{"id":358,"date":"2020-01-08T20:28:29","date_gmt":"2020-01-09T01:28:29","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/?page_id=358"},"modified":"2020-01-10T20:55:30","modified_gmt":"2020-01-11T01:55:30","slug":"13-development-testing","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/13-development-testing\/","title":{"rendered":"13 &#8211; Development &amp; Testing"},"content":{"rendered":"<p style=\"padding-left: 40px\"><em style=\"font-size: 16px\">&#8220;Implementing a new information system into an organizational context is not a mechanical process. The organizational context has been shaped and reshaped by the people who work in the organization. The work habits, beliefs, interrelationships, and personal goals of an organization\u2019s members all affect the implementation process. Although factors important to successful implementation have been identified, there are no sure recipes you can follow. During implementation, you must be attuned to key aspects of the organizational context, such as history, politics, and environmental demands\u2014aspects that can contribute to implementation failure if ignored.&#8221;\u00a0 (<\/em><span style=\"font-size: 16px\">Modern Systems Analysis and Design, 8th ed, Joseph Valacich)<\/span><\/p>\n<h3>Objectives:<\/h3>\n<ul>\n<li id=\"P700049888900000000000000000DDF9\" data-uri=\"M03_VALA4925_08_SE_C03.xhtml#P700049888900000000000000000DDF9\">Provide an overview of the system implementation process.<\/li>\n<li data-uri=\"M03_VALA4925_08_SE_C03.xhtml#P700049888900000000000000000DDF9\">Describe how software applications are tested.<\/li>\n<li data-uri=\"M03_VALA4925_08_SE_C03.xhtml#P700049888900000000000000000DDF9\">Apply four installation strategies: direct, parallel, single-location, and phased installation.<\/li>\n<li data-uri=\"M03_VALA4925_08_SE_C03.xhtml#P700049888900000000000000000DDF9\">List the deliverables for documenting the system and for training and supporting users.<\/li>\n<li data-uri=\"M03_VALA4925_08_SE_C03.xhtml#P700049888900000000000000000DDF9\">Explain why system implementation sometimes fails.<\/li>\n<li data-uri=\"M03_VALA4925_08_SE_C03.xhtml#P700049888900000000000000000DDF9\">Describe the threats to system security and remedies that can be applied.<\/li>\n<li data-uri=\"M03_VALA4925_08_SE_C03.xhtml#P700049888900000000000000000DDF9\">Show how traditional implementation issues apply to electronic commerce applications.<\/li>\n<\/ul>\n<h3>Topics:<\/h3>\n<h5 style=\"padding-left: 40px\"><em>From Modern Systems Analysis and Design:<\/em><\/h5>\n<p style=\"padding-left: 40px\">13. System Implementation<br \/>\n13.1. Application Testing<br \/>\n13.1.1. Test Types<br \/>\n13.1.2. Testing Process<br \/>\n13.1.3. Coding\/Testing<br \/>\n13.1.4. Acceptance Testing<br \/>\n13.2. Installation<br \/>\n13.2.1. Direct<br \/>\n13.2.2. Parallel<br \/>\n13.2.3. Pilot<br \/>\n13.2.4. Phased<br \/>\n13.2.5. Planning Installation<br \/>\n13.3. Documentation<br \/>\n13.4. Training<br \/>\n13.5. Support<\/p>\n<h5 style=\"padding-left: 40px\"><em>From CISA:<\/em><\/h5>\n<p style=\"padding-left: 40px\">3.1.1. IS Auditor\u2019s Role in SDLC Project Management<br \/>\n3.1.2. Software Development Methods<br \/>\n3.1.2.1. Prototyping<br \/>\n3.1.2.2. Rapid Application Development<br \/>\n3.1.2.3. Agile Development<br \/>\n3.1.2.4. Object Oriented System Development<br \/>\n3.1.2.5. Component Based Development<br \/>\n3.1.2.6. Web Based Application Development<br \/>\n3.1.2.7. Software Reengineering<br \/>\n3.1.2.8. Reverse Engineering<br \/>\n3.1.2.9. DevOps<br \/>\n3.1.2.10. Business Process Reengineering and Process Change<br \/>\n3.1.2.10.1. Benchmarking Process<br \/>\n3.1.2.10.2. IS Auditors Role in Business Process Reengineering<br \/>\n3.1.3. System Development Tools and Productivity Aids<br \/>\n3.1.3.1. Computer Aided Software Engineering<br \/>\n3.1.3.2. Code Generators<br \/>\n3.1.3.3. Fourth Generation Languages<br \/>\n3.1.3.3.1. Query and Report Generators<br \/>\n3.1.3.3.2. Embedded Databases<br \/>\n3.1.3.3.3. Relational Databases<br \/>\n3.1.3.3.4. Application Generators<br \/>\n3.1.3.3.5. Characteristics:<br \/>\n3.1.3.3.5.1. Nonprocedural<br \/>\n3.1.3.3.5.2. Environmental Independence<br \/>\n3.1.3.3.5.3. Software Facilities<br \/>\n3.1.3.3.5.4. Programmer Workbench Concepts<br \/>\n3.1.3.3.5.5. Simple Language Subsets<br \/>\n3.2. Control Identification and Design<br \/>\n3.2.1. Input\/Origination Controls<br \/>\n3.2.1.1. Input Authorization<br \/>\n3.2.1.2. Batch Controls and Balancing<br \/>\n3.2.1.3. Error Reporting and Handling<br \/>\n3.2.2. Processing Procedures and Controls<br \/>\n3.2.2.1. Data Validation and Editing Procedures<br \/>\n3.2.2.2. Processing Controls<br \/>\n3.2.2.3. Data File Control Procedures<br \/>\n3.2.3. Output Controls<br \/>\n3.2.4. Application Controls<br \/>\n3.2.4.1. IS Auditor\u2019s Role in Reviewing Application Controls<br \/>\n3.2.5. User Procedures<br \/>\n3.1. System Development Methodologies<br \/>\n3.1.1. SDLC Phases<br \/>\n3.1.1.1. Implementation<br \/>\n3.1.1.1.1. Configuration<br \/>\n3.1.1.1.2. Development<br \/>\n3.1.1.1.2.1. Programming Methods and Techniques<br \/>\n3.1.1.1.2.2. Integrated Development Environment<br \/>\n3.1.1.1.2.3. Programming Languages<br \/>\n3.1.1.1.2.4. Program Debugging<br \/>\n3.1.1.2. Testing and Implementation<br \/>\n3.1.1.3. Post Implementation Review<br \/>\n3.5. Testing Methodologies3.5.2. Software Testing<br \/>\n3.5.2.1. Bottom Up<br \/>\n3.5.2.2. Top Down<br \/>\n3.5.3. Data Integrity Testing<br \/>\n3.5.3.1. Referential Integrity Testing<br \/>\n3.5.3.2. Online Transaction Processing Systems<br \/>\n3.5.3.2.1. Atomicity<br \/>\n3.5.3.2.2. Consistency<br \/>\n3.5.3.2.3. Isolation<br \/>\n3.5.3.2.4. Durability<br \/>\n3.5.4. Application Systems Testing<br \/>\n3.5.5. IS Auditor\u2019s Role in Information Systems Testing<br \/>\n3.6. Configuration and Release Management<br \/>\n3.7. System Migration, Infrastructure Deployment and Data Conversion<br \/>\n3.7.1. Data Migration<br \/>\n3.7.1.1. Refining Migration Scenerio<br \/>\n3.7.1.2. Fallback (Rollback)<br \/>\n3.7.2. Changeover (Go-Live or Cutover) Techniques<br \/>\n3.7.2.1. Parallel<br \/>\n3.7.2.2. Phased<br \/>\n3.7.2.3. Abrupt<br \/>\n3.7.3. System Implementation<br \/>\n3.7.3.1. Implementation Planning<br \/>\n3.7.4. System Change Procedures and the Program Migration Process<br \/>\n3.7.4.1. Critical Success Factors<br \/>\n3.7.4.2. End User Training<br \/>\n3.7.5. System Software Implementation<br \/>\n3.7.6. Certification\/Accreditation<br \/>\n3.8. Post Implementation Review<br \/>\n3.8.1.1. IS Auditor\u2019s Role in Post Implementation Review<br \/>\n3.5.1. Testing Classifications<br \/>\n3.5.1.1. Unit Testing<br \/>\n3.5.1.2. Interface or Integration Testing<br \/>\n3.5.1.3. System Testing<br \/>\n3.5.1.4. Final Acceptance Testing<br \/>\n3.5.1.5. Others:<br \/>\n3.5.1.5.1. Alpha\/Beta<br \/>\n3.5.1.5.2. Pilot<br \/>\n3.5.1.5.3. White Box<br \/>\n3.5.1.5.4. Black Box<br \/>\n3.5.1.5.5. Functional\/Validation<br \/>\n3.5.1.5.6. Regression<br \/>\n3.5.1.5.7. Parallel<br \/>\n3.5.1.5.8. Sociability<\/p>\n<h5 style=\"padding-left: 40px\"><em>From Secure Software Design<\/em><\/h5>\n<p style=\"padding-left: 40px\">1.3. Security and Architectures<br \/>\n1.3.1. Monolithic Systems<br \/>\n1.3.2. 2-Tier<br \/>\n1.3.3. 3-Tier<br \/>\n1.3.4. N-Tier<br \/>\n1.3.5. Distributed Systems<br \/>\n1.3.6. Cloud<\/p>\n<h3>In this unit, plan to:<\/h3>\n<ul>\n<li>Participate in the class discussion thread<\/li>\n<li>Read the assigned topics in CISA<\/li>\n<li>Read chapter 13 in Modern Systems Analysis and Design<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Implementing a new information system into an organizational context is not a mechanical process. The organizational context has been shaped and reshaped by the people who work in the organization. The work habits, beliefs, interrelationships, and personal goals of an organization\u2019s members all affect the implementation process. Although factors important to successful implementation have been [&hellip;]<\/p>\n","protected":false},"author":8584,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-358","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/pages\/358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/users\/8584"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/comments?post=358"}],"version-history":[{"count":3,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/pages\/358\/revisions"}],"predecessor-version":[{"id":443,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/pages\/358\/revisions\/443"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/media?parent=358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}