Ebook Advanced diploma in business management: Managing the information resource

252 3 0
Ebook Advanced diploma in business management: Managing the information resource

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Ebook Advanced diploma in business management: Managing the information resource presents the following content: Chapter 1 the role of traditional information systems in todays business environment; chapter 2 the role of internet based information systems in todays business environment; chapter 3 the role and function of information systems in supporting business operations; chapter 4 the role and function of information systems in... Đề tài Hoàn thiện công tác quản trị nhân sự tại Công ty TNHH Mộc Khải Tuyên được nghiên cứu nhằm giúp công ty TNHH Mộc Khải Tuyên làm rõ được thực trạng công tác quản trị nhân sự trong công ty như thế nào từ đó đề ra các giải pháp giúp công ty hoàn thiện công tác quản trị nhân sự tốt hơn trong thời gian tới.

Business Management Study Manuals Advanced Diploma in Business Management MANAGING THE INFORMATION RESOURCE 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 The Association of Business Executives 5th Floor, CI Tower  St Georges Square  High Street  New Malden Surrey KT3 4TE  United Kingdom Tel: + 44(0)20 8329 2930  Fax: + 44(0)20 8329 2945 E-mail: info@abeuk.com  www.abeuk.com 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 b48182 8e6b398 c7a71a 5ee1 f02 © Copyright, 2008 The Association of Business Executives (ABE) and RRC Business Training All rights reserved No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form, or by any means, electronic, electrostatic, mechanical, photocopied or otherwise, without the express permission in writing from The Association of Business Executives 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 b48182 8e6b398 c7a71a 5ee1 f02 Advanced Diploma in Business Management MANAGING THE INFORMATION RESOURCE Contents Unit Title The Role of Traditional Information Systems in Today's Business Environment Introduction What is Information? The Attributes Of Useful Information Quality Information Information Presentation Business Information Management Information Information Systems The Socio-Technical System Environment Network Systems The Role of Internet Based Information Systems in Today's Business Environment Introduction Internet Based Systems and the Digital Firm Advantages of using Internet Based Systems What is a Digital Firm Changes resulting from Computer Systems Knowledge Page 10 11 13 19 20 23 24 24 25 26 27 29 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e The Role and Function of Information Systems in Supporting Business Operations Introduction What We Mean by an Information System The Management Levels Decision-Making Office Automation Systems and Transaction Processing Systems Different Information Systems and Management Levels Management of the Information System Systems from a Functional Perspective Knowledge Management 31 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 33 34 36 39 44 45 46 49 53 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 b48182 8e6b398 c7a71a 5ee1 f02 Unit Title The Role and Function of Information Systems in Maintaining Competitive Advantage Introduction Information System Infrastructure Strategy Information Flow Through Business Infrastructures Influences on the Information System Infrastructure Information System Influences on Corporate Structures Management Structures of the Information System Implications for the Design and Understanding of Information Systems Information Systems and Business Strategy The Impact of IT in the Wider Business Environment Data Mining Page 57 59 60 61 63 68 71 74 76 77 82 Internet Technology and Business Processes Introduction Electronic Communication Systems Networks Enterprise Networks The Use of Telecommunications in Business Using the Web for Competitive Advantage An Intranet Electronic Business, Electronic Commerce and the Emerging Digital Firm Group Collaboration Knowledge-Based and Expert Systems Neural Networks Fuzzy Logic 85 87 88 91 93 97 104 106 108 Computer Infrastructure – Hardware Introduction Data Representation in a Computer What is Common to all Computers? Input Devices Output Devices Networking/Telecommunication Platforms Types of Computers 119 120 121 122 128 131 132 132 114 115 116 116 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 Computer Infrastructure – Software Introduction Types of Software The Operating System Types of Application Software Programming Software Software Development Aproaches The Information System and Multimedia Data Processing 133 134 134 135 139 145 149 154 156 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 b48182 8e6b398 c7a71a 5ee1 f02 Unit Title Page Basic File Organisation Methods and Database Management Introduction The Traditional File Environment File Organisation Database The Requirement for Minimum Redundancy The Database Management System (DBMS) The Database and the Information System Database Management and the Need for Control Database trends 157 159 160 161 161 166 168 169 171 172 System Vulnerability, Security and Control Introduction The Need for System Security Wireless Security Challenges Internet Vulnerabilities Computer Crime and Cyberterrorism Internal Threats from Employees Information Systems Security and Control Disaster Recovery Legislation 177 178 178 184 184 185 187 188 189 191 10 Systems Development Introduction Systems as a Planned Organisational Change Planning Cost Assessment Capital Budgeting Approaches The Development Process Systems Design Specific Development Controls User Involvment in Systems Development Walk-throughs Outsourcing 195 197 198 200 209 212 219 229 230 231 235 236 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e 11 Systems Implementation Introduction The Concept of Implementation Testing Training Changeover Methods of Changeover User Acceptance Post-Implementation Issues Post-Implementation Review Audit Requirements 241 243 244 246 247 248 249 254 255 260 262 d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 b48182 8e6b398 c7a71a 5ee1 f02 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 b48182 8e6b398 c7a71a 5ee1 f02 Study Unit The Role of Traditional Information Systems in Today's Business Environment Contents Page Introduction A What is Information? A Definition of Information A Definition of Data 4 B The Attributes Of Useful Information C Quality Information D Information Presentation E Business Information Some Current Business Information Issues An Illustrative Example 10 10 10 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 F Management Information The New Business World Business Leadership Information Warfare Lack of Boundaries Not Only Managers Require Business Information 11 12 12 12 12 12 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c G Information Systems What is a System? System Characteristics What is an Information System? What is a Management Information System? Users of a Management Information System The Main Management Levels 13 13 13 14 16 17 17 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 (Continued over) 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 The Role of Traditional Information Systems in Today's Business Environment Access to the Management Information System Reliance on the Information System 18 18 H The Socio-Technical System Environment The Economic Environment The Technical Environment The Social Environment 19 19 19 19 I Network Systems Local Area Networks (LANs) Wide Area Networks (WANs) The Internet 20 20 20 21 Summary 21 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 The Role of Traditional Information Systems in Today's Business Environment INTRODUCTION The main purpose of this unit of the course is to introduce you to the concept of information and its importance in the modern business environment The unit will also examine the traditional role of Information Systems in today's business environment In summary we shall examine the following:  The nature of Information  Information Systems  How Networks and the Internet have enhanced the usefulness of Information  Other factors besides these that have expanded the usefulness of Information  New organisational styles and working practices due to Information Objectives of the Unit After studying this unit, you should be able to:  Recognise the value to organisations of information as a resource and identify the principle reasons for its increasing importance  Discuss the concept of an Information System  Describe the role of Information Systems in transforming organisations and business enterprise  Describe the role of Network Systems within an organisation All of us have an intuitive knowledge of information and we are all very aware that this is often called "The Information Age" But an intuitive knowledge is not precise enough when we come to implement a formal system of information into the organisational and business environment We will then take a broad look at the principal factors behind the huge growth in information in modern times We not need to go back very far historically, as the information explosion has only been possible with the development of computers These did not appear in the commercial world until the late 1950s and through the 1960s Even then, it was not until the 1970s that most businesses realised their importance and the 1980s before networks were fully developed Networks were connected to other networks and the Internet was born and then, in 1995, the World Wide Web was developed and the whole world embraced information Without doubt, we are living through a full Information Revolution which is every bit as significant and pervasive as the Industrial Revolution of the 19th century Modern society is information-driven Modern business is information-driven and as individuals we are information-driven We not have far to look for examples Society responds to the fluctuations of the markets on a daily basis and demands up-to-the-minute information on interest rates, exchange rates, cost of living indexes, etc Business requires information on competitors, sales returns, profit margins, etc Individuals require information on products and services, opportunities, etc And each responds to national or international appeals from relief agencies and governments 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 The world would come to a halt without information All around us are organisations providing us with information The development of the Internet and World Wide Web has increased the supply of information a million times more As much as anyone else, managers receive all this information as well as that which is generated within their own corporate systems 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 The Role of Traditional Information Systems in Today's Business Environment Not only are we bombarded with unsolicited information but also, as more becomes available to us, more is demanded by us For instance, a manager may ask for information on the stock held by the organisation On receiving it, he then asks for the comparable figures over the last few accounting periods When the manager gets these, he might ask for the projected figures for the next few periods, as well as for the marketing figures justifying the projections, for national statistics supporting the marketing figures and so on It is now quite impossible for managers of any kind to avoid information It has become the principal resource of most organisations The subject of this course is the Management of Information A WHAT IS INFORMATION? It is imperative that we begin with an understanding of what we actually mean by the term information A simple series of numbers will lead us into this understanding: 100100 As a student of information your curiosity should have asked:  Why were those particular numbers chosen?  Is there a familiar pattern or format?  What they mean? My answers, in order, would be:  No particular reason as another six digits could equally have been chosen  Yes  I'm not saying at this stage In other words, I know what I intend them to mean but at this stage you not 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 Even if you have made a guess you cannot be sure 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 As the numbers stand they not tell us anything with confidence df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d They not convey any meaning to us and so they not convey any information to us 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 We have arrived at a definition of information: 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 A Definition of Information 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 Information is the meaning conveyed to us by some concrete representation of that information 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe Of course the representation need not be numbers f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 For instance ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b baa baa 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 could be another representation of the same information c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 Let us pause and consider these representations:  1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 They tell us nothing with certainty, df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1  They are symbolic,  They are easily stored in a computer ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 252 Systems Implementation  Vertically, that is, satisfying the requirements of different levels of management at each phase As an example, the first phase could be implementing all the departmental managers' responsibilities, followed by the section leader responsibilities and finally the workforce activities  Horizontally, in the sense of first implementing the production parts of the system, then marketing and so on In other words, one department or section at a time The following two figures show how phased changeover can be accomplished via either direct or parallel changeover A more complex combination is also possible OLD SYSTEM NEW SYSTEM Phase Phase Phase Changeover dates for Phases – The above diagram shows phased changeover with direct changeover, whereas the following diagram shows phased changeover with parallel changeover OLD SYSTEM NEW SYSTEM Phase 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 Phase 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e Phase 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b Phase 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e Phase d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 Phase 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c Changeover dates for phases – 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 Systems Implementation 253 Changeover Methods Compared This is a brief list of advantages and disadvantages for each of the above changeover approaches  Direct Changeover Advantages (i) This is the simplest method: stop one system, start another It is usually only undertaken over a weekend or holiday period (ii) No extra work in running two systems together for a time Disadvantage (i)  Very high risk – if the new system is disastrously wrong, it is difficult to recreate the old system Parallel Changeover Advantages (i) This is a safer method as the old system is kept operational while the new system is brought in (ii) Much greater security Disadvantages  (i) Greater effort is needed to run the two systems and to compare the outputs (ii) It may not be very easy to revert to the old system should things go wrong, because the new system may handle the information differently, making it awkward to compare outputs (iii) The responsibilities of staff may well change between systems, leading to confusion (iv) It is difficult to know when to make the actual changeover This is usually a compromise between too short a time, keeping costs to a minimum, and too long a time, allowing for extensive testing Phased Changeover Advantage (i) There is considerable control as only manageable chunks are being changed over at a time and no risks are taken even if direct changeover is applied to each area 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 Disadvantages 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 (i) The system may not easily be split into phases (ii) The phases may well be different in the two systems 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e (iii) (iv) The interfaces between remaining old system phases and the new system phases already changed over are extremely difficult to control If pilot running involves old data, then time is needed to collect and collate the data to be used 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 In practice, a combination of methods is generally used Rarely is a complex system subject to direct changeover, nor a simple system to any form of drawn-out parallel running Whichever method is used, it is essential that data passed from the old system to the new is complete and accurate df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 254 Systems Implementation F USER ACCEPTANCE The Delivery Plan At a very early stage in the project, the implementation manager will agree with the user what the final product is to be This is included in a delivery plan The delivery plan consists of:  The software that makes up the system  Estimates of the size and difficulty of the software  Specification documentation  User manuals  System training User Acceptance Tests System tests should be almost completed before user tests are instigated First, the implementation manager should be satisfied that the system is reasonably clean, so that when the user is involved he or she will not be troubled by bad results A formal acceptance run will be made This will have been defined in the delivery plan and will cover:  Tests of individual functions  Tests of separate users  Clerical tests  Tests of all peripheral hardware  Tests of abnormal data so as to induce errors  Tests of normal data  Several cycles of run to test consecutive operation 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 In short, the entire system is tested, and, in practice, the final test run is often the actual user acceptance run The user acceptance tests also provide an opportunity for further hands-on user training In addition, at this stage, the auditors would test the system with their own data df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 This is an extremely difficult time for the implementation manager, as he must educate the user in the system at the same time as the user is testing it The user may be attempting to get the system to too much; for example, too many files simultaneously, too many print outputs for the printer to cope with and, perhaps, too much on-line work Similarly, the user may attempt to work with too little data When all the tests have been done and the user is satisfied with the results, the formal handover is made 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 Depending upon how the changeover is to be made, the hand-over may be done simultaneously with the changeover On the other hand, it may be made formally at a convenient time during changeover c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 Systems Implementation 255 G POST-IMPLEMENTATION ISSUES The implementation of the system, even if fully tested and clean, is not the end of the project Systems are ongoing and so need to be monitored and appraised, maintained and enhanced continually Monitoring Monitoring is an essential feature of the routine running of the system and continues throughout the life of the system, especially after implementation Changes to a system may be required for the following reasons:  Changing management, requiring different output Obviously company take-overs are the prime initiators  New products being introduced  Different manufacturing procedures and administrative procedures This is similar to the first point but less extensive  The constant changes that will occur in any organisation's structure and environment All organisations evolve If they not, they tend not to survive  Changes from areas external to the organisation Legislation on privacy and the environment causes most changes Threat Monitoring Another reason for monitoring is to keep a watch for signs of weakness in the system This is generally known as threat monitoring Typical signs of weakness are:  Input documents not quite catering for requirements  Output reports, etc not being used  Requests for speeded-up output  Complaints from users  Continual breakdown of hardware  An abnormally high incidence of error  Too many functions being done manually 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 In practice, many other threats to the system will crop up By the usual law, if it can go wrong, it will! What to Do Some corrective action needs to be taken This can consist of minor adjustments on the one hand, or virtually a whole new system on the other For example:  Monitoring should be done frequently in the initial stage and about twice yearly thereafter 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e  On evaluation, the objectives of the system should be re-established b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9  If the system does not then appear to meet the defined requirements, further investigation should be undertaken Whatever action is taken, monitoring of the system is maintained 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 256 Systems Implementation Systems Appraisal Before they get into the monitoring stages, the project team will need to examine the newly implemented system However, this is still part of the monitoring process Appraisal is required to ensure that the actual performance is close to that stipulated at the design stage There is always the possibility (some would say probability) that certain factors have previously been overlooked Also, as likely as not, during the long project development period other factors and circumstances could have changed, especially the user requirements and maybe legal constraints Examples of the type of factor that can be identified at the appraisal stage are as follows:  The throughput of data being too slow  Storage space is at a premium and so must be used in the most efficient manner possible  Errors, exceptions and queries will always occur Whilst these can be expected at any stage and are likely to be higher at first in a newly implemented system, are they unusually high?  Is the cost of data capture and preparation in line with estimates?  Is the user happy with the system? It would be unusual for even the simplest of projects to reach completion without some problems arising When these do, all participants, both developers and users, should seek solutions Whether the user has forgotten to define a particular requirement, or the development staff have underestimated the time needed, the situation is best resolved by discussions at an appropriate level in the project team structure Maintenance Whether by monitoring an ongoing system or by appraisal of a new system, maintenance of the system is certainly going to be required System Maintenance 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 Maintenance is the principal reason for the presence of analysts within the computer department There is very little need for them to write completely new work Typical examples of systems maintenance are: df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857  Tuning 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 Tuning is the ongoing process of improving the use made of hardware and software It is to with increasing data throughput, reducing running costs and reducing the pressure for a larger computer section It requires months of actual running to tune a system properly  Accommodating Changing Hardware d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e Changing hardware by no means entails a new system every time As often as not, a degree of adaptation is all that is needed, the hardware having been acquired to minimise disruption Also, it may be the configuration of terminals that calls for the change  6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 Accommodating Volume Growth 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 Volume growth is the result of ever-increasing success in the user departments The system maintenance team will also be employed on developing purpose-built minisystems for the organisation's specific operations 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 Systems Implementation 257 Program Maintenance Programmers, as a rule, not like going onto maintenance activities However, some of the reasons for involving them are:  Fixing latent bugs  Amending tax rates, etc  Changes in the law, requiring more information  Changes in the style of documentation  Changes in business practice, such as a move over to inflation accounting There are other changes that may well be required However, all predictable changes should already be built into the programs and only unpredictable changes need to be dealt with by the programmers Examples are pay-rate changes, price increases, etc To summarise, maintenance is the process of making a system as near to the users' requirements as possible Documentation Once the system goes live, the principal documentation in use will be the systems and program specifications For the maintenance analysts, there should be one logical systems document, containing updated user requirements and system design specifications It will also contain actual output from test runs and data used For the maintenance programmers, there should be one logical program document This may actually relate directly to each program It will include a complete set of validation and error messages for each program Also included will be program listings, module hierarchy charts, and actual printouts from test runs Documentation of systems is perhaps the least popular task in the computer department of a firm, being the administrative ‘paperwork’ rather than the practical demonstration of computing expertise The management of the computer department should ensure that documentation standards are set, that all those involved with a systems project are aware of the operation of the standards, and that full documentation is completed before a system can be adopted as live 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b The acid test as to how well a program is documented is whether an average programmer can take hold of another's program and perform amendments and alterations with ease and confidence All program changes should be promptly recorded in the documentation, making amendments to the narrative and schedules listed above where necessary Where program changes are not frequent, a senior and responsible member of the computer department should verify documentation against live programs to ensure software protection measures taken have been successful Such verification should be at least once a year for each program, though where turnover of computer staff is particularly high; verification may need to be more frequent 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 Updating Packages 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e Within the scope of software maintenance comes the task of updating purchased packages b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 In spite of all the care and attention paid by software houses when writing packages to ensure each package is error-free and will fully satisfy market needs, programs will contain errors and user feedback will highlight these errors and other shortcomings It is common to find software packages corrected and upgraded every 12-24 months; where the upgrading required is substantial, the software houses will issue completely new products 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 258 Systems Implementation The cost of updating packages may be nominal, since it is in the long-term interest of the software houses to have a following of fully contented users The cost of updating will always be lower than replacing the original package with the newly modified version being marketed During the feasibility study it is worth making enquiries about whether packages to be purchased have been newly updated and, if not, the likely costs that may be incurred in due course when updates are launched The updating process will normally re-configure the format of any data files affected but, where file conversion utilities are not to be incorporated in updating routines, the estimated additional cost of file conversion must not be overlooked Knowing when packages require updating is not always easy Theoretically, the supplier of the package should contact all his past customers to inform them of the need to update their packages Unfortunately, the standard of customer support offered by such suppliers varies considerably Many companies allocate an annual budget to package software updating The member of staff allocated to monitoring duty is often responsible for the control of this budgetary expense System Enhancement and/or Development Once a system is live, users frequently become more ambitious for their system They will then ask the computer staff to add extra functions This would be an enhancement of the system Computer staff tend to be rather wary of such proposals, as they will be only too well aware of the uneasy balance that exists in any system, especially at an early stage of its life Every system will require enhancement There is the choice of producing and developing an entirely new system But even then, changes may be required to existing programs, as the new system will need to incorporate the previous system, and it will be sensible to use already prepared software Sooner or later, a choice will need to be made between enhancement (of the existing system) and development (of a new system) It will depend very much on the particular circumstances 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 Reasons for change 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 Several reasons for change lead to this point Examples could be: df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d  General frustration with the limitations of the present system 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b  The attraction of new technology 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857  A relatively new system that has several severe design faults d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233  Management decision on an expansion of the computing function d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b Points to consider 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 There are several points to consider: f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5  Enhancement entails less risk, as it involves a proven system ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e  Documentation is easier – most is already in use 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086  Documentation can be quite informal, as staff are already familiar with the system c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e  However, amending and testing existing code is far more time-consuming than writing brand new code 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 After some time with a mature system, several enhancements may well have been made Eventually, the user may be faced with inevitable development of a new system as successive enhancements will tend to distort the original system quite considerably ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 Systems Implementation 259 An example of this would be a batch processing system that has been entirely converted to immediate access The original system will have had other activities timetabled into it when the batch runs were not being done There will now be considerable upset with the system going entirely open Software Packages When the software is bought as a pre-prepared package (as they often are), it may not be quite right for the desired project plan, so enhancement will be required to adapt the package to the exact requirements Thus enhancement is not confined to mature systems Enhancement and Technical Integration I have already mentioned the problem of integrating enhancements into a system Even if a completely new sub-system is being introduced, it will need to interact with existing liverunning systems For example, suppose a new, enhanced payroll system is to be introduced incorporating shift and production details as well as the normal accounting procedures Such a system will interface with the production department system to ensure appropriate staff are available for each shift It will also interface with the marketing department system so that projected manpower needs are fulfilled Finally, of course, it will interface with the finance department in the normal way Each of these interface systems is live running Each consists of many sub-systems The enhancement will interface at differing levels with the sub-systems We can readily see, without going any further, the enormity of the testing of these interfaces Data will be passed by the interfaces and files will be shared  One method would be to replace just the old routine with the enhanced one Given the complexity of most systems, this is seldom possible and, indeed, could be dangerous  Another method is to copy the whole system and then make the replacement But the size of most systems rules against this  Yet another method is to make a copy of part of the existing systems and test the enhancement against this But what about any interactions with other interfaces? Without the whole system, we cannot be sure of the enhancement The answer is to keep control of the interface in the tester's hands Using dummy interface routines and then restricting the data taken from the test file keep a very strict control kept over these interfaces In this way, dummy and true interfaces can be cross-simulated and the tester can see for himself what is happening 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 The control is maintained using a test harness This is a piece of generalised software that can simulate data for any part of the system A typical test harness requires all input to be made manually through a keyboard and all output to be to a screen Of course, more than one test harness will be used A full test harness will consist of many routines The harness can provide data either interactively, as in our example, or from a file Similarly, the output can be displayed as it is run or sent to a file The advantage of using files is that tests can be repeated and also speeded up 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 260 Systems Implementation Testing After Maintenance or Enhancement After maintenance or adaptation of an ongoing system, testing procedures will need to be gone through, using a test harness or otherwise Testing Stages The stages of testing to be gone through after changes have been made to an existing system differ from those required for a new system Whereas the new system required a build-up of testing from modules to programs to systems, the stages are now:  Test current system with existing data  Test modified programs with existing data  Test modified programs with new relevant data  Test modified programs with new and existing data combined The reasons for this procedure are to ensure that:  Other parts of the same system are not unexpectedly affected  Another system that interacts with the amended system is not unexpectedly affected As well as each of the above stages, there is also a need to go through separate testing of system and user requirements, as for a new system Maintenance tests are very much easier than new system tests for these reasons:  It is simple to use existing programs to set up test files and expected result files  It is easier to validate with this kind of test data, as the data is known to be clean It is also easier to produce correct master files  An ongoing live system ensures that compatibility is automatically achieved, between the records on master and transaction files, and between the records and input transaction data 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 H POST-IMPLEMENTATION REVIEW 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 Still in the post-implementation phase of the project life-cycle, there is a need to pause and look back at the system that has been implemented The auditors will always have a keen interest in any system, as they need to test and trust all its procedures and output df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e Reasons for a Review d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 Management will require a review to check that the system is up to requirements and to note lessons for future use d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 In an ideal situation, two reviews would be made: 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c  At the implementation stage; and 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e  Six months later 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 The first of these is unlikely to be undertaken, as implementation is an extremely busy time anyway, and most computer staff feel that all the tests made will compensate for this However, if an early review is made, then the essential review three to six months later has some guidelines to follow and data to compare with 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 An independent consultant, who should assess whether the projected costs and benefits are being realised, should make the review after a few months He should check if the system requirements are being achieved and he should identify the strengths and weaknesses of the system 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 Systems Implementation 261 The review consultant should be assisted in the review by an audit team who will undertake a parallel audit review of the system In addition, a user representative and a representative of the development staff should be available for consultation as required Resultant Contents of a Review The following points should be reported on by the review:  The manpower estimates, compared with the actual manpower effort and skills achieved  The amount of machine time used during testing  The overall costs, analysed in detail  The delivery plan, with any differences explained  Lessons learned on the techniques and approach used for: (i) Project management (ii) Technical aspects (iii) Development techniques  Productivity achieved since implementation  Program sizes and any lessons learned here  Relationships between the computer department and: (i) Users (ii) Other departments (iii) Computing procedures iv) Other systems 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 and the lessons learned here 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 Scope of Review Having studied the reasons for a review after six months or so, and the aspects to be reported on, you should have a fair idea of the scope of the review But it is worth setting it out formally The review consultant should examine:  The documentation of the system, programs and user procedures  The test packs developed for future maintenance  The test data, results and test logs already used and achieved  The errors found to date, the type of error, the department and program responsible, the cause and status of the errors bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29  The users’ opinion and view of the system including problems and benefits, deficiencies and training needs, and input and output c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9  The design of the system and its operation; the interaction with other systems; the system's control functions and audit trail  Details of data capture procedures  A full cost/benefit analysis, to decide if the system justifies its costs 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 262 Systems Implementation  Any recommendations to be made for example enhancements required, operational changes, and any changes to documentation, data integrity, testing facilities, controls, training, user procedures and personnel, and anything else that can be discovered The consultant has a wide brief and is given plenty of time in which to carry out his review He will inevitably find defects, but hopefully will also identify strengths in the system I AUDIT REQUIREMENTS There is the normal obligation on the auditors of an organisation to test and affirm the reliability of the computing function This is the same obligation as the auditor has to check non-computer systems There are, however, special circumstances with computerised systems in that the records and files in storage are not human-readable They are only accessible by means of application programs, which, again, the non-computing staff cannot assess The auditor, therefore, must feed data through the system to test the various functions, as he will certainly be able to assess the output Legal Requirement Quite a number of the specific duties of the auditors are legally established Under the Companies Act 1985, auditors have a duty to make independent reports to shareholders on all the accounts and every balance sheet So that they can fulfil this obligation, they have right of access at all times to such accounts and books and are entitled to whatever information they require The system designer must therefore accept that the auditors will require output (printed, as a rule) to satisfy themselves that everything is in order The Role of the Auditor The work of internal and external auditors is affected by the advent of computers Whilst they not have to be computer experts, they ought to be familiar with the mode of inputs, processing and outputs, so that they can conduct tests with understanding Programming should also be familiar to them so that adequate controls can be suggested by them and incorporated into programs 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b In the past, auditors could simply make manual checks of outputs Nowadays they will be responsible for the division of functions in order to prevent fraud and collusion This means separating, for instance, data origination, control of input batch, data preparation, processing, systems and programming Internal and External Audit  05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 The internal auditor is responsible for:  85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c Installation auditing, including: 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e (i) Security; (ii) Evaluation of controls, in particular that required by the Data Protection Act; (iii) Standards, best practice, etc 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 Application auditing, where the auditors keep their independence yet provide as much assistance as possible to the development team The external auditor is responsible for the accounts of the organisation as provided to all interested external parties Because they are responsible for these accounts, the auditors must be satisfied on every aspect of the computer and its systems 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 Systems Implementation 263 Audit Controls With the arrival of more and more computers in organisations, the work of the auditor is made more complex A single transaction cannot now be traced (trailed) back through a series of hand-written ledgers If the auditor asks to see a ledger, he or she will most likely be handed a disk This is why the auditor must have a control system, properly documented, and including, for example, a pack of test data – as well as full details of the system and its controls Planning Audit Controls The auditor should be involved during planning and the introduction stage of the system He or she will agree controls and checks, which can then be built into the system with least disruption The auditor will plan controls to ensure the following points:  Adequate independent check to areas not affected by the computer  Adequate control figures for input and output records that remain outside the computer  No unauthorised use of the computer; time logs kept of use  Programs contain checks against errors and fraud  Printouts of static information stored in the computer  When two programs have a common data source, their output is crosschecked  Adequate control of programs or amendments to them  Safeguard against use of substitute or altered programs without authority The auditor will establish an audit trail through the system so that he or she can check the audit control functions The auditors will also:  Want their own copies of printed output  Be involved in testing the system using their own test data, both wrong and correct 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6  Be informed of all changes to programs so that they can check their controls  Regularly examine the processing log to ensure adequate control  Take security precautions to ensure that sensitive or valuable output (e.g printed cheques) is either not duplicated or duplications are destroyed bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b Documentation Checks The auditor should ensure adequate documentation in the following areas:  Source documents and the origin of input data  The conversion of input data  The method of operating the system to correct errors that arise during running  The printing of output and control of output  Approval for the use of the output Programs and the Auditor The auditor will need to review the whole range of programs in the system to find out if there are enough facilities to allow random or selective tests It may be necessary to write special programs for this purpose 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 264 Systems Implementation The auditor needs to be able to appreciate the contents of the program documentation and the technique of automatic programming This is so that he or she can understand the specific effect of each program on the computer Audit Tests During the program test runs, the auditors will take the opportunity to their own tests They will:  Gain a working experience of the reliability of the programs  Assess how well the system's internal checks operate  Input their own dummy data to test safeguards against error and fraud  Compare control checks in each system and investigate discrepancies  Input audit data to test the output Audit Participation Auditors, concerned as they are with computing, are not part of the computing department staff They are not continuously present to undertake tests and checks For this reason there are certain times when close collaboration between auditors and development staff is essential The auditor will be consulted at the stages of:  Problem definition  Systems programming specification and documentation  Testing of programs  Systems testing, parallel running and changeover  Determining back-up facilities When the system is fully operational the auditors will make both scheduled and surprise calls to make sure that the controls incorporated in the system are carried out and are satisfactory 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 Audit Packages 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 Computer-Assisted Auditing Techniques (CAATs) are becoming very popular as an efficient method of auditing This has become more pronounced as the processing and manipulation of data becomes more complex An audit package can be included as part of the accounting system bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 The four main advantages of CAATs are: 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233  They provide independent evidence of the data held on computerised files 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8  They enable selective printouts to be made of any particular audit interest 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0   They provide a calculation check of any program calculations, and allow for new calculations for review purposes They can identify data on file which is either in error or which should not be there CAATs are particularly relevant in small companies There, the auditor cannot rely on control procedures as they may be minimal owing to a lack of management structure Exhaustive, substantive tests of transactions and balances will need to be made and CAATs will speed up this work 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 Systems Implementation 265 Audit Trail During development of the project, the auditor, in conjunction with the project manager, will establish an audit trail This will enable him to run his tests during implementation and at regular intervals thereafter The audit trail is the method by which the details underlying summarised accounting data (i.e control and reconciliation totals) are obtained It takes into account the location and nature of any supporting documentary evidence Management is also concerned with similar data when external queries arise For example, customers may challenge the price on the invoices they have received The audit trail has to penetrate the entire system, from data collection to the distribution of the results, perhaps making use of controls that already exist The audit trail will consist of:  Source documents  Batch registers  Cash allocation list  A suspense file of on-list and off-list  A successful updates list containing the source of each transaction Post-implementation Audit Review Having designed and incorporated effective checks and controls into the system, and planned an audit work programme, the auditor must be satisfied, from time to time, that the control system is continuing to operate as expected He or she can then satisfy himself that the use of programs is subject to proper authorisation and that the computer log is an accurate record of the content and timing of each day's input The auditor's detailed review of the system will usually take place once most programs have been written Internal audit staff will have been consulted during development, and this will ultimately help the external auditor 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d The external auditor will make continuous evaluation of the system as programs are often altered, revised or rewritten This is an operational audit This will also check whether the projected benefits of a system have been fulfilled In some cases, one particular aspect of the system is followed all the way through This is called a vertical audit 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 SUMMARY 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 This unit is about the implementation process and what happens after the changeover of the system: ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29  We began with an examination of the need for planning of the implementation  We noted that this involved testing, training and reviews of the system  We then looked at what was involved in the changeover process and at the main methods of changeover c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f  Next came a section on user acceptance of the completed system 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02 266 Systems Implementation  This was followed by a long section on the various issues following implementation, such as:  (i) Monitoring (ii) Systems appraisal (iii) Maintenance (iv) Documentation (v) Enhancements (vi) And the post implementation review We then looked at the role of auditors and the need for their involvement in all aspects of the development 6b4090 276 f85e 7e79a2 7b4 f9d31306 2ff9828 5326 33d3 1409 b83a2 1eabae5 c78 69b235 50a5 c3c862be85 c992 c8a9 d31 cc7 8eb5 4cfda56e 5e9a28 26f8fcf74 565 4bb45 0f2 178 f0e02 f11 f3 f858 dd7 e448a6 231fe65db2a88 2044 c48 1c3 5a24df6 bc9 b0bcf6 4689 7071a2 696e7 f15 1a28a c446 11fbd8 db86 80ef6b9 8cc9b6 74dc1 df3a6 b9d39e60 7c3 09863 4a0f18e f8e90e f5 f54e 4fe0e e17fc36 91491 3481e 6e 688f0 1fc5a0 f29fe 01a1 f12bc58 e905 f3 c73b1d0e 18686 7c9 5c8 533 ccdd31 d8d 5ac1c03e9 7c0 9d11a 1e51fcb6a1e21 f59a 46c9796 d3ad0 16f5a324 85d6 6092 0b 85cbfd0 b14 f24 f71ee 04fbcfdd5 ed71 5fb4642 584d703 b0754 31c9d59 8785 e42 05bb4 6d10 f6a1 0a49fc87 4f4 ef7ff3 9e845fb 99d8 98157 b65 4c10 7b6 6e5e0 857 203076 c61 1f4 9f0 bca c3e09 e51 c452fb8 e3c6 26d5db4b01 0a9c3f7 752e7 b46e d9d2e cb4 2640a 78d3 1c7 88be 3195e d06 f227a 0a55e6 3c9 5c6 e5bdc8 493b45233 6241c8cf19 f4fe 18aca c143 58ed f87 5118 5b19 39fdd99 4c7 e0b6 5e9fca936 474 d600 f8f5a5205 f30 0647 0eaa75fb c03a6 cd1 296a7 baff2fde4fc88 c5d8 0e7e8 05c20 445 f057 6fba59ac8c4e 9bdf4e 2d37a 6e52e 4d1 fc0 d97e 52033 2486 b108 b 6ac85e 6b36 36b4 1df49 c267 c062 235bd48 0e9ed f9 dbd175b8eb7a 87444 0fa0 1dfe7 d7f7cf90a6 f92 74c81be 6be3 cbf7ee2 0416 0b53 5f5 7d8 c76 f1e6e 17e9 fe f3a8e f7a276 b2a0 4f9 2b17a 67137 b8a2 b5c136efb1e 7eaf7 81d1f4 316c593 d2c 0a2f44 210d1bfbcc3a7 35d5 1d13 f37 7b1 72d0 079b6dc0dfc35 e5ac1d8a5 f07 b5 ab5a5c1d67 622e0 44fd9c038a98 b3 f82 f5a071 7f5 9adefb04 4eeafe be3 c4c40e 54813e1 1a2e6a 6638e 29b2 0b7 c7e8a 1f7 92736 b1e8 c7ee ba292 7f7 2950 b4a90 b 87d180a 6f6 794a2 2d3 bb70a 4e2d2289aa8 df113fa 96d4 dd6 0d1 555e5 50f50086 24f6fb cc2 c3e2 d82a 7f4 2dc11d3 f7a8 4c9 d529 044 b7cfa91b4143 0b68 8aca f29 c5eac84c3f6 c86 c63 6c6 9f5ae 9f2 1f1 94c4b94 d1 c92e f3b8 8c4 e9b9a 3b5 cb2 8e b4a4b4 8b05 3489 bfa88 9d0 2057a9 3d2fb dd52 510 c0571 74e5 b5d0 9708 eb22 f03 1be6b6b5 d865 d19a15 7c0 c61 287d53f3bbef7 b31 c9b2 6f7 1494 f5a9 52c6be3 c9 9f937 3257 f26 5f9 43b5 6a1771 9851 f86 54481 0935 c52 003e be480 8c5 d5fba3e7 df50 b161 db0 3291ea f55 69f0537a9 e320 25a6bfdb6a95a68 c4 df2 df6e38a9 623 2b77ae3 f85 3222 3db95346 d300 0d8 68e6ddad9 20a7ba 014 ce7d06ee8 95a2fa e1 ab38e52 7a1f04aa55 bce 221d5ac4 2f1 4f8 b883 b9c08a42 99f2488 c61 c615 f54 f 9a4dfb005aa 1c4 96bfb25 b1e0 d760 7750 67084 0577 2254fb1 58f03b2 d6b49817 080f1 60e2 d78 c3f57a67a b43d1d4 9e5d1 7ed5 3e3b57ad1 6592 cc4d62 b9aa8 7e3 d22c57008 165 f64e 080b2350 cf37f2d7a0 6aa0164 4b4aaa b383ae 0d92a cab8b5 f8d2 e7f0b0d5d0 c7b2466 32074 e7d5 dee c289 77f33ed0 b62 c2abcf2417 1c5 5ab 79a5e77a d2d6 c3 bc8e 88b1bde 442fe00d6c2 8da41 da9d0585 dc8aa 9f0 c70 f60 447b14 faea0 d730 d286 87a0ee 3e82 c349 609d215 f8355a d21 7fd8 774e8 99bf88 d54395a c02 c16 b196 cc74e0 c79 d3a2a7 c15aa 5b71 b9aa86 8194 7ac88 281e 8d76 © ABE and RRC b48182 8e6b398 c7a71a 5ee1 f02

Ngày đăng: 02/01/2024, 09:50

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan