1 / 33

Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics

Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics. Chapters 13 & 14. Systems Design. Systems Design. “How will the information system do what it must do to obtain a solution to a problem?”. Logical Design. Describes what the system must do

kynton
Télécharger la présentation

Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Systems Design, Implementation, Maintenance, and ReviewSecurity, Privacy, and Ethics Chapters 13 & 14

  2. Systems Design

  3. Systems Design • “How will the information system do what it must do to obtain a solution to a problem?” Principles of Information Systems, Fifth Edition

  4. Logical Design • Describes what the system must do • “Functional requirements” Principles of Information Systems, Fifth Edition

  5. Physical Design • Describes the technology and other components needed to complete the logical design Principles of Information Systems, Fifth Edition

  6. Hardware backup • Disaster recovery plans • Hot site • Cold site Principles of Information Systems, Fifth Edition

  7. Software & Database Backup • Selective backups • Incremental backups • Image log Principles of Information Systems, Fifth Edition

  8. Fig 13.3

  9. Fig 13.4

  10. Evaluation Techniques • Group consensus • Benchmark tests • Cost/benefit analysis • Point evaluation Principles of Information Systems, Fifth Edition

  11. Fig 13.6 Avoid “scope creep”

  12. Systems Implementation

  13. Systems Implementation • Includes hardware acquisition, user preparation, hiring and training of personnel, site and data preparation, installation, testing, start-up, and user acceptance. Principles of Information Systems, Fifth Edition

  14. Make or Buy Software? • Externally developed software • Lower cost • Lower risk • Ease of installation • Internally developed software • Why? Principles of Information Systems, Fifth Edition

  15. System Testing • Unit testing • System testing • Volume testing • Integration testing • Acceptance testing Principles of Information Systems, Fifth Edition

  16. Fig 13.15

  17. Systems Maintenance

  18. Systems Maintenance • Checking, changing, and enhancing the system to make it more useful in achieving user and organizational goals. Principles of Information Systems, Fifth Edition

  19. Reasons for Maintenance • Changes in business processes • Requests from stakeholders, users, or managers • Errors in the program • Technical & hardware problems • Corporate mergers & acquisitions • Government regulations • Changes in the operating system or hardware Principles of Information Systems, Fifth Edition

  20. Types of maintenance • Slipstream upgrade • Patch • Release • Version Principles of Information Systems, Fifth Edition

  21. Fig 13.17

  22. Systems Review

  23. Final step in SDLC Compares results with objectives Problems & opportunities trigger new SDLC process May be event-driven Significant vs. Continuous and/or time-driven Systems Review Principles of Information Systems, Fifth Edition

  24. Mission Goals Hardware/ software Database Telecommunications IS personnel Control Training Costs Complexity Reliability Efficiency Response time Documentation Factors to Consider During Systems Review Principles of Information Systems, Fifth Edition

  25. Computer Waste & Mistakes

  26. Computer Waste • Discard technology • Unused systems • Personal use of corporate time & technology Principles of Information Systems, Fifth Edition

  27. Computer Crime

  28. Computers as Tools to Commit Crime • Social engineering • Dumpster diving • Password sniffing • Help on the Web Principles of Information Systems, Fifth Edition

  29. Computers as Objects of Crime • Illegal access and use • Hackers vs. crackers • Script bunnies Principles of Information Systems, Fifth Edition

  30. Data Alteration & Destruction • Virus • Application virus • System virus • Macro virus • Worm • Logic bomb • Virus hoaxes Principles of Information Systems, Fifth Edition

  31. Computers as Objects of Crime • Information and equipment theft • Software & Internet piracy • Computer-related scams Principles of Information Systems, Fifth Edition

  32. The Work Environment

  33. Health Concerns • Repetitive stress injury (RSI) • Carpal tunnel syndrome (CTS) • Ergonomics Principles of Information Systems, Fifth Edition

More Related