SlideShare una empresa de Scribd logo
1 de 30
Information
System
Implementation,
Change
Management And
Control.
Submitted By: -
Shruti Pendharkar
CONTENTS
1. Information system implementation
2. Change Management
3. Control in information system
Information System
Implementation
SYSTEM DEVELOPMENT LIFE CYCLE
(SDLC)
 Development of information system undergoes 5 stages,
System Maintenance
System Implementation
System Design
System Analysis
System Investigation
CONCEPT OF IMPLEMENTATION
 Implementation means constructing and putting the new system into
operation.
 Creation of system based on analysis and design document.
 Implementation refers to all of the organizational activities working
towards the ,
 Adoption,
 Management, and
 Routinization of an innovation.
 Implementation activities are needed to transform a newly developed IS
into an operational system for end users.
TYPES OF IMPLEMENTATION
Implementation
Fresh
Implementation
Replacement
Implementation
Modified
Implementation
IMPLEMENTATION PROCESS
 Implementation is a process of
 Coding,
 Testing,
 Installation,
 Documentation,
 Training, and
 Support.
 These steps are based on the design specification.
 All the requirements of the system, such as input,
processing, output equipment etc. are provided by design
specification.
Planning
Acquisition of
facilities and
space planning
MIS
Organization &
Procedure
Development
Acquisition of
Hardware &
Software
Coding
Testing
Creating Forms
& Database
Documentation User Training
Installation /
Conversion
PLANNING THE IMPLEMENTATION
 Pre-implementation activity.
 Activities required are
identified and sequenced
accordingly.
 Time and cost estimation
for each activities are being
made.
 Plan and implementation
schedule are being made by
system analyst using
various tools like Gantt
charts, network diagrams
etc.
ACQUISITIONS OF FACILITIES AND SPACE
PLANNING
 The IS to be implemented may be for,
 This requires acquisition of facilities like office, computer
room, computer library etc.
 Proper estimation of floor space requirement and roughs
layouts are to be prepared by MIS manager.
• Where no old system is in existence
• New systems are to be implemented
New
organization
• Information system needs to be
modified to great extent
• New system needs to be developed
Existing
organization
ACQUISITION OF HARDWARE & SOFTWARE
 Large business firms or government agencies
formalize there hardware and software requirements
by listing them in a document called RFP (Request for
proposal) or RFQ (Request for quotation).
Business
Firms
Vendor
RFQ
Purchase
Agreement
CODING & TESTING
 Physical design created by the system designer team are
turned into working computer code by the programming
team.
 Depending on the size and complexity of the system, coding
can be an involved, intensive activity.
 Immediately after coding process has begun, testing can be
started.
 System testing involves,
 Testing and debugging software,
 Testing Website performance, and
 Testing new hardware.
 It’s important part is, review of prototype of displays,
reports and other output.
DOCUMENTATION
 There are 2 types of documentation: -
System
Documentation
For maintenance
programmers or
technical persons
Detailed information about
system’s design
specification, it’s internal
working and its
functionality
User
Documentation
For Users
Consist of written or other
visual information about
an application system,
how it works and how to
use it.
USER TRAINING
 Educate and train management, end users, customers, and
other business stakeholder.
 Proper user training is an important factor in promoting the
required culture and thus ensuring the acceptance of new
system.
 METHODS AND AIDS OF TRAINING: -
Training
Programe
Seminars
User
Manuals
Help
Screens
INSTALLATION / CONVERSION
 Installation or changeover is the event of switch-over from
the old system to the new system, which takes place after
the system is tested and found reliable.
 In new organization, there are no old systems to
replace, so for fresh implementation, new developed and
tested systems are installed as it is.
 In existing organizations, old systems are replaced with
the new developed systems.
 So for replacement implementation, there are 4 conversion
methods.
CONVERSION METHODS
DIRECT CONVERSION
 Slam Dunk or Cold-turkey
strategy.
 Old system is completely
dropped out, and new system
is turned on in its place.
 Least expensive
 High risk of failure
 Should be considered only in
extreme circumstances.
PARALLEL CONVERSION
 Old system is not dropped out
at once, Both old and new
systems are simultaneously
operated.
 Until the end-users and project
coordinators are fully satisfied
that the new system is
functioning correctly.
 Highly expensive
 Least risky
Old System New System
Old System
New System
PILOT CONVERSION
 Modular Approach
 Use where the new system
is to be installed in multiple
locations.
 It allows for conversion to
the new system, either a
direct or parallel method, at
a single location.
 Less risky in terms of any
loss of time or delay in
processing.
PHASE-IN
CONVERSION
 Gradual Conversion or
Cutover by segments.
 The new system is
implemented in many
phase. Each phase is
carried out only after
successful implementation
of previous phase.
 Very less risk is involved.
 Prolonged process.
New SystemOld System
New SystemOld System
CHANGE MANAGEMENT
ORAGANIZATIONAL CHANGE
 Implementation of IS may result in many changes in
organizations.
 POTENTIAL AREAS OF IMPACT: -
 Organizational Structure
 Centralization of Authority
 Job Content
 Relationships
 Resistance to change
CONCEPT OF CHANGE MANAGEMENT
 Information system development and implementation
projects often tend to end in failure.
 changes are difficult to predict, and tend to occur with
growing frequency, change management is becoming an
increasingly significant subject.
 Change management involves analyzing and defining all
changes facing the organization, and developing programs
to reduce the risks and costs, and to maximize the benefits
of change.
 It is a structured, disciplined approach that facilitates the
adoption of new and modified of various groups and
individual within the system.
KEY DIMENSIONS OF CHANGE
MANAGEMENT
CHANGE MANAGEMENT PROCESS
 The change management process is the sequence of steps or
activities that a change management team or project leader
would follow to apply change management to a project or
change. a change management process that contains the
following three parts.:
 Preparing for change (Preparation, assessment and
strategy development)
 Managing change (Detailed planning and change
management implementation)
 Reinforcing change (Data gathering, corrective action and
recognition)
CONTROL IN INFORMATION
SYSTEM
CONTROL IN INFORMATION SYSTEM
 To ensure secure and efficient operation of information systems, an
organization institutes a set of procedures and technological measures
called controls.
 Implemented through: -
 Policies
 Procedures
 Standards
 Control must be thought about through all stages of information
systems analysis, construction and maintenance.
TYPES OF CONTROL
 Physical Controls: -
 It refer to the protection of computer facilities and other IS
resources. This includes protecting computer hardware,
computer software, database, computer networks.etc
 Technical Controls: -
 controls which are implemented in the application of IS itself.
These types of controls include access controls, data security
controls, communication controls etc.
 Administrative Controls: -
 controls which include clear guidelines, policies of the
organisations with regards to the use and deployment of IS
resources are very important in protecting ISs.
 For example: - email policy, internet use policy, access
privileges of employees,
 General Controls: -
 These controls are implemented so as to ensure that
ISs are protected from Various potential threats.
 For example: - system development controls like
budgeting, schedule, quality etc.
 Application Controls: -
 the application controls, as the name implies, are
embedded within the application itself. These controls
are usually written as validation rules. These controls
are popularly known as input controls, processing
controls, and output controls.
IS SECURITY THREATS
1. Human errors/failures: - unintentional errors made by
authorised user.
2. Manipulation of data/systems: - deliberate acts of some
persons or organisations, designed to harm the data or
information systems of an organisation.
3. Theft of data/systems: - deliberate attempt of some person to
steal the important data of an organisation.
4. Destruction from virus: - A Virus is computer code that has
been inserted into a piece of software. Upon execution of the
software the virus is also executed.
5. Natural disasters: - forces of nature that cannot be prevented
or controlled. Such as fire, flood, earthquake, Lightning etc.
IS STRATEGIES
1. Preventive strategy: - controls that would help prevent errors
from occurring, deter criminals from attacking the system, and
deny access to unauthorised people.
2. Detection strategy: - It may not be feasible to prevent the IS
systems from all hazards, cause it’ll only detect the threat.
3. Minimum losses strategy: - minimising of losses once a threat
has happened.
4. Recovery strategy: - A recovery plan, that explains how to fix a
damaged information system as quickly as possible, must be in
place.
5. Corrective action strategy: - The damaged system must be
corrected immediately so as to prevent the problem form
occurring again.
Information system implementation, change management and control

Más contenido relacionado

La actualidad más candente

Information System Development
Information System DevelopmentInformation System Development
Information System Development
IamPe Khamkhum
 
Mis system analysis and system design
Mis   system analysis and system designMis   system analysis and system design
Mis system analysis and system design
Rahul Hedau
 
Management information systems
Management information systemsManagement information systems
Management information systems
navin1
 
2 approaches to system development
2 approaches to system development2 approaches to system development
2 approaches to system development
cymark09
 
Information Technology in Controlling
Information Technology in ControllingInformation Technology in Controlling
Information Technology in Controlling
Avadhesh Solanki
 
Logical design vs physical design
Logical design vs physical designLogical design vs physical design
Logical design vs physical design
Md. Mahedi Mahfuj
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information system
Rohit Kumar
 

La actualidad más candente (20)

Information System Development
Information System DevelopmentInformation System Development
Information System Development
 
Mis system analysis and system design
Mis   system analysis and system designMis   system analysis and system design
Mis system analysis and system design
 
Management information systems
Management information systemsManagement information systems
Management information systems
 
Chapter 1 Enterprise Resource Planning Alexis Leon
Chapter 1 Enterprise Resource Planning   Alexis LeonChapter 1 Enterprise Resource Planning   Alexis Leon
Chapter 1 Enterprise Resource Planning Alexis Leon
 
Structure of mis
Structure of misStructure of mis
Structure of mis
 
Eis
EisEis
Eis
 
2 approaches to system development
2 approaches to system development2 approaches to system development
2 approaches to system development
 
Enterprise management systems
Enterprise management systems Enterprise management systems
Enterprise management systems
 
Management Information System ( MIS )
Management Information System ( MIS )Management Information System ( MIS )
Management Information System ( MIS )
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)
 
Types Of Information Systems
Types Of Information SystemsTypes Of Information Systems
Types Of Information Systems
 
Business Application (MIS)
Business Application (MIS)Business Application (MIS)
Business Application (MIS)
 
challanges of MIS system
challanges of MIS systemchallanges of MIS system
challanges of MIS system
 
Structure of MIS
Structure of MISStructure of MIS
Structure of MIS
 
Information Technology in Controlling
Information Technology in ControllingInformation Technology in Controlling
Information Technology in Controlling
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
Logical design vs physical design
Logical design vs physical designLogical design vs physical design
Logical design vs physical design
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information system
 
Decision making and mis
Decision making and misDecision making and mis
Decision making and mis
 

Similar a Information system implementation, change management and control

Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
joellemurphey
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
LynellBull52
 
Information Systems Life Cycle
Information Systems Life CycleInformation Systems Life Cycle
Information Systems Life Cycle
4goggas
 
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
kndnewguade
 
Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014
Md Imran
 
1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat
BenitoSumpter862
 
1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat
SantosConleyha
 
System development life cycle
System development life cycleSystem development life cycle
System development life cycle
nayriehl
 

Similar a Information system implementation, change management and control (20)

CHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptxCHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptx
 
SAD_SDLC.pptx
SAD_SDLC.pptxSAD_SDLC.pptx
SAD_SDLC.pptx
 
Sdlc1
Sdlc1Sdlc1
Sdlc1
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
 
Information system
Information systemInformation system
Information system
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
Presentation2
Presentation2Presentation2
Presentation2
 
Planning, design and implementation of information systems
Planning, design and implementation of information systemsPlanning, design and implementation of information systems
Planning, design and implementation of information systems
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
Information System (IS) life cycle.pptx
Information System (IS) life cycle.pptxInformation System (IS) life cycle.pptx
Information System (IS) life cycle.pptx
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for Security
 
Gr 6 sdlc models
Gr 6   sdlc modelsGr 6   sdlc models
Gr 6 sdlc models
 
Information Systems Life Cycle
Information Systems Life CycleInformation Systems Life Cycle
Information Systems Life Cycle
 
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
 
Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014
 
Sdlc
SdlcSdlc
Sdlc
 
1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat
 
1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat
 
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
 
System development life cycle
System development life cycleSystem development life cycle
System development life cycle
 

Más de Shruti Pendharkar (11)

case study: - taking over dad's business
case study: - taking over dad's businesscase study: - taking over dad's business
case study: - taking over dad's business
 
Computer generation and language translator
Computer generation and language translatorComputer generation and language translator
Computer generation and language translator
 
Brand Personality
Brand PersonalityBrand Personality
Brand Personality
 
Organizational Behavior : Learning
Organizational Behavior : Learning Organizational Behavior : Learning
Organizational Behavior : Learning
 
Case Study: Soybean milk - As an alternative
Case Study: Soybean milk - As an alternativeCase Study: Soybean milk - As an alternative
Case Study: Soybean milk - As an alternative
 
Psychographics
PsychographicsPsychographics
Psychographics
 
Downsizing, rightsizing, smartsizing
Downsizing, rightsizing, smartsizingDownsizing, rightsizing, smartsizing
Downsizing, rightsizing, smartsizing
 
Consumer credit
Consumer creditConsumer credit
Consumer credit
 
Stock prices as economic indiactor
Stock prices as economic indiactorStock prices as economic indiactor
Stock prices as economic indiactor
 
Project management and control
Project management and controlProject management and control
Project management and control
 
Business law company act 1956
Business law company act 1956Business law company act 1956
Business law company act 1956
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Information system implementation, change management and control

  • 2. CONTENTS 1. Information system implementation 2. Change Management 3. Control in information system
  • 4. SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)  Development of information system undergoes 5 stages, System Maintenance System Implementation System Design System Analysis System Investigation
  • 5. CONCEPT OF IMPLEMENTATION  Implementation means constructing and putting the new system into operation.  Creation of system based on analysis and design document.  Implementation refers to all of the organizational activities working towards the ,  Adoption,  Management, and  Routinization of an innovation.  Implementation activities are needed to transform a newly developed IS into an operational system for end users.
  • 7. IMPLEMENTATION PROCESS  Implementation is a process of  Coding,  Testing,  Installation,  Documentation,  Training, and  Support.  These steps are based on the design specification.  All the requirements of the system, such as input, processing, output equipment etc. are provided by design specification.
  • 8. Planning Acquisition of facilities and space planning MIS Organization & Procedure Development Acquisition of Hardware & Software Coding Testing Creating Forms & Database Documentation User Training Installation / Conversion
  • 9. PLANNING THE IMPLEMENTATION  Pre-implementation activity.  Activities required are identified and sequenced accordingly.  Time and cost estimation for each activities are being made.  Plan and implementation schedule are being made by system analyst using various tools like Gantt charts, network diagrams etc.
  • 10. ACQUISITIONS OF FACILITIES AND SPACE PLANNING  The IS to be implemented may be for,  This requires acquisition of facilities like office, computer room, computer library etc.  Proper estimation of floor space requirement and roughs layouts are to be prepared by MIS manager. • Where no old system is in existence • New systems are to be implemented New organization • Information system needs to be modified to great extent • New system needs to be developed Existing organization
  • 11. ACQUISITION OF HARDWARE & SOFTWARE  Large business firms or government agencies formalize there hardware and software requirements by listing them in a document called RFP (Request for proposal) or RFQ (Request for quotation). Business Firms Vendor RFQ Purchase Agreement
  • 12. CODING & TESTING  Physical design created by the system designer team are turned into working computer code by the programming team.  Depending on the size and complexity of the system, coding can be an involved, intensive activity.  Immediately after coding process has begun, testing can be started.  System testing involves,  Testing and debugging software,  Testing Website performance, and  Testing new hardware.  It’s important part is, review of prototype of displays, reports and other output.
  • 13. DOCUMENTATION  There are 2 types of documentation: - System Documentation For maintenance programmers or technical persons Detailed information about system’s design specification, it’s internal working and its functionality User Documentation For Users Consist of written or other visual information about an application system, how it works and how to use it.
  • 14. USER TRAINING  Educate and train management, end users, customers, and other business stakeholder.  Proper user training is an important factor in promoting the required culture and thus ensuring the acceptance of new system.  METHODS AND AIDS OF TRAINING: - Training Programe Seminars User Manuals Help Screens
  • 15. INSTALLATION / CONVERSION  Installation or changeover is the event of switch-over from the old system to the new system, which takes place after the system is tested and found reliable.  In new organization, there are no old systems to replace, so for fresh implementation, new developed and tested systems are installed as it is.  In existing organizations, old systems are replaced with the new developed systems.  So for replacement implementation, there are 4 conversion methods.
  • 16. CONVERSION METHODS DIRECT CONVERSION  Slam Dunk or Cold-turkey strategy.  Old system is completely dropped out, and new system is turned on in its place.  Least expensive  High risk of failure  Should be considered only in extreme circumstances. PARALLEL CONVERSION  Old system is not dropped out at once, Both old and new systems are simultaneously operated.  Until the end-users and project coordinators are fully satisfied that the new system is functioning correctly.  Highly expensive  Least risky Old System New System Old System New System
  • 17. PILOT CONVERSION  Modular Approach  Use where the new system is to be installed in multiple locations.  It allows for conversion to the new system, either a direct or parallel method, at a single location.  Less risky in terms of any loss of time or delay in processing. PHASE-IN CONVERSION  Gradual Conversion or Cutover by segments.  The new system is implemented in many phase. Each phase is carried out only after successful implementation of previous phase.  Very less risk is involved.  Prolonged process. New SystemOld System New SystemOld System
  • 19. ORAGANIZATIONAL CHANGE  Implementation of IS may result in many changes in organizations.  POTENTIAL AREAS OF IMPACT: -  Organizational Structure  Centralization of Authority  Job Content  Relationships  Resistance to change
  • 20. CONCEPT OF CHANGE MANAGEMENT  Information system development and implementation projects often tend to end in failure.  changes are difficult to predict, and tend to occur with growing frequency, change management is becoming an increasingly significant subject.  Change management involves analyzing and defining all changes facing the organization, and developing programs to reduce the risks and costs, and to maximize the benefits of change.  It is a structured, disciplined approach that facilitates the adoption of new and modified of various groups and individual within the system.
  • 21. KEY DIMENSIONS OF CHANGE MANAGEMENT
  • 22. CHANGE MANAGEMENT PROCESS  The change management process is the sequence of steps or activities that a change management team or project leader would follow to apply change management to a project or change. a change management process that contains the following three parts.:  Preparing for change (Preparation, assessment and strategy development)  Managing change (Detailed planning and change management implementation)  Reinforcing change (Data gathering, corrective action and recognition)
  • 23.
  • 25. CONTROL IN INFORMATION SYSTEM  To ensure secure and efficient operation of information systems, an organization institutes a set of procedures and technological measures called controls.  Implemented through: -  Policies  Procedures  Standards  Control must be thought about through all stages of information systems analysis, construction and maintenance.
  • 26. TYPES OF CONTROL  Physical Controls: -  It refer to the protection of computer facilities and other IS resources. This includes protecting computer hardware, computer software, database, computer networks.etc  Technical Controls: -  controls which are implemented in the application of IS itself. These types of controls include access controls, data security controls, communication controls etc.  Administrative Controls: -  controls which include clear guidelines, policies of the organisations with regards to the use and deployment of IS resources are very important in protecting ISs.  For example: - email policy, internet use policy, access privileges of employees,
  • 27.  General Controls: -  These controls are implemented so as to ensure that ISs are protected from Various potential threats.  For example: - system development controls like budgeting, schedule, quality etc.  Application Controls: -  the application controls, as the name implies, are embedded within the application itself. These controls are usually written as validation rules. These controls are popularly known as input controls, processing controls, and output controls.
  • 28. IS SECURITY THREATS 1. Human errors/failures: - unintentional errors made by authorised user. 2. Manipulation of data/systems: - deliberate acts of some persons or organisations, designed to harm the data or information systems of an organisation. 3. Theft of data/systems: - deliberate attempt of some person to steal the important data of an organisation. 4. Destruction from virus: - A Virus is computer code that has been inserted into a piece of software. Upon execution of the software the virus is also executed. 5. Natural disasters: - forces of nature that cannot be prevented or controlled. Such as fire, flood, earthquake, Lightning etc.
  • 29. IS STRATEGIES 1. Preventive strategy: - controls that would help prevent errors from occurring, deter criminals from attacking the system, and deny access to unauthorised people. 2. Detection strategy: - It may not be feasible to prevent the IS systems from all hazards, cause it’ll only detect the threat. 3. Minimum losses strategy: - minimising of losses once a threat has happened. 4. Recovery strategy: - A recovery plan, that explains how to fix a damaged information system as quickly as possible, must be in place. 5. Corrective action strategy: - The damaged system must be corrected immediately so as to prevent the problem form occurring again.