The Systems Development Life Cycle Systems Implementation Product: Operational System Systems Implementation Product: Operational System Systems Investigation.

Slides:



Advertisements
Similar presentations
Software Quality Assurance Plan
Advertisements

Software Quality Assurance Plan
Overview of IS Controls, Auditing, and Security Fall 2005.
What is Software Design?. Systems Development Life- Cycle Planning Analysis Design Implementation Design.
HUMAN RESOURCE AUDIT DR. RAJNI SINGH.
Auditing Computer Systems
9 - 1 Computer-Based Information Systems Control.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Systems Analysis and Design 9th Edition
Security Controls – What Works
Fundamentals of Information Systems, Second Edition
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Course Technology Chapter 3: Project Integration Management.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
Project Management and MS Project. The project management triangle: Time Resources Scope.
COMP8130 and 4130Adrian Marshall 8130 and 4130 Test Management Adrian Marshall.
Introduction to Systems Analysis and Design
Development and Quality Plans
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Presented by: Insert Name Safety Management Consultant
Systems Analysis and Design: The Big Picture
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
Copyright Course Technology 1999
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
1 IS 8950 Managing and Leading a Networked IT Organization.
1 SYS366 Week 3 Lecture 1 Introduction to Requirements Gathering: Part 1.
Information Systems Analysis and Design
INFORMATION SYSTEMS Overview
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Chapter 10  2000 by Prentice Hall Information Systems for Managerial Decision Making Uma Gupta Introduction to Information Systems.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
A Portfolio Approach to IT Projects Chapter 10. Project Risk Consequences of Risk: –Failure to obtain all, or any, of the anticipated benefits because.
SCSC 311 Information Systems: hardware and software.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
ISM 5316 Week 3 Learning Objectives You should be able to: u Define and list issues and steps in Project Integration u List and describe the components.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Fundamentals of Information Systems, Second Edition 1 Systems Development.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Requirements Engineering Process
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Unit 17: SDLC. Systems Development Life Cycle Five Major Phases Plus Documentation throughout Plus Evaluation…
1 The System life cycle 16 The system life cycle is a series of stages that are worked through during the development of a new information system. A lot.
Privacy Audit and Privacy Seal Barbara Körffer & Dr. Thomas Probst Independent Centre for Privacy Protection Independent Centre for Privacy ProtectionSchleswig-Holstein.
Installation and Maintenance of Health IT Systems Unit 8a Troubleshooting; Maintenance and Upgrades; and Interaction with Vendors, Developers, and Users.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
10-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Risk management. Definition and Aim  Risk management is examine systematically all risks and react on them, taking into account all the effects of.
The information systems lifecycle Far more boring than you ever dreamed possible!
Principles of Information Systems Eighth Edition Chapter 1 An Introduction to Information Systems.
Welcome to the ICT Department Unit 3_5 Security Policies.
Information Systems Development
Fundamentals of Information Systems
Systems Analysis and Design
Types of information systems in organizations and its characteristics
Where is Your Organization on the Accessibility Maturity Scale
Managing the Security Function
CHAPTER 10 METHODOLOGIES FOR CUSTOM SOFTWARE DEVELOPMENT
Management Information Systems: Classic Models and New Approaches
The Basics of Information Systems
PLANNING A SECURE BASELINE INSTALLATION
Joint Application Development (JAD)
Introduction to the PACS Security
The Basics of Information Systems
Presentation transcript:

The Systems Development Life Cycle Systems Implementation Product: Operational System Systems Implementation Product: Operational System Systems Investigation Product: Feasibility Study Systems Investigation Product: Feasibility Study Systems Analysis Product: Functional Requirements Systems Analysis Product: Functional Requirements Systems Design Product: System Specifications Systems Design Product: System Specifications Systems Maintenance Product: Improved System Systems Maintenance Product: Improved System Understand the Business Problem or Opportunity Develop an Information System Solution Implement the System Solution

Of course, with intelligent systems, prototyping is used frequently, and is the preferred method. (and VB is one of the most used prototyping languages out there)

The Evolutionary/Rapid Prototyping Approach  Build a DSS in a series of short steps with immediate feedback from users  1. Select an important subproblem to be built first  2. Develop a small but usable system to assist the decision maker  3. Evaluate the system constantly  4. Refine, expand, and modify the system in cycles  Repeat  Stable and comprehensive system evolves

Special Concerns with Intelligent Systems Systems Implementation Product: Operational System Systems Implementation Product: Operational System Systems Investigation Product: Feasibility Study Systems Investigation Product: Feasibility Study Systems Analysis Product: Functional Requirements Systems Analysis Product: Functional Requirements Systems Design Product: System Specifications Systems Design Product: System Specifications Systems Maintenance Product: Improved System Systems Maintenance Product: Improved System Understand the Business Problem or Opportunity Develop an Information System Solution Implement the System Solution Champions are harder to come by.

Special Concerns with Intelligent Systems Systems Implementation Product: Operational System Systems Implementation Product: Operational System Systems Investigation Product: Feasibility Study Systems Investigation Product: Feasibility Study Systems Analysis Product: Functional Requirements Systems Analysis Product: Functional Requirements Systems Design Product: System Specifications Systems Design Product: System Specifications Systems Maintenance Product: Improved System Systems Maintenance Product: Improved System Understand the Business Problem or Opportunity Develop an Information System Solution Implement the System Solution Evaluate Risk. Don’t be like “Close Call”.

Special Concerns with Intelligent Systems Systems Implementation Product: Operational System Systems Implementation Product: Operational System Systems Investigation Product: Feasibility Study Systems Investigation Product: Feasibility Study Systems Analysis Product: Functional Requirements Systems Analysis Product: Functional Requirements Systems Design Product: System Specifications Systems Design Product: System Specifications Systems Maintenance Product: Improved System Systems Maintenance Product: Improved System Understand the Business Problem or Opportunity Develop an Information System Solution Implement the System Solution Extra care required to ensure system’s intent and purpose is understood.

Special Concerns with Intelligent Systems Systems Implementation Product: Operational System Systems Implementation Product: Operational System Systems Investigation Product: Feasibility Study Systems Investigation Product: Feasibility Study Systems Analysis Product: Functional Requirements Systems Analysis Product: Functional Requirements Systems Design Product: System Specifications Systems Design Product: System Specifications Systems Maintenance Product: Improved System Systems Maintenance Product: Improved System Understand the Business Problem or Opportunity Develop an Information System Solution Implement the System Solution User interface and knowledge base concerns.

Special Concerns with Intelligent Systems Systems Implementation Product: Operational System Systems Implementation Product: Operational System Systems Investigation Product: Feasibility Study Systems Investigation Product: Feasibility Study Systems Analysis Product: Functional Requirements Systems Analysis Product: Functional Requirements Systems Design Product: System Specifications Systems Design Product: System Specifications Systems Maintenance Product: Improved System Systems Maintenance Product: Improved System Understand the Business Problem or Opportunity Develop an Information System Solution Implement the System Solution Security and privacy often even MORE sensitive.

Project Example: DSS for HR. A small consulting firm has contacted you to develop an internal DSS (could be labeled an EIS) to be used for employee raises and promotions. Only the top two executives will be using the system (system does not need to be distributed). The system will take data stored in company records and help the executives make decisions about raises and promotions. Data used includes billable hours for that employee for that year, sick/absent days for that employee for that year, performance ratings on ten performance categories for that employee for that year, and number and quality of contributions to the firm’s knowledge base from that employee for that year.

Investigation.  Investigation: Is there really a problem here? Feasibility study: organizational, economic, and technical.

Technical Feasibility: Technical Feasibility: Does our firm have the technical skills and knowledge to deliver this system?  Familiarity with application  Knowledge of business domain  Familiarity with technology  Extension of existing firm technologies  Project size  Number of people, time, and features  In the case of ES: does the knowledge exist? Can we get the right expert?

Economic Feasibility Economic Feasibility Is such a system cost-justified?  Benefits  Development costs  Operational costs  Totals  In the case of ES: can we afford the knowledge?

Organizational Feasibility Organizational Feasibility Will people use it, will it be supported?  Stakeholder analysis  Project champion(s)  Organizational management  System users  In the case of ES: is the knowledge appropriate to our problem; is it usable?

Project Risk is greater with intelligent systems!!

Consequences of Project Risk Failure to obtain all, or any, of the anticipated benefits Failure to obtain all, or any, of the anticipated benefits Implementation costs that are higher than expected Implementation costs that are higher than expected Implementation time that is much longer than expected Implementation time that is much longer than expected Technical performance significantly below expectation Technical performance significantly below expectation Incompatibility of system with hardware and software Incompatibility of system with hardware and software

Elements of Project Risk Experience Hardware Hardware Software Software Operating Sys. Operating Sys. Languages Languages Structure Tasks Tasks Decisions Decisions Variables Variables Stability Stability Project Size Expense Expense Staffing Staffing Time Time Departments Departments

Project Categories and Degree of Risk Type 5 Low Risk (Susceptible to Mismanagement) Type 6 Very Low Risk (Susceptible to Mismanagement) Type 7 Very High Risk Type 8 High Risk Type 1 Low Risk Type 2 Very Low Risk Type 3 Medium Risk Type 4 Medium - low Risk High Relative Technology Low Relative Technology Large Scope Small Scope Low Structure High Structure

Tools to Manage Risk External Integration Organizational and other communicative devices that link the project team’s work to users. Internal Integration Devices that ensure the project team operates as an integrated unit. Formal Planning Tools Devices to help structure the sequence of tasks; estimates of financial, time, and technological resources needed. Formal Control Tools Controls to help evaluate progress and identify discrepancies between actual and planned performance.

Influences on Tool Selection Type 1 External Integration - L Internal Integration - M Formal Planning - H Formal Control - H Large Scope Small Scope Low Structure High Structure Type 5 External Integration - H Internal Integration - M Formal Planning - H Formal Control - H Type 2 External Integration - L Internal Integration - L Formal Planning - M Formal Control - H Type 6 External Integration - H Internal Integration - L Formal Planning - M Formal Control - H Type 3 External Integration - L Internal Integration -H Formal Planning - M Formal Control - M Type 4 External Integration - L Internal Integration - H Formal Planning - L Formal Control - L Type 7 External Integration - H Internal Integration - H Formal Planning - L+ Formal Control - L+ Type 8 External Integration - H Internal Integration - H Formal Planning - L Formal Control - L Low Relative Technology High Relative Technology

Where did “Close Call” (online reading) go wrong? n MUST integrate constituencies (Management, developers, users). n Project MUST be tied to business objectives and the results must be at least somewhat measurable. n Too ambitious without commitment.

Interface cost can be 60 to 70 % of the total DSS cost!!

Types of Interfaces -- Options? Your firm is developing an Expert System for Emergency Room staff at a hospital. The goal of the system is for “obvious” diagnoses to be made immediately (and the patient to receive immediate care), thus saving the Doctors to work on the more difficult determinations. Therefore, the system will require answers to five to ten questions about a patient’s condition from the staff, and will inform that staff member if this patient has been diagnosed immediately (including the diagnosis and appropriate routing) or needs to be seen by a Doctor. What user interface would you suggest for this system?

Interface Design  “The interface IS the system”, but also…  Garbage in, garbage out.  One of the IS manager’s biggest challenges.  Financial example.

Special Security and Privacy Concerns with Intelligence

If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? = * 1,000,000 customers * 12 months = $48,000!!!!! Nice income supplement. Standard Example

Computer Crime  Computer crime losses estimated between $15-$300 Billion annually.  “The playground bullies are learning how to type” -- Forbes Magazine.

BUT, crime is not the only security area!  Three main concerns:  evil (crime)  system limitations  Carelessness / Stupidity

Providing Security - Input  Passwords. Automatic disconnect can increase “brute force penetration” by more than a year.  Log invalid attempts.  Error checks.  Control totals - batch and hash. Especially useful for sensitive EIS applications.

Providing Security - On-Line Processing  Encryption  Firewalls  Firebreaks - Consider for EIS or proprietary ES.  Giving away your card vs. bigger and faster

Providing Security - Procedural  Keep an electronic audit trail  Separate duties.  Never allow too much power to one individual. In ES, don’t allow the expert to update the knowledge base.  Continually asses threats, risks, exposures, and vulnerabilities.  Have standard procedures and documentation.  Strict authorization requirements.

Providing Security - Procedural  Outside audits.  “Security is everybody’s business” -- give awards, etc.  Have a disaster recovery plan. Lacked by 60% of all businesses!  Use intelligent systems capability of firm to flag problems.

Providing Security - Physical  All hard drives will eventually crash. This fact should be your first to consider. Everything else doesn’t count if you’ve forgotten this.  Secure systems physically.  Separate systems physically.  Have off site storage.  Backups -files more than programs.  Fault tolerance - UPS.  Don’t let your corporate knowledge get lost. This is WAY more important for DSS than TPS… should figure 2:1 on physical security procedures.

Privacy  If you’re going to disseminate knowledge through intelligent systems, you’re going to need clear and comprehensive privacy policies in place.  Electronic Communications Privacy Act (ECPA) of 1986  Storage - what is being stored?  Usage - how is it used?  Sharing - who has access?  Is human judgment applied when necessary?  Errors.

European Union -- “No privacy, no trade”  European Data Protection Directive:  right of access –right to know where the data originated –right to have inaccurate data rectified –right of recourse in the event of unlawful processing –right to withhold permission to use data for direct marketing

“Fair Information Practices” Example: McGraw Hill Co.s  Four Principles:  Notice (what is collected and done)  Choice (may not want data shared) –Security –Review and Correction