognize the importance of total quality approach to improve the quality of software design and maintenance. Realize the importance of documentation, testing, maintenance, and auditing. Understand how service-oriented architecture and cloud computing is changing the nature of information system design.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-3 Learning Objectives (Continued) Understand the training objectives and approaches for users of the new system. Recognize the differences among physical conversion strategies, and be able to recommend an appropriate one to a client. Address security, disaster preparedness, and disaster recovery concerns for traditional and Web-based systems. Understand the importance of evaluating the new system, and be able to recommend a suitable evaluation technique to a client.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-4 Major Topics Quality assurance Walkthroughs Structure charts Modules Documentation Testing

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-5 Major Topics (Continued) Client-server computing Network types Training Security Evaluation

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-6 Total Quality Management Philosophy of continual improvement of products and processes Quality is the responsibility of everyone involved in the creation and use of the products and services offered TQM improves quality by ensuring conformance to internal requirements

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-7 Six Sigma A culture built on quality Uses a top-down approach Roles: Project leader is called a Black Belt. Project members are called Green Belts. Master Black Belts have worked on many projects and are available as a resource to project teams. Six Sigma improves quality by reducing the number of defects

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-8 Every Systems Analyst Should Understand the Methodology and Philosophy of Six Sigma (Figure 16.1)

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-9 Structured Walkthroughs One of the strongest quality management actions is to do structured walkthroughs routinely. Use peer reviewers to monitor the system’s programming and overall development. Point out problems. Allow the programmer or analyst to make suitable changes.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-10 Participants in Structured Walkthrough Meetings The person responsible for the part of the system being reviewed A walkthrough coordinator A peer programmer or peer analyst A peer who takes notes about suggestions

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-11 The Top-Down Approach Top-down design allows the systems analyst to ascertain overall organizational objectives and how they are best met in an overall system. The system is divided into subsystems and their requirements.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-12 Advantages of the Top-Down Approach Avoiding the chaos of attempting to design a system all at once Enables separate systems analysis teams to work in parallel on different but necessary subsystems Prevents losing sight of what the system is suppose to do

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-13 Modular Development Breaking the programming into logical, manageable portions or modules Works well with top-down design Each individual module should be functionally cohesive, accomplishing only one function.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-14 Advantages of Modular Programming Modules are easier to write and debug. Modules are easier to maintain. Modules are easier to grasp because they are self-contained subsystems.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-15 Guidelines for Modular Programming Keep each module to a manageable size. Pay particular attention to the critical interfaces. Minimize the number of modules the user must modify when making changes. Maintain the hierarchical relationships set up in the top-down phases.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-16 Using Structure Charts to Design Systems The recommended tool for designing a modular, top-down system is a structure chart. A structure chart is simply a diagram consisting of rectangular boxes, representing the modules, and connecting lines. Hollow circle arrows represent data being passed up and down the structure. Filled-in circle arrow represents a control switch or flag.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-17 A Structure Chart for Changing a Customer Record (Figure 16-3)

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-18 Service Oriented Architecture (SOA) The SOA approach is to make individual SOA services that are unassociated or only loosely coupled to one another. Each service executes one action. Each service can be used in other applications within the organization or even in other organizations.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-19 Service Oriented Architecture (SOA) (Continued) A service can use certain defined protocols so that it can communicate with other services. The burden of connecting services in a useful fashion, is a process called orchestration. This can even be accomplished by selecting services from a menu of services and monitoring them by setting up an SOA dashboard.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-20 Service Oriented Architecture (SOA) (Continued) In order to set up a SOA, services must be: Modular Reusable Work together with other modules (interoperability) Able to be categorized and identified Able to be monitored Comply with industry-specific standards

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-21 How Services Are Called upon Throughout the System (Figure 16.4)

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-22 System Documentation Procedure manuals The FOLKLORE method

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-23 Procedure Manuals The English-language component of documentation Key sections: Introduction How to use the software What to do if things go wrong A technical reference section An index Information on how to contact the manufacturer

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-24 Procedure Manuals (Continued) Procedure manual complaints: They are poorly organized. It is hard to find needed information. The specific case in question does not appear in the manual. The manual is not written in plain English.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-25 The FOLKLORE Method Collects information in categories: Customs Tales Sayings Art forms

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-26 Customs, Tales, Sayings, and Art Forms Used in the FOLKLORE Method of Documentation Apply to Information Systems (Figure 16.5)

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-27 Choosing a Design and Documentation Technique Is it compatible with existing documentation? Is it understood by others in the organization? Does it allow you to return to working on the system after you have been away from it for a period of time?

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-28 Choosing a Design and Documentation Technique (Continued) Is it suitable for the size of the system you are working on? Does it allow for a structured design approach if that is considered to be more important than other factors? Does it allow for easy modification?

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-29 Testing, Maintenance, and Auditing The testing process Maintenance practices Auditing

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-30 The Testing Process Program testing with test data Link testing with test data Full system testing: Use test data Use live data

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-31 Programmers, Analysts, Operators, and Users All Play Different Roles in Testing Software and Systems (Figure 16.6)

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-32 Program Testing with Test Data Desk check programs. Test with both valid and invalid data. Test data sequences should contain boundary values. Check output for errors and make any needed corrections.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-33 Link Testing with Test Data Also referred to as string testing or integration testing Checks to see if programs that are interdependent actually work together as planned Test for normal transactions. Test with invalid data.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-34 Test Design Example: Test all paths in Approve/Deny Workflow McCabe’s Cyclomatic Complexity: 24 Edges – 17 Nodes = 7 Paths EXCO Paths : Another approver disapproves : EXCO Approves : EXCO Denies Chair Paths : Chair Denies : Chair Approves, EXCO Denies : Chair Approves, EXCO Didn’t Deny Dean Paths : Dean Approves : Dean Denies Note: Nodes 2, 7, 10, and 12 contain three or more nodes in sequence; grouping these nodes reduces visual clutter and does not alter the path count

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-35 Test Sequences Produce combinations of paths where All approvers approve Any one approver disapproves All paths must be listed at least once Sequence One: All Approve : EXCO Approves : Chair Approves, EXCO Didn’t Deny : Dean Approves Sequence Two: Chair and Dean Approve, EXCO Disapproves : Chair Approves, EXCO Didn’t Deny : Dean Approves : EXCO Denies Sequence Three: EXCO Approves, Chair Disapproves : EXCO Approves : Chair Denies Sequence Four: Chair Approves, Dean Disapproves, EXCO Not Needed : Chair Approves, EXCO Didn’t Deny : Dean Denies : Another approver disapproves Sequence Five: EXCO Disapproves, Chair Approves : EXCO Denies : Chair Approves, EXCO Denies

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-36 Full System Testing with Test Data Adequate documentation in procedure manuals Are procedure manuals clear enough? Do work flows actually “flow”? Is output correct and do users understand this output?

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-37 Full System Testing with Live Data Comparison of the new system’s output with what you know to be correctly processed output Only small amounts of live data are used

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-38 Maintenance Practices Reduce maintenance costs. Improve the existing software. Update software in response to the changing organization. Ensure channels for feedback.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-39 Auditing Having an expert who is not involved in setting up or using the system examine information in order to ascertain its reliability There are internal and external auditors. Internal auditors study the controls used in the information system to make sure that they are adequate. External auditors are used when the information system processes data that influences a company’s financial statements.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-40 Implementation Deployment of the information system for use and evaluation Computer power and responsibility for the system can be shifted to users with various distributed computing models Issues include user training, conversion strategy, security, privacy, disaster planning, and system evaluation

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-41 Implementing Distributed Systems Distributed systems are an application of telecommunications, which have work stations that can communicate with each other and with data processors May use different architectural configurations of data processors that communicate with one another Client-server Cloud computing Other models: Peer-to-peer, Repository Network Modeling

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-42 Distributed Systems Advantages (Figure 16.13)

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-43 Distributed System Disadvantages (Figure 16.14)

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-44 Client-Server Technology The client-server model refers to a design model that can be thought of as applications running on a network. The client is a networked computer that uses small programs to do front-end processing, including communicating with the user.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-45 Client-Server Model Advantages, Disadvantages Advantage—greater computer power and greater opportunity to customize applications Disadvantage—more expensive and applications must be written as two separate software components each running on separate machines

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-46 A Client/Server System Configuration (Figure 16.7)

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-47 Cloud Computing Organizations and individual users can use: Web services Database services Application services over the Internet Advantages: Low up-front cost. Realize increases in peak-load capacity. Companies also hope to improve their ability to perform disaster recovery.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-48 Cloud Computing (Figure 16.8)

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-49 Network Modeling Draw a network decomposition diagram to provide an overview of the system. Draw a hub connectivity diagram. Explode the hub connectivity diagram to show the various workstations and how they are connected.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-50 Network Modeling Symbols (Figure 16.9)

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-51 A Network Decomposition Diagram for World’s Trend (Figure 16.10)

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-52 A Hub Connectivity Diagram for World’s Trend (Figure 16.11)

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-53 A Workstation Connectivity Diagram for World’s Trend (Figure 16.12)

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-54 Training Who to train People who train users Training objectives Training methods Training sites Training materials

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-55 Who to Train All people who will have primary or secondary use of the system Ensure that users of different skill levels and job interests are separated.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-56 People Who Train Users Vendors Systems analysts External paid trainers In-house trainers Other system users

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-57 Appropriate Training Objectives, Methods, Sites, and Materials Are Contingent on Many Factors (Figure 16.15)

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-58 Conversion Strategies Direct changeover Parallel conversion Gradual or phased conversion Modular prototype conversion Distributed conversion

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-59 Five Conversion Strategies for Information Systems (Figure 16.16)

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-60 Direct Changeover Old system stops, new one starts Needs extensive testing Risky approach to conversion Users may resent being forced into using an unfamiliar system without recourse. No adequate way to compare new results to old

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-61 Parallel Conversion Run the old and new systems at the same time. The advantage is that you can check new data against old data. The disadvantage is doubling employees’ workloads.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-62 Gradual Conversion Combines best features of parallel and direct conversion Volume of transactions is gradually increased Advantage is that users get involved with the system gradually Agile methodologies use this conversion approach.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-63 Modular Prototype Conversion Each module is tested and put into use. The advantage is that each module is thoroughly tested before being used. Users are familiar with each module as it becomes operational. Object-oriented methodologies often use this approach.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-64 Distributed Conversion When there are many installations of the same system, such as at branch offices Install software at one office Advantage is that problems can be detected and contained Disadvantage is that even when one conversion is successful, each site will have its own peculiarities to work through

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-65 Other Conversion Considerations Ordering equipment Ordering any external materials supplied to the information system Appointing a manager to supervise the preparation of the installation site Planning, scheduling, and supervising programmers and data entry personnel

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-66 Organizational Metaphors May Contribute to the Success or Failure of an Information System (Figure 16.17)

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-67 Security Concerns Physical security Logical security Behavioral security

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-68 Security Concerns (Continued) Physical security is securing the computer facility, its equipment, and software through physical means. Logical security refers to logical controls in the software itself. Behavioral security is building and enforcing procedures to prevent the misusing of computer hardware and software.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-69 Special Security Considerations for Ecommerce Virus protection software filtering products URL filtering products Firewalls, gateways, and virtual private networks Intrusion detection products

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-70 Special Security Considerations for Ecommerce (Continued) Vulnerability management products Security technologies such as secure socket layering (SSL) for authentication Encryption technologies Public key infrastructure (PKI) use and obtaining a digital certificate

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-71 Privacy Considerations for Ecommerce Start with a corporate policy on privacy. Only ask for information required to complete the transaction. Make it optional for customers to fill out personal information on the Web site.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-72 Privacy Considerations for Ecommerce (Continued) Use sources that allow you to obtain anonymous information about classes of customers. Be ethical.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-73 Disaster Recovery Planning Identify teams responsible for managing a crisis. Eliminate single points of failure. Determine data replication technologies that match the organization’s timetable. Create detailed relocation and transportation plans.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-74 Disaster Recovery Planning (Continued) Provide recovery solutions that include an off-site location. Ensure the physical and psychological well-being of employees and others.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-75 Disaster response decisions and responsibilities Whether business operations will continue How to support communications Where people will be sent if the business is uninhabitable Where personnel will go in an emergency Addressing personal and psychological needs Restoring computing and working environments

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-76 Single Points of Failure and Data Replication Technologies Redundancy of data provides the key for servers running Web applications SNAs and data mirroring

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-77 Relocation and Transportation Plans Send employees home. Remain on site. Relocate to a recovery facility.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-78 Communication Channels Emergency information Web page Emergency hotline Emergency response agencies

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-79 Recovery Solutions and Support for the Well-Being of Employees Recovery involves an off-site location and converting paper documents to digital formats. Well-being of employees might include providing water or safety kits.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-80 Evaluation Techniques Cost-benefit analysis Revised decision evaluation approach User involvement evaluations The information system utility approach

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-81 Information System Utility Approach Possession Form Place Time Actualization Goal

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-82 Information System Utility Approach (Continued) Possession utility answers the question of who should receive output. Goal utility answers the why of information systems by asking whether the output has value in helping the organization achieve its objectives. Place utility answers the question of where information is distributed.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-83 Information System Utility Approach (Continued) Form utility answers the question of what kind of output is distributed to the decision maker. Time utility answers the question of when information is delivered. Actualization utility involves how the information is introduced and used by the decision maker.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-84 Web Site Evaluation Know how often the Web site is visited. Learn details about specific pages on the site. Find out more about the Web site’s visitors.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-85 Web Site Evaluation (Continued) Discover if visitors can properly fill out the forms you designed. Find out who is referring Web site visitors to the client’s site. Determine what browsers visitors are using. Find out if the client’s Web site visitors are interested in advertising.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-86 Summary TQM Designing systems and software with a top-down, modular approach Designing and documenting systems and software using systematic methods Testing systems and software so that they can be easily maintained and audited

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-87 Summary (Continued) Six Sigma Define the problem. Observe the problem. Analyze the causes. Act on the causes. Study the results. Standardize the changes. Draw conclusions.

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-88 Summary (Continued) Structure charts Procedure manuals FOLKLORE Testing System maintenance Auditing

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-89 Summary Implementation Distributed systems Client-server Training users and personnel Conversion Direct changeover Parallel Phased Gradual Modular prototype

Kendall & KendallCopyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall16-90 Summary (Continued) Security Physical Logical Behavioral Organizational metaphors Evaluation

16-91 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2011 Pearson Education, Inc. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall