Presentation is loading. Please wait.

Presentation is loading. Please wait.

Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.

Similar presentations


Presentation on theme: "Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14."— Presentation transcript:

1 Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14

2 Systems Design

3 Chapter 13Slide 3 Principles of Information Systems, Fifth Edition Systems Design “How will the information system do what it must do to obtain a solution to a problem?”

4 Chapter 13Slide 4 Principles of Information Systems, Fifth Edition Logical Design Describes what the system must do “Functional requirements”

5 Chapter 13Slide 5 Principles of Information Systems, Fifth Edition Physical Design Describes the technology and other components needed to complete the logical design

6 Chapter 13Slide 6 Principles of Information Systems, Fifth Edition Hardware backup Disaster recovery plans Hot site Cold site

7 Chapter 13Slide 7 Principles of Information Systems, Fifth Edition Software & Database Backup Selective backups Incremental backups Image log

8 Fig 13.3

9 Fig 13.4

10 Chapter 13Slide 10 Principles of Information Systems, Fifth Edition Evaluation Techniques Group consensus Benchmark tests Cost/benefit analysis Point evaluation

11 Fig 13.6 Avoid “scope creep”

12 Systems Implementation

13 Chapter 13Slide 13 Principles of Information Systems, Fifth Edition Systems Implementation Includes hardware acquisition, user preparation, hiring and training of personnel, site and data preparation, installation, testing, start-up, and user acceptance.

14 Chapter 13Slide 14 Principles of Information Systems, Fifth Edition Make or Buy Software? Externally developed software Lower cost Lower risk Ease of installation Internally developed software Why?

15 Chapter 13Slide 15 Principles of Information Systems, Fifth Edition System Testing Unit testing System testing Volume testing Integration testing Acceptance testing

16 Fig 13.15

17 Systems Maintenance

18 Chapter 13Slide 18 Principles of Information Systems, Fifth Edition Systems Maintenance Checking, changing, and enhancing the system to make it more useful in achieving user and organizational goals.

19 Chapter 13Slide 19 Principles of Information Systems, Fifth Edition Reasons for Maintenance Changes in business processes Requests from stakeholders, users, or managers Errors in the program Technical & hardware problems Corporate mergers & acquisitions Government regulations Changes in the operating system or hardware

20 Chapter 13Slide 20 Principles of Information Systems, Fifth Edition Types of maintenance Slipstream upgrade Patch Release Version

21 Fig 13.17

22 Systems Review

23 Chapter 13Slide 23 Principles of Information Systems, Fifth Edition Systems Review Final step in SDLC Compares results with objectives Problems & opportunities trigger new SDLC process May be event-driven Significant vs. Continuous and/or time-driven

24 Chapter 13Slide 24 Principles of Information Systems, Fifth Edition Factors to Consider During Systems Review Mission Goals Hardware/ software Database Telecommunications IS personnel Control Training Costs Complexity Reliability Efficiency Response time Documentation

25 Computer Waste & Mistakes

26 Chapter 13Slide 26 Principles of Information Systems, Fifth Edition Computer Waste Discard technology Unused systems Personal use of corporate time & technology

27 Computer Crime

28 Chapter 13Slide 28 Principles of Information Systems, Fifth Edition Computers as Tools to Commit Crime Social engineering Dumpster diving Password sniffing Help on the Web

29 Chapter 13Slide 29 Principles of Information Systems, Fifth Edition Computers as Objects of Crime Illegal access and use Hackers vs. crackers Script bunnies

30 Chapter 13Slide 30 Principles of Information Systems, Fifth Edition Data Alteration & Destruction Virus Application virus System virus Macro virus Worm Logic bomb Virus hoaxes

31 Chapter 13Slide 31 Principles of Information Systems, Fifth Edition Computers as Objects of Crime Information and equipment theft Software & Internet piracy Computer-related scams

32 The Work Environment

33 Chapter 13Slide 33 Principles of Information Systems, Fifth Edition Health Concerns Repetitive stress injury (RSI) Carpal tunnel syndrome (CTS) Ergonomics


Download ppt "Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14."

Similar presentations


Ads by Google