Professional Documents
Culture Documents
Topic 5.2 - System Implementation and Support
Topic 5.2 - System Implementation and Support
TOPIC 5
SYSTEM IMPLEMENTATION
AND SUPPORT
LEARNING OUTCOMES
Program Documentation
System Documentation
Operations Documentation
User Documentation
Systems analysts usually are responsible for preparing
documentation to help users learn the system
22
5.2.3 Differentiate between program, system,
operations, and user documentation.
Program documentation describes the inputs, outputs, and
processing logic for all program modules.
26
5.3 Explain System Implementation
28
5.3.1 List the main steps in system implementation.
The new system now is ready to go to work. Now, you will carry out the
remaining steps in systems implementation:
1. Prepare a separate operational and test environment
29
5.3.2 System Installation And Evaluation
Vendor Training - Many hardware and software vendors offer training programs free or at a
nominal cost for the products they sell. The training usually is conducted at the vendor’s site
by experienced trainers who provide valuable hands-on experience. Vendor training often
gives the best return on your training dollars because it is focused on products that the
vendor developed. Many vendors offer Web-based training options, including Webinars,
podcasts, and tutorials.
In-house Training - The IT staff and user departments often share responsibility for
developing and conducting training programs for internally developed software. If your
organization has a help desk, the staff might be able to handle internally user training.
5.3.2 System Installation And Evaluation
3. Data Conversion
Data conversion is an important part of the system installation process. During data conversion,
existing data is loaded into the new system.
Data Conversion Strategy - When a new system replaces an existing system, you should automate
the data conversion process, if possible.
The old system might be capable of exporting data in an acceptable format for the new system or in
a standard format. If a standard format is not available, you must develop a program to extract the
data and convert it to an acceptable format.
Data Conversion
41
5.3.2 System Installation And Evaluation
3. System Changeover
System changeover is the process of putting the new information
system online and retiring the old system.
Changeover can be rapid or slow, depending on the method. The
four changeover methods are :
1. direct cutover
2. parallel operation
3. pilot operation
4. phased operation
System Changeover
34
System Changeover
Direct Cutover
Involves risk than other
changeover methods
more
Companies often choose the direct
cutover method for implementing
commercial software packages
Cyclical information systems
usually are converted using the
direct cutover method at the
beginning of a quarter,
calendar year, or fiscal year
35
System Changeover
Parallel Operation
– Easier to verify the new system is
that
working under parallel operation
than under direct cutover
properly
– Running both systems might place a burden
on the operating environment and
processing
cause
delay
– Is not practical if the old and new systems are
incompatible technically
– Also is inappropriate when the two systems
perform different functions
36
System Changeover
Pilot Operation
The group that uses the new system first is
called the pilot site
The old system continues to operate for the
entire organization
After the system proves successful at the
pilot site, it is implemented in the rest of
the organization, usually using the direct
cutover method
Is a combination of parallel operation and
direct cutover methods
37
System Changeover
Phased Operation
You give a part of the system to all users
The risk of errors or failures is limited to the
implemented module only
Is less expensive than full parallel operation
Is not possible, however, if the system cannot
be separated easily into logical modules or
segments
38
System Changeover summary
risk vs cost
39
5.3.2 System Installation And Evaluation
4. Post-implementation Evaluation
A post-implementation evaluation assesses the overall quality of the information system.
The evaluation verifies that the new system meets specified requirements, complies with
user objectives, and produces the anticipated benefits.
2.system performance
3.security requirements
5.4.2 Identify user support:
Help Desks
User Training To make data more accessible and to empower users,
many IT departments create help desks.
New employees must be trained on the
company’s information systems.
A help desk is a centralized resource staffed by IT
The main objective is to show users how professionals who provide users with the support they
the system can help them perform their need to do their jobs.
jobs. A help desk has three main objectives:
The training could include online support 1.Show people how to use system resources
via e-mail, a special Web site, a revision to more effectively
the user guide, a training manual 2.Provide answers to technical or operational questions
supplement, or formal training sessions. 3.Make users more productive by teaching them how to
meet their own information needs
Many CASE tools include system evaluation and maintenance features, including the following
examples:
Performance monitor that provides data on program execution times
Program analyzer that scans source code, provides data element cross-reference
information, and helps evaluate the impact of a program change
Interactive debugging analyzer that locates the source of a programming error
Reengineering tools
Automated documentation
Network activity monitor
Workload forecasting tool
5.4.5 Explain the system security and backup
BACKUP AND RECOVERY
Every system must provide for data backup and recovery.
Backup refers to copying data at prescribed intervals, or continuously.
Recovery involves restoring the data and restarting the system after an interruption.
An overall backup and recovery plan that prepares for a potential disaster is called a
disaster recovery plan.
BACKUP TYPES
Backups can be full, differential, incremental, or continuous.
BACKUP POLICIES
The cornerstone of business data protection is a backup policy, which contains detailed instructions and
procedures.
An effective backup policy can help a firm continue business operations and survive a catastrophe.
The backup policy should specify backup media, backup types, and retention periods.
5.4.5 Explain the system security and backup
49
5.4.5 Explain the system security and backup
To provide system security, you must consider six separate but interrelated
levels:
physical security,
network security,
application security,
file security,
user security, and
procedural security.
Like the chain shown in Figure 12-26, system security is only as strong as the
weakest link.
5.4.6 Identify three elements of system security
Security is a vital part of every computer system
Integrity
Availability
51
5.4.6 Identify three elements of system security
System Security Elements
The CIA triangle in Figure 12-20 shows the three main
elements of system security: confidentiality, integrity, and
availability.
Confidentiality protects information from
unauthorized disclosure and safeguards privacy.
Integrity prevents unauthorized users from creating,
modifying, or deleting information.
Availability ensures that authorized users have timely
and reliable access to necessary information.
SUMMAR
Y
The systems implementation phase consists of application development, testing, installation,
and evaluation of the new system
In addition to system documentation, analysts and technical writers also prepare operations
documentation and user documentation
During the installation process, you establish an operational, or production, environment for
the new information system that is completely separate from the test environment.
Everyone who interacts with the new information system should receive training appropriate
to his or her role and skills.
Data conversion often is necessary when installing a new information system. When a new
system replaces a computerized system, you should automate the data conversion process if
possible.
System changeover is the process of putting the new system into operation.
A post-implementation evaluation assesses and reports on the quality of the new system and
the work done by the project team.
The final report to management includes the final system documentation, describes any
future system enhancements that already have been identified, and details the project costs.
The report represents the end of the development effort and the beginning of the new
system’s operational life.