Chapter 17 Successfully Implementing The Information Systems Analysis

  • Slides: 50
Download presentation
Chapter 17 Successfully Implementing The Information Systems Analysis and Design Kendall & Kendall Sixth

Chapter 17 Successfully Implementing The Information Systems Analysis and Design Kendall & Kendall Sixth Edition © Copyright Prentice Hall, 2005 Slide Design by Kendall & Kendall

Major Topics • Client/server computing • Network types • Groupware • Training • Security

Major Topics • Client/server computing • Network types • Groupware • Training • Security • Organizational metaphors • Evaluation Kendall & Kendall © 2005 Pearson Prentice Hall 2

Implementation • Implementation is the process of assuring that the information system is operational.

Implementation • Implementation is the process of assuring that the information system is operational. • Well-trained users are involved in its operation. Kendall & Kendall © 2005 Pearson Prentice Hall 3

Distributed Systems • Distributed systems use telecommunications technology and database management to interconnect people.

Distributed Systems • Distributed systems use telecommunications technology and database management to interconnect people. • A distributed system includes work stations that can communicate with each other and with data processors. • The distributed system may have different configurations of data processors. Kendall & Kendall © 2005 Pearson Prentice Hall 4

Client/Server Computing • The client/server (C/S) model consists of clients request and the server

Client/Server Computing • The client/server (C/S) model consists of clients request and the server fulfillment of the request. • The client is a networked computer, running a GUI interface. • A file server stores programs and data • A print server receives and stores files to be printed. Kendall & Kendall © 2005 Pearson Prentice Hall 5

Advantages and Disadvantages of Client/Server • • The advantages of a client/server system are

Advantages and Disadvantages of Client/Server • • The advantages of a client/server system are greater computer power and greater opportunity to customize applications. The disadvantages of a client/server system are greater expense and applications must be written as two separate software components running on separate machines. Kendall & Kendall © 2005 Pearson Prentice Hall 6

Network Types Standard types of networks include the wide-area network (WAN), the local area

Network Types Standard types of networks include the wide-area network (WAN), the local area network (LAN), and the wireless local area network (WLAN). Kendall & Kendall © 2005 Pearson Prentice Hall 7

Wireless Local Area Network (WLAN) • Called Wi-Fi, wireless fidelity • Can include encryption

Wireless Local Area Network (WLAN) • Called Wi-Fi, wireless fidelity • Can include encryption wired equivalent privacy (WEP) for security • Cheap to set up • Flexible Kendall & Kendall © 2005 Pearson Prentice Hall 8

Wireless Local Area Network (WLAN) (Continued) • Concerns: • Security. • Signal integrity. •

Wireless Local Area Network (WLAN) (Continued) • Concerns: • Security. • Signal integrity. • Wi-Fi networks are prone to interference from • Kendall & Kendall systems operating nearby in the same frequency spectrum. Bluetooth is suitable for personal networks and can include computers, printers, handheld devices, phones, keyboards, mice and household appliances. © 2005 Pearson Prentice Hall 9

Network Configurations There are four types of network configurations: • Hierarchical. • Star. •

Network Configurations There are four types of network configurations: • Hierarchical. • Star. • Ring. • Bus. Kendall & Kendall © 2005 Pearson Prentice Hall 10

Hierarchical • A hierarchical network will contain several levels, with a host at the

Hierarchical • A hierarchical network will contain several levels, with a host at the top. • A host computer has many smaller computers that only communicate with the host, not with each other. • The host controls all other nodes. • Computers on the same level do not communicate with each other. Kendall & Kendall © 2005 Pearson Prentice Hall 11

Star The host computer can communicate with other computers that can communicate with each

Star The host computer can communicate with other computers that can communicate with each other only through the host. Kendall & Kendall © 2005 Pearson Prentice Hall 12

Ring • All computers communicate with each other, passing messages around the ring. •

Ring • All computers communicate with each other, passing messages around the ring. • There is no central computer. • Each node is in direct communication with its neighbor. Kendall & Kendall © 2005 Pearson Prentice Hall 13

Bus • A single central cable is used to connect all the computers. •

Bus • A single central cable is used to connect all the computers. • It has a single, central cable that serves as the only communication path connecting several different devices. Kendall & Kendall © 2005 Pearson Prentice Hall 14

Network Models Several models are available for designing a network: • A network decomposition

Network Models Several models are available for designing a network: • A network decomposition diagram provides an overview of the system and is drawn first. • A hub connectivity shows how the major hubs are connected and is drawn second • A workstation connectivity diagram shows the details of connecting the workstations. Kendall & Kendall © 2005 Pearson Prentice Hall 15

Network Decomposition and Hub Connectivity Diagram Symbols Kendall & Kendall © 2005 Pearson Prentice

Network Decomposition and Hub Connectivity Diagram Symbols Kendall & Kendall © 2005 Pearson Prentice Hall 16

Network Decomposition Diagram Kendall & Kendall © 2005 Pearson Prentice Hall 17

Network Decomposition Diagram Kendall & Kendall © 2005 Pearson Prentice Hall 17

Hub Connectivity Diagram Kendall & Kendall © 2005 Pearson Prentice Hall 18

Hub Connectivity Diagram Kendall & Kendall © 2005 Pearson Prentice Hall 18

Workstation Connectivity Diagram Kendall & Kendall © 2005 Pearson Prentice Hall 19

Workstation Connectivity Diagram Kendall & Kendall © 2005 Pearson Prentice Hall 19

Groupware is software that supports people working together in an organization. Kendall & Kendall

Groupware is software that supports people working together in an organization. Kendall & Kendall © 2005 Pearson Prentice Hall 20

Groupware Functions Groupware helps group members to: • Schedule and attend meetings. • Share

Groupware Functions Groupware helps group members to: • Schedule and attend meetings. • Share data. • Create and analyze documents. • Communicate in unstructured communication via • • • Kendall & Kendall email. Hold group conferences. Perform departmental-level image management. Manage and monitor workflow. © 2005 Pearson Prentice Hall 21

Advantages of Distributed Systems Advantages of distributed systems are: • Data are stored where

Advantages of Distributed Systems Advantages of distributed systems are: • Data are stored where it does not affect the processing of online real-time transaction processing. • Data are stored using less expensive media at local sites. • Lowered equipment costs. Kendall & Kendall © 2005 Pearson Prentice Hall 22

Advantages of Distributed Systems Advantages of distributed systems are (continued): • Provide flexibility in

Advantages of Distributed Systems Advantages of distributed systems are (continued): • Provide flexibility in choice of equipment manufacturer. • Initially less expensive than large systems. Kendall & Kendall © 2005 Pearson Prentice Hall 23

Disadvantages of Distributed Systems Disadvantages of distributed systems are: • Difficulty in achieving reliable

Disadvantages of Distributed Systems Disadvantages of distributed systems are: • Difficulty in achieving reliable system. • Security may be breached. • The relationships between subsystems must not be ignored. • Choosing the wrong level of computing to support. Kendall & Kendall © 2005 Pearson Prentice Hall 24

Training • • New system training must be performed. Analysts must consider: • Who

Training • • New system training must be performed. Analysts must consider: • Who needs to be trained. • Who will train them. • Objectives of training. • Methods of instruction to be used. • Sites. • Materials. Kendall & Kendall © 2005 Pearson Prentice Hall 25

Sources of Training Possible sources of training for users of information systems include: •

Sources of Training Possible sources of training for users of information systems include: • Vendors. • Systems analysts. • External paid trainers. • In-house trainers. • Other system users. Kendall & Kendall © 2005 Pearson Prentice Hall 26

Concerns for Training Objectives, Method, Sites and Materials Kendall & Kendall © 2005 Pearson

Concerns for Training Objectives, Method, Sites and Materials Kendall & Kendall © 2005 Pearson Prentice Hall 27

Conversion Strategies Five conversion strategies are: • Direct changeover. • Parallel conversion. • Gradual

Conversion Strategies Five conversion strategies are: • Direct changeover. • Parallel conversion. • Gradual or Phased conversion. • Modular prototype conversion. • Distributed conversion. Kendall & Kendall © 2005 Pearson Prentice Hall 28

Conversion Strategies Kendall & Kendall © 2005 Pearson Prentice Hall 29

Conversion Strategies Kendall & Kendall © 2005 Pearson Prentice Hall 29

Security • Security considerations must be included when implementing a system. • These include:

Security • Security considerations must be included when implementing a system. • These include: • Physical security. • Logical security. • Behavioral security. Kendall & Kendall © 2005 Pearson Prentice Hall 30

Security (Continued) • Physical security is controlling access to physical computer resources. • Logical

Security (Continued) • Physical security is controlling access to physical computer resources. • Logical security is controlling software access. • Behavioral security is building procedures to prevent persons from misusing computer hardware and software. Kendall & Kendall © 2005 Pearson Prentice Hall 31

Web Security Precautions used to protect the computer network from both internal and external

Web Security Precautions used to protect the computer network from both internal and external Web security threats include: • Virus protection software. • Email filtering products. • URL filtering products. • Firewalls, gateways, and virtual private networks. Kendall & Kendall © 2005 Pearson Prentice Hall 32

Web Security • Precautions used to protect the computer network from both internal and

Web Security • Precautions used to protect the computer network from both internal and external Web security threats include (continued): • Intrusion detection products. • Vulnerability management products. • Security technologies such as secure socket • • Kendall & Kendall layering (SSL) for authentication. Encryption technologies. Public key infrastructure (PKI) use and obtaining a digital certificate. © 2005 Pearson Prentice Hall 33

Ecommerce Privacy Guidelines • Privacy is essential to ecommerce. • Some privacy policy guidelines

Ecommerce Privacy Guidelines • Privacy is essential to ecommerce. • Some privacy policy guidelines are: • Start with a corporate policy on privacy. • Only ask for information required to complete the transaction. • Make it optional for customers to fill out personal information on the Web site. Kendall & Kendall © 2005 Pearson Prentice Hall 34

Ecommerce Privacy Guidelines • Some privacy policy guidelines are (continued): • Use sources that

Ecommerce Privacy Guidelines • Some privacy policy guidelines are (continued): • Use sources that allow you to obtain anonymous information about classes of customers. • Be ethical in data gathering. Kendall & Kendall © 2005 Pearson Prentice Hall 35

Other Conversion Considerations • • Ordering equipment Ordering external supplies, such as toner cartridges,

Other Conversion Considerations • • Ordering equipment Ordering external supplies, such as toner cartridges, paper, preprinted forms and so on Appointing a manager to supervise the preparation of the installation site Planning, scheduling, and supervising IT personnel who convert files and databases Kendall & Kendall © 2005 Pearson Prentice Hall 36

Evaluation Approaches Several evaluation approaches can be used: • Cost-benefit analysis. • Revised decision

Evaluation Approaches Several evaluation approaches can be used: • Cost-benefit analysis. • Revised decision evaluation approach. • User involvement evaluations. • The information system utility approach. Kendall & Kendall © 2005 Pearson Prentice Hall 37

Organizational Metaphors Organizational metaphors may be used to assist in a successful implementation of

Organizational Metaphors Organizational metaphors may be used to assist in a successful implementation of a new system. Kendall & Kendall © 2005 Pearson Prentice Hall 38

Organizational Metaphors (Continued) • • • Zoo Jungle War Journey Machine Kendall & Kendall

Organizational Metaphors (Continued) • • • Zoo Jungle War Journey Machine Kendall & Kendall • • © 2005 Pearson Prentice Hall Society Family Organism Game 39

Organizational Metaphors and Types of Information Systems Kendall & Kendall © 2005 Pearson Prentice

Organizational Metaphors and Types of Information Systems Kendall & Kendall © 2005 Pearson Prentice Hall 40

Interpreting Organizational Metaphors • Zoo indicates success is likely with traditional MIS systems and

Interpreting Organizational Metaphors • Zoo indicates success is likely with traditional MIS systems and decision support systems. • Jungle indicates success is likely with decision support systems, cooperative systems, competitive systems, and executive information systems. Kendall & Kendall © 2005 Pearson Prentice Hall 41

Interpreting Organizational Metaphors (Continued) • War indicates success is likely with competitive systems. •

Interpreting Organizational Metaphors (Continued) • War indicates success is likely with competitive systems. • Journey indicates success is likely with cooperative systems. • Machine indicates success is likely with traditional MIS systems and expert systems/artificial intelligence. Kendall & Kendall © 2005 Pearson Prentice Hall 42

Interpreting Organizational Metaphors (Continued) • Society indicates success is likely with traditional MIS systems

Interpreting Organizational Metaphors (Continued) • Society indicates success is likely with traditional MIS systems and decision support systems. • Family indicates success is likely with traditional MIS systems and decision support systems. Kendall & Kendall © 2005 Pearson Prentice Hall 43

Interpreting Organizational Metaphors (Continued) • Organism indicates success is likely with decision support systems,

Interpreting Organizational Metaphors (Continued) • Organism indicates success is likely with decision support systems, expert systems/artificial intelligence, cooperative systems, competitive systems, and executive information systems. Kendall & Kendall © 2005 Pearson Prentice Hall 44

Interpreting Organizational Metaphors (Continued) • Game indicates success is likely with expert systems/artificial intelligence,

Interpreting Organizational Metaphors (Continued) • Game indicates success is likely with expert systems/artificial intelligence, cooperative systems, competitive systems, and executive information systems. Kendall & Kendall © 2005 Pearson Prentice Hall 45

Information System Utility Evaluation • The information system utility framework is a way to

Information System Utility Evaluation • The information system utility framework is a way to evaluate a new system based on utilities of: • Possession. • Form. • Place. • Time. • Actualization. • Goal. Kendall & Kendall © 2005 Pearson Prentice Hall 46

Information System Utility Evaluation (Continued) • Possession utility answers the question of who should

Information System Utility Evaluation (Continued) • Possession utility answers the question of who should receive output. • Goal utility answers the why of information systems by asking whether the output has value in helping the organization achieve its objectives. • Place utility answers the question of where information is distributed. Kendall & Kendall © 2005 Pearson Prentice Hall 47

Information System Utility Evaluation (Continued) • Form utility answers the question of what kind

Information System Utility Evaluation (Continued) • Form utility answers the question of what kind of output is distributed to the decision maker. • Time utility answers the question of when information is delivered. • Actualization utility involves how the information is introduced and used by the decision maker. Kendall & Kendall © 2005 Pearson Prentice Hall 48

Web Site Evaluation • • Corporate Web sites should be evaluated. The following is

Web Site Evaluation • • Corporate Web sites should be evaluated. The following is a list of key things to learn about the Web site visitors: • Know how often the Web site is visited. • Learn details about specific pages on the site. • Find out demographic and other information about Web site visitors. Kendall & Kendall © 2005 Pearson Prentice Hall 49

Web Site Evaluation • The following is a list of key things to learn

Web Site Evaluation • The following is a list of key things to learn about the Web site visitors (continued): • Discover if visitors can properly fill out the Web • • • Kendall & Kendall forms. Find out who is referring Web site visitors to the client’s Web site. Determine what browsers visitors are using. Find out if the client’s Web site visitors are interested in advertising the Web site. © 2005 Pearson Prentice Hall 50