Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 21 Successfully Implementing The Information System.

Similar presentations


Presentation on theme: "Chapter 21 Successfully Implementing The Information System."— Presentation transcript:

1 Chapter 21 Successfully Implementing The Information System

2 2 Major Topics  Distributed System  Client/server computing  Groupware  Training  Security  Evaluation

3 3 Implementation  Implementation is the process of assuring that the information system is operational  Well-trained users are involved in its operation

4 4 Distributed Systems  Distributed systems Use telecommunications technology and database management to interconnect people A distributed system includes work stations that can communicate with each other and with data processors The distributed system may have different configurations of data processors

5 5 Advantages of Distributed Systems  Advantages of distributed systems are Data are stored where it does not affect the processing of online real-time transaction processing Data are stored using less expensive media at local sites Lowered equipment costs

6 6 Advantages of Distributed Systems  Advantages of distributed systems, continued Provide flexibility in choice of equipment manufacturer Initially less expensive than large systems

7 7 Disadvantages of Distributed Systems  Disadvantages of distributed systems are Networks must be reliable Security may be breached The relationships between subsystems must not be ignored

8 8  Packet-switched Implications? Massive electronic transaction  Addressing: Internet-Protocol (IP)  Communication control: Transmission Control Protocol (TCP)  Domain names and URL E.g., http://www.ust.hk Internet

9 9  Standardized protocols: HTTP, FTP, SMTP, MIME, etc.  Facilitates: Information exchange Application development Re-conceptualize business logics Widespread, innovative, and efficient online transactions Internet: an Ubiquitous Open System

10 10 Overall Picture Clients Web servers Web browser HTML/XML pages Database Server-side processing CGI ASP JSP, JAVA Servlet Applications Client side processing Javascript VBscript Applets Firewall HTTP

11 11 Groupware  Groupware is software that supports people working together in an organization

12 12 Groupware Functions  Groupware helps group members Schedule and attend meetings Share data Create and analyze documents Unstructured communication via e-mail Hold group conferences Departmental-level image management Manage and monitor workflow

13 13 Training  New system training must be performed  Analysts must consider Who needs to be trained Who will train them Objectives of training Methods of instruction to be used Sites Materials

14 14 Sources of Training  Possible sources of training for users of information systems include Vendors Systems analysts External paid trainers In-house trainers Other system users

15 15 Conversion Strategies  Five conversion strategies are Direct changeover Parallel conversion Phased conversion Modular prototype conversion Distributed conversion

16 16 Security  Security considerations must be included when implementing a system  These include Physical security Logical security Behavioral security

17 17 Security  Physical security is controlling access to physical computer resources  Logical security is controlling software access  Behavioral security is building procedures to prevent persons from misusing computer hardware and software

18 18 Web Security  Precautions used to protect the computer network from both internal and external Web security threats include Virus protection software Email filtering products URL filtering products Firewalls, gateways, and virtual private networks

19 19 Web Security  Precautions, continued Intrusion detection products Vulnerability management products Security technologies such as secure socket layering for authentication Encryption technologies Public key infrastructure use and obtaining a digital certificate

20 20 Ecommerce Privacy Guidelines  Privacy is essential to ecommerce  Some privacy policy guidelines are Start with a corporate policy on privacy Only ask for information required to complete the transaction Make it optional for customers to fill out personal information on the Web site

21 21 Ecommerce Privacy Guidelines  Further privacy policy guidelines are Use sources that allow you to obtain anonymous information about classes of customers Be ethical in data gathering

22 22 Evaluation Approaches  Several evaluation approaches can be used: Cost-benefit analysis Revised decision evaluation approach User involvement evaluations The information system utility approach

23 Studies (1997) found that  up to 90% of all IT projects fail to meet their goals,  80% are late and over budget  40% are abandoned.

24 24 Information system Project failure  There are fundamental reasons why some Information system projects fail to achieve their goals?. A project is not required Insufficient support from senior management Naming the wrong person as project manager Poor planning lack of knowledge in the operation and use of this technology; poor training and education in this technology; lack of funding and high cost of ICT; Chapter 13-10

25 25 Cont.  These and a few other reasons, are the base cause of most project failures  The specific causes derive from these fundamental issues

26 26 summery  technical issues (hardware, software, database, telecommunications, etc.)  organisational issues (cultural, political, environmental, management, etc.)  people issues (attitudes, training, health, evaluation, performance monitoring)

27 27 Four main forms of IT failure  The total failure of a system never implemented or in which a new system is implemented but immediately abandoned,  The partial failure of an initiative in which major goals are unattained or in which there are significant undesirable outcomes,

28 28  The sustainability failure of an initiative that succeeds initially but then fails after a year or so,  The replication failure of an initiative that succeeds in its pilot location but cannot be repeated elsewhere.


Download ppt "Chapter 21 Successfully Implementing The Information System."

Similar presentations


Ads by Google