logo

Implementing the Proposed Information System in the Organization

Write a short status report addressing project accomplishments, issues, and next week's tasks.

9 Pages2166 Words200 Views
   

Added on  2022-11-23

About This Document

This document describes the implementation of the proposed information system in the organization. It includes the required resources, project risks, change management strategy, and evidence of feasibility.

Implementing the Proposed Information System in the Organization

Write a short status report addressing project accomplishments, issues, and next week's tasks.

   Added on 2022-11-23

ShareRelated Documents
1
Case Study 1 Transforming the Organization
To: The CIO
From: Student Name
Date: July 10, 2018
Subject: Implementing the Proposed Information System in the Organization
Introduction
The executives are seriously considering the proposed information system as
they think the system can potentially transform how their organization functions. As a
result, the Chief Information Officer (CIO) has asked to describe the implementation of
the information system in the organization.
Implementation of the Proposed Information System
To implement the proposed system, the modelling and design of the information
system can be provided along with description on how the system can be integrated
with the various functional modules of the business (Fang et al. 2015). For writing the
code for the building the actual information system, a team of 15 IT members are
required with 5 of them being web developers and the rest 10 members being java
developers. The portal will be designed and hosted within the first week whereas to
have all the functionalities ready it will take three more weeks. The fully-fledged
information system can be integrated with the different business modules and hosted by
the end of the fifth week. The sixth week will require testing and validation. At the
beginning of the seventh week the information system can be made operational and
ready to use with regular business operations.
Implementing the Proposed Information System in the Organization_1
2
A dedicated web server is required as the information system will be integrated
as a component of the website and will require substantial network, compute and
memory specific resources (Yang, Wang and Zhang 2015). There needs to be database
and authentication servers so that the data and information involved in the functioning of
the information system can be adequately stored (Yan et al. 2018). The information
system will require different types of users with grossly different set of privileges and
hence the users need to be classified into different types and specific access levels
such as the external users like consumers will be restricted from internal content of the
company. The general organizational members as well as the management will be
restricted from all configuration and diagnostic information which should only be
accessible to the network administrators. For this there needs to be a firewall and an
authentication server which will control the access permissions available to a said user
type (Zerkane et al. 2016). The authentication server will validate the user credentials
and run the authentication tasks in bath processing. The firewall will block network
access and as well as restrict access to specific content. There must also be FTP and
database servers to facilitate smoother file transfers for sharing of data among the
different departments (Bedewy, Sun and Shroff 2016). This is because of the hefty
media upload and download requirements of the marketing department, recording and
sharing of various audio-video streaming sessions for live meetings conferencing or
even sound bites for knowledge transitions. Add to that the financial department of the
business may also require certain files to be submitted by their customers like proof of
purchase in case of disputes to proceed with refunds in necessary. The system will also
process substantial data about the consumers find out whether they are eligible for
Implementing the Proposed Information System in the Organization_2
3
health insurances (Wager, Lee and Glaser 2017). The firewall and these servers – the
web, database, ftp, and authentication must also be present in other branches of the
organization positioned in different geographical locations so that in case of any branch
getting affected by natural disasters, all data and information can be immediately
recovered and restored from the backup available at other organizational units (Lu et al.
2015).
Project Risks and Workarounds
To protect the sensitive information from hackers, ransomware and to prevent
systems from being compromised by malware applications, the company needs to
install antimalware solutions in all the devices as well as have software firewall solutions
installed in the servers (Mayer et al. 2019). All devices should have either Windows,
Linux or Mac based operating systems installed as well as other applications like any of
the following web browsers – chrome, firefox, safari or edge (Lewis 2017). The systems
are also required to have either adobe flash player of Silverlight and a PDF reader like
Adobe Reader installed.
To help train the organizational members, three additional trainers are required
for providing walkthroughs to effectively and efficiently utilize the information system as
well as two support staff for assisting with the technical knowhow and problem
resolutions with the different modules of the system.
Change Management Strategy
The transition to the newer information system is not expected to affect business
activities as the information system will only be implemented as a pilot model at the
early stages involving selected groups of few members from their respective
Implementing the Proposed Information System in the Organization_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Advanced Diploma of Computer System Technology - Network Infrastructure Management
|12
|559
|180

A Presentation on.
|9
|465
|65

Strong Authentication and Authorization
|4
|803
|52

Computer and Network Security Content
|21
|1055
|20

Network Customization and Optimization
|6
|1882
|248

LAN Setup for People Software in Sydney
|10
|1763
|233