SlideShare uma empresa Scribd logo
1 de 31
Copyright 2002 Prentice-Hall, Inc.
Modern Systems Analysis
and Design
Third Edition
Jeffrey A. Hoffer
Joey F. George
Joseph S. Valacich
Chapter 17
System Implementation
17.1
Learning Objectives
 Describe the process of coding, testing and
converting an organizational information system
 Discuss four installation strategies
 Direct
 Parallel
 Single location
 Phased installation
 Describe the deliverables for documenting the
system and for training and supporting the users
 Distinguish between system and user documentation
and determine which types of documentation are
necessary for a given information system
17.2
Learning Objectives
 Compare the many modes available for
organizational system training, including self-training
and electronic performance support systems
 Discuss the issues of providing support to end users
 Discuss system implementation failure
 Compare the factor and political models of the
implementation process
 Show how traditional implementation issues apply to
Internet-based systems
17.3
System Implementation and
Seven major activities
 Coding
 Testing
 Installation
 Documentation
 Training
 Support
Purpose
 To convert final physical system specifications into
working and reliable software
 To document work that has been done
 To provide help for current and future users
17.4
The Process of Coding,
Testing and Installation
Coding
 Physical design specifications are turned into
working computer code
Testing
 Tests are performed using various strategies
 Testing can be performed in parallel with coding
Installation
 Process during which the current system is
replaced by the new system
17.5
The Process of Coding,
Testing and Installation:
Deliverables
Action Deliverable
Coding Code
Program Documentation
Testing Test scenarios (test plan) and test data
Results of program and system testing
Installation User guides
User training plans
Installation and conversion plan
17.6
The Process of Documenting the
System, Training Users and
Supporting Users
Two audiences for documentation
 The information systems personnel who will maintain the
system throughout its productive life
 The people who will use the system as part of their daily
lives
Deliverables
 Documentation
 System documentation
 User documentation
 User training plan
 Classes
 Tutorials
 User training modules
 Training materials
 Computer-based training aids
 User support plan
 Help desk
 On-line help
 Bulletin boards and other support mechanisms
17.7
Software Application Testing
A test plan is developed during the analysis
phase
During the design phase, a unit test plan and
a system test plan are developed
The actual testing is done during
implementation
Test plans provide improved communication
among all parties involved in testing
 Serve as checklists
17.8
Software Application Testing
Types of Testing
Inspection
 A testing technique in which participants examine
program code for predictable language-specific
errors
Walkthrough
 A peer group review of any product created during
the systems development process; also called a
structured walkthrough
Desk Checking
 A testing technique in which the program code is
sequentially executed manually by the reviewer
17.9
Software Application Testing
Types of Testing
Unit Testing
 Each module is tested alone in an attempt to
discover any errors in its code, also called module
testing
Integration Testing
 The process of bringing together all of the
modules that a program comprises for testing
purposes. Modules are typically integrated in a
top-down, incremental fashion
17.10
Software Application Testing
Types of Testing
System Testing
 The bringing together of all the programs that a
system comprises for testing purposes. Programs
are typically integrated in a top-down, incremental
fashion
Stub Testing
 A technique used in testing, especially where
modules are written and tested in a top-down
fashion, where a few lines of code are used to
substituted for subordinate modules
17.11
Software Application Testing
The Testing Process
The purpose of the testing is confirming that
the system satisfies requirements
Testing must be planned
Test Case
 A specific scenario of transactions, queries or
navigation paths that represent a typical, critical
or abnormal use of the system
 Test cases and results should be thoroughly
documented so they can be repeated for each
revision of an application
17.12
Software Application Testing
eXtreme Programming
Coding and testing are intimately
related parts of the same process
Code is written, integrated into system
and then tested
Iterative process of testing, fixing bugs
and re-testing
All coding is done by two people
working together
17.13
Software Application Testing
Acceptance Testing by Users
The process whereby actual users test a completed
information system, the end result of which is the
users’ acceptance of it
Alpha Testing
 User testing of a completed information system using
simulated data
 Recovery testing
 Forces the software (or environment) to fail in order to verify
that recovery is properly performed
 Security testing
 Verifies that protection mechanisms built into the system will
protect it from improper penetration
 Stress testing
 Tries to break the system
 Performance testing
 Determines how the system performs on the range of possible
environments in which it may be used
17.14
Software Application Testing
Acceptance Testing by Users
Beta Testing
 User testing of a completed information
system using real data in the real user
environment
17.15
Installation
The organizational process of changing
over from the current information system to
a new one
Four approaches
 Direct Installation
 Changing over from the old information system to a
new one by turning off the old system when the new
one is turned on
 Parallel Installation
 Running the old information system and the new one at
the same time until management decides the old
system can be turned off
17.16
Installation
 Single location installation
 Trying out an information system at one site
and using the experience to decide if and how
the new system should be deployed
throughout the organization
 Phased Installation
 Changing from the old information system to
the new one incrementally, starting with one
or a few functional components and then
gradually extending the installation to cover
the whole new system
17.17
Planning Installation
Considerations
 Data conversion
 Error correction
 Loading from current system
 Planned system shutdown
 Business cycle of organization
17.18
Documenting The System
System documentation
 Detailed information about a system’s design
specifications, its internal workings and its
functionality
 Internal documentation
 System documentation that is part of the program source
code or is generated at compile time
 External documentation
 System documentation that includes the outcome of
structured diagramming techniques such as data flow
and entity-relationship diagrams
17.19
Documenting The System
User Documentation
 Written or other visual information about an
application system, how it works, and how
to use it
Preparing user documentation
 Traditional source has been information
systems department
 Application-oriented documentation is now
often supplied by vendors and users
themselves
17.20
Training Information System
Users
Potential training topics
 Use of the system
 General computer concepts
 Information system concepts
 Organizational concepts
 System management
 System installation
17.21
Training Information System
Users
Training methods
 Resident expert
 Computer-aided instruction
 Formal courses
 Software help components
 Tutorials
 Interactive training manuals
 External sources, such as vendors
Electronic performance support system
(EPSS)
 Component of a software package or application
in which training and educational information is
embedded17.22
Supporting Information System
Users
Support is extremely important to users
 J.D. Power and Associates survey found
user support to be number one criterion
contributing to user satisfaction with
personal computing
Most organizations provide support by
two means
 Information center
 Help desk
17.23
Supporting Information System Users
Information Center
An organizational unit whose mission is to support
users in exploiting information technology
Staff might perform the following tasks
 Install new hardware or software and set up user accounts
 Consult with users writing programs in fourth-generation
languages
 Extract data from organizational databases onto personal
computers
 Answer basic on-demand questions
 Provide a demonstration site for viewing hardware and
software
 Work with users to submit system change requests
17.24
Supporting Information System Users
Help Desk
A single point of contact for all user inquiries
and problems about a particular information
system or for all users in a particular
department
17.25
Why Implementation Sometimes
Fails
Two conditions necessary for a
successful implementation
 Management support of the system under
development
 Involvement of users in the development
process
17.26
Why Implementation Sometimes
Fails
Insights about implementation process
 Risk
 Commitment to the project
 Commitment to change
 Extent of project definition and planning
 Realistic user expectations
Implementation success factors
 Extent to which system is used
 User’s satisfaction with system
17.27
Electronic Commerce Application:
Pine Valley Furniture
System implementation and operation of an Internet-
based electronic commerce project is no different
than other projects
Develop test cases
 Simple functionality
 Multiple functionality
 Function chains
 Elective function
 Emergency/crisis
Bug tracking and system evolution
Alpha and beta testing the WebStore
WebStore installation
17.28
Project Close Down
Evaluate team
 Reassign members to other projects
Notify all affected parties that the
development project is ending and that
you are switching to operation and
maintenance mode
Conduct post-project reviews
Close out customer contract
 Formal signoff
17.29
Summary
Process of coding, testing and
converting an organizational information
system
Four installation strategies
 Direct
 Parallel
 Single location
 Phased installation
17.30
Summary
Documentation
 System
 User
User training
Providing support for end users
Systems implementation failures
Internet development
Project Closedown
17.31

Mais conteúdo relacionado

Mais procurados

System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)fentrekin
 
lecture 1 information systems and business strategy
lecture 1  information systems and business strategylecture 1  information systems and business strategy
lecture 1 information systems and business strategyNorazila Mat
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar
 
Ch9-Software Engineering 9
Ch9-Software Engineering 9Ch9-Software Engineering 9
Ch9-Software Engineering 9Ian Sommerville
 
Cost of software quality ( software quality assurance )
Cost of software quality ( software quality assurance )Cost of software quality ( software quality assurance )
Cost of software quality ( software quality assurance )Kiran Hanjar
 
Ch2-Software Engineering 9
Ch2-Software Engineering 9Ch2-Software Engineering 9
Ch2-Software Engineering 9Ian Sommerville
 
Information System Development
Information System DevelopmentInformation System Development
Information System DevelopmentIamPe Khamkhum
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
System Analysis and Design
System Analysis and Design System Analysis and Design
System Analysis and Design Matthew McKenzie
 
Chapter06 initiating and planning systems development projects
Chapter06 initiating and planning systems development projectsChapter06 initiating and planning systems development projects
Chapter06 initiating and planning systems development projectsDhani Ahmad
 
SWE-401 - 1. Introduction to Software Engineering
SWE-401 - 1. Introduction to Software EngineeringSWE-401 - 1. Introduction to Software Engineering
SWE-401 - 1. Introduction to Software Engineeringghayour abbas
 
System Analysis And Design Management Information System
System Analysis And Design Management Information SystemSystem Analysis And Design Management Information System
System Analysis And Design Management Information Systemnayanav
 
Configuration Management
Configuration ManagementConfiguration Management
Configuration ManagementSaqib Raza
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYRohitK71
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and DesignJoel Briza
 

Mais procurados (20)

System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)
 
lecture 1 information systems and business strategy
lecture 1  information systems and business strategylecture 1  information systems and business strategy
lecture 1 information systems and business strategy
 
8. operations security
8. operations security8. operations security
8. operations security
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Ch9-Software Engineering 9
Ch9-Software Engineering 9Ch9-Software Engineering 9
Ch9-Software Engineering 9
 
Component based software engineering
Component based software engineeringComponent based software engineering
Component based software engineering
 
Ch13 security engineering
Ch13 security engineeringCh13 security engineering
Ch13 security engineering
 
Cost of software quality ( software quality assurance )
Cost of software quality ( software quality assurance )Cost of software quality ( software quality assurance )
Cost of software quality ( software quality assurance )
 
Ch2-Software Engineering 9
Ch2-Software Engineering 9Ch2-Software Engineering 9
Ch2-Software Engineering 9
 
Information System Development
Information System DevelopmentInformation System Development
Information System Development
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
System Analysis and Design
System Analysis and Design System Analysis and Design
System Analysis and Design
 
Chapter06 initiating and planning systems development projects
Chapter06 initiating and planning systems development projectsChapter06 initiating and planning systems development projects
Chapter06 initiating and planning systems development projects
 
SWE-401 - 1. Introduction to Software Engineering
SWE-401 - 1. Introduction to Software EngineeringSWE-401 - 1. Introduction to Software Engineering
SWE-401 - 1. Introduction to Software Engineering
 
System Analysis And Design Management Information System
System Analysis And Design Management Information SystemSystem Analysis And Design Management Information System
System Analysis And Design Management Information System
 
Configuration Management
Configuration ManagementConfiguration Management
Configuration Management
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
Ch5 system modeling
Ch5 system modelingCh5 system modeling
Ch5 system modeling
 
System implemantation
System implemantationSystem implemantation
System implemantation
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 

Destaque

L10 system implementation
L10 system implementationL10 system implementation
L10 system implementationOMWOMA JACKSON
 
11.file system implementation
11.file system implementation11.file system implementation
11.file system implementationSenthil Kanth
 
Enterprise system implementation strategies and phases
Enterprise system implementation strategies and phasesEnterprise system implementation strategies and phases
Enterprise system implementation strategies and phasesJohn Cachat
 
6 basic steps of software development process
6 basic steps of software development process6 basic steps of software development process
6 basic steps of software development processRiant Soft
 
Extensible Markup Language (XML)
Extensible Markup Language (XML)Extensible Markup Language (XML)
Extensible Markup Language (XML)AakankshaR
 
Chapter09 logic modeling
Chapter09 logic modelingChapter09 logic modeling
Chapter09 logic modelingDhani Ahmad
 
eXtensible Markup Language (By Dr.Hatem Mohamed)
eXtensible Markup Language (By Dr.Hatem Mohamed)eXtensible Markup Language (By Dr.Hatem Mohamed)
eXtensible Markup Language (By Dr.Hatem Mohamed)MUFIX Community
 
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...ZTech Proje
 
Chapter10 conceptual data modeling
Chapter10 conceptual data modelingChapter10 conceptual data modeling
Chapter10 conceptual data modelingDhani Ahmad
 
System Analysis Fact Finding Methods
System Analysis Fact Finding MethodsSystem Analysis Fact Finding Methods
System Analysis Fact Finding MethodsMoshikur Rahman
 
Chapter 11 - File System Implementation
Chapter 11 - File System ImplementationChapter 11 - File System Implementation
Chapter 11 - File System ImplementationWayne Jones Jnr
 
Planning, design and implementation of information systems
Planning, design and implementation of information systemsPlanning, design and implementation of information systems
Planning, design and implementation of information systemsOnline
 
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Angelin R
 

Destaque (20)

L10 system implementation
L10 system implementationL10 system implementation
L10 system implementation
 
11.file system implementation
11.file system implementation11.file system implementation
11.file system implementation
 
Enterprise system implementation strategies and phases
Enterprise system implementation strategies and phasesEnterprise system implementation strategies and phases
Enterprise system implementation strategies and phases
 
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)
 
6 basic steps of software development process
6 basic steps of software development process6 basic steps of software development process
6 basic steps of software development process
 
Si matt - INISTA 2014
Si matt  - INISTA 2014Si matt  - INISTA 2014
Si matt - INISTA 2014
 
Extensible Markup Language (XML)
Extensible Markup Language (XML)Extensible Markup Language (XML)
Extensible Markup Language (XML)
 
Chapter09 logic modeling
Chapter09 logic modelingChapter09 logic modeling
Chapter09 logic modeling
 
eXtensible Markup Language (By Dr.Hatem Mohamed)
eXtensible Markup Language (By Dr.Hatem Mohamed)eXtensible Markup Language (By Dr.Hatem Mohamed)
eXtensible Markup Language (By Dr.Hatem Mohamed)
 
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
 
Markup Languages
Markup LanguagesMarkup Languages
Markup Languages
 
Markup Languages
Markup Languages Markup Languages
Markup Languages
 
Chapter10 conceptual data modeling
Chapter10 conceptual data modelingChapter10 conceptual data modeling
Chapter10 conceptual data modeling
 
System Analysis Fact Finding Methods
System Analysis Fact Finding MethodsSystem Analysis Fact Finding Methods
System Analysis Fact Finding Methods
 
Types of information systems
Types of information systemsTypes of information systems
Types of information systems
 
Chapter 11 - File System Implementation
Chapter 11 - File System ImplementationChapter 11 - File System Implementation
Chapter 11 - File System Implementation
 
Planning, design and implementation of information systems
Planning, design and implementation of information systemsPlanning, design and implementation of information systems
Planning, design and implementation of information systems
 
Mis notes
Mis notesMis notes
Mis notes
 
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)
 
What is Email Management?
What is Email Management?What is Email Management?
What is Email Management?
 

Semelhante a Chapter17 system implementation

Semelhante a Chapter17 system implementation (20)

SA Chapter 13
SA Chapter 13SA Chapter 13
SA Chapter 13
 
System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)
 
Hoffer msad6e ch13
Hoffer msad6e ch13Hoffer msad6e ch13
Hoffer msad6e ch13
 
Spm unit iii-configuration mgmt-responsibilities
Spm unit iii-configuration mgmt-responsibilitiesSpm unit iii-configuration mgmt-responsibilities
Spm unit iii-configuration mgmt-responsibilities
 
system development life cycle SDLC
system development life cycle SDLCsystem development life cycle SDLC
system development life cycle SDLC
 
Object oriented sad 6
Object oriented sad 6Object oriented sad 6
Object oriented sad 6
 
15 si(systems analysis and design )
15 si(systems analysis and design )15 si(systems analysis and design )
15 si(systems analysis and design )
 
Uit9 ppt ch10_au_rev
Uit9 ppt ch10_au_revUit9 ppt ch10_au_rev
Uit9 ppt ch10_au_rev
 
Online auction system srs riport
Online auction system srs  riportOnline auction system srs  riport
Online auction system srs riport
 
SA Chapter 7
SA Chapter 7SA Chapter 7
SA Chapter 7
 
Mis
MisMis
Mis
 
Online auction system srs riport
Online auction system srs  riportOnline auction system srs  riport
Online auction system srs riport
 
Chapter 7)
Chapter 7)Chapter 7)
Chapter 7)
 
Software maintenance
Software maintenanceSoftware maintenance
Software maintenance
 
Understanding operating systems 5th ed ch12
Understanding operating systems 5th ed ch12Understanding operating systems 5th ed ch12
Understanding operating systems 5th ed ch12
 
Software maintenance
Software maintenanceSoftware maintenance
Software maintenance
 
Chapter18 maintaining information systems
Chapter18 maintaining information systemsChapter18 maintaining information systems
Chapter18 maintaining information systems
 
BUILDING INFORMATION SYSYTEMS.pptx
BUILDING INFORMATION SYSYTEMS.pptxBUILDING INFORMATION SYSYTEMS.pptx
BUILDING INFORMATION SYSYTEMS.pptx
 
Sdlc process
Sdlc processSdlc process
Sdlc process
 
Chap05
Chap05Chap05
Chap05
 

Mais de Dhani Ahmad

Strategic planning
Strategic planningStrategic planning
Strategic planningDhani Ahmad
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planningDhani Ahmad
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisDhani Ahmad
 
Information system
Information systemInformation system
Information systemDhani Ahmad
 
Information resource management
Information resource managementInformation resource management
Information resource managementDhani Ahmad
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and recordsDhani Ahmad
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behaviorDhani Ahmad
 
Islamic information management
Islamic information managementIslamic information management
Islamic information managementDhani Ahmad
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islamDhani Ahmad
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnelDhani Ahmad
 
Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 
Risk management i
Risk management iRisk management i
Risk management iDhani Ahmad
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care itDhani Ahmad
 
Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issuesDhani Ahmad
 

Mais de Dhani Ahmad (20)

Strategic planning
Strategic planningStrategic planning
Strategic planning
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysis
 
Information system
Information systemInformation system
Information system
 
Information resource management
Information resource managementInformation resource management
Information resource management
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
 
The need for security
The need for securityThe need for security
The need for security
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Security policy
Security policySecurity policy
Security policy
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Secure
SecureSecure
Secure
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Risk management i
Risk management iRisk management i
Risk management i
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Physical security
Physical securityPhysical security
Physical security
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 

Último

Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptrcbcrtm
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineeringssuserb3a23b
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 

Último (20)

2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineering
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 

Chapter17 system implementation

  • 1. Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 17 System Implementation 17.1
  • 2. Learning Objectives  Describe the process of coding, testing and converting an organizational information system  Discuss four installation strategies  Direct  Parallel  Single location  Phased installation  Describe the deliverables for documenting the system and for training and supporting the users  Distinguish between system and user documentation and determine which types of documentation are necessary for a given information system 17.2
  • 3. Learning Objectives  Compare the many modes available for organizational system training, including self-training and electronic performance support systems  Discuss the issues of providing support to end users  Discuss system implementation failure  Compare the factor and political models of the implementation process  Show how traditional implementation issues apply to Internet-based systems 17.3
  • 4. System Implementation and Seven major activities  Coding  Testing  Installation  Documentation  Training  Support Purpose  To convert final physical system specifications into working and reliable software  To document work that has been done  To provide help for current and future users 17.4
  • 5. The Process of Coding, Testing and Installation Coding  Physical design specifications are turned into working computer code Testing  Tests are performed using various strategies  Testing can be performed in parallel with coding Installation  Process during which the current system is replaced by the new system 17.5
  • 6. The Process of Coding, Testing and Installation: Deliverables Action Deliverable Coding Code Program Documentation Testing Test scenarios (test plan) and test data Results of program and system testing Installation User guides User training plans Installation and conversion plan 17.6
  • 7. The Process of Documenting the System, Training Users and Supporting Users Two audiences for documentation  The information systems personnel who will maintain the system throughout its productive life  The people who will use the system as part of their daily lives Deliverables  Documentation  System documentation  User documentation  User training plan  Classes  Tutorials  User training modules  Training materials  Computer-based training aids  User support plan  Help desk  On-line help  Bulletin boards and other support mechanisms 17.7
  • 8. Software Application Testing A test plan is developed during the analysis phase During the design phase, a unit test plan and a system test plan are developed The actual testing is done during implementation Test plans provide improved communication among all parties involved in testing  Serve as checklists 17.8
  • 9. Software Application Testing Types of Testing Inspection  A testing technique in which participants examine program code for predictable language-specific errors Walkthrough  A peer group review of any product created during the systems development process; also called a structured walkthrough Desk Checking  A testing technique in which the program code is sequentially executed manually by the reviewer 17.9
  • 10. Software Application Testing Types of Testing Unit Testing  Each module is tested alone in an attempt to discover any errors in its code, also called module testing Integration Testing  The process of bringing together all of the modules that a program comprises for testing purposes. Modules are typically integrated in a top-down, incremental fashion 17.10
  • 11. Software Application Testing Types of Testing System Testing  The bringing together of all the programs that a system comprises for testing purposes. Programs are typically integrated in a top-down, incremental fashion Stub Testing  A technique used in testing, especially where modules are written and tested in a top-down fashion, where a few lines of code are used to substituted for subordinate modules 17.11
  • 12. Software Application Testing The Testing Process The purpose of the testing is confirming that the system satisfies requirements Testing must be planned Test Case  A specific scenario of transactions, queries or navigation paths that represent a typical, critical or abnormal use of the system  Test cases and results should be thoroughly documented so they can be repeated for each revision of an application 17.12
  • 13. Software Application Testing eXtreme Programming Coding and testing are intimately related parts of the same process Code is written, integrated into system and then tested Iterative process of testing, fixing bugs and re-testing All coding is done by two people working together 17.13
  • 14. Software Application Testing Acceptance Testing by Users The process whereby actual users test a completed information system, the end result of which is the users’ acceptance of it Alpha Testing  User testing of a completed information system using simulated data  Recovery testing  Forces the software (or environment) to fail in order to verify that recovery is properly performed  Security testing  Verifies that protection mechanisms built into the system will protect it from improper penetration  Stress testing  Tries to break the system  Performance testing  Determines how the system performs on the range of possible environments in which it may be used 17.14
  • 15. Software Application Testing Acceptance Testing by Users Beta Testing  User testing of a completed information system using real data in the real user environment 17.15
  • 16. Installation The organizational process of changing over from the current information system to a new one Four approaches  Direct Installation  Changing over from the old information system to a new one by turning off the old system when the new one is turned on  Parallel Installation  Running the old information system and the new one at the same time until management decides the old system can be turned off 17.16
  • 17. Installation  Single location installation  Trying out an information system at one site and using the experience to decide if and how the new system should be deployed throughout the organization  Phased Installation  Changing from the old information system to the new one incrementally, starting with one or a few functional components and then gradually extending the installation to cover the whole new system 17.17
  • 18. Planning Installation Considerations  Data conversion  Error correction  Loading from current system  Planned system shutdown  Business cycle of organization 17.18
  • 19. Documenting The System System documentation  Detailed information about a system’s design specifications, its internal workings and its functionality  Internal documentation  System documentation that is part of the program source code or is generated at compile time  External documentation  System documentation that includes the outcome of structured diagramming techniques such as data flow and entity-relationship diagrams 17.19
  • 20. Documenting The System User Documentation  Written or other visual information about an application system, how it works, and how to use it Preparing user documentation  Traditional source has been information systems department  Application-oriented documentation is now often supplied by vendors and users themselves 17.20
  • 21. Training Information System Users Potential training topics  Use of the system  General computer concepts  Information system concepts  Organizational concepts  System management  System installation 17.21
  • 22. Training Information System Users Training methods  Resident expert  Computer-aided instruction  Formal courses  Software help components  Tutorials  Interactive training manuals  External sources, such as vendors Electronic performance support system (EPSS)  Component of a software package or application in which training and educational information is embedded17.22
  • 23. Supporting Information System Users Support is extremely important to users  J.D. Power and Associates survey found user support to be number one criterion contributing to user satisfaction with personal computing Most organizations provide support by two means  Information center  Help desk 17.23
  • 24. Supporting Information System Users Information Center An organizational unit whose mission is to support users in exploiting information technology Staff might perform the following tasks  Install new hardware or software and set up user accounts  Consult with users writing programs in fourth-generation languages  Extract data from organizational databases onto personal computers  Answer basic on-demand questions  Provide a demonstration site for viewing hardware and software  Work with users to submit system change requests 17.24
  • 25. Supporting Information System Users Help Desk A single point of contact for all user inquiries and problems about a particular information system or for all users in a particular department 17.25
  • 26. Why Implementation Sometimes Fails Two conditions necessary for a successful implementation  Management support of the system under development  Involvement of users in the development process 17.26
  • 27. Why Implementation Sometimes Fails Insights about implementation process  Risk  Commitment to the project  Commitment to change  Extent of project definition and planning  Realistic user expectations Implementation success factors  Extent to which system is used  User’s satisfaction with system 17.27
  • 28. Electronic Commerce Application: Pine Valley Furniture System implementation and operation of an Internet- based electronic commerce project is no different than other projects Develop test cases  Simple functionality  Multiple functionality  Function chains  Elective function  Emergency/crisis Bug tracking and system evolution Alpha and beta testing the WebStore WebStore installation 17.28
  • 29. Project Close Down Evaluate team  Reassign members to other projects Notify all affected parties that the development project is ending and that you are switching to operation and maintenance mode Conduct post-project reviews Close out customer contract  Formal signoff 17.29
  • 30. Summary Process of coding, testing and converting an organizational information system Four installation strategies  Direct  Parallel  Single location  Phased installation 17.30
  • 31. Summary Documentation  System  User User training Providing support for end users Systems implementation failures Internet development Project Closedown 17.31