Chapter 21 Successfully Implementing The Information Systems Analysis

  • Slides: 40
Download presentation
Chapter 21 Successfully Implementing The Information Systems Analysis and Design Kendall and Kendall Fifth

Chapter 21 Successfully Implementing The Information Systems Analysis and Design Kendall and Kendall Fifth Edition © Copyright Prentice Hall, 2002

Major Topics n n n n Client/server computing Network types Groupware Training Security Organizational

Major Topics n n n n Client/server computing Network types Groupware Training Security Organizational metaphors Evaluation Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 2

Implementation n n Implementation is the process of assuring that the information system is

Implementation n n Implementation is the process of assuring that the information system is operational Well-trained users are involved in its operation Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 3

Distributed Systems n Distributed systems n n n Use telecommunications technology and database management

Distributed Systems n Distributed systems n n n Use telecommunications technology and database management to interconnect people A distributed system includes work stations that can communicate with each other and with data processors The distributed system may have different configurations of data processors Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 4

Client/Server Computing n n The client/server (C/S) model consists of clients requesting and the

Client/Server Computing n n The client/server (C/S) model consists of clients requesting and the server fulfilling the request The client is a networked computer, running a GUI interface A file server stores programs and data A print server receives and stores files to be printed Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 5

Advantages and Disadvantages of Client/Server n n The advantages of a client/server system are

Advantages and Disadvantages of Client/Server n n The advantages of a client/server system are greater computer power and greater opportunity to customize applications The disadvantages of a client/server system are greater expense and applications must be written as two separate software components running on separate machines Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 6

Network Types n Standard types of networks include the wide-area network (WAN) and the

Network Types n Standard types of networks include the wide-area network (WAN) and the local area network (LAN) Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 7

Network Configurations n There are four types of network configurations: n n Hierarchical Star

Network Configurations n There are four types of network configurations: n n Hierarchical Star Ring Bus Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 8

Hierarchical n n A hierarchical network will contain several levels, with a host at

Hierarchical n n A hierarchical network will contain several levels, with a host at the top A host computer has many smaller computers that only communicate with the host, not with each other The host controls all other nodes Computers on the same level do not communicate with each other Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 9

Star n The host computer can communicate with other computers which can communicate with

Star n The host computer can communicate with other computers which can communicate with each other only through the host Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 10

Ring n n n All computers communicate with each other, passing messages around the

Ring n n n All computers communicate with each other, passing messages around the ring There is no central computer Each node is in direct communication with its neighbor Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 11

Bus n n A single central cable is used to connect all the computers

Bus n n A single central cable is used to connect all the computers It has a single, central cable which serves as the only communication path connecting several different devices Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 12

Network Models n Several models are available for designing a network: n n n

Network Models n Several models are available for designing a network: n n n A network decomposition diagram provides an overview of the system and is drawn first A hub connectivity shows how the major hubs are connected and is drawn second A workstation connectivity diagram shows the details of connecting the workstations Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 13

Groupware n Groupware is software that supports people working together in an organization Kendall

Groupware n Groupware is software that supports people working together in an organization Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 14

Groupware Functions n Groupware helps group members n n n n Schedule and attend

Groupware Functions n Groupware helps group members n n n n Schedule and attend meetings Share data Create and analyze documents Unstructured communication via e-mail Hold group conferences Departmental-level image management Manage and monitor workflow Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 15

Advantages of Distributed Systems n Advantages of distributed systems are n n n Data

Advantages of Distributed Systems n Advantages of distributed systems are n n n Data are stored where it does not affect the processing of online real-time transaction processing Data are stored using less expensive media at local sites Lowered equipment costs Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 16

Advantages of Distributed Systems n Advantages of distributed systems, continued n n Provide flexibility

Advantages of Distributed Systems n Advantages of distributed systems, continued n n Provide flexibility in choice of equipment manufacturer Initially less expensive than large systems Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 17

Disadvantages of Distributed Systems n Disadvantages of distributed systems are n n n Networks

Disadvantages of Distributed Systems n Disadvantages of distributed systems are n n n Networks must be reliable Security may be breached The relationships between subsystems must not be ignored Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 18

Training n n New system training must be performed Analysts must consider n n

Training n n New system training must be performed Analysts must consider n n n Who needs to be trained Who will train them Objectives of training Methods of instruction to be used Sites Materials Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 19

Sources of Training n Possible sources of training for users of information systems include

Sources of Training n Possible sources of training for users of information systems include n n n Vendors Systems analysts External paid trainers In-house trainers Other system users Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 20

Conversion Strategies n Five conversion strategies are n n n Direct changeover Parallel conversion

Conversion Strategies n Five conversion strategies are n n n Direct changeover Parallel conversion Phased conversion Modular prototype conversion Distributed conversion Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 21

Security n n Security considerations must be included when implementing a system These include

Security n n Security considerations must be included when implementing a system These include n n n Physical security Logical security Behavioral security Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 22

Security n n n Physical security is controlling access to physical computer resources Logical

Security n n n Physical security is controlling access to physical computer resources Logical security is controlling software access Behavioral security is building procedures to prevent persons from misusing computer hardware and software Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 23

Web Security n Precautions used to protect the computer network from both internal and

Web Security n Precautions used to protect the computer network from both internal and external Web security threats include n n Virus protection software Email filtering products URL filtering products Firewalls, gateways, and virtual private networks Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 24

Web Security n Precautions, continued n n n Intrusion detection products Vulnerability management products

Web Security n Precautions, continued n n n Intrusion detection products Vulnerability management products Security technologies such as secure socket layering for authentication Encryption technologies Public key infrastructure use and obtaining a digital certificate Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 25

Ecommerce Privacy Guidelines n n Privacy is essential to ecommerce Some privacy policy guidelines

Ecommerce Privacy Guidelines n n Privacy is essential to ecommerce Some privacy policy guidelines are n n n Start with a corporate policy on privacy Only ask for information required to complete the transaction Make it optional for customers to fill out personal information on the Web site Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 26

Ecommerce Privacy Guidelines n Further privacy policy guidelines are n n Use sources that

Ecommerce Privacy Guidelines n Further privacy policy guidelines are n n Use sources that allow you to obtain anonymous information about classes of customers Be ethical in data gathering Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 27

Evaluation Approaches n Several evaluation approaches can be used: n n Cost-benefit analysis Revised

Evaluation Approaches n Several evaluation approaches can be used: n n Cost-benefit analysis Revised decision evaluation approach User involvement evaluations The information system utility approach Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 28

Organizational Metaphors n Organizational metaphors may be used to assist in a successful implementation

Organizational Metaphors n Organizational metaphors may be used to assist in a successful implementation of a new system Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 29

Organizational Metaphors n n n Zoo Jungle War Journey Machine Kendall & Kendall n

Organizational Metaphors n n n Zoo Jungle War Journey Machine Kendall & Kendall n n Society Family Organism Game Copyright © 2002 by Prentice Hall, Inc. 30

Interpreting Organizational Metaphors n n Zoo indicates success is likely with traditional MIS systems

Interpreting Organizational Metaphors n n Zoo indicates success is likely with traditional MIS systems and decision support systems Jungle indicates success is likely with decision support systems, cooperative systems, competitive systems, and executive information systems Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 31

Interpreting Organizational Metaphors n n n War indicates success is likely with competitive systems

Interpreting Organizational Metaphors n n n War indicates success is likely with competitive systems Journey indicates success is likely with cooperative systems Machine indicates success is likely with traditional MIS systems and expert systems/artificial intelligence Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 32

Interpreting Organizational Metaphors n n Society indicates success is likely with traditional MIS systems

Interpreting Organizational Metaphors n n Society indicates success is likely with traditional MIS systems and decision support systems Family indicates success is likely with traditional MIS systems and decision support systems Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 33

Interpreting Organizational Metaphors n Organism indicates success is likely with decision support systems, expert

Interpreting Organizational Metaphors n Organism indicates success is likely with decision support systems, expert systems/artificial intelligence, cooperative systems, competitive systems, and executive information systems Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 34

Interpreting Organizational Metaphors n Game indicates success is likely with expert systems/artificial intelligence, cooperative

Interpreting Organizational Metaphors n Game indicates success is likely with expert systems/artificial intelligence, cooperative systems, competitive systems, and executive information systems Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 35

Information System Utility Evaluation n The information system utility framework is a way to

Information System Utility Evaluation n The information system utility framework is a way to evaluate a new system based on utilities of n n n Possession Form Place Time Actualization Goal Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 36

Information System Utility Evaluation n Possession utility answers the question of who should receive

Information System Utility Evaluation n Possession utility answers the question of who should receive output Goal utility answers the why of information systems by asking whether the output has value in helping the organization achieve its objectives Place utility answers the question of where information is distributed Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 37

Information System Utility Evaluation n Form utility answers the question of what kind of

Information System Utility Evaluation n Form utility answers the question of what kind of output is distributed to the decision maker Time utility answers the question of when information is delivered Actualization utility involves how the information is introduced and used by the decision maker Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 38

Web Site Evaluation n n Corporate Web sites should be evaluated The following is

Web Site Evaluation n n Corporate Web sites should be evaluated The following is a list of key things to learn about the Web site visitors: n n n Know how often the Web site is visited Learn details about specific pages on the site Find out demographic and other information about Web site visitors Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 39

Web Site Evaluation n Web site evaluation, continued n n Discover if visitors can

Web Site Evaluation n Web site evaluation, continued n n Discover if visitors can properly fill out the Web forms Find out who is referring Web site visitors to the client’s Web site Determine what browsers visitors are using Find out if the client’s Web site visitors are interested in advertising the Web site Kendall & Kendall Copyright © 2002 by Prentice Hall, Inc. 40