1191268 - Pearson Education Limited ©

13 System Implementation

Learning Objectives

After studying this chapter, you should be able to:

provide an overview of the system implementation process; describe how software applications are tested; apply four installation strategies: direct, parallel, single-location, and phased installation; list the deliverables for documenting the system and for training and supporting users; explain why system implementation sometimes fails; describe the threats to system security and remedies that can be applied; and show how traditional implementation issues apply to electronic commerce applications.

13.1 13.2 13.3

13.4

13.5 13.6

13.7

1191268 - Pearson Education Limited ©

Introduction After maintenance, the implementation phase of the systems development life cycle (SDLC) is the most expensive and time-consuming phase of the entire life cycle. Implementation is expensive because so many people are involved in the process; it is time consuming because of all the work that has to be completed. In a traditional plan-driven systems development project, physical design specifications must be turned into working computer code, and the code must be tested until most of the errors have been detected and corrected. In a systems development project governed by agile methodologies, design, coding, and testing are done in concert, as you learned in previous chapters. Regardless of methodology used, once coding and testing are complete and the system is ready to “go live,” it must be installed (or put into production), user sites must be prepared for the new system, and users rely on the new system rather than the existing one to get their work done.

Implementing a new information system into an organizational context is not a mechanical process. The organizational context has been shaped and reshaped by the people who work in the organization. The work habits, beliefs, interrelationships, and personal goals of an organization’s members all affect the implementation process. Although factors important to successful implementation have been identified, there are no sure recipes you can follow. During implementation, you must be attuned to key aspects of the

1191268 - Pearson Education Limited ©

organizational context, such as history, politics, and environmental demands—aspects that can contribute to implementation failure if ignored.

In this chapter, you will learn about the many activities that the implementation phase comprises. We will discuss coding, testing, installation, documentation, user training, support for a system after it is installed, and implementation success. Our intent is not to teach you how to program and test systems—most of you have already learned about writing and testing programs in the courses you took before this one. Rather, this chapter shows you where coding and testing fit in the overall scheme of implementation, especially in a traditional, plan-driven context. The chapter stresses the view of implementation as an organizational change process that is not always successful.

In addition, you will learn about providing documentation about the new system for the information systems personnel who will maintain the system and for the system’s users. These same users must be trained to use what you have developed and installed in their workplace. Once training has ended and the system has become institutionalized, users will have questions about the system’s implementation and how to use it effectively. You must provide a means for users to get answers to these questions and to identify needs for further training.

As a member of the system development team that developed and implemented the new system, your job is winding down now that installation and conversion are

1191268 - Pearson Education Limited ©

complete. The end of implementation marks the time for you to begin the process of project closedown. At the end of this chapter, we will turn to the topic of formally ending the systems development project.

After a brief overview of the coding, testing, and installation processes and the deliverables and outcomes from these processes, we will talk about software application testing. We then present the four types of installation: direct, parallel, single-location, and phased. You then will read about the process of documenting systems and training and supporting users as well as the deliverables from these processes. We then discuss the various types of documentation and numerous methods available for delivering training and support services. You will read about implementation as an organizational change process, with many organizational and people issues involved in the implementation effort. You will also read about the threats to security that organizations face and some of the things that can be done to make systems more secure. Finally, you will see how the implementation of an electronic commerce application is similar to the implementation of more traditional systems.

1191268 - Pearson Education Limited ©

System Implementation System implementation is made up of many activities. The six major activities we are concerned with in this chapter are coding, testing, installation, documentation, training, and support (see Figure 13-1 ). The purpose of these steps is to convert the physical system specifications into working and reliable software and hardware, document the work that has been done, and provide help for current and future users and caretakers of the system. Coding and testing may have already been completed by this point if agile methodologies have been followed. Using a plan-driven methodology, coding and testing are often done by other project team members besides analysts, although analysts may do some programming. In any case, analysts are responsible for ensuring that all of these various activities are properly planned and executed. Next, we will briefly discuss these activities in two groups: (1) coding, testing, and installation and (2) documenting the system and training and supporting users.

Figure 13-1 Systems development life cycle with the implementation phase highlighted

1191268 - Pearson Education Limited ©

Coding, Testing, and Installation Processes

Coding, as we mentioned before, is the process whereby the physical design specifications created by the analysis team are turned into working computer code by the programming team. Depending on the size and complexity of the system, coding can be an involved, intensive activity. Regardless of the development methodology followed, once coding has

1191268 - Pearson Education Limited ©

begun, the testing process can begin and proceed in parallel. As each program module is produced, it can be tested individually, then as part of a larger program, and then as part of a larger system. You will learn about the different strategies for testing later in this chapter. We should emphasize that, although testing is done during implementation, you must begin planning for testing earlier in the project. Planning involves determining what needs to be tested and collecting test data. This is often done during the analysis phase because testing requirements are related to system requirements.

Installation is the process during which the current system is replaced by the new system. This includes conversion of existing data, software, documentation, and work procedures to those consistent with the new system. Users must give up the old ways of doing their jobs, whether manual or automated, and adjust to accomplishing the same tasks with the new system. Users will sometimes resist these changes, and you must help them adjust. However, you cannot control all the dynamics of user– system interaction involved in the installation process.

Deliverables and Outcomes from Coding, Testing, and Installation

Table 13-1 shows the deliverables from the coding, testing, and installation processes. Some programming languages include utilities to generate documentation automatically, while others require more effort on the part of the coder to establish good documentation. But even well- documented code can be mysterious to maintenance programmers who must maintain the system for years after the original system was written and the original programmers have moved on to other jobs. Therefore,

1191268 - Pearson Education Limited ©

clear, complete documentation for all individual modules and programs is crucial to the system’s continued smooth operation. The results of program and system testing are important deliverables from the testing process because they document the tests as well as the test results. For example, what type of test was conducted? What test data were used? How did the system handle the test? The answers to these questions can provide important information for system maintenance because changes will require retesting, and similar testing procedures will be used during the maintenance process.

Table 13-1 Deliverables for Coding, Testing, and Installation

1. Coding a. Code b. Program documentation

2. Testing a. Test scenarios (test plan) and test data b. Results of program and system testing

3. Installation a. User guides b. User training plan c. Installation and conversion plan

i. Software and hardware installation schedule ii. Data conversion plan iii. Site and facility remodeling plan

The next two deliverables, user guides and the user training plan, result from the installation process. User guides provide information on how to use the new system, and the training plan is a strategy for training users so that they can quickly learn the new system. The development of the training plan probably began earlier in the project, and some training, on the concepts behind the new system, may have already taken place. During the

1191268 - Pearson Education Limited ©

early stages of implementation, the training plans are finalized and training on the use of the system begins. Similarly, the installation plan lays out a strategy for moving from the old system to the new, from the beginning to the end of the process. Installation includes installing the system (hardware and software) at central and user sites. The installation plan answers such questions as when the new system will be installed, which installation strategies will be used, who will be involved, what resources are required, which data will be converted and cleansed, and how long the installation process will take. It is not enough that the system is installed; users must actually use it.

As an analyst, your job is to ensure that all of these deliverables are produced and are done well. You may produce some of the deliverables, such as test data, user guides, and an installation plan; for other deliverables, such as code, you may only supervise or simply monitor their production or accomplishment. The extent of your implementation responsibilities will vary according to the size and standards of the organization you work for, but your ultimate role includes ensuring that all the implementation work leads to a system that meets the specifications developed in earlier project phases.

The Processes of Documenting the System, Training Users, and Supporting Users Although the process of documentation proceeds throughout the life cycle, it receives formal attention during the implementation phase because the end of implementation largely marks the end of the analysis team’s involvement in systems development. As the team is getting ready to move on to new projects, you and the other analysts need to prepare documents that reveal all of the important information you have accumulated about this system during its development and implementation. There are two

1191268 - Pearson Education Limited ©

audiences for this final documentation: (1) the information systems personnel who will maintain the system throughout its productive life, and (2) the people who will use the system as part of their daily lives. The analysis team in a large organization can get help in preparing documentation from specialized staff in the information systems department.

Larger organizations also tend to provide training and support to computer users throughout the organization. Some of the training and support is very specific to particular application systems, whereas the rest is general to particular operating systems or off-the-shelf software packages. For example, it is common to find courses on Microsoft Windows in organization-wide training facilities. Analysts are mostly uninvolved with general training and support, but they do work with corporate trainers to provide training and support tailored to particular computer applications they have helped to develop. Centralized information system training facilities tend to have specialized staff who can help with training and support issues. In smaller organizations that cannot afford to have well- staffed centralized training and support facilities, fellow users are the best source of training and support that users have, whether the software is customized or off the shelf.

Deliverables and Outcomes from Documenting the System, Training Users, and Supporting Users

Table 13-2 shows the deliverables from documenting the system, training users, and supporting users. At the very least, the development

1191268 - Pearson Education Limited ©

team must prepare user documentation. For most modern information systems, documentation includes any online help designed as part of the system interface. The development team should think through the user training process: Who should be trained? How much training is adequate for each training audience? What do different types of users need to learn during training? The training plan should be supplemented by actual training modules, or at least outlines of such modules, that at a minimum address the three questions stated previously. Finally, the development team should also deliver a user support plan that addresses issues such as how users will be able to find help once the information system has become integrated into the organization. The development team should consider a multitude of support mechanisms and modes of delivery. Each deliverable is addressed in more detail later in this chapter.

Table 13-2 Deliverables for Documenting the System, Training, and Supporting Users

1. Documentation a. System documentation b. User documentation

2. User Training Plan a. Classes b. Tutorials

3. User Training Modules a. Training materials b. Computer-based training aids

4. User Support Plan a. Help desk b. Online help c. Bulletin boards and other support mechanisms

1191268 - Pearson Education Limited ©

1191268 - Pearson Education Limited ©

Software Application Testing As we mentioned previously, in traditional plan-driven systems development projects, analysts prepare system specifications that are passed on to programmers for coding. Although coding takes considerable effort and skill, the practices and processes of writing code do not belong in this text. However, because software application testing is an activity that analysts plan (beginning in the analysis phase) and sometimes supervise, depending on organizational standards, you need to understand the essentials of the testing process. Although this section of the text focuses on testing from the perspective of traditional development practices, many of the same types of tests can be used during the analyze– design–code–test cycle common to the agile methodologies. Coding and testing in eXtreme Programming will be discussed briefly toward the end of this section on testing.

Software testing begins early in the SDLC, even though many of the actual testing activities are carried out during implementation. During analysis, you develop a master test plan. During design, you develop a unit test plan, an integration test plan, and a system test plan. During implementation, these various plans are put into effect and the actual testing is performed.

The purpose of these written test plans is to improve communication among all the people involved in testing the application software. The plan specifies what each person’s role will be during testing. The test plans also serve as checklists you can use to determine whether the master test plan

1191268 - Pearson Education Limited ©

has been completed. The master test plan is not just a single document, but a collection of documents. Each of the component documents represents a complete test plan for one part of the system or for a particular type of test. Presenting a complete master test plan is far beyond the scope of this book. To give you an idea of what a master test plan involves, we present an abbreviated table of contents of one in Table 13-3 .

Table 13-3 Table of Contents of a Master Test Plan

1. Introduction a. Description of system to be tested b. Objectives of the test plan c. Method of testing d. Supporting documents

2. Overall Plan a. Milestones, schedules, and locations b. Test materials

i. Test plans ii. Test cases iii. Test scenarios iv. Test log

3. Testing Requirements a. Hardware b. Software c. Personnel

4. Procedure Control a. Test initiation b. Test execution c. Test failure d. Access/change control e. Document control

1191268 - Pearson Education Limited ©

5. Test-Specific or Component-Specific Test Plans a. Objectives b. Software description c. Method d. Milestones, schedule, progression, and locations e. Requirements f. Criteria for passing tests g. Resulting test materials h. Execution control i. Attachments

(Source: Adapted from Mosley, 1993.)

A master test plan is a project within the overall systems development project. Because at least some of the system testing will be done by people who have not been involved in the system development so far, the Introduction provides general information about the system and the need for testing. The Overall Plan and Testing Requirements sections are like a Baseline Project Plan for testing, with a schedule of events, resource requirements, and standards of practice outlined. Procedure Control explains how the testing is conducted, including how changes to fix errors will be documented. The fifth and final section explains each specific test necessary to validate that the system performs as expected.

Some organizations have specially trained personnel who supervise and support testing. Testing managers are responsible for developing test plans, establishing testing standards, integrating testing and development activities in the life cycle, and ensuring that test plans are completed. Testing specialists help develop test plans, create test cases and scenarios, execute the actual tests, and analyze and report test results.

1191268 - Pearson Education Limited ©

Seven Different Types of Tests

Software application testing is an umbrella term that covers several types of tests. Mosley (1993) organizes the types of tests according to whether they employ static or dynamic techniques and whether the test is automated or manual. Static testing means that the code being tested is not executed. The results of running the code are not an issue for that particular test. Dynamic testing, on the other hand, involves execution of the code. Automated testing means the computer conducts the test, whereas manual testing means that people complete the test. Using this framework, we can categorize the different types of tests, as shown in Table 13-4 .

Table 13-4 A Categorization of Test Types

Manual Automated

Static Inspections Syntax checking

Dynamic Walk-throughs Unit test

Desk checking Integration test

System test

(Source: Adapted from Mosley, 1993.)

Let’s examine each type of test in turn. Inspections are formal group activities where participants manually examine code for occurrences of well-known errors. Syntax, grammar, and some other routine errors can be checked by automated inspection software, so manual inspection checks are used for more subtle errors. Each programming language lends itself to

1191268 - Pearson Education Limited ©

certain types of errors that programmers make when coding, and these common errors are well-known and documented. Code inspection participants compare the code they are examining with a checklist of well- known errors for that particular language. Exactly what the code does is not investigated in an inspection. It has been estimated that code inspections detect from 60 to 90 percent of all software defects as well as provide programmers with feedback that enables them to avoid making the same types of errors in future work (Fagan, 1986). The inspection process can also be used for tasks such as design specifications.

Inspections A testing technique in which participants examine program code for predictable language-specific errors.

Unlike inspections, what the code does is an important question in a walk- through. The use of structured walk-throughs is a very effective method of detecting errors in code. As you saw in Chapter 5 , structured walk- throughs can be used to review many systems development deliverables, including logical and physical design specifications as well as code. Whereas specification walk-throughs tend to be formal reviews, code walk- throughs tend to be informal. Informality tends to make programmers less apprehensive about walk-throughs and helps increase their frequency. According to Yourdon (1989), code walk-throughs should be done frequently when the pieces of work reviewed are relatively small and before the work is formally tested. If walk-throughs are not held until the entire program is tested, the programmer will have already spent too much time looking for errors that the programming team could have found much more

1191268 - Pearson Education Limited ©

quickly. The programmer’s time will have been wasted, and the other members of the team may become frustrated because they will not find as many errors as they would have if the walk-through had been conducted earlier. Further, the longer a program goes without being subjected to a walk-through, the more defensive the programmer becomes when the code is reviewed. Although each organization that uses walk-throughs conducts them differently, there is a basic structure that you can follow that works well (see Figure 13-2 ).

Figure 13-2 Steps in a typical walk-through (Source: Based on Yourdon, 1989.)

It should be stressed that the purpose of a walk-through is to detect errors, not to correct them. It is the programmer’s job to correct the errors uncovered in a walk-through. Sometimes it can be difficult for the reviewers to refrain from suggesting ways to fix the problems they find in the code, but increased experience with the process can help change a reviewer’s behavior.

What the code does is important in desk checking , an informal process in which the programmer or someone else who understands the logic of

1191268 - Pearson Education Limited ©

the program works through the code with a paper and pencil. The programmer executes each instruction, using test cases that may or may not be written down. In one sense, the reviewer acts as the computer, mentally checking each step and its results for the entire set of computer instructions.

Desk checking A testing technique in which the program code is sequentially executed manually by the reviewer.

Among the list of automated testing techniques in Table 13-4 , only one technique is static—syntax checking. Syntax checking is typically done by a compiler. Errors in syntax are uncovered but the code is not executed. For the other three automated techniques, the code is executed.

Unit testing , sometimes called module testing, is an automated technique whereby each module is tested alone in an attempt to discover any errors that may exist in the module’s code. But because modules coexist and work with other modules in programs and the system, they must also be tested together in larger groups. Combining modules and testing them is called integration testing . Integration testing is gradual. First you test the coordinating module and only one of its subordinate modules. After the first test, you add one or two other subordinate modules from the same level. Once the program has been tested with the coordinating module and all of its immediately subordinate modules, you add modules from the next level and then test the program. You continue this procedure until the entire program has been tested as a unit. System testing is a similar process, but instead of integrating modules into

1191268 - Pearson Education Limited ©

programs for testing, you integrate programs into systems. System testing follows the same incremental logic that integration testing does. Under both integration and system testing, not only do individual modules and programs get tested many times, so do the interfaces between modules and programs.

Unit testing The process of testing each module alone in an attempt to discover any errors in its code.

Integration testing The process of bringing together all of the modules that a program comprises for testing purposes. Modules are typically integrated in a top-down, incremental fashion.

System testing The bringing together of all of the programs that a system comprises for testing purposes. Programs are typically integrated in a top-down, incremental fashion.

1191268 - Pearson Education Limited ©

Current practice calls for a top-down approach to writing and testing modules. Under a top-down approach, the coordinating module is written first. Then the modules at the next level in the structure chart are written, followed by the modules at the next level, and so on, until all of the modules in the system are done. Each module is tested as it is written. Because top-level modules contain many calls to subordinate modules, you may wonder how they can be tested if the lower-level modules haven’t been written yet. The answer is stub testing . Stubs are two or three lines of code written by a programmer to stand in for the missing modules. During testing, the coordinating module calls the stub instead of the subordinate module. The stub accepts control and then returns it to the coordinating module.

Stub testing A technique used in testing modules, especially where modules are written and tested in a top-down fashion, where a few lines of code are used to substitute for subordinate modules.

System testing is more than simply expanded integration testing where you are testing the interfaces between programs in a system rather than testing the interfaces between modules in a program. System testing is also intended to demonstrate whether a system meets its objectives. This is not the same as testing a system to determine whether it meets requirements— that is the focus of acceptance testing, which will be discussed later. To verify that a system meets its objectives, system testing involves using nonlive test data in a nonlive testing environment. Nonlive means that the data and situation are artificial, developed specifically for testing purposes,

1191268 - Pearson Education Limited ©

although both the data and the environment are similar to what users would encounter in everyday system use. The system test is typically conducted by information systems personnel and led by the project team leader, although it can also be conducted by users under MIS guidance. The scenarios that form the basis for system tests are prepared as part of the master test plan.

The Testing Process

Up to this point, we have talked about the master test plan and seven different types of tests for software applications. We haven’t said very much about the process of testing itself. There are two important things to remember about testing information systems:

1. The purpose of testing is to confirm that the system satisfies requirements.

2. Testing must be planned.

These two points have several implications for the testing process, regardless of the type of test being conducted. First, testing is not haphazard. You must pay attention to many different aspects of a system, such as response time, response to boundary data, response to no input, response to heavy volumes of input, and so on. You must test anything (within resource constraints) that could go wrong or be wrong with a system. At a minimum, you should test the most frequently used parts of the system and as many other paths throughout the system as time permits. Planning gives analysts and programmers an opportunity to think through all the potential problem areas, list these areas, and develop ways to test for problems. As indicated previously, one part of the master test

1191268 - Pearson Education Limited ©

plan is creating a set of test cases, each of which must be carefully documented (see Figure 13-3 for an outline of a test case description).

Figure 13-3 Test case description form (Source: Adapted from Mosley, 1993.)

1191268 - Pearson Education Limited ©

A test case is a specific scenario of transactions, queries, or navigation paths that represent a typical, critical, or abnormal use of the system. A test case should be repeatable so that it can be rerun as new versions of the software are tested. This is important for all code, whether written in-house,

1191268 - Pearson Education Limited ©

developed by a contractor, or purchased. Test cases need to determine that new software works with other existing software with which it must share data. Even though analysts often do not do the testing, systems analysts, because of their intimate knowledge of applications, often make up or find test data. The people who create the test cases should not be the same people as those who coded and tested the system. In addition to a description of each test case, there must also be a description of the test results, with an emphasis on how the actual results differed from the expected results (see Figure 13-4 ). This description will indicate why the results were different and what, if anything, should be done to change the software. This description will then suggest the need for retesting, possibly introducing new tests to discover the source of the differences.

Figure 13-4 Test case results form (Source: Adapted from Mosley, 1993.)

1191268 - Pearson Education Limited ©

One important reason to keep such a thorough description of test cases and results is so that testing can be repeated for each revision of an application. Although new versions of a system may necessitate new test data to validate new features of the application, previous test data usually

1191268 - Pearson Education Limited ©

can and should be reused. Results from the use of the test data with prior versions are compared to new versions to show that changes have not introduced new errors and that the behavior of the system, including response time, is no worse. A second implication for the testing process is that test cases must include illegal and out-of-range data. The system should be able to handle any possibility, no matter how unlikely; the only way to find out is to test.

Testing often requires a great deal of labor. Manual code reviews can be very time consuming and tedious work; and, most importantly, are not always the best solution. As such, special purpose testing software, called a testing harness , is being developed for a variety of environments to help designers automatically review the quality of their code. In many situations, a testing harness will greatly enhance the testing process because it can automatically expand the scope of the tests beyond the current development platform as well as be run every time there is a new version of the software. For instance, with the testing harness called Costello, a developer can answer questions such as how stable is the code? Does the code follow standard rules? Will the code work across multiple platforms? When deploying large-scale, multi-platform projects, automatic code review systems have become a necessity.

Testing harness An automated testing environment used to review code for errors, standards violations, and other design flaws.

1191268 - Pearson Education Limited ©

Combining Coding and Testing

Although coding and testing are in many ways part of the same process, it is not uncommon in large and complicated systems development environments to find the two practices separated from each other. Big companies and big projects often have dedicated testing staffs that develop test plans and then use the plans to test software after it has been written. You have already seen how many different types of testing there are, and you can deduce from that how elaborate and extensive testing can be. As you recall, with eXtreme Programming (XP) (Beck & Andres, 2004) and other agile methodologies, coding and testing are intimately related parts of the same process, and the programmers who write the code also write the tests. The general idea is that code is tested soon after it is written.

After testing, all of the code that works may be integrated at the end of each working day, and working versions of the system will be released frequently, as often as once per week in some cases. XP developers design and build working systems in very little time (relative to traditionally organized methods).

One particular technique used in XP to continually improve system quality is refactoring . Refactoring is nothing more than simplifying a system, typically after a new feature or set of features has been added. As more features are added to a system, it becomes more complex, and this complexity will be reflected in the code. After a time of increasing complexity, XP developers stop and redesign the system. The system must still pass the test cases written for it after it has been simplified, so rework continues until the tests can be passed. Different forms of refactoring include simplifying complex statements, abstracting solutions from reusable code, and removing duplicate code. Refactoring and the

1191268 - Pearson Education Limited ©

continuing simplification it implies reflect the iterative nature of XP and the other Agile Methodologies. As development progresses and the system gets closer to being ready for production, the iterations and the evolution of the system slow, a process Beck (2000) calls “productionizing.” A system ready to go into production is ready to be released to users, either customers ready to buy the software or internal users.

Refactoring Making a program simpler after adding a new feature.

Acceptance Testing by Users

Once the system tests have been satisfactorily completed, the system is ready for acceptance testing , which is testing the system in the environment where it will eventually be used. Acceptance refers to the fact that users typically sign off on the system and “accept” it once they are satisfied with it. The purpose of acceptance testing is for users to determine whether the system meets their requirements. The extent of acceptance testing will vary with the organization and with the system in question. The most complete acceptance testing will include alpha testing , in which simulated but typical data are used for system testing; beta testing , in which live data are used in the users’ real working environment; and a system audit conducted by the organization’s internal auditors or by members of the quality assurance group.

1191268 - Pearson Education Limited ©

Acceptance testing The process whereby actual users test a completed information system, the end result of which is the users’ acceptance of it.

Alpha testing User testing of a completed information system using simulated data.

Beta testing User testing of a completed information system using real data in the real user environment.

During alpha testing, the entire system is implemented in a test environment to discover whether the system is overtly destructive to itself or to the rest of the environment. The types of tests performed during alpha testing include the following:

Recovery testing—forces the software (or environment) to fail in order to verify that recovery is properly performed. Security testing—verifies that protection mechanisms built into the system will protect it from improper penetration.

1191268 - Pearson Education Limited ©

Stress testing—tries to break the system (e.g., what happens when a record is written to the database with incomplete information or what happens under extreme online transaction loads or with a large number of concurrent users). Performance testing—determines how the system performs in the range of possible environments in which it may be used (e.g., different hardware configurations, networks, operating systems, and so on); often the goal is to have the system perform with similar response time and other performance measures in each environment.

In beta testing, a subset of the intended users runs the system in the users’ own environments using their own data. The intent of the beta test is to determine whether the software, documentation, technical support, and training activities work as intended. In essence, beta testing can be viewed as a rehearsal of the installation phase. Problems uncovered in alpha and beta testing in any of these areas must be corrected before users can accept the system. Systems analysts can tell many stories about long delays in final user acceptance due to system bugs.

1191268 - Pearson Education Limited ©

Installation The process of moving from the current information system to the new one is called installation . All employees who use a system, whether they were consulted during the development process or not, must give up their reliance on the current system and begin to rely on the new system. Four different approaches to installation have emerged over the years: direct, parallel, single-location, and phased (Figure 13-5 ). The approach an organization decides to use will depend on the scope and complexity of the change associated with the new system and the organization’s risk aversion.

Figure 13-5 Comparison of installation strategies (Source: Adapted from Bell and Evans, 1989.)

(a) Direct installation

(b) Parallel installation

1191268 - Pearson Education Limited ©

(c) Single-location installation (with direct installation at each location)

(d) Phased installation

1191268 - Pearson Education Limited ©

Installation The organizational process of changing over from the current information system to a new one.

Direct Installation

The direct, or abrupt, approach to installation (also called “cold turkey”) is as sudden as the name indicates: The old system is turned off and the new system is turned on (Figure 13-5a ). Under direct installation , users are at the mercy of the new system. Any errors resulting from the new system will have a direct impact on the users and how they do their jobs and, in some cases—depending on the centrality of the system to the organization—on how the organization performs its business. If the new system fails, considerable delay may occur until the old system can again be made operational and business transactions are re-entered to make the database up to date. For these reasons, direct installation can be very risky. Further, direct installation requires a complete installation of the whole system. For a large system, this may mean a long time until the new system can be installed, thus delaying system benefits or even missing the opportunities that motivated the system request. On the other hand, it is the least expensive installation method, and it creates considerable interest in making the installation a success. Sometimes, a direct installation is the only possible strategy if there is no way for the current and new systems to coexist, which they must do in some way in each of the other installation approaches.

1191268 - Pearson Education Limited ©

Direct installation Changing over from the old information system to a new one by turning off the old system when the new one is turned on.

Parallel Installation

Parallel installation is as riskless as direct installation is risky. Under parallel installation, the old system continues to run alongside the new system until users and management are satisfied that the new system is effectively performing its duties and the old system can be turned off (Figure 13-5b ). All of the work done by the old system is concurrently performed by the new system. Outputs are compared (to the greatest extent possible) to help determine whether the new system is performing as well as the old. Errors discovered in the new system do not cost the organization much, if anything, because errors can be isolated and the business can be supported with the old system. Because all work is essentially done twice, a parallel installation can be very expensive; running two systems implies employing (and paying) two staffs to not only operate both systems, but also to maintain them. A parallel approach can also be confusing to users because they must deal with both systems. As with direct installation, there can be a considerable delay until the new system is completely ready for installation. A parallel approach may not be feasible, especially if the users of the system (such as customers) cannot tolerate redundant effort or if the size of the system (number of users or extent of features) is large.

1191268 - Pearson Education Limited ©

Parallel installation Running the old information system and the new one at the same time until management decides the old system can be turned off.

Single-Location Installation

Single-location installation , also known as location or pilot installation, is a middle-of-the-road approach compared with direct and parallel installation. Rather than convert all of the organization at once, single- location installation involves changing from the current to the new system in only one place or in a series of separate sites over time. (Figure 13-5c depicts this approach for a simple situation of two locations.) The single location may be a branch office, a single factory, or one department, and the actual approach used for installation in that location may be any of the other approaches. The key advantage to single-location installation is that it limits potential damage and potential cost by limiting the effects to a single site. Once management has determined that installation has been successful at one location, the new system may be deployed in the rest of the organization, possibly continuing with installation at one location at a time. Success at the pilot site can be used to convince reluctant personnel at other sites that the system can be worthwhile for them as well. Problems with the system (the actual software as well as documentation, training, and support) can be resolved before deployment to other sites. Even though the single-location approach may be simpler for users, it still places a large burden on information systems (IS) staff to support two versions of the system. On the other hand, because problems are isolated at one site at a time, IS staff members can devote all of their efforts to success at the

1191268 - Pearson Education Limited ©

pilot site. Also, if different locations require sharing of data, extra programs will need to be written to synchronize the current and new systems; although this will happen transparently to users, it is extra work for IS staff. As with each of the other approaches (except phased installation), the whole system is installed; however, some parts of the organization will not get the benefits of the new system until the pilot installation has been completely tested.

Single-location installation Trying out a new information system at one site and using the experience to decide if and how the new system should be deployed throughout the organization.

Phased Installation

Phased installation , also called staged installation, is an incremental approach. With phased installation, the new system is brought online in functional components; different parts of the old and new systems are used in cooperation until the whole new system is installed. (Figure 13- 5d shows the phase-in of the first two modules of a new system.) Phased installation, like single-location installation, is an attempt to limit the organization’s exposure to risk, whether in terms of cost or disruption of the business. By converting gradually, the organization’s risk is spread out over time and place. Also, a phased installation allows for some benefits from the new system before the whole system is ready. For example, new data-capture methods can be used before all reporting modules are ready.

1191268 - Pearson Education Limited ©

For a phased installation, the new and replaced systems must be able to coexist and probably share data. Thus, bridge programs connecting old and new databases and programs often must be built. Sometimes, the new and old systems are so incompatible (built using totally different structures) that pieces of the old system cannot be incrementally replaced, so this strategy is not feasible. A phased installation is akin to bringing out a sequence of releases of the system. Thus, a phased approach requires careful version control, repeated conversions at each phase, and a long period of change, which may be frustrating and confusing to users. On the other hand, each phase of change is smaller and more manageable for all involved.

Phased installation Changing from the old information system to the new one incrementally, starting with one or a few functional components and then gradually extending the installation to cover the whole new system.

Planning Installation

Each installation strategy involves converting not only software, but also data and (potentially) hardware, documentation, work methods, job descriptions, offices and other facilities, training materials, business forms, and other aspects of the system. For example, it is necessary to recall or replace all the current system documentation and business forms, which suggests that the IS department must keep track of who has these items

1191268 - Pearson Education Limited ©

so that they can be notified and receive replacement items. In practice, you will rarely choose a single strategy to the exclusion of all others; most installations will rely on a combination of two or more approaches. For example, if you choose a single-location strategy, you have to decide how installation will proceed there and at subsequent sites. Will it be direct, parallel, or phased?

Of special interest in the installation process is the conversion of data. Because existing systems usually contain data required by the new system, current data must be made error free, unloaded from current files, combined with new data, and loaded into new files. Data may need to be reformatted to be consistent with more advanced data types supported by newer technology used to build the new system. New data fields may have to be entered in large quantities so that every record copied from the current system has all the new fields populated. Manual tasks, such as taking a physical inventory, may need to be done in order to validate data before they are transferred to the new files. The total data conversion process can be tedious. Furthermore, this process may require that current systems be shut off while the data are extracted so that updates to old data, which would contaminate the extract process, cannot occur.

Any decision that requires the current system to be shut down, in whole or in part, before the replacement system is in place must be done with care. Typically, off-hours are used for installations that require a lapse in system support. Whether a lapse in service is required or not, the installation schedule should be announced to users well in advance to let them plan their work schedules around outages in service and periods when their system support might be erratic. Successful installation steps should also be announced, and special procedures put in place so that users can easily inform you of problems they encounter during installation periods. You should also plan for emergency staff to be available in case of system failure so that business operations can be recovered and made operational

1191268 - Pearson Education Limited ©

as quickly as possible. Another consideration is the business cycle of the organization. Most organizations face heavy workloads at particular times of year and relatively light loads at other times. A well-known example is the retail industry, where the busiest time of year is the fall, right before the year’s major gift-giving holidays. You wouldn’t want to schedule installation of a new point-of-sale system to begin December 1 for a department store. Make sure you understand the cyclical nature of the business you are working with before you schedule installation.

Planning for installation may begin as early as the analysis of the organization supported by the system. Some installation activities, such as buying new hardware, remodeling facilities, validating data to be transferred to the new system, and collecting new data to be loaded into the new system, must be done before the software installation can occur. Often the project team leader is responsible for anticipating all installation tasks and assigns responsibility for each to different analysts.

Each installation process involves getting workers to change the way they work. As such, installation should be looked at not as simply installing a new computer system, but as an organizational change process. More than just a computer system is involved—you are also changing how people do their jobs and how the organization operates.

1191268 - Pearson Education Limited ©

Documenting the System In one sense, every systems development project is unique and will generate its own unique documentation. The approach taken by the development team, whether more traditional and plan-oriented or more agile, will also determine the amount and type of documentation that is generated. System development projects do have many similarities, however, which dictate that certain activities be undertaken and which of those activities must be documented. Bell and Evans (1989) illustrate how a generic SDLC maps onto a generic list of when specific systems development documentation elements are finalized (Table 13-5 ). As you compare the generic life cycle in Table 13-5 with the life cycle presented in this book, you will see that there are differences, but the general structure of both life cycles is the same because both include the basic phases of analysis, design, implementation, and project planning. Specific documentation will vary depending on the life cycle you are following, and the format and content of the documentation may be mandated by the organization for which you work. However, a basic outline of documentation can be adapted for specific needs, as shown in Table 13- 5 . Note that this table indicates when documentation is typically finalized; you should start developing documentation elements early, as the information needed is captured.

Table 13-5 SDLC and Generic Documentation Corresponding to Each Phase

Generic Life-Cycle Phase Generic Document

1191268 - Pearson Education Limited ©

Requirements Specification System Requirements Specification

Resource Requirements Specification

Project Control Structuring Management Plan

Engineering Change Proposal

System Development

Architectural design Architecture Design Document

Prototype design Prototype Design Document

Detailed design and implementation Detailed Design Document

Test specification Test Specifications

Test implementation Test Reports

System Delivery User’s Guide

Release Description

System Administrator’s Guide

Reference Guide

Acceptance Sign-Off

(Source: Adapted from Bell & Evans, 1989.)

1191268 - Pearson Education Limited ©

We can simplify the situation even more by dividing documentation into two basic types, system documentation and user documentation . System documentation records detailed information about a system’s design specifications, its internal workings, and its functionality. In Table 13-5 , all of the documentation listed (except for System Delivery) would qualify as system documentation. Whereas system documentation is intended primarily for maintenance programmers (see Chapter 14 ), user documentation is intended primarily for users. An organization may have definitive standards on system documentation. These standards may include the outline for the project dictionary and specific pieces of documentation within it. Standards for user documentation are not as explicit.

System documentation Detailed information about a system’s design specifications, its internal workings, and its functionality.

User documentation Written or other visual information about an application system, how it works, and how to use it.

User Documentation

1191268 - Pearson Education Limited ©

User documentation consists of written or other visual information about an application system, how it works, and how to use it. An excerpt of online user documentation for Microsoft Word appears in Figure 13-6 . The information provided shows how a user can create newsletter columns in a Word file. Such presentation methods have become standard for help files in online PC documentation.

Figure 13-6 An example document from Microsoft Word Help (Source: Microsoft Corporation)

Figure 13-6 shows a help file, which is just one type of user documentation. Other types of user documentation include reference

1191268 - Pearson Education Limited ©

guides, quick reference guides, release descriptions, system administrator’s guides, and acceptance sign-offs (Table 13-5 ). A reference guide consists of an exhaustive list of a system’s functions and commands, usually in alphabetic order. Reference guides are very good for locating specific information; they are not as good for learning the broader picture of how to perform all of the steps required for a given task. A quick- reference guide provides essential information about operating a system in a short, concise format. When computer resources are shared, and many users perform similar tasks on the same machines (as with airline reservation or mail-order catalog clerks), quick-reference guides are often printed on index cards or as small books and mounted on or near the computer terminal. An outline for a generic user’s guide (from Bell & Evans, 1989) is shown in Table 13-6 . The purpose of such a guide is to provide information on how users can use a computer system to perform specific tasks. The information in a user’s guide is typically ordered by how often tasks are performed and by their complexity.

Table 13-6 Outline of a Generic User’s Guide

Preface

1. Introduction

1.1. Configurations

1.2 Function flow

2. User interface

2.1 Display screens

2.2 Command types

3. Getting started

1191268 - Pearson Education Limited ©

3.1 Login

3.2 Logout

3.3 Save

3.4 Error recovery

3.n [Basic procedure name]

n. [Task name]

Appendix A—Error Messages

([Appendix])

Glossary

Terms

Acronyms

Index

(Source: Adapted from Bell & Evans, 1989.)

In Table 13-6 , sections with an “n” and a title in square brackets mean that there are many such sections, each for a different topic. For example, for an accounting application, sections 4 and beyond might address topics such as entering a transaction in the ledger, closing the month, and printing reports. The items in parentheses are optional, included as necessary. An index becomes more important for larger user’s guides. Figure 13-7 shows a quick start guide for Microsoft Excel. This particular reference guide is intended for people who have never used Excel before. The organization of user’s guides differs from one software product to the next.

1191268 - Pearson Education Limited ©

User guides also differ depending on the intended audience, whether novice or expert. You may want to compare the guide in Figure 13-7 with ones for other packages to identify differences.

Figure 13-7 A quick start guide for Excel (Source: Microsoft Corporation)

A release description contains information about a new system release, including a list of documentation for the new release, features and enhancements, known problems and how they have been dealt with in the new release, and information about installation. A system administrator’s guide is intended primarily for those who will install and administer a new system. It contains information about the network on which the system will run, software interfaces for peripherals such as printers, troubleshooting, and setting up user accounts. Finally, an acceptance sign-off allows users to test for proper system installation and then signify their acceptance of the new system with their signatures.

1191268 - Pearson Education Limited ©

1191268 - Pearson Education Limited ©

Training and Supporting Users Training and support are critical for the success of an information system. As the person whom the user holds responsible for the new system, you and other analysts on the project team must ensure that high- quality training and support are available. Although training and support can be talked about as if they are two separate things, in organizational practice the distinction between the two is not all that clear because the two sometimes overlap. After all, both deal with learning about computing.

Support Providing ongoing educational and problem-solving assistance to information system users. For in- house developed systems, support materials and jobs will have to be prepared or designed as part of the implementation process.

Training Information Systems Users

Computer use requires skills, and training people to use computer applications can be expensive for organizations. Training of all types is a

1191268 - Pearson Education Limited ©

major activity in American corporations, but information systems training is often neglected. Many organizations tend to underinvest in computing skills training. It is true that some organizations institutionalize high levels of information system training, but many others offer no systematic training at all.

The type of training needed will vary by system type and user expertise. The list of potential topics from which you will determine if training will be useful includes the following:

Use of the system (e.g., how to enter a class registration request) General computer concepts (e.g., computer files and how to copy them) Information system concepts (e.g., batch processing) Organizational concepts (e.g., FIFO inventory accounting) System management (e.g., how to request changes to a system) System installation (e.g., how to reconcile current and new systems during phased installation)

As you can see from this partial list, many potential topics go beyond simply how to use the new system. It may be necessary for you to develop training for users in other areas so that users will be ready, conceptually and psychologically, to use the new system. Some training, such as concept training, should begin early in the project because this training can assist in the “unfreezing” (helping users let go of long-established work procedures) element of the organizational change process.

Each element of training can be delivered in a variety of ways. Table 13- 7 lists the most common training methods used by information system departments. The most common delivery method for corporate training remains traditional instructor-led classroom training (U.S. GAO, 2003). Many times, users turn to the resident expert and to fellow users for training. Users are more likely to turn to local experts for help than to the

1191268 - Pearson Education Limited ©

organization’s technical support staff because the local expert understands the users’ primary work and the computer systems they use. Given their dependence on fellow users for training, it should not be surprising that end users describe their most common mode of computer training as self- training.

Table 13-7 Types of Training Methods

Resident expert

Traditional instructor-led classroom training

E-learning/distance learning

Blended learning (combination of instructor-led and e-learning)

Software help components

External sources, such as vendors

One conclusion from the experience with user training methods is that an effective strategy for training on a new system is to first train a few key users and then organize training programs and support mechanisms that involve these users to provide further training, both formal and on demand. Often, training is most effective if you customize it to particular user groups, and the lead trainers from these groups are in the best position to provide this training to their colleagues.

Corporations also rely heavily on e-learning as a key delivery mode for training. E-learning generally means the same thing as distance learning; that is, a formalized learning system designed to be carried out remotely, using computer-based electronic communication. You may have taken a

1191268 - Pearson Education Limited ©

distance-learning course at your school, or you may have experience in on- campus classes with some of the dominant software packages used in e- learning, such as Canvas, Blackboard, or Moodle. E-learning courses can be delivered over the Internet or over company intranets. Such courses can be purchased from vendors or prepared by the corporation’s in-house training staff. E-learning is relatively inexpensive compared to traditional classroom training, and it has the additional advantage of being available anytime from just about anywhere. Students can also learn at their own pace. E- learning systems can make available several different elements that enhance the learning experience, including simulations, online access to mentors and experts, e-books, net meetings, and video on demand. Another trend in corporate training is blended learning, the combining of e-learning with instructor-led classroom training. A recent survey reported that 77 percent of respondents offered online corporate training programs to train their employees (Patten, 2018). The global e-learning market is expected to grow to US$325 billion by 2025 (Kelly, 2017).

Another training method listed in Table 13-7 is software help components. Figure 13-8 shows the e-learning resources that are available for Microsoft’s PowerPoint presentation software. Several different video training sessions are available for users who want to learn and master PowerPoint. Users can go through the tutorials at their own pace, whenever they want, stopping and starting it as necessary.

Figure 13-8 E-learning resources available for PowerPoint 2016 (Source: Microsoft Corporation)

1191268 - Pearson Education Limited ©

Supporting Information Systems Users

Historically, computing support for users has been provided in one of a few forms: on paper, through online versions of paper-based support, by third- party vendors, or by other people who work for the same organization. As we stated earlier, support, whatever its form, has often been inadequate for users’ needs. Yet users consider support to be extremely important.

As computing spread throughout organizations, especially with the advent of personal computers, the need for support increased as more and more employees came to rely on computing to do their jobs. As organizations moved to client/server architectures, their need for support increased even more, and organizations began to rely more and more on vendor support (Crowley, 1993). This increased need for support came in part from the lack of standards governing client/server products and the resulting need

1191268 - Pearson Education Limited ©

to make equipment and software from different vendors compatible. Vendors are able to provide the necessary support, but as they have shifted their offerings from primarily expensive mainframe packages to inexpensive off-the-shelf software, they find they can no longer bear the cost of providing the support for free. Most vendors now charge for support, and many have instituted 900 numbers or sell customers unlimited support for a given monthly or annual charge.

Automating Support In an attempt to cut the costs of providing support and to catch up with the demand for additional support services, vendors have automated many of their support offerings. Online support forums provide users access to information on new releases, bugs, and tips for more effective usage. Forums are offered over the Internet or over company intranets. Voice- response systems allow users to navigate option menus that lead to prerecorded messages about usage, problems, and workarounds. Organizations have established similar support mechanisms for systems developed or purchased by the organization. Internal e-mail and office automation can be used to support such capabilities within an organization.

Vendors may offer support that enables users to access a vendor’s knowledge bases, including electronic support services, a single point of contact, and priority access to vendor support personnel (Schneider, 1993). Product knowledge bases include all of the technical and support information about vendor products and provide additional information for on-site personnel to use in solving problems. Vendors routinely supply complete user and technical documentation via the Internet, including periodic updates, so that a user organization can provide this library of documentation, bug reports, workaround notices, and notes on undocumented features online to all internal users. Electronic support

1191268 - Pearson Education Limited ©

services include all of the vendor support services discussed earlier, but they are tailored specifically for the corporation. The single point of contact is a system engineer who is often based on-site and serves as a liaison between the corporation and the vendor. Finally, priority access means that corporate workers can always get help via telephone or e-mail from a person at the vendor company, usually within a prespecified response time of four hours or less.

Such vendor-enhanced support is especially appropriate in organizations where a wide variety of a particular vendor’s products is in use, or where most in-house application development either uses the vendor’s products as components of the larger system or where the vendor’s products are themselves used as the basis for applications. An example of the former would be the case where an organization has set up a client/server architecture based on a particular vendor’s SQL server and APIs. Which applications are developed in-house to run under the client/server architecture depends heavily on the server and APIs, and direct vendor support dealing with problems in these components would be very helpful to the enterprise information systems staff. An example of the second would include order entry and inventory control application systems developed using Microsoft’s Access or Excel. In this case, the system developers and users, who are sometimes the same people for such package-based applications, can benefit considerably from directly questioning vendor representatives about their products.

Providing Support through a Help Desk Whether assisted by vendors or going it alone, the center of support activities for a specific information system in many organizations is the help desk. A help desk is an information systems department function and is staffed by IS personnel. The help desk is the first place users should call when they need assistance with an information system. The help desk

1191268 - Pearson Education Limited ©

staff members either deal with the users’ questions or refer the users to the most appropriate person.

Help desk A single point of contact for all user inquiries and problems about a particular information system or for all users in a particular department.

Help desk personnel need to be good at communicating with users, listening to their problems, and intelligently communicating potential solutions. These personnel also need to understand the technology they are helping users with. It is crucial, however, that help desk personnel know when new systems and releases are being implemented and when users are being trained for new systems. Help desk personnel should be well trained on new systems. One sure recipe for disaster is to train users on new systems but not train the help desk personnel these same users will turn to for their support needs.

1191268 - Pearson Education Limited ©

Organizational Issues in Systems Implementation Despite the best efforts of the systems development team to design and build a quality system and to manage the change process in the organization, the implementation effort sometimes fails. Sometimes employees will not use the new system that has been developed for them or, if they do use it, their level of satisfaction with it is very low. Why do systems implementation efforts fail? This question has been the subject of information systems research for over 60 years. In the first part of this section, we will try to provide some answers, looking at the factors that research has identified as important to implementation success. In the second part of this section, you will read about another important organizational issue for information systems, security. You will read about the various threats to the security of organizational systems and some of the remedies that can be applied to help deal with the problem.

An Example of a System Implementation

Failure On February 24, 2016, a new Canadian federal payroll system went live. The system, called Phoenix, was custom designed by IBM for the Canadian government. There were problems almost immediately. Some employees did not get paid enough, others got

1191268 - Pearson Education Limited ©

paid too much, and others did not get paid at all. The development and implementation costs of the system actually came in $2 million under budget, at C$307 million. Two years after the system went live, in February 2018, the total costs for implementation and for fixing the problems approached $900 million. Initially, it was projected that 550 employees would be needed to operate Phoenix, but that number grew to over 1500. Despite the costs, the Canadian government announced it would “eventually move away from Phoenix and begin development of the next generation of the federal government’s pay system.” The government allocated $16 million in new spending to begin planning for the system that would replace Phoenix.

Sources: Burgess, S. (2018). Phoenix fix approaching $1B as feds look at scrapping system. CBC News. Retrieved

May 1, 2018 from http://www.cbc.ca/news/canada/ottawa/phoenix-eventually-replaced-federal-budget-2018-

1.4554399. Ireton, J. (2017). Phoenix payroll system under budget? Sounds like creative accounting to expert. CBC

News. Retrieved May 1, 2018 from http://www.cbc.ca/news/canada/ottawa/phoenix-government-psac-payroll-

1.4300801.

Why Implementation Sometimes Fails

The conventional wisdom that has emerged over the years is that there are at least two conditions necessary for a successful implementation effort: management support of the system under development and the involvement of users in the development process (Ginzberg, 1981b). Conventional wisdom holds that if both of these conditions are met, you should have a successful implementation. But despite the support and active participation of management and users, information systems implementation sometimes fails (see the box “System Implementation Failures” for examples).

1191268 - Pearson Education Limited ©

Management support and user involvement are important to implementation success, but they may be overrated compared to other factors that are also important. Research has shown that the link between user involvement and implementation success is sometimes weak (Ives & Olson, 1984). User involvement can help reduce the risk of failure when the system is complex, but user participation in the development process only makes failure more likely when there are financial and time constraints in the development process (Tait & Vessey, 1988). Information systems implementation failures are too common, and the implementation process is too complicated, for the conventional wisdom to be completely correct.

Over the years, other studies have found evidence of additional factors that are important to a successful implementation process. Three such factors are: commitment to the project, commitment to change, and the extent of project definition and planning (Ginzberg, 1981b). Commitment to the project involves managing the systems development project so that the problem being solved is well understood and the system being developed to deal with the problem actually solves it. Commitment to change involves being willing to change behaviors, procedures, and other aspects of the organization. The extent of project definition and planning is a measure of how well the project was planned. The more extensive the planning effort is, the less likely implementation failure is. Still another important factor related to implementation success is user expectations (Ginzberg, 1981a). The more realistic a user’s early expectations about a new system and its capabilities are, the more likely it is that the user will be satisfied with the new system and actually use it.

Although there are many ways to determine if an implementation has been successful, the two most common and trusted are the extent to which the system is used, and the users’ satisfaction with the system (Lucas, 1997). Lucas, who has studied information systems implementation in depth,

1191268 - Pearson Education Limited ©

identified six factors that influence the extent to which a system is used (1997):

1. User’s personal stake. How important the domain of the system is for the user; in other words, how relevant the system is to the work the user performs. The user’s personal stake in the system is itself influenced by the level of support management provides for implementation and by the urgency to the user of the problem addressed by the system. The higher the level of management support and the more urgent the problem, the higher the user’s personal stake in the system.

2. System characteristics. Includes aspects of the system’s design such as ease of use, reliability, and relevance to the task the system supports.

3. User demographics. Characteristics of the user, such as age and degree of computer experience.

4. Organizational support. These are the same issues of support you read about earlier in this chapter. The better the system support, the more likely an individual will be to use the system.

5. Performance. What individuals can do with a system to support their work will have an impact on extent of system use. The more users can do with a system and the more creative ways they can develop to benefit from the system, the more they will use it. The relationship between performance and use goes both ways. The higher the levels of performance, the more use. The more use, the greater the performance.

�. Satisfaction. Use and satisfaction also represent a two-way relationship. The more satisfied the users are with the system, the more they will use it. The more they use it, the more satisfied they will be.

1191268 - Pearson Education Limited ©

The factors identified by Lucas and the relationships they have to each other are shown in the model in Figure 13-9 . In the model, it is easier to see the relationships among the various factors, such as how management support and problem urgency affect the user’s personal stake in the system. Notice also that the arrows that show the relationships between use and performance and satisfaction have two heads, illustrating the two- way relationships between these factors.

Figure 13-9 Implementation success (Source: From Lucas, H. C. (1997). Information technology for management. New York: McGraw-Hill. Reprinted by permission.)

It should be clear that, as an analyst and as someone responsible for the successful implementation of an information system, you have more control over some factors than others. For example, you will have considerable influence over the system’s characteristics, and you may have some influence over the levels of support that will be provided for users of the system. You have no direct control over a user’s demographics, personal stake in the system, management support, or the urgency of the problem to the user. This doesn’t mean you can ignore factors that you can’t change. On the contrary, you need to understand these factors very

1191268 - Pearson Education Limited ©

well because you will have to balance them with the factors you can change in your system design and in your implementation strategy. You may not be able to change a user’s demographics or personal stake in a system, but you can help design the system and your implementation strategy with these factors in mind.

The factors mentioned so far are straightforward. For example, a lack of computer experience can make a user hesitant, inefficient, and ineffective with a system, leading to a system that is not providing its full potential benefit. If top management does not seem to care about the system, why should subordinates care? However, additional factors can be categorized as political and might be more hidden, difficult to affect, and even unrelated to the system that is being implemented, yet instrumental to the system’s success.

The basis for political factors is that individuals who work in an organization have their own self-interested goals, which they pursue in addition to the goals of their departments and of their organizations. For example, people might act to increase their own power relative to that of their co-workers; at other times, people will act to prevent co-workers with more power (such as bosses) from using that power or from gaining more. Because information is power, information systems often are seen as instruments of one’s ability to influence and exert power. It is helpful to understand the history and politics around an information system, and to deal with negative political factors as well as the more objective and operational ones. Sometimes political interpretations provide better explanations for the implementation process and why events took the course they did.

Once an information system has been successfully implemented, the importance of documentation grows. A successfully implemented system becomes part of the daily work lives of an organization’s employees. Many

1191268 - Pearson Education Limited ©

of those employees will use the system, but others will maintain it and keep it running.

Security Issues

The security of information systems has become an increasingly important issue for organizations and their management. Hard numbers about losses due to security breaches are difficult to obtain because most companies that have suffered breaches are too embarrassed to admit it, and they are certainly too embarrassed to communicate the actual dollar value of any losses. One estimate for how much security breaches cost companies comes from a survey on security conducted by IBM Security and the Ponemon Institute. For 2017, the reported estimated annual average financial loss due to a data breach incident was US$3.62 million. However, we can be sure the actual amount of loss across the entire global economy is much, much more. Most firms do not like to admit financial losses due to security breaches, and those that do are hesitant to report the actual true amounts.

If organizations are victims of security breaches, what are the sources of these threats? Table 13-8 provides some of the answers. As you might expect, a majority of firms report that they have been victims of external threats, including malware (malicious software) and hacking. Other external security threats include phishing attacks, exploitation of applications, denial of service, and theft of computing or storage devices. Denial of service is a popular tactic used to prevent access to a Website, orchestrated through sending the Website server more messages than it can handle in a short period of time. Note that although external threats are common, internal threats are common as well. Internal actors were responsible for over one-quarter of recorded data breaches. Employee

1191268 - Pearson Education Limited ©

abuse includes such seemingly innocent activities as sending personal e- mail on company systems or surfing the Internet for personal use during work hours. Although these activities may not damage company systems, they do use company resources that may be needed for work. Downloading large music or video files during work hours on company equipment could actually impede work because downloading large files can consume bandwidth and slow work processes. Unauthorized access to information or privilege escalation by insiders is more devious, as these activities are committed with the intent to harm the firm.

Table 13-8 Selected Statistics on IT Security (Data compiled from Vijayan, 2017 & Verizon, 2018.)

Percent of Organization’s Budget Allocated to Information Security, 2017

Less than 1 % 7 %

1 % to 5 % 22 %

6 % to 10 % 26 %

Biggest IT Security Challenges, 2017

Assessing Risk 35 %

Enforcing Security Policies 34 %

Managing the Complexity of Security 33 %

Preventing Data Breaches from Outside Attackers 29 %

Average Financial Losses due to Data Breaches, 2017

1191268 - Pearson Education Limited ©

United States $7.35 million

Middle East $4.94 million

Canada $4.31 million

Who’s Behind Recorded Data Breaches, 2017

Outsiders 73 %

Internal Actors 28 %

Organized Criminal Groups 50 %

Nation-State or State-Affiliated Actors 12 %

Top Five Tactics Utilized in Data Breaches, 2017

Hacking 48 %

Malware 30 %

Errors as Causal Events 17 %

Social Attacks 17 %

Privilege Misuse 11 %

Victims of Data Breaches, 2017

Healthcare Organizations 24 %

Accommodation and Food Services 15 %

1191268 - Pearson Education Limited ©

Public Sector Entities 14 %

Companies can act, and most do, to deal with information security issues. On average, most companies spend more on systems security than the average loss due to cybersecurity for their company type. When companies and individuals start to think about systems security, they first think about technological solutions to the problem (Schneider, 2000). Common solutions include firewalls, e-mail security and spam filtering software, antivirus software, virtual private networks, and data encryption.

A firewall is a set of related programs that protects the resources of a network from users from other networks. Basically, a firewall works closely with a router program to examine each network packet to determine whether to forward it toward its destination. A firewall is often installed in a specially designated computer separate from the rest of the network so that no incoming request can get directly at private network resources.

Yet the weakest link in any computer defense is the people who use the computer system. For example, many system users fail to use good passwords: they may tell other people (including strangers) their passwords, or write their passwords on sticky notes they post on their computer monitors. The best defensive technology in the world cannot overcome human laziness and negligence. Experts argue that the human aspect of computer security can be dealt with through the implementation of procedures and policies regarding user behaviors (Denning, 1999; Mitnick & Simon, 2002). Such policies involve system users not giving out passwords, changing passwords regularly, keeping operating system and virus detection software updated, and so on. Sound systems security practice demands the effective use of appropriate information technologies as well as the diligent involvement of employees and

1191268 - Pearson Education Limited ©

decision makers in the defense of organization information technology assets.

1191268 - Pearson Education Limited ©

Electronic Commerce Application: System Implementation and Operation for Pine Valley Furniture’s Webstore Like many other analysis and design activities, system implementation and operation of an Internet-based electronic commerce application is no different than the processes followed for other types of applications. Previously, you read how Jim Woo and the Pine Valley Furniture (PVF) development team transformed the conceptual data model for the WebStore into a set of normalized relations. Here we will examine how the WebStore system was tested before it was installed and brought online.

1191268 - Pearson Education Limited ©

PINE VALLEY FURNITURE

The programming of all WebStore software modules has been completed. The programmers have extensively tested each unique module, and it is now time to perform a systemwide test of the WebStore. In this section, we will examine how test cases were developed, how bugs were recorded and fixed, and how alpha and beta testing were conducted.

Developing Test Cases for the WebStore

To begin the systemwide testing process, Jim and the PVF development team developed test cases to examine every aspect of the system. Jim knew that system testing, like all other aspects of the SDLC, needed to be a very structured and planned process. Before opening the WebStore to the general public, every module and component of the system needed to be tested within a controlled environment. Based on his experience in implementing other systems, Jim felt that they would need to develop approximately 150 to 200 separate test cases to fully examine the WebStore. To help focus the development of test cases and to assign primary responsibility to members of his team to specific areas of the system, Jim developed the following list of testing categories:

1191268 - Pearson Education Limited ©

Simple functionality: Add to cart, list section, calculate tax, change personal data Multiple functionality: Add item to cart and change quantity, create user account, change address Function chains: Add item to cart, check out, create user account, purchase Elective functions: Returned items, lost shipments, item out of stock Emergency/crisis: Missing orders, hardware failure, security attacks

The development group broke into five separate teams, each working to develop an extensive set of cases for each of the testing categories. Each team had one day to develop their test cases. Once developed, each team would lead a walk-through so that everyone would know the totality of the testing process and to facilitate extensive feedback to each team so that the testing process would be as comprehensive as possible. To make this point, Jim stated, “What happens when a customer repeatedly enters the same product into the shopping cart? Can we handle that? What happens when the customer repeatedly enters and then removes a single product? Can we handle that? Although some of these things are unlikely to ever occur, we need to be confident that the system is robust to any type of customer interaction. We must develop every test case necessary to give us confidence that the system will operate as intended, 24-7-365!”

A big part of successful system testing is to make sure that no information is lost and that all tests are described in a consistent way. To achieve this, Jim provided all teams with standard forms for documenting each case and for recording the results of each test. This form had the following sections:

Test Case ID Category/Objective of Test Description

1191268 - Pearson Education Limited ©

System Version Completion Date Participant(s) Machine Characteristics (processor, operating system, memory, browser, etc.) Test Result Comments

The teams also developed standard codes for each general type of test, and these were used to create the Test Case ID. For example, all tests related to “Simple Functionality” were given an ID with SF as a prefix and a number as the suffix (e.g., SF001). The teams also developed standards for categorizing tests, listing objectives, and writing other test form contents. Establishing these standards ensured that the testing process would be consistently documented.

Bug Tracking and System Evolution An outcome of the testing process is the identification of system bugs. Consequently, in addition to setting a standard method for writing and documenting test cases, Jim and the teams established several other rules to ensure a smooth testing process. Experienced developers have long known that an accurate bug-tracking process is essential for rapid troubleshooting and repair during the testing process. You can think of bug tracking as creating a “paper trail” that makes it much easier for programmers to find and repair the bug. To make sure that all bugs were documented in a similar way, the team developed a bug-tracking form that had the following categories:

Bug Number (simple incremental number) Test Case ID That Generated the Bug Is the Bug Replicable?

1191268 - Pearson Education Limited ©

Effects Description Resolution Resolution Date Comments

The PVF development team agreed that bug fixes would be made in batches because all test cases would have to be redone every time the software was changed. The redoing of all the test cases each time the software is changed is done to ensure that in the process of fixing the bug, no other bugs are introduced into the system. As the system moves along in the testing process—as batches of bugs are fixed—the version number of the software is incremented. During the development and testing phases, the version is typically below the “1.0” first release version.

Alpha and Beta Testing the WebStore

After completing all system test cases and resolving all known bugs, Jim moved the WebStore into the alpha-testing phase, in which the entire PVF development team as well as personnel around the company would put the WebStore through its paces. To motivate employees throughout the company to actively participate in testing the WebStore, several creative promotions and giveaways were held. All employees were given a T-shirt that said, “I shop at the WebStore, do you?” Additionally, all employees were given $100 to shop at the WebStore and were offered a free lunch for their entire department if they found a system bug while shopping on the system. Also during alpha testing, the development team conducted extensive recovery, security, stress, and performance testing. Table 13-9 provides a sample of the types of tests performed.

1191268 - Pearson Education Limited ©

Table 13-9 Sample of Tests Conducted on the WebStore during Alpha Testing

Test Type Tests Performed

Recovery Unplug main server to test power backup system Switch off main server to test the automatic switching to backup server

Security Try to purchase without being a customer Try to examine server directory files both within the PVF domain and when connecting from an outside Internet service provider

Stress Have multiple users simultaneously establish accounts, process purchases, add to shopping cart, remove from shopping cart, and so on

Performance Examine response time using different connection speeds, processors, memory, browsers, and other system configurations Examine response time when backing up server data

After completing alpha testing, PVF recruited several of their established customers to help in beta testing the WebStore. As real-world customers used the system, Jim was able to monitor the system and fine-tune the servers for optimal system performance. As the system moved through the testing process, fewer and fewer bugs were found. After several days of “clean” usage, Jim felt confident that it was time to open the WebStore for business.

1191268 - Pearson Education Limited ©

WebStore Installation

Throughout the testing process, Jim kept PVF management aware of each success and failure. Fortunately, because Jim and the development team followed a structured and disciplined development process, there were far more successes than failures. In fact, he was confident that the WebStore was ready to go online and would recommend to PVF’s top management that it was time to “flip the switch” and let the world enter the WebStore.

1191268 - Pearson Education Limited ©

Project Closedown In Chapter 3 , you learned about the various phases of project management, from project initiation to closing down the project. If you are the project manager and you have successfully guided your project through all of the phases of the SDLC presented so far in this book, you are now ready to close down your project. Although the maintenance phase is just about to begin, the development project itself is over. As you will see in the next chapter, maintenance can be thought of as a series of smaller development projects, each with its own series of project management phases.

As you recall from Chapter 3 , your first task in closing down the project involves many different activities, from dealing with project personnel to planning a celebration of the project’s ending. You will likely have to evaluate your team members, reassign most to other projects, and perhaps terminate others. As project manager, you will also have to notify all of the affected parties that the development project is ending and that you are now switching to maintenance mode.

Your second task is to conduct post-project reviews with both your management and your customers. In some organizations, these post- project reviews will follow formal procedures and may involve internal or EDP (electronic data processing) auditors. The point of a project review is to critique the project, its methods, its deliverables, and its management.

1191268 - Pearson Education Limited ©

You can learn many lessons to improve future projects from a thorough post-project review.

The third major task in project closedown is closing out the customer contract. Any contract that has been in effect between you and your customers during the project (or as the basis for the project) must be completed, typically through the consent of all contractually involved parties. This may involve a formal “signing off” by the clients stating that your work is complete and acceptable. The maintenance phase will typically be covered under new contractual agreements. If your customer is outside your organization, you will also likely negotiate a separate support agreement.

As an analyst member of the development team, your job on this particular project ends during project closedown. You will likely be reassigned to another project dealing with an organizational problem. Maintenance on your new system will begin and continue without you. To complete our consideration of the SDLC, however, we will cover the maintenance phase and its component tasks in Chapter 14 .

1191268 - Pearson Education Limited ©

Summary This chapter presented an overview of the various aspects of the systems implementation process. You studied seven different types of testing: (1) code inspections, in which the code is examined for well-known errors; (2) walk-throughs, when a group manually examines what the code is supposed to do; (3) desk checking, when an individual mentally executes the computer instructions; (4) syntax checking, typically done by a compiler; (5) unit or module testing; (6) integration testing, in which modules are combined and tested together until the entire program has been tested as a whole; and (7) system testing, in which programs are combined to be tested as a system and where the system’s meeting of its objectives is examined. You also learned about acceptance testing, in which users test the system for its ability to meet their requirements, using live data in a live environment.

You read about four types of installation: (1) direct, when the old system is shut off just as the new one is turned on; (2) parallel, when both old and new systems are run together until it is clear the new system is ready to be used exclusively; (3) single-location, when one site is selected to test the new system; and (4) phased, when the system is installed bit by bit.

You learned about two types of documentation: (1) system documentation, which describes in detail the design of a system and its specifications; and (2) user documentation, which describes a system and how to use it for the system’s users.

1191268 - Pearson Education Limited ©

Computer training has typically been provided in classes and tutorials. Although there is some evidence that lectures have their place in teaching people about computing and information systems, the current emphasis in training is on automated delivery methods, such as online reference facilities, and multimedia training. The latter embed training in the applications themselves in an attempt to make training a seamless part of using an application for daily operations. The emphasis in support is also on providing online delivery, including online support forums. As organizations move toward client/server architectures, they rely more on vendors for support. Vendors provide many online support services, and they work with customers to bring many aspects of online support in- house. A help desk provides aid to users in a particular department or for a particular system.

You saw how information systems researchers have been trying to explain what constitutes a successful implementation. If there is a single main point in this chapter, it is that implementation is a complicated process, from managing programmer teams, to the politics that influence what happens to a system after it has been successfully implemented, to planning and implementing useful training and support mechanisms. Analysts have many factors to identify and manage for a successful system implementation. Successful implementation rarely happens by accident or occurs in a totally predictable manner. The first step in a successful implementation effort may be realizing just that fact. Once systems are implemented, organizations have to deal with threats from both inside and outside the organization to the systems’ security. Although technology such as virus-detection software and firewalls can be employed to help secure systems, good security also requires policies and procedures that guide employees in proper system usage.

In many ways, the implementation of an Internet-based system is no different. Just as much careful attention, if not more, has to be paid to the

1191268 - Pearson Education Limited ©

details of an Internet implementation as to a traditional system. Successful implementation for an Internet-based system is not an accident either.

1191268 - Pearson Education Limited ©

Key Terms 13.1 Acceptance testing 13.2 Alpha testing 13.3 Beta testing 13.4 Desk checking 13.5 Direct installation 13.6 Help desk 13.7 Inspections 13.8 Installation 13.9 Integration testing 13.10 Parallel installation 13.11 Phased installation 13.12 Refactoring 13.13 Single-location installation 13.14 Stub testing 13.15 Support 13.16 System documentation 13.17 System testing 13.18 Testing harness 13.19 Unit testing 13.20 User documentation

Match each of the key terms above with the definition that best fits it.

1191268 - Pearson Education Limited ©

         A testing technique in which participants examine program code for predictable language-specific errors.          A testing technique in which the program code is sequentially executed manually by the reviewer.          Written or other visual information about an application system, how it works, and how to use it.          Changing over from the old information system to a new one by turning off the old system when the new one is turned on.          The process of testing each module alone in an attempt to discover any errors in its code; also called module testing.          The organizational process of changing over from the current information system to a new one.          The process whereby actual users test a completed information system, the end result of which is the users’ acceptance of it.          Detailed information about a system’s design specifications, its internal workings, and its functionality.          Running the old information system and the new one at the same time until management decides the old system can be turned off.          The process of bringing together all of the modules that a program comprises for testing purposes. Modules are typically integrated in a top-down, incremental fashion.          A technique used in testing modules, especially modules that are written and tested in a top-down fashion, where a few lines of code are used to substitute for subordinate modules.          Changing from the old information system to the new one incrementally, starting with one or a few functional components and then gradually extending the installation to cover the whole new system.          Bringing together all of the programs that a system comprises for testing purposes. Programs are typically integrated in a top-

1191268 - Pearson Education Limited ©

down, incremental fashion.          Providing ongoing educational and problem-solving assistance to information system users. Support material and jobs must be designed along with the associated information system.          User testing of a completed information system using real data in the real user environment.          Trying out a new information system at one site and using the experience to decide if and how the new system should be deployed throughout the organization.          User testing of a completed information system using simulated data.          A single point of contact for all user inquiries and problems about a particular information system or for all users in a particular department.          Making a program simple after adding a new feature.          An automated testing environment used to review code for errors, standards violations, and other design flaws.

1191268 - Pearson Education Limited ©

Review Questions 13.21 What are the deliverables from coding, testing, and installation? 13.22 Explain the code-testing process. 13.23 What are structured walk-throughs for code? What is their purpose? How are they conducted? How are they different from code inspections? 13.24 What are the four approaches to installation? Which is the most expensive? Which is the most risky? How does an organization decide which approach to use? 13.25 What is the conventional wisdom about implementation success? 13.26 List and define the factors that are important to successful implementation efforts. 13.27 Explain Lucas’s model of implementation success. 13.28 What is the difference between system documentation and user documentation? 13.29 What are the common methods of computer training? 13.30 What is self-training? 13.31 What is e-learning? 13.32 What proof do you have that individual differences matter in computer training? 13.33 Why do corporations rely so heavily on vendor support? 13.34 Describe the delivery methods many vendors employ for providing support.

1191268 - Pearson Education Limited ©

13.35 Describe the various roles typically found in a help desk function. 13.36 What are the common security threats to systems? How can they be addressed?

1191268 - Pearson Education Limited ©

Problems and Exercises 13.37 Prepare a testing strategy or plan for PVF’s Purchasing Fulfillment System. 13.38 Which installation strategy would you recommend for PVF’s Purchasing Fulfillment System? Which would you recommend for Hoosier Burger’s inventory control system? If you recommended different approaches, please explain why. How is PVF’s case different from Hoosier Burger’s? 13.39 Develop a table that compares the four installation strategies, showing the pros and cons of each. Try to make a direct comparison when a pro of one is a con of another. 13.40 One of the most difficult aspects of using the single location approach to installation is choosing an appropriate location. What factors should be considered in picking a pilot site? 13.41 You have been a user of many information systems including, possibly, a class registration system at your school, a bank account system, a word-processing system, and an airline reservation system. Pick a system you have used and assume you were involved in the beta testing of that system. What criteria would you have used to judge whether this system was ready for general distribution? 13.42 Why is it important to keep a history of test cases and the results of those test cases even after a system has been revised several times? 13.43 How much documentation is enough?

1191268 - Pearson Education Limited ©

13.44 Discuss the role of a centralized training and support facility in a modern organization. Given advances in technology and the prevalence of self-training and consulting among computing end users, how can such a centralized facility continue to justify its existence? 13.45 Is it good or bad for corporations to rely on vendors for computing support? List arguments both for and against reliance on vendors as part of your answer. 13.46 Suppose you were responsible for establishing a training program for users of Hoosier Burger’s inventory control system (described in previous chapters). Which forms of training would you use? Why? 13.47 Suppose you were responsible for establishing a help desk for users of Hoosier Burger’s inventory control system (described in previous chapters). Which support system elements would you create to help users be effective? Why? 13.48 Your university or school probably has some form of microcomputer center or help desk for students. What functions does this center perform? How do these functions compare to those outlined in this chapter? 13.49 Suppose you were responsible for organizing the user documentation for Hoosier Burger’s inventory control system (described in previous chapters). Write an outline that shows the documentation you would suggest be created, and generate the table of contents or outline for each element of this documentation. 13.50 What types of security policies and procedures does your university have in place for campus information systems?

1191268 - Pearson Education Limited ©

Field Exercises 13.51 Interview someone you know or have access to who works for a medium to large organization. Ask for details on a specific instance of organizational change: What changed? How did it happen? Was it well planned or ad hoc? How were people in the organization affected? How easy was it for employees to move from the old situation to the new one? 13.52 Re-examine the data you collected in the interview in Field Exercise 1 . This time, analyze the data from a political perspective. How well does the political model explain how the organization dealt with change? Explain why the political model does or does not fit. 13.53 Ask a systems analyst you know or have access to about implementation. Ask what the analyst believes is necessary for a successful implementation. 13.54 Prepare a research report on successful and unsuccessful information system implementations. After you have found information on two or three examples of both successful and unsuccessful system implementations, try to find similarities and differences among the examples of each type of implementation. Do you detect any patterns? Can you add any factors important to success that were not mentioned in this chapter?

1191268 - Pearson Education Limited ©

13.55 Talk with people you know who use computers in their work. Ask them to get copies of the user documentation they rely on for the systems they use at work. Analyze the documentation. Would you consider it good or bad? Support your answer. Whether good or bad, how might you improve it? 13.56 Volunteer to work for a shift at a help desk at your school’s computer center. Keep a journal of your experiences. What kind of users did you have to deal with? What kinds of questions did you get? Do you think help desk work is easy or hard? What skills are needed by someone in this position? 13.57 Let’s say your professor has asked you to help him or her train a new secretary on how to prepare class notes for electronic distribution to class members. Your professor uses word-processing software and an e-mail package to prepare and distribute the notes. Assume the secretary knows nothing about either package. Prepare a user task guide that shows the secretary how to complete this task.

1191268 - Pearson Education Limited ©

References Beck, K. & Andres, C. (2004). eXtreme Programming eXplained. Upper

Saddle River, NJ: Addison-Wesley.

Bell, P., & C. Evans. (1989). Mastering documentation. New York: John Wiley & Sons.

Denning, D. E. (1999). Information warfare and security. Boston: Addison- Wesley.

Fagan, M. E. (1986). Advances in software inspections. IEEE Transactions on Software Engineering, 12(7), 744–51.

Ginzberg, M. J. (1981a). Early diagnosis of MIS implementation failure: Promising results and unanswered questions. Management Science, 27(4), 459–78.

Ginzberg, M. J. (1981b). Key recurrent issues in the MIS implementation process. MIS Quarterly, 5(2), 47–59.

Ives, B., & M. H. Olson. (1984). User involvement and MIS success: A review of research. Management Science, 30(5), 586–603.

1191268 - Pearson Education Limited ©

Kelly, B. (2017). Corporate training market growth is great news for online learning content Providers. ThoughtIndustries. Retrieved May 1, 2018 from http://blog.thoughtindustries.com/new-blog/licensing-content- to-corporate-customers.

Lucas, H. C. (1997). Information technology for management. New York: McGraw-Hill.

Mitnick, K. D., & Simon, W. L. (2002). The art of deception. New York: John Wiley & Sons.

Mosley, D. J. (1993). The handbook of MIS application software testing. Upper Saddle River, NJ: Prentice Hall/Yourdon Press.

Patten, B. (2018). How e-learning can increase employee training in your company.” TrainingIndustry. Retrieved May 1, 2018 https:// trainingindustry.com/articles/e-learning/how-e-learning-can-increase- employee-training-in-your-company/.

Ponemon Institute Research Report. (2017). 2017 cost of data breach study. Retrieved April 30, 2018 from http://www.ibm.com/security/ data-breach.

Schneider, J. (1993, November 15). Shouldering the burden of support. PC Week, 10, 123, 129.

1191268 - Pearson Education Limited ©

Tait, P., & Vessey, I. (1988). The effect of user involvement on system success: A contingency approach.” MIS Quarterly, 12(1), 91–108.

United States General Acc

Chapter 9: Teams: Face-to-Face and Virtual

1

Introduction

Teams and committees are commonplace in organizations

Making teams productive and satisfying is a challenge for leaders and workers

Member expectations influence team processes and outcomes

Challenge for team leaders is manager from the point of verbal creation to the end point of dissolution

2

Case Study: The MacIntosh Pirates

Steve Jobs felt stifled in his attempts to help the Lisa team at Apple, Inc. and formed his own “Macintosh” team

Jobs hoisted a “pirate” flag with an Apple logo on it to set the tone for his team of creative recruits

Jobs inspired and empowered his team and took risks with his behaviors

Macintosh became famous, and Jobs credited his team for its success

What is your opinion of how Jobs created and managed his team?

Teams – What Are They?

A team represents a group of people with different abilities and responsibilities, brought together to accomplish a task or variety of needs

Teams require players to work together

Functional perspective of teams includes assumptions:

Members are motivated to make the best choices

Choice to be made is nonobvious

Members have access to information/resources necessary to complete the task

Members collectively possess cognitive and communication skills to deal with decision-making/problem-solving

4

Types of Teams

Primary Work Groups

Employees formally assigned within an organization

Committees

Team of people charged with implementing an organizational plan

Task Forces

Teams put together for a short time, usually to accomplish a specific task

Focus Groups

Groups or teams put together in order to discuss specific issues within the organization

Technology, Social Skills, and Face-to-Face Teams

Digital Natives

Those born since the 1980s, have never known a world without computers, cell phones, 24-hour-a-day television or the Internet

Digital Immigrants

People who were born before the advent of digital technology who are entering the digital communication arena

People are more connected now than ever before but on a more superficial level

Both Natives and Immigrants often need to fine-tune their interpersonal social skills

The Virtual Team

Members engage each other locally, regionally, and globally without being face to face

Members primarily function in cyberspace, creating both advantages and disadvantages

Technologies such as Skype have created low-cost ways of connecting

Allows for both verbal and nonverbal interaction

7

Team/Group Characteristics

Case Study: Southwest Airlines’ Success

Southwest decided to make flying fun and less expensive, so they built their team by hiring for attitude and then trained for skills

Put employees first and customers second

Open to learning from their mistakes and adapted as necessary

Less structure, but hard work still expected

What do you think of the idea that employees come first?

8

Team Job Design

Job Design Theory (Hackman and Oldham, 1975)

Teams are most effective when they possess these 5 factors:

Skill variety

Task identity

Autonomy

Significance

Feedback

Cohesion and Loyalty

Cohesiveness

A sense of unity can develop as team members gain understanding and insight about one another and begin successfully completing tasks

Loyalty

A loyal team member is committed and faithful, devoted, and feels a sense of obligation to the team

Framing and “Fantasy”: Important for Group Cohesion

Interaction that gives group work meaning is often related to fantasy

Members can draw upon past experiences to make work more fun and imaginative

Leaders can use fantasies or frames to help members feel a sense of involvement or identification

Trust

Necessary element for effective teams

Refers to reliability and predictability of group members

Nonverbal communication helps us to determine whether to trust

Since nonverbals can be absent in virtual teams, it can be difficult to interpret a message

Nonverbal communication awareness is important for relational success

Efficiency in Teams

Accomplishing tasks with the least amount of resources in the least amount of time possible under given circumstances

Lack of efficiency is one reason people hate working in teams

Teams can be more creative, bring more skills to solve problems, create employee engagement

Motivation

Represents what drives us to accomplish tasks

Shared sense of purpose creates more motivation in teams

Leaders are challenged to determine how to motivate individuals differently in teams

Synergy

Motivated employees who work together create something greater than what individuals working alone could have accomplished

Can happen both negatively and positively

Teams must push to focus on shared outcomes

Fairness: Finding a Reasonable Solution

Sense of fairness felt by employees impacts their efficiency

Treating everyone equally does not always put everyone on equal footing

Treating everyone fairly can put everyone on equal footing

Feedback and Listening

Employees and organizations alike should be learning and growing with training and experience

Team learning

Transforming knowledge and information in a way that promotes skill development and new understandings

Feedback

Positive or negative responses to our behavior

Norms

Expectations of behaviors in the organizational environment

High performance norms are critical to the success of teams

Virtual work groups rely heavily on communicative norms

Groupthink

Faulty decision-making of a group, where groups do not consider all of the possibilities because they sacrifice quality decisions to promote unanimity

Happens when:

Groups have become very cohesive and don’t want to risk harming sense of unity

Group is under time constraints that cause them to rush the process

Devil’s advocate

Someone assigned to argue against the cause for the sake of the group

Diversity

Teams, especially those that are virtual, can include coworkers from across the globe

Individuals bring unique characteristics to the relationship

Team members may lack understanding of different cultural values and expectations

Netiquette

What is considered ethical behavior when using the computer, especially when on the Internet

Satisfaction

Social networks show us it is possible to have satisfying relationships without being in physical proximity to one another

Too much virtual interaction may decrease satisfaction with the work environment

Opportunities to interact face-to-face may be important for some

The Impact of Technology on Teams

Technology creates expectations in everyday life and in the workplace

Technology has changed the way people communicate

Technology can be incorrectly used and abused

Technology can not only facilitate understanding and efficiency but also create misunderstanding and unrealistic expectations

Voice Mail

Useful when the recipient listens to the messages

No guarantee that messages are heard

Standard landlines and, thus, voice mail is still a useful communication tool for connecting to all areas of the world

Teleconferencing and Videoconferencing

Rise in telecommuting means connecting through telephone or video is increasingly important

Videoconferencing allows for interviewing options

Both are vital tools for interacting and developing relationships with coworkers

Computer-Mediated Technology

Case Study: Instant Gratification Expectations

Sam works late one evening and emails Janika

The next morning, he still has not received an email response and thinks she is punishing him because she is unhappy with him

Sam sends a message to their boss, criticizing Janika

A few minutes later, he receives a reply from Janika indicating that her child had been sick and that she is grateful for his work

Email can be damaging and destructive if not used thoughtfully

Has anything like this ever happened to you?

Email

It is often assumed that email messages will receive a quick response because people are expected to be “connected” 24/7

Thoughtful use of email is important; it is easy to send an email too quickly

To avoid an email that is a flame, print it out before you send it and give it to someone else to read

People are bombarded with these easy types of messages

Employees can fall victim to continuous partial attention

Case Study: Oops, I hit reply all!

Wayne has been a top three sales rep who often took the initiative to do extra tasks that he was not paid for

Rajan, the CEO, did not like Wayne and sent an email to a regional sales manager with a negative message about Wayne

Rajan accidentally hit ”reply all” and Wayne received the message

The relationships of all involved changed as a result of the email

What would you do if you were Wayne? What would you do if you were the regional manager who received the email?

Faxing

Faxing has become less inviting and less necessary to use

Documents can be emailed in PDF form, which is faster and more secure than sending a fax

Social Networks

A real part of both personal and organizational life

Many organizations are utilizing social networks to connect with customers and each other

Many social networks, such as Facebook, LinkedIn, VoIPs, and more provide many tools for organizations

Organizations are creating positions to manage social network accounts

Timing and Culture

How one understands the use of time is related to cultural expectations

Monochronic time structures involve focusing on one activity at a time

Cultures that are monochronic include northern Europe, North America, Germany

Polychronic time structures involve juggling a variety of tasks at one time

Cultures that are polychronic include Latin America, the Middle East, Japan, France

Context Matters

For-Profit Organizations

Very small amount of these types of organizations represent American society

Small Businesses

Entrepreneurial businesses typically have smaller teams

Nonprofit Organizations

Teams may consist of both paid employees and volunteers

Government Sector

Federal government is the nation’s largest employer

Get help from top-rated tutors in any subject.

Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com