Info3 Ict Revision Guide 1|Page Table of Contents Chapter One: Future Developments ....................................................................................................... 5 Emerging Technologies ....................................................................................................................... 5 Benefits to Leisure from Technology Advances .................................................................................. 6 Potential future uses of ICT ................................................................................................................ 7 Implications of future developments of ICT ....................................................................................... 7 Issues surrounding the rapid development of ICT .............................................................................. 7 Chapter 2: Information and Systems ...................................................................................................... 8 What is an organisation ...................................................................................................................... 8 Structure of an organisation ............................................................................................................... 9 Pyramid Structures ............................................................................................................................. 9 Horizontal Structures .......................................................................................................................... 9 How has the development of ICT affected the organisational structure ......................................... 10 Activities within an organisation....................................................................................................... 10 Strategic Level of task ....................................................................................................................... 10 Tactical level of task .......................................................................................................................... 10 Operational Level of Task.................................................................................................................. 10 Exchanging Information with External Bodies .................................................................................. 11 Chapter 3: Types of ICT system ............................................................................................................. 12 Common Ict Systems......................................................................................................................... 12 Legacy Systems ................................................................................................................................. 12 Back office systems ........................................................................................................................... 12 Day-to-day working systems ............................................................................................................. 13 Management Information Systems .................................................................................................. 13 Enterprise resource planning systems .............................................................................................. 13 Customer Relationship Management Systems ................................................................................. 13 Decision Support Systems ................................................................................................................. 14 Ecommerce systems ......................................................................................................................... 14 Chapter 4: Managing ICT....................................................................................................................... 15 Organisation Size .............................................................................................................................. 15 Information Flow .............................................................................................................................. 15 ICT management and business strategy ........................................................................................... 16 2|Page Chapter 5 ICT Strategy .......................................................................................................................... 16 Factors Influencing a Strategy........................................................................................................... 16 Managing Information Assets over time .......................................................................................... 16 The Need for a Corporate Strategy ................................................................................................... 17 Upgrading Hardware & software ...................................................................................................... 17 Standards .......................................................................................................................................... 17 Chapter 6: ICT Policies........................................................................................................................... 18 Ict Training Policy .............................................................................................................................. 18 ICT security Policy ............................................................................................................................. 18 ICT procurement Policy ..................................................................................................................... 19 Chapter 7: Legislation ........................................................................................................................... 20 Impact of Legislation on ICT policies ................................................................................................. 20 Developed Legislation ....................................................................................................................... 20 Copyright Designs and Patent Act 1988............................................................................................ 22 Software theft ................................................................................................................................... 22 Health and Safety Legislation............................................................................................................ 22 Freedom of Information Act ............................................................................................................. 22 Chapter 8: Developing ICT Solutions..................................................................................................... 23 Factors Contributing to a Successful Development .......................................................................... 23 Factors that Contribute to an unsuccessful Development ............................................................... 24 Chapter 9: Developing Methods ........................................................................................................... 24 Systems Development Life Cycle ...................................................................................................... 24 The Need for Systematic Formal Methods: Project Management ................................................... 26 Development Methodologies ........................................................................................................... 27 Chapter 10: Techniques & Tools for System Development .................................................................. 28 Business Process Modelling Tools..................................................................................................... 28 Data Modelling Tools ........................................................................................................................ 28 Techniques for Testing ...................................................................................................................... 29 Chapter 11: Introducing large ICT systems into organisations ............................................................. 30 Reliability & Testing .......................................................................................................................... 30 User Acceptance Testing ................................................................................................................... 30 Testing Network Systems.................................................................................................................. 30 Installation ........................................................................................................................................ 31 Documentation ................................................................................................................................. 31 3|Page Maintenance ..................................................................................................................................... 31 Chapter 12: Backup & Recovery ........................................................................................................... 33 Backup & Recovery Strategy ............................................................................................................. 33 Online backup ................................................................................................................................... 34 Risk Analysis ...................................................................................................................................... 34 Data recovery Plan ............................................................................................................................ 34 Disaster Recovery & Contingency Planning ...................................................................................... 34 Planning for Recovery from Disaster ................................................................................................ 35 Contents of a contingency Plan ........................................................................................................ 35 Options for recovery ......................................................................................................................... 36 Chapter 13; Training Users.................................................................................................................... 37 Types of Training & Methods ............................................................................................................ 37 Chapter 14; Supporting Users ............................................................................................................... 38 Support Options for Industry Standard Packages ............................................................................. 40 Documentation ................................................................................................................................. 40 Factors to consider when choosing a support option ...................................................................... 40 Chapter 15: External & internal Resources ........................................................................................... 41 Using external services and support ................................................................................................. 41 Ways of obtaining services ............................................................................................................... 41 Managing internal resources ............................................................................................................ 42 Pre-Release ........................................................................................................................................... 43 The Vision .......................................................................................................................................... 43 Key quotes about the task ................................................................................................................ 43 Team Hope ........................................................................................................................................ 43 Team Endurance ............................................................................................................................... 44 Pre release notes .............................................................................................................................. 45 Chapter 15; Internal & External Resources.............................................. Error! Bookmark not defined. 4|Page Chapter One: Future Developments Emerging Technologies Personal Digital Assistants: a device acting as an electronic organise, easy to use and can share information with a PC. A PDA can be used for Personal Information Management: keeping calendars and managing appointments/ appointments. Global- Positioning System (GPS devices). Smart Phones: a small device that combines mobile phones & PDA’s. It can run applications, use PIM systems, email and use word processing. Some smartphones have WI-FI. Mobile Dongles: allow people to use the internet on the go via a USB. VOIP: Leading to an increased amount of office workers working from home, allows for conference calls 5|Page Benefits to Leisure from Technology Advances Digital Photography: Storage and printing of photos using a computer. Taking photos on mobile phones, the quality has improved through the development of megapixels. Photos can be deleted: costly using a disposable camera using film. Image processing software packages: Modification of images, changing the brightness, removing red-eye. Faster Processing speeds: Gaming & Instant messaging Music: Downloads via the internet, Streaming. The sound is in wave or analogue form; the digital data needs to be converted into analogue form and then amplified via a speaker. This conversion is carried out by the sound card; it’s quality is determined by the sampling rate (the number of times a second that a measurement of the sound wave is made and stored as a number). 6|Page Potential future uses of ICT The move towards ICT-Based techniques of identification is likely to grow in the future. Already, many passports contain encoded biometric data of facial characteristics. Fingertip identification is used to register pupils in some schools. More and more services are provided online; an increasing percentage of the population makes the use of these services as a matter of routine. The potential of the internet provides a challenge to businesses large & small. Implications of future developments of ICT Issues surrounding the rapid development of ICT Social Digital Divide: people getting left behind due to lack of skills & resourced. The digital divide is between the rich & poor, physically unable & able, old & the young and different economic backgrounds. People missing out on information because of the use of post instead of emailing. Online job applications Exposure to violent video games Legal Data Rights management: is a set of technologies that allows copyright owners of media to ensure they get paid for the use of their property. DRM uses encryption to protect the content and authentication systems to make sure that only authorised users are able to decrypt the files. Data transmitted over the internet is scrambled 7|Page and can’t be read by any one who does not have the correct key. This allows files to be sold online and helps prevent piracy. Technical A greater range of skills is required at different levels. These skills quickly become outdated and people need retraining. How technological advances help businesses meet business objectives. Older versions of software packages quickly become obsolete. Ethical Movements can now be tracked via phones & CCTV ISP’s store the recipient’s address, subject line and exact time an email was sent Government can track all this information: breech of freedom Phorm: Records a users browsing habits and targets audience with advertisements Economic Businesses need to keep up to date to remain competitive, this is costly. Offshoring & cheap labour Environmental Growth in phone masts: Some people believe this is a health hazard Rising level of Co2 emissions, renewable energy. How previous technology is disposed of or recycled: pressure on businesses Chapter 2: Information and Systems What is an organisation An organisation is a group of people with a specific purpose. Activities and tasks are allocated to staff depending on their roles and skills. This allocation of tasks is called the division of labour. It allows people to specialise and develop their own knowledge & expertise in a particular group of tasks. Information needs depend on; Type or structure Scale of the organisation: Global companies have issues with the national boundries. Nature of the organisation: Banks, schools, authorities need different information. Management style of the organisation: Autocratic (Detailed breakdowns) & democratic management ( Employee participation) Tasks in the organisation 8|Page Structure of an organisation Structures determine who is responsible to who, who can make which type of decision & allow staff to co-ordinate/control their staff; the structure can be presented within an organisation chart Span of control: The number of employees who are directly supervised by one person. Too wide a span of control leads to lack of control & inefficiency. Chain of command: The path through the levels of management. Instructions go down the level of authority and problems are referred up the lines to higher levels. Long lines of communication mean messages can be distorted and take time to reach their destination. Pyramid Structures The pyramid structure is the traditional shape of a structure within a large business. Roles are clearly defined in a number of layers. At the top is the managing director or chief executive, further down are the floor staffs: suitable for centralised decision making by senior staff. Advantages Clearly defined authority & responsibility Effective use of specialist managers Employees loyal to their department Disadvantages Long time to make & implement decisions Poor communication across sections Senior staff remote from the lower levels Horizontal Structures These structures have fewer layers and a wider span of control. People within this structure are directly answerable to the managing director and decision making power may be delegated. Advantages Greater communication between management and workers 9|Page Less burocracy & easier decision making Employees have more responsibility: more motivation There are lower costs associated with fewer management levels Disadvantages Specialisation: departments may have little to do with each other Managers can be responsible for several departments and their role isn’t always clear Control of top management could be weakened as they may have too wide a span of control Fewer levels of management usually mean that there are fewer prospects of promotion How has the development of ICT affected the organisational structure Ict has lead to a flatter structure in order for the business to be able to cope with the rapid & dynamic changes ICT brings. Ict has also helped provide managers with the information needed to more easily monitor staff performance and in some cases ICT has eliminated particular jobs. Middle management jobs have also been eroded. Activities within an organisation Ordering systems: Allow businesses to manage the distribution of goods from supplier to customer in an automated way which saves time & minimises overheads. Track order systems allow management to manage & track orders from their desktops. Customer support: Consumers have high expectations and good future support can boost sales. To boost sales a business needs to provide information on a range of matters i.e. past orders to respond to queries & complains. Strategic Level of task This is the highest level, it consists of upper management. Strategy is the long term planning and major decision making i.e. whether to open a new factory or move location. A management information system can produce projectioernal and external, that relate to the business. The nature of strategic management means that the information that is required at this can be very varied in content & timing. One off information may be needed. Tactical level of task This consists of middle management; tactical decisions include which training courses to offer staff & timetable issues. Tactical staffs are likely to have a number of operational staff reporting to them: much of the information they need relates directly to the organisations performance. Operational Level of Task The operational level is the lowest level. This consists of the workforces who are making the product, taking orders and keeping accounts. These staff may be well qualified and are closely involved at the 10 | P a g e productive end of the operation: decisions may be to order new stock. The information they need must be in a high level of detail. Exchanging Information with External Bodies Customers/ suppliers= extranets showing stock levels, stock and prices. There will be issues of privacy and security along with this as the business will not want the person viewing the data to be able to edit it. Inland revenue= There are a range of taxes for which a company is liable including PAYE income tax payments for employees, VAT and Corporation tax that is paid by public limited companies on their profit Information Commissioner= all personal data held about a data subject under the data protection act 1998. Charity Commissioner= Any charity must register and submit published accounts 11 | P a g e Chapter 3: Types of ICT system Common Ict Systems Name Of the System & process Payroll System Can be outsourced or managed in house electronically/ manually Personnel systems Accounting Systems A computer system will be used, these can be purchased off the shelf (SAGE). Purpose Information Stored Output Calculates Payments= Salary, overtime, holiday, bonuses and Dedications= national insurance, tax, student loans The records and calculations needed to work out the payments and deductions for every employee of the business. Data on current employee’s skills, capabilities and salary. Some companies hold photos and driving licence certificates. Money coming in & out of the business listing dates and names. Each employee receives a payslip that itemises the payments and totals to make the gross income. The deductions are also itemised and subtracted to give the net income, this is paid to them. Statistics such as staff turnover and abscence, tracking employee development, supports administration courses. Deals with recruitment, induction, training, disciplining and the departure of staff. To keep formal accounts of financial transactions: to fulfil legal requirements, provide an overview to the management, keep track of money coming in & out and make sure the accounts reconcile. A detailed account which can be used by senior management to enable them to make appropriate decisions and highlight serious issues. Legacy Systems A legacy system is an existing system that is likely to have been used for many years, these are usually never replaced because To replace them would be expensive To replace them would be disruptive A new system would not improve the current system It is vital that any new system can link to legacy systems. Back office systems A system which runs the businesses administration processes which do not directly deal with customers. An example of a back office system is within a bank, inside a bank back office systems deal with tasks such as producing customer statements, calculating interest and updating stock records. The system could produce management information from the data that is stored. 12 | P a g e Day-to-day working systems A transaction processing system deals with the routine, day-to-day transactions of an organisation. They carry out repetitive, routine business activities such as the sale of goods recording the loan of books in a library or the sale of goods. As a transaction is carried out, the database records are updated before another transition is processed, this prevents double booking. Document approval workflow is when a document is passed between staff to be reviewed and approved: this is done with insurance claims. Document management system controls the flow, storage and retrieval of documents. Many organisations scan in and digitise all documents and store the digital record in a large database. The physical copies can be stored in a safe, off-site location as long as they are needed, or if they do not need to be kept they could be thrown away to save storage space. Accessing physical records can become a problem if they are misfiled; some important documents are given stickers that include transponders that allow a filling clerk to locate them. As more data is created and shared on a daily basis there is a great demand on keeping it sure and available. Links can be set up to make it easy to cross reference between documents. Management Information Systems These use operational level data to provide management level information. Within these data is combined from internal & external sources and presented in an easy-to-read format such as tables or graphs. This information is then used by senior management to make quick decisions at a strategic or tactical level. An MIS is usually based on one or more database and allows people at different levels to access appropriate information in an understandable form. An Executive information System is a form of MIS. This provides aggregated information for senior management. These have user-friendly, graphical interfaces. If a manager clicks on the information displayed they can dive deeper by using the hotspots. The information then presented often compares with previous years or estimated budgets. Enterprise resource planning systems This is an integrated suite of software applications which support and automate business processes. It may consist of modules dealing with manufacturing, shipping, finance, payroll etc. The modules depend on the nature of the business. This is back office software and is designed to improve overall business efficiency, reduce money tied in stock and lower costs. ERPS tie together all functions into one integrated system that has a common user interface. Customer Relationship Management Systems This allows a business to collect, update and maintain all its customer data in one centralised location. The information is accessible to everyone within a company who needs customer information. This information is up to date and can help improve customer service. The aim of installing this is to improve customer satisfaction, happy customers are likely to shop with the company again and recommend it to others: this reduces costs, wastage, complaints and better customer relations. 13 | P a g e Decision Support Systems This converts raw data into information that can be used to make high quality decisions and identify problems. A DSS is an interactive application that can provide him with information in a form that makes the process of decision-making easier. A DSS processes data from a business system and outputs it in an easily understandable form which can include an expert system. A form of DSS is an executive dashboard, business performance software allows a manager to make certain decisions very quickly by identifying negative trends and allocating resources appropriately. They tell the manager the key information needed to run the company. A Medical decision support system is used to assist doctors in making clinical decision and can improve the quality of medical care giving reliable diagnosis and treatment; this avoids errors that can be made by insufficient knowledge on behalf of the doctor. These decrease the cost of healthcare by giving a faster diagnosis and minimising the need for consultations with specialist doctors. Ecommerce systems Removes the possibility of double booking and means fewer staff is needed. Offers a wider pool of customers but postage needs to be paid. 14 | P a g e Chapter 4: Managing ICT Organisation Size Ict systems must be managed effectively if the organisation is to gain the most benefit from them. Usually small organisations have informal systems whereas large organisations have formal ones. The formal systems need to be carefully planned in advance and be strictly adhered to. Here is a typical structure; Managing Director Head of… Head of… Head of ICT services Head of management information systems Head of technical support Help Desk Manager Policies define how to put a strategy into action. Network Manager Information Flow This is the way information moves around an organisation. Formal information flow is the flow created by procedures of an organisation. I.e. internal memos, formal meetings, noticeboards and the company intranet. Informal information flow is not structured but is naturally arising within the organisation i.e. from phone calls, the office grapevine, stories in the local press, personal conversation. An increasing way of communicating is by sending a “global” mail list to every employee. If email is tied into proper procedures i.e. an agenda for a meeting then it is formal information. Another example of formal information is submitting stationary requests to the supplies department. 15 | P a g e ICT management and business strategy A large organisation is likely to have a chief information officer ad a member of the company’s executive. In a way, the CIO acts as a bridge between the business goals of the organisation and the implementation of the ICT solutions that are needed to see these goals. They will be instrumental in writing the strategy and overseeing the implementation within the budget. Chapter 5 ICT Strategy Factors Influencing a Strategy Managing Information Assets over time It is important to be able to predict any likely growth so that planning can be effective. Substantial growth may mean moving to a new building and employing new staff who will need to be provided with the appropriate equipment and network access. With a growing business, there will be an 16 | P a g e increased load of data needing to be managed to prevent a build-up and breach of the data protection act, here are a few options for data management; Deleting Records: taking into consideration later customer enquiries Archiving Records: Storing records offline. Expanding Storage space Unstructured data is data such as document files & emails: these need the same level of protection as other files. The Need for a Corporate Strategy Procurement is the acquisition of hardware at the best possible price for the use of an organisation. Hardware can be purchased outright or leased. This is important in achieving the objectives of an organisation and appropriate services can only be given with the appropriate hardware. Future proofing: Concerns finding ways of making sure a system has a reasonable life and does not need to be totally replaced too soon. Systems must be designed to cope with rapid growth and predicated change; changes in software, increased data storage. Upgrading Hardware & software Changes in available devices (Up to date) : flat screens Software improvements New software increases the need for more RAM and disk space Processing Speed Memory Capacity Enhanced transfer speed over a network Higher quality image or printing Standards A standard is a common way of doing something. Strategic choices concerning the purchase of hardware can be affected by standards. A company might decide to use standard formats for storing business documents so that they can easily exchange data with other organisations through Electronic data interchange. The ability to transfer data to and from another package or platform is known as portability. Without portability data would need to be re-typed which would lead to wasted time and errors. Portability can only exist if manufacturers agree to using standards: it is an important sales feature. 17 | P a g e Chapter 6: ICT Policies Ict Training Policy Continuing Professional Development (CPD) is a systematic updating and extending of skills and knowledge relating to the workplace. As the term CPD implies, development should continue throughout an individual’s career regardless of their age or role. The goal of CPD is to improve personal performance and enhance career progression. The training policy should fit in with other policies within the organisation. ICT training in a company needs to be planned and developed, based on its objectives. Training is a vulnerable to budget cutting as management sees it as an expensive luxury that has to be dropped when times are hard, This can lead to reduction in the amount of training altogether or management may look to deliver training in different ways i.e. e-learning. However, if strategy is successful it is important that decisions involving the ways in which training should be acquired fully take into account the needs of both the organisation and the individual employee. The training must also be planned to complement the installation of new hardware and software. New legislation may bring new training needs and these must be planned for in advance. New ventures within an organisation may also generate ICT training. These must also be identified early and planned for. All this can be done through appraisal. As employees are becoming more literate, so their training needs are changing over time. Many people are going to demand further ICT training to develop their skills further. 1. 2. 3. 4. 5. 6. 7. 8. Review the ICT skills gap- carry out a regular review Review an individual’s needs annually Encourage an atmosphere of on-going ICT learning within an organisation Build in-time for an employee to consolidate any new skills Ensure the organisation benefits As much as possible Take into consideration training costs to new hardware/software purchases Provide new employees with an induction to ICT systems Take immediate steps to replace any valuable ICT skills held by an employee leaving the organisation. ICT security Policy If an organisation does not have adequate security then its operations will be at risk. Knowledge and data are probably the most important aspects of any organisation. Companies must make sure that the confidentiality, integrity and availability of their data is maintained at all times; Who sees the data? Has it been corrupted? 18 | P a g e Can I access the data when I need it? External threats= hackers, illegal access, poor security The policy must aim to; Prevents misuse Detect misuse through regular checking Investigate misuse through monitoring software and audit trails Prevent unauthorised access Lay down staff responsibilities in the prevention of misuse Lay down disciplinary procedures for breaches of security The policy must be altered when new systems are introduced ICT procurement Policy The ways in which hardware and software is obtained for the organisation. Organisations spend a lot of money on ICT: for the hardware, software and the people who support it. Any large organisation would have an ICT procurement policy to ensure that the best use is made of their investment in ICT and that any systems introduced do benefit the organisation. Without a centralised policy, as an organisation grows different sections can develop their own systems that meet their specific needs; they may choose different hardware platforms and software. This can lead to difficulties making it harder to transfer data and information because of incompatibilities. A timescale needs to be laid down for the replacement of hardware. This allows the managers involved with purchasing equipment to plan ahead as the replacement costs of hardware can be anticipated. With centralised control, new technology can be implemented over a reasonable period without having to change every piece of equipment at the same time. Within a company, hardware and software procurement should be standardised to ensure; Compatibility with existing data Compatibility with existing hardware That colleagues can share data when necessary That they can communicate when necessary That technical support is available That legal software licencing requirements are met That training is available That the hardware can cope with future demands Legacy systems are taken into account 19 | P a g e Chapter 7: Legislation Impact of Legislation on ICT policies The procedures within a company must reflect the requirements on the legislation to ensure all laws are being adhered to. If a company’s employee breaks the law when at work, the company is legally responsible as well as the individual. This impacts on publicity; Developed Legislation Data Protection Act 1998 20 | P a g e 21 | P a g e Copyright Designs and Patent Act 1988 Copyright laws protect the intellectual rights of authors, composers and artists. They also apply to computer software. When you buy software you do not buy the program, only the right to use it under terms of the licence. It is illegal to copy or use software without this licence. Particular care needs to be taken with this when LANS are used as sufficient licences for the number of users must have been obtained. This can be done through network software which keeps track of users of a particular piece of software and limit the number of concurrent users to the number of licences held. Laptops should be spot checked to ensure the software installed has been correctly authorised and employees cannot take a copy of the software home. An inventory should be kept that holds all the details of all software installed on computers within the organisation and the licences that are held. Such centralisation also allows reliable, known suppliers to be used and makes the checking that no unauthorised software had been installed a relatively straight forward matter. Software theft Is divided into two categories: piracy and counterfeiting. Piracy occurs when more copied of software are made then the number of licences purchased. Many users do this and don’t realise that this is illegal and can sometimes do it unwittingly. Counterfeiting is when software is illegally copied for sale to other users. The software cannot be registered, so there is no technical support or upgrade available. An added problem is that such software carries a high risk of carrying a virus. Health and Safety Legislation Management should encourage and give recognition to a trade union health and safety representative who could act on and report the concerns of colleagues. These should be given thorough training. It is the management’s responsibility to ensure risk analysis is carried out on a regular basis. A health and safety policy should be given to all staff. The role of a health and safety officer, who checks that the appropriate laws are compiles with, must be established. The safety officer should review health and safety issues. Regular training should be undertaken top inform and remind Regular workstation inspections should be carried out against the health and safety criteria Procedures should be in place to replace faulty equipment in a timely manner Inspections should take place about ergonomic factors Should establish a policy that specified the HCI requirements for software design that should be adhered to when new systems are developed. Freedom of Information Act On receiving a request for information, publish authorities must acknowledge and log it. The request must be answered within 20 working days. The organisation needs a system in place to help this. 22 | P a g e Any organisation covered by the Act must establish an active publication scheme. This must be approved by the Information commissioner and regular be approved/updated. Chapter 8: Developing ICT Solutions Factors Contributing to a Successful Development 23 | P a g e Factors that Contribute to an unsuccessful Development Chapter 9: Developing Methods Systems Development Life Cycle 24 | P a g e 1. Preliminary: Looks at the need for a system, may be initiated if a manager feels the system can be improved 2. Feasibility Will the new system work? Will it save the company money? Does it comply with the law? Will it solve the problem? Can it be built in time? 3. Analysis Finding out about the current system and investigating requirements: use DFD’ to represent the current system. Draw up deliverables. 4. Design determines how the requirements specification is implemented. It involves breaking the problem down into smaller sub-problems. A specification is drawn up in sufficient detail for the programmers to create the system. Clear timescales are needed. 5. Construction The stage when the system is produced by the development of programs or customisation of software packages. Programs are coded, tested and documented. It is vital the work is monitored carefully, and that timescales are adhered to. 6. Testing Test data should test that all branches of the program perform to specification. Data should be used to test extreme cases. Any discrepancies should be investigated and corrected if necessary Types are; Module: Each part of the system is tested. Functional: Sometimes called black box testing, testing for given inputs. System; Called alpha- the developers test the system to make sure requirements are met. User: Sometimes called beta- in which potential users test the software on their real data. Beta testing is done to make sure it does the right job, it is thoroughly tested. Operational: In which software is tested in its normal operating environment. 7. Installation & Conversion Hardware must be purchased, staff trained and user documentation can be written. Direct Changeover, this is scrapping the old system and immediately replacing it with the 25 | P a g e new one. This means no time is wasted but there is higher risk of something going wrong, this is normally carried out at quiet times i.e. after closing. 8. Review & Maintenance Once a system is in full operation it is monitored to check that it has met the objectives set out in the original specification. Inevitably, changes will need to be made: this is called systems maintenance. More programming hours are spent on maintaining existing systems than producing new ones. Tests of performance should be made, such as speed tests. Surveys can be used to check if information flows are correct and the quality of the information. The Need for Systematic Formal Methods: Project Management Agreeing to deliverables that state exactly what the system must do, when it will be done by and what it will cost Gaining approval to proceed Creating a project plan Setting Milestones- Dates Achieving Sign off- The client signing to say the project is complete 26 | P a g e Development Methodologies 27 | P a g e Chapter 10: Techniques & Tools for System Development Investigating and Recording Techniques Business Process Modelling Tools Diagrams are much easier to understand than the same information in text format. Gantt Charts Business Process Modelling Notation: Graphical Representation of workflow within a business. Represents complex processes in intuitive diagrams. Software can be downloaded to do this for free online. Structured Systems Analysis and Design Methodology: Developed to provide a standard methodology for developing UK government IT projects. It uses structured techniques and tools to study data flows, models and life cycles. Data Modelling Tools Entity- Relationship Diagrams: used in deigning relational databases. They show the relationships between the tables. One to many relationships is shown. Data Flow Diagrams: Show the movement of data through the whole organisation. This is used in systems analysis to show how data moves through a system. External sources are 28 | P a g e called external entities. They are people such as suppliers etc. Symbols External Entity: Process: Data Store: D2 Flow of Data: Level Zero Context This is a high level overview of the system. These start with a rectangle in the middle of a piece of paper which represents the system. Next to it, oval shapes represent the external entities. Arrows show the data flows. Level One The DFD is broken down by dividing the processes into individual detailed processes. This shows data in/outflow and the associated processes. Each process refers to a separate part of the system. Data flow cannot directly go from one store to an external entity: only by process. Level Two These just simply break down the system even further into the various processes involved. Each process has its own DFD. There should be a data store for each entity Information Flows show data and not physical items. Entities don’t link directly to data stores. What goes in must come out. Techniques for Testing A test harness is a collection of software and test data configured to perform specific tests on a module of a program by running it under the different conditions, comparing actual outputs with expected outputs. Volume Testing tests that the new system works with large volumes of data. After a long period of use, data files may become very large. Volume testing tests that this does not affect the performance of the software. Scalability Testing; Tests that a system will still perform as required even if the system has to deal with an increased workload. Prototyping means producing a scaled down, simple version of the software which is used to show how the system will work. Can be constructed and tested in a short time. Multiplatform Testing: Ensures the software can be sued with a variety of hardware specifications and operating systems: i.e. new browsing software with Windows XP & Vista. Important with Legacy Systems. 29 | P a g e Simulated Environments: With various inputs and outputs can be used to test software in as realistic an environment as possible. Chapter 11: Introducing large ICT systems into organisations Reliability & Testing A large system has many users; it is particularly important with these large systems that they always operate as expected. When a new system is developed, extensive testing must be planned to ensure reliable operation. The testing will be structured and involve teams of people: it is the most expensive part of the development of software. Developer Testing Takes stage at many parts of the development. The developers use a range of tests to make sure their code performs as required by the specification. This can include methods such as a code walkthrough. This is a formal testing technique where the program code is worked through by a group with a small set of test cases; as this is done the state of program variables is manually monitored. This form of testing checks that the internal program logic is correct. This is an example of white-box testing. This concentrates on how the programs carry out what is expected. The second round of testing is Black box testing; based on what the software should do rather than how it is done. Black box testing is carried out by the developers. Functional testing is an example of this: checks the features, operations and erroneous actions. Automated testing employs tools which execute tests without manual intervention. Compatibility testing checks that the software is compatible with the other parts i.e. hardware & operating systems. A software release is the initial generation if a new or upgraded application. User Acceptance Testing Done after the release and is not usually carried out by the client to determine whether or not to accept a software product. These criteria are likely to be agreed upon at the start of the project and real data is likely to be used. Test cases are created to ensure proper coverage of all possible scenarios during testing and realistically should be as similar to the real-world environment as possible. Testing Network Systems Tests the effect of running the system on the current network and its structure i.e. too much traffic on the network and slowed responses when using a WAN. 30 | P a g e Installation Documentation System Documentation: is produced for the programmers who will maintain the system. This will consist of structure and other diagrams, annotated program codes and records relating to testing. User Documentation: is designed to enable the users to operate the system. It can consist of procedure manuals that describe how to perform business tasks; tutorials that teach a user how to use components of the system and reference manuals that allow a user to research specific function. Maintenance Can account for up to 80% of programming costs. The cost of maintenance is affected by; It’s structure The number of Users The number of undiscovered errors The quality of documentation The skills of the maintenance team members 31 | P a g e The job of maintenance can be outsourced to an external organisation. Maintenance releases are the versions of a software package released after the initial release. They include changes to the original software. Very often a software patch is produced. A software patch is a mini program, a brief piece of code that will make the changes to overcome a specific problem. 32 | P a g e Chapter 12: Backup & Recovery Backup & Recovery Strategy The aim of producing backups is to make sure that if data is lost from a system that it can be recovered and the system is restored to its original state. The loss might occur because of; A hardware fault Accidental deletion A natural Disaster Deliberate actions i.e. terrorism The strategy should cover; The best time to back up How often to back up The type of backup to use Whose responsibility it is The media that will be used Where the media will be kept A log of backups taken Testing the recovery of backed up data RTO= the period of time after an outage within the systems and data must be restored. 33 | P a g e Online backup Disk mirroring may be used to store identical data on two different disks. Whenever data is stored, it is stored on two disks. If the main disk fails, identical data is available on the second disk. The mirror disk does not have to be located in the same place as the original disk. RAID; Redundant array of inexpensive disks Is a fault-tolerant system which uses a set of two or more disk drives instead of one disk to store data. By using two disks to store the same data, a fault in a disk is less likely to affect the system. Risk Analysis Risk analysis plays an important part in counteracting potential threats to ICT systems. The continuing operation of any organisation depends on its managements awareness of potential disasters and their ability to develop a plan that will minimise disruptions and ensure successful recovery. It involves: 1. 2. 3. 4. Identifying each element of an information system Placing a value on that element Identifying any threats to that element Assessing the likelihood of threats occurring. Businesses should consider the potential threats to the data, the vulnerability of the data and the value of the data to the business. Risk analysis compares the vulnerability to threats and the cost of potential losses. Data recovery Plan Several levels need to be considered; Partial or full loss of data Loss of data & applications software Loss of data, applications software & operating system Loss of everything. A recovery plan needs to be put together in place for every level of failure; this needs regular testing. Disaster Recovery & Contingency Planning There is much that can go wrong when using an ICT-based system, it is important that any potential problems are identified before they occur and appropriate measures are taken to minimise their occurrence. This is known as disaster avoidance. A fault tolerant computer has extra hardware, such as memory chips, processors and disk storage in parallel. Special software routines or built-in self-checking logic detects any hardware failures and 34 | P a g e automatically switches to the backup device. Detectors can be placed with CO2 extinguishers; fireproof safes can be available for disks & backup tapes. Uninterruptible power supply’s and standby generators prevent loss of power supply. Planning for Recovery from Disaster A contingency plan or disaster recovery plan sets out what to do to recover from a failure. It is a planned set of actions that can be carried out if things go wrong so that disruption is minimised. The contingency plan or disaster recovery plan sets out what to do to recover from a failure. The contingency plan covers equipment, data, staff and business functions. The plan chosen depends on; The size of an organisation & its systems The method of processing The length of time before the alternative system needs to be up and running The financial losses sustained The cost of the backup & recovery options The likelihood of the disaster happening Contents of a contingency Plan Alternative computer hardware Backup Procedures Recovery Procedures Staff Responsibilities Alternative Working Location 35 | P a g e Options for recovery 36 | P a g e Chapter 13; Training Users Types of Training & Methods Method Advantages Disadvantages Face-to Face or instructor led: On the job or in external classroom courses On the job Questions can be answered Immediate feedback/help More interaction Time spent observing colleague Realistic setting In-house courses Lower cost is run by employees Tailored needs are met Employees do not have to travel Learn when & where they want Immediate access to help Convenience Some are free/ others cheap Provided by software package (F1) Natural language: user friendly Availability, Quick, free E-learning Online Tutorials On screen help 37 | P a g e Expensive Has to be planned in advance Things can be forgotten if not practised Often difficult to learn when dealing with everyday stresses of the job The managers may not have the specialist knowledge May lack facilities Lack of employee enthusiasm Demanding of network resources See above Paper based material Step by step instructions Work at their own pace Vary in quality, not a good source Hard to follow Chapter 14; Supporting Users On-site help Call-out Support When a software house supplies and installs a large, new, bespoke system for an organisation, considerable support is likely to be needed for the first few weeks. New users will need guidance from the software house’s development team in its use. At this stage, unforeseen errors may occur in the software and modifications may need to be mad. This is the most expensive option Less wide-ranging, cheaper method of support. A service will make a technician ready to go on-site to an organisation. It can be expensive for the software house to provide call-out support but it’s crucial that a customer does not have to wait too long for help to arrive; otherwise confidence will be lost in the product. Telephone Help Desks Email Support May be available during business hours. It is likely that the software will have a large number of operators. These are sometimes monitored using call logging giving as unique call reference number. A computerised database of known errors and their solutions, together with frequently asked questions could take the form of an expert If a problem is not time-critical, email could be used as an alternative. This has the advantage of soothing out demand. A priority system can be used to ensure more critical enquiries are answered first. Operators spend their time finding solutions without telephone interruption. Lacks human interaction, instant messaging can 38 | P a g e system. Number of calls per hour, response time, time taken to resolve and number of repeat calls are often recorded. be used to resolve this. User Guides On-Screen Help Typically provided free with software. May come in a hard or soft copy form. May describe how to install the programs and explain how to perform common tasks. Wizards can be provided to make complex procedures within the package easier by breaking down the tasks into clear manageable steps. This helps to prevent user error during data input and is more suitable for novice users. Online Support Package Credibility Information can be kept very up to date and users can access patches to fix errors. Online self-help groups are available i.e. a bulletin board, discussion forum or a thread. Other users will share their knowledge to help others. It is not cheap for companies to provide and staff a customer help desk. The provision of user support reassures customers about the product which makes them more likely to buy it. A poor quality product could result in thousands of expensive help-desk calls. 39 | P a g e Support Options for Industry Standard Packages Online Faqs Newsletters Support articles Bulletin boards User groups: users get together to solve problems ( for complex software) Documentation Documentation consists of written material that provides information on how to use a software package. The documentation quality is often a considered criterion when choosing software. Different types of user will have differing documentation needs. The technical support team will need documentation that provides installation instructions using disk peripheral devices whereas a data entry clerk will need functional instructions. Factors to consider when choosing a support option Skill level: Experienced users need less help with everyday functions Whether the new system is different from the one it replaces How critical the system is: The more critical it is, the more fast expertise is needed The number of employees: Access to external help desks if small numbers The patterns of work: Night shift, call out work available 40 | P a g e Chapter 15: External & internal Resources Using external services and support Outsourcing Outsourcing is the subcontracting of aspects of the business to an external organisation or agency. Functions which may be outsourced include testing & payroll or backup. Reasons for outsourcing include cost or for the expertise. Outsourcing can also improve e on overall company performance. Off shoring When an organisation purchases services in one country to be provided in another, this is called off shoring. Most offshoring places take place in locations such as Africe & China. This improves businesses profitability. An example of this is the HSBC bank has set up a section in India where it has 2000 employees working on back office operations. Service level agreement; A service level agreement is a contract that is made between a company obtaining a service and the company providing it. It specifies the nature, scope and quality that is needed to be provided. Bulk printing Specialist companies provide a service to carry out bulk printing, for example a payroll and billing system. These companies have high speed, high quality printers that enable them to print at much higher speeds , they also have equipment which folds and places documents in envelopes. Ways of obtaining services Contracting: Way of acquiring human resources, space or equipment. Individuals who work at freelance can be hired on a specific task. Contractors are often used to take on a role in developing a new system or in testing. Leasing A lease is an agreement whereby one person or organisation hires a particular asset. Hiring equipment or office space avoids the capital cost that is involved in owning it. The hire costs require regular payments from, income. Standard software can be leased; the costs cover 41 | P a g e any maintenance and upgrades that become available. Managing internal resources Hardware: Any organisation should have a procurement policy that specifies how decisions concerning hardware acquisition should be decided. Hardware can be purchased outright or leased. Once the hardware arrives on site, details should be entered into an inventory. An inventory is an itemised catalogue of all hardware held by an organisation. It is likely to be held in database management software and is very important that they are kept up to date. Data recorded includes Serial number Description Supplier Date of purchase Purchase Price Location Maintenance Agreements Software if bespoke software is used, very careful management of software development will be needed. Training and reference manuals will need to be kept up to date whenever changes are made. When off the shelf software is purchased: licence agreements must be kept. Communication Resources An organisation may have WAN lines, leased lines or may have access to a WAN via the internet. The hardware that is required for a network infrastructure will need to be set up and maintained. The type of communications link that an organisation uses is important to the quality and speed of communications. Consumables these are the regular minor items that need to be purchase for an Ict system such as paper & ink. An organisation will need to manage the reordering & distribution of consumables appropriate trustworthy suppliers need to be contacted. Facilities Organisations need buildings to house their computer hardware and provide office space for employees. These can also be owned or leased. Rooms that house alot of electronic equipment may need to have air conditioning installed and cables need to be safely installed. People While most people use ICT as part of their job, there are some roles which are specifically related to ICT systems. A large organisation will have its own ICT support team of technicians who will manage the network, organise backups, install & monitor use of software and hardware. There is likely to be 42 | P a g e a staffing structure with specific areas of responsibility and chain of command. Support staff will need to be provided with appropriate training on a regular basis. Pre-Release Overview notes Scarlett Price wants to create and operate a large youth community centre A derelict warehouse has been purchased as the venue She wants to recruit teams of graduates; Designers, Administrators & Professionals. These will be recruited via a TV program The ICT team selection is about to begin She has grown up in the town of the warehouse The Vision Multi-purpose hall on the ground floor Gym, squash courts, cafe and meeting rooms on the second floor The upper floor will be turned into accommodation for staff and guests Key quotes about the task “I want lots of ideas about the ICT that could be used to help us succeed” “Don’t give me an insecure ICT facility where data can be lost” “Useful if we could track and record every business trader” “Speak to the administration team” Team Hope How they approached the task Established the business goals with the administration team and produced a joint document Obtained information about the available finance from this Interviewed the administration team to determine the functionality. Discussed the project with a focus group: Youth group leaders. Market research Formulated a strategy based on requirements and available finance What they recommend A package system: Within budget and would fit requirements A CRM facility: meet the need to record customer details A booking system: Hotel rooms & functions Accounting System for the administration team Mailing system: post forthcoming events 43 | P a g e Provision of ICT No internal: all outsourced. A SLA agreement will be made Five year contract: better deal with a seven year ICT manager needed to monitor the work of the outsourcing Wireless facility Pros Cons They listened to Scarlet prices vision Discussed & acknowledged budget Interviewed the User Discussed with focus group Taken into consideration each aspect of the business including bookings Noted the fact that a bespoke system is out of scope Considered a SLA agreement Alot of systems in place No time frame specified Outsourced contract: may find the company isn’t reliable The systems may not work together as they are on different platforms, unless a software house is purchased Team Endurance How they approached the task Established the business goals without the administration team Researched online Asked for help from a university professor Formulated a strategy by themselves What they recommend Bespoke system; meets requirements precisely The system will record all contacts, including mobile phone information and details of social networking sites used. Used to contact past customers and promote future events Provision of ICT Recruit 12 staff All in-house 44 | P a g e Computer suite in warehouse Off site Data store Pros Cons Off site data store provides protection against disasters Researched online Did not consider Budget: too many staff, expensive bespoke system Formulated goals without the user Did not consider a timeframe: two years to implement Did not consider the space for this, Scarlet wants a community centre and not an office Did not consider the data protection act (Up to date, Relevant) Asked for help: lack of coordination Pre release notes 1. What is a business Administrator somebody who presides over the daily operations of an organisation. They oversee all the functions relating to managing a business i.e. planning, controlling, staffing and organising. They work closely with all the departments and sometimes with external bodies. 2. What is meant by an ICT professional Somebody who works within the industry in ICT, they may have specific qualifications and expertise in the development, maintenance and support of ICT systems. 3. What makes an effective team Leadership, co-ordination, mix of skills, agree to standards, effective communication, adequate planning 4. ICT facilities The physical infrastructure that provides ICT hardware i.e. RC14 is a room of 30 PCs as a facility. Or a room which holds the servers & the network equipment 5. What is an ICT system A setup consisting of hardware, software, data, information and the people who use it 6. Factors for a successful project Management involvement, End user involvement, Effective Teamwork 45 | P a g e 7. Factors for unsuccessful Development Inadequate analysis, Unrealistic Project plan, Insufficient Monitoring, Lack of standards, Loss of control 8. Threats to data Physical Failure, Hardware, Software, Telecoms, Computer Crime/Abuse, Invalid Data/ Inaccuracy, System Design Failure. 9. How to Secure Data Password, Biometrics, Train Staff, Lock Doors/windows, alarms, encryption software, audit trailing 10. What is a business Goal The overall aims of the business i.e. to cater for 300000 youths over 3 years 11. Publicise Online advertising, Social Networking, Posters, Gather addresses & mail merge, Video on java, emailing and texts to existing customers about forthcoming events. 12. What is an ICT strategy The strategy is what helps a business achieve its goals, it often defines what the business needs to do to be successful, influences on the strategy are; Goals, Available Finance, Legacy Systems, Geography of clients, Business fulfilment, Structure 13. Methods of communication Formal= the flow created by procedures of an organisation i.e memos, presentations Informal is unstructured and naturally arising i.e from phone calls. The flows need to be planned so that the information arrives where and when it is needed- the size, type and structure depend on this. A hierarchical structure requires careful planning otherwise information can become distorted. 14. What is a fully integrated Bespoke System A bespoke system is a system tailored to the user’s needs- these are expensive and time consuming to make. 15. Package Software Multiple software programs that work together from the same platform and therefore sold together. Also known as a software suite. Off the shelf software which is already set. Advantages: don’t need an in-house development team, cheaper option, time savings 16. CRM Customer relationship management software allows a business to collect, update and 46 | P a g e maintain all its data within one centralised location. Customer details could be recorded and the information is accessible to everyone within the company that needs customer information. Up to date information helps provide better service Increases customer satisfaction Reduces costs, wastage and complaints 17. Booking Systems Is a form of transaction processing system, it is used where the input needs to be dealt with straight away. Each transaction is processed individually in line with the main system. 18. MIS Uses operational-level data to provide management level information. The data can come from both internal & external sources and is combined in a n easy to read understandable way. This information is used by senior management to make strategic decisions. It is usually based on one or more database and allows people access at different levels. An executive information system is a form of MIS; this provides aggregated information for senior management. The manager can dive deeper by using hotspots. The information presented is often compared with previous years. 19. Outsourcing The moving of a particular process or function to an external organisation i.e. bulk printing. A business may not have the facility to print out large graphics or business cards and an external company could provide the outsourcing for this. Service level agreement A service level agreement is a contract that is made between a company obtaining a service and the company providing it. It specifies the nature, scope and quality that is needed to be provided. 20. Wireless Internet access Don’t physically need a pc. Accessing systems on the internet without having to be physically connected by a cable connect; they connect via a wireless hub. 21. Data storage An off-site data store is where all the data is stored externally- this could be provided by another company or be done via cloud computing 22. Strategy should cover When How often 47 | P a g e Type Testing Who Which Media Where 23. What is hot desking This is where employees do not have their own desks, but are in a different space each day? Hot desking relies on advanced systems with flexible technology. Recommendations ERP to integrate the information which incorporates all the different sections, this will make the data easier to share between different. As it is already integrated the system is already designed to be able to share rather than needing to duplicate. Training= Outsourcing the training. Add that as part of the provision of the software. Hot desking wirelessly, eliminates the need for a large office and gives more space for the community centre activities. 48 | P a g e 24. Security Policy First of all a security policy will be a document that, if you start work for an organisation, you will be expected to read and understand and probably sign. It can include many statements or rules that you, as an employee, should follow and be aware of. The primary aim of a security policy is to ensure the security and privacy of the data within an organisation. Some possible inclusions: No user can use their own USB memory stick on any work-based PC or IT system. All users must adopt strong passwords that are at least 8 characters in length and a combination of letters, numbers and symbols. No user shall disclose their password to anyone, including work colleagues. Users are expected to change their password monthly. No user shall leave their PC/workstation unattended without logging off or locking it. Users are expected to encrypt data when it is being transferred to another organisation this includes email. They must use the company provided encryption program. The company reserves the right to monitor, for security purposes, any employee's email or file access. The employee has a responsibility to check his or her virus software is up to date and where they suspect it isn't they must report it immediately to the IT support staff. 25. Acceptable Use policy An Acceptable Use Policy may well include rules that cover how an employee should use email and the internet. Some companies are stricter than others - ask yourself would you like it if you were a boss and you were paying your workers to go on Face book, browse for a new pair of shoes or simply email their mates. This also reduces the bandwidth of the network and can cause congestion and slowness. 49 | P a g e 50 | P a g e