Download presentation
Presentation is loading. Please wait.
Published bySamantha Harvey Modified over 8 years ago
1
Chapter 21 Successfully Implementing The Information System
2
2 Major Topics Distributed System Client/server computing Groupware Training Security Evaluation
3
3 Implementation Implementation is the process of assuring that the information system is operational Well-trained users are involved in its operation
4
4 Distributed Systems Distributed systems Use telecommunications technology and database management to interconnect people A distributed system includes work stations that can communicate with each other and with data processors The distributed system may have different configurations of data processors
5
5 Advantages of Distributed Systems Advantages of distributed systems are Data are stored where it does not affect the processing of online real-time transaction processing Data are stored using less expensive media at local sites Lowered equipment costs
6
6 Advantages of Distributed Systems Advantages of distributed systems, continued Provide flexibility in choice of equipment manufacturer Initially less expensive than large systems
7
7 Disadvantages of Distributed Systems Disadvantages of distributed systems are Networks must be reliable Security may be breached The relationships between subsystems must not be ignored
8
8 Packet-switched Implications? Massive electronic transaction Addressing: Internet-Protocol (IP) Communication control: Transmission Control Protocol (TCP) Domain names and URL E.g., http://www.ust.hk Internet
9
9 Standardized protocols: HTTP, FTP, SMTP, MIME, etc. Facilitates: Information exchange Application development Re-conceptualize business logics Widespread, innovative, and efficient online transactions Internet: an Ubiquitous Open System
10
10 Overall Picture Clients Web servers Web browser HTML/XML pages Database Server-side processing CGI ASP JSP, JAVA Servlet Applications Client side processing Javascript VBscript Applets Firewall HTTP
11
11 Groupware Groupware is software that supports people working together in an organization
12
12 Groupware Functions Groupware helps group members Schedule and attend meetings Share data Create and analyze documents Unstructured communication via e-mail Hold group conferences Departmental-level image management Manage and monitor workflow
13
13 Training New system training must be performed Analysts must consider Who needs to be trained Who will train them Objectives of training Methods of instruction to be used Sites Materials
14
14 Sources of Training Possible sources of training for users of information systems include Vendors Systems analysts External paid trainers In-house trainers Other system users
15
15 Conversion Strategies Five conversion strategies are Direct changeover Parallel conversion Phased conversion Modular prototype conversion Distributed conversion
16
16 Security Security considerations must be included when implementing a system These include Physical security Logical security Behavioral security
17
17 Security Physical security is controlling access to physical computer resources Logical security is controlling software access Behavioral security is building procedures to prevent persons from misusing computer hardware and software
18
18 Web Security Precautions used to protect the computer network from both internal and external Web security threats include Virus protection software Email filtering products URL filtering products Firewalls, gateways, and virtual private networks
19
19 Web Security Precautions, continued Intrusion detection products Vulnerability management products Security technologies such as secure socket layering for authentication Encryption technologies Public key infrastructure use and obtaining a digital certificate
20
20 Ecommerce Privacy Guidelines Privacy is essential to ecommerce Some privacy policy guidelines are Start with a corporate policy on privacy Only ask for information required to complete the transaction Make it optional for customers to fill out personal information on the Web site
21
21 Ecommerce Privacy Guidelines Further privacy policy guidelines are Use sources that allow you to obtain anonymous information about classes of customers Be ethical in data gathering
22
22 Evaluation Approaches Several evaluation approaches can be used: Cost-benefit analysis Revised decision evaluation approach User involvement evaluations The information system utility approach
23
Studies (1997) found that up to 90% of all IT projects fail to meet their goals, 80% are late and over budget 40% are abandoned.
24
24 Information system Project failure There are fundamental reasons why some Information system projects fail to achieve their goals?. A project is not required Insufficient support from senior management Naming the wrong person as project manager Poor planning lack of knowledge in the operation and use of this technology; poor training and education in this technology; lack of funding and high cost of ICT; Chapter 13-10
25
25 Cont. These and a few other reasons, are the base cause of most project failures The specific causes derive from these fundamental issues
26
26 summery technical issues (hardware, software, database, telecommunications, etc.) organisational issues (cultural, political, environmental, management, etc.) people issues (attitudes, training, health, evaluation, performance monitoring)
27
27 Four main forms of IT failure The total failure of a system never implemented or in which a new system is implemented but immediately abandoned, The partial failure of an initiative in which major goals are unattained or in which there are significant undesirable outcomes,
28
28 The sustainability failure of an initiative that succeeds initially but then fails after a year or so, The replication failure of an initiative that succeeds in its pilot location but cannot be repeated elsewhere.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.