“Implementing a new information system into an organizational context is not a mechanical process. The organizational context has been shaped and reshaped by the people who work in the organization. The work habits, beliefs, interrelationships, and personal goals of an organization’s members all affect the implementation process. Although factors important to successful implementation have been identified, there are no sure recipes you can follow. During implementation, you must be attuned to key aspects of the organizational context, such as history, politics, and environmental demands—aspects that can contribute to implementation failure if ignored.” (Modern Systems Analysis and Design, 8th ed, Joseph Valacich)
Objectives:
- Provide an overview of the system implementation process.
- Describe how software applications are tested.
- Apply four installation strategies: direct, parallel, single-location, and phased installation.
- List the deliverables for documenting the system and for training and supporting users.
- Explain why system implementation sometimes fails.
- Describe the threats to system security and remedies that can be applied.
- Show how traditional implementation issues apply to electronic commerce applications.
Topics:
From Modern Systems Analysis and Design:
13. System Implementation
13.1. Application Testing
13.1.1. Test Types
13.1.2. Testing Process
13.1.3. Coding/Testing
13.1.4. Acceptance Testing
13.2. Installation
13.2.1. Direct
13.2.2. Parallel
13.2.3. Pilot
13.2.4. Phased
13.2.5. Planning Installation
13.3. Documentation
13.4. Training
13.5. Support
From CISA:
3.1.1. IS Auditor’s Role in SDLC Project Management
3.1.2. Software Development Methods
3.1.2.1. Prototyping
3.1.2.2. Rapid Application Development
3.1.2.3. Agile Development
3.1.2.4. Object Oriented System Development
3.1.2.5. Component Based Development
3.1.2.6. Web Based Application Development
3.1.2.7. Software Reengineering
3.1.2.8. Reverse Engineering
3.1.2.9. DevOps
3.1.2.10. Business Process Reengineering and Process Change
3.1.2.10.1. Benchmarking Process
3.1.2.10.2. IS Auditors Role in Business Process Reengineering
3.1.3. System Development Tools and Productivity Aids
3.1.3.1. Computer Aided Software Engineering
3.1.3.2. Code Generators
3.1.3.3. Fourth Generation Languages
3.1.3.3.1. Query and Report Generators
3.1.3.3.2. Embedded Databases
3.1.3.3.3. Relational Databases
3.1.3.3.4. Application Generators
3.1.3.3.5. Characteristics:
3.1.3.3.5.1. Nonprocedural
3.1.3.3.5.2. Environmental Independence
3.1.3.3.5.3. Software Facilities
3.1.3.3.5.4. Programmer Workbench Concepts
3.1.3.3.5.5. Simple Language Subsets
3.2. Control Identification and Design
3.2.1. Input/Origination Controls
3.2.1.1. Input Authorization
3.2.1.2. Batch Controls and Balancing
3.2.1.3. Error Reporting and Handling
3.2.2. Processing Procedures and Controls
3.2.2.1. Data Validation and Editing Procedures
3.2.2.2. Processing Controls
3.2.2.3. Data File Control Procedures
3.2.3. Output Controls
3.2.4. Application Controls
3.2.4.1. IS Auditor’s Role in Reviewing Application Controls
3.2.5. User Procedures
3.1. System Development Methodologies
3.1.1. SDLC Phases
3.1.1.1. Implementation
3.1.1.1.1. Configuration
3.1.1.1.2. Development
3.1.1.1.2.1. Programming Methods and Techniques
3.1.1.1.2.2. Integrated Development Environment
3.1.1.1.2.3. Programming Languages
3.1.1.1.2.4. Program Debugging
3.1.1.2. Testing and Implementation
3.1.1.3. Post Implementation Review
3.5. Testing Methodologies3.5.2. Software Testing
3.5.2.1. Bottom Up
3.5.2.2. Top Down
3.5.3. Data Integrity Testing
3.5.3.1. Referential Integrity Testing
3.5.3.2. Online Transaction Processing Systems
3.5.3.2.1. Atomicity
3.5.3.2.2. Consistency
3.5.3.2.3. Isolation
3.5.3.2.4. Durability
3.5.4. Application Systems Testing
3.5.5. IS Auditor’s Role in Information Systems Testing
3.6. Configuration and Release Management
3.7. System Migration, Infrastructure Deployment and Data Conversion
3.7.1. Data Migration
3.7.1.1. Refining Migration Scenerio
3.7.1.2. Fallback (Rollback)
3.7.2. Changeover (Go-Live or Cutover) Techniques
3.7.2.1. Parallel
3.7.2.2. Phased
3.7.2.3. Abrupt
3.7.3. System Implementation
3.7.3.1. Implementation Planning
3.7.4. System Change Procedures and the Program Migration Process
3.7.4.1. Critical Success Factors
3.7.4.2. End User Training
3.7.5. System Software Implementation
3.7.6. Certification/Accreditation
3.8. Post Implementation Review
3.8.1.1. IS Auditor’s Role in Post Implementation Review
3.5.1. Testing Classifications
3.5.1.1. Unit Testing
3.5.1.2. Interface or Integration Testing
3.5.1.3. System Testing
3.5.1.4. Final Acceptance Testing
3.5.1.5. Others:
3.5.1.5.1. Alpha/Beta
3.5.1.5.2. Pilot
3.5.1.5.3. White Box
3.5.1.5.4. Black Box
3.5.1.5.5. Functional/Validation
3.5.1.5.6. Regression
3.5.1.5.7. Parallel
3.5.1.5.8. Sociability
From Secure Software Design
1.3. Security and Architectures
1.3.1. Monolithic Systems
1.3.2. 2-Tier
1.3.3. 3-Tier
1.3.4. N-Tier
1.3.5. Distributed Systems
1.3.6. Cloud
In this unit, plan to:
- Participate in the class discussion thread
- Read the assigned topics in CISA
- Read chapter 13 in Modern Systems Analysis and Design