Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.

Slides:



Advertisements
Similar presentations
Chapter 3: Planning a Network Upgrade
Advertisements

Information Systems in Business
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Chapter 21 Successfully Implementing The Information System
IS Network and Telecommunications Risks
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Quality Assurance and Implementation Systems Analysis and Design, 8e Kendall & Kendall.
Chapter 9 Using Data Flow Diagrams
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Chapter 1 Assuming the Role of the Systems Analyst
Chapter 9: Moving to Design
Kendall & KendallCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 16 Kendall & Kendall Systems Analysis and Design, 9e Quality Assurance.
OCR Computing for GCSE © Hodder Education 2011
INFO 355Week #61 Systems Analysis II Essentials of design INFO 355 Glenn Booker.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
Chapter 9 Elements of Systems Design
Chapter 17 Successfully Implementing The Information System
PowerPoint Presentation by Charlie Cook Copyright © 2005 Prentice Hall, Inc. All rights reserved. Chapter 12 Managing Information Systems and Communications.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Successfully Implementing the Information System Systems Analysis and Design, 7e Kendall & Kendall 17 © 2008 Pearson Prentice Hall.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
IT Infrastructure Chap 1: Definition
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
An application architecture specifies the technologies to be used to implement one or more (and possibly all) information systems in terms of DATA, PROCESS,
Computers Are Your Future Eleventh Edition
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Introduction to Computing Lecture # 11 Introduction to Computing Lecture # 11.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Communications & Networks National 4 & 5 Computing Science.
Thepul Ginige Lecture-7 Implementation of Information System Thepul Ginige.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Activity 1 5 minutes to discuss and feedback on the following:
Thepul Ginige Lecture-5 Implementation of Information System Part - I Thepul Ginige.
Successfully Implementing Information Systems Systems Analysis and Design.
9 Systems Analysis and Design in a Changing World, Fifth Edition.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Copyright © 2011 Pearson Education Quality Assurance and Implementation Systems Analysis and Design, 8e Kendall & Kendall Global Edition 16.
Chapter 21 Successfully Implementing The Information System.
1.4 wired and wireless networks lesson 1
Edited by : Noor Al-Hareqi
Discovering Computers 2010: Living in a Digital World Chapter 14
Successfully Implementing Information Systems
Networks 1 Key Revision Points.
Computer Networks Part 1
Edited by : Noor Al-Hareqi
Fundamentals of Information Systems, Sixth Edition
Computer Networking Devices
Network Configurations
Computer Basics Section 2.1 YOU WILL LEARN TO… Identify hardware
IS4550 Security Policies and Implementation
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Lecture-5 Implementation of Information System Part - I Thepul Ginige
What is a network? A network consists of two or more entities, or objects, sharing resources and information. In a basic sense, sharing (giving or getting)
Edited by : Noor Al-Hareqi
Department of Computer Science Course : Pre Computer Skills
Systems Analysis and Design in a Changing World, 6th Edition
INTRODUCTION TO COMPUTER NETWORKS
Networking and Security
Networks and Topologies
GCSE OCR 3 A451 Computing Client-server and peer-to-peer networks
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
INTRODUCTION TO COMPUTER NETWORKS
Edited by : Noor Al-Hareqi
Chapter 22 Object-Oriented Systems Analysis and Design and UML
Copyright 2005 Prentice- Hall, Inc.
By Hussein Alhashimi.
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Major Topics Client/server computing Network types Groupware Training Security Organizational metaphors Evaluation

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Implementation Implementation is the process of assuring that the information system is operational Well-trained users are involved in its operation

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Distributed Systems Distributed systems Use telecommunications technology and database management to interconnect people A distributed system includes work stations that can communicate with each other and with data processors The distributed system may have different configurations of data processors

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Client/Server Computing The client/server (C/S) model consists of clients requesting and the server fulfilling the request The client is a networked computer, running a GUI interface A file server stores programs and data A print server receives and stores files to be printed

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Advantages and Disadvantages of Client/Server The advantages of a client/server system are greater computer power and greater opportunity to customize applications The disadvantages of a client/server system are greater expense and applications must be written as two separate software components running on separate machines

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Network Types Standard types of networks include the wide-area network (WAN) and the local area network (LAN)

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Network Configurations There are four types of network configurations: Hierarchical Star Ring Bus

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Hierarchical A hierarchical network will contain several levels, with a host at the top A host computer has many smaller computers that only communicate with the host, not with each other The host controls all other nodes Computers on the same level do not communicate with each other

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Star The host computer can communicate with other computers which can communicate with each other only through the host

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Ring All computers communicate with each other, passing messages around the ring There is no central computer Each node is in direct communication with its neighbor

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Bus A single central cable is used to connect all the computers It has a single, central cable which serves as the only communication path connecting several different devices

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Network Models Several models are available for designing a network: A network decomposition diagram provides an overview of the system and is drawn first A hub connectivity shows how the major hubs are connected and is drawn second A workstation connectivity diagram shows the details of connecting the workstations

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Groupware Groupware is software that supports people working together in an organization

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Groupware Functions Groupware helps group members Schedule and attend meetings Share data Create and analyze documents Unstructured communication via Hold group conferences Departmental-level image management Manage and monitor workflow

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Advantages of Distributed Systems Advantages of distributed systems are Data are stored where it does not affect the processing of online real-time transaction processing Data are stored using less expensive media at local sites Lowered equipment costs

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Advantages of Distributed Systems Advantages of distributed systems, continued Provide flexibility in choice of equipment manufacturer Initially less expensive than large systems

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Disadvantages of Distributed Systems Disadvantages of distributed systems are Networks must be reliable Security may be breached The relationships between subsystems must not be ignored

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Training New system training must be performed Analysts must consider Who needs to be trained Who will train them Objectives of training Methods of instruction to be used Sites Materials

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Sources of Training Possible sources of training for users of information systems include Vendors Systems analysts External paid trainers In-house trainers Other system users

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Security Security considerations must be included when implementing a system These include Physical security Logical security Behavioral security

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Security Physical security is controlling access to physical computer resources Logical security is controlling software access Behavioral security is building procedures to prevent persons from misusing computer hardware and software

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Web Security Precautions used to protect the computer network from both internal and external Web security threats include Virus protection software filtering products URL filtering products Firewalls, gateways, and virtual private networks

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Web Security Precautions, continued Intrusion detection products Vulnerability management products Security technologies such as secure socket layering for authentication Encryption technologies Public key infrastructure use and obtaining a digital certificate

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Ecommerce Privacy Guidelines Privacy is essential to ecommerce Some privacy policy guidelines are Start with a corporate policy on privacy Only ask for information required to complete the transaction Make it optional for customers to fill out personal information on the Web site

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Ecommerce Privacy Guidelines Further privacy policy guidelines are Use sources that allow you to obtain anonymous information about classes of customers Be ethical in data gathering

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Information System Utility Evaluation The information system utility framework is a way to evaluate a new system based on utilities of Possession Form Place Time Actualization Goal

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Information System Utility Evaluation Possession utility answers the question of who should receive output Goal utility answers the why of information systems by asking whether the output has value in helping the organization achieve its objectives Place utility answers the question of where information is distributed

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Information System Utility Evaluation Form utility answers the question of what kind of output is distributed to the decision maker Time utility answers the question of when information is delivered Actualization utility involves how the information is introduced and used by the decision maker

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Web Site Evaluation Corporate Web sites should be evaluated The following is a list of key things to learn about the Web site visitors: Know how often the Web site is visited Learn details about specific pages on the site Find out demographic and other information about Web site visitors

Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc Web Site Evaluation Web site evaluation, continued Discover if visitors can properly fill out the Web forms Find out who is referring Web site visitors to the client’s Web site Determine what browsers visitors are using Find out if the client’s Web site visitors are interested in advertising the Web site