Download presentation
Presentation is loading. Please wait.
Published byMadeleine Rice Modified over 9 years ago
1
International IT Development and Management David Kroenke Using MIS 3e Part 4: The International Dimension
2
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-2 Q1 What characteristics make international IS management challenging? Q2 Why is international information systems development difficult? Q3 What are the challenges of international project management? Q4 What are the challenges of international IS Management responsibilities? Q5 How does the international dimension affect computer security risk management? Q6 What challenges exist for investigating global computer crime? Study Questions
3
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-3 Size Comprised of people from many cultures with different languages Complexity More IS and IT assets Exposed to more risk and greater uncertainty Security incidents more difficult to investigate Challenging Characteristics of International IT Management
4
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-4 Q1 What characteristics make international IS management challenging? Q2 Why is international information systems development difficult? Q3 What are the challenges of international project management? Q4 What are the challenges of international IS Management responsibilities? Q5 How does the international dimension affect computer security risk management? Q6 What challenges exist for investigating global computer crime? Study Questions
5
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-5 Development of international systems exceedingly complicated Used by people living and working in vastly different cultures Localizing software is challenging Surmountable with good software design and development Hard to determine unified purpose and scope Even harder to determine requirements International Information Systems Development Difficulties
6
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-6 Q1 What characteristics make international IS management challenging? Q2 Why is international information systems development difficult? Q3 What are the challenges of international project management? Q4 What are the challenges of international IS Management responsibilities? Q5 How does the international dimension affect computer security risk management? Q6 What challenges exist for investigating global computer crime? Study Questions
7
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-7 International projects require complex integration of results Work groups distributed across globe Task dependencies span teams in different countries Time management troublesome Different cultures have different workweeks No standard rate of development Different pay rates for labor Quality standards vary from location to location Human resources and worker expectations differ Effective team communication important Challenges of International Project Management
8
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-8 Figure ID4-1 Challenges of International Project Management
9
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-9 Define set of standard business processes Requires conversion to different work processes People resist change Develop alternative versions that support different processes in different countries Creates system design challenges Business processes may vary by nation or culture Creates many systems, instead of single one Responses to Challenges
10
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-10 Q1 What characteristics make international IS management challenging? Q2 Why is international information systems development difficult? Q3 What are the challenges of international project management? Q4 What are the challenges of international IS Management responsibilities? Q5 How does the international dimension affect computer security risk management? Q6 What challenges exist for investigating global computer crime? Study Questions
11
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-11 Planning Task becomes more complex and difficult Supporting business processes more complicated Global economic changes affect processes and strategies Technology adoption produces change Operations Different cultures and languages add complexity Integration of similar but different systems Outsourcing Outsource vendor’s information systems Challenges of International IT Management
12
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-12 Q1 What characteristics make international IS management challenging? Q2 Why is international information systems development difficult? Q3 What are the challenges of international project management? Q4 What are the challenges of international IS Management responsibilities? Q5 How does the international dimension affect computer security risk management? Q6 What challenges exist for investigating global computer crime? Study Questions
13
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-13 More difficult and complex Political, civil unrest, terrorists, natural disaster More threats Infrastructure located around the world Possibility of threat difficult to estimate Subject to great uncertainty Technical and data safeguards May need more and more complex safeguards Human safeguards need to be evaluated on culture-by- culture basis Affects on Computer Security Risk Management
14
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-14 Q1 What characteristics make international IS management challenging? Q2 Why is international information systems development difficult? Q3 What are the challenges of international project management? Q4 What are the challenges of international IS Management responsibilities? Q5 How does the international dimension affect computer security risk management? Q6 What challenges exist for investigating global computer crime? Study Questions
15
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-15 International computer crime is common. Web sites operated in African countries phish for data in the United States. A scam in the United States steals data from a U.S. corporation and sells that data to an illegal operation in South America. Someone kidnaps a U.S. citizen in a foreign country and sends an email ransom demand to relatives in the United States. The email service provider is located in a Middle Eastern country. Challenges Exist for Investigating Global Computer Crime
16
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-16 U.S. criminal investigator can obtain evidence only with consent of the country in which evidence lies. Most nations have laws, agreements, and treaties for cooperating in criminal investigations, but formal process for obtaining permission to search is slow and cumbersome. Some nations will not cooperate. G8 group of nations developed a 24-hour point-of- contact system. System, used by more than 30 nations, requires each country to staff an office that can speed processing of permission for evidence gathering. Challenges Exist for Investigating Global Computer Crime
17
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-17 Evidence-gathering facilitated by informal arrangements among individuals in security agencies and organizations. However, law regarding admissibility of such evidence in court is complicated. U.S. Fourth Amendment can apply in complex ways to searches outside United States. The law for gathering evidence for computer crimes in United States is complicated, and even more so for international investigations. Organizations that suspect they have been victims of a computer crime, especially international computer crime, should seek legal counsel, first. Challenges Exist for Investigating Global Computer Crime
18
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-18 Q1 What characteristics make international IS management challenging? Q2 Why is international information systems development difficult? Q3 What are the challenges of international project management? Q4 What are the challenges of international IS Management responsibilities? Q5 How does the international dimension affect computer security risk management? Q6 What challenges exist for investigating global computer crime? Active Review
19
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-19 United States Internal Revenue Service (IRS) Business Systems Modernization (BSM) project has been a multiyear attempt to replace existing tax-processing information systems with systems based on modern technology Subsystem that has generated most controversy and caused most serious delays is the Customer Account Data Engine (CADE). The heart of CADE is a database of business rules. IRS database contains rules about tax laws and processing of tax forms. Example of a rule: Rule 10 IF the amount on line 7 of Form 1040EZ is greater than zero, THEN invoke Rule 15. With a rule-based approach, IRS needs to only develop programs that access the database and follow the rules. Case 4: The Need for Technical Feasibility
20
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-20 Using traditional technology, developers interview users, determine what the business rules are, and then write computer code that operates in accordance with the rules. Disadvantage of such traditional programming is that only technically trained programmers can decipher the rules in the program code. Also, only trained programmers can add, change, or delete rules. Advantage of rule-based systems such as CADE is that the business rules are stored in the database and can be read, added, changed, or deleted by personnel with business knowledge but little computer training. Hence, in theory, CADE is more adaptable to changing requirements than a system written with traditional programming languages. Case 4: The Need for Technical Feasibility
21
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-21 Technical feasibility of using a rule-based system for a problem as large and complex as IRS tax processing is unknown. No one tried to estimate that feasibility. Result has been a string of schedule delays and cost overruns. Database for simple returns has some 1,200 business rules, but no reliable estimate has yet been developed for the number of rules required for the full system. Some experts believe difficulty and complexity of creating rules increases geometrically with the number of rules. Case 4: The Need for Technical Feasibility
22
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-22 Software Engineering Institute of (SEI) Carnegie Mellon University verified that no one knows with any certainty how many business rules will eventually be required. “No one knows how long rule harvesting will take, how many people will be required, the background, training, and experience of the people required, or how much it will cost. Based on anecdotal information presented to us, we believe the time will be measured in years and cost will be measured in the tens of millions of dollars. Case 4: The Need for Technical Feasibility
23
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice HallID4-23 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2011 Pearson Education, Inc. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.