Chapter 21 Successfully Implementing The Information System

Slides:



Advertisements
Similar presentations
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Advertisements

Chapter 3: Planning a Network Upgrade
Information Systems in Business
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Chapter 1 Assuming the Role of the Systems Analyst
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Chapter 21 Successfully Implementing The Information System
IS Network and Telecommunications Risks
Chapter 2 Succeeding as a Systems Analyst
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Quality Assurance and Implementation Systems Analysis and Design, 8e Kendall & Kendall.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Chapter 1 Assuming the Role of the Systems Analyst
Chapter 9: Moving to Design
Kendall & KendallCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 16 Kendall & Kendall Systems Analysis and Design, 9e Quality Assurance.
OCR Computing for GCSE © Hodder Education 2011
INFO 355Week #61 Systems Analysis II Essentials of design INFO 355 Glenn Booker.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
Chapter 9 Elements of Systems Design
Chapter 17 Successfully Implementing The Information System
PowerPoint Presentation by Charlie Cook Copyright © 2005 Prentice Hall, Inc. All rights reserved. Chapter 12 Managing Information Systems and Communications.
Successfully Implementing the Information System Systems Analysis and Design, 7e Kendall & Kendall 17 © 2008 Pearson Prentice Hall.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Computers Are Your Future Eleventh Edition
CE Operating Systems Lecture 3 Overview of OS functions and structure.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Introduction to Computing Lecture # 11 Introduction to Computing Lecture # 11.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Computer Concepts 2014 Chapter 10 Information Systems Analysis and Design.
© Prentice Hall, 2005Excellence in Business, Revised Edition Chapter Fundamentals of Information Management, the Internet, and E-Commerce.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Chapter2 Networking Fundamentals
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Communications & Networks National 4 & 5 Computing Science.
Thepul Ginige Lecture-7 Implementation of Information System Thepul Ginige.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Thepul Ginige Lecture-5 Implementation of Information System Part - I Thepul Ginige.
Successfully Implementing Information Systems Systems Analysis and Design.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
9 Systems Analysis and Design in a Changing World, Fifth Edition.
Copyright © 2011 Pearson Education Quality Assurance and Implementation Systems Analysis and Design, 8e Kendall & Kendall Global Edition 16.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Chapter 21 Successfully Implementing The Information System.
1.4 wired and wireless networks lesson 1
Principles of Information Systems Eighth Edition
Edited by : Noor Al-Hareqi
Discovering Computers 2010: Living in a Digital World Chapter 14
Successfully Implementing Information Systems
Networks 1 Key Revision Points.
Computer Networks Part 1
Edited by : Noor Al-Hareqi
Fundamentals of Information Systems, Sixth Edition
Computer Networking Devices
IS4550 Security Policies and Implementation
Lecture-5 Implementation of Information System Part - I Thepul Ginige
What is a network? A network consists of two or more entities, or objects, sharing resources and information. In a basic sense, sharing (giving or getting)
Edited by : Noor Al-Hareqi
Department of Computer Science Course : Pre Computer Skills
Systems Analysis and Design in a Changing World, 6th Edition
INTRODUCTION TO COMPUTER NETWORKS
Networking and Security
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
INTRODUCTION TO COMPUTER NETWORKS
Computers Are Your Future
Edited by : Noor Al-Hareqi
Copyright 2005 Prentice- Hall, Inc.
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
By Hussein Alhashimi.
Presentation transcript:

Chapter 21 Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition

Copyright © 2002 by Prentice Hall, Inc. Major Topics Client/server computing Network types Groupware Training Security Organizational metaphors Evaluation Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Client/Server (C/S) Computing Consists of clients requesting and the server fulfilling the request The client is a networked computer, running a GUI interface A file server stores programs and data A print server receives and stores files to be printed Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Copyright © 2002 by Prentice Hall, Inc. C/S Computing Advantages. Greater computer power Greater opportunity to customize applications Disadvantages. Greater expense Applications must be written as two separate software components running on separate machines Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Copyright © 2002 by Prentice Hall, Inc. Networks Standard types of networks include wide-area network (WAN) local area network (LAN) Network Configurations Hierarchical Star Ring Bus Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Copyright © 2002 by Prentice Hall, Inc. Hierarchical A hierarchical network will contain several levels, with a host at the top A host computer has many smaller computers that only communicate with the host, not with each other The host controls all other nodes Computers on the same level do not communicate with each other Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Copyright © 2002 by Prentice Hall, Inc. Star The host computer can communicate with other computers which can communicate with each other only through the host Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Copyright © 2002 by Prentice Hall, Inc. Ring All computers communicate with each other, passing messages around the ring No central computer exists Each node is in direct communication with its neighbor Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Copyright © 2002 by Prentice Hall, Inc. Bus A single central cable is used to connect all the computers The single, central cable serves as the only communication path connecting several different devices Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Copyright © 2002 by Prentice Hall, Inc. Network Models network decomposition diagram provides an overview of the system and is drawn first hub connectivity shows how the major hubs are connected and is drawn second workstation connectivity diagram shows the details of connecting the workstations Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Copyright © 2002 by Prentice Hall, Inc. Groupware Groupware is software that supports people working together in an organization Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Copyright © 2002 by Prentice Hall, Inc. Groupware Functions Schedule and attend meetings Share data Create and analyze documents Unstructured communication via e-mail Hold group conferences Departmental-level image management Manage and monitor workflow Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Copyright © 2002 by Prentice Hall, Inc. Distributed Systems Use telecommunications technology and database management to interconnect people Includes work stations that can communicate with each other and with data processors May have different configurations of data processors Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Advantages of Distributed Systems Data are stored where it does not affect the processing of online real-time transaction processing Data are stored using less expensive media at local sites Lowered equipment costs Provide flexibility in choice of equipment manufacturer Initially less expensive than large systems Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Disadvantages of Distributed Systems Networks must be reliable Security may be breached The relationships between subsystems must not be ignored Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Copyright © 2002 by Prentice Hall, Inc. Training New system training must be performed Analysts must consider Who needs to be trained Who will train them Objectives of training Methods of instruction to be used Sites Materials Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Copyright © 2002 by Prentice Hall, Inc. Sources of Training Vendors Systems analysts External paid trainers In-house trainers Other system users Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Conversion Strategies Direct changeover Parallel conversion Phased conversion Modular prototype conversion Distributed conversion Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Copyright © 2002 by Prentice Hall, Inc. Security Must be considered during system implementation Physical security is controlling access to physical computer resources Logical security is controlling software access Behavioral security is building procedures to prevent persons from misusing computer hardware and software Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Web Security Precautions Used to protect from both internal and external security threats: Virus protection software Email filtering products URL filtering products Firewalls, gateways, and virtual private networks Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Web Security Precautions Intrusion detection products Vulnerability management products Security technologies such as secure socket layering for authentication Encryption technologies Public key infrastructure use and obtaining a digital certificate Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Privacy Policy Guidelines Start with a corporate policy on privacy Only ask for information required to complete the transaction Make it optional for customers to fill out personal information on the Web site Use sources that allow you to obtain anonymous information about classes of customers Be ethical in data gathering Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Organizational Metaphors May be used to assist in a successful implementation of a new system Examples Zoo Jungle War Journey Machine Society Family Organism Game Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Evaluation Approaches Several evaluation approaches can be used: Cost-benefit analysis Revised decision evaluation approach User involvement evaluations The information system utility approach Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Interpreting Org. Metaphors MIS DSS EIS Cooperative System Competitive System AI/ES Society, Family, Zoo X Jungle War Journey Machine Game, Organism Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Information System Utility Utility framework to evaluate a new system based on utilities of Possession Form Place Time Actualization Goal Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Copyright © 2002 by Prentice Hall, Inc. Types of Utility Possession -- who should receive output Goal -- ask whether the output has value in helping the organization achieve its objectives Place -- where information is distributed Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Copyright © 2002 by Prentice Hall, Inc. Types of Utility Form -- what kind of output is distributed to the decision maker Time -- when information is delivered Actualization -- involves how the information is introduced and used by the decision maker Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.

Copyright © 2002 by Prentice Hall, Inc. Web Site Visitors Know how often the Web site is visited Learn details about specific web pages Visitor demographics Discover if visitors can properly fill out the Web forms Find out who is referring Web site visitors to the client’s Web site Determine what browsers visitors are using Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc.