Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 5 : SYSTEM IMPLEMENTATION AND SUPPORT - Coggle Diagram
CHAPTER 5 : SYSTEM IMPLEMENTATION AND SUPPORT
5.3 SYSTEM IMPLEMENTATION
2 TYPES OF SYSTEM IMPLEMENTATION
System Implementation
Definition
Managing systems implementation involves
application development
testing
data conversion
training
documentation
system changeover
post-implementation
evaluation of the results
System Installation & Evaluation
Definition
The new system now is ready to go to work.
5 steps in systems implementation*
Prepare a separate operational and test
environment
Provide training for users, managers, and IT
staff
Perform data conversion and system
changeover
Carry out post-implementation evaluation of
the system
Present a final report to management
5 types System Installation & Evalutation
1.Operational & test environment
Definition
A separate test environment is necessary to
maintain system security and integrity and
protect the operational environment.
Access to the operational environment is limited
to users and must strictly be controlled.
Example :
2. Training
Definition
A successful information system requires training
for users, managers, and IT staff members
7 types of Training
Webinars, Podcasts, and Tutorials
Outside Training Resources
Vendor Training
Training Tips
Training plan
Example:
Interactive Training
Video tutorials
3. Data conversion
Definition:
During data conversion, existing data is loaded
into the new system.
It is essential that the new system be loaded
with accurate, error-free data
Often requires additional data items, which
might require manual entry
System Installation & Evaluation
4. System changeove
r
Definition
Direct cutover is similar to throwing a switch that
instantly changes over from the old system to the new
Example
4 types of System changeover
Parallel Operation
Pilot Operation
Direct Cutover
Phased Operation
Example:
5. Post-implementation task
Perform 2 additional tasks
Prepare a post-implementation evaluation
Deliver a final report to management.
2 types of Post-implementation task
Post-Implementation Evaluation
Definition:
A post-implementation evaluation should
examine all aspects of the development effort
and the end product — the developed
information system
Final Report to Management
5 points report should include:
Final versions of all system documentation
Planned modifications and enhancements to the
system that have been identified
Recap of all systems development costs and
schedules
Comparison of actual costs and schedules to the
original estimates
Post-implementation evaluation, if it has been
performed
Marks the end of systems development work
5.4 SYSTEM SUPPORT & SECURITY
1.System Support & Security Phase
3 main concerns:
system performance
security requirements
user expectations
Definition
Managing systems support and security
2. User Support
Definition
Companies provide user support in many forms,
including user training and a help desk to provide
technical support and assistance.
User Training
User Training Package.
Training users about system changes
is similar to initial training.
The main objective is to show users how the system can help them perform their jobs.
5.4 SYSTEM SUPPORT & SECURITY
4. Help Desks
Definition:
A help desk is a centralized resource staffed by IT professionals who provide
users with the support they need to do their jobs
can boost its productivity by using remote control software,
which allows IT staff to take over a user’s workstation and provide support
and troubleshooting
three main objectives
Provide answers to technical or operational questions
Make users more productive by teaching them how to meet their own
information needs
. Show people how to use system resources more effectively
5. Types Of Maintenance
2 types of maintenance
Changing programs, procedures, or documentation
to ensure correct system performance
Adapting the system to changing requirements; and
making the system operate more efficiently
Example :
6. System Maintenance Tools
5 System Maintenance Tools
Interactive debugging analyzer that locates the source of a programming error
Reengineering tools
Automated documentation
Network activity monitor
Workload forecasting tool
Definition
Program analyzer that scans source code, provides data element cross-reference
information, and helps evaluate the impact of a program change
7. System Security
Definition:
System security refers to protecting the system from theft,
unauthorized access and changes, and accidental or accidental harm
System integrity is concerned with the quality and reliability of raw
as well as processed data in the system
Example:
BACKUP AND RECOVERY
Definition :
Backup refers to copying data at prescribed intervals, or continuously.
Recovery involves restoring the data and restarting the system after an
interruption.
Example :