SlideShare a Scribd company logo
1 of 30
Information
System
Implementation,
Change
Management And
Control.
Submitted By: -
Shruti Pendharkar
CONTENTS
1. Information system implementation
2. Change Management
3. Control in information system
Information System
Implementation
SYSTEM DEVELOPMENT LIFE CYCLE
(SDLC)
 Development of information system undergoes 5 stages,
System Maintenance
System Implementation
System Design
System Analysis
System Investigation
CONCEPT OF IMPLEMENTATION
 Implementation means constructing and putting the new system into
operation.
 Creation of system based on analysis and design document.
 Implementation refers to all of the organizational activities working
towards the ,
 Adoption,
 Management, and
 Routinization of an innovation.
 Implementation activities are needed to transform a newly developed IS
into an operational system for end users.
TYPES OF IMPLEMENTATION
Implementation
Fresh
Implementation
Replacement
Implementation
Modified
Implementation
IMPLEMENTATION PROCESS
 Implementation is a process of
 Coding,
 Testing,
 Installation,
 Documentation,
 Training, and
 Support.
 These steps are based on the design specification.
 All the requirements of the system, such as input,
processing, output equipment etc. are provided by design
specification.
Planning
Acquisition of
facilities and
space planning
MIS
Organization &
Procedure
Development
Acquisition of
Hardware &
Software
Coding
Testing
Creating Forms
& Database
Documentation User Training
Installation /
Conversion
PLANNING THE IMPLEMENTATION
 Pre-implementation activity.
 Activities required are
identified and sequenced
accordingly.
 Time and cost estimation
for each activities are being
made.
 Plan and implementation
schedule are being made by
system analyst using
various tools like Gantt
charts, network diagrams
etc.
ACQUISITIONS OF FACILITIES AND SPACE
PLANNING
 The IS to be implemented may be for,
 This requires acquisition of facilities like office, computer
room, computer library etc.
 Proper estimation of floor space requirement and roughs
layouts are to be prepared by MIS manager.
• Where no old system is in existence
• New systems are to be implemented
New
organization
• Information system needs to be
modified to great extent
• New system needs to be developed
Existing
organization
ACQUISITION OF HARDWARE & SOFTWARE
 Large business firms or government agencies
formalize there hardware and software requirements
by listing them in a document called RFP (Request for
proposal) or RFQ (Request for quotation).
Business
Firms
Vendor
RFQ
Purchase
Agreement
CODING & TESTING
 Physical design created by the system designer team are
turned into working computer code by the programming
team.
 Depending on the size and complexity of the system, coding
can be an involved, intensive activity.
 Immediately after coding process has begun, testing can be
started.
 System testing involves,
 Testing and debugging software,
 Testing Website performance, and
 Testing new hardware.
 It’s important part is, review of prototype of displays,
reports and other output.
DOCUMENTATION
 There are 2 types of documentation: -
System
Documentation
For maintenance
programmers or
technical persons
Detailed information about
system’s design
specification, it’s internal
working and its
functionality
User
Documentation
For Users
Consist of written or other
visual information about
an application system,
how it works and how to
use it.
USER TRAINING
 Educate and train management, end users, customers, and
other business stakeholder.
 Proper user training is an important factor in promoting the
required culture and thus ensuring the acceptance of new
system.
 METHODS AND AIDS OF TRAINING: -
Training
Programe
Seminars
User
Manuals
Help
Screens
INSTALLATION / CONVERSION
 Installation or changeover is the event of switch-over from
the old system to the new system, which takes place after
the system is tested and found reliable.
 In new organization, there are no old systems to
replace, so for fresh implementation, new developed and
tested systems are installed as it is.
 In existing organizations, old systems are replaced with
the new developed systems.
 So for replacement implementation, there are 4 conversion
methods.
CONVERSION METHODS
DIRECT CONVERSION
 Slam Dunk or Cold-turkey
strategy.
 Old system is completely
dropped out, and new system
is turned on in its place.
 Least expensive
 High risk of failure
 Should be considered only in
extreme circumstances.
PARALLEL CONVERSION
 Old system is not dropped out
at once, Both old and new
systems are simultaneously
operated.
 Until the end-users and project
coordinators are fully satisfied
that the new system is
functioning correctly.
 Highly expensive
 Least risky
Old System New System
Old System
New System
PILOT CONVERSION
 Modular Approach
 Use where the new system
is to be installed in multiple
locations.
 It allows for conversion to
the new system, either a
direct or parallel method, at
a single location.
 Less risky in terms of any
loss of time or delay in
processing.
PHASE-IN
CONVERSION
 Gradual Conversion or
Cutover by segments.
 The new system is
implemented in many
phase. Each phase is
carried out only after
successful implementation
of previous phase.
 Very less risk is involved.
 Prolonged process.
New SystemOld System
New SystemOld System
CHANGE MANAGEMENT
ORAGANIZATIONAL CHANGE
 Implementation of IS may result in many changes in
organizations.
 POTENTIAL AREAS OF IMPACT: -
 Organizational Structure
 Centralization of Authority
 Job Content
 Relationships
 Resistance to change
CONCEPT OF CHANGE MANAGEMENT
 Information system development and implementation
projects often tend to end in failure.
 changes are difficult to predict, and tend to occur with
growing frequency, change management is becoming an
increasingly significant subject.
 Change management involves analyzing and defining all
changes facing the organization, and developing programs
to reduce the risks and costs, and to maximize the benefits
of change.
 It is a structured, disciplined approach that facilitates the
adoption of new and modified of various groups and
individual within the system.
KEY DIMENSIONS OF CHANGE
MANAGEMENT
CHANGE MANAGEMENT PROCESS
 The change management process is the sequence of steps or
activities that a change management team or project leader
would follow to apply change management to a project or
change. a change management process that contains the
following three parts.:
 Preparing for change (Preparation, assessment and
strategy development)
 Managing change (Detailed planning and change
management implementation)
 Reinforcing change (Data gathering, corrective action and
recognition)
CONTROL IN INFORMATION
SYSTEM
CONTROL IN INFORMATION SYSTEM
 To ensure secure and efficient operation of information systems, an
organization institutes a set of procedures and technological measures
called controls.
 Implemented through: -
 Policies
 Procedures
 Standards
 Control must be thought about through all stages of information
systems analysis, construction and maintenance.
TYPES OF CONTROL
 Physical Controls: -
 It refer to the protection of computer facilities and other IS
resources. This includes protecting computer hardware,
computer software, database, computer networks.etc
 Technical Controls: -
 controls which are implemented in the application of IS itself.
These types of controls include access controls, data security
controls, communication controls etc.
 Administrative Controls: -
 controls which include clear guidelines, policies of the
organisations with regards to the use and deployment of IS
resources are very important in protecting ISs.
 For example: - email policy, internet use policy, access
privileges of employees,
 General Controls: -
 These controls are implemented so as to ensure that
ISs are protected from Various potential threats.
 For example: - system development controls like
budgeting, schedule, quality etc.
 Application Controls: -
 the application controls, as the name implies, are
embedded within the application itself. These controls
are usually written as validation rules. These controls
are popularly known as input controls, processing
controls, and output controls.
IS SECURITY THREATS
1. Human errors/failures: - unintentional errors made by
authorised user.
2. Manipulation of data/systems: - deliberate acts of some
persons or organisations, designed to harm the data or
information systems of an organisation.
3. Theft of data/systems: - deliberate attempt of some person to
steal the important data of an organisation.
4. Destruction from virus: - A Virus is computer code that has
been inserted into a piece of software. Upon execution of the
software the virus is also executed.
5. Natural disasters: - forces of nature that cannot be prevented
or controlled. Such as fire, flood, earthquake, Lightning etc.
IS STRATEGIES
1. Preventive strategy: - controls that would help prevent errors
from occurring, deter criminals from attacking the system, and
deny access to unauthorised people.
2. Detection strategy: - It may not be feasible to prevent the IS
systems from all hazards, cause it’ll only detect the threat.
3. Minimum losses strategy: - minimising of losses once a threat
has happened.
4. Recovery strategy: - A recovery plan, that explains how to fix a
damaged information system as quickly as possible, must be in
place.
5. Corrective action strategy: - The damaged system must be
corrected immediately so as to prevent the problem form
occurring again.
Information system implementation, change management and control

More Related Content

What's hot

Structured systems analysis and design methodology
Structured systems analysis and design methodologyStructured systems analysis and design methodology
Structured systems analysis and design methodologyVatsana Technologies Pte Ltd
 
Decision Support System - Management Information System
Decision Support System - Management Information SystemDecision Support System - Management Information System
Decision Support System - Management Information SystemNijaz N
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Mis & Decision Making
Mis & Decision MakingMis & Decision Making
Mis & Decision MakingArun Mishra
 
Decision making and mis
Decision making and misDecision making and mis
Decision making and misadityapareek26
 
Ppt Slides On Tps,Dps & Eps
Ppt Slides On Tps,Dps & EpsPpt Slides On Tps,Dps & Eps
Ppt Slides On Tps,Dps & Epsnayanav
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systemsBimbashree K.G
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and designLOKESH KUMAR
 
System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)Showkot Usman
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and DesignAamir Abbas
 
Executive information system ( eis )
Executive information system ( eis )Executive information system ( eis )
Executive information system ( eis )Puja Dhakal
 
System concepts, elements and types of systems ppt
System concepts, elements and types of systems pptSystem concepts, elements and types of systems ppt
System concepts, elements and types of systems pptShobhit Sharma
 
introduction to management information systems (MIS)
introduction to management information systems (MIS)introduction to management information systems (MIS)
introduction to management information systems (MIS)Sujan Oli
 
GDSS Group Decision Support System
GDSS Group Decision Support SystemGDSS Group Decision Support System
GDSS Group Decision Support SystemEnaam Alotaibi
 
Unit 1 Introduction to MIS, MIS & Data Mining , MIS & Decision Making
Unit  1 Introduction to MIS, MIS & Data Mining , MIS & Decision MakingUnit  1 Introduction to MIS, MIS & Data Mining , MIS & Decision Making
Unit 1 Introduction to MIS, MIS & Data Mining , MIS & Decision MakingAsmita Singh
 
Six major types of information systems
Six major types of information systemsSix major types of information systems
Six major types of information systemsMohanraj V
 

What's hot (20)

Structured systems analysis and design methodology
Structured systems analysis and design methodologyStructured systems analysis and design methodology
Structured systems analysis and design methodology
 
Decision Support System - Management Information System
Decision Support System - Management Information SystemDecision Support System - Management Information System
Decision Support System - Management Information System
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Mis & Decision Making
Mis & Decision MakingMis & Decision Making
Mis & Decision Making
 
Mis notes
Mis notesMis notes
Mis notes
 
Decision making and mis
Decision making and misDecision making and mis
Decision making and mis
 
Ppt Slides On Tps,Dps & Eps
Ppt Slides On Tps,Dps & EpsPpt Slides On Tps,Dps & Eps
Ppt Slides On Tps,Dps & Eps
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systems
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)System Development Life Cycle (SDLC)
System Development Life Cycle (SDLC)
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
Executive information system ( eis )
Executive information system ( eis )Executive information system ( eis )
Executive information system ( eis )
 
System concepts, elements and types of systems ppt
System concepts, elements and types of systems pptSystem concepts, elements and types of systems ppt
System concepts, elements and types of systems ppt
 
2. information system
2. information system2. information system
2. information system
 
introduction to management information systems (MIS)
introduction to management information systems (MIS)introduction to management information systems (MIS)
introduction to management information systems (MIS)
 
Information system
Information systemInformation system
Information system
 
GDSS Group Decision Support System
GDSS Group Decision Support SystemGDSS Group Decision Support System
GDSS Group Decision Support System
 
System concept in MIS
System concept in MISSystem concept in MIS
System concept in MIS
 
Unit 1 Introduction to MIS, MIS & Data Mining , MIS & Decision Making
Unit  1 Introduction to MIS, MIS & Data Mining , MIS & Decision MakingUnit  1 Introduction to MIS, MIS & Data Mining , MIS & Decision Making
Unit 1 Introduction to MIS, MIS & Data Mining , MIS & Decision Making
 
Six major types of information systems
Six major types of information systemsSix major types of information systems
Six major types of information systems
 

Similar to Information system implementation, change management and control

CHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptxCHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptxrajalakshmi5921
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docxjoellemurphey
 
Planning, design and implementation of information systems
Planning, design and implementation of information systemsPlanning, design and implementation of information systems
Planning, design and implementation of information systemsOnline
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for SecurityTripwire
 
Information Systems Life Cycle
Information Systems Life CycleInformation Systems Life Cycle
Information Systems Life Cycle4goggas
 
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...kndnewguade
 
Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014Md Imran
 
1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System ImplementatBenitoSumpter862
 
1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System ImplementatSantosConleyha
 
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in PharmacyVedika Narvekar
 
System development life cycle
System development life cycleSystem development life cycle
System development life cyclenayriehl
 

Similar to Information system implementation, change management and control (20)

CHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptxCHANGE MANAGEMENT PROCESS.pptx
CHANGE MANAGEMENT PROCESS.pptx
 
SAD_SDLC.pptx
SAD_SDLC.pptxSAD_SDLC.pptx
SAD_SDLC.pptx
 
Sdlc1
Sdlc1Sdlc1
Sdlc1
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
 
Information system
Information systemInformation system
Information system
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
Presentation2
Presentation2Presentation2
Presentation2
 
Planning, design and implementation of information systems
Planning, design and implementation of information systemsPlanning, design and implementation of information systems
Planning, design and implementation of information systems
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
Information System (IS) life cycle.pptx
Information System (IS) life cycle.pptxInformation System (IS) life cycle.pptx
Information System (IS) life cycle.pptx
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for Security
 
Gr 6 sdlc models
Gr 6   sdlc modelsGr 6   sdlc models
Gr 6 sdlc models
 
Information Systems Life Cycle
Information Systems Life CycleInformation Systems Life Cycle
Information Systems Life Cycle
 
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
 
Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014
 
Sdlc
SdlcSdlc
Sdlc
 
1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat
 
1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat
 
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
 
System development life cycle
System development life cycleSystem development life cycle
System development life cycle
 

More from Shruti Pendharkar

case study: - taking over dad's business
case study: - taking over dad's businesscase study: - taking over dad's business
case study: - taking over dad's businessShruti Pendharkar
 
Computer generation and language translator
Computer generation and language translatorComputer generation and language translator
Computer generation and language translatorShruti Pendharkar
 
Organizational Behavior : Learning
Organizational Behavior : Learning Organizational Behavior : Learning
Organizational Behavior : Learning Shruti Pendharkar
 
Case Study: Soybean milk - As an alternative
Case Study: Soybean milk - As an alternativeCase Study: Soybean milk - As an alternative
Case Study: Soybean milk - As an alternativeShruti Pendharkar
 
Downsizing, rightsizing, smartsizing
Downsizing, rightsizing, smartsizingDownsizing, rightsizing, smartsizing
Downsizing, rightsizing, smartsizingShruti Pendharkar
 
Stock prices as economic indiactor
Stock prices as economic indiactorStock prices as economic indiactor
Stock prices as economic indiactorShruti Pendharkar
 
Project management and control
Project management and controlProject management and control
Project management and controlShruti Pendharkar
 
Business law company act 1956
Business law company act 1956Business law company act 1956
Business law company act 1956Shruti Pendharkar
 

More from Shruti Pendharkar (11)

case study: - taking over dad's business
case study: - taking over dad's businesscase study: - taking over dad's business
case study: - taking over dad's business
 
Computer generation and language translator
Computer generation and language translatorComputer generation and language translator
Computer generation and language translator
 
Brand Personality
Brand PersonalityBrand Personality
Brand Personality
 
Organizational Behavior : Learning
Organizational Behavior : Learning Organizational Behavior : Learning
Organizational Behavior : Learning
 
Case Study: Soybean milk - As an alternative
Case Study: Soybean milk - As an alternativeCase Study: Soybean milk - As an alternative
Case Study: Soybean milk - As an alternative
 
Psychographics
PsychographicsPsychographics
Psychographics
 
Downsizing, rightsizing, smartsizing
Downsizing, rightsizing, smartsizingDownsizing, rightsizing, smartsizing
Downsizing, rightsizing, smartsizing
 
Consumer credit
Consumer creditConsumer credit
Consumer credit
 
Stock prices as economic indiactor
Stock prices as economic indiactorStock prices as economic indiactor
Stock prices as economic indiactor
 
Project management and control
Project management and controlProject management and control
Project management and control
 
Business law company act 1956
Business law company act 1956Business law company act 1956
Business law company act 1956
 

Recently uploaded

ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 

Recently uploaded (20)

FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 

Information system implementation, change management and control

  • 2. CONTENTS 1. Information system implementation 2. Change Management 3. Control in information system
  • 4. SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)  Development of information system undergoes 5 stages, System Maintenance System Implementation System Design System Analysis System Investigation
  • 5. CONCEPT OF IMPLEMENTATION  Implementation means constructing and putting the new system into operation.  Creation of system based on analysis and design document.  Implementation refers to all of the organizational activities working towards the ,  Adoption,  Management, and  Routinization of an innovation.  Implementation activities are needed to transform a newly developed IS into an operational system for end users.
  • 7. IMPLEMENTATION PROCESS  Implementation is a process of  Coding,  Testing,  Installation,  Documentation,  Training, and  Support.  These steps are based on the design specification.  All the requirements of the system, such as input, processing, output equipment etc. are provided by design specification.
  • 8. Planning Acquisition of facilities and space planning MIS Organization & Procedure Development Acquisition of Hardware & Software Coding Testing Creating Forms & Database Documentation User Training Installation / Conversion
  • 9. PLANNING THE IMPLEMENTATION  Pre-implementation activity.  Activities required are identified and sequenced accordingly.  Time and cost estimation for each activities are being made.  Plan and implementation schedule are being made by system analyst using various tools like Gantt charts, network diagrams etc.
  • 10. ACQUISITIONS OF FACILITIES AND SPACE PLANNING  The IS to be implemented may be for,  This requires acquisition of facilities like office, computer room, computer library etc.  Proper estimation of floor space requirement and roughs layouts are to be prepared by MIS manager. • Where no old system is in existence • New systems are to be implemented New organization • Information system needs to be modified to great extent • New system needs to be developed Existing organization
  • 11. ACQUISITION OF HARDWARE & SOFTWARE  Large business firms or government agencies formalize there hardware and software requirements by listing them in a document called RFP (Request for proposal) or RFQ (Request for quotation). Business Firms Vendor RFQ Purchase Agreement
  • 12. CODING & TESTING  Physical design created by the system designer team are turned into working computer code by the programming team.  Depending on the size and complexity of the system, coding can be an involved, intensive activity.  Immediately after coding process has begun, testing can be started.  System testing involves,  Testing and debugging software,  Testing Website performance, and  Testing new hardware.  It’s important part is, review of prototype of displays, reports and other output.
  • 13. DOCUMENTATION  There are 2 types of documentation: - System Documentation For maintenance programmers or technical persons Detailed information about system’s design specification, it’s internal working and its functionality User Documentation For Users Consist of written or other visual information about an application system, how it works and how to use it.
  • 14. USER TRAINING  Educate and train management, end users, customers, and other business stakeholder.  Proper user training is an important factor in promoting the required culture and thus ensuring the acceptance of new system.  METHODS AND AIDS OF TRAINING: - Training Programe Seminars User Manuals Help Screens
  • 15. INSTALLATION / CONVERSION  Installation or changeover is the event of switch-over from the old system to the new system, which takes place after the system is tested and found reliable.  In new organization, there are no old systems to replace, so for fresh implementation, new developed and tested systems are installed as it is.  In existing organizations, old systems are replaced with the new developed systems.  So for replacement implementation, there are 4 conversion methods.
  • 16. CONVERSION METHODS DIRECT CONVERSION  Slam Dunk or Cold-turkey strategy.  Old system is completely dropped out, and new system is turned on in its place.  Least expensive  High risk of failure  Should be considered only in extreme circumstances. PARALLEL CONVERSION  Old system is not dropped out at once, Both old and new systems are simultaneously operated.  Until the end-users and project coordinators are fully satisfied that the new system is functioning correctly.  Highly expensive  Least risky Old System New System Old System New System
  • 17. PILOT CONVERSION  Modular Approach  Use where the new system is to be installed in multiple locations.  It allows for conversion to the new system, either a direct or parallel method, at a single location.  Less risky in terms of any loss of time or delay in processing. PHASE-IN CONVERSION  Gradual Conversion or Cutover by segments.  The new system is implemented in many phase. Each phase is carried out only after successful implementation of previous phase.  Very less risk is involved.  Prolonged process. New SystemOld System New SystemOld System
  • 19. ORAGANIZATIONAL CHANGE  Implementation of IS may result in many changes in organizations.  POTENTIAL AREAS OF IMPACT: -  Organizational Structure  Centralization of Authority  Job Content  Relationships  Resistance to change
  • 20. CONCEPT OF CHANGE MANAGEMENT  Information system development and implementation projects often tend to end in failure.  changes are difficult to predict, and tend to occur with growing frequency, change management is becoming an increasingly significant subject.  Change management involves analyzing and defining all changes facing the organization, and developing programs to reduce the risks and costs, and to maximize the benefits of change.  It is a structured, disciplined approach that facilitates the adoption of new and modified of various groups and individual within the system.
  • 21. KEY DIMENSIONS OF CHANGE MANAGEMENT
  • 22. CHANGE MANAGEMENT PROCESS  The change management process is the sequence of steps or activities that a change management team or project leader would follow to apply change management to a project or change. a change management process that contains the following three parts.:  Preparing for change (Preparation, assessment and strategy development)  Managing change (Detailed planning and change management implementation)  Reinforcing change (Data gathering, corrective action and recognition)
  • 23.
  • 25. CONTROL IN INFORMATION SYSTEM  To ensure secure and efficient operation of information systems, an organization institutes a set of procedures and technological measures called controls.  Implemented through: -  Policies  Procedures  Standards  Control must be thought about through all stages of information systems analysis, construction and maintenance.
  • 26. TYPES OF CONTROL  Physical Controls: -  It refer to the protection of computer facilities and other IS resources. This includes protecting computer hardware, computer software, database, computer networks.etc  Technical Controls: -  controls which are implemented in the application of IS itself. These types of controls include access controls, data security controls, communication controls etc.  Administrative Controls: -  controls which include clear guidelines, policies of the organisations with regards to the use and deployment of IS resources are very important in protecting ISs.  For example: - email policy, internet use policy, access privileges of employees,
  • 27.  General Controls: -  These controls are implemented so as to ensure that ISs are protected from Various potential threats.  For example: - system development controls like budgeting, schedule, quality etc.  Application Controls: -  the application controls, as the name implies, are embedded within the application itself. These controls are usually written as validation rules. These controls are popularly known as input controls, processing controls, and output controls.
  • 28. IS SECURITY THREATS 1. Human errors/failures: - unintentional errors made by authorised user. 2. Manipulation of data/systems: - deliberate acts of some persons or organisations, designed to harm the data or information systems of an organisation. 3. Theft of data/systems: - deliberate attempt of some person to steal the important data of an organisation. 4. Destruction from virus: - A Virus is computer code that has been inserted into a piece of software. Upon execution of the software the virus is also executed. 5. Natural disasters: - forces of nature that cannot be prevented or controlled. Such as fire, flood, earthquake, Lightning etc.
  • 29. IS STRATEGIES 1. Preventive strategy: - controls that would help prevent errors from occurring, deter criminals from attacking the system, and deny access to unauthorised people. 2. Detection strategy: - It may not be feasible to prevent the IS systems from all hazards, cause it’ll only detect the threat. 3. Minimum losses strategy: - minimising of losses once a threat has happened. 4. Recovery strategy: - A recovery plan, that explains how to fix a damaged information system as quickly as possible, must be in place. 5. Corrective action strategy: - The damaged system must be corrected immediately so as to prevent the problem form occurring again.