INFO_3_Revision_Guide - The Parker E

Report
Mobile Computing
(discussion points):
Security issues
Funding and Finance
Bandwidth
Mobile Broadband
Processing power
Issues with printing
Compatibility (redesigning
interfaces/web pages)
Mobile operating systems
Management issues
Nano technology
Teleworking
Battery life
Software compatibility
Training
Storage space
Portability
Social implications
Legal implications
Environment implications
You need to be able to discuss how
ICT has changed the way
organisations are run. You need to
be able to use examples and discuss
what future developments mean for
organisations
Discussion points for questions based
around the developments:
Mobile computing
Difficulty in future proofing
Cost implications
More complex tasks can be carried out
Software and hardware compatibility
Dependency
Security issues
Job Security
Green Issues
Disaster recovery
Access (does everyone have it?)
Portability of devices
Increased globalisation
More efficient/productive
Spam
Expert Systems and AI
Past Paper Questions:
“ICT has developed rapidly over the last 20 years. Discuss the impact of
developments in ICT on the way organisations are run in 21st century”
“The rapid increase in the speed of broadband communications has changed the
way in which we live our lives and do business. Discuss the impact of the increase in
the speed of communication on business and society
“For most business applications mobile computing is a dream not a reality” Discuss
this statement
Strategic
responsible for decision making and long-term planning and as such the information required would be at a
summary level of detail; their information needs would include details of: organisation and rival company
performance, accounting and financial information, technological developments with their potential effects
on the organisation, and the impact or forecast of any decisions made at strategic level.
The majority of this information will be supplied by a management information system (MIS)
Tactical
Consists of middle management who are, for example in charge of one particular department or area of a
business. Obviously they have an input into decision making & planning and they will need their
information in sufficient detail to complete their tactical role. This will include detailed requirements of
senior management, the department resources allocated and associated budgetary provision, summary
reports on department and subordinate staff performance and, finally, reports on the availability of
products and services needed by the operation staff.
Operational
are most likely to have little impact on decision making as they are mainly responsible for the day-today planning and running of the production side of the business. To operate effectively they need
very detailed instructions from the tactical management regarding the operational requirements for
the organisation. They also need information about the day-to-day tasks that need to be carried
out, such as what needs to be produced, dispatched and ordered on a daily basis. In some cases
they will be responsible for their own performance and so will need data to analyse their
effectiveness.
Back Office System
Legacy systems are
computer systems or
application programs which
continue to be used even
though more modern versions
exist; this is often due to the
high cost of replacement of
the system.
Back office systems are in
place to take care of the
administration processes of
a business. A typical back
office system is an
automated set of processes
run by a software
application on the company
computer network, for
example, an accounting
package which will: Record
sales transactions
Transaction
Processing System
Batch processing
System
Legacy System
A Transaction Processing
System, monitors
transactions; the normal
series of events for a
transaction is that data is
collected and entered into
the system, where processing
takes places and the
resultant information is
output.
Batch processing is
execution of a series of
programs on a computer
without human interaction,
such as the calculation of
Electricity Bills.
By way of contrast online
or interactive programs
which prompt the user for
inputs.
E-Commerce System
E-commerce consists of the
buying and selling of
products or services using
the internet and the volume
of e-commerce or online
trading has grown amazingly
with the popularity of the
internet.
An online system is
basically a web-based
storefront where your
customers can browse and
purchase products.
EDMS
An electronic document
management system
(EDMS) is a computer
system which is used to track
and store electronic
documents and/or images of
paper documents
You need to
be aware of
the different
type s of ICT
systems
You need to
be aware of
the different
type s of ICT
systems
Management Information Systems (MIS)
Management information systems are used by
managers at all levels of an organisation to assist
them in carrying out their responsibilities by:
monitoring performance, making decisions and
controlling company activities. Management
Information System (MIS) is a common term for
the computer systems in an organisation that
supply information about its business operation;
data for this process is obtained from internal and
external sources and the resultant information is
output in an suitable form for the use of business
management.
MIS in school = SIMS
Operational
Data Processing Systems
Tactical
Information Systems
Strategic
Management Information
Systems
Decision Support Systems (DSS)
Decision Support Systems
(DSS) are, as the name
suggests, an information system
that supports business and
organisational decision-making
activities. The main characteristic
of a DSS that it is an interactive
system intended to help decision
makers compile useful information
from raw internal and external
data, and to model ‘what if’
situations to predict the outcome
from a particular decision.
Carry out repetitive low level tasks on a day
to day basis. E.g. an electronic point of sale
display system (EPOS)
Summarise data for middle managers to
allow them to make medium term decisions
Help Senior management to make long term
decisions
An ICT strategy sets out a long terms vision for an organisation on
how they will make best use of the ICT available to them.
Factors influencing an ICT Strategy:
 Business goals
 Available finance
 Legacy systems
 Geography of clients
 Business fulfilment
 External factors: compliance with external
organisations and relevant legislation
 Emerging Technologies
Eventually technology
becomes obsolete and
needs to be replaced.
The life span is short
An organisation that
acquires cutting-edge
technology may gain an
advantage over its
competitors. Buying it
at an early stage will be
more expensive. It may
make more sense to buy
it at the maturity stage
as costs come down and
more support will be
available, with bugs
fixed.
A large organisation is likely to have a
CIO as a member of the company's
board at strategic level.
They are in charge of the ICT
resources and information services
They make all t he strategic ICT
related decisions
Chief Information Officers (CIO)
job involves:
Being responsible for the
technological direction of the
organisation
Responsible for ICT budgets
and projects
Making decisions regarding
staff training
Decisions about purchase of
hardware and software
Overall ICT leadership
Information Security
An ICT policy are agreed ways of
doing something that are put into place
to protect the best interests of the
organisation
ICT systems are vulnerable to all sorts of threats both
internal and external, so security policies are put in place
to reduce these threats and ensure all staff are able to
make the best use of the ICT resources.
Its needed:
To prevent misuse from occurring
To enable any misuse that did occur to be detected and
investigated
To lay down procedures that should prevent misuse
To establish disciplinary procedures to be used when an
employee has been found committing an act of abuse
You need to know what would be covered in an ICT
security policy
An organisation needs to have an ICT training strategy to
ensure that each employee has the skills necessary to carry
out their job
ICT policies are put in place so that
staff adopt sensible and legal
procedures for the use of ICT within
their area of work.
Policies
Most Organisations have
policies covering the
following:
Security
Procurement
Training
Procuring means acquiring – an
ICT procurement policy is
about the ways in which ICT
hardware, software,
consumables and services are
purchased.
There are many
variations to t he
SLC. These are
generally the main
stages
Preliminary
Study
Review and
Maintenance
Feasibility
Study
Installation
and
Conversion
You need to know
what takes place at
each of these stages
Analysis
Testing
Design
Constructing
the Solution
System Life Cycle
2. Feasibility
Study
3. Analysis
4. Design
7. Installation
and
Conversion 8. Review and
5. Constructing
Determines
the Solution
how the new
This study
system will be
6. Testing
Maintenance
This is the
looks at the
Hardware is
implemented.
stage
where
existing and
Checking that installed, staff Once the new
Breaking down
1. Preliminary
the system is
possible
the system
are trained and system is in full
the problems
produced by
alternatives.
works
by
Study
files are
into smaller
operation it is
the
Considers five
carrying out
converted to
sub-problems.
monitored to
development of
factors:
tests and
the new
These include
check
it meets
programs or
Investigation
comparing
them
system.
4
layout
plans
and
T - Technical
the originals
customisation
techniques:
This is a brief
to the
changeover
test plans.
specification.
E - Economic
of software
Interviews,
study to look at
expected
Clear time
methods:
Changes that
packages.
Questionnaires
whether or not
results.
L - legal
direct, parallel,
scales are
need to me
Hardware is
Observations,
a new system is
phased
and
needed
to
made are know
O - Operational
See Testing
also installed.
Document
needed.
pilot
prevent the
as
maintenance.
Sheet
for
Work must be
analysis
S - Schedule
project from
See
Testing
See
monitored to
From the
over-running. A
Maintenance
Methods
Conversions
ensure time
findings a a set
schedule is
Sheet
Sheet for
scales are
of deliverables
usually put
more info
followed.
is agreed with
together at
the users
this stage
Involves finding
out about the
current system
and
investigating
the
requirements
of the users
Deliverables: Are a set of items promised under contract. Agree the content if the new system and prevents arguments later.
Questionnaires
Questionnaires are a valuable
method of information collection,
where the opinion of many people
is required for a range of set
questions. The analysis of
questionnaires is straightforward
where the answers are multichoice or predefined, but seldom
give the depth of information that
can be obtained form an openended interview.
Observation
Document
Analysis
Interviews
Interviews are a useful method and they can be
either structured (where the questions have been
determined in advance) or open-ended (where new
questions are decided on based on the response to
previous questions). A method of recording
answers is needed, such as tape recording so that
the final results can be input for analysis by an audio
typist. It is possible that several interviews will take
place across a range of staff, including users and
senior managers.
Investigation
Observation of the use of the
current system can yield a lot
of information about its good
and bad points; this is an ideal
method to get the systems
analyst up to speed on
current system performance.
Inspection of Documentation is an
essential part of the process as user
manuals and procedures help the
systems analyst discover the intended
way the existing system operates and
may highlight any inadequacies in it.
Show the
movement of data
through the whole
organisation.
Symbols
Process
External
Entity
Data Store
Data Flow
Drawing a Context (level 0)DFD
Step 1: Read the Scenario
Step 2: Draw your system as a single process box in the
middle.
Step 3: Identify your external entities
Step 4: Add you data flows in.
Drawing a Level 1 DFD
Step 1: You need to break down your single process
box into the different tasks that it carries out and place
them in separate process boxes.
Step 2: Identify which data stores your will need
Step 3: Add you data flows to and from the data stores
Rules
A data store should have at least one arrow going into it and one
leading from it as data is being written to it and read from it.
Data cannot flow directly from a data store to an external entity
Entity: An object of the real world
that is relevant to an ICT system,
e.g. a place, object, person,
customer, invoice, product, course,
etc
Relationships
Points to Remember
A relationship is the way in which entities in a
system are related to one another.
A
A
A
(1:1)
(1:m)
(m:m)
Use capitals for
entity names
B
B
Entity names should
be singular. E.g.
COURSE not
COURSES
Crows feet on the
many side
B
Many - Many
If you have a many to many relationship
these cannot be implemented as there will
be repeating groups in the entities. A
database cannot be implemented. You need
to introduce a link entity which lies in
between the 2 original entities.
Label the
relationship
m:m would be
re-drawn as:
A
B
C
• Each
module(or
part of the
system is
tested)
Module Testing
Functional testing
• Sometimes called
black “box testing”
– in which it is
checked that the
outputs are
correct for the
given inputs
• Sometimes called
“alpha testing” – in
which the
developers test the
system as a whole
to make sure it
meets the
specified
requirements
System Testing
User Testing
• Sometimes called
“beta testing” – in
which potential
users test the new
software on their
own computers
using real data.
in which
software is
tested in its
normal
operating
environment
•
Operational
Testing
Why is Beta Testing Used?
Is used often to test a new piece of commercial software before it goes on sale. The company
provides the software free of charge to selected users outside the company who will test the
new software. Beta tester gets to use the software for free and it may be rewarding to be
involved in this process
Scalability Testing
Ensures that the
software can be used
with a variety of
hardware specifications
and operating systems.
For example browser
software that can work
in both vista and XP.
Test that the system will
still perform as required
even if the system has to
deal with an increased
workload such as
increased users, large
number of transactions
and files
Simulated Environments
Volume testing
Prototyping
Means producing a
scaled-down, simple
version of the software
which is used to show
how the new system will
work. The prototype
can be constructed and
tested in a short time
Test that the new
system works with large
volumes of data. After a
long period of use, data
files may become very
large. Volume testing
tests that this does not
affect the performance
of the software
Multiplatform testing
Test Harness
is a collection of software
and test data configures
to perform specific tests
in a module of a program
by running it under
different conditions,
comparing actual outputs
to expected outputs
With various inputs and
outputs can be used to
test software in as
realistic environment as
possible
It is necessary to carefully plan the
changeover from the old to the new
system and it is first necessary to ensure
that users are adequately trained, user
support is in place and all files needed for
the process have been converted.
4 Methods: Direct, Parallel, Phased, Pilot
In Direct conversion the original system is switched
off and the new system started on the same day at a
pre-arranged time.
Although this changeover takes the least time, it is
the most risky approach as it is difficult to revert to
using the old system again if there are problems;
consequently direct conversion is not recommended
where continuity of service is critical.
Using a Phased conversion is less risky than a direct
conversion as there is a period when both systems are
operating, which allows for an easy reversion to the
original system where problems take place. This
strategy has additional costs, as both systems have
to be operated and synchronised to ensure they are
both up to date. The amount of overlap of the two
systems makes the conversion a moderate risk.
Original
System
switched off
New System
goes live
Original System
operates
New System comes
online
It is necessary to carefully plan the
changeover from the old to the new
system and it is first necessary to ensure
that users are adequately trained, user
support is in place and all files needed for
the process have been converted.
4 Methods: Direct, Parallel, Phased, Pilot
Original System
operates
This is where a suitable part of the organisation is
chosen to conduct a pilot study (often called a
prototype) and to transfer to the new system. The old
system continues to be used throughout the rest of the
organisation. As the results of the initial pilot study are
analysed more pilot studies take place throughout the
organisation. Although this is a time-consuming process
the risks of failure are minimised and problems or bugs
within the new system are fixed as they occur and prior
to extending the use of the new system.
Pilot Conversion in one
part of company
Pilot Conversion in
other part of
company
Original System
operating
In this case the new system is run in parallel with the
old system. The outputs from both systems are
compared and the old system operated until such time
as the new system is deemed to be reliable. In this
case the risk of failure is the lowest of the
changeover methods, but it is also the most expensive
as both systems have to be operated which requires
additional labour and computer resources.
New System comes online in
parallel with old system
You need to be aware of the training
and support methods that are available.
You need to be able to discuss which
methods would be most suitable and
why
Training may be needed when a new
system is introduced, to learn more
advance features, changes in
functionality, procedures and
legislation.
Support Methods:
Existing user base.
Help-desks.
User support from
software producers.
Support articles (e.g.,
computer magazines,
books, FAQ, etc.).
On-screen help.
Specialist bulletin
boards/blogs.
Internal and External Users
Users who work for the organisation
that owns the ICT system are called
internal users.
Any users who may not work in the
organisation that owns the ICT
system are called external users.
Different levels of staff will need
different training. E.g. managers will
need to learn how to use the MIS.
Operational staff may need to know
how to use the EPOS system
Training Methods
Instructor-based
classroom training.
One-to-one training.
Cascade training.
Computer-based
training (CBT).
Distance learning.
Use of manuals,
books, software
guides.
CBT/E-Learning
One to One
On The Job
Instructor Based
(can be external or
internal courses)
Manuals/ Books/ User
Guides/Videos
Teaching specific
skills and needs
Large number of
users. Low level of
risk with task involved
Suit specific needs
External courses can
avoid distractions in
the workplace
learn on a flexible
basis.
Use for problem
solving when needed
Develop skills further
in free time
Cheap
 May only run at
fixed times and have
to travel to them
External courses may
be expensive
 Can feel isolated, no
interaction
Suitable For
A large number of
users
Small number of
users. Managers
Practical tasks,
smaller number of
users
Advantages
 Work at own pace
 When and where
they want
Cheaper than
sending staff on
courses
Assessment available
 Effective as lots of
time can be spent on
staffs specific needs
 Easy to learn doing
practical tasks
 Do not have to
travel
Ask for training when
needed
Disadvantages
 People may not
respond well as they
like to ask for help
when stuck
 No evidence of how
well they responded
to course
Task Based
Operational level
staff carrying out
practical tasks
 Expensive
Skills Based
Analytical skills to
extract data that
can be used across
systems. Managers
 Time consuming to
train large number of
users.
3 Methods: Perfective, Adaptive and Corrective
 Perfective maintenance
implies that while the system
runs satisfactorily, there is
still room for improvement
and features can be added
Adaptive maintenance
All systems will need to adapt
to changing needs within a
company
Corrective maintenance
Problems frequently surface
after a system has been in
use for a short time, however
thoroughly it was tested
Once the system has been delivered
and installed, it is measured against the
system requirements documentation
and its performance monitored.
Inevitably some aspects of
performance will be unsatisfactory and
maintenance will be required for
reasons including:
Bugs may be identified that were not
spotted during the testing phase
Users may find aspects of the
software unacceptable after using the
system for a while
More efficient ways of operating the
system may be required
It may be necessary to integrate the
system with new software and
hardware
New legislation may be introduced
that requires system modification such
as tax changes implemented onto an
account package
Security issues may force changes to
be made to protect the system from
external threats
Management Involvement
Senior management must be involved throughout
the project. Managers need to understand
clearly what specific problem the solution is
aiming to solve. They need to have a knowledge
of ICT systems and be involved at the stages of
the system development
End User Involvement
End User Involvement is an important aspect in
developing ICT solutions, as the project can be
centred around getting the information that the
end user wants and needs. End user involvement
is also critical in establishing an interface design
that is straightforward to use and has high
usability. It has also been shown that there is an
increased acceptance of the developed product
if there is an early involvement of the users in the
project creation.
Effective ICT Team Work
An effective ICT team is a key factor in the
success of the project development process;
most projects are broken down into small tasks
and teamwork is essential to link the process
together.
Inadequate Analysis
sufficient time and effort should be made available so that
appropriate research is carried out. End users should be involved
at the start of the project and the management must ensure that a
co-operative environment exists to ensure accurate and relevant
data gathering takes place
Unrealistic Project Plan
Every project has a plan that lays down which team member carried
out which task. Clear timescales and agreed deliverables need to be
established. Thought needs to be given to give enough time and
realistic planning. If not then the project may run over time and over
budget.
Insufficient Monitoring
The project leader needs to monitor the progress of the project.
Unexpected problems may arise or task needs to be done that were
overlooked. The project manager will need to adjust the schedule
and maybe change around the team members and allocation of tasks.
Lack of Standards
A lack of professional standards can lead to missed deadlines and a
system that does not function as was intended. All stages of the
project need to be carried out using agreed methods that everyone
works to.
Loss of Control
Many projects fall behind schedule when the team leader loses
control of the project plan. This can happen if agreed deliverables
are not produced or if when a mile stone is reached management are
not satisfied and do not approve moving on to the next stage.
A Risk Analysis Involves
1.
Identifying each element of an information system
2.
Placing a value on that element
3.
Identifying any threats to that element
4.
Assessing the likelihood(or probability) of such
threats occurring
The organisation should then take measures to protect
data that are appropriate to the risk
The set of procedures
that are in place to
restore data that is
lost
The processes that
have to be in place to
allow recovery to
happen
Contents of a Contingency Plan:
•Alternative computer hardware
•Backup procedures
•Recovery Procedures
•Staff Responsibilities
•An Alternative working location
Know the potential threats to a system
Understand the considerations in a backup
strategy
Know what is a risk analysis is
Know the contents of a recovery and
contingency plan
Threats to a System:
Hardware Failure
Software Failure
Telecommunications Failure
Computer Crime and Abuse
Invalid Data
System Design Failure
Disk Mirroring: Identical data is stored on two different
disks. Whenever data is stored to disk, it is stored on both.
If the main disk fails, identical data is available on the
second disk. The mirror disk does not have to be located
in the same place as the first.
Recovery Options:
In House Provision
Subscription Service (cold /hot start)
Reciprocal Agreements
Backup and Recovery Procedures need to be
tested and roles need to be clearly identified
• A strategy will cover the following
Aspects of a Backup Plan
What Data
is to be
Backed Up:
Data files,
operating system
files, application
files
When Will
Backup be
Done:
Systems that run
all the time need to
be backed up
while they are
running. Systems
that run during the
day need to be
backed up at night
What Type
of backup
should be
done:
Full Backup,
Incremental,
Differential,
Online
What Media
will be used
for the
Backup Up:
Need to
consider speed
and volume
Where the
backup will
be kept:
There is no point
storing the
backup in the
same place as the
original
Who is
responsible
for the
backup and
testing the
recovery
How
frequent will
the backup
take place:
Every day,
weekly etc. Need
to consider how
valuable the data
is
Small scale systems can use relatively simple backup procedures such as copying nightly transactions
onto an external hard disk. Large scale systems such as stock exchange or banks need an extensive and
complex backup and recovery strategy
You need to be aware of the various
laws and the impact they have on
organisations
Implications of the Laws on organisations:
What are the Laws I
need to know?
Data protection act
(1984 & 1998)
Computer Misuse
Act(1990)
Copyright Designs
and Patent Act (1988)
Health and Safety at
Work Act (1974)
Freedom of
information act (2000)
Copyright Design & Patents Act:
Organisations have to check there is not unauthorised software on their
computers.
They have to ensure that employees are not downloading copyright material
illegally.
They have to make sure they have the correct number of licences and not running
software on more machines
Health & Safety Act
Appointing a safety officer
Regularly inspecting workstations against health and safety criteria
Carry out regular staff training regarding health and safety with regard to
computer use
Ensuring that all software is appropriately designed
Prodding memos, leaflets or posters to advise on good health and safety practice
Establish procedures that ensure faulty equipment is replaced in a timely manner
Computer Misuse Act
Carry out audits
Ban on downloading any programs
Ban on using someone else username and password
Use software and hardware measures
Data Protection Act
Appointing a Data Protection Officer to monitor systems
Establishing procedures to follow up possible breaches
Establishing security methods such as firewalls, the use of passwords and data
encryption
Including a clause in the code of practice stating that employees should not build
up their own databases of personal data
Using a variety of methods to educate staff of their responsibilities in keeping
data private. Establishing and circulating disciplinary measures
Outsourcing is when a business contracts another firm to carry out a
particular task for it. For example, a law firm may ask an IT
company to manage its network facilities so that the lawyers can
concentrate on legal matters and do not have o worry about
repairing machines or installing software.
Some companies may choose to employ a team to take care of their
systems where others prefer to outsource. The decision will be
based on which is the most affordable and cost-effective option.
Advantages:
 Solves the problem of trying to recruit and retain suitable ICT
staff
 Allows organisations to concentrate on core business
functions
 The organisation does not have to worry about legislation
applying to that part of the business
 The company may not have to purchase expensive hardware
and software
Disadvantages
 Outsourcing can mean existing ICT staff may no longer be
needed
 The quality of outsourced work may not be as high as work
done in house
 The organisation has not direct control over staff employed by
the outsourcing company
 It could compromise the privacy and security of data held
Offshoring means moving certain business
processes performed in a company, in one
country to the same company or a
completely different company in a
different country
Bulk printing
Specialist companies provide a service to carry out
bulk printing for example payroll and billing systems
Leasing:
Similar to renting.
You pay a fixed amount per month.
You never own the goods being leased.
At the end of the period you can either rent at much
lower rental or start up a new lease with more up-todate hardware and software
Contracting/Buying Outright:
When you purchase goods or services.
For hardware/software when the contract ends the
goods belong to you.
Managing Internal resources
All organisations rely on managing their
resources as efficiently as possible.
Involves managing the following:
Hardware
Software
Communication
Consumables
Facilities and Power
People

similar documents