Successfully Implementing the Information System Systems Analysis and Design, 7e Kendall & Kendall 17 © 2008 Pearson Prentice Hall.

Slides:



Advertisements
Similar presentations
Chapter 1 Assuming the Role of the Systems Analyst
Advertisements

2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Chapter 21 Successfully Implementing The Information System
Security+ Guide to Network Security Fundamentals
Designing new systems or modifying existing ones should always be aimed at helping an organization achieve its goals State the purpose of systems design.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Quality Assurance and Implementation Systems Analysis and Design, 8e Kendall & Kendall.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Kendall & KendallCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 16 Kendall & Kendall Systems Analysis and Design, 9e Quality Assurance.
Computer Networks IGCSE ICT Section 4.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
OCR Computing for GCSE © Hodder Education 2011
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Quality Assurance and Implementation Systems Analysis and Design, 8e Kendall & Kendall.
Communications & Networks
Chapter 8: Systems Development Please turn your cell phone off.
Chapter 17 Successfully Implementing The Information System
BA 378: Accounting Information Systems Instructor: Dr. James R. Coakley.
Part VII: Special Topics Introduction to Business 3e 18 Copyright © 2004 South-Western. All rights reserved. Using Information Technology.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
1 WHY NEED NETWORKING? - Access to remote information - Person-to-person communication - Cooperative work online - Resource sharing.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 1 Assuming the Role of the Systems Analyst Systems Analysis and Design Kendall & Kendall Sixth Edition.
Lecture 4 Title: Network Components and Types By: Mr Hashem Alaidaros MIS 101.
Fundamentals of Information Systems, Third Edition1 Systems Design Answers the question “How will the information system do what it must do to solve a.
Computers Are Your Future Eleventh Edition
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
1 Chapter 12 Enterprise Computing. Objectives Overview Discuss the special information requirements of an enterprise-sized corporation Identify information.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Module 4: Systems Development Chapter 14: Design And Implementation.
System Implementation. © 2011 Pearson Education, Inc. Publishing as Prentice Hall 2 Chapter 13 FIGURE 13-1 Systems development life cycle with the implementation.
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Networking… By: Allan Joe Next page.
Chapter 9  2000 by Prentice Hall. 9-1 Client/Server Computing.
Thepul Ginige Lecture-7 Implementation of Information System Thepul Ginige.
Activity 1 5 minutes to discuss and feedback on the following:
Digital Planet: Tomorrow’s Technology and You Chapter 8 Networking and Digital Communication Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Thepul Ginige Lecture-5 Implementation of Information System Part - I Thepul Ginige.
Elements of an ICT networks COMMUNICATION DEVICES: 1.Network interface card 2.Hub 3.Switch 4.Router STANDARDS AND PROCEDURES: 1.Enable devices to communicate.
Systems Analysis and Design 8 th Edition Chapter 9 System Architecture.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
Successfully Implementing Information Systems Systems Analysis and Design.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Copyright © 2011 Pearson Education Quality Assurance and Implementation Systems Analysis and Design, 8e Kendall & Kendall Global Edition 16.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Chapter 21 Successfully Implementing The Information System.
Principles of Information Systems Eighth Edition
Chapter Objectives In this chapter, you will learn:
Discovering Computers 2010: Living in a Digital World Chapter 14
Successfully Implementing Information Systems
Data and database administration
Fundamentals of Information Systems, Sixth Edition
Lecture-5 Implementation of Information System Part - I Thepul Ginige
Copyright 2005 Prentice- Hall, Inc.
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Successfully Implementing the Information System Systems Analysis and Design, 7e Kendall & Kendall 17 © 2008 Pearson Prentice Hall

Kendall & Kendall17-2 Learning Objectives Comprehend the implementation of a variety of distributed systems Design appropriate training programs for users of the new system Recognize the differences among physical conversion strategies and be able to recommend an appropriate one to a client Address security, disaster preparedness, and disaster recovery Understand the importance of evaluating the new system, and be able to recommend a suitable evaluation technique to a client

Kendall & Kendall17-3 Implementation The process of ensuring that the information system is operational and then allowing users to take over its operation for use and evaluation Implementation considerations: Distributing processing Training users Converting from the old system Evaluating the new system

Kendall & Kendall17-4 Major Topics Client/server computing Network types Groupware Training Security Organizational metaphors Evaluation

Kendall & Kendall17-5 Implementing Distributed Systems Can be conceived of as an application of telecommunications Includes work stations that can communicate with each other and with data processors May have different hierarchical architectural configurations of data processors that communicate with each other

Kendall & Kendall17-6 Client/Server Technology The client/server (C/S) model refers to a design model that can be thought of as applications running on a local area network (LAN) The client is a networked computer that uses small programs to do front-end processing, including communicating with the user A file server stores the application programs and data for all the clients on the network A print server is a PC dedicated to receiving and storing files to be printed

Kendall & Kendall17-7 Advantages and Disadvantages of C/S Model Advantage - greater computer power and greater opportunity to customize applications Disadvantage - more expensive and applications must be written as two separate software components each running on separate machines

Kendall & Kendall17-8 Figure 17.1 A client/server system configuration

Kendall & Kendall17-9 Network Types Wide area network (WAN) Local area network (LAN)

Kendall & Kendall17-10 Wireless Local Area Network (WLAN) Called Wi-Fi or , wireless fidelity Can include encryption wired equivalent privacy (WEP) for security purposes Comparatively cheap to set up Serve as a flexible technology for supporting work groups

Kendall & Kendall17-11 Wireless Local Area Network (WLAN) (Continued) Concerns Security Signal integrity WEP has many flaws, but used in conjunction with traditional LAN security measures is thought to be adequate for many home and business purposes

Kendall & Kendall17-12 WiMax Worldwide Interoperability for Microwave Access Also know as “Mobile WiMax” Greater wireless access range (30 miles)

Kendall & Kendall17-13 Bluetooth Suitable for personal networks and can include computers, printers, handheld devices, phones, keyboards, mice and household appliances

Kendall & Kendall17-14 Types of Distributed Systems Networks Hierarchical Star Ring Bus

Kendall & Kendall17-15 Hierarchical The host controls all other nodes Computers on the same level do not communicate with each other

Kendall & Kendall17-16 Star The central node communicates with the lesser nodes The lesser nodes cannot directly communicate with each other

Kendall & Kendall17-17 Ring There is no central computer All the nodes are of equal computing power Each node communicates directly with its neighbor

Kendall & Kendall17-18 Bus Work well in close quarters A single central cable is used to connect all the devices The single central cable serves as the only communication path

Kendall & Kendall17-19 Network Modeling Draw a network decomposition diagram to provide an overview of the system Draw a hub connectivity diagram Explode the hub connectivity diagram to show the various workstations and how they are connected

Kendall & Kendall17-20 Figure 17.2 Use special symbols when drawing network decomposition and hub connectivity diagrams

Kendall & Kendall17-21 Figure 17.3 A network decomposition diagram for World’s Trend

Kendall & Kendall17-22 Figure 17.4 A hub connectivity diagram for World’s Trend

Kendall & Kendall17-23 Figure 17.5 A workstation connectivity diagram for World’s Trend

Kendall & Kendall17-24 Groupware Software that supports people working together in an organization Can help group members to schedule and attend meetings, share data, create and analyze documents, communicate in unstructured ways, hold group conferences, do image management, manage and monitor workflow

Kendall & Kendall17-25 Figure 17.8 There are five main advantages to creating distributed systems

Kendall & Kendall17-26 Figure 17.9 There are four chief disadvantages to creating distributed systems

Kendall & Kendall17-27 Training Who to train People who train users Training objectives Training methods Training sites Training materials

Kendall & Kendall17-28 Who to Train All people who will have primary or secondary use of the system Ensure that users of different skill levels and job interests are separated

Kendall & Kendall17-29 People Who Train Users Vendors Systems analysts External paid trainers In-house trainers Other system users

Kendall & Kendall17-30 Figure Appropriate training objectives, methods, sites, and materials are contingent on many factors

Kendall & Kendall17-31 Conversion Strategies Direct changeover Parallel conversion Gradual or Phased conversion Modular prototype conversion Distributed conversion

Kendall & Kendall17-32 Figure Five conversion strategies for information systems

Kendall & Kendall17-33 Direct Changeover Advantage Users have no possibility of using the old system rather than the new one Disadvantage Long delays might ensue if errors occur Users resent being forced into using an unfamiliar system without recourse No adequate way to compare new results to old

Kendall & Kendall17-34 Parallel Conversion Advantage Can check new data against old data Feeling of security to users Disadvantage Cost of running two systems Doubling employees’ workloads Faced with a choice, employees may pick old system

Kendall & Kendall17-35 Gradual Conversion Advantage Allows users to get involved with the system gradually Disadvantage Taking too long to get the new system in place Inappropriateness for conversion of small, uncomplicated systems

Kendall & Kendall17-36 Modular Prototype Conversion Advantage Each module is thoroughly tested before being used Users are familiar with each module as it becomes operational Disadvantage Prototyping is often not feasible Special attention must be paid to interfaces

Kendall & Kendall17-37 Distributed Conversion Advantage Problems can be detected and contained Disadvantage Even when one conversion is successful, each site will have its own peculiarities to work through

Kendall & Kendall17-38 Security Concerns Physical security Logical security Behavioral security

Kendall & Kendall17-39 Security Concerns (Continued) Physical security is securing the computer facility, its equipment, and software through physical means Logical security refers to logical controls in the software itself Behavioral security is building and enforcing procedures to prevent the misusing of computer hardware and software

Kendall & Kendall17-40 Special Security Considerations for Ecommerce Virus protection software filtering products URL filtering products Firewalls, gateways, and virtual private networks Intrusion detection products

Kendall & Kendall17-41 Special Security Considerations for Ecommerce (Continued) Vulnerability management products Security technologies such as secure socket layering (SSL) for authentication Encryption technologies Public key infrastructure (PKI) use and obtaining a digital certificate

Kendall & Kendall17-42 Privacy Considerations for Ecommerce Start with a corporate policy on privacy Only ask for information required to complete the transaction Make it optional for customers to fill out personal information on the Web site

Kendall & Kendall17-43 Privacy Considerations for Ecommerce (Continued) Use sources that allow you to obtain anonymous information about classes of customers Be ethical

Kendall & Kendall17-44 Disaster Recovery Planning Identify teams responsible for managing a crisis Eliminate single points of failure Determine data replication technologies that match the organization’s timetable Create detailed relocation and transportation plans

Kendall & Kendall17-45 Disaster Recovery Planning (Continued) Provide recovery solutions that include an off-site location Ensure the physical and psychological well-being of employees and others

Kendall & Kendall17-46 Identify Who Is Responsible Whether business operations will continue How to support communications Where people will be sent if the business is uninhabitable Where personnel will go in an emergency Seeing to the personal and psychological needs Restoring the main computing and working environments

Kendall & Kendall17-47 Single Points of Failure and Data Replication Technologies Redundancy of data provides the key for servers running Web applications SNAs and data mirroring

Kendall & Kendall17-48 Relocation and Transportation Plans Send employees home Remain on site Relocate to a recovery facility

Kendall & Kendall17-49 Communication Channels Emergency information Web page Emergency hotline Emergency response agencies

Kendall & Kendall17-50 Recovery Solutions and Support for the Well-Being of Employees Recovery involves an off-site location and converting paper documents to digital formats Well-being of employees might include providing water or safety kits

Kendall & Kendall17-51 Other Conversion Considerations Ordering equipment Ordering any external materials supplied to the information system Appointing a manager to supervise the preparation of the installation site Planning, scheduling, and supervising programmers and data entry personnel

Kendall & Kendall17-52 Figure Organizational metaphors may contribute to the success or failure of an information system

Kendall & Kendall17-53 Evaluation Techniques Cost-benefit analysis Revised decision evaluation approach User involvement evaluations The information system utility approach

Kendall & Kendall17-54 Information System Utility Approach Possession Form Place Time Actualization Goal

Kendall & Kendall17-55 Information System Utility Approach (Continued) Possession utility answers the question of who should receive output Goal utility answers the why of information systems by asking whether the output has value in helping the organization achieve its objectives Place utility answers the question of where information is distributed

Kendall & Kendall17-56 Information System Utility Approach (Continued) Form utility answers the question of what kind of output is distributed to the decision maker Time utility answers the question of when information is delivered Actualization utility involves how the information is introduced and used by the decision maker

Kendall & Kendall17-57 Web Site Evaluation Know how often the Web site is visited Learn details about specific pages on the site Find out more about the Web site’s visitors

Kendall & Kendall17-58 Web Site Evaluation (Continued) Discover if visitors can properly fill out the forms you designed Find out who is referring Web site visitors to the client’s site Determine what browsers visitors are using Find out if the client’s Web site visitors are interested in advertising

Kendall & Kendall17-59 Summary Implementation Distributed systems Client/server Training users and personnel Conversion Direct changeover Parallel Phased Gradual Modular prototype

Kendall & Kendall17-60 Summary (Continued) Security Physical Logical Behavioral Organizational metaphors Evaluation