Escolar Documentos
Profissional Documentos
Cultura Documentos
Implementing
the Information
System
17
Learning Objectives
17-2
Implementation
The process of ensuring that the
Distributing processing
Training users
Converting from the old system
Evaluating the new system
Kendall &
17-3
Major Topics
Client/server computing
Network types
Groupware
Training
Security
Organizational metaphors
Evaluation
Kendall &
17-4
Implementing Distributed
Systems
Can be conceived of as an
application of telecommunications
17-5
Client/Server Technology
The client/server (C/S) model refers to a
17-6
Advantages and
Disadvantages of C/S
Model
Advantage - greater computer
17-7
Kendall &
17-8
Network Types
Wide area network (WAN)
Local area network (LAN)
Kendall &
17-9
fidelity
Can include encryption wired
equivalent privacy (WEP) for security
purposes
Comparatively cheap to set up
Serve as a flexible technology for
supporting work groups
Kendall &
17-10
Security
Signal integrity
WEP has many flaws, but used in
Kendall &
17-11
WiMax
Worldwide Interoperability for
Microwave Access
Also know as Mobile WiMax
Greater wireless access range (30
miles)
Kendall &
17-12
Bluetooth
Suitable for personal networks and
can include computers, printers,
handheld devices, phones,
keyboards, mice and household
appliances
Kendall &
17-13
Kendall &
17-14
Hierarchical
The host controls all other nodes
Computers on the same level do
Kendall &
17-15
Star
The central node communicates
Kendall &
17-16
Ring
There is no central computer
All the nodes are of equal
computing power
Each node communicates directly
with its neighbor
Kendall &
17-17
Bus
Work well in close quarters
A single central cable is used to
Kendall &
17-18
Network Modeling
Draw a network decomposition
17-19
Kendall &
17-20
Kendall &
17-21
Kendall &
17-22
Kendall &
17-23
Groupware
Software that supports people working
together in an organization
Can help group members to schedule
and attend meetings, share data,
create and analyze documents,
communicate in unstructured ways,
hold group conferences, do image
management, manage and monitor
workflow
Kendall &
17-24
Kendall &
17-25
Kendall &
17-26
Training
Who to train
People who train users
Training objectives
Training methods
Training sites
Training materials
Kendall &
17-27
Who to Train
All people who will have primary or
secondary use of the system
Ensure that users of different skill
levels and job interests are
separated
Kendall &
17-28
Kendall &
17-29
Kendall &
17-30
Conversion Strategies
Direct changeover
Parallel conversion
Gradual or Phased conversion
Modular prototype conversion
Distributed conversion
Kendall &
17-31
Kendall &
17-32
Direct Changeover
Advantage
Disadvantage
17-33
Parallel Conversion
Advantage
Disadvantage
Kendall &
17-34
Gradual Conversion
Advantage
Disadvantage
17-35
Modular Prototype
Conversion
Advantage
being used
Users are familiar with each module as it
becomes operational
Disadvantage
Kendall &
17-36
Distributed Conversion
Advantage
Disadvantage
Kendall &
17-37
Security Concerns
Physical security
Logical security
Behavioral security
Kendall &
17-38
Security Concerns
(Continued)
Physical security is securing the
17-39
Special Security
Considerations for
Ecommerce
Virus protection software
Email filtering products
URL filtering products
Firewalls, gateways, and virtual
private networks
Intrusion detection products
Kendall &
17-40
Special Security
Considerations for
Ecommerce (Continued)
Vulnerability management products
Security technologies such as
secure socket layering (SSL) for
authentication
Encryption technologies
Public key infrastructure (PKI) use
and obtaining a digital certificate
Kendall &
17-41
privacy
Only ask for information required
to complete the transaction
Make it optional for customers to
fill out personal information on the
Web site
Kendall &
17-42
Kendall &
17-43
managing a crisis
Eliminate single points of failure
Determine data replication
technologies that match the
organizations timetable
Create detailed relocation and
transportation plans
Kendall &
17-44
Kendall &
17-45
Identify Who Is
Responsible
Whether business operations will continue
How to support communications
Where people will be sent if the business is
uninhabitable
Where personnel will go in an emergency
Seeing to the personal and psychological
needs
Restoring the main computing and working
environments
Kendall &
17-46
Kendall &
17-47
Kendall &
17-48
Communication Channels
Email
Emergency information Web page
Emergency hotline
Emergency response agencies
Kendall &
17-49
Kendall &
17-50
Other Conversion
Considerations
Ordering equipment
Ordering any external materials
17-51
Kendall &
17-52
Evaluation Techniques
Cost-benefit analysis
Revised decision evaluation
approach
User involvement evaluations
The information system utility
approach
Kendall &
17-53
17-54
17-55
17-56
visited
Learn details about specific pages
on the site
Find out more about the Web sites
visitors
Kendall &
17-57
17-58
Summary
Implementation
Distributed systems
Client/server
17-59
Summary (Continued)
Security
Physical
Logical
Behavioral
Organizational metaphors
Evaluation
Kendall &
17-60