INFO3 Revision Notes
INFO3 Revision Notes
1 Information
Suppliers – Will need information on the materials an organisation needs to order and
method of payment.
- Suppliers will use things like e-mail and telephone for communication purposes
- Use of an extranet which enables suppliers to log in to the organisation’s network, only
accessing relevant parts
Customers – Website FAQs - can quickly deal with popular queries and questions often
asked by customers. Limited to those that have an Internet connection, and is also quite
impersonal. Quick and easy to set up and after use.
- E-mail - Avoids customer waiting in a phone queue, is personalised but not completely
impersonal, and does not have to be answered instantaneously like telephone.
- Internet chat – one-on-one instant messaging and contact with customer, cheap and easy
to set up in today’s current technology climate.
Official and legal bodies
Companies will need to exchange information with government agencies like HM Revenue
and Customs, Inland Revenue for tax and company registration purposes. Directgov website
is a portal that links all the government agencies together.
Companies that operate in an e-commerce environment must ensure that the processing of
financial details is done in a form that would not make them accessible by scammers and
frauds. PayPal is an excellent service that allows security and processing of financial details
to be done separately, and with a peace of mind for the customer’s sake.
2 Systems
A cost benefit analysis must be used when buying ICT equipment for ICT systems. The cost is
justified when:
The time saved completing a certain task is often shortened when ICT is used EPOS
systems in shops
A better overall product may be produced if ICT systems are used to produce it-CAD
design systems
ICT systems can hip with the estimation of materials needed in a project, or time
forecasted for a certain task to be completed
Critical Success Factors must be met in an organisation for a projector goal to be achieved.
Payroll – calculates wages and salaries for companies’ employees. Software is bought and
configured in order to make sure correct taxing of an individual is made and Inland Revenue
information is inputted correctly. Personalised wage slips are to be made and distributed
accordingly, plus a P60 form to sum up an employee’s record at the end of the fiscal year.
Human Resources – stores information about employee data contact details, promotions,
and disciplinary incidents. Software bundles sell human resource software in modules so
companies can opt for which is best for them.
Supply chain - Raw materials to products. The links between each stage. Must be run
smoothly in order for product to be made on time and without delay. As a result, customer
might cancel or order with rival company.
Legacy systems
When changing to a new ICT system, it may not replace the old one completely. Older
“legacy” systems may be used. Data portability must be maintained – transfer data between
different software packages or systems – so data can be interchanged with old legacy
systems and current systems. Data transferability must also be upheld – import data from
an old ICT system to a new one when the new one is being installed.
Types of ICT system and their uses
ICT systems can be split into operational, tactical and strategic levelled based systems. Data
processing systems allow those at operational level work in their environment efficiently.
Tactical level systems summarise data for middle managers in order to allow them to
properly manage the organisation from a medium term stance. Data here is further
summarised so that those at the tactical level can make long term, big decisions to future
the business.
“Back office systems” – The ICT systems that run the internal operations of an organisation
that are not seen or accessible to the public.
Used at operational level of organisations – day-to-day business stuff. Carries out simple
tasks. Price of train ticket, paying a bill.
Software that helps organisations analyses and manages their business processes by using
computer models to represent the logic of the workflow.
Store paper based documents electronically. Scanned and stored, then put in library and
indexed. Easily retrievable. Metadata is added to documents to make them easier to find –
get the right one.
Takes data from internal and external sources, process it, and provides information that can
be used by managers at different levels to aid effective decision making.
Computer –based system that analyses data to provide information to help managers make
decisions. Expert systems, based on AI techniques.
Enterprise systems
Serve the enterprise as a whole rather than any individual department. Brings together a
complete organisation which is often complex and very complicated.
Store data about customers in order to improve the service that the customer receives and
increase the likelihood of repeat business. CRM software allows for indications to be made
for mortgages, pension and insurance business. Data warehouses used- storage facility for
large quantities of data-to store the large amounts of generated data in ECRM software.
E-Commerce
Allows customers to browse for goods and place order. Internet can be used to buy
downloaded items, or physical items which are shipped out. Amazon is purely online but
high street retailers use “bricks-and-mortar” technique to get even greater profits. Must be
secure. Https used with padlock. Intermediary banks like PayPal make online transactions
easier and even more secure as actual bank details are not exchanged with supplier and
customer. There are drawbacks, with phishing sites being set up to scam people. Cannot see
actual good “in the flesh” and delivery costs can be high.
3 Management and strategies
Informal communication in a business, both small and large, is done through the
“grapevine.” It is important that businesses set up appropriate and secure methods of
distributing documents, by making strict controls over access rights and building these
issues into operational and disciplinary procedures.
Strategic level management of any organisation uses a strategy – long term plan for
achieving a goal – in order to match the aims of the business.
Available finance – Calculating the cost of the new system, using cost benefit techniques.
Would be complex at first but very beneficial to assess how financially viable the cost of
incorporating a new system is.
e.g.) a company combining a nationwide set of smaller system into one company-wide
database, accessible from any UK office.
Benefits may take time to materialise but will most likely be profitable in the long-term. A
financial model would be used to see if investment is worthwhile. Reduce in costs may come
from, for example, leasing hardware, however, aspects like these would be made at a
strategic level.
Legacy systems – Not feasible to replace legacy systems when introducing new ones. The
ICT strategy must consider how the old and new systems can work together. Data
transferability or data portability must be considered.
Compliance with legislation – All data in the UK is bounded by the Data Protection Act. An
ICT strategy may be affected, if, for instance, customers’ data is to be processed in other
countries as part of offshoring – transfer of an organisational function to another country,
be it tele-sales or software production – arrangements. Health and Safety Act must be
adhered to, along with Display Screen Equipment Regulations and the Copyright, Designs
and Patents Act.
Management of information assets over time – ICT strategy must consider for how long
data should be stored before being purged. This will save memory. DPA states that data
should not be kept longer than necessary. Some data would need to be kept for people to
refer to quickly or for “just-in-case” purposes.
Corporate ICT strategies
Large organisations need ICT strategies that are generic to all departments within an
organisation, so everyone follows the same rules.
Frequency of replacing equipment must be considered. Some features are often better in
newer software or hardware options.
Information Management – Setting up of access rights and permissions to levels of data, for
different levels of users. Issues of security and confidentiality need to be considered and laid
down repeatedly.
Standards
When an ICT strategy is established, standards and protocols must be established. A
communications protocol is an agreed set of rules to ensure the proper transfer of data
between devices. E.g.s) of protocols:
Policies
After the establishment of an ICT strategy, an organisation must put in place policies to deal
with the practical implications of ensuring the strategy is implemented. Policies are used
within an organisation covering different aspects of the use of ICT, from security, training
and procurement. Policies then comes together to form part of an employee’s contract of
employment – the legal agreement between an employer and an employee. Breaches of
policies within an organisation are met with disciplinary procedures – laying down the
sanctions for breaking company policies.
Security Policy
How ICT is used to protect a company’s assets. A security policy should aim to ensure the
security – making sure that an organisation’s data is correct, confidential and safe and
privacy of data – not seen or accessed by anyone else unauthorised.
A security policy will lay down the rules of an organisation’s use of data and equipment –
hardware, software, data and storage media. Policy must:
Identify threats and manage the risks of each
Allocate responsibilities for data security – telling people how to best use equipment
State resources needed to maintain data security
Data must be analysed to establish how valuable the data is to the organisation, and the
consequences of breaches to the organisation thereafter. These could be financial
consequences, legal consequences or even a loss of trust by clients.
Data should be classified as either, public – made available to everyone, internal use only –
can be used anywhere in the organisation, but not released outside, or confidential –
restricted to certain members of the organisation only.
Network security
In a security policy, network access rights would be assigned to
user names,
passwords,
biometric identities and
Any other methods of controlling access to the network.
The network OS can log workstation activity, having the ability to log off workstations that
have remained inactive after a certain time period, for example.
Data transfer
Who has access to the internet and email and whether workstations allow the use of
removable media like USB sticks. Encryption may be used to ensure the integrity of data,
and to protect against fraud. Firewalls should be put in place to block external access to the
network.
Change control and monitoring
Monitoring and logging one’s repeated attempts to access the network thus reducing the
risk of a penchaud accessing the network. Also, data that has been modified can be logged,
especially sensitive data, which can result on disciplinary procedures like sanctions and
smacked bottom.
Uses of laptop
When a laptop is taken out of an organisations direct physical location, the use of the laptop
by family members or friends must be stated in the policy. Data should be backed up, plus,
governing the sensitivity of the data, encrypted, so that pricks can’t seal information if
stolen. Not leaving the laptop on a train or some shit will also be written, plus virus checkers
being regularly up to date.
Training policy
When a new brer enters the business, training of employees must occur at various stages in
their career. Should familiarise them with the fundamental procedures of the job.
Continued training will improve aspects of staff development, helping the employees do
their current job well and also perhaps prepare for promotion. Time off is dedicated to staff
training, which often mean external agencies coming in to play, or going out on a course in
the big wide world. *SECTION 8*
Procurement Policy
The setting and controlling of the purchase of ICT equipment. ICT department puts in orders,
or specific departments puts in orders. Bulk buying may mean having a central purchasing
system in place which brings down the price. Getting laptops has its risks too, but has the
benefits of portability.
Policy may also cover the disposal of old machines and obsolete equipment – WEEE
Consumable – toner – is expensive and the policy may pose restrictive measures on the use
of them.
The use of the internet should also be laid down in the policy, with the organisation’s stance
on what is not permitted. This may include:
Viewing abusive content
Restricting the downloading and streaming of large media – Live TV, detrimental impacts
on the performance of a network
Downloading files and introducing viruses to the network as a result
Filter sites can be used to block inappropriate websites, backed up by disciplinary measures
for repeat offenders.
People hope that ICT solutions created to solve their organisations’ problems are a success
and hope they do well to serve employees and the business. There are various factors which
contribute to the development of a successful ICT system, and there are reasons why some
ICT projects fail too. A feasibility study is usually conducted before a system is made to see
if it is 100% viable.
At the end of each stage, there will be agreed deliverables – documents or systems that
would need to be produced after each stage - which should be signed off by the client with
the approval to proceed – a document saying that the client is happy to move onto the
next stage of the process.
Stages of development
Analysis
Establishing the need and solving of the nature of a problem, before a solution can be
attempted. First step is analysing what is already currently happening as part of a system, be
it paper based or computer based, and deciding what needs to be established. Analysis
would include:
Exactly what the existing system does
Strengths and weaknesses
Requirements of the new system
Any potential constraints of the new system
Deliverables include:
Clear and detailed user requirements specification
A list of tasks and subtasks to be completed
A Gantt chart
An assessment of the users’ current ICT skill level
Hardware and software requirements
Performance indicators to measure success of the project
An outline of the proposed method of solution
Design
Design stage will show how the system is to be produced:
Data capture and validation methods
Designs for the user interface
Processing to be carried out
Outputs to be produced
How testing will happen
Deliverables:
Data structures, processes
Designs of outputs, on-screen, paper or by other methods
A test strategy and plan, including test data for module/unit testing, integration
testing, systems testing, user testing and operational testing.
A detailed time plan
Writing code – more flexible method of producing a solution. Can be modelled on user
requirements exactly. More chance of bugs, and errors.
Deliverables:
system,
documentation of the solution
plus draft version of user guide
Testing
Testing must happen and occur thoroughly. A testing plan must be made which should tick
off all the relevant boxes.
Module/unit testing
Testing individuals sections of a system to make sure each bit works. White box testing –
checks the details of the programming code and algorithms – is used in module testing
where the programmer has access to internal data structures.
Integration testing
Modules are combined after module testing, and debugged.
Functional testing
Test the operation of the system and pick up errors that were not seen in module testing.
First indication that that the solution is most likely to meet user requirements and is written
from user’s perspective. Black box testing – checks that input gives given output, rather
than the details of the processing involved.
Systems testing
Tests the complete, integrated solution before user testing. Goes from beginning to end to
ensure all is in working order.
User testing
Actual users will be put through the paces of the system and offer comments on how to
improve. Final stage before operation of the system.
Operational testing
Conducted in the environment in which the solution will be working.
Deliverables of testing:
test data and results
modified user guide
client approved to install
System documentation including user guide and other documents will be shown, that may
be needed for future maintenance.
Training of users will also need to take place, even if it happened previously before.
Deliverables:
fully functioning solution
Full documentation including user guide and tech. Documents
Corrective maintenance – involves correcting errors in the system that still remain,
even after testing
Adaptive maintenance – making alteration to organisational protocols and new
security risk
Perfective maintenance – improving software to enhance performance
1. Managements and end user involvement – if staff at all levels of an organisation are
involved in stages of the process, the process is more likely to succeed. Different levels of
users have different levels of requirements, which should be accounted for when a
requirements list is drawn up. Testing of the system and initial training of the new system
should also be conducted to ensure work on the new system can be done in confidence
2. Realistic expectations – Not do the impossible. Clear specification ensures all parties
realise what the solution will be aiming to achieve. Time frame and budges needs to be
realistic.
4. Good teamwork – must mould and successfully work together to ensure a successful
outcome
2. Poor design – inappropriate interfaces and frustrating designs can make system slower
than is necessary, and can lead to buggy systems too.
3. Inappropriate testing – major errors will go undetected, which could lead to major
problems of the functioning of the system.
4. Poorly organised installation and changeover – if the transition is not smooth, then this
will affect attitude of end user. Poor training and introduction to the new system will lead to
a lack of client confidence.
5. Poor user support and maintenance – with no secondary support, to back-up queries and
problems which will inevitably befall the end user allegiance, and help on hand will lead to
people developing a poor attitude to the system, and affecting the chances of success.
6. Poor project management – being disorganised and not monitoring costs of tasks and
time scales, will lead to a late system, which overflows on budget allowance.
Development methodologies
Can be in two categories – linear methodologies, such as the waterfall method and iterative
methodologies such as Rapid Application Development.
Linear
Each stage of a process is completed before the next can begin. “splash-back” when you
have to revisit a previous stage, but would normally be straightforward otherwise. Easier to
manage than iterative methods, with closer control on time schedules and budgets. Less
able to respond creatively to problems with this methods.
Iterative
Repeating steps till you get the good shit at the end. Only when developers and clients are
happy with a particular stage, then it is all good.
Prototyping
Process of continuous refinement based on experiences. Prototyping gradually evolves to
meet the users’ requirements, who are far more heavily involved, meaning that they will be
happy with final product.
Agile methods
More adaptable than traditional methodologies. Agile methodologies involve producing a
brief, high level plans and then adapting those pans based on the results of what actually
happens. Breaking down development into small pieces, fitting them together at an
appropriate time.
Scrum
People fulfilling separate tasks come together to form a whole. Scrum divides problem into
discrete tasks assigned to groups. Short meetings and discussions ensure project is running
all fine and dandy.
Crystal
Simplest and most compact team structure is processed for an organisation, thus making
the development process faster and more efficient, by reducing paperwork, and improving
communication.
RAD says that products could be developed faster and of higher quality by:
Using workshops or focus groups to gather requirements
Prototyping and user testing of designs
Re-using software components
Following a schedule
Keeping review meetings
Interviews – most usual method of gathering client requirements, and most productive,
with the largest degree of knowledge of what the client wants being able to achieve from
the system, being known through this method. Group interviews work well with several
members whose job titles are relevant to the ideas being discussed in the interview. Need to
be prepared in advance, run smoothly, avoid going off on tangents and reported and
documented well after.
Joint Application Development (JAD) – group of people get together and stay in session
until a complete set of requirements is documented and agreed to. With heavy involvement
by client and users, JAD sessions often bring about faster development times and greater
client satisfaction.
Questionnaires – useful for users in remote locations, or who have a lesser role when the
development process of a system is considered. Good for large numbers of people involved
and also good to see how weighted an opinion is, due to the quantifiable nature of
questionnaires.
Observation – visiting the company will make clearer how an organisation operates and give
a better understanding of what goes on
Thought showers – open session where everyone submits their thoughts, share ideas and
will collectively produce something innovative.
Fact recording – recording what you found out in your techniques and writing them down.
Permanent record
If Multiple people are involved, then they can look at notes gathered from fact
recording and go from there
Helps in analysis
Business process modelling tools
It is essential to understand the processes going on within a business, so it is easy to
document and allow everyone to understand. Use of diagrams makes processes clear,
without the need for waffly descriptions.
FOSUPPLIERGOODS TO
TEACHER
Decision Tables
Types of DFDs
Context diagram – provide the least amount of details about the working of the system –
area in which the project is working
Single process
Interaction with external entities
Defines the scope of the system
Attribute
Scale
Can be used in not just one organisation but, multiple smaller ones. An NHS system used in
both trusts and hospitals around the country, and also GP surgeries.
Large organisations tend to use networks to share resources, like software, so testing the
new system in that environment is also essential.
Installation
Methods of introduction:
Direct changeover
Phased changeover
Pilot running
Parallel running
Pilot running – new system introduced in one place of an organisation, small sector, and one
office
Pros – easier to control, easy to monitor and evaluate, easy to train staff, lesser risk
Cons - very slow to roll out a pilot, may not show problems that exist in full-scale system
Phased changeover – new system is brought in stages to replace parts of the old system,
until the old one is completely “phased out.”
Pros – structured method allowing evaluation of each stage, less risk than direct, staff can
be trained on each phase.
Cons – slower than direct, complete system evaluation cannot be done until at the very end,
could cause complications
Parallel – old system and new system running alongside each other
Pros – easily comparable, old system can be used to fall-back on, staff can be trained
gradually
Cons – very expensive, may cause confusion
Do Pg 77 – 79
Risk analysis carried out to see how valuable information is to organisation, and the speed
with which they need to be recovered.
Mission critical data, like databases of customer records or populations of people, are most
valuable. Each type of data is then set an RTO – Recovery Time Objective – length of time it
will take for a system to be fully operational after crisis. Data recovery point – last point at
which data is backed up – will also need to be set.
Back-up operations
Failover systems – hot and cold sites
Replicate systems
Regular snapshots
Periodic back-up to discs
Tape backup
Archiving
Steps to recovery
1. Estimate situation – extent of problem, cause, approximate amount, file types,
importance of data
2. Evaluate available resources – human and hardware, making sure the required expertise
is available and functioning hard disk space
3. Set up – good hard disks are installed with good power supply and cabling
4. Recovery run – install recovery file
5. Evaluate the results – undertake a manual review of the recovered files
6. Clean up – get rid of corrupted files
It is necessary to train and support users to give them the knowledge and skills they need to
do their job effectively.
Types of training
Induction training – training carried out when a new employee joins the organisation.
Familiarisation with ICT policies and procedures
Task-based training – training the user on actual tasks they will be facing in future – how to
fill out entry form or EPOS checkout
Skills-based training – transferable skills that can be used in a variety of ways – if someone
is trained in using spreadsheets, and then they can use those skills for a variety of tasks.
Training users
Must be justification in financial terms. Business will have to see training users as an
investment which will increase productivity and boost profits.
Methods of training
Personal training – user is trained by another person from inside or outside of an
organisation.
Courses-External course away from organisation – individuals going to a place outside of the
business and meeting with fellows of the same job and having training conducted by
professional. Travel and refreshment cost, nice being away from normal operations and
home. Not entirely relevant to an organisation but its good as users can network and a
process called “cascading” can develop.
External trainer giving course from within an organisation – trainer comes in to train large
volume of users at once. Avoids the extra expense of travel and costs for individuals
themselves. Company will pay trainer travel and expenses costs, plus a daily rate for his/her
services. Course will be tailor made to requirements of business. Cheaper than sending all
people to an external; course. Good team building exercise. On the other hand, a lot of
people off duty, this may affect business operations.
Internal trainer – ICT literate employee or member of ICT department who gives training.
Cost is much less but the person giving training is again “off-duty.” May be less forma when
person is giving training to their friends.
One-to-one – Friendly and reassuring way of training someone, if nervous. Interactive, users
can ask questions; have personal responses to their questions, slightly less formal but still
professional. Can be expensive
Other methods
Online tutorials – step-by-step online pages can mimic and simulate the operation of the
software. Interactive, users can work at own pace, replay tutorials for better understanding,
cost-effective as they can be used many times. Impersonal and user cannot ask questions.
Training manuals – usually paper-based and provided by the same people that made the
software. Easy for user to find the bit they find hard, always there for reference, less
expensive than training courses.
Computer based training (CBT) – simulated version of the software that the user can follow,
and learn from. Built-in tests that the user can test themselves on. CBT is cheaper than
courses and can be repeated,
Supporting users
Software help files – will have search facilities which the user can access and use. Natural
language interface – users type in questions as if it were real terms “am I good at ICT?”
Context-sensitive help – gives users help on the bit they are stuck on can also be used.
User guides and manuals – technical documentation provides all the information needed to
install, maintain and run software. Third party manuals – provided by publishers other than
the software house – can also be sued and support range of level of user.
On site technician/help desk – larger organisations have their own help desk or technician to
resolve queries.
Existing user base – users who already know how to use software and stuff can be used.
Forums and that.
External assistance
External helpdesk
Helpdesk provided by the software manufacturer, or a company with whom a support
contract has been negotiated. Contact made via phone, Can be expensive. Outsourced
telephone jobs in India.
Email and chat support
Cheap way of offering support. Done over the Internet.
Remote support
Log into an organisation’s network and investigate problems and carry out solutions
remotely.
Call-out support
Engineer comes and visits you
Bank customers – ATMs are used to do all the things people need to do with their money.
Key-pad buttons and menus are used to allow people to take out money, put money in, top
up phone, and see balance.
Patients in a surgery – touch screen registering system which people use to tell doctor they
are here important that screen is intuitive and no training required. Menu driven with few
options to select.
Online shopping – should be easy for customers to get the shit they want.