Premium Essay

Post Implementation Review Assignment #3 Description of the Relevant Information Technologies

In: Computers and Technology

Submitted By lilahi40
Words 343
Pages 2
Description of the relevant information technologies

Post Implementation Review
Assignment #3 Description of the relevant information technologies
Overview:
In this third assignment of the post-implementation review, student teams will describe the technical infrastructure of the information system project that is being studied (3-4 pages) by responding in detail to the following questions.
What hardware/operating system platform is being used for this application?
Describe the application architecture (centralized, distributed, client server) and infrastructure (2-tiered, 3-tiered).
If the application is an off-the-shelf package, what needs to be done to configure it to the target organization's requirement
If the application runs at multiple sites for this organization, how are the individual versions kept in synchronization? If each of the multiple sites is localized (a separate version for each installation) how is the application configured to the individual site?
Are databases used in this application?
a. What database management system is used?
b. Is data from this application integrated with any of the organization's other information systems?
c. If not, why isn't it?
d. If yes, how is it accomplished?
e. How are data back-up requirements being addressed?
Is any part of this application integrated with any of the organization's other information systems?
Which ones? How are they integrated?
If the subject application is completely separate, what is the reason it isn't integrated with any of the organization's other information systems?
What telecommunications or network components are being used for this application?
Is an intranet or extranet being used?
Does the application use the Internet?
Is there a firewall? What other protection is there for internet applications?
Are any special skills, training, or expertise necessary to…...

Similar Documents

Premium Essay

Information Technology Evaluation and Implementation - Project Risks

...Information Technology Evaluation and Implementation Project Risks Project risk involves understanding potential problems that might occur on the project and how they might impede project success. According to Fuller et.al (2008), “Project risk is an uncertain event or condition that, if it occurs, has a positive or a negative effect on a project objective.” There are many sources of risk that a project may come upon during the project whether it was foreseen or not. Some of the more common sources of risk are those that often overlooked in most projects; lack of determining the project scope, unforeseen costs estimates, unrealistic timelines, and lack of leadership overview. Risk management is the main solution to protect against risks. The goal of project risk management is to minimize potential risks while maximizing potential opportunities. Risk management can be broken into six categories; Risk management planning, risk identification, qualitative risk analysis, quantitative risk analysis, risk response planning, and risk monitoring and control. * Risk management planning is deciding how to best approach and plan the risk management activities for the project * Risk identification determines which risks are likely to affect a project and documenting their characteristics * Qualitative risk analysis characterizes and analyzes risks and then prioritizes their effects to project objectives * Quantitative risk analysis is measuring......

Words: 321 - Pages: 2

Premium Essay

Information Technology Management Assignment - Mcmann Cars Company

...facing by the corporation. A detailed description of those methods you propose to use to investigate these problems. Essential case facts such as location and facilities. In order to investigate the company’s problems, we’ve planned few actions: 1. Talking with the people concerned The first one will be one to one talk with senior managers to ask what their needs are. We will do the same with the employees in the offices via a questionnaire and people abroad to understand what the best solution for such international work will be. We will find out how much information we have to define what the IS must do, what else we need to figure out requirements to the system and what the most important things are. Furthermore company’s physical structure will be taken into consideration. 2. Analysing the company’s physical structure A consultant will come to a company’s office to look at habits of working people. The information system should match the company’s culture, but some of business processes have to be reengineered according to the current IS demand of the company The consultant’s task will be to identify the most important processes with setting priorities and 3 the ways of performing these processes better. It is very important to figure out processes that could be optimised via IT. The other advantage of this investigation will be auxiliary detection of weaknesses of the business processes of a whole organisation. 3. Suggest the best possible IS In......

Words: 3475 - Pages: 14

Premium Essay

Information Technology

...Methodology Guidebook Table of Contents Table of Contents 1. Project Management Overview ............................................................................1 1.1. Background ..................................................................................................1 1.2. An Overview of the Project Management Philosophy and Mission...............1 1.2.1. The PMO’s Mission............................................................................2 1.2.2. What Is A Project? .............................................................................2 1.2.3. What Is Project Management? ..........................................................2 1.2.4. What Is A Project Management Life Cycle? ......................................3 1.2.5. Deliverables Typically Produced for Each PMBOK Knowledge Areas4 1.2.6. Project Management Life Cycle and Knowledge Areas .....................5 1.2.7. Elements of Successful Project Management .................................15 1.3. Project Approach Selection Technique - Selection Indicators ....................15 1.3.1. Indicators for User Workshops ........................................................15 1.3.2. Indicators for Interviewing................................................................15 1.3.3. Indicators for Questionnaires...........................................................16 1.3.4. Indicators for Teamwork ..................................................................16 1.3.5. Indicators......

Words: 26282 - Pages: 106

Free Essay

Information Technologies

...going through rapid changes. We are realigning our priorities, focusing our efforts on improving our operations and becoming more customer-oriented than ever. We believe that the strategic transformation we manage today, is not only for us to become relevant and sustainable tomorrow, but most importantly it will deliver superior shareholder value to you. As always. Profitability Profit before tax Operating margin EBITDA margin Return on assets Return on equity Balance Sheet Total assets Total equity attributable to equity holders of the company Current ratio Staff Information No. of staff Staff costs to revenue Revenue per employee % RM’000 RM million RM million times RM million % % % % 2010 99.1 10.4 16.0 8.0 8.1 2009 109.3 9.1 14.5 5.9 9.6 2008 (0.5) 9.4 13.7 6.2 (4.4) 2007 15.5 11.8 16.9 7.9 (3.9) 2006 155.9 13.2 18.0 8.1 11.5 1,375.2 828.6 1.4 1,274.6 799.6 1.2 1,537.8 764.5 1.1 1,247.1 859.4 1.3 1,326.0 938.0 2.2 15,618 55.1 65.0 15,780 56.8 57.2 16,125 55.7 57.2 15,777 53.1 54.5 15,425 52.2 53.2 2 Pos Malaysia Annual Report 2010 Group Financial Highlights Pos Malaysia Annual Report 2010 3 4 Pos Malaysia Annual Report 2010 Business Highlights BUSINESS REVIEW • Revenue : RM624.3 million (up 17.0%) 2010 ACCOMPLISHMENTS • Successfully started operations of National Mail & Parcel Hub in October 2010 • Implemented the countrywide beat recasting exercise • Received the GOLD Award for Quality......

Words: 50839 - Pages: 204

Premium Essay

Restitance to Information Technology Implementation

...Lapointe & Rivard/Resistance to IT Implementation RESEARCH ARTICLE A MULTILEVEL MODEL OF RESISTANCE TO INFORMATION TECHNOLOGY IMPLEMENTATION1 By: Liette Lapointe Faculty of Management McGill University 1001 Sherbrooke Street West Montreal, Quebec H3A 1G5 Canada liette.lapointe@mcgill.ca Suzanne Rivard HEC Montreal 3000 Côte Ste-Catherine Road Montreal, Quebec H3T 2A7 Canada suzanne.rivard@hec.ca of the nature of the relationships between these components and (2) refine our understanding of the multilevel nature of the phenomenon. Using analytic induction, we examined data from three case studies of clinical information systems implementations in hospital settings, focusing on physicians’ resistance behaviors. The resulting mixeddeterminants model suggests that group resistance behaviors vary during implementation. When a system is introduced, users in a group will first assess it in terms of the interplay between its features and individual and/or organizational-level initial conditions. They then make projections about the consequences of its use. If expected consequences are threatening, resistance behaviors will result. During implementation, should some trigger occur to either modify or activate an initial condition involving the balance of power between the group and other user groups, it will also modify the object of resistance, from system to system significance. If the relevant initial conditions pertain to the power of the resisting group vis-à-vis the system...

Words: 16546 - Pages: 67

Free Essay

Information Technology

...CALABAR HIGH SCHOOL CSEC INFORMATION TECHNOLOGY (General Proficiency) School Based Assessment SPREADSHEET ------------------------------------------------- Description of Project It takes 90 seconds or less for a car thief to take your vehicle.  It is no longer enough to just roll-up your windows and lock your doors.  Although few stolen vehicles are recovered within 48 -72 hours, the damage has already been done.  The Spartahouse City Council in collaboration with the Spartahouse Police Department is encouraging residents to protect their vehicles. This is due to the fact that Incidents of Grand Theft Auto in the city have spiked by over 35% over the last year.  There is work to be done to educate citizens on how to protect their vehicles to reduce this particular crime even more. The council has been approached by the National Motor vehicle Theft Reduction Organization NMTRO and has planned to launch a campaign entitled “PROTECT YOUR VEHICLE". The program is specifically targeted at encouraging owners of high risk vehicles to install immobilizers and other antitheft devices. NMTRO works with other stakeholders to develop and implement countermeasures that will impede the activities of organized criminals. In the city and surrounding suburbs, any make or model of car is subject to theft.  Toyota and Nissan models made between 2005 and 2012 and Honda products are the most vulnerable for being stolen.   The City has hired a team of specialist to......

Words: 2817 - Pages: 12

Premium Essay

Lp3 Assignment Chapter 3 Review

...deviate from ethical and legal codes throughout the world. Whitman, Michael E., and Herbert J. Mattford. "The Need For Security." Principals Of Information Security, 4th Edition. CourseSmart/Cengage Learning, 2014. Web. 22 Mar. 2015. Chapter 3 Pages 90-91 2. What is civil law, and what does it accomplish? Civil: Governs nation or state; manages relationships/conflicts between organizational entities and people. Whitman, Michael E., and Herbert J. Mattford. "The Need For Security." Principals Of Information Security, 4th Edition. CourseSmart/Cengage Learning, 2014. Web. 22 Mar. 2015. Chapter 3 Pages 90-91 3. What are the primary examples of public law? Public law regulates the structure and administration of government agencies and their relationships with citizens, employees, and other governments. Public law includes criminal, administrative, and constitutional law. Whitman, Michael E., and Herbert J. Mattford. "The Need For Security." Principals Of Information Security, 4th Edition. CourseSmart/Cengage Learning, 2014. Web. 22 Mar. 2015. Chapter 3 Page 92 4. Which law amended the Computer Fraud and Abuse Act of 1986, and what did it change? The Computer Fraud and Abuse Act of 1986 (CFA Act) is the cornerstone of many computer-related federal laws and enforcement efforts. It was amended in October 1996 by the National Information Infrastructure Protection Act of 1996, which modified several sections of the previous act and increased the penalties for selected......

Words: 2320 - Pages: 10

Premium Essay

Information Technology Career Review

...Portfolio Project Professional Plan Bryant & Stratton College Southtowns Campus James Armstrong Network Security Mrs. Sedor March 19, 2014 This paper examines different aspects of the Information Technology field and related career paths. Certain aspects of the IT field were researched and explored in an attempt to learn more about the job market and the IT field. The categories that were explored in each job title were; pay scale, industry growth rate, responsibilities as well as educational background and training. Also examined was the possible over saturation of the job market by qualified but untested applicants in a seriously competitive market. (the number of students expected to graduate versus the projected job market). Information Technology Network Security is an ever changing, growing field of study. One cannot get involved in the careers it encompasses without having a basic love of learning, even on a subconscious level. New technology is constantly being developed and so anyone in the IT field must continually be retrained, for lack of a better term. This holds true even more so for the software side of the field. Consider the firewall or antivirus software, every time the computer system is turned on the system checks for updates to its library of known viruses. That means somewhere on the other end of the internet connection is a network security technician who is constantly researching and investigating new......

Words: 793 - Pages: 4

Premium Essay

Unit 3 Information Technology and Systems for Health Care

...Information Technology and Systems for Health Care Ursula Sheran HI300-01/Unit 3 June 1, 2015 Nakisha Floyd Unit 3 Assignment When the physicians tries to buy the same EHR product as their hospital it’s trying to accomplish how to make process writing order from their practices to the hospital. The physicians would have better access to the information that is needed to monitor the patients. The provider would be able to tap into the other providers’ through EHR systems when they are covering the emergency room. The pros of EHR are: It provides accurate and up to date information about the patients at the point of care. It also enables quick access to patient records. It has secure sharing information that is electronic and also helps provider to be more effect when diagnosing patients that leads to a minimally errors in the medical field. It’s a convenience and a source of communication because patient and provider. It’s a more reliable way to prescribing and also help streamline data to the billing department that would enable them to complete the coding process. The cons of EHR are: A lack of security which is one of the biggest problems. The information that stored in the database can be access without authorized authority. This leads to more medical records breeches. Hospitals cannot emerge the systems overnight so this means that a whole lot of time would be needed to make sure the paper information is inputted correctly. Not......

Words: 654 - Pages: 3

Premium Essay

Information Technology Assignment

...1.1 Innovation leads to profitable growth if it: * Generates new profit pools * Increases demand for products and services * Attracts new customers * Opens new markets * Sustains the business for years to come 1.2 An information system collects, processes, stores, analyzes, and distributes information for a specific purpose of objective. Four basic functions of an IS are Input, Processing, Output, and Feedback. * Input: Data and information about business transactions are captured or collected by point-of-sale scanners and web sites and received by other input devices. * Processing: Data is transformed, converted, and analyzed for storage or transfer to an output device. * Output: Data, information, reports, and so on are distributed to digital screens or hardcopy, sent as audio, or transferred to other ISs via communication networks. * Feedback: A feedback mechanism monitors and controls operations. 1.3 Strategies for competitive advantage: * Cost leadership: Produce product/service at the lowest cost in the industry. * Differentiation: Offer different products, services, or product features. * Niche: Select a narrow-scope segment (market niche) and be the best in quality, speed, or cost in that segment. * Growth: Increase market share, acquire more customers, or sell more types of products. * Alliance: Work with business partners in partnerships, alliances, joint ventures, or......

Words: 1159 - Pages: 5

Premium Essay

Post Implementation

...Post Implementation Review Report Section 5.6.7 5 SECURITY The purpose of this section is to determine if the system provides adequate security of data and programs. In addition to access security, procedures for backup, recovery, and restart had been reviewed. 5.1 Data Security Unleashed as an online system, has transaction logging for us to review the adequacy of its data safeness. We do have concern of data security as the implementation group mentioned, the system only asks for user name and password for access. We suggest we add a feature that after entering user name and password on the website, each authorized user need to click on a link which generates a random security code which is sent to the phone (SMS) and email registered with theirs accounts. They need to enter this security code before they are allowed access. The code expires in 10 minutes. (Hall, 2011) 5.2 Disaster Recovery Unleash is an online software which brings out our concern about data recovery, data might get corrupt if the client is experiencing internet traffic or reginal blackout. Thus fore, we suggest Unleash backups transfer only new or changed blocks—shrinking the backup windows, minimizing network traffic, and reducing disk capacity requirements. Because it’s not moving or storing redundant data, the client can back up more often on hourly basis, for instance, while reducing their storage footprint. We do recommend the client download Master Data and Transaction Data on a daily basis...

Words: 1170 - Pages: 5

Premium Essay

Information Technology

...public sector realized that, for a variety of reasons, they needed to upgrade their information system. Once they chose to follow the path of IS conversion, they became aware of many of the same challenges that others have faced in similar circumstances. Some managers began to realize that their projects began to spiral out of control into the realm of failure sometimes without their understanding the reasons why, in turn wasting vast sums of taxpayer dollars in the process. The public sector has had to take a step forward in recent decades from the older and usually slower legacy systems that they relied on for previous decades to systems that were promoted as more efficient and definitely more complex. A vast array of knowledge, tools, and options has become available to managers that are progressing through what is usually a long and uncertain conversion process. The process of managing people is not easy, whether they are few or many. Management of firms of accountants and consultants need to be certain that the right team of specialists is in the right place at the right time, over and over again. Information internal to the organization is important for enabling the organization to attack the opportunities in the environment. If it is not available, managers take uninformed decisions which are likely to lead to poor achievement of goals. Ready access to accurate and timely information for decision making is a fundamental requirement for managers. In today’s......

Words: 2390 - Pages: 10

Premium Essay

Management Information Technology Literature Review

...Running head: ETHICAL BEHAVIOR AND THE WORKPLACE How Businesses Are Using Technology to Enforce Ethical Behavior in the Workplace: Jonathan R. Jordan Liberty University Abstract Many companies and organizations are finding enviable growth and expansion only by delving into new markets. To accomplish this, companies must seize the advantage of utilizing the latest and most effective technology. With the rapid advancement of technology, the importance of business ethics has increased immensely. Ethics has always been an important subject as long as companies and organizations have been conducting business. However, this rapid technological advancement has and will have a tremendous impact on business ethics. This literature review will explain how businesses are using technology to enforce ethics in the workplace. It will discuss how the progression of technology is forcing businesses and organizations to approach their operations from an ethical perspective. It will explain the importance of business ethics, and will provide research concerning what has been accomplished to utilize technology in enforcing business ethics. Ethics The concept of ethics involves deciding what kind of work life businesses and companies should seek for their employees (Audi, 2009). Morality, honesty, and integrity, are ethical concerns that are seemingly deficient in modern society. However, the concept of ethics reaches further into the fiber of corporations and......

Words: 6959 - Pages: 28

Premium Essay

Post Implementation Review

...Post-Implementation Review Report Overview The Post-Implementation Review is used to evaluate the effectiveness of the system development after the system has been in production for a period of time (normally 6 months). The objectives are to determine if the system does what it is designed to do: Does it support the user as required in an effective and efficient manner? The review should assess how successful the system is in terms of functionality, performance, and cost versus benefits, as well as assess the effectiveness of the life-cycle development activities that produced the system. The review results can be used to strengthen the system as well as system development procedures. The review is scheduled to follow the release of a system or system revision by an appropriate amount of time to allow determination of the effectiveness of the system. A representative from the functional development group or other member of the major user organization participates in the review. The System Proponent ensures that all documentation and all personnel needed to participate in the review are accessible. The reviewer and an assigned team collect the information needed for the Post-Implementation Review by interviewing end users and their managers, system administrators, and computer operations personnel. The report is then prepared and provided to the user organization that requested it and the information systems organization, which may jointly use the findings to......

Words: 1917 - Pages: 8

Premium Essay

Accounting Information Systems: Course Objectives, Description, Topics, and Assignments

...ACCOUNTING INFORMATION SYSTEMS: COURSE OBJECTIVES, DESCRIPTION, TOPICS, AND ASSIGNMENTS ACCT-5600 DR. NICOLAOU Fall 2010 COURSE STRUCTURE In the modern world, the majority of accounting entries occur electronically. Accountants and auditors store information in databases, managed by enterprise systems that have a set of controls to ensure that transactions and record keeping happen as expected. E-business Web sites handle transactions automatically, with the accounting data going directly into the necessary databases. The concept of a paper trail has become a bit of a misnomer; today, because of accounting information systems, there is often no paper involved at all; however, it is important to establish the flow the data in different areas of the organization, or audit trail, so as to properly exercise internal controls. AISs help in this purpose. At the outset of this course, you will learn the basics of accounting information systems and business processes. Next, you will learn about database management systems, and the design of various database models. Finally, you will learn about how to use internal controls effectively for risk management, as well as the requirements for business reporting. After completing this course, you should not only have a clear idea of how accounting information systems work, but you should also be prepared to design and configure them to meet the record-keeping and risk management requirements of the organization. In......

Words: 6838 - Pages: 28

Provincial Vintage Chandelier 6 Light Smoke Gray E12 Crystals Glass | Episode Three season 01 episode 03 | Watch movie