systems design implementation maintenance and review security privacy and ethics l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics PowerPoint Presentation
Download Presentation
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics

Loading in 2 Seconds...

play fullscreen
1 / 33

Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics - PowerPoint PPT Presentation


  • 146 Views
  • Uploaded on

Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics. Chapters 13 & 14. Systems Design. Systems Design. “How will the information system do what it must do to obtain a solution to a problem?”. Logical Design. Describes what the system must do

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics' - kynton


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
systems design implementation maintenance and review security privacy and ethics

Systems Design, Implementation, Maintenance, and ReviewSecurity, Privacy, and Ethics

Chapters 13 & 14

systems design3
Systems Design
  • “How will the information system do what it must do to obtain a solution to a problem?”

Principles of Information Systems,

Fifth Edition

logical design
Logical Design
  • Describes what the system must do
  • “Functional requirements”

Principles of Information Systems,

Fifth Edition

physical design
Physical Design
  • Describes the technology and other components needed to complete the logical design

Principles of Information Systems,

Fifth Edition

hardware backup
Hardware backup
  • Disaster recovery plans
  • Hot site
  • Cold site

Principles of Information Systems,

Fifth Edition

software database backup
Software & Database Backup
  • Selective backups
  • Incremental backups
  • Image log

Principles of Information Systems,

Fifth Edition

evaluation techniques
Evaluation Techniques
  • Group consensus
  • Benchmark tests
  • Cost/benefit analysis
  • Point evaluation

Principles of Information Systems,

Fifth Edition

fig 13 6
Fig 13.6

Avoid “scope creep”

systems implementation13
Systems Implementation
  • Includes hardware acquisition, user preparation, hiring and training of personnel, site and data preparation, installation, testing, start-up, and user acceptance.

Principles of Information Systems,

Fifth Edition

make or buy software
Make or Buy Software?
  • Externally developed software
    • Lower cost
    • Lower risk
    • Ease of installation
  • Internally developed software
    • Why?

Principles of Information Systems,

Fifth Edition

system testing
System Testing
  • Unit testing
  • System testing
  • Volume testing
  • Integration testing
  • Acceptance testing

Principles of Information Systems,

Fifth Edition

systems maintenance18
Systems Maintenance
  • Checking, changing, and enhancing the system to make it more useful in achieving user and organizational goals.

Principles of Information Systems,

Fifth Edition

reasons for maintenance
Reasons for Maintenance
  • Changes in business processes
  • Requests from stakeholders, users, or managers
  • Errors in the program
  • Technical & hardware problems
  • Corporate mergers & acquisitions
  • Government regulations
  • Changes in the operating system or hardware

Principles of Information Systems,

Fifth Edition

types of maintenance
Types of maintenance
  • Slipstream upgrade
  • Patch
  • Release
  • Version

Principles of Information Systems,

Fifth Edition

systems review23
Final step in SDLC

Compares results with objectives

Problems & opportunities trigger new SDLC process

May be event-driven

Significant vs. Continuous

and/or time-driven

Systems Review

Principles of Information Systems,

Fifth Edition

factors to consider during systems review
Mission

Goals

Hardware/ software

Database

Telecommunications

IS personnel

Control

Training

Costs

Complexity

Reliability

Efficiency

Response time

Documentation

Factors to Consider During Systems Review

Principles of Information Systems,

Fifth Edition

computer waste
Computer Waste
  • Discard technology
  • Unused systems
  • Personal use of corporate time & technology

Principles of Information Systems,

Fifth Edition

computers as tools to commit crime
Computers as Tools to Commit Crime
  • Social engineering
  • Dumpster diving
  • Password sniffing
  • Help on the Web

Principles of Information Systems,

Fifth Edition

computers as objects of crime
Computers as Objects of Crime
  • Illegal access and use
    • Hackers vs. crackers
    • Script bunnies

Principles of Information Systems,

Fifth Edition

data alteration destruction
Data Alteration & Destruction
  • Virus
    • Application virus
    • System virus
    • Macro virus
  • Worm
  • Logic bomb
  • Virus hoaxes

Principles of Information Systems,

Fifth Edition

computers as objects of crime31
Computers as Objects of Crime
  • Information and equipment theft
  • Software & Internet piracy
  • Computer-related scams

Principles of Information Systems,

Fifth Edition

health concerns
Health Concerns
  • Repetitive stress injury (RSI)
  • Carpal tunnel syndrome (CTS)
  • Ergonomics

Principles of Information Systems,

Fifth Edition